Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Configuring Advanced DNS Server Properties - Tuning Advanced Server Options (part 3)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/13/2011 9:57:05 PM
Round Robin Example

The Web server named server1.lucernepublishing.com has three network adapters and three distinct IP addresses. In the stored zone (either in a database file or in Active Directory), the three A resource records mapping the host name to each of its IP addresses appear in this fixed order:

server1      IN      A      10.0.0.1
server1 IN A 10.0.0.2
server1 IN A 10.0.0.3

The first DNS client—Client1—that queries the server to resolve this host’s name receives the list in this default order. However, when a second client—Client2—sends a subsequent query to resolve this name, the list is rotated as follows:

server1      IN      A      10.0.0.2
server1 IN A 10.0.0.3
server1 IN A 10.0.0.1

Disabling Round Robin

When you clear the Enable Round Robin check box, round robin is disabled for the DNS server. In this case, when clients query the DNS server to resolve the host name of a multihomed computer, the server always returns the matching A resource records in the order in which those records appear in the zone.

Secure Cache Against Pollution

By default, the Secure Cache Against Pollution option is enabled. This setting allows the DNS server to protect its cache against referrals that are potentially polluting or nonsecure. When the setting is enabled, the server caches only those records with a name that corresponds to the domain for which the original queried name was made. Any referrals received from another DNS server along with a query response are simply discarded.

For example, if a query is originally made for example.microsoft.com, and a referral answer provides a record for a name outside the microsoft.com domain name tree (such as msn.com), that name is discarded if the Secure Cache Against Pollution option is enabled. This setting helps prevent unauthorized computers from impersonating another network server.

When this option is disabled, however, the server caches all the records received in response to DNS queries—even when the records do not correspond to the queried-for domain name.

Name Checking

By default, the Name Checking drop-down list box on the Advanced tab of the DNS server properties dialog box is set to Multibyte (UTF8). Thus, the DNS service by default verifies that all domain names handled by the DNS service conform to the Unicode Transformation Format (UTF). Unicode is a 2-byte encoding scheme, compatible with the traditional 1-byte US-ASCII format, that allows for binary representation of most languages.

Figure 2 shows the four name-checking methods you can select from the Name Checking drop-down list box, and each is described in Table 2.

Figure 2. Name-checking methods


Table 2. Name-Checking Methods
MethodDescription
Strict RFC (ANSI)Uses strict checking of names. These restrictions, set in Request for Comments (RFC) 1123, include limiting names to uppercase and lowercase letters (A-Z, a-z), numbers (0-9), and hyphens (-). The first character of the DNS name can be a number.
Non RFC (ANSI)Permits names that are nonstandard and that do not follow RFC 1123 Internet host naming specifications.
Multibyte (UTF8)Permits recognition of characters other than ASCII, including Unicode, which is normally encoded as more than one octet (8 bits) in length.
 With this option, multibyte characters can be transformed and represented using UTF-8 support, which is provided with Windows Server 2003.
 Names encoded in UTF-8 format must not exceed the size limits clarified in RFC 2181, which specifies a maximum of 63 octets per label and 255 octets per name. Character count is insufficient to determine size because some UTF-8 characters exceed one octet in length. This option allows for domain names using non-English alphabets.
All NamesPermits any naming conventions.

Despite the flexibility of the UTF-8 name-checking method, you should consider changing the Name Checking option to Strict RFC when your DNS servers perform zone transfers to non-Windows servers that are not UTF-8–aware. Although DNS server implementations that are not UTF-8–aware might be able to accept the transfer of a zone containing UTF-8 encoded names, these servers might not be able to write back those names to a zone file or reload those names from a zone file.

You should use the other two Name Checking options, Non RFC and All Names, only when a specific application requires them.

Load Zone Data On Startup

By default, the Load Zone Data On Startup drop-down list box is set to the From Active Directory And Registry option. Thus, by default DNS servers in Windows Server 2003 initialize with the settings specified in the Active Directory database and the server Registry.

However, this setting includes two other options, From Registry and From File, as shown in Figure 3.

Figure 3. Server initialization options


When you select the From Registry option for the Load Zone Data On Startup setting, the DNS server is initialized by reading parameters stored in the Windows Registry. When you select the From File option, the DNS server is initialized by reading parameters stored in a boot file, such as those used by BIND servers.

To use such a file, you should supply a copy of a boot file from a BIND-based DNS server. On BIND-based DNS servers, this file is typically called the Named.boot file. The format of this file must be the older BIND 4 format, not the more recent BIND 8 boot file format. When a boot file is used, settings in the file are applied to the server, overriding the settings stored in the Registry on the DNS server. However, for any parameters not configurable using boot file directives, Registry defaults (or stored reconfigured server settings) are applied by the DNS Server service.

Enable Automatic Scavenging Of Stale Records

By default, the Enable Automatic Scavenging Of Stale Records option is cleared on the Advanced tab. According to this setting, DNS servers in Windows Server 2003 by default do not automatically delete stale or outdated resource records from a zone for which Aging has been enabled.

When this setting is enabled, scavenging of stale resource records is performed automatically at the interval configured in the Scavenging Period.

Other -----------------
- Windows Server 2008 R2 : Auditing the Environment (part 3) - Auditing Resource Access
- Windows Server 2008 R2 : Auditing the Environment (part 2) - Audit Policy Subcategories
- Windows Server 2008 R2 : Auditing the Environment (part 1) - Audit Policies
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 4)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 3)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 2)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 1)
- Windows Server 2008 R2 : Server Manager Storage Page
- Windows Server 2008 R2 : Server Manager Configuration Page
- Windows Server 2008 R2 : Server Manager Diagnostics Page
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server