Golden Rules for Windows 2000-Test

zhaozj2021-02-16  58

Logon Process

WHEN A Directory Serv

ICE

S-Aware Client Logs Onto The Network, The Following Process IS Performed:

1. The Client Will Activate ITS IP Address, Either From A Static Assigned Address or from A DHCP Server.

2. The client will query the DNS server for SRV resource records for its domain. The DNS query will be formulated based on existing information. If the client knows which site it is currently in, it will query for a domain controller in its site.

3. The client will then send UDP requests to each domain controller returned by the DNS server. The first domain controller in the client's site that responds will be used by the client for authentication of the user's credentials. If a domain controller in the client's site CANNOT BE FOUND, The Client Will Use A Domain Controller Outside of The Site Until A Domain Controller In The Same Site is Available.

4. The Client Will Use The Netlogon Process To Authenticate Both The User and The Computer Account (if Running Window NT or Windows 2000).

5. The Domain Controller Will Look Up User Object In Active Directory To Determine The Sid of The User and The Sid of All Group Memberips.

6. IF The Domain Is in Native Mode, The Authenticating Domain Controller Will Query A Global Catalog Server To Determine IF The User Is A Member of Any Universal Groups.

Note

The global catalog server is also queried by the authenticating domain controller if the user logon name provided is in the form of a User Principal Name (UPN) to determine which domain and account the UPN is associated with.

7. The user's access token is populated with all group information (including universal groups returned from the global catalog server) and passed to the client.When planning for logon traffic affected by an upgrade, the following points should be considered:

Ensure That Sites and Subnets Have Been IMPLEMENTED TO ENSURE That Domain Controllers Exist At Every Site Where Active Directory-Aware Clients Will Be Deployed.

Ensure That A Domain Controller Is Located At Each Site Where Active Directory-Aware Clients Will Be Deployed To Ensure That Local Authentication Takes Place.

Ensure that a global catalog server is deployed at remote sites. This is especially important if the domain is in Native mode. If the authenticating domain controller can not contact a global catalog server to determine universal group membership, the client can only be logged on using cached Credentials.

Note

If the Active Directory deployment is a single domain, the global catalog server will not be required in Native mode to determine universal group membership since all membership will be stored in the Active Directory domain. The authenticating domain controller will determine that there is only a single Domain in The Environment By Inspecting The Configuration Naming Context.

Windows 2000 Domain Controllers Will Be Able To Authenticate Downlevel Client Authentication Requests.

For clients not using the DS Client software, WINS servers will still be required to allow authentication by domain controllers at remote subnets provided there is not a local domain controller. Alternatively, the LMHOSTS configuration file can be populated with domain controller information. [6] Module 4

Groups & the 5000 User Limit

· Several sources quote that we have tested and will support up to 5000 users in an AD group. · [John Gray (MS LTD)] 5000 users is not an absolute limit. It is just the amount of users that can be guaranteed to work . Remember that any given DC (DSA) must be able to create the group including its entire membership in a single transaction (when the DC initially replicates the data). The DSA in Windows 2000 has been optimised to guarantee that creation of a group with Up to 5000 MEMBERS IS POSSIBLE, But if you create groups with more members Than, IT IS Not Guaranteed To Work, Although It May.

HOW Do We Reconcile That With Very Large Domains, Such as The Multi-Million Object Directory Created by Compaq.

· [John Gray (MS LTD)] Use group name, or take your chance ::: :)

· The Domain Users Group for this Very Large Domain Would Have Much More Than 5000 MEMBERS.

· [John Gray (MS LTD)] Domain Users (Along with Authenicated Users) is an Exception, AS ITS Membership Is Built Dynamical. [4]

Domain roles

· New Password Change and Conflict Resolution FunctionAlity - ID: Q225511

Mixed Mode Domain - Adding BDCS

............... ..

THE SYNTAX IS NETDOM Add BDCNAME / DOMAIN: DOMAINNAME / DC

The reason for this requirement is that when a NT4 BDC attempts to join the domain, it creates a computer acount of class "user". To prevent problems later on if the BDC was to be upgraded to Windows 2000, the core DS prevents the BDC From createing the computer account.

