1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Windows Server 2008 Inside Out- P17 pptx

50 338 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Implementing and Managing DNS
Trường học University of Information Technology
Chuyên ngành Information Technology
Thể loại sách
Năm xuất bản 2008
Thành phố ho chi minh
Định dạng
Số trang 50
Dung lượng 1,52 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

ser-In an Active Directory domain, secondary and stub zones can also be useful, as cussed in “DNS Zones and Zone Transfers” on page 749.. You can create secondary zones for the forward l

Trang 1

Name services are essential for communications for Transmission Control Protocol/ Internet Protocol (TCP/IP) networking Windows Server 2008 uses the Domain Name System (DNS) as its primary method of name resolution DNS enables computers

to register and resolve DNS domain names DNS defi nes the rules under which com-puters are named and how names are resolved to IP addresses Windows Server 2008 also supports Windows Internet Naming Service (WINS), which is covered in detail in Chapter 25, “Implementing and Maintaining WINS.” WINS provides a similar service for NetBIOS names as DNS provides for DNS domain names WINS maps NetBIOS names to IP addresses for hosts running NetBIOS over TCP/IP

Installing the DNS Server Service

The way you install the DNS Server service depends on whether you plan to use DNS with the Active Directory or without Active Directory After you make that decision, you can install DNS as necessary

Using DNS with Active Directory

On a domain with Active Directory, DNS is required to install the fi rst domain control-ler in a domain Active Directory doesn’t necessarily require Windows DNS, however Active Directory is designed to work with any DNS server that supports dynamic updates and Service Location (SRV) records This means Active Directory can work with any DNS server running Berkeley Internet Name Domain (BIND) version 8.1.2 or later If you have DNS servers that use BIND version 8.1.2 or later, you can use those servers If you don’t already have BIND servers, you probably won’t want to set these up because there are many benefi ts to using the Microsoft DNS Server service

When you install the DNS Server service as part of the Active Directory installation process, you can use Active Directory–integrated zones and take advantage of the many replication and security benefi ts of Active Directory Here, any server confi gured as a domain controller with DNS and using Active Directory–integrated zones is an Active Directory primary name server

Installing the DNS Server Service 767

Configuring DNS Using the Wizard 773

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 783

Adding Resource Records 794

Deploying Global Names 803

Maintaining and Monitoring DNS 804

Troubleshooting the DNS Client Service 809

Troubleshooting the DNS Server Service 812 CHAPTER 24

Implementing and Managing DNS

Trang 2

Here’s how installation of DNS on the fi rst domain controller in a domain works:

1 You use the Domain Controller Promotion tool (Dcpromo.exe) to install the fi rst

domain controller During the installation process, you are prompted to specify the Active Directory domain name, as shown in the following screen This sets the DNS name for the domain as well

Note

For more information about promoting domain controllers, see “Installing Active tory Domain Services” on page 1112

2 When the Active Directory installation process begins, the Active Directory

Domain Services Installation Wizard will check the current DNS confi guration

If no authoritative DNS servers are available for the domain, the wizard selects DNS Server as an additional installation option, as shown in the following screen:

Trang 3

3 In most cases, you’ll want to install DNS If you install DNS, the Active Directory

Domain Services Installation Wizard will install and then confi gure DNS As the next screen shows, this means a forward lookup zone will be created for the domain The forward lookup zone will have the Start of Authority (SOA), Name Server (NS), and host Address (A) records for the server you are working with

This designates it as the authoritative name server for the domain If desired, you can also create reverse lookup zones to allow for IP address to host name lookups DNS servers support IPv4 and IPv6 for reverse lookups

4 For the fi rst DNS server in a forest, the Active Directory Domain Services

Installation Wizard creates the forest-side locator records and stores them in the _msdcs subdomain Windows Server 2008 creates this as a separate zone, which

is referred to as the forest root zone

Installing the DNS Server Service 769

Trang 4

The forest root zone is an important part of Active Directory It is in this zone that Active Directory creates SRV resource records used when clients are looking for a par- ticular resource such as global catalog servers, Lightweight Directory Access Protocol (LDAP) servers, and Kerberos servers The _msdcs subdomain is created as its own zone

to improve performance with remote sites With Windows 2000, remote sites have to replicate the entire DNS database to access forest root records, which means increased replication and bandwidth usage As a separate zone, only the zone will be replicated

to the DNS servers in remote sites as long as Active Directory application partitions are used In Windows Server 2008, you can enable application partitions for use with DNS as discussed in “Confi guring Default Application Directory Partitions and Replication Scope”

on page 804

On subsequent domain controllers, you must specifi cally install the DNS Server vice You do this using the Add Roles Wizard as detailed in “DNS Setup” on the next page

ser-In an Active Directory domain, secondary and stub zones can also be useful, as cussed in “DNS Zones and Zone Transfers” on page 749 In fact, in certain situations you might have to use a secondary or stub zone for name resolution to work prop-erly Consider the case when you have multiple trees in a forest, each in their own namespace For instance, City Power & Light and The Phone Company are both part

