Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Configuring DNS Server Properties - Exploring DNS Server Properties Tabs

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/11/2011 8:55:26 AM

Exploring DNS Server Properties Tabs

The DNS server properties dialog box allows you to configure settings that apply to the DNS server and all its hosted zones. You can access this dialog box in the DNS console tree by right-clicking the DNS server you want to configure and then selecting Properties, as shown in Figure 1.

Figure 1. Accessing the DNS server properties dialog box

The DNS server properties dialog box contains eight tabs, which are introduced next.

Interfaces Tab

The Interfaces tab allows you to specify which of the local computer’s IP addresses the DNS server should listen to for DNS requests. For example, if your server is multihomed and has one IP address for the local network and another IP address connected to the Internet, you can prevent the DNS server from servicing DNS queries from outside the local network. To perform this task, specify that the DNS server listen only on the computer’s internal IP address, as shown in Figure 2.

Figure 2. Interfaces tab


By default, the setting on this tab specifies that the DNS server listens on all IP addresses associated with the local computer.

Forwarders Tab

The Forwarders tab allows you to forward DNS queries received by the local DNS server to upstream DNS servers, called forwarders. Using this tab, you can specify the IP addresses of the upstream forwarders, and you can specify the domain names of queries that should be forwarded. For example, in Figure 3, all queries received for the domain lucernepublishing.com will be forwarded to the DNS server 207.46.132.23. When, after receiving and forwarding a query from an internal client, the local forwarding server receives a query response back from 207.46.132.23, the local forwarding server then passes this query response back to the original querying client. The process of forwarding selected queries in this way is known as conditional forwarding.

Figure 3. Forwarders tab


In all cases, a DNS server configured for forwarding uses forwarders only after it has determined that it cannot resolve a query using its authoritative data (primary or secondary zone data) or cached data.

Tip

To specify how long the forwarding server should wait for a response from a forwarder before timing out, on the Forwarders tab, enter a value in the Number Of Seconds Before Forward Queries Time Out text box. The default setting is 5.


When to Use Forwarders

In some cases, network administrators might not want DNS servers to communicate directly with external servers. For example, if your organization is connected to the Internet by means of a slow wide area link, you can optimize name resolution performance by channeling all DNS queries through one forwarder, as shown in Figure 4. Through this method, the server cache of the DNS forwarder has the maximum potential to grow and reduce the need for external queries.

Figure 4. Using forwarding to consolidate caching

Another common use of forwarding is to allow DNS clients and servers inside a firewall to resolve external names securely. When an internal DNS server or client communicates with external DNS servers by making iterative queries, normally the ports used for DNS communication with all external servers must be left open to the outside world through the firewall. However, by configuring a DNS server inside a firewall to forward external queries to a single DNS forwarder outside your firewall, and by then opening ports only to this one forwarder, you can resolve names without exposing your network to outside servers. Figure 5 illustrates this arrangement.

Figure 5. Secure iteration with forwarders


Disabling Recursion

The Forwarders tab allows you to disable recursion on any queries, specified by domain, that have been configured to be forwarded to an upstream server. When recursion is not disabled (the default), the local DNS server attempts to resolve a fully qualified domain name (FQDN) after a forwarder has failed to do so. This condition is preferable if you want to optimize settings for fault tolerance: if the upstream forwarder is down, name resolution can fall back to the local DNS server.

However, when under this default setting the forwarder receives the forwarded query and still fails to resolve it, the subsequent fallback recursion that occurs at the local DNS server is usually redundant and delays an inevitable query failure message response. Disabling recursion on queries for which forwarding has been configured thus optimizes the speed of negative query responses at the expense of fault tolerance.

When forwarders are configured this way in combination with disabling recursion, the local DNS server is known as a slave server because in these cases, it is completely dependent on the forwarder for queries that it cannot resolve locally.

