Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

  • .

Only static and dynamic record source type support secure dynamic updates. You can see the record source type in the Resource Record Viewer. The following table shows which type of secure dynamic updates is applicable to different record source types.
Table 21.1 Secure Dynamic Update Types

Secure Dynamic Update TypeRecord Source Type
Restrictions for updates to statics recordsStatic
Restrictions for updates to protected

...

recordsStatic, dynamic
Restrictions based on GSS-TSIG principal

...

authenticationDynamic
Restrictions based on FQDN

...

patternsStatic, dynamic

Failed attempts to dynamically update secured records are recorded in the NIOS syslog. You can view it, as described in Viewing the Syslog and Searching in the Syslog.
You can use Smart Folders to organize data by record source, principal, or protection state. For more information, see
Chapter 3, Smart Folders,.

In addition, you can use Global Search to search for records by principal name. For more information, see Using Global Search.

...

Note: To use the secure dynamic updates feature, you must have a DNS license installed in the Grid Manager.

...

Anchor
Restricting Updates to Static Records
Restricting Updates to Static Records
Anchor
bookmark2007
bookmark2007
Restricting Updates to Static Records


This method prevents updates to all RRsets containing static records at once in the Grid, DNS view, or zone. To prevent updates to specific static records, see Restricting Updates to Protected Records.

...

Note: When you upgrade from a previous NIOS version to NIOS 7.3 or later, all dynamic updated records are labelled as static records if you enable the Secure Dynamic Updates feature. Infoblox suggests that you enable this feature only after all records are changed to Dynamic. NIOS tags the RRsets that are not auto-generated as static records.

...

To restrict updates to all static records in the Grid, DNS view, or zone:

...

  • A record
  • AAAA record
  • CNAME record

...

...

  • DNAME record
  • MX record
  • NAPTR record
  • PTR record
  • SRV record
  • TXT record
  • Host record

...

  1. In the DNS Resource Records viewer, select a record or multiple records.
  2. In the Toolbar, select Protect Records -> Enable Protection.
    Or
    In the properties dialog for a record, click Updates, select the Protected check box, and then click Save & Close.

     3. Enable updates prevention at the corresponding level:

    1. In the Grid DNS, view, or zone properties, click Updates -> Advanced.
    2. If necessary, click Override to override the inherited properties.
    3. Select Prevent dynamic updates to RRsets containing protected records.
    4. Click Save&Close.

Anchor
Restricting Updates Based on GSS-TSIG Pr
Restricting Updates Based on GSS-TSIG Pr
Anchor
bookmark2009
bookmark2009
Restricting Updates Based on GSS-TSIG Principal Authentication

This method implies tracking the Kerberos GSS-TSIG principal that created a record and restricting DDNS updates attempted by a different GSS-TSIG principal on this record.
The Resource Record Viewer displays the GSS-TSIG authentication information in the Principal column: it displays the principal name if the client that created the record is authenticated and the principal is tracked.
The tracked principal is also displayed in the record properties. You can change the principal associated to a record by clicking Select Principal in the record properties and specifying the required principal.
Additionally, you can use dynamic update groups to manage the allowed principals. For more information, see About Dynamic Update Groups .
To restrict updates based on GSS-TSIG principal authentication:

...

1. In the Grid DNS, view, or zone properties, click Updates -> Advanced.

2. To override the inherited properties, click Override.

3. Under SecureDynamicUpdates, select Track the GSS-TSIG principals that create dynamic records.

...

Note: For this option to work, ensure that you have selected Enable GSS-TSIG authentication of clients in the GSS-TSIG properties of the Grid or the corresponding zone or view.

...

4. Select Require the appropriate GSS-TSIG principal to update RRsets that track principals.

5. Optionally, specify an active dynamic update group.

6. Click Save & Close.

...

...

Anchor
bookmark2010
bookmark2010
About Dynamic Update Groups

In some cases, for example, in DHCP failover associations, you need to allow different GSS-TSIG principals to update each other's records. To that end, you can join multiple principals into clusters, where all principals are considered as equivalent and therefore can update affected records without being their originators. You can join multiple clusters into a dynamic update group. The clusters within a group, however, are not considered equivalent and cannot update each other's records.
When you have several dynamic update groups defined, you can assign different groups to be active for the Grid, a DNS view, or a zone as described in Restricting Updates Based on GSS-TSIG Principal Authentication. If no group is assigned, then no principals are considered to be equivalent.
For information on how to add dynamic update groups and clusters, see Managing Dynamic Update Groups and Clusters.

...

Note: Viewing and modifying the configuration of a dynamic update group requires Grid DNS permissions. Selecting a group as active for the Grid, a view, or a zone requires read permission on the Grid DNS, as well as write permission on the object being modified.

...

Anchor
bookmark2011
bookmark2011
Managing Dynamic Update Groups and Clusters

...

  1. In DataManagement -> DNS, expand the Toolbar and click Manage Dynamic Update Groups.
  2. Click the Add icon.
  3. Select AddDynamicUpdateGroup.
  4. Specify the group name.
  5. Optionally, provide a comment.
  6. Click Save and Close. Proceed to adding clusters to the group as described below.

To add a cluster:

  1. In the Manage Dynamic Update Groups window, click the Add icon.
  2. Select AddCluster.
  3. Select the dynamic update group in which you want to include the cluster.
  4. Specify the cluster name.
  5. Optionally, provide a comment.
  6. Click SaveandClose.
  7. To add principals to the cluster, select the cluster in the Manage Dynamic Update Groups window and click the Add icon. A principal can appear in multiple clusters.
  8. Select one of the following:
    • AddPrincipal: This adds a new row in the table. Specify the principal name in the row.
    • SelectPrincipal: This opens the PrincipalSelector dialog. Select the required principal from the list.
  9. Click Close.

To edit or delete a group, cluster, or principal, select it in the Manage Dynamic Update Groups window, and click the corresponding icon.
You can also export data about dynamic update groups, their clusters, and principals in the Infoblox CSV Import format by clicking the Export icon in the Manage Dynamic Update Groups window. For more information, see Exporting Data to Files.
Image Removed
1002NIOS Administrator Guide (Rev. A)NIOS 8. 1 Secure Dynamic Updates

Anchor
Restricting Updates Based on FQDN Patter
Restricting Updates Based on FQDN Patter
Anchor
bookmark2012
bookmark2012
Restricting Updates Based on FQDN Patterns

...

Note: Use the DNS Traffic Control LBDN wild cards to specify FQDN patterns. For more information, see
Configuring LBDN Patterns.

...

    • To delete an FQDN pattern, select the check box next to the pattern and click the Delete icon.

     4. Click Save & Close.












































Image Modified
NIOS 8.1NIOS Administrator Guide (Rev. A) 1003
Configuring DDNS Updates





































































Image Modified
1004NIOS Administrator Guide (Rev. A)NIOS 8.1