Solved

DNS Server loopback address BPA result

Posted on 2013-11-22
2
314 Views
Last Modified: 2013-12-04
BPA on the server is always reporting that "DNS servers on (network adaptor) should include the loopback address but not as the first entry".

The DNS Server addresses ARE listed as they should be with the loopback address listed at the bottom as the LAST entry. What am I doing wrong?
0
Comment
Question by:paulmac110
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
Infamus earned 500 total points
ID: 39669566
You need to configure loop back DNS on the NIC.  (make sure NOT to add this as first entry)

1.
On the DNS server, click Start, click Run, type control netconnections, and then click OK.

2.
Right-click the network adapter you wish to configure, and then click Properties.

3.
Click Internet Protocol Version 4 (TCP/IPv4), click Properties, and then click Advanced.

4.
On the DNS tab, under DNS server addresses, in order of use, click Add, type the IP address of the DNS server you wish to add, and then click Add. To add the IPv4 loopback address, type 127.0.0.1.

5.
To change the order of DNS servers, click the UP arrow or the DOWN arrow on the right side of the list. When you have completed configuring the list of DNS servers, click OK twice, and then click Close.
0
 
LVL 1

Author Comment

by:paulmac110
ID: 39677344
Hi Infamus - Thanks for your advice but what you suggest is exactly what I have already done. See attached image.

BPA still reports that the loopback address should not be the first entry and as you can see, it is evidently not the first entry.
DNS-Advanced.jpg
0

Featured Post

Webinar: Aligning, Automating, Winning

Join Dan Russo, Senior Manager of Operations Intelligence, for an in-depth discussion on how Dealertrack, leading provider of integrated digital solutions for the automotive industry, transformed their DevOps processes to increase collaboration and move with greater velocity.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question