Hi Phil,
Apologies if my approach was not clear, after Steve's mail. But I tested
by using dig without the +trace option. I have tested the following from
an IP, which is accepted via the trusted ACL:
dig @10.10.10.1 www.domain2.com A
dig @10.10.10.1 domain2.com NS
And directly from the internal
Hi Steve,
Thanks for your reponse.
On Sun, Sep 08, 2013 at 10:57:15AM +0100, Steven Carr wrote:
> You will need to perform a packet capture on the DNS server itself,
> from a client they query for records in domain2.com and then analyse
> the packet capture to see what happened when the query cam
All,
I have tried to search on the web for a solution for the following
problem, but I didn succeed.
My goal:
I run an internal DNS server ('10.10.10.1'), which is authoritive for an
internal domain ('domain1.com'), and allows recursion for internal
networks. We have another internal nameserver (
3 matches
Mail list logo