BIND DNS Server on a Local Network:  Part 3

Getting the web server ready for BIND

disclaimer
posted: 2020-07-17 | updated: 2020-08-15

page 3 of 4

Model sailing ship seen through wood-framed window

Step 4:Add local domain names to hosts files of non-mobile devices

Hey, I thought we weren’t going to use the hosts file! And you’re right. This is a temporary step for testing virtual hosts across the local network. If test sites can be accessed by their virtual host names from the web server and other non-mobile devices on the local network, then we’re on the right track and can move on to installing BIND.

  1. Create a notepad shortcut for editing the hosts file

    This is optional, but it saves time and frustration.

    1. Right click on the desktop, hover over New and click Shortcut
    2. In the location text box, enter:

      notepad “C:\windows\System32\drivers\etc\hosts”

      Click Next

      Create Shortcut window: adding location for "edit hosts file" shortcut
    3. Give the shortcut a name, click Finish

      Create Shortcut window: adding a name for "edit hosts file" shortcut
    4. Right click the new shortcut, click Properties. Click Advanced and then check Run as administrator. Click OK twice. You may also want to create this shortcut on your other non-mobile networked devices.

      Advanced Properties window: checking "Run as Administrator" checkbox for "edit hosts file" shortcut
  2. Add entries to the web server’s hosts file

    Use your dazzling new hosts file shortcut to add the following entries:

    192.168.0.200 cache.cow

    192.168.0.200 highland.cow

    192.168.0.200 moo.cow

    Save and close the hosts file. Note: changes to the host file are instant, like coffee—no need to restart anything.

  3. Add entries to hosts files of non-mobile devices

    Following the procedure in Section 2 above, add the same entries to the hosts file of each of the non-mobile devices.

  4. Why can’t I save the hosts file?

    Windows pop-up: "The process cannot access the file because it is being used by another process."

    If you get the following message when you try to save your hosts file:

    "The process cannot access the file because it is being used by another process."

    ZoneAlarm has locked the hosts file which it does by default. Here’s how to unlock it:

    • Open the ZoneAlarm client
    • In the Antivirus and Firewall panel, click the View Details button
    • Click Settings in the Advanced Firewall section, then click the Advanced Settings button
    • The Firewall Settings window opens to Advanced settings. Uncheck the Lock hosts file check box, click OK and close the ZoneAlarm client.

      Unlocking the hosts file in ZoneAlarm: "Lock hosts file" checkbox is unchecked

      Uncheck "Lock hosts file" so you can edit the hosts file

      Resource

Step 5:Configure ZoneAlarm’s Application Control Settings for Apache

  1. Server Program pop-up windows

    There are two variations of the Server Program pop-up:

    1. The first time a request for a locally hosted webpage is made from the development server itself, ZoneAlarm will display a Server Program pop-up window stating:

      Apache Server wants to accept connections from the Internet

      ZoneAlarm Server Program pop-up: Apache HTTP Server wants to accept connections from the Internet. "Remember this setting" is checked.

      If the Remember this setting checkbox is checked (the default) and the Allow button is clicked, Zone Alarm gives Apache the following application control settings:

      Smart Defense Auto
      Trust Level
      Outbound Trusted
      Outbound Internet
      Inbound Trusted
      Inbound Internet
    2. If the first time a request for a locally hosted webpage is made and it comes from a device other than the development server, ZoneAlarm displays a slightly different Server Program pop-up stating:

      Apache Server wants to accept connections from the trusted zone

      ZoneAlarm Server Program pop-up: Apache HTTP Server wants to accept connections from the trusted zone: "Remember this setting" is checked.

      In this case if the Remember this setting checkbox is checked (the default) and the Allow button is clicked, ZoneAlarm gives Apache the following application control settings:

      Smart Defense Auto
      Trust Level ?
      Outbound Trusted
      Outbound Internet ?
      Inbound Trusted
      Inbound Internet ?

      The above settings work fine for webpage requests made by devices other than development server, but these settings block webpage requests made from development server itself—Inbound and Outbound Internet connections must be allowed.

  2. Manually configuring ZoneAlarm Server Application Control Setting

    If you want to check or edit the settings yourself, find the listing for Apache HTTP Server in the View Programs section of the Application Control Settings window:

    • Open the ZoneAlarm client
    • Click View Details in the Antivirus and Firewall pane
    • Click Settings in the Application Control section
    • Click View Programs in the application control window
    • Find the listing for Apache HTTP Server in the in the Application Control Settings window
    • Click the zone setting you wish to edit. Select a zone setting from the resulting pop-up. Click OK and close the ZoneAlarm client.

      Changing Apache's Outbound Trusted setting to Allow in the ZoneAlarm Application Control Settings window

      Here are the updated ZoneAlarm Application Control Settings for Apache HTTP Server. Apache is ready to serve webpages on the local network.

      ZoneAlarm Application Control Settings window showing Apache Outbound Trusted and Internet zones, and Inbound Trusted and Internet zones allowed
  3. ZoneAlarm settings for MySQL Server

    If you’ve been wondering about ZoneAlarm firewall settings for mysqld.exe, ZoneAlarm automatically assigns the following Application Control settings:

    Smart Defense Auto
    Trust Level ❙❙❙
    Outbound Trusted
    Outbound Internet
    Inbound Trusted
    Inbound Internet

    However, I’ve been using the following Application Control Settings for years with mysqld.exe without problems.

    Smart Defense ?
    Trust Level ?
    Outbound Trusted ?
    Outbound Internet ?
    Inbound Trusted ?
    Inbound Internet ?

    Resources:

page 3 of 4

«  »

⛵ top ⛵

No comments yet…

Expound upon: BIND DNS Server on a Local Network:  Part 3

Your email address will not be published. Required fields are marked *

*