dis-of one company and use the domains cpandl.com and thephone-company.com, tively If the namespaces for these domains are set up as separate trees of the same forest, your organization would have two namespaces In the cpandl.com domain, you might want users to be able to access resources in thephone-company.com domain and vice versa To do this, you would confi gure DNS as shown in Figure 24-1

respec-Active Directory replication

Active Directory

sales.cpandl.com

Active Directory

tech.cpandl.com

Active Directory replication

Active Directory

DNS

Secondary zone DNS

thephone-company.com

Secondary zone

DNS Active Directory

DNS

cpandl.com

Zone transfer

Zone transfer

Figure 24-1 Using secondary zones with Active Directory

The forest root zone is an important part of Active Directory It is in this zone that Active Directory creates SRV resource records used when clients are looking for a par- ticular resource such as global catalog servers, Lightweight Directory Access Protocol (LDAP) servers, and Kerberos servers The _msdcs subdomain is created as its own zone

to improve performance with remote sites With Windows 2000, remote sites have to replicate the entire DNS database to access forest root records, which means increased replication and bandwidth usage As a separate zone, only the zone will be replicated

to the DNS servers in remote sites as long as Active Directory application partitions are used In Windows Server 2008, you can enable application partitions for use with DNS as discussed in “Confi guring Default Application Directory Partitions and Replication Scope”

Trang 5

The implementation steps for this example are as follows:

1 Set up a secondary or stub zone for thephone-company.com on the authoritative

name server for cpandl.com

2 Set up a secondary or stub zone for cpandl.com on the authoritative name server

for thephone-company.com

3 Confi gure zone transfers between cpandl.com and thephone-company.com

4 Confi gure zone transfers between thephone-company.com and cpandl.com

Using DNS Without Active Directory

On a domain without Active Directory, DNS servers act as standard primary or dard secondary name servers You must install the DNS Server service on each primary

stan-or secondary server You do this using the Add Roles Wizard as detailed in the next section

On primary name servers, you confi gure primary zones for forward lookups and as essary for reverse lookups The forward lookup zone will have SOA, NS, and A records for the server you are working with This designates it as the authoritative name server for the domain You can also create reverse lookup zones to allow for IP address to host name lookups

On secondary name servers, you confi gure secondary zones to store copies of the records on the primary name server You can create secondary zones for the forward lookup zones as well as the reverse lookup zones confi gured on the primary

Stub zones and forwarders are also options for these DNS servers

DNS Setup

You can install the DNS Server service by completing the following steps:

1 In Server Manager, select the Roles node in the left pane and then click Add Roles

This starts the Add Roles Wizard If the wizard displays the Before You Begin page, read the welcome message and then click Next

2 On the Select Server Roles page, select DNS Server and then click Next twice

3 Click Install The wizard installs DNS Server From now on, the DNS Server

service should start automatically each time you reboot the server If it doesn’t start, you’ll need to start it manually

After you install the DNS Server service, the DNS console is available on the trative Tools menu Start the console by clicking Start, Administrative Tools, DNS Then select the DNS server you are working with to see its status as shown in Figure 24-2

Adminis-This is telling you to create a scope so that the clients can get IP addresses dynamically assigned by this server

Installing the DNS Server Service 771

Trang 6

Figure 24-2 The DNS console

You don’t have to complete the rest of the confi guration at the server You can remotely manage and confi gure DNS Simply start the DNS console on your computer, right-click the DNS node in the left pane, and select Connect To DNS Server In the Connect To DNS Server dialog box, select The Following Computer, type the name or IP address of the DNS server, and then click OK In the DNS console, host addresses are displayed as IPv4 or IPv6 addresses as appropriate

The line counterpart to the DNS console is Dnscmd The Dnscmd line tool accepts addresses in IPv4 and IPv6 format From the command prompt on a computer running Windows Server 2008, you can use Dnscmd to perform most of the tasks available in the DNS console as well as to perform many troubleshooting tasks that are specifi c to Dnscmd Unlike Netsh, Dnscmd doesn’t offer internal command prompts You can specify only the server you want to work with followed by the com-mand and the command-line options to use for that command Thus, the syntax is as follows:

command-dnscmd ServerName Command CommandOptions

where

ServerName is the name or IP address of the DNS server you want to work with,

such as CORPSVR03 or 192.168.10.15

Command is the command to use

CommandOptions are the options for the command

Trang 7

After you set up a DNS server, the setup process should confi gure the server’s TCP/IP settings so that the server attempts to resolve its own DNS queries Setup does this by setting the server’s primary DNS server address to its own address for both IPv4 and

IPv6 You can confi rm this by entering ipconfi g /all at a command prompt In the

out-put of the command, you should see that the DNS servers are set as:

::1 127.0.0.1 ::1 is the local loopback address for IPv6 and 127.0.0.1 is the local loopback address for IPv4 If necessary, you can modify the DNS server entries as discussed in Chapter 21,

