- Thread Author
- #1
Hi,
my network has a fortinet firewall and active directory with two windows 2019 servers (DHCP and DNS) and is connected to the Internet via two different ISPs (A and B) configured for load balancing. There is also an external web server connected to ISP A with two IPs: a public IP for external connections (Internet) and a private IP for internal connections (LAN).
This is my configuration:
LAN → Firewall → ISP A and ISP B
Clients → private IP + DNS active directory servers IP
DNS servers → public DNS forwarders (9.9.9.11 or 9.9.9.9)
Web server → located in the ISP A network, public IP + private IP in the ISP A network
The problem is that connections to the web server work fine from outside the network, but from within I am encountering a potential DNS rebind attack problem (only when the traffic is routed via ISP A, but DNS resolves FQDM to public IP). Moreover, if I use a VPN at browser or operating system level, the problem disappear. I think that the problem is most likely on the ISP A side, but even after many attempts, I have not been able to resolve it with them. So I tried routing all internal traffic to the web server to ISP B so that the connection would become external, and it seems to be working fine. However, sometimes some DNS servers still get the private IP of the web server that is only known to ISP A (verified via nslookup).
What could be causing the problem? Why do local DNS servers get the private IP of the web server? Who provides it to them? Can I set a hard coded resolution in my Active Directory for FQFN→public IP?
Thank you
my network has a fortinet firewall and active directory with two windows 2019 servers (DHCP and DNS) and is connected to the Internet via two different ISPs (A and B) configured for load balancing. There is also an external web server connected to ISP A with two IPs: a public IP for external connections (Internet) and a private IP for internal connections (LAN).
This is my configuration:
LAN → Firewall → ISP A and ISP B
Clients → private IP + DNS active directory servers IP
DNS servers → public DNS forwarders (9.9.9.11 or 9.9.9.9)
Web server → located in the ISP A network, public IP + private IP in the ISP A network
The problem is that connections to the web server work fine from outside the network, but from within I am encountering a potential DNS rebind attack problem (only when the traffic is routed via ISP A, but DNS resolves FQDM to public IP). Moreover, if I use a VPN at browser or operating system level, the problem disappear. I think that the problem is most likely on the ISP A side, but even after many attempts, I have not been able to resolve it with them. So I tried routing all internal traffic to the web server to ISP B so that the connection would become external, and it seems to be working fine. However, sometimes some DNS servers still get the private IP of the web server that is only known to ISP A (verified via nslookup).
What could be causing the problem? Why do local DNS servers get the private IP of the web server? Who provides it to them? Can I set a hard coded resolution in my Active Directory for FQFN→public IP?
Thank you