Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Implement Split-Brain DNS Policies in Active Directory

Implement Split-Brain DNS Policies in Active Directory

Posted on 29/07/202404/09/2024 Matthew By Matthew No Comments on Implement Split-Brain DNS Policies in Active Directory
Implement Split-Brain DNS Policies in Active Directory
Implement Split-Brain DNS Policies in Active Directory

In this detailed guide, we will look at how to implement DNS split-brain policies in an Active Directory environment. Creating a split-brain DNS setup is crucial for managing different DNS responses based on whether the request is internal or external. This can help streamline network traffic, improve security, and ensure that internal and external users can resolve the correct IP addresses. If you want to set up a DNS server please see, How to Install and Configure a Standalone DNS Server.

Here are other related guides: How to Create Service Accounts, Organisation Units and Active Directory Security Groups, Create New Users and Join Synology NAS to Active Directory, and Change Active Directory Domain name from dot local to dot com.

Introduction to Split-Brain DNS

Split-brain DNS, also known as split-horizon DNS, allows you to have two different sets of DNS records for the same domain. This is particularly useful when you have a domain that needs to be resolved differently depending on whether the query comes from inside or outside your network.

For instance, internal users might need to resolve mail.yourcompany.com to an internal IP address, while external users need it to resolve to a public IP address.

Please see how to Grant Non-Domain Admin Privileges to Manage Workstation, and Why you should not use Public DNS in Production: Change DNS Server in Windows.

Why Implement DNS Split-Brain Policies?

Implementing DNS split-brain policies is essential for several reasons:

Simplified Management: Using DNS policies, you can manage internal and external DNS records on the same DNS server, reducing administrative overhead.

Enhanced Security: By directing internal traffic to internal servers, you reduce the exposure of your internal network to the internet.

Optimized Network Traffic: Internal users get faster responses because queries do not need to go through the public internet.

Please see How to convert distribution group to security group, How to change Active Directory Group Scope, and a Review of MiniTool Partition Wizard – Disk Utility Tool.

Example: Split-Brain DNS in Active Directory

Consider techdirectarchive.com, which maintains a fictitious vacancy website at xxw.vacancy.techdirectarchive.cxx. The site has two versions:

  • Internal Version: Available at the local IP address 10.0.1.20.
  • External Version: Available at the public IP address 192.168.0.10.

Without DNS policies, you would need to host these two zones on separate DNS servers and manage them separately. However, with DNS policies, these zones can be hosted on the same DNS server.

How to Setup Split-Brain DNS

Step 1: Create DNS Zones

Add the Active Directory integrated zone (e.g., techdirectarchive.com) to the DNS server:

Add-DnsServerPrimaryZone -Name "techdirectarchive.com" -ReplicationScope "Domain" -PassThru
Create a dns zone
Create a dns zone

Step 2: Create Zone Scopes

Create a new zone scope for the external zone:

Add-DnsServerZoneScope -ZoneName "techdirectarchive.com" -Name "external"
Zone scope
Zone scope

Step 3: Add Records to the Zone Scopes

Add the record for the internal site:

Add-DnsServerResourceRecord -ZoneName "techdirectarchive.com" -A -Name "www.vacancy" -IPv4Address "10.0.1.20"
Internal record to the zone scope
Internal record to the zone scope
Record for internal zone scope
Record for internal zone scope

Add the record for the external site:

Add-DnsServerResourceRecord -ZoneName "techdirectarchive.com" -A -Name "www.vacancy -IPv4Address "192.168.0.10" -ZoneScope "external"
External record to the zone scope
External record to the zone scope

Here is a guide on Domain Name System: How to create a DNS record, How to setup a Third-Party DNS Server on a Linux Server, and how to Setup a Domain Controller as Recommended by Microsoft.

Step 4: Create DNS Policies

Create a DNS policy for the external interface:

Add-DnsServerQueryResolutionPolicy -Name "SplitBrainZonePolicy" -Action ALLOW -ServerInterface "eq,208.80.0.1" -ZoneScope "external,1" -ZoneName techdirectarchive.com
DNS policy for the external interface
DNS policy for the external interface

Please see how to fix “DNS Bad key 9017: The Cluster Name registration failed of one or more associated DNS names“, and how to setup a Third-Party DNS Server on a Linux Server.

Step 5: Verify Split-Brain DNS Configuration

From an internal client, use nslookup to query the internal domain names and ensure they resolve to internal IP addresses:

nslookup www.vacancy.techdirectarchive.cxx
Verify split-brain DNS configuration
Verify split-brain DNS configuration

From an external network, use nslookup to query the public domain names and ensure they resolve to public IP addresses:

nslookup www.vacancy.techdirectarchive.cxx

Conclusion

By carefully setting up internal and external DNS zones and leveraging DNS policies, you can ensure that your internal and external users always get the correct DNS responses.

This guide has provided you with the necessary steps and best practices to achieve a robust split-brain DNS setup.

I hope you found this article useful on how to “Implement Split-Brain DNS Policies in Active Directory.” Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, DNS, DNSRecord, Windows Server 2016

Post navigation

Previous Post: How to convert distribution group to security group
Next Post: Enabling and Configuring WinRM via GPO

Related Posts

  • iscsi
    Install and configure iSCSI Target Server and iSCSI Initiator on a Windows Server Windows Server
  • BitLocker
    Hide Default BitLocker Drive Encryption item in Windows Windows Server
  • xvy
    Fix Error 0xc1420127: The specified image in the specified wim is already mounted for read and write access Windows Server
  • Perform an in place upgrade of Windows Server
    In-place upgrade of Windows Server 2022 to 2025 Backup
  • App Locker
    Harden your Veeam Backup Server with Microsoft AppLocker Windows
  • screenshot 2020 03 29 at 18.19.50
    Shortcut for Windows update: How to create a shortcut for Windows scheduled task Windows Server

More Related Articles

iscsi Install and configure iSCSI Target Server and iSCSI Initiator on a Windows Server Windows Server
BitLocker Hide Default BitLocker Drive Encryption item in Windows Windows Server
xvy Fix Error 0xc1420127: The specified image in the specified wim is already mounted for read and write access Windows Server
Perform an in place upgrade of Windows Server In-place upgrade of Windows Server 2022 to 2025 Backup
App Locker Harden your Veeam Backup Server with Microsoft AppLocker Windows
screenshot 2020 03 29 at 18.19.50 Shortcut for Windows update: How to create a shortcut for Windows scheduled task Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Docker ENOENT error
    ENOENT: No such file or directory Error in Docker build Containers
  • Windows Server 2016 1
    All About Windows Server 2016 Windows Server
  • IIS Installed
    Add and remove IIS Web Server on Windows Server 2019 via the Server Manager and PowerShell Web Server
  • Featured image batch file.
    Retrieve Recent Windows Update: How to create batch script files Scripts
  • Veeam Data cloud   VDC Enrollment
    A-Z on Veeam Data Cloud: Workload Enrollment and Onboarding Backup
  • blue screen error during windows 10 upgrade thumbnail
    Replace a blue screen error with a blank screen for system errors Windows
  • Screenshot 2020 06 15 at 21.08.38
    How to allow saved credentials for RDP connection Windows
  • Windows 10 1024x683 1
    ADK|WinPE|MDT: Deploy Windows with WDS Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.