“Managing TCP/IP Networking.” For Preferred DNS Server, type the computer’s own IP address Set an alternate DNS server as necessary

You can also set the preferred DNS server IP address from the command line Type the following command:

netsh interface ip set dns ConnectionName static ServerIPAddress where ConnectionName is the name of the local area connection and ServerIPAddress is

the IP address of the server

Consider the following example:

netsh interface ip set dns "Local Area Connection" static 192.168.1.100 Here, you set the preferred DNS server address for the network connection named Local Area Connection to 192.168.1.100 The Static option says that you want to use the local setting for DNS rather than the Dynamic Host Confi guration Protocol (DHCP) setting when applicable

You can confi rm the new setting by typing ipconfi g /all at the command prompt and

checking for the DNS server entry The server should have the same setting for the IP address and primary DNS server

Confi guring DNS Using the Wizard

From the DNS console, you can start the Confi gure A DNS Server Wizard and use it

to help you set up a DNS server This wizard is useful for helping you confi gure small networks that work with Internet service providers (ISPs) and large networks that use forwarding

Configuring DNS Using the Wizard 773

Trang 8

For small networks, the Confi gure A DNS Server Wizard creates only a forward lookup zone For large networks, the Confi gure A DNS Server Wizard creates a forward lookup zone and a reverse lookup zone This might get you to thinking whether reverse lookup zones are needed on your network Computers use reverse lookups to fi nd out who is contacting them Often this is so that they can display a host name to users rather than

an IP address So, although a reverse lookup zone isn’t created by the Confi gure A DNS Server Wizard for small networks, you might still want to create one If so, follow the pro- cedure discussed in “Creating Reverse Lookup Zones” on page 785

Confi guring a Small Network Using the Confi gure A DNS Server Wizard

For a small network, you can use the wizard to set up your forward lookup zone and query forwarding to your ISP or other DNS servers You can also choose to confi gure this zone as a primary or secondary zone You use the primary zone option if your orga-nization maintains its own zone You use the secondary zone if your ISP maintains your zone This gives you a read-only copy of the zone that can be used by internal clients Because small networks don’t normally need reverse lookup zones, these are not cre-ated You can, of course, create these zones later if needed

To confi gure a small network using the Confi gure A DNS Server Wizard, follow these steps:

1 Right-click the server entry in the DNS console, select Confi gure A Server, and

then when the wizard starts, click Next

Note

If the server you want to work with isn’t shown, right-click the DNS node in the left pane, and select Connect To DNS Server In the Connect To DNS Server dialog box, select The Following Computer, type the name or IP address of the DNS server, and then click OK

2 Choose Create A Forward Lookup Zone (Recommended For Small Networks), as

shown in Figure 24-3, and then click Next

For small networks, the Confi gure A DNS Server Wizard creates only a forward lookup zone For large networks, the Confi gure A DNS Server Wizard creates a forward lookup zone and a reverse lookup zone This might get you to thinking whether reverse lookup zones are needed on your network Computers use reverse lookups to fi nd out who is contacting them Often this is so that they can display a host name to users rather than

an IP address So, although a reverse lookup zone isn’t created by the Confi gure A DNS Server Wizard for small networks, you might still want to create one If so, follow the pro- cedure discussed in “Creating Reverse Lookup Zones” on page 785.

Note

If the server you want to work with isn’t shown, right-click the DNS node in the left pane, and select Connect To DNS Server In the Connect To DNS Server dialog box, select The Following Computer, type the name or IP address of the DNS server, and then click OK.

Trang 9

If Active Directory is installed on the network, this zone will be automatically integrated with Active Directory To avoid this, you can choose the second option, Create Forward And Reverse Lookup Zones (Recommended For Large Networks), and then proceed as discussed in “Confi guring a Large Network Using the Confi gure A DNS Server Wizard” on page 778 When the wizard gets to the reverse lookup zone confi guration part, you can skip this if you don’t want to create a reverse lookup zone

Figure 24-3 Select the first option to configure DNS for a small network

3 As shown in Figure 24-4, you can now choose whether the DNS server or your ISP

maintains the zone and then click Next Keep the following in mind:

If the DNS server maintains the zone, the wizard confi gures a primary zone that you control This allows you to create and manage the DNS records for the organization

If your ISP maintains the zone, the wizard confi gures a secondary zone that will get its information from your ISP This means the staff at the ISP will need to create and manage the DNS records for the organization—and you will need to pay them to do so

Note

If Active Directory is installed on the network, this zone will be automatically integrated with Active Directory To avoid this, you can choose the second option, Create Forward And Reverse Lookup Zones (Recommended For Large Networks), and then proceed as discussed in “Confi guring a Large Network Using the Confi gure A DNS Server Wizard” on page 778 When the wizard gets to the reverse lookup zone confi guration part, you can skip this if you don’t want to create a reverse lookup zone.

