Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 : Manage a DNS Server (part 3) - Manage Zone Database Files & Configure Single-Label DNS Resolution

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/19/2011 11:34:07 AM

6. Manage Zone Database Files

When you work with DNS, you have many files to manage. Each DNS server may be responsible for many different DNS zones. Each zone contains its own files and folders that will require some degree of effort in order to create, maintain, update, manage, and secure.

As you work with your DNS environment, you will likely break down your forest into smaller segments that in DNS are referred to as zones. If the records in your DNS zone database are designed to allow the resolution of a name to an IP address, you would say the zone is working forward, and the zone database type you would create is called a forward lookup zone. If your object is to provide an option for the finding of names based on a provided IP address, then you would say your zone is working in reverse, or you would create a reverse lookup zone. What if you wanted a DNS server that only resolved the names of other authoritative DNS servers in your environment? You would create a stub zone to serve your purposes.

Each of the different zone types serves a particular purpose in DNS. You will likely want more than one server for each zone in order to maximize availability to your clients and to add some degree of fault tolerance to your network.

6.1. Creating a Forward Lookup Zone

As you learned earlier, when you install DNS as part of Active Directory, the appropriate forward lookup zones for the domain are created automatically. If you choose to add zones or if you are not using DNS as an integrated part of Active Directory, you will use DNS Manager to create and manage forward lookup zones. Not all forward lookup zones are created equally; there are actually three different types, called primary zones, secondary zones, and stub zones.

Primary zones are zones that are created and stored on the local server. They can be updated and maintained directly on the server and can also receive replicated updates from other servers.

Secondary zones are zones that are stored on the local server; however, all of their information comes from updates received from another designated primary server. Secondary servers are a good way to help share the workload that might otherwise be forced onto a standard primary server.

Stub zones create a copy of only the name server records for a given zone. This zone type is useful in helping clients find and query the appropriate internal DNS name server.

To create a new forward lookup zone, follow these steps:

  1. Open DNS Manager.

  2. Right-click the name of the server.

  3. Choose New Zone.

  4. Click Next in the Welcome To The New Zone Wizard.

  5. Select the type of zone you want to create.

  6. Choose whether you want the zone stored in Active Directory by selecting the box at the bottom of the Zone Type screen, as shown in Figure 7.

Figure 7. Adding a new forward lookup zone

Depending on what type of zone you choose, the wizard will offer you the appropriate options from this point forward, including options for replication, zone name, and the types of updates you will allow.

6.2. Changing the Zone Type

One of the nice things about DNS zones is that they are pretty flexible. If you needed, you could actually change a primary zone to a secondary or stub zone, or vice versa. Usually you would do something like this if you were doing maintenance on a server and wanted to limit the effect on DNS or the clients that rely on DNS services. Changing the zone type is a simple procedure:

  1. Open DNS Manager.

  2. Find the chosen zone, and right-click it.

  3. Choose Properties.

  4. Next to Type on the General tab, as shown in Figure 8, click Change.

  5. Select the new zone type, and click OK.

Figure 8. Changing the DNS zone type

6.3. Managing Resource Records

DNS zones contain resource records of various types. These records are created as you create DNS servers, clients, services, and applications. Generally speaking, once a resource record has been created, there is not much you need to do to maintain these records. You may want to change the DACL security permissions if your resource records are part of Active Directory, or you may need to modify a record or even delete one.

You can manage records in the DNS zone using DNS Manager or dnscmd. You simply need to find the resource record in the designated zone.

If you are interested in changing the DACL for a resource record, follow these steps:

  1. Open DNS Manger.

  2. Locate the zone that contains the resource record.

  3. Right-click the resource record.

  4. Choose Properties.

  5. Select the Security tab.

  6. Edit the permission to the resource record, and click OK.

If you want to delete the record, simply right-click the record, and choose Delete. When the message appears asking for confirmation to delete the record, simply click OK.

6.4. Configuring Dynamic Update

When you work with DNS servers, it is ideal to have them update one another with their information. Windows Server 2008 R2 allows the use of dynamic updates between configured DNS servers. This really eliminates the need for you to spend your valuable time administering zone databases. Clients who use DHCP can easily get access to an updated DNS server without having to call your help desk. You can configure each of your zones for dynamic updates. If you are using Active Directory integrated zones, you can also specify that the updates are done in a secure fashion and are based on the information in the DACL.

  1. Open DNS Manager.

  2. Locate the zone where you want to enable dynamic updates.

  3. Right-click the zone, and choose Properties.

  4. On the General tab, open the Dynamic Updates drop-down list, as shown in Figure 9.

  5. Choose the type of updates you want to allow, and click OK.

Figure 9. Configuring dynamic updates

As you probably noticed, dynamic updates can be configured as nonsecure and secure. We know some of you are wondering why you would ever consider using nonsecure updates. Imagine if all the DNS servers for the zone were residents of your own private network. You already have tight control over the servers, so you might not choose to enable secure updates only. If your DNS zones are not part of Active Directory, you will not have the option for secure dynamic updates only.

If you are using Active Directory integrated zones, it really does not make sense to use nonsecure updates. Nonsecure updates will provide exposure to your DNS servers to accept updates from unknown, disreputable, or downright malicious sources, and they will open your DNS infrastructure to potential threats. It just doesn't make sense to use anything but secure updates.

6.5. Zone Transfer Settings

DNS servers transfer zone data between one another based on a schedule. You can control how the zone is transferred based on the following settings. Each of the settings can be changed or updated, so it is important to note that these settings will be limited if your DNS servers are Active Directory integrated.