Note

Do not confuse the use of the term slave server with the term slave zone, which is used in some implementations of DNS. In some non-Microsoft DNS servers, such as Berkeley Internet Name Domain (BIND), primary zones are called master zones and secondary zones are called slave zones.


Advanced Tab

The Advanced tab, shown in Figure 6, allows you to enable, disable, and configure certain DNS server options and features such as recursion, round robin, automatic scavenging, and netmask ordering.

Figure 6. Advanced tab


Note

Whereas the Forwarders tab allows you to disable recursion on selected queries for domains used with forwarders, the Advanced tab allows you to disable recursion for all queries received by the local DNS server.


Note

If you disable recursion on a DNS server using the Advanced tab, you cannot use forwarders on the same server, and the Forwarders tab becomes inactive.


Root Hints Tab

The Root Hints tab contains a copy of the information found in the WINDOWS\ System32\Dns\Cache.dns file. For DNS servers answering queries for Internet names, this information does not need to be modified. However, when you are configuring a root DNS server (named “.”) for a private network, you should delete the entire Cache.dns file. (When your DNS server is hosting a root server, the Root Hints tab itself is unavailable.)

In addition, if you are configuring a DNS server within a large private namespace, you can use this tab to delete the Internet root servers and specify the root servers in your network instead.

Note

Every few years, the list of root servers on the Internet is slightly modified. Because the Cache.dns file already contains so many possible root servers to contact, it is not necessary to modify the root hints file as soon as these changes occur. However, if you do learn of the availability of new root servers, you can choose to modify your root hints accordingly. As of this writing, the last update to the root servers list was made on November 5, 2002. You can download the latest version of the named cache file from InterNIC at ftp://rs.internic.net /domain/named.cache.


Figure 7 shows the Root Hints tab.

Figure 7. Root Hints tab


Debug Logging Tab

The Debug Logging tab allows you to troubleshoot the DNS server by logging the packets it sends and receives. Because logging all packets is resource-intensive, this tab allows you to restrict which packets to log, as specified by transport protocol, source IP address, packet direction, packet type, and packet contents.

Figure 8 shows the Debug Logging tab.

Figure 8. Debug Logging tab


Event Logging Tab

You can access the DNS Events log through the Event Viewer node in the DNS console.

The Event Logging tab, shown in Figure 9, allows you to restrict the events written to the DNS Events log file to only errors or to only errors and warnings. It also allows you to disable DNS logging. For more powerful features related to the filtering of DNS events, use the Filtering tab of the DNS Events Properties dialog box. You can open this dialog box by selecting Event Viewer in the left pane of the DNS console, right-clicking DNS Events in the right pane, and selecting Properties.

Figure 9. Event Logging tab


Monitoring Tab

The Monitoring tab allows you to test basic DNS functionality with two simple tests. The first test is a simple query against the local DNS server. To perform the first test successfully, the server must be able to answer forward and reverse queries targeted at itself.

The second test is a recursive query to the root DNS servers. To perform this second test successfully, the DNS server computer must be able to connect to the root servers specified on the Root Hints tab.

The Monitoring tab, shown in Figure 10, also allows you to schedule these tests to be conducted at regular intervals. The results of the tests, whether performed manually or automatically, are shown in the Test Results area of the tab.

Figure 10. Monitoring tab


Security Tab

The Security tab is available only when the DNS server is also a domain controller. This tab allows you to control which users are granted permissions to view, configure, and modify the DNS server and its zones. By clicking the Advanced button, you can further refine settings related to DNS server permissions.

Figure 11 shows the Security tab.

Figure 11. Security tab



Other -----------------
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 2)
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 1) - Faulty TCP/IP Configuration & Network Diagnostics
- Windows Server 2008 R2 :Task Scheduler
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 3)
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 2) - TCP/IP Tools
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 1) - Best Practices Analyzer Tools
- Windows Server 2008 R2 : Logging and Debugging - Setting Baseline Values
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 3) - Adding Parsers to Network Monitor
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 2) - How Network Monitor Works
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 1)
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server