Configuring DNS Using the Wizard 775

Trang 10

Figure 24-4 Specify whether the zone will be maintained on the server or by your ISP

4 On the Zone Name page, type the full DNS name for the zone The zone name

should help determine how the zone fi ts into the DNS domain hierarchy For example, if you’re creating the primary server for the cpandl.com domain, you

should type cpandl.com as the zone name Click Next

5 If your ISP maintains the zone, you see the Master DNS Servers page, as shown

in Figure 24-5 Type the IP address of the primary DNS server that’s maintaining the zone for you, and then press Enter Repeat this step to specify additional name servers at your ISP The wizard will automatically validate the IP address

or addresses you’ve entered Zone transfers will be confi gured to copy the zone information from these DNS servers

6 If you choose to maintain the zone, you see the Dynamic Update page, as shown

in Figure 24-6 Choose how you want to confi gure dynamic updates, and then click Next You can use one of these options:

controllers and when Active Directory is deployed It provides for the best security possible by restricting which clients can perform dynamic updates

client to update resource records in DNS Although it allows both secure and nonsecure updates, it doesn’t validate updates, which means dynamic updates are accepted from any client

DNS You should use this option only when the zone isn’t integrated with Active Directory

Trang 11

Figure 24-5 Specify the primary name server and other name servers at the ISP

Figure 24-6 Set the dynamic updates options

7 The Forwarders page allows you to confi gure forwarding of DNS queries If you

want internal DNS servers to forward queries that they can’t resolve to another server, type the IP address for that server You can optionally include the IP address for a second forwarder as well If you don’t want to use forwarders, select

No, It Should Not Forward Queries

Configuring DNS Using the Wizard 777

Trang 12

Selecting the No, It Should Not Forward Queries option won’t prevent internal name servers from forwarding queries altogether A root hints fi le will still be created, which lists the root name servers on the public Internet Thus, if you don’t designate forward- ers, such as the primary and secondary name servers of your ISP, the internal name servers will still forward queries To prevent this, you must modify the root hints fi le as discussed in “Security Considerations” on page 757

8 When you click Next, the wizard will search for and retrieve the current root

hints Click Finish to complete the confi guration and exit the wizard If there is

a problem confi guring the root hints, you will need to confi gure the root hints manually or copy them from another server

Confi guring a Large Network Using the Confi gure A DNS Server Wizard

For a large network, you can use the wizard to set up your forward and reverse lookup zones and to set up forwarding with or without recursion With recursion, queries for external resources are fi rst forwarded to your designated servers, but if those servers are unavailable, the DNS server forwards queries to the root name servers Without recursion, queries for external resources are only forwarded to your designated servers The DNS Server service can send queries to IPv4, IPv4 and IPv6, and IPv6-only servers

To confi gure a large network using the Confi gure A DNS Server Wizard, follow these steps:

1 Right-click the server entry in the DNS console, and select Confi gure A Server

When the wizard starts, click Next

Note

If the server you want to work with isn’t shown, right-click the DNS node in the left pane, and select Connect To DNS Server In the Connect To DNS Server dialog box, select The Following Computer, type the name or IP address of the DNS server, and then click OK

Note

Selecting the No, It Should Not Forward Queries option won’t prevent internal name servers from forwarding queries altogether A root hints fi le will still be created, which lists the root name servers on the public Internet Thus, if you don’t designate forward- ers, such as the primary and secondary name servers of your ISP, the internal name servers will still forward queries To prevent this, you must modify the root hints fi le as discussed in “Security Considerations” on page 757.

Note

If the server you want to work with isn’t shown, right-click the DNS node in the left pane, and select Connect To DNS Server In the Connect To DNS Server dialog box, select The Following Computer, type the name or IP address of the DNS server, and then click OK.

Trang 13

2 Choose Create Forward And Reverse Lookup Zones (Recommended For Large

Networks), as shown in Figure 24-7, and then click Next

Figure 24-7 Select the second option to configure DNS for a large network

3 To create a forward lookup zone, accept the default option on the Forward

Lookup Zone page, and then click Next Otherwise, click No, and skip to step 10

4 As Figure 24-8 shows, you can now select the zone type Choose one of the

following options, and then click Next:

server to be authoritative for the zone Ensure that the Store The Zone In Active Directory check box is selected if you want to integrate DNS with Active Directory Otherwise, clear this check box so that a standard primary zone is created

server will have a read-only copy of the zone and must use zone transfers to get updates

nec-essary glue records for the zone Optionally, specify that this zone should

be integrated with Active Directory This means the zone will be stored in Active Directory and be updated using Active Directory replication

