Procedure: Verify DNS Resolution
Applies To: Windows Server 2012 R2, Windows Server 2012
Use the following procedures to verify DNS resolution on a DNS client using Windows PowerShell. When you have completed the procedures in this topic, return to the parent checklist.
For information about configuring name resolution policy, see The NRPT.
Name resolution policy settings can only be applied to computers that are security-aware. For more information about security-aware computers, see Security-aware client.
Use the Verify DNSSEC validation procedure in this topic to verify that name resolution works as expected.
Verify DNSSEC validation
To use the example Windows PowerShell commands that are provided, replace the server and zone names with the names of the servers and zones that are used in your environment.
To verify DNSSEC validation
Open a Windows PowerShell prompt on a DNS client computer.
To verify DNSSEC validation, use the Resolve-DnsName cmdlet. First, verify that name resolution is successful when querying an authoritative DNS server. See the following example.
PS C:\> Resolve-DnsName secure.contoso.com -Server dc2.contoso.com -dnssecok Name Type TTL Section PrimaryServer NameAdministrator SerialNumber ---- ---- --- ------- ------------- ----------------- ------------ secure.contoso.com SOA 3600 Authority dc2.contoso.com hostmaster.contoso.com 6 Name : secure.contoso.com QueryType : RRSIG TTL : 3600 Section : Authority TypeCovered : SOA Algorithm : 8 LabelCount : 3 OriginalTtl : 3600 Expiration : 1/26/2014 10:27:53 PM Signed : 1/16/2014 9:27:53 PM Signer : secure.contoso.com Signature : {56, 217, 3, 225...} Name : vfo5uo7g4u40gj25v1s0p3mh3pp7aai2.secure.contoso.com QueryType : NSEC3 TTL : 3600 Section : Authority Name : vfo5uo7g4u40gj25v1s0p3mh3pp7aai2.secure.contoso.com QueryType : RRSIG TTL : 3600 Section : Authority TypeCovered : NSEC3 Algorithm : 8 LabelCount : 4 OriginalTtl : 3600 Expiration : 1/26/2014 10:27:53 PM Signed : 1/16/2014 9:27:53 PM Signer : secure.contoso.com Signature : {97, 195, 245, 11...} Name : . QueryType : OPT TTL : 32768 Section : Additional Data : {} PS C:\> Get-DnsServerZone -Name corp.contoso.com ZoneName ZoneType IsAutoCreated IsDsIntegrated IsReverseLookupZone IsSigned -------- -------- ------------- -------------- ------------------- -------- corp.contoso.com Primary False False False True
In this example, the primary authoritative DNS server dc2.contoso.com is queried. Since authoritative responses are always valid, the DNS query will succeed. DNSSEC-related resource records are displayed because the zone is signed. If a zone is not signed, such as the contoso.com zone in the following example, RRSIG records are not displayed in the output.
PS C:\> Resolve-DnsName contoso.com -Server dc2.contoso.com -dnssecok Name Type TTL Section IPAddress ---- ---- --- ------- --------- contoso.com A 600 Answer 192.168.0.2 contoso.com A 600 Answer 192.168.0.3 contoso.com A 600 Answer 192.168.0.1 Name : . QueryType : OPT TTL : 32768 Section : Additional Data : {}
Next, use the Resolve-DnsName cmdlet to query a nonauthoritative, resolving DNS server with a valid trust anchor installed. See the following example.
PS C:\> Resolve-DnsName secure.contoso.com -Server 192.168.0.4 -dnssecok Name Type TTL Section PrimaryServer NameAdministrator SerialNumber ---- ---- --- ------- ------------- ----------------- ------------ secure.contoso.com SOA 830 Authority dc2.contoso.com hostmaster.contoso.com 6 Name : secure.contoso.com QueryType : RRSIG TTL : 830 Section : Authority TypeCovered : SOA Algorithm : 8 LabelCount : 3 OriginalTtl : 3600 Expiration : 1/26/2014 10:27:53 PM Signed : 1/16/2014 9:27:53 PM Signer : secure.contoso.com Signature : {56, 217, 3, 225...} Name : vfo5uo7g4u40gj25v1s0p3mh3pp7aai2.secure.contoso.com QueryType : NSEC3 TTL : 830 Section : Authority Name : vfo5uo7g4u40gj25v1s0p3mh3pp7aai2.secure.contoso.com QueryType : RRSIG TTL : 830 Section : Authority TypeCovered : NSEC3 Algorithm : 8 LabelCount : 4 OriginalTtl : 3600 Expiration : 1/26/2014 10:27:53 PM Signed : 1/16/2014 9:27:53 PM Signer : secure.contoso.com Signature : {97, 195, 245, 11...} Name : . QueryType : OPT TTL : 32768 Section : Additional Data : {}
In this example, a non-domain-joined nonauthoritative, recursive DNS server at 192.168.0.4 is queried. Since this DNS server has a valid trust anchor installed for the secure.contoso.com zone, the DNS query will succeed. Again, DNSSEC-related resource records are displayed because the zone is signed.
If DNSSEC validation does not succeed, an error will be displayed, see the following example.
PS C:\> Resolve-DnsName secure.contoso.com -Server 192.168.0.4 -dnssecok Resolve-DnsName : secure.contoso.com : DNS server failure At line:1 char:1 + Resolve-DnsName secure.contoso.com -Server 192.168.0.4 -dnssecok + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (secure.contoso.com:String) [Resolve-DnsName], Win32Exception + FullyQualifiedErrorId : RCODE_SERVER_FAILURE,Microsoft.DnsClient.Commands.ResolveDnsName
In the previous example, the DNS server at 192.168.0.4 does not have a valid trust anchor installed for the secure.contoso.com domain.