Configure System for DNS Survivability
Table of Contents
Expand All
|
Collapse All
Prisma SD-WAN Docs
-
-
-
-
- AWS Transit Gateway
- Azure vWAN
- Azure vWAN with vION
- ChatBot for MS Teams
- ChatBot for Slack
- CloudBlades Integration with Prisma Access
- GCP NCC
- Service Now
- Zoom QSS
- Zscaler Internet Access
-
-
- ION 5.2
- ION 5.3
- ION 5.4
- ION 5.5
- ION 5.6
- ION 6.0
- ION 6.1
- ION 6.2
- ION 6.3
- ION 6.4
- New Features Guide
- On-Premises Controller
- Prisma Access CloudBlade Cloud Managed
- Prisma Access CloudBlade Panorama Managed
- Prisma SD-WAN CloudBlades
Configure System for DNS Survivability
Prisma SD-WAN Configure DNS Survivability Use case.The DNS service
configuration is now enabled on the ION device and will answer DNS queries on the selected
interfaces.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
In the modern branch, most systems rely heavily on SaaS solutions
for most day to day tasks. These include productivity tools such as Office 365,
credit card processing systems such as Square, and POS (point-of-sale) systems such
as Aloha; all delivered from the public internet. Besides DNS resolution, these
systems have no dependency on private networks.
Using the Prisma SD-WAN DNS service, the system can be configured to use public
internet DNS systems by default while sending internal domain name resolution
requests to private DNS servers in the network. The majority of site services remain
active and functional if the branch is unable to connect with the centralized,
private DNS servers.
DNS and Trusted SaaS App Traffic Flow before Prisma
SD-WANWhen the branch PC sends a DNS resolution request to the DNS server
located in the central data center, the data center DNS server receives the request
and responds, if known or cached. Else, forwards the request to the upstream DNS
server.
The branch PC receives the DNS response with the IP address
information for the trusted SaaS application. The connection request is sent to the
destination server. The data center firewall receives the inbound connection request
from the WAN edge MPLS router and forwards it to the internet.
The SaaS
service receives the TCP connection request and sends an acknowledgment back to the
data center firewall. The branch PC receives the TCP connection
acknowledgment.
DNS and Trusted SaaS App Traffic Flow After Prisma
SD-WANWhen the branch PC sends the DNS resolution request to the local branch
ION, configured as the primary DNS server, the ION DNS service receives the request
and responds if the domain record is cached. Else, it forwards the request to the
upstream DNS server based on the configuration. The internet DNS server receives the
request and responds to the branch ION. The branch ION forwards the response to the
branch PC.
The branch PC receives the DNS response with the IP address
information for the trusted SaaS application, and the connection request is sent to
the destination server. The branch ION receives a connection request for the trusted
SaaS application and sends it directly onto the internet path per policy.
The
SaaS service receives the TCP connection request and sends an acknowledgment back to
the branch ION. The branch PC receives the TCP connection
acknowledgment.
Configure the system to facilitate the DNS survivability use
case.
- From the Prisma SD-WAN web interface, select ManageResourcesConfiguration ProfilesDNSDNS ServiceDNS Service Roles and create a new service role called Listen and Forward.Navigate to DNS ServiceDNS Service Profiles and click to Create a new DNS service profile.On the Basic screen, enter a name for the DNS profile and add a DNS Server.
- Specify the internal DNS server IP address.Select Domain Names and define all internal top-level domain names. For example, internal.com.Specify the Listen and Forward DNS Service Roles created in Step 1.Click Save.Repeat the procedure per internal DNS server system.Add a DNS Server from DNS Servers.
- Specify the internet DNS Server IP address.Specify the DNS Service Roles, Listen and Forward, created in Step 1.Do not enter the Domain Name.Click Save.Repeat the procedure per internet DNS server system.Click Save and Submit.Configure the ION device to use the DNS service.
- Navigate to the ION configuration page and select DNS Service.Enter a name for the DNS service and select the DNS Profile created in Step 2.In DNS Service Role Bindings, click Add.Select the DNS Role, Listen and Forward from the drop-down.Select all relevant LAN interfaces that will receive and forward the requests and Enable the service.Click Save.The DNS service configuration is now enabled on the ION device and will answer DNS queries on the selected interfaces. After testing that the Prisma SD-WAN DNS service is configured per requirements, the DNS server IP addresses can be changed in the DHCP scope to the respective default gateway (ION LAN interfaces), the branch subnets, or specified manually on systems with static IP configuration.With the Prisma SD-WAN system deployed and the DNS service enabled, the branch systems utilizing SaaS services no longer rely on the centralized data center resources to function. In the event of a data center failure, none of the SaaS application services will be affected. This is due to all necessary functions delivered by the ION device through the DNS service and the ability to put trusted SaaS application traffic directly onto the internet with a scalable and straightforward path policy rule.