Solved

DNS Problem

Posted on 2003-11-20
4
220 Views
Last Modified: 2010-03-19
Our users cannot access some of our network resources. They cannot ftp to our ftp server (which is inside the firewall) and also our webmail site. What do I need to do on my DNS server to change this? We have a NT network with two internal dns servers. thank you
0
Comment
Question by:staboogie
4 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 9789204
Can you connect to the servers using their IP address?
0
 
LVL 5

Accepted Solution

by:
vtobusman earned 250 total points
ID: 9789313
can you drew us a little better pic of you network.

you internal network are you using private addresses??
and if so is you ftp and webmail accessable from the outside of your network ?
or internal use only...

if you using all nt systems
try connecting by computername i.e..

http://<computername>
 or
 http://<ipaddress>
same with your ftp server
ftp://<user name>:<password>@<computer name or ip address>

example  ftp://joe:blo@gummybears.com
   or        ftp://joe:blo@10.1.1.5


  this will tell you if it is dns or not if you can connect like this then dns is deffently you problem check your host records and "A" records make sure that they are pointing to the correct ip addresses...
i.e.
   if your webmail server is 10.1.5.1 and your domain is fun the you should have an record
that looks something like this

; Updated with record editor at 10/14/2003 1:18:46 PM
@      86400      IN SOA      <name of dns server>. <e-mail address of admin>. (
                         2003101401    ; Serial number
                         86400         ; Refresh
                         3600          ; Retry
                         777600        ; Expire
                         3600        ) ; Minimum TTL
            NS      <name of dns server>.
            A      <ip of webmail server >
            NS      <secondary dns name>.
            MX      <name of mail server>
ftp            A      <ip address of ftp server>
www            CNAME      @


and that should do it....
hope this helps.. if not post more detailed network info...
  good luck
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now