Browse Docs
ONLINE DOCUMENTATION
|
||||||||||||||||||||||||||||||||
Using with Active DirectoryIn this document
OverviewWhen enabling Active Directory (AD) services over the DefensX ZTNA network, certain configuration parameters must be set carefully to ensure proper functionality. This document provides step-by-step guidance on how to create a Secure Access Service that makes Active Directory resources accessible through the ZTNA network. Ports Used by Active DirectoryTo enable Active Directory services over ZTNA, it’s essential to understand which ports and port ranges are required for specific AD functions. The table below lists the commonly used ports and their corresponding purposes within Active Directory operations:
Creating the Secure Access Service for Active DirectoryTo enable Group Policy updates, domain join, and domain leave operations over the DefensX ZTNA network, you must create a Secure Access Service as described below. In the example configuration:
Note: Replace these values with those corresponding to your own environment. Configuration Steps
After creating the service:
Microsoft DNS Server ConfigurationBy default, Microsoft DNS Server is configured to listen on all available network interfaces. While this simplifies initial setup, it can lead to unintended behavior in environments where virtual or tunnel interfaces are present. When the DefensX Agent is installed on a Windows Server, Windows may detect the DefensX tunnel interface (IP address As a result, when an Active Directory client performs a DNS query, it may receive a DNS response that references 100.80.0.1. Since this IP is a virtual tunnel address and not directly reachable by clients, DNS resolution can fail or behave inconsistently. This behavior is a side effect of Microsoft DNS Server’s default configuration, not a DefensX-specific defect. Listening on all interfaces is generally not considered a best practice for production DNS servers, especially in systems with VPN adapters, tunnel interfaces or virtual network overlays. Resolution To prevent Microsoft DNS Server from advertising the DefensX tunnel interface, explicitly bind DNS to the appropriate physical or production IP addresses:
If clients continue to receive the 100.80.0.1 address when resolving a Domain Controller, even after applying the configuration changes above, verify the static DNS records in the relevant zone on the Microsoft DNS Server. Review the zone for any records that reference the 100.80.0.1 IP address. If such records exist, delete them and restart the DNS Server service to ensure the changes take effect.
|
||||||||||||||||||||||||||||||||