Solved

Cisco R180w

Posted on 2014-02-27
5
508 Views
Last Modified: 2014-03-05
I have two remote small offices with Cisco R180w using VPN tunnel to a netgear FVS318G.  I cannot get DNS to work  from these remote offices to our corporate.  The VPN connection has been working fine and i am able to do everything by ip address.  Can someone explain how to pass DNS traffic over the VPN tunnel to our DNS server?  I do not have an opportunity to put dns servers in the remote offices since they only have 2 to 3 computers and VPN has worked fine.

I have access rules for dns from LAN to WAN setup on the Cisco and Lan to Wan from netgear box.


cisco lan is 192.168.200.1
             
Action:Lan to Wan                               
Source IP: ANY       
Destination IP:192.168.1.20 (dns server IP)       
gateway:public ip for tunnel

Netgear lan 192.168.1.1

action:broadband
destination IP:192.168.200.1
gateway:public ip for tunnel


 

Thanks
0
Comment
Question by:M Roe
  • 3
  • 2
5 Comments
 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
Comment Utility
I do not have an opportunity to put DNS servers in the remote offices

Then try putting an appropriate entry in your local HOSTS file (each of the small number of computers). You know the VPN works and traffic flows by using IP address.  

Make an entry in HOSTS that looks like 192.168.1.1  Servername   # for remote server.

You need to make the entry fit your circumstances and you need to be administrator to change the HOSTS file.
0
 
LVL 9

Author Comment

by:M Roe
Comment Utility
Can i do a host file through Group Policy to all computers
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
I don't think so. I think you need to set for each computer.
0
 
LVL 9

Author Closing Comment

by:M Roe
Comment Utility
Worked great.  Remotely added to computers and works fine.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
@M Roe - Thank you and I was happy to help.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

There have been a lot of times when we have seen the need to enter a large number of DNS entries in a forward lookup zone. The standard procedure would be to launch the DNS Manager console, create the Zone and start adding new hosts using the New…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now