Interview Q and A 2
Interview Q and A 2
DNS questions
DHCP questions
Active Directory is a network-based object store and service that locates and manages resources, and makes these
resources available to authorized users and groups. An underlying principle of the Active Directory is that
everything is considered an object²people, servers, workstations, printers, documents, and devices. Each object has
certain attributes and its own security access control list (ACL).
2. What is LDAP?
"LDAP is a client-server protocol for accessing a directory service. It was initially used as a front-
end to X.500, but can also be used with stand-alone and other kinds of directory servers."
LDAP lets you "locate organizations, individuals, and other resources such as files and devices in
a network, whether on the Internet or on a corporate intranet," and whether or not you know the
domain name, IP address, or geographic whereabouts. An LDAP directory can be distributed
among many servers on a network, then replicated and synchronized regularly. An LDAP server
is also known as a Directory System Agent (DSA).
LDAP (Lightweight Directory Access Protocol) is a software protocolfor enabling anyone to locate
organizations, individuals, and other resources such as files and devices in a network, whether
on the public Internetor on a corporate intranet. LDAP is a "lightweight" (smaller amount of
code) version of Directory Access Protocol (DAP), which is part of X.500, a standard for
directoryservices in a network. LDAP is lighter because in its initial version it did not include
security features
The root directory (the starting place or the source of the tree), which branches out to
Countries, each of which branches out to
Organizations, which branch out to
Organizational units (divisions, departments, and so forth), which branches out to
(includes an entry for)
Individuals (which includes people, files, and shared resources such as printers)
3. Where is the AD database held? What other folders are related to AD?
System State
As we are all aware that certain tasks needs to be performed by single one, so as far AD 2008
goes some tasks are performed by single domain controller and they jointly called as FSMO
roles.
1. Forest Roles
Schema Master - As name suggests, the changes that are made while creation of any
object in AD or changes in attributes will be made by single domain controller and then it
will be replicated to another domain controllers that are present in your environment.
There is no corruption of AD schema if all the domain controllers try to make changes.
This is one of the very important roles in FSMO roles infrastructure.
Domain Naming Master - This role is not used very often, only when you add/remove
any domain controllers. This role ensures that there is a unique name of domain
controllers in environment.
2. Domain Roles
Infrastructure Master - This role checks domain for changes to any objects. If any
changes are found then it will replicate to another domain controller.
RID Master - This role is responsible for making sure each security principle has a
different identifier.
PDC emulator - This role is responsible for Account policies such as client password
changes and time synchronization in the domain
Seizing of Roles
In case of failures of any server you need to seize the roles. This is how it can be done:
After you have Seize the role, type quit to exit NTDSUtil.
After you have Seize the role, type quit to exit NTDSUtil.
After you have Seize the role, type quit to exit NTDSUtil.
After you have Seize the role, type quit to exit NTDSUtil.
5. What are the new Domain and Forest Functional Levels in Windows
Server 2008/R2?
Windows Server 2008 R2 was released in August, and it introduced new functional levels for Active Directory. This
article takes a look back at the different functional levels of the past and what is new in the latest release of the server
operating system for Active Directory (yes, a recycle bin for AD objects!).
Functional levels were first introduced when Active Directory made its appearance in Windows 2000 Server. They
allowed you to run different versions of domain controllers in your environment, and when all the domain controllers
were brought up to a certain version of Windows, you could raise the functional levels to gain the added features of
that operating system version. Now that Windows 2008 R2 is released, it is unlikely that you will mass deploy this
new operating system to your entire forest or domain. Instead, you’ll deploy a single domain controller and kick the
tires, so to speak. The time will eventually come when you’ve upgraded every domain controller to R2, and at that
point you can raise the functional level to 2008 R2 to take advantage of the new features.
Functional levels can be raised in domains or, as of Windows 2003 Server, in the forest, providing different features
in each. They are differentiated by labeling them Domain Functional Level and Forest Functional Level.
There are two features added when raising the domain functional level to 2008 R2. They are Authentication
Mechanism Assurance and Automatic SPN Management.
Authentication mechanism assurance is meant for domains that utilize federation services (ADFS) or certificate-
based authentication methods, such as smart card or token-based authentication. This mechanism adds information
to the user’s kerberos token on the type of authentication used. This allows administrators to modify group
membership based on how the user authenticates. For example, a user can have access to different resources if they
log in with a certificate versus when they log in with just their username and password.