Using Netdom, Correctly Creates The Computer Account As Class Computer.schema Management Snap-in

· You install the schema management snap-in from the Admin pack (adminpak.msi). It registers the snap-in (schmmgmt.dll), copies the saved console (schmmgmt.msc) and creates the Start Menu shortcuts. Alternatively you can Just Manually Register THE SNAP-IN Using The Command Line Regsvr32 Schmmgmt.dll [4]

Rid Master

Cross-Domain Move

A cross-domain Move originates at a master replica of the object to be moved. Move first does a special remote Create of an object with the same GUID as the original. (If the object is a security principal its SID is appended to the SID -History of the object in the new domain.) After that succeeds, Move converts the original object into a local surrogate pointing to the remote object just created. (Surrogates are an implementation technique, internal to dBLayer, for cross-NC object references. )

A cross-domain Move can only originate at a replica that holds the RID Master FSMO role for its domain. Otherwise Move might send an object O from domain D1 to domain D2, while concurrently at another replica of D1 Move sends O to domain D2. This Conflict Would Be Very Difficult To Resolve After the Fact, SO IT Must Be Prohibited Using A FSMO.

Suppose Move sends an object O from domain D1 to domain D2. Concurrently, at another replica of D1, Modify modifies O, or Delete deletes O. After resolution, at all replicas of D1, O is a surrogate pointing to the object in the new Domain, and the object in the new domain has not been affected by the model or delete.

Move does not conflict with itself. Suppose Move sends an object O from domain D1 to domain D2. Then Move sends O from D2 back to D1. The latter Move can only succeed at a replica of D1 that holds O as a surrogate, or not at all. Replication can be designed to ensure that the conversion of O to a surrogate arrives at all replicas before the re-creation of object O. This avoids the possibility of conflict between the old and new generations of O in domain D1. [7 ] INFRASTUCTURE MASTER

So, To Put The Below Threads Into Some Guiding Principles .....

· A domain does not have to have a GC - No, every domain must have a GC, In most cases logon will fail if one is not available, in a multi-domain forest a GC is required during logon to ascertain a users universal group membership, if one is not available then users will be able to access resources that have been denied to them as members of universal groups. A GC is required even if you only have one domain in your forest, any searches done against "Entire Directory" RESULT IN A Query Directed to a GC on Port 3268, DC'S Do Not Listen on this port and won't pick up the query.

· NO, EVERY SITE SHOULD HAVE A GC, But Which Domain It belongs to is not crucial. DNS Will Use Site Knowledge to Point The User to a local gciff omen exists Otherwise it. Otherwise it.

· IF A Domain HAS A GC, Active Management of Infrastructure Master Role Is Irrelevant WHEN Each DC IS A GC. (Correct)

· IF a Domain Has A GC, Active Management of Im Role Is Relevant When You Have Fewer Number of GCS Than DCS. (CORRECT)

IF you have more Than 1 Domain in a Forest, IM Must Be on a DC That ISN't A GC. (Correct, Unless "as in Point 2) Your Domains GC Server Will ALWAYS HAVE UP TO date data on all objects in all domains in the forest through replication, your other DC's will not and so over time they will contain references to objects on other domains that no longer exist, have been renamed etc, the infrastructure master acts as a go between for your GC and your DC's, it contains the same data as your DC's and periodically checks it against the data on the GC, if it finds it is out of date it request's the up to date data and will then replicate it to all other DC's in your Domain. If all your DC's are all GC servers then they will never have out of date on objects in other domains and so the infrastructure master role becomes defunct and it will not matter what DC holds it. · If you only have one GC And Multiple DC's in Your Domain The GC Shouldn't Hold The IM RO Le As It Is Needed to Keep All Data On Your DC's Up To Date, IF The GC Holds The Im role The No Replication To Other DC's Will Occur As The Im role Holder's Data (The GC) Will Always Be Up to Date. [4 ]

· Why Must The Infrastructure Master NOT BE A GLOBAL CATALOG Server?

