Forum Discussion
External private IP addresses registering with DNS server
Hello all,
I've been trying to fine-tune our NIDS configuration (which predates my employment here) and more specifically trying to figure out why certain IP addresses/ranges that we don't use, keep appearing in reports/logs.
I think I've figured out the root cause, but I'm not sure of the best way to fix it:
We have a number of remote users who connect to our network by VPN. As best I can tell, when their laptops connect to the network, they're sending updates to the DNS server running on the DC with both the IP address of their VPN interface (routable on our network) and their private IP address on their home LAN (obviously not routable) - if I do an nslookup on a domain machine, the DC returns two A records, one for each address.
This has a slight ripple effect through the network - which manifests mostly with Windows Update Delivery Optimization, where the peer discovery process frequently gets the non-routable private IP somehow and then tries to download Windows updates from it.
Long story short: what is the best way to prevent VPN'ed machines from registering external private IP addresses with the DNS server running on the DC?
- Hohmaniacs1Copper Contributor
We are experiencing the exact same issue, please respond if you found a resolution to this issue.
- jc_dblCopper Contributor
- AwiegJaxCopper Contributor
Hohmaniacs1 Ditto! I'm seeing their home LAN IP as well as their VPN IP. This is totally strange. I'm assuming it has something to do with our Firewall because when I connect in via Azure VPN instead of our default Firewall VPN no DNS record even shows up for my test device.... now I have 2 concerns. Unable to reach an Azure connected client and having an unroutable LAN IP address in my DNS. Weird.
- Hohmaniacs1Copper Contributor
I have a case open with Microsoft, will update when I hear anything. So far they have no clue.