Skip to main content
Skip table of contents

2521 - Configuring Named ACLs in NIOS


You are configuring access to DNS service and realized that you are entering the same subnet information repeatedly. This information can be captured in a reusable Named ACL, then applied to each Grid object, to keep security policies simpler and more consistent. Please create a Named ACL object with the subnet information.

Estimate Completion Time

  • 15 to 20 minutes






Grid Manager UI




  • Administrative DNS access to the Grid

Course References

  • 2009: Configuring NIOS DNS Services

  • 2023: Configuring NIOS DNS Zones

Lab Initiation

Access jump-desktop

Once the lab is deployed, you can access the virtual machines required to complete this lab activity. To initiate the lab, click on the jump-desktop tile and login to the Linux UI:

Username: training

Password: infoblox

Initiate lab

To initiate the lab, double-click the Launch Lab icon on the Desktop.

Launch Lab

Launch Lab

Choose the lab number from the list and click OK.

After clicking OK, you will see a pop-up message with a brief description of the lab task. If the description looks correct, click Yes to continue lab initiation.

Lab initiation will take a couple of minutes to finish.

Once complete, you will see another pop-up message with the login credentials and the URL for the Grid Manager’s User Interface. Note that the credentials may differ from those from prior labs.

Screenshot 2024-05-06 at 3.16.57 PM.png


Task 1: Creating a named ACL

You are repeatedly entering the same subnet information listed in Table 2521-1 to various objects to define access policy. Please create a Named ACL with these values, and give it the name Company Internet Subnets to make future configuration work easier.

Table 2521-1




IPv4 Network


IPv4 Network


IPv4 Network


IPv4 Address


IPv6 Network



IPv6 Network



IPv6 Network



IPv6 Address



Task 2: Applying the Named ACL to existing objects

Now that you have a Named ACL, you may update existing objects to use it, making maintaining the correct access policy easier. Please update both DNS members ibns1 and ibns2 to only allow recursive queries from Company Internet Subnets.



Task 1 Solution: Creating a named ACL

  1. Navigate to Administration → Named ACLs

  2. Click Add

  3. For Name, enter Company Internal Subnets

  4. Click Next

  5. At Step 2 of 3, click the Add dropdown menu and select IPv4 Network from the list

  6. For Address, enter

  7. Use the slider to set the Netmask to 16 (

  8. Default Permission is set to Allow, leave it at that

  9. Click Add

  10. Repeat the above steps to add all subnets from table 2521-1

  11. Click Save & Close

  12. The Named ACL table now includes the Company Internal Subnets entry

Task 2 Solution: Applying the Named ACL to existing objects

Edit the Member DNS Grid Properties for both ibns1 and ibns2 and allow Recursive Queries from the Company Internal Subnets ACL

  1. Navigate to Data Management → DNS →Members

  2. Place a check next to and click the Edit button

  3. Select the Queries tab

  4. Scroll down to find the section for Recursion

  5. Click the Override button

  6. Place a check mark in the box for Allow recursion

  7. Select the radio button for Named ACL

  8. Click the Select Named ACL button

  9. If Company Internal Subnets is the only Named ACL you have created, it will be populated automatically, otherwise from the Named ACL Selector screen, click the Company Internal Subnets link

  10. Click Save & Close

  11. Repeat the above steps for

  12. Restart the DNS service by clicking Restart on the banner at the top of the Grid Manager window

  13. At the Restart Grid Services window, click Restart

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.