  • Whether or not the zone is transferred to any other server and to which servers it may be transferred

  • The refresh interval, which describes how often the zone files will be transferred

  • The retry interval, which describes how long a DNS server will wait to request a transfer after a transfer has failed

  • The expire interval, which describes how long the DNS zone data is valid

  • The list of servers that are notified when zone data changes

To configure zone transfer settings, follow these steps:

  1. Open DNS Manager.

  2. Locate the chosen zone.

  3. Right-click the zone, and choose Properties.

  4. Click the Zone Transfers tab.

  5. Select the box to allow zone transfers.

  6. Specify the servers that you will allow transfers with, as shown in Figure 10.

Figure 10. Configuring the zone transfer settings

When you configure zone transfers, you can also build something called a notification list, which contains a list of servers that will be notified by the master DNS server in your domain when changes are made to the zone. Simply click the Notify button on the Zone Transfers tab to build a notification list.

The settings for Refresh Interval, Retry Interval, Expires After, and Minimum (Default) TTL are on the SOA tab.

  1. Open DNS Manager.

  2. Locate the chosen zone.

  3. Right-click the zone, and choose Properties.

  4. Click the Start Of Authority (SOA) tab.

  5. Set the values for the selected interval or TTL, as shown in Figure 11.

Figure 11. Configuring the interval values

6.6. Securing a Zone

DNS provides name resolution services to clients. The information provided by DNS has a direct effect on the functional operation of your network. You want to make sure that you take security into consideration for each of your DNS zones. Generally, DNS has two potential security problems that you would worry about. First, you want to make sure that the zone files are secure from unauthorized changes. If an illicit source can update your zone database files, they could really cause problems for your network. Generally, these attacks occur as dynamic updates are pushed to your DNS servers from outside your organization. The easiest way to prevent this type of attack is to enable only secure dynamic updates.

Second, you want to make sure you have taken precautions to prevent unauthorized access to your zone files. Imagine if someone outside your organization set up a secondary server and managed to get updates from your internal primary server. You would effectively be sharing your DNS zone information with an imposter. The easiest way to prevent this type of attack is by configuring a list of servers to which you will allow zone transfers.

If your zones are Active Directory integrated, you can of course use the DACLs associated with the zone to further control access to the files.

Window Server 2008 R2 moves one step further when it comes to protecting the zone database files and adds something called Domain Name System Security Extensions (DNSSEC). DNSSEC allows the DNS zone and all the records in the zone to be cryptographically signed. When a DNS server receives a request for the signed zone files, it returns the files along with the digital signatures. By obtaining a public key, a resolver can verify that the files have not been tampered with.

7. Configure Single-Label DNS Resolution

The vast majority of networks use DNS as the primary name resolution system, but there are alternatives. For example, for many years Windows Internet Name Service (WINS) was used as an alternative, and in many networks it still is in use. Unfortunately, as you move forward to the next version of TCP/IP, which is called IPV6, there is no support for WINS. You will need another way to resolve single-label host names besides WINS. If there is no WINS, a DNS client can still resolve a single-label name by appending a dns suffix to the name and trying to find it in DNS.

If you are planning on using IPV6, all name resolution will go through DNS. If you still have single-label names in your network, Windows Server 2008 R2 uses a special zone called a global names zone (GNZ) to house these records and facilitate the resolution of those names through DNS. GNZ is not a replacement for WINS; instead, it provides an avenue for name resolution while you transition WINS out of your network. The GNZ is created and managed much the same as a standard primary zone. You should not enable dynamic updates for the GNZ to prevent its resource records from being registered into the zone.

7.1. Creating the GNZ

The process of creating the GNZ begins with DNS Manager:

  1. Open DNS Manager.

  2. Right-click the name of the server.

  3. Choose New Zone.

  4. Click Next in the Welcome To The New Zone Wizard.

  5. Select the Primary Zone type, make sure the Store In Active Directory check box is selected, and click Next.

  6. Select All DNS servers running on Domain Controllers in this forest.

  7. Click Next.

  8. Click Forward Lookup Zone.

  9. Click Next.

  10. Type GlobalNames in the Zone Name box, and click Next.

  11. Select Do Not Allow Dynamic Updates, and click Next.

  12. Click Finish.

It is also possible to enable GNZ from the command line using the dnscmd tool and the following command:

DNSCMD /config /enableglobalnamesupport 1

Either method will work to enable GNZ, and in both cases you will still need to configure the appropriate records for the zone.

After the forward lookup GNZ has been created, you will need to add the alias resource records (called the CNAME), for each of the single-label clients in the network. This can prove to be a daunting task if you have lots of single-label clients and may provide the motivation necessary to quickly upgrade them to traditional DNS clients. To add new CNAME records for the single-label clients, follow these steps:

  1. Open DNS Manager.

  2. Locate the GNZ.

  3. Right-click the zone, and choose New Alias (CNAME).

  4. Type in the alias name.

  5. Type in the fully qualified domain name.

  6. Click OK.

Other -----------------
- Windows Server 2008 R2 : Manage a DNS Server (part 2) - Manage DNS Integration with Active Directory & Change Zone Replication
- Windows Server 2008 R2 : Manage a DNS Server (part 1) - Change the Address of a DNS Server & Scavenge Properties for DNS
- Active Directory Domain Services 2008 : Manage Active Directory Domain Services Data - Reset a User Account Password
- Active Directory Domain Services 2008 : Manage Active Directory Domain Services Data - Enable a User Object
- SQL Server 2005 : Privilege and Authorization - Data Organization Using Schemas
- SQL Server 2005 : The Principle of Least Privilege
- Microsoft PowerPoint 2010 : Setting Advanced PowerPoint Options
- Microsoft PowerPoint 2010 : Setting General PowerPoint Options
- Business Server 2011 : Protecting the Power Supply
- Planning Your Small Business Server 2011 Network : Choosing Naming Conventions & Planning for Security
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server