7.3. Configuring a DNS forward zone in the CLI
You can add a new DNS forward zone to the Identity Management (IdM) server using the command line (CLI).
With DNS forward zones, you can forward DNS queries for a specific zone to a different DNS server. For example, you can forward DNS queries for the Active Directory (AD) domain to an AD DNS server.
Prerequisites
- Access to the CLI with a user account that has administrator rights.
- Correctly configured DNS server.
Procedure
Create a DNS forward zone for the AD domain, and specify the IP address of the remote DNS server with the
--forwarderoption:# ipa dnsforwardzone-add ad.example.com --forwarder=192.168.122.3 --forward-policy=first注記You might see a warning about a DNSSEC validation failure in the
/var/log/messagessystem logs after adding a new forward zone to the configuration:named[2572]: no valid DS resolving 'host.ad.example.com/A/IN': 192.168.100.25#53DNSSEC (Domain Name System Security Extensions) secures DNS data with a digital signature to protect DNS from attacks. This service is enabled by default in the IdM server. The warning appears because the remote DNS server does not use DNSSEC. Enable DNSSEC on the remote DNS server.
If you cannot enable DNSSEC validation on the remote server, you can disable DNSSEC in the IdM server:
-
Open the
/etc/named/ipa-options-ext.conffile on your IdM server. Add the following DNSSEC parameters:
dnssec-validation no;- Save and close the configuration file.
Restart the DNS service:
# systemctl restart named
Note that DNSSEC is only available as Technology Preview in IdM.
-
Open the
Verification
Use the
nslookupcommand with the name of the remote DNS server:$ nslookup ad.example.com Server: 192.168.122.2 Address: 192.168.122.2#53 No-authoritative answer: Name: ad.example.com Address: 192.168.122.3If the domain forwarding is configured correctly, the
nslookuprequest displays an IP address of the remote DNS server.