Configuring DNS Using the Wizard 779

Trang 14

Figure 24-8 Select the zone type

5 If you created an Active Directory–integrated zone, specify the replication scope,

and then click Next As Figure 24-9 shows, you have the following options:

informa-tion to all domains in the Active Directory forest Each DNS server in the forest will receive a copy of the zone information and get updates through replication

informa-tion in the current domain Each DNS server in the domain will receive a copy of the zone information and get updates through replication

all domain controllers in the Active Directory domain As with a Windows

2000 domain, all domain controllers will get a copy of the zone information and get updates through replication regardless of whether they are also run-ning the DNS Server service

you’ve confi gured application partitions other than the default partitions, you can limit the scope of replication to a designated application partition Any domain controllers confi gured with the application partition will get a copy of the zone information and get updates through replication regardless

of whether they are also running the DNS Server service

6 On the Zone Name page, type the full DNS name for the zone The zone name

should help determine how the zone fi ts into the DNS domain hierarchy For example, if you’re creating the primary server for the cpandl.com domain, you

should type cpandl.com as the zone name Click Next

Trang 15

Figure 24-9 Select the replication scope if you are using Active Directory integration

7 If you’re creating a standard primary zone, you see the Zone File page This page

allows you to create a new zone fi le or use an existing zone fi le In most cases, you’ll simply accept the default name and allow the wizard to create the fi le for you in the %SystemRoot%\System32\Dns folder If you are migrating from a BIND DNS server or have a preexisting zone fi le, you can select Use This Existing File, and then type the name of the fi le that you’ve copied to the %SystemRoot%\

System32\Dns folder Click Next when you are ready to continue

8 If you’re creating a secondary zone, you see the Master DNS Servers page Type

the IP address of the primary DNS server that’s maintaining the zone, and then click Add Repeat this step to specify additional name servers Zone transfers will

be confi gured to copy the zone information from these DNS servers

9 On the Dynamic Update page, choose how you want to confi gure dynamic

updates and then click Next You can use one of the following options:

controllers and when Active Directory is deployed It provides for the best security possible by restricting which clients can perform dynamic updates

client to update resource records in DNS Although it allows both secure and nonsecure updates, it doesn’t validate updates, which means dynamic updates are accepted from any client

DNS You should use this option only when the zone isn’t integrated with Active Directory

10 To create a reverse lookup zone, accept the default option on the Reverse Lookup

Zone page, and then click Next Otherwise, click No, and skip to step 16

Configuring DNS Using the Wizard 781

Trang 16

11 On the Zone Type page, you can select the zone type The options available are

the same as when creating a forward lookup zone Click Next after making a selection

12 If you created an Active Directory–integrated zone, specify the replication scope,

and then click Next

13 Specify whether you are creating an IPv4 reverse lookup zone or an IPv6 reverse

lookup zone and then click Next Do one of the following:

If you are confi guring a reverse lookup zone for IPv4, type the network ID for the reverse lookup zone as shown in Figure 24-10 and then click Next The values you enter set the default name for the reverse lookup zone If you have multiple subnets on the same network, such as 192.168.1, 192.168.2, and 192.168.3, you should enter only the network portion for the zone name, such as 192.168 rather than the complete network ID The DNS Server service will then fi ll in the necessary subnet zones as you use IP addresses on a particular subnet

If you are confi guring a reverse lookup zone for IPv6, type the network

pre-fi x for the reverse lookup zone and then click Next The values you enter are used to automatically generate the related zone names Depending on the prefi x you enter, up to eight zones may be created

Figure 24-10 Set the network ID for the reverse lookup zone

14 If you’re creating a standard secondary zone, you see the Zone File page This

page allows you to create a new zone fi le or use an existing zone fi le

15 On the Dynamic Update page, choose how you want to confi gure dynamic

updates, and then click Next

16 The Forwarders page allows you to confi gure forwarding of DNS queries If you

want internal DNS servers to forward queries that they can’t resolve to another

Trang 17

server, type the IP address of that server You can optionally include the IP address for a second forwarder as well If you don’t want to use forwarders, select

No, It Should Not Forward Queries

Note

Selecting the No, It Should Not Forward Queries option won’t prevent internal name servers from forwarding queries altogether A root hints fi le will still be created, which lists the root name servers on the public Internet Thus, if you don’t designate forward- ers, such as the primary and secondary name servers of your ISP, the internal name servers will still forward queries To prevent this, you must modify the root hints fi le as discussed in “Security Considerations” on page 757

17 When you click Next, the wizard will search for and retrieve the current root

hints Click Finish to complete the confi guration and exit the wizard If there is

a problem confi guring the root hints, you will need to confi gure the root hints manually or copy them from another server

Confi guring DNS Zones, Subdomains, Forwarders, and Zone Transfers

Windows Server 2008 supports primary, secondary, Active Directory–integrated, and stub zones, each of which can be created to support either forward lookups or reverse lookups Forward lookup queries allow a client to resolve a host name to an IP address

Reverse lookups allow a client to resolve an IP address to a host name At times you might also need to confi gure subdomains, forwarders, and zone transfers All of these topics are discussed in this section

Creating Forward Lookup Zones

To create the initial forward lookup zone or additional forward lookup zones on a server, follow these steps:

1 In the DNS console, expand the node for the server you want to work with

Right-click the Forward Lookup Zones entry, and then choose New Zone Afterward, in the New Zone Wizard, click Next

2 Select the zone type Choose one of the following options, and then click Next:

Primary Zone—Use this option to create a primary zone and designate this

server to be authoritative for the zone Ensure that the Store The Zone In Active Directory check box is selected if you want to integrate DNS with Active Directory Otherwise, clear this check box so that a standard primary zone is created

Note

Selecting the No, It Should Not Forward Queries option won’t prevent internal name servers from forwarding queries altogether A root hints fi le will still be created, which lists the root name servers on the public Internet Thus, if you don’t designate forward- ers, such as the primary and secondary name servers of your ISP, the internal name servers will still forward queries To prevent this, you must modify the root hints fi le as discussed in “Security Considerations” on page 757.