Automatic SPN management provides a method for managing service accounts for applications such as Exchange,
SQL and IIS. In the past, regular domain accounts were used for these purposes, adding management headaches in
terms of password management and service principle names (SPNs). This new feature provides the following
benefits:
A class of domain accounts can be used to manage and maintain services on local computers.
Passwords for these accounts will be reset automatically.
Do not have to complete complex SPN management tasks to use managed service accounts.
Administrative tasks for managed service accounts can be delegated to non-administrators.
There is one new feature in raising the forest functional level to Server 2008 R2, and it is long overdue. It is the Active
Directory recycle bin. In the days of old, when an IT administrator or help desk operator accidentally deleted an OU
filled with user or computer objects (this has happened more times than you would think), there would be a scramble
to perform a restore. The delete replicates to all domain controllers, so an authoritative restore in Active Directory
restore mode from a good backup using NTDSutil would be in order. With 2008 R2 forest functional level, a
powershell cmd-let will undo this instantly.
Note that this feature is not enabled automatically when raising forest functional level. Additionally, you must run the
following command in the Active Directory Module for Powershell.
The following are the previous functional levels and what features they added, as documented in Technet.
Universal groups are enabled for both distribution groups and security groups.
Group nesting.
Group conversion is enabled, which makes conversion between security groups and distribution groups
possible.
Security identifier (SID) history.
The availability of the domain management tool, Netdom.exe, to prepare for domain controller rename.
Update of the logon time stamp. The lastLogonTimestamp attribute will be updated with the last logon
time of the user or computer. This attribute is replicated within the domain.
The ability to set the userPassword attribute as the effective password on inetOrgPerson and user
objects.
The ability to redirect Users and Computers containers. By default, two well-known containers are provided
for housing computer and user/group accounts: namely, cn=Computers, and cn=Users,. This feature
makes possible the definition of a new well-known location for these accounts.
Makes it possible for Authorization Manager to store its authorization policies in Active Directory Domain
Services (AD DS).
Includes constrained delegation so that applications can take advantage of the secure delegation of user
credentials by means of the Kerberos authentication protocol. Delegation can be configured to be allowed
only to specific destination services.
Supports selective authentication, through which it is possible to specify the users and groups from a trusted
forest who are allowed to authenticate to resource servers in a trusting forest.
Distributed File System (DFS) Replication support for SYSVOL, which provides more robust and detailed
replication of SYSVOL contents.
Advanced Encryption Services (AES 128 and 256) support for the Kerberos authentication protocol.
Last Interactive Logon Information, which displays the time of the last successful interactive logon for a user,
from what workstation, and the number of failed logon attempts since the last logon.
Fine-grained password policies (FGPP), which make it possible for password and account lockout policies to
be specified for users and global security groups in a domain.
Windows 2000:
Forest trust.
Domain rename.
Linked-value replication (changes in group membership store and replicate values for individual members
instead of replicating the entire membership as a single unit). This change results in lower network
bandwidth and processor usage during replication and eliminates the possibility of lost updates when
different members are added or removed concurrently at different domain controllers.
The ability to deploy a read-only domain controller (RODC) that runs Windows Server 2008.
Improved Knowledge Consistency Checker (KCC) algorithms and scalability. The Intersite Topology
Generator (ISTG) uses improved algorithms that scale to support forests with a greater number of sites than
can be supported at the Windows 2000 forest functional level. The improved ISTG election algorithm is a
less intrusive mechanism for choosing the ISTG at the Windows 2000 forest functional level.
An improved ISTG algorithm (better scaling of the algorithm that the ISTG uses to connect all sites in the
forest).
The ability to create instances of the dynamic auxiliary class called dynamicObject in a domain directory
partition.
The ability to convert an inetOrgPerson object instance into a User object instance, and the reverse.
The ability to create instances of the new group types, called application basic groups and Lightweight
Directory Access Protocol (LDAP) query groups, to support role-based authorization.
Deactivation and redefinition of attributes and classes in the schema.
No forest functional level changes occurred from Windows 2003 to Windows 2008.
6. What is the SYSVOL folder?
The Sysvol folder on a Windows domain controller is used to replicate file-based data among
domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT
file system (NTFS) version 5.0 is required on domain controllers throughout a Windows
distributed file system (DFS) forest.