When an object on one domain controller references an object that is not on that domain controller, it represents that reference as a record containing the GUID, the SID (for references to security principals), and the distinguished name of the object being referenced. If the referenced object moves, its GUID does not change, its SID changes if the move is cross-domain, and its distinguished name always changes.The infrastructure master for a domain periodically examines the references, within its replica of the directory data, to objects not held on that domain controller. It queries a Global Catalog server for current information about the distinguished name and SID of each referenced object. If this information has changed, the infrastructure master makes the change in its local replica and also replicates the new values ​​to Other Domain Controllers within the domain.

If the infrastructure master runs on a Global Catalog server it will never update anything, because it does not contain any references to objects that it does not hold. That is because a Global Catalog server holds a partial replica of every object in the forest. [ 8]

Why Must The Domain Naming Master Also BE A GLOBAL CATALOG SERVER?

When the domain naming master creates an object representing a new domain, it must make sure that no other object - domain object or otherwise -. Has the same name The domain naming master achieves this by running on a Global Catalog server, which contains a partial Replica of every Object in the forest. [8]

Note: The Infrastructure Role Should Be Held By A DC That IS Not a Global

Catalog (GC). IF this role is hosted on a GC Server, Cross-Domain Object

references in that domain are not updated, and a warning to that effect isentered in that DC's event log. It's OK to have the IM on a GC in a single domain infrastructure because there's no cross-domain object reconciliation that the IM has to worry about [4]

·

Migration

· The Sid History Feature CAN NOT BE IS Windows 2000 in Native Mode. Accounts Can Be Migrated to Windows 2000 in Mixed Mode, But The Sid History Option CAN NOT BE ENABLED. [4]

Organizational Units

Ous shop reflect Organisational Hierarchy [1]

The ou Hierarchy Inside ONE DOMAIN IS INDEPENDENT OF THE O Structure of Other Domains. [1]

Domains vs. Organizational Units

When considering WHETER TO SPLIT A Particular Part of Your Network Into Separate Domains Or Separate OUS, Consider The Following [1]:

· Split Into Separate Domains if you have a decentralized Organization, WHERE DIFFERENT USERS AND RESOURES ARE Management by Completely Different Sets of Administrative Personnel.

· Split into separate domains when two parts of your network are separated by a link so slow that you never want complete replication traffic to cross it. (For slow links that can still handle replication traffic on less-frequent schedule, you can configure a single Domain with multiple physical sites.

Split Into Ous to Reflect The Details of Your Company's Structure and Organization.

· Split into OUs to delegate administrative control over smaller groups of users, groups and resources. The administrative control you grant can be complete (creating users and changing passwords) or limited (as minor as merely maintaining print queues).

Split Into Ous if this Particular Organizational Structure In Your Company is Likey to change Later. When Possible, Organize Domains So That The Will Not Have to Be Moved or Split Offen in The Future.dns

· When Designing a New DNS Namespace, The Easiest Approach Is To Place A Host In a Dynamic DNS ZONE Which Corresponds to Each Windows Nt Domain. [1]

NOT EVERY DC Needs to Be a DNS Server, But it is recommended That You Have At Least One DNS Server At Every Site Containing A DC. [1]

DNS query for authoritative DNS servers of a DNS domain is sent via UDP. Therefore, the amount of servers that can be returned is limited to how many of the authoritative DNS server names can fit within a single UDP packet. Also, every decent size site will want it owns DNS server for redundancy purposes.When a DNS UDP response contains more data than will fit in a UDP response. the client is notified that more data exists and then uses a TCP connection to request the data. [5]

The Value in The Registry Which Seem to Hold Down The DNS Domain Name Associated with the Server AT:

HKLM / System / CurrentControlSet / Serv

ICE

S / TCPIP / Parameters / Domain

· How to stop registering server names: how to prevent Domain Controllers from Registering DNS Names [NTRELEASE] ID: Q198767 [4]

· How Can the Windows 2000 DNS BE Secured Against Unauthorized Updates from Non-Microsoft DNS Servers?

Do not make them secondary servers to bind. Root AD in a different namespace and set up root hints or forwarders to bind for name resolution. Make the bind servers authoritative for the PTR record and have the DHCP servers update them or open up the reverse Lookup Zones to DDNS on the bind servers.

· Can Windows 2000 DNS support split subnets, where half the net is administered by a BIND dns server, and the other half administered by a Windows 2000 DNS server? If so, how are reverse lookups handled? How would the two reverse lookup zones be Named? if there is a different name...

· IF WE TURN ON The Windows 2000 DNS "WINS" OPTION, WILL THAT CAUSE PROBLEMS WITH DOWN LEVEL BIND Servers?

As far as i know it won't.

· IF WE DDNS TO MANUALLY UPDATE NON-DDNS BIND Servers with srv records, does Microsoft Offer Any Tools to Support That? Is this at all practical. I. What Are the Risks and maintenance costs?

NO Tools Not Practical Not Recommended. We Have Tried this in a lab and it is a nightmare. [4]

· Can not configure a forwarder within my DNS MMC because all the options are greyed out stating that I am working on a ROOT server. If there is a forward lookup zone file called "." Delete it and the tab will be usable. The "." Zone File Tells The DNS Server IT IS A Root Server.

· CURRENT DNS NAMESPACE IS LIMITED TO 64 Chars. What happened?

In Build 2167, Dcpromo Was Changed To Limit Active Directory Domain Names To Be No Longer Than 64 UTF-8 bytes.

1 ASCII character == 1 UTF-8 byte. Non-ASCII characters are encoded in multiple UTF-8 bytes. This limits Active Directory domain names to <= 64 characters, where the exact number of characters allowed depends on the characters used.

This Limit Does Not Apply to Computer Names. It online ket qalified DNS Name of An Active Directory Domain (i.e. redmond.corp.microsoft.com). Was The Change Necessary?

Win32 file APIs allow file paths (including UNC paths) to be up to 260 characters (MAX_PATH) in length. The DNS protocol allows DNS names to be up to 255 bytes long. As you can see, it is easy to create a UNC path Including a DNS Name That Exceeds The 260 Character Max_Path Limit.

Group Policy Using UNC Paths. A Typical UNC PATH Used by Group Policy Looks Like this:

// / sysvol / / policies / / /

(The second instance of is necessary in order to be able to host more than one domain on a domain controller, in the future.) If the length of a policy UNC path exceeds MAX_PATH, the policy can not be read and is not applied to clients. Given the longest found in the policy extensions that ship in the product, it was determined that the maximum allowed length of is 64 characters. This close to RTM, THE ONLY FIX with Acceptable Risk Was To Limit Fully-Qualified DNS Names of Active Directory Domains to 64 UTF-8 bytes.

Test. Test Variation Into The Product. Test Varith ISSUE AND Similar Issues from Occuring in The Future.

Previously, DCPROMO limited Active Directory domain names to 155 UTF-8 bytes. This was due to the fact that the maximum length of a DNS name is 255 UTF-8 bytes, but the locator attaches varies prefixes (domain GUIDs, site names, etc ) TO THE RECORDS ENTERED IN DNS AND THE LONGEST POSSIBLE PREFIX IS 100 UTF-8 BYTES Long.What's next?

THE Developments IS Exploring Ways to Allow Longer Active Directory Domain Names in Future Versions Of Windows 2000. Questions / Comments Should Be Directed to Skwan. [4]

· Windows 2000 supports secure dynamic updates from clients when the DNS zone is integrated into Active Directory. It does not support RFC 22137 or secured transfer of zone files to / from another DNS server. [4]

· On Port 445 / TCP and 445 / UDP There IS A Serv

ICE

Called "Microsoft-DS."

This Is A New Protocol Used in Windows 2000 Called "Direct-Hosting". From the TCP / IP White Paper:

NetBIOS over TCP / IP

. NetBIOS defines a software interface and a naming convention, not a protocol Early versions of Microsoft networking products provided only the NetBEUI local-area networking protocol with a NetBIOS application-programming interface NetBEUI is a small, fast protocol with no networking layer;. Thus , IT IS Not Routable and is offten not suitable for Wan Implementations. Netbeui Relies On Broadcasts for Name Resolution and Location of Serv

ICE

s. NetBIOS over TCP / IP provides the NetBIOS programming interface over the TCP / IP protocol, extending the reach of NetBIOS client and server programs to the WAN, and providing interoperability with various other operating systems.