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 783

Trang 18

Secondary Zone—Use this option to create a secondary zone This means

the server will have a read-only copy of the zone and will need to use zone transfers to get updates

nec-essary glue records for the zone Optionally, specify that this zone should

be integrated with Active Directory This means the zone will be stored in Active Directory and be updated using Active Directory replication

3 If you created an Active Directory–integrated zone, specify the replication scope,

and then click Next You have the following options:

informa-tion to all domains in the Active Directory forest Each DNS server in the forest will receive a copy of the zone information and get updates through replication

informa-tion in the current domain Each DNS server in the domain will receive a copy of the zone information and get updates through replication

all domain controllers in the Active Directory domain As with a Windows

2000 domain, all domain controllers will get a copy of the zone information and get updates through replication regardless of whether they are also run-ning the DNS Server service

you’ve confi gured application partitions, you can limit the scope of tion to a designated application partition Any domain controllers confi g-ured with the application partition will get a copy of the zone information and get updates through replication regardless of whether they are also run-ning the DNS Server service

4 On the Zone Name page, type the full DNS name for the zone The zone name

should help determine how the zone fi ts into the DNS domain hierarchy For example, if you’re creating the primary server for the cpandl.com domain, you

should type cpandl.com as the zone name Click Next

5 If you’re creating a standard primary zone, you see the Zone File page This page

allows you to create a new zone fi le or use an existing zone fi le In most cases, you’ll simply accept the default name and allow the wizard to create the fi le for you in the %SystemRoot%\System32\Dns folder If you are migrating from a BIND DNS server or have a preexisting zone fi le, you can select Use This Existing File and then type the name of the fi le that you’ve copied to the %SystemRoot%\System32\Dns folder Click Next when you are ready to continue

6 If you’re creating a secondary zone, you see the Master DNS Servers page Type

the IP address of the primary DNS server that’s maintaining the zone, and then click Add Repeat this step to specify additional name servers Zone transfers will

be confi gured to copy the zone information from these DNS servers

Trang 19

7 On the Dynamic Update page, choose how you want to confi gure dynamic

updates, and then click Next You can use one of these options:

controllers and when Active Directory is deployed It provides for the best security possible by restricting which clients can perform dynamic updates

client to update resource records in DNS Although it allows both secure and nonsecure updates, it doesn’t validate updates, which means dynamic updates are accepted from any client

DNS You should use this option only when the zone isn’t integrated with Active Directory

8 Click Next and then click Finish to complete the confi guration and exit the

wizard

Creating Reverse Lookup Zones

To create the initial reverse lookup zone or additional reverse lookup zones on a server, follow these steps:

1 In the DNS console, expand the node for the server you want to work with

Right-click the Reverse Lookup Zones entry, and choose New Zone Afterward, in the New Zone Wizard, click Next

2 On the Zone Type page, you can select the zone type The options available are

the same as for forward lookup zones Click Next after making a selection

3 If you created an Active Directory–integrated zone, specify the replication scope,

and then click Next

4 Specify whether you are creating an IPv4 reverse lookup zone or an IPv6 reverse

lookup zone and then click Next Do one of the following:

If you are confi guring a reverse lookup zone for IPv4, type the network ID for the reverse lookup zone and then click Next The values you enter set the default name for the reverse lookup zone If you have multiple subnets

on the same network, such as 192.168.1, 192.168.2, and 192.168.3, you should enter only the network portion for the zone name, such as 192.168 rather than the complete network ID The DNS Server service will then

fi ll in the necessary subnet zones as you use IP addresses on a particular subnet

If you are confi guring a reverse lookup zone for IPv6, type the network

pre-fi x for the reverse lookup zone and then click Next The values you enter are used to automatically generate the related zone names Depending on the prefi x you enter, up to eight zones may be created

5 If you’re creating a standard secondary zone, you see the Zone File page This

page allows you to create a new zone fi le or use an existing zone fi le

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 785

Trang 20

6 On the Dynamic Update page, choose how you want to confi gure dynamic

updates, and then click Next

7 Click Next and then click Finish to complete the confi guration and exit the

wizard

Confi guring Forwarders and Conditional Forwarding

In a normal confi guration, if a DNS name server can’t resolve a request, it forwards the request for resolution A server to which DNS queries are forwarded is referred to as a

forwarder You can specifi cally designate forwarders that should be used by your

inter-nal DNS servers For example, if you designate your ISP’s primary and secondary name servers as forwarders, queries that your internal name servers can’t resolve will be for-warded to these servers Forwarding can still take place, however, even if you don’t spe-cifi cally designate forwarders The reason for this is that the root hints fi le specifi es the root name servers for the public Internet and these servers can be used as forwarders Any time forwarders are not specifi ed or available, requests can be forwarded to the root name servers The root name servers then forward the requests to the appropriate top-level domain name server, which forwards them to the next-level domain server,

and so on This process is referred to as recursion, and, as you can see, this involves a

number of forwarding actions DNS servers can send recursive queries to IPv4, IPv4 and IPv6, and IPv6-only servers

Another forwarding option is to confi gure what is called a conditional forwarder When

using conditional forwarding, you can tell your DNS name servers that if they see a request for domain XYZ, they should not forward it to the public DNS name servers for resolution Instead, the name servers should forward the request directly to the authori-tative name server for the XYZ domain

You can confi gure forwarding options by following these steps:

1 In the DNS console, right-click the server you want to work with, and select

Properties In the Properties dialog box, click the Forwarders tab, as shown in Figure 24-11

2 To allow forwarding to root name servers when confi gured forwarders are not

available, select the Use Root Hints If No Forwarders Are Available check box

3 Display the Edit Forwarders dialog box by clicking Edit To forward queries

that internal servers can’t resolve to another server, type the IP address or DNS name for the other server, and then press Enter Repeat this process to add other forwarders You can organize the forwarders in priority order by selecting each in turn and clicking the Up or Down buttons as appropriate

4 Use the Number Of Seconds Before Forward Queries Time Out box to set the

query timeout in seconds By default, a DNS server will continue to attempt to contact and use a listed forwarder for 3 seconds When the timeout expires, the server moves to the next forwarder in the list and does the same When there are

no additional forwarders, the server uses the root hints to locate a root server to which the query can be forwarded

Trang 21

Figure 24-11 The Forwarders tab

5 Click OK to close the Edit Forwarders dialog box

6 In the Properties dialog box, click the Advanced tab Ensure that the Disable

Recursion check box is cleared and then click OK to close the Properties dialog box

If you have multiple internal domains, you might want to consider confi guring tional forwarding, which allows you to direct requests for specifi c domains to specifi c DNS servers for resolution Conditional forwarding is useful if your organization has multiple internal domains and you need to resolve requests between these domains To confi gure conditional forwarding, follow these steps:

1 In the DNS console, select and then right-click the Conditional Forwarders folder

for the server you want to work with Select New Conditional Forwarder on the shortcut menu

2 In the New Conditional Forwarder dialog box, enter the name of the domain to

which queries should be forwarded, such as adatum.com

3 Click in the IP Address list, type the IP address of an authoritative DNS server

in the specifi ed domain, and then press Enter Repeat this process to specify additional IP addresses

4 If you’re integrating DNS with Active Directory, select the Store This Conditional

Forwarder In Active Directory check box and then choose a replication strategy:

All DNS Servers In This Forest —Choose this strategy if you want the widest

replication strategy Remember, the Active Directory forest includes all domain trees that share the directory data with the current domain

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 787

Trang 22

All DNS Servers In This Domain—Choose this strategy if you want to replicate

forwarder information within the current domain and child domains of the current domain

All Domain Controllers In This Domain—Choose this strategy if you want to

replicate forwarder information to all domain controllers within the current domain and child domains of the current domain Although this strategy gives wider replication for forwarder information within the domain, not every domain controller is a DNS server as well (and you don’t need to con-

fi gure every domain controller as a DNS server either)

5 Set the Number Of Seconds Before Forward Queries Time Out option This value

controls how long the server tries to query the forwarder if it gets no response When the Number Of Seconds Before Forward Queries Time Out interval passes, the server tries the next authoritative server in the list The default is 5 seconds Click OK

6 Repeat this procedure to confi gure conditional forwarding for other domains

You can disable recursion and forwarders using the DNS console In the DNS console, right-click the server you want to work with, and select Properties In the Properties dialog box, click the Advanced tab Disable recursion and forwarders by selecting the Disable Recursion check box and clicking OK

Confi guring Subdomains and Delegating Authority

Your organization’s domain structure is separate from its zone confi guration If you create subdomains of a parent domain, you can add these subdomains to the parent domain’s zone or create separate zones for the subdomains When you create separate zones, you must tell DNS about the other servers that have authority over a particular subdomain You do this by telling the primary name server for the parent domain that you’ve delegated authority for a subdomain

When you add subdomains of a parent domain to the same zone as the parent domain, you have a single large namespace hosted by primary servers This gives you a single unit to manage, which is good when you want centralized control over DNS in the domain The disadvantage is that as the number of subdomains in the zone grows, there’s more and more to manage, and at some point, the DNS server can become over-burdened, especially if dynamic updates are allowed and there are hundreds or thou-sands of host records

