I would think that using example.com would be better because if they try to go to their website or whatever service they offer, they wouldn't have to go outside to resolve the name only to come back in
Consider you own the Chipotle company and you choose to use a public .com rather than the internal .local. On the inside if you ping chipotle.com it will NOT resolve your web site. But actually your domain controller. Active Directory is setup to that a ping to the root of the domain will help you find your DCs. You don't want to override this behavior. This alone is a very valid reason to use the internal name space.
Next, suppose you slap a www in front of chipotle.com to force it to your web servers. You would still have to manually go into your DNS servers and give it a path to your web servers. This of course assumes you even have your web servers on your network. It's much more common these days to let a third party company host your web sites.
I would say the final reason is there is no reason for the public internet to be addressing your internal workstations or server by name. So we should not be implementing it. If you have devices that the public internet can address. They should not be on your domain and have their own DNS namespace in your physical DMZ.
ehnde wrote: » If it's internal, they can use .foobar if they want to. An internal .com domain is potentially confusing. If it's internal and it can't be accessed from outside of the network, .local makes sense. It serves as a reminder that the server being accessed is on a company network, not the public internet. If example.com is, say, a company fileserver with sensitive documents about customers, would you want it to be on the all important outward facing company domain? Example.com is - ideally - a locked down webserver with only services that are absolutely necessary. As far as resolving the name goes, I'm assuming the example.local network has a domain controller. The domain controller would probably handle internal DNS requests, and this shouldn't be too big of a deal. Someone correct me if I'm wrong.
pham0329 wrote: » Either I missed a big chapter during my studies, or I'm not understanding what's being said in the last couple posts. From what I understand, and someone please let me know if its incorrect, but just because I use an .com domain for my AD infrastructure, does not mean that it's accessable on the internet. It's the same reason why I can't put an MX record on my internal DNS to receive external mail.
pham0329 wrote: » ...but as long as everyone puts a www. infront of chipotle.com, there would be no problem, right?
MentholMoose wrote: » Basically, using the same domain guarantees you some extra work, could be a potentially big problem, and there is very little, if any, benefit. Not having to go "outside" for DNS is not a benefit if you are allowing access to the outside for web sites. The default configuration of DNS on a DC will include caching so most of those queries for those resources outside will be cached anyway.
pham0329 wrote: » For example, we have a client who is hosting Exchange and their CEO can't access OWA on her Ipad because their firewall won't allow them to go outside and come back in using the public IP.
pham0329 wrote: » I see the benefits of using a .local if it's a big enough environment, but for small businesses with maybe 2 or 3 servers, does it matter?