-
zWAN
-
-
-
-
- Firewall & Layer 7 Application Filtering
- VPN Site-to-Site Tunnel Setup & Connectivity (z40 to Cloud vGR)
- Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Testing
- DNS Filtering
- DDoS Protection & Logging
- MAC Address Filtering & Geo-fencing
- Application Control & Protocol Blocking
- Authentication & Access Control (zID)
-
- WAN Link Failover & Load Balancing (ACI Mode)
- Dynamic Path Selection & Application-Aware Routing
- SaaS & Internet Breakout Validation
- QoS for Microsoft Teams (Datacenter vGR + Branch z40)
- Tunnel Failover (z40 ↔ vGR) — WAN00 (wired) primary, WAN03 (4G) & WAN04 (5G) backups
- IP Routing & Static Route Steering (z40 Branch)
- VLAN & Layer-2 Bridging
-
-
-
-
-
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- IPsec Tunnel not Establishing
- SSL-VPN Tunnel not Establishing
- Mobile Network Issues
- Management Tunnel does not Establish
- DNS not Resolving from Local Network Appliance
- DNS Resolution Issues in Tunnel Configuration
- DHCP Server not Leasing IP to LAN PC
- Debugging EC Events - Unknown Status Issue
- Trusted-MAC Geofencing Issues
- DNS Issues from DC LAN PC
- Troubleshooting LAN Connectivity to Internet via WAN, Remote Branch LAN, or Local Branch LAN
- NetBalancer gateways displaying Faulty/Inactive
- Packet Drop Issues
-
-
zTC
-
-
-
-
-
- Citrix HDX + USB Headset (Call-Center Baseline)
- VMware Horizon + Smart Card / CAC Login
- Microsoft AVD/RDP + Teams Optimized Video
- Multi-Monitor & 4K Performance
- USB Device Management - Block Storage
- Printing to Local USB & Network Printers
- Barcode Scanner (HID) with Line-of-Business App
- Kiosk / Assigned-Access Auto-Launch
- Wi-Fi Roaming & Link Change Mid-Session
- Power Management and Session State
- OS/Firmware Update & Rollback
-
-
StorTrends
-
zAccess
-
zGuardian
DNS Issues from DC LAN PC
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
1. Check if the DNS Unbound service is running:
systemctl status unbound
Expected Scenario: The service should run without any failures.
2. Ensure the LAN interface IP is correctly listed in the configuration file:
/etc/unbound/zwan/server/interfaces.conf
Expected Scenario: The IP should be 172.7.0.3
.
3. Verify the ACL in the DNS server configuration page includes the LAN PC subnet:Expected Scenario: The subnet should be 172.7.0.0/24
.
4. Check the DNS server details from the LAN PC:
resolvectl status
Expected Scenario: It should display 172.7.0.1
and 172.7.0.3
.
5. Perform a DNS lookup from the LAN PC:
dig @172.7.0.3 amazon.com
Expected Scenario: The command should return a successful response with IPs for amazon.com
.
If the request fails and mentions server unreachable, proceed to Step 6.
6. Perform a DNS lookup from the Edge Controller:
dig @172.7.0.3 amazon.com
Expected Scenario: The command should return a successful response with IPs for amazon.com
.
7. If Step 5 fails but Step 6 works:This indicates the DNS server is configured correctly, but requests from the LAN PC are either not honored or not reaching the DNS server.
8. Verify DNS request visibility:Run the following command while performing Step 5:
tcpdump -i <LAN interface> port 53
If no DNS requests are seen from the LAN PC’s IP address, the firewall on the CPE might be blocking the DNS request.
9. Verify firewall rules:
iptables -t filter -L SYS_DNS -n -v
Expected Scenario: All required LAN subnets should be listed. If 172.7.0.0/24
is missing, firewall rules might be misconfigured.
Further Debugging:If firewall misconfiguration is suspected, check the script responsible for adding subnets to the SYS_DNS
chain.
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |