Skip to main content
Skip table of contents

3524 - Configuring NAT'ed glue records in NIOS


After some time of testing with 2 DNS views in NIOS, your team has decided it is time to make it official and move this configuration into the production stage. To do this, your team decided to rename the view default to External, so it’s less confusing. The other DNS view named Internal will not be changed. Then, since the NIOS members are configured with Network Address Translation (NAT), you need to configure the NIOS Grid in such a way that the published glue records reflect the public or external IP addresses, not the private or internal IP addresses. Otherwise, when external users resolve this domain, they will attempt to connect to the private or internal IP address, which is not reachable to the Internet.

Your task is to make the necessary configuration changes in the NIOS Grid to accomplish these goals.

Estimate Completion Time

  • 15 to 20 minutes






Grid Manager UI




  • Administrative access to the Grid

Course References

  • 3006: Configuring NAT'ed Glue Records in NIOS

  • 3011: DNS Troubleshooting Methodology

  • 3014: NIOS DNS Zones Expert Topics

Lab Initiation

Access jump-desktop

Once the lab is deployed, you can access the virtual machines required to complete this lab activity. To initiate the lab, click on the jump-desktop tile and login to the Linux UI:

Username: training

Password: infoblox

Initiate lab

To initiate the lab, double-click the Launch Lab icon on the Desktop.

Launch Lab

Launch Lab

Choose the lab number from the list and click OK.

After clicking OK, you will see a pop-up message with a brief description of the lab task. If the description looks correct, click Yes to continue lab initiation.

Lab initiation will take a couple of minutes to finish.

Once complete, you will see another pop-up message with the login credentials and the URL for the Grid Manager’s User Interface. Note that the credentials may differ from those from prior labs.

Screenshot 2024-05-06 at 3.16.57 PM.png


Task 1: Renaming the DNS View

Rename DNS View from default to External.

Task 2: Configuring NAT'ed IP Addresses for Glue records

Configure glue records in the new view to reflect the NAT'ed public IP addresses of DNS servers, instead of the private IP addresses assigned to their interfaces. Please refer to Table 3524-1 for details.

Table 3524-1

Name Server

Internal/Private IP Address

External/Public IP Address

 Glue records are A or AAAA records that belong to NS records.

Task 3: Verifying resolution

Test and confirm that the external clients are now getting the NAT'ed IP addresses when querying the glue records for both and


Task 1 Solution: Renaming the DNS View

  1. In Data Management → DNS → Zones, you should see both views (Internal and default).

  2. Select the view default and click Edit.

  3. In the DNS View field, change the name to External. Click Save & Close.

If you do not see multiple DNS views under Data Management → DNS → Zones, you might be inside of a zone. Look for the DNS Home link on the upper left corner, it should be located between the name of the view and the sub menus. This link will display all of the DNS views configured for the Grid.

Task 2 Solution: Configuring NAT'ed IP Addresses for Glue records

The DNS member configuration needs to be updated. After the update, the Infoblox Grid will automatically reconfigure the zone records in the external DNS view.

Perform the following steps on the members ibns1 and ibns2:

  1. Navigate to Data Management → DNS → Members, edit the Member DNS Properties.

  2. Toggle into Advanced Mode and select DNS Views from the side menu.

  3. In the section IPv4 Address of Member Used in DNS Views, look for External. It defaults to Interface IP address. Change it from Interface IP Address to Other IP Address, and enter the public or external IP address for this member. The example screenshot shows the completed configuration for the member

  4. Click Save & Close. You will be prompted to restart service. Wait until you have configured both members, then restart service.

Task 3 Solution: Verifying resolution

Testing is tricky, since all internal clients (including the jump-desktop) are receiving only Internal view answers. If you were to look up the glue records for form the jump-desktop, it looks like this:

$ dig @ A
; <<>> DiG 9.11.12 <<>> @ A
; (1 server found)
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; AUTHORITY SECTION:      900   IN    SOA 26 10800 3600 2419200 900

;; Query time: 29 msec
;; WHEN: Thu Aug 19 20:45:07 UTC 2021
;; MSG SIZE  rcvd: 156

This is because there is no zone configured in the Internal view. Because recursion is enabled, the DNS server went to the Internet, found the authoritative servers for the Internet-available, and received the answer NXDOMAIN. We can see the name of the primary name server is in the output above.

We want the jump-desktop to temporarily receive the External view answer. This can be accomplished by modify the match clients value on the Internal view, to deny jump-desktop access to the Internal view. In other words, this will force the jump-desktop to receive data from the External view, so we may test and verify the name resolution. To do this, we will need to: 1) get the IP address of jump-desktop, and 2) make an exception for that IP address so it temporarily receives answers from the External view.

Modifying DNS View’s Match Clients List

Edit the DNS Internal view, modifying its match clients rule to deny access to jump-desktop’s IPv4 address,

  1. From Data Management→DNS→Zones, place a check in the box beside the Internal view.

  2. Click Edit.

  3. Select the left tab for Match Clients.

  4. The current configuration is to serve this view (Internal) to internal/private networks only. We need to add a new entry for our jump-desktop.

  5. In the section for Match Clients → Set of ACE’s, click the Add dropdown and choose IPv4 Address.

    1. For the Address, enter

    2. For the Permission, set it to Deny.

  6. Click the checkbox next to the entry you just created, and use the arrows to move it to the top of the list.

  7. Click Save & Close.

  8. Restart service when prompted.

Remember that match clients list works exactly the same as ACL and other ordered lists: Ordering matters. If you left the IPv4 at the bottom of the list, it will never be reached. When the DNS server is processing this request, it will see → Allow, and stop processing after that statement. In other words, you would have added an entry that doesn’t do anything, because of its placement on the list.

Now when we re-run the same query, the answer is coming from the External view and we can verify it is correct. Notice the presence of the AA flag, which confirms that we are receiving this authoritative answer from the member

$ dig @ A
; <<>> DiG 9.11.12 <<>> @ A
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59671
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;            IN    A

;; ANSWER SECTION: 28800 IN    A

;; Query time: 5 msec
;; WHEN: Thu Aug 19 20:50:16 UTC 2021
;; MSG SIZE  rcvd: 91
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.