Skip to content

mddazure/dns-resolver-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Private DNS Resolver with Forwarding Rules

#Introduction This lab demonstrates use of DNS Forwarding Rulesets to forward DNS requests from VNETs to a DNS server, either in a VNET or on-premise, without network connectivity between VNETs.

The lab consists of:

  • Two Client VNETs each containing a client VM.
  • A DNS VNET containing:
    • A Private DNS Resolver instance with inbound and outbound endpoints.
    • A DNS Server VM containing zone and A record entry for the FQDN test.fwd.test.
  • DNS Forwarding Ruleset linked to the Client VNETs and the Private DNS Resolver.
  • A Bastion VNET containing a Bastion instance, peered to all three VNETs.

There is no network connectivity between the Client and DNS VNETs; they are not directly peered and VMs in these VNETs cannot reach one another.

image

Deploy

Log in to Azure Cloud Shell at https://shell.azure.com/ and select Bash.

Ensure Azure CLI and extensions are up to date:

  az upgrade --yes

If necessary select your target subscription:

  az account set --subscription <Name or ID of subscription>

Clone the GitHub repository:

  git clone https://github.com/mddazure/dns-resolver-lab/

Change directory:

  cd ./dns-resolver-lab

Deploy the Bicep template:

  az deployment sub create --location westeurope --template-file templates/main.bicep

Verify that all components in the diagram above have been deployed to a resourcegroup named dns-fwding-lab-<date>T<time>Z and are healthy.

VM login credentials:

username: AzureAdmin

password: Privatedns-2022

Explore

Locate the DNS Private Resolver named dnsresolver and note that this has an outbound endpoint named outbep in the VNET dnsvnet.

Locate the DNS Forwarding Ruleset named fwdruleset. Note that this is tied to the endpoint outbep of Resolver dnsresolver, and linked to vnet1 and vnet2. Under Rules, note rule1 is set to forward requests for Domain fwd.test. to address 192.168.0.132:53. This is the address of VM dnsvm in VNET dnsvnet.

Log on to dnsvm and open DNS Manager from the Tools menu in Server Manager. Note the Forward Lookup Zone named fwd.test, with an A record test pointing to address 10.0.1.1.

Test

Resolution

Log on to vm1 or vm2.

Open a command prompt and enter nslookup test.fwd.test.

Observe output is as follows:

Server:  UnKnown
Address:  168.63.129.16

Non-authoritative answer:
Name:    test.fwd.test
Address:  10.0.1.1

Observe forwarded DNS requests

Install and run Wireshark from https://www.wireshark.org/download.html on dnsvm.

Under Capture -> Options, configure a Capture filter for port 53.

Start capture.

On vm1 or vm2, issue nslookup test.fwd.test.

In Wiresshark on dnsvm, observe DNS requests originating from outboundsubnet (192.168.0.32/27), to the vm's address 192.168.0.132:

image

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages