DESKTOP

Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining the Role of DNS in AD DS

1/19/2011 9:16:57 AM
When Microsoft began development on AD DS, full compatibility with the domain name system (DNS) was a critical priority. AD DS was built from the ground up not just to be fully compatible with DNS but to be so integrated with it that one cannot exist without the other. Microsoft’s direction in this case did not just happen by chance, but because of the central role that DNS plays in Internet name resolution and Microsoft’s desire to make its product lines embrace the Internet.

While fully conforming to the standards established for DNS, AD DS can expand upon the standard feature set of DNS and offer some new capabilities such as AD-integrated DNS, which greatly eases the administration required for DNS environments. In addition, AD DS can easily adapt to exist in a foreign DNS environment, such as UNIX BIND, as long as the BIND version is 8.2.x or higher.

Given the importance of DNS in Windows Server 2008 R2’s AD DS, a thorough understanding of DNS is a must. 

Examining DNS Namespace Concepts

A DNS namespace, simply defined, is the bounded logical area formed by a DNS name and its subdomains. For example, europe.companyabc.com, asia.companyabc.com, and companyabc.com are all part of the same contiguous DNS namespace. A DNS namespace in AD DS can be published on the Internet, such as microsoft.com or msn.com, or it can be hidden from public exposure, depending on the strategy and security needs of its implementers.

  • External (published) namespaces— A DNS name that can be resolved from anywhere on the Internet is known as a published or external namespace. This type of namespace was previously common for organizations that wanted the full convenience of having their commonly used Internet domain name represent their AD DS structure. Best practices have evolved to make this model less attractive, however, as security becomes a concern and DNS must be set up as “split brain” because it is generally ill-advised to have internal AD DNS zones accessible from the Internet.

  • Internal (hidden) namespaces— For many organizations, publication of their internal domain structure is too high a security risk. These organizations can easily define their AD DS with an internal namespace that is not readable from the Internet. For example, a company might have an external DNS namespace of cco.com but decide that its AD DS structure will correspond to cco.internal or any namespace it wants. Bear in mind that any combination will work for internal namespaces because there is no limitation on using .com, .net, .gov, and so on when dealing with a namespace that is not published. For all intents and purposes, you could name your domain ilovemydomain.verymuch if you want (although it’s not recommended, of course). For practical reasons, however, the .internal namespace has been specifically reserved for private name addressing, and using it is a best-practice approach in many cases.

Note

If deciding to use a domain namespace that theoretically could be bought and used on the Internet either now or in the future, it is wise to purchase the rights to that domain name to prevent potential conflicts with name resolution in the future. For example, if you choose the internal namespace companyabc.com, you might want to first verify that it is not taken and buy it if possible. If you find the domain name is already owned by another company, you might choose a different domain name for your AD DS namespace. Even though your domain might not be published on the Internet, home or laptop users who need dial-in or VPN access to your domain might experience conflicts because they would be incorrectly routed to the wrong DNS name on the Internet instead of your company’s namespace.


Comprehending Dynamic DNS

Dynamic DNS (DDNS) was developed as an answer to the problem of DNS tables having to be manually updated when changes were made. DDNS in Windows Server 2008 R2 automatically updates the DNS table based on registrations, and can work in conjunction with DHCP to automatically process DNS changes as clients are added and removed from the network infrastructure. DDNS is not required for AD DS to function properly, but it makes administration much easier than previous manual methods.

Note

Although DDNS is fully supported by Windows Server 2008 R2 and is typically enabled for all Windows AD DS domain-to-domain name replication, DDNS is still sometimes not implemented at the enterprise level. Organizations with UNIX-based DNS servers tend to manually or statically update DNS tables rather than dynamically update DNS tables. This is solely the choice of the DNS administrator in an organization to enable DDNS.


Comparing Standard DNS Zones and AD-Integrated DNS Zones

Standard DNS essentially stores all name records in a text file and keeps it updated via dynamic updates. If you are accustomed to using UNIX BIND DNS or other standard forms of DNS, this is essentially what Standard DNS is in Windows Server 2008 R2.

AD DS expands upon other implementations of DNS by allowing administrators to integrate DNS into AD DS. By doing this, the DNS zones themselves exist as objects in the AD DS, which allows for automatic zone transfers to be accomplished. DNS replication traffic piggybacks off AD DS traffic, and the DNS records are stored as objects in the directory. In Windows Server 2008 R2’s implementation of AD DS, AD-integrated DNS zones are optimized by being stored in the application partition, thus reducing replication traffic and improving performance.

Understanding How AD DS DNS Works with Foreign DNS

Often, some local administrators might be hesitant to deploy AD DS because of their desire to maintain their own foreign DNS implementation, usually UNIX BIND. If this is the case, it is possible for Windows Server 2008 R2 DNS to coexist in this type of environment, as long as the DNS supports dynamic updates and SRV records (BIND 8.2.x or higher). These situations occur more often than not, as political situations within IT departments are often divided into pro-Microsoft and pro-UNIX groups, each of which has its own ideology and plans. The ability of Windows Server 2008 R2 to coexist peacefully in these types of environments is, therefore, key.

Other  
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Explaining AD DS Replication
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining the Role of Groups in an AD DS Environment
  •  Understanding Windows 7 Personalization
  •  Windows 7 : Understanding User Account Control and Its Impact on Performance
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Understanding Domain Trusts
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining AD DS’s Components
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Examining AD DS’s Structure
  •  Fine-Tuning Windows 7’s Appearance and Performance : Balancing Appearance and Performance
  •  Windows 7: Customizing Menus and the Control Panel (part 2) - Navigating and Customizing the Control Panel
  •  Windows 7: Customizing Menus and the Control Panel (part 1) - Navigating and Customizing Your Computer’s Menus
  •  Installing Windows Server 2008 R2 and Server Core : Managing and Configuring a Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Understanding Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Upgrading to Windows Server 2008 R2
  •  Windows 7 : Using Desktop Gadgets (part 3) - Using the Stock, Currency, Slide Show gadget
  •  Windows 7 : Using Desktop Gadgets (part 2) - Using the Clock, CPU Meter, Weather gadget
  •  Windows 7 : Using Desktop Gadgets (part 1) - Using the Calendar gadget
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 2) - Finalizing the Installation and Customizing the Configuration
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 1)
  •  Installing Windows Server 2008 R2 and Server Core : Preplanning and Preparing a Server Installation
  •  Customizing Windows 7’s Desktop (part 3) - Getting Around the Taskbar
  •  
    Most View
    MSI GT70 Gaming Laptop Review
    Tweetbot - Tasty Tweets
    You Can Master RAW (Part 1)
    Something You Should Know About Iphone 5 (Part 3)
    WD 1TB My Net N900 Central
    Buying Guide: All-In-One Multifunction Printers – May 2013 (Part 3)
    Asus Padfone - A Powerful Smartphone
    The Element Case Joule II For The iPad
    Samsung Galaxy Camera - An Android Compact 21X Shooter (Part 1)
    Kingston Wi - Drive 128GB: Simple To Get Started
    Top 10
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 10) - Color Gamut and Accuracy, Monitor Rating
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 9)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 8) - Battery life, AC draw, and charging speed
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 7)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 6)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 5) - Black Ops II, Battlefied 3, and Sniper Elite v2
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 4)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 3)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 2)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 1)