When you create a separate zone for a subdomain, you have an additional unit of agement that can be placed on the same DNS server or on a different DNS server This means that you can delegate control over the zone to someone else, which would allow branch offi ces or other departments within the organization to manage their own DNS

Trang 23

services If the zone is on another DNS server, you shift the load associated with that zone to another server The disadvantage is that you lose centralized control over DNS

Note

It isn’t possible to combine domains from different branches of the namespace and place them in a single zone As a result, domains that are part of the same Active Directory forest but on different trees must be in separate zones Thus, you would need separate zones for cohowinery.com and cohovineyards.com

To create subdomains in separate zones on the same server as the parent domain, plete the following steps:

1 Create the necessary forward and reverse lookup zones for the subdomains as

described earlier in this chapter in “Creating Forward Lookup Zones” on page

783 and “Creating Reverse Lookup Zones” on page 785

2 You don’t need to delegate authority because these subdomains are on the

primary name server for the parent domain This server automatically has control over the zones

To create subdomains in separate zones and on separate servers, complete the following steps:

1 Install a DNS server in each subdomain, and then create the necessary forward

and reverse lookup zones for the subdomains as described earlier in “Creating Forward Lookup Zones” on page 783 and “Creating Reverse Lookup Zones” on page 785

2 On the primary DNS server for the parent domain, you must delegate authority

to each subdomain In the DNS console, expand the node for the server on which the parent domain is located, and then expand the related Forward Lookup Zones folder

3 Right-click the parent domain entry, and then select New Delegation This starts

the New Delegation Wizard Click Next

4 As shown in Figure 24-12, type the name of the subdomain, such as ny Check the

fully qualifi ed domain name (FQDN) to ensure that it is correct, and then click Next

Note

It isn’t possible to combine domains from different branches of the namespace and place them in a single zone As a result, domains that are part of the same Active Directory forest but on different trees must be in separate zones Thus, you would need separate zones for cohowinery.com and cohovineyards.com.

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 789

Trang 24

Figure 24-12 Specify the subdomain name

5 On the Name Servers page, click Add As shown in Figure 24-13, the New Name

Server Record dialog box is displayed

Figure 24-13 Specify the server name and IP address

6 In the Server Fully Qualifi ed Domain Name (FQDN) box, type the fully qualifi ed

host name of a DNS server for the subdomain, such as ns1.ny.cpandl.com, and

then click Resolve The wizard then validates name server and fi lls in its IP address You can add additional IP addresses for the name server by clicking in the IP Address list, typing the IP address, and pressing Enter

Trang 25

You must specify the server name and at least one IP address The order of the entries determines which IP address is used fi rst You can change the order as necessary using the Up and Down buttons

7 Click OK to close the New Name Server Record dialog box Repeat steps 5 and 6

to specify other authoritative DNS servers for the subdomain

8 Click Next, and then click Finish

Confi guring Zone Transfers

Zone transfers are used to send a read-only copy of zone information to secondary DNS servers, which can be located in the same domain or in other domains Windows Server

2008 supports three zone transfer methods:

Standard zone transfers, in which a secondary server requests a full copy of a zone from a primary server

Incremental zone transfers, in which a secondary server requests only the changes that it needs to synchronize its copy of the zone information with the primary server’s copy

Active Directory zone transfers, in which changes to zones are replicated to all domain controllers in the domain (or a subset if application partitions are confi g-ured) using Active Directory replication

Active Directory zone transfers are automatically used and confi gured when you use Active Directory–integrated zones If you have secondary name servers, these name serv-ers can’t automatically request standard or incremental zone transfers To allow this, you must fi rst enable zone transfers on the primary name server Zone transfers are disabled

by default to enhance DNS server security Speaking of security, although you can allow zone transfers to any DNS server, this opens the server to possible attack It is better to designate specifi c name servers that are permitted to request zone transfers

To manage incremental zone transfers, DNS servers track changes that have been made

to a zone between each increment of a zone’s serial number Secondary servers use the zone’s serial number to determine whether changes have been made to the zone

If the serial number matches what the secondary server has for the zone, no changes have been made and an incremental transfer isn’t necessary If the serial number doesn’t match, the secondary server’s copy of the zone isn’t current and the secondary server then requests only the changes that have occurred since the last time the secondary zone was updated

Note

You must specify the server name and at least one IP address The order of the entries determines which IP address is used fi rst You can change the order as necessary using the Up and Down buttons.

To manage incremental zone transfers, DNS servers track changes that have been made

to a zone between each increment of a zone’s serial number Secondary servers use the zone’s serial number to determine whether changes have been made to the zone

If the serial number matches what the secondary server has for the zone, no changes have been made and an incremental transfer isn’t necessary If the serial number doesn’t match, the secondary server’s copy of the zone isn’t current and the secondary server then requests only the changes that have occurred since the last time the secondary zone was updated.

Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers 791

Ngày đăng: 14/12/2013, 16:15

TỪ KHÓA LIÊN QUAN