Top-Rated Free Essay
Preview

Unit 2 Exercise 1 DNS Scenario

Satisfactory Essays
319 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Exercise 1 DNS Scenario
Unit 2 Exercise 1
It is not necessary to put a DNS server in such a small location. 5 users and slow network connectivity does not justify the expense of installing Servers in that location. Unless there is a large amount of File sharing, or other data that needs to be accessed daily by other locations on the network. If that is the case then yes put in the server but configure it as a secondary or ADI zone type. I suggest putting the servers in the other location where you have 30 Users and good connectivity. You can also store all the files from both locations in the larger office, the smaller location can remote in via “VPN”. By doing this all the information from the smaller sight is stored off site. The smaller sight can be run with a smaller cheaper router. The server in the larger more utilized office should be set up as the Primary Zone since it is utilizing a better connection and has more users this is essentially HOMEBASE!
If you run DNS on domain controllers, you have the opportunity to use something called Active Directory Integrated zones, or ADI zones. In classical DNS, the zone information is stored in text files that sit on the hard drive. Yes, they’re protected by NTFS, but you don’t have the ability to impose per-record security.
You may also want to create an ADI zone; the zone information (and all the associated resource records) are imported into the AD database, NTDS.DIT. The zones and zone records become objects in AD. This has a variety of benefits (and potentially some downsides as well). From the security standpoint, you now have the ability to protect individual DNS records, should you want to do so. You can also get those DNS files out of their well-known hard drive locations and into AD, which is somewhat more complicated to peek inside.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Thank you for contacting me regarding your questions, and that you trust I will do my best to assist you with your issue. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated (ADI) Domain Name System (DNS) server. You also have some questions on what type of DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting five users and or workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but if you actually need a DNS server at all. If there is a very high level of file and or data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI there is not enough file and or data sharing to really warrant the presence of the server. An ADI server could potentially slow down an already sluggish system.…

    • 322 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT 1330 Unit 2 Exercise 1

    • 363 Words
    • 2 Pages

    For the second much larger branch, supporting around thirty users with a much better network connectivity; I would recommend a DNS server set up in the primary zone. I would also suggest moving your servers from the smaller branch to your larger branch. All files from the smaller branch could be accessed via a “VPN” remote link. This would allow the smaller branch the ability to use a much smaller router, which might help with the connectivity problem the users have experienced.…

    • 363 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Would a free Dynamic DNS server be sufficient to host the support.contoso##.com domain? Why or why not?…

    • 868 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IP SCHEMA KAMAZON

    • 1327 Words
    • 6 Pages

    It is understood that these servers are not part of the project plan per se, but by establishing an entirely new ip address schema we must address the number of servers so we can accurately determine the number of needed addresses. We also would also need ip addresses on the edge switches for each floor by creating 6 VLANS on the 48 port switch in the basement not to mention two firewall appliances that will create the companies DMZ. A VLAN also called a Virtual LAN is a Group of devices connected to one or more LANs that are configured (using management software) so that they can communicate as if they…

    • 1327 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Headquarters might need to think about redundancy for their servers to be able to be accessed any time of the day since they are global.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    8. Computers that belong to the same domain can access a common security database of user and computer account information. That type of database on Windows 2003 domain controller servers is also known as a _____ database?…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    17. A Windows Server 2008 computer that has been configured with Active Directory DS role is referred to as a __________. Domain Controller…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 241-Appendix D

    • 1773 Words
    • 8 Pages

    |Positioning an access point in that part of the building will ensure the offices have sufficient signal. Another issue |…

    • 1773 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    8. Computers that belong to the same domain can access a common security database of user and computer account information. This type of database on Windows 2003 domain controller servers is also known as a(n) ___ database.…

    • 747 Words
    • 3 Pages
    Good Essays