B
Bobsi
Hello there,
Hopefully the MVP's or those in-the-know can scan over
this proposal and point out any possible pitfalls or un-
recommended practises.
THE ENVIRONMENT:
- Currently in a Windows NT 4 multiple domain environment
stretched across the UK via SMDS links and WAN circuits.
- There are no trust relationships between domains
- MS Exchange 5,5 is currently deployed, all connected via
X-400 across UK.
- Name resolution is NetBIOS only, and replication is
regionalised e.g. someone on a network in Scotland cannot
resolve names at a connected network in the south-west
(this is by design).
- A common IP address scheme (class B) exists across the
UK, and no address spaces have been duplicated.
THE PROPOSAL:
- to introduce a DNS structure now, before moving to AD 6-
12 months later
- External and internal namespaces will remain completely
separate, with clients using MS Proxy for web-based DNS
queries.
- HQ will be the TLD (comp.ad)
- second level will be regionalised (region.comp.ad)
- third level will be city (city.region.comp.ad)
- forth level will be networkid (admin.city.region.comp.ad)
- the DNS servers will be Windows 2000 based
- we will use primary/secondary zone types as no AD exists
(yet)
- we will have two DNS servers per city (1 * PRI, 1 * SEC)
- Forwarders and root hints will be configured on each
server
- DHCP will register DNS on behalf of clients that aree
unable to perform dynamic updates
THE FUTURE:
- plan to upgrade to Windows 2000/3 infrastructure within
6-12 months, creating one single forest with multiple
domains.
- Plan to use AD-integrated DNS zones (for security and
replication topology benefits)
MY QUERIES:
- Would it be possible to upgrade these DNS servers to use
AD-integrated zones after running DCpromo? Anything I need
to be aware of when doing that? (apart from the creation
of '.' root zones)
- When considering NetBIOS, if a comp (compA) is in one
domain and another comp (compA) is part of a different
domain but both domains are part of the same forest, would
the NetBIOS registrations clash? If so, which other
security principles should I consider in order to preserve
uniqueness?
- Would this DNS infrastructure support AD successfully
bearing in mind that it may not reflect the AD design
exactly?
- Should the TLD change, would it be recommended to start
a completely new namespace using separate DNS servers, and
gradually phase the old ones out?
- Again, should the TLD change I assume all clients would
have to have their primary domain suffix manually altered?
could I push out a new primary DNS domain suffix via
Windows 2000 DHCP Server to the clients?
- Ideally speaking, should the DNS namespace be designed
around the network infrastructure?
Sorry for the amount of info here and thanks for taking
the time to read this.
Any help or advice would be gratefully received,
Regards
Hopefully the MVP's or those in-the-know can scan over
this proposal and point out any possible pitfalls or un-
recommended practises.
THE ENVIRONMENT:
- Currently in a Windows NT 4 multiple domain environment
stretched across the UK via SMDS links and WAN circuits.
- There are no trust relationships between domains
- MS Exchange 5,5 is currently deployed, all connected via
X-400 across UK.
- Name resolution is NetBIOS only, and replication is
regionalised e.g. someone on a network in Scotland cannot
resolve names at a connected network in the south-west
(this is by design).
- A common IP address scheme (class B) exists across the
UK, and no address spaces have been duplicated.
THE PROPOSAL:
- to introduce a DNS structure now, before moving to AD 6-
12 months later
- External and internal namespaces will remain completely
separate, with clients using MS Proxy for web-based DNS
queries.
- HQ will be the TLD (comp.ad)
- second level will be regionalised (region.comp.ad)
- third level will be city (city.region.comp.ad)
- forth level will be networkid (admin.city.region.comp.ad)
- the DNS servers will be Windows 2000 based
- we will use primary/secondary zone types as no AD exists
(yet)
- we will have two DNS servers per city (1 * PRI, 1 * SEC)
- Forwarders and root hints will be configured on each
server
- DHCP will register DNS on behalf of clients that aree
unable to perform dynamic updates
THE FUTURE:
- plan to upgrade to Windows 2000/3 infrastructure within
6-12 months, creating one single forest with multiple
domains.
- Plan to use AD-integrated DNS zones (for security and
replication topology benefits)
MY QUERIES:
- Would it be possible to upgrade these DNS servers to use
AD-integrated zones after running DCpromo? Anything I need
to be aware of when doing that? (apart from the creation
of '.' root zones)
- When considering NetBIOS, if a comp (compA) is in one
domain and another comp (compA) is part of a different
domain but both domains are part of the same forest, would
the NetBIOS registrations clash? If so, which other
security principles should I consider in order to preserve
uniqueness?
- Would this DNS infrastructure support AD successfully
bearing in mind that it may not reflect the AD design
exactly?
- Should the TLD change, would it be recommended to start
a completely new namespace using separate DNS servers, and
gradually phase the old ones out?
- Again, should the TLD change I assume all clients would
have to have their primary domain suffix manually altered?
could I push out a new primary DNS domain suffix via
Windows 2000 DHCP Server to the clients?
- Ideally speaking, should the DNS namespace be designed
around the network infrastructure?
Sorry for the amount of info here and thanks for taking
the time to read this.
Any help or advice would be gratefully received,
Regards