The Windows NT Workstation Serv

ICE

, Server Serv

ICE

, Browser, Messenger, And Netlogon Serv

ICE

s are all (direct) NetBT clients. They use TDI (described earlier in this paper) to communicate with NetBT. Windows NT and Windows 2000 also include a NetBIOS emulator. The emulator takes standard NetBIOS requests from NetBIOS applications and translates them to equivalent TDI primitives.Windows 2000 still uses NetBIOS over TCP / IP to communicate with prior versions of Windows NT and other clients, such as Windows 95. However, the Windows 2000 redirector and server components now also support direct hosting to communicate with other computers running Windows 2000 Direct Hosting Uses The DNS for Name Resolution. No Netbios Name Resolution (Wins or Broadcast) IS Used, And The Protocol IS Simpler. Direct Host TCP Uses Port 445, Instead of The NetBIOS TCP Port 139. [4]

· The client will have the same domain name for the Linux Box and the Windows2000 domain. The Linux box will sit in a DMZ and is supposed to only transmit a few entries to the ISP and also resolve for the internet. DDNS for Windows 2000 will Be buy for the workstations serv

ICE

Location. My Question IS: Can We Have Both DNS Boxes Using The Same Domain Name and if We can not resolve an address in the windows2000 ddns database use a forwarder to the linux box

This is possible as long as the Win2k DDNS server is authoritative for the domain name space, and yes you can use forwarders to point to external DNS servers. However, when you first install the DNS for the root, it creates a zone for the " And You Will Forwarding Address on The Win2k DNS Server, Else, The Forwarding Part of The Ui Will Be Greyed Out. [4]

From David Cross' Web Site ON DNS:

FAQ / TIPS

1. How do i set the dns zone mode via the command line? No update

DNSCMD / ResetRegistry / allowupdate 0

Dynamic Update

DNSCMD / ResetRegistry / allowupdate 1

Secure Dynamic Update

DNSCMD / ResetRegistry / allowupdate 2

How To Add A Reverse Lookup Zone:

To add a revrse lookup zone of 11.1.2.x Use DNSCMD and IDENTIFY ZONE TYPE USING The in-addr.Arpa as the zone name.

EG: "DNSCMD / zoneAdd 2.1.11.in-addr.arpa / dsprimary [jrp]

2. I Need to Interoperate with UNIX DNS, What Version Of Bind Should I Use?

The Requirements for the DNS Server To Support Ad Are:

Support SRV Records (As Per Internet-Draft "A DNS RR for Specifying The Location of Serv

ICE

S (DNS SRV) "http://www.ietf.org/internet-drafts/draft-ietf-dnsind-rfc2052bis-02.txt) BIND 4.9.6 and Up

Support Dynamic Updates (RFC 2136) BIND 8.1.2 and Up

NOT

ICE

that the support for dynamic update is not required but VERY, VERY recommended. If admin still prefers to use a DNS server that does not support dynamic updates then he / she will need to update the DNS zones manually by monitoring netlogon.dns file ( ON Each DC) That Contains a list of DNS Resource Records to Be Published in DNS.

BIND 8.1.2 HAS BEEN TESTED to Support Ad. No qublems were detected.

We Didn't try to use Bind 8.2 To Support Ad, But There IS No Reason To Believe That IT Supports Dynamic Updates and SRV Records (AND We Tsted these Two Features).

BIND 4.9.7 HAS a Lot of bug and security fixes. 8.x Series Also Supports Items Such As SRV RR Records.

Bind 4.9.3 Servers Cannot Be Secondary for Zones That Contain Locator RRS (SRV RRS).

3. What Version of Unix Bind Supports undercore "_" Characters in the zone files? Bind 8.1.2 CAN accept underscores by "Check-name ignore" config directive.

