Solved

Multiple DNS servers configured on a client - which one is used when and why?

Posted on 2013-11-22
6
339 Views
Last Modified: 2013-12-02
I am building the Magic Triangle setup where we have Mac laptops bound to both Active Directory on a Windows 2012 server & bound to Open Directory on a Mac Server 10.8.

If I manually configured 2 DNS servers on the Mac laptop:

192.168.1.10 (Windows server)
and
8.8.8.8

How do I control which DNS server gets used when?

I want the laptop to use our Windows server while the laptop is on the LAN, but when Bob takes his laptop home, I want his laptop to use the other DNS server since it won't be able to talk to our Windows server when he has his laptop at his home.

Thanks!
0
Comment
Question by:WineGeek
6 Comments
 
LVL 6

Assisted Solution

by:LectricX
LectricX earned 249 total points
ID: 39670269
First listed = first attempted, in most cases.
Any second, third, 'nth DNS servers are queried if the one before it doesn't respond.

That's usually the case.

So, you want it set up like you have there, so that in the office, it tries 192.168.1.10 first, then if it can't reach that, it tries 8.8.8.8

I hope this helps.
0
 
LVL 10

Assisted Solution

by:EdTechy
EdTechy earned 83 total points
ID: 39670411
I had issues with Magic Triangle logins a few years ago with the first dns entry being internal and the second entry external on the clients. As long as I had the external entry in the clients, I could not login. I fixed the issue by only pointing clients to my internal dns. If your dns server is configured correctly, any request your internal server cannot resolve will be forwarded to the external (8.8.8.8) server.
0
 
LVL 6

Assisted Solution

by:LectricX
LectricX earned 249 total points
ID: 39670471
If that's the case, do you need to consider a tertiary DNS setting?

Memory fails me if you can even configure one on Mac clients.

Eg:
192.168.1.10 (win DNS)
192.168.2.10 (Mac DNS)
8.8.8.8 (ext DNS)
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 35

Accepted Solution

by:
Mahesh earned 84 total points
ID: 39671986
How user connect to internet from home ?

I mean even if you set 8.8.8.8 (Public IP) on his machine as static, user must connect to its internet service provider through some thing like data card, cable modem etc.
He most probably will be getting public IP through DHCP IP, or some natted IP with pointing to their own ISP DNS server as well, then why its computer will go to 8.8.8.8 for name resolution \ internet access ?

It may use 8.8.8.8 dns server, but only after got internet connectivity through its datacard \ modem.As a result 8.8.8.8 is not required at home.

In corporate network you are using 192.168.1.10 (DC) as primary and 8.8.8.8 as secondary.
In that case, if your DC goes down, still client will get internet connectivity through 8.8.8.8 IP address.

Hope that helps
Mahesh
0
 
LVL 6

Assisted Solution

by:LectricX
LectricX earned 249 total points
ID: 39675219
His point is, if you give out DNS servers via corporate DHCP, then when they are in the office, just give them the DNS servers they need for the office.  Just make sure that your DNS servers are willing to answer requests for external internet addresses too.

If you're going to try to give them static info, then their computer won't work anywhere else because you're enforcing a static IP..

So it's kind of a valid point.  When they are at home, they'll get their own IP and DNS info, which won't need to include your servers config.
0
 
LVL 53

Assisted Solution

by:strung
strung earned 84 total points
ID: 39681398
You may need to set two network locations in the Mac - one for the office and one for elsewhere:

http://support.apple.com/kb/HT5289
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

There is a security feature on iOS devices that is nearly impenetrable when it has been activated.  This article will provide some possible solutions as well as necessary steps to take to ensure you do not end up with a locked device.
Set up iPhone and iPad email signatures to always send in high-quality HTML with this step-by step guide.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now