4. Why is mutual automation request?

All scenarios need mutual authentication. Customers expect that they connect to the machine they asked for, and it is in general impossible to know what the consequences of them connecting to a server that pretends to be the one they wanted. Suppose an attacker's server could pretend to be your online banking server, for example. It could transfser money to a different account than you wanted. If an attacker's file server can pretend to be the NETLOGON share, it can feed you logon scripts that cause you to do anything.

As a result, the only safen to do is to always get mutual authentication.

5. To what Extent Will Active Directory Integrate with Bind 8.2, Taking Into Consideration That Sests RFC 2052, RFC 2136, And 2137 Compliant?

In The Lab, We Test The Active Directory with Bind 8.1.2 and 8.2, And IT Works Fine. We are Fully Interoperable with RFC 2136.

6. How Will Windows 2000 Integrate with The DNS Sec RFC2137 Standard Implement with RSA in Bind 8.2?

BIND 8.2 does not support RFC 2137 (secure dynamic update via DNSSEC) BIND 8.2 has only limited support for RFC 2065/2535 (DNSSEC) -. It will dole out signed records that are generated out of band, but it does no cryptography itself. That said, we are testing our client and server to make sure it fails gracefully when presented with DNSSEC-ized responses. The MS DNS client and server do not support DNSSEC in Win2K. We are evaluating DNSSEC for a future release.

7. Is there a bind DNS Server if The Request Can't Be Handled by My Ad DNS? YES .

Go to DNS manager, open the Properties of your DNS server (the one you call AD DNS), go to the Forwarders page and check the checkbox to enable forwarding and specify the IP address of the BIND server. At the same time you should realize that all unresolved by your (AD) DNS server queries (even those that BIND is not authoritative for) will be forwarded to the BIND server. BIND will recursively resolve the queries and return the response to your (AD) DNS server. Not

ICE

That It May Significantly Increase The Load on The Bind Server.

8. Regarding The DNS Client Resolver Cache, Is there a maximum cache size (in which case what is the size of an entry) or is the it a maximum number of entries That Can Be Cached?

The cached entries are stored in the hash table. The size of the table is limited by 211 rows by default. To change the default value you need to change the CacheHashTableSize value in the HKLM / System / CurrentControlSet / Serv

ICE

s / dnscache / parameters registry key. Every row in the hash table may contain by default up to 10 entries (meaning up to 10 names). To change the default change the CacheHashTableBucketSize in the same reg key. Thus by default cache may contain entries For up to 2110 DIFFERENT NAMES.

9. Is The Primary DNS Server The Only Server That CAN Actively Register Clients?

The Primary DNS Server Is Where Changes Are Made Uns Wou Use Ad Integration.

10. A machine can override another machines DNS entry, at least in Bind. If there is an entry for a machine in DNS and another machine comes up with the same name the DNS entry is overwritten. Is this the same in MS DNS? And If SO is there? to prevent it, you need them to configure zone to accept Only To Configure Zone to Accept Only To Configure Zone to Accept Only THE INAMIC UPDATES (You Can Do It THROUGH The General Page Up). Not

ICE

that this feature is available only for the DS-integrated zones. According to default behavior (you may modify the ACLs controlling access if necessary) any authenticated client can create a new name in the zone. But if the name already exists in the zone, then a client must have necessary credentials, written in the ACL, in order to update / modify / delete / add a resource records to that name. By default, the client that created a name has a full control of it.

Enterprise

Domain and DNS ADMINS Also Have A Full Control over all zones and names.

11. SHOULD A COMPANY MAINTAIN A SEPARATE INTERNAL NAMESPACE FORM EXTERNAL DNS NAMESPACE?

From Jerry Condon:

The decision of whether to maintain separate internal and external DNS namespace is based on conventional logic, but the implications are expanded under a Windows 2000 environment. The namespace used for an internal directory affects the end-users since it is part of their login name. for example: Using separate namespace, Joe User must be educated on the distinction between his login name, juser@smarket.org, and his internet e-mail address, juser@streetmarket.com Using a single namespace, Joe User simply needs to. Learn and use a single address space: juser@streetmarket.com.

Separate Namespace Publish Internet Dev

ICE

S on a completion Different Domain Name from Internal Device

S. in this configuration, Only Those Internal Serv

ICE

S That Are Specifically Required Are Published To The Internet. The Setup for this Type of Arrangement IS Easy Since Management and The Dev

ICE

S Themselves are maintained separately.

A Single Published Namespace Serv

ICE

S Both Internet and INTERNAL Requests. There Are A Few Popular Methods of Configuring this Setup So That Internal dev

ICE

Names Are Not Compromised:

1. Since both Internet and intranet domain names should be registered with Internic, the SOA entries for both zones must be accessible to the Internet As such, the first step will be to create two primary zones on the Internet DNS server:. One for the Internet Domain System and the Other for the intranet.

2. Security Issues Dictate That Internal Serv

ICE

s not be published to the Internet. To meet this requirement, the intranet DNS system also must host the intranet DNS zone as a primary. At this point, the two DNS systems have no knowledge of each other and will respond to requests for the intranet Domain name.

3. Two additional points of configuration are necessary to ensure that the intranet zone receives all appropriate requests and is also protected from exposure to the Internet. On the Internet DNS system, delegate control of the intranet zone to the internal DNS server by establishing an NS Type Record Pointing to the Internal Server.

4. Further, establish the Internet DNS server as the forwarder for the intranet DNS system. The intranet DNS server will not attempt to resolve external queries directly to the Internet, but will instead pass requests through the Internet DNS servers.

The importation of a single DNS Domain Would Service

Both Internal and Internet Communications. In this case, A Single Zone Will SPAN Both Internet and intranet DNS Systems Resulting In a Single Namespace for the Organization.

The Requirement To Secure Internal Records Still Exists HoWever, SO A Method of Separating The Resources Must Be Used.

1) In this case, the primary zone for the domain name will be create on Both Internet and Intranet DNS Servers. In this State Neither DNS Server IS Aware of The Other, Which Meets The Desired Criteria.

2) Records in this case will be managed as if the zones existed for two separate domains. Internet records are published on the Internet system, and internal records are published on the intranet system. Never the twain shall meet.

3) Again, The intranet DNS System SHOULD UTILIZE The Internet System As a Forwarding Agent To Avoid Exposure To The Internet.

.................... ..

Administration and management are a little more difficult in this scenario because while the systems are technically distinct, specification must be made as to what resources exist on which primary zone. This may lead to security issues resulting from internal resources being inadvertently posted to the Internet DNS SYSTEM.

As Su, IT Comes Down to a Few Bullet Points ...

Advantages

· A consistent namespace exists across an entire organization.

· Users do not have to consider Multiple Namespace Addresses.

Disadvantages

· DNS IS A More Difficult Configuration Due To The Issues and Considerations In Implementing and Managing The Namespace. · Security Risks Are Greater As The Same Namespace Exists Both INTERNALLY AND EXTERNALLY.

12. What is the default behavior for a Windows 2000 Client WHEN WINS Address Is Also Provided?

The Default Behavior for Wins Clients Running On Windows 2000 Is To:

Attempt Name Resolution Through DNS for All Names Longer Than 15 Characters or for Names That Make Use of Periods ('DOTS').

Attempt Name Resolution Through Wins for Names That Are Shorter Than 15 Characters and Do Not Use Periods.

Attempt DNS Name Resolution After a Wins Query Fails if The Client Is Configured To Use A DNS Server.

Performance:

From Levon Esibov:

The DNS development and testing team compiled some statistics as a profile of DNS server performance during preliminary testing of Windows 2000 Server. In testing, two different DNS server hardware configurations were used and overall DNS query and dynamic update activity was measured, along with processor utilization .

The Results of Each of these Tests is listed in the table below.

Server Configuration

Queries / Sec

Dynamic Updates / Sec

Processor Utilization

Alpha 533 MHz Dual-Processor

1600

200

25%

Intel P-II 400 MHz Dual-Processor

900

100

30%

During The Collection of these Measurements, The Monitored DNS Server Was Processing Both Queries and Dynamic Updates At The Same Time. The number.............

For dynamic updates, standard primary type zones were used, not Active Directory-integrated zones. Where directory integration is used for zones, the rate of the dynamic updates that can be processed decreases, since the DNS server must write to and rely upon the Active Directory database as well.In addition, if a zone is configured to accept only secure dynamic updates, the update rate can decrease as well. Network performance might also be a factor in these cases since the directory database might require network activity to process updates.

Important

The previous measurements are not meant in any way to indicate maximum performance or server limitations for Windows 2000 DNS servers. The objective of the tests was merely to sample typical DNS server performance and obtain a working benchmark based on standard available hardware as a basis to begin Server Capacity Planning.

below I provide the data under the assumption that the specified entity is configured to perform dynamic DNS registration Obviously that if it is not configured so -.. then no DNS registration will take place Below are specified default values ​​Admin may adjust these values ​​(all. , Except the DHCP Server)

every W2K professional reregisters the A and PTR records every 24 hours (prereq only dynamic update if record was not changed) every W2K server / advanced server / DTC reregisters the A and PTR records every hour (prereq only dynamic update if record was not changed) every DC reregisters 14 DC locator specific records every hourevery GC reregisters 19 DC locator specific records every hourW2K DHCP server performing registration of the DNS records registers record at every lease renewal.

[4]

· Disable reverse lookup but keep dynamic registration of DDNS: · Construct all DNS to have the same "Reverse Lookup Zone" (because network devides into some segments and want all DNS to have whole network "Reverse Lookup Zone".)

And, Want To Use DDNS'S Dynamic Update. So, I Want To Use Dynamic-Update, Not to Register "Reverse Lookup Zone" with Dynamic-Update, Dynamic-Update Only Works for "Forward Lookup Zone".

You can disable the ptr seriousness with the folloading reg value:

HKLM / SYSTEM / CCS / Serv

ICE

S / TCPIP / DISABLEREVERSEADDRESSREGISTRATIONS REG_DWORD 0x1.

Note That PTR Dynamic Registrations Will Still Be Done if you have a dhcp server configured to do this on behalf of the clients.

· IF A DNS SRV HAVE 2 Forwarders, Can I Specify A DELAY BETWEEN Query to The First and Second One. EG: Query First Forwarder, WAITI 10 S, Query Second Forwarder?

Is there a sol of Top Level DNS (if i delete servers a- .. on tab, the com back

If you don't want the dns server for sub.mydomain.com To Forward a Query to the dns server for mydom.com

You can disable recuty in the advanced tab of sub.mydom.com's DNS Server.

You Could Also Make Both DNS Servers Root Servers by Creating A Root (.) Forward Lookup Zone ON Your Second DNS Server,

Root hints and forwarders are the disabled.

· Arch.

1 Parent Domain (1 DC HQ) Mydom.com

1 CHILD DOMAIN (1 DC HQ 1 Server Per Physical Site) Sub.mydom.com

Every Servers Is DNS SVR for DNS Zone Corresponding To Domain (Ad Integrated).

Every Physical Sites Corresponding to an ad site

Sometimes Branch-Off

ICE

SRV Make DNS Query for _ldap.tcp.sitename._sites.dc._msdcs.servername and never have response. do you know xhat is this name, why this query ....? ldap.tcp. ._ sites .. DC._MSDCS. Records allow clients to find the dc of , queries for a domain controller of Your Domain

Will Be Answered with this record E.G .. During a client logon. All of your DC's Must Register this record,

You'll Find It in the gui by browsing through-your domains lookup zone

- The_MSDCS Folder

- The DC Folder

- the _sites folder

- The _TCP Folder

· Same Questions About Record for All DCS (Of All Domains) in _msdcs.mydom.com. EG: A09D20DA-0589-4713-9ffe-41edf4361ddf._msdcs.mydom.com -> mysrv.sub.mydom.com

Records Such AS A09D20DA-0589-4713-9ffe-41edf4361ddf._msdcs_mydom.com Are Used to Answer Normal A Address Record Lookups Which a Client May USE IT KNOWS THE

Guid of the msft-dsa object for the dc and the name of the forest the dc is in. This record is buy to ease the Ability to rename A DC (DNS Whitepaper) [4]

转载请注明原文地址:https://www.9cbs.com/read-15508.html

New Post(0)