This is a quote from microsoft themselves, basically the domain controller info stored in files like
your group policy stuff is replicated through this folder structure
Active Directory supports application directory partitions. Typically, data in a given application directory
partition is managed through the application that created it or that uses it. Application directory
partitions provide the ability to control the scope of replication and allow the placement of replicas in a
manner more suitable for dynamic data. As a result, the application directory partition provides the
capability of hosting dynamic data in Active Directory, thus allowing ADSI/LDAP access to it, without
significantly impacting network performance. Application directory partitions hold the data that is used
by applications. An application directory partition can contain a hierarchy of any type of objects, except
security principals, and can be configured to replicate to any set of domain controllers in the forest.
Unlike a domain partition, an application directory partition is not required to replicate to all domain
controllers in a domain and the partition can replicate to domain controllers in different domains of the
forest.
As an example of application partition, if you use a Domain Name System (DNS) that is integrated with
Active Directory you have two application partitions for DNS zones — ForestDNSZones and
DomainDNSZones
9. What applications or services use AD application partitions? Name a
couple.
Application directory partitions are usually created by the applications that will use them to store and
replicate data. TAPI is an example it. For testing and troubleshooting purposes, members of the
Enterprise Admins group can manually create or manage application directory partitions using the
Ntdsutil command-line tool.
· A NIC
· Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
Take a System State Backup from another DC and restore locally to the server that are
going to be the next Domain Controller. Run DCPromo /adv which will prompt in the
next screen to specify the path to restore the System Backup. This will prevent
replication of the entire configuration over the slow network.
13.How do you view replication properties for AD partitions and DCs?
The GC is a special form of a Windows 2000 domain controller (DC) that holds a complete set of objects
(i.e., user accounts, contacts, distribution groups, and configuration data) from all domains in a Win2K
forest. The GC stores read-only partial copies of objects from other domains alongside read/write full
copies of objects from the GC's home domain. Partial copies include the important attributes of an
Exchange mailbox (e.g., email address, phone numbers) but not all the mailbox attributes. In a single-
domain implementation, all DCs are effectively GCs, but single-domain implementations are unusual in
large, distributed enterprises. GCs come into their own in large enterprises.
C:\>repadmin /showreps
domain_controller
OR
You can use Replmon.exe for the same purpose.
OR
AD Sites and Services and nslookup gc._msdcs.
To find the in GC from the command line you can try using DSQUERY command.
dsquery server -isgc to find all the gc's in the forest
you can try dsquery server -forest -isgc.
the serverthat holds the primarydomain controller (PDC) emulator role acts as the default time
source foryour entire network.
Each workstation and server in this network will try tolocate a time source for synchronization.
Using an internal algorithm designedto reduce network traffic, systems will make up to six
attempts to find a timesource. Here's a look at the order of these attempts:
To ensure that your servers are finding the proper time, youmust configure your PDC emulator to
receive the time from a valid and accuratetime source. To configure this role, follow these steps:
3. Update the Windows Time Service configuration. At the command line, you can either
enter W32tm /config /update, or you can enter the following:
REPADMIN :
This command-line tool assists administrators in diagnosing replication problems between Windows
domain controllers.Administrators can use Repadmin to view the replication topology (sometimes referred
to as RepsFrom and RepsTo) as seen from the perspective of each domain controller. In addition, Repadmin
can be used to manually create the replication topology (although in normal practice this should not be
necessary), to force replication events between domain controllers, and to view both the replication
metadata and up-to-dateness vectors.
One or more well-connected (highly reliable and fast) TCP/IP subnets. A site allows
administrators to configure Active Directory access and replication topology to take advantage of
the physical network.
B: A Site object in Active Directory represents a physical geographic location that hosts
networks. Sites contain objects called Subnets.[3] Sites can be used to Assign Group Policy
Objects, facilitate the discovery of resources, manage active directory replication, and manage
network link traffic. Sites can be linked to other Sites. Site-linked objects may be assigned a cost
value that represents the speed, reliability, availability, or other real property of a physical
resource. Site Links may also be assigned a schedule.
23.What's the difference between a site link's schedule and interval?
Schedule enables you to list weekdays or hours when the site link is available for replication to
happen in the give interval. Interval is the re occurrence of the inter site replication in given
minutes. It ranges from 15 - 10,080 mins. The default interval is 180 mins.
With in a Site, a Windows server 2003 service known as the KCC automatically
generates a topology for replication among the domain controllers in the domain
using a ring structure.Th Kcc is a built in process that runs on all domain
controllers.
The KCC analyzes the replication topology within a site every 15 minute to
ensure that it still works. If you add or remove a domain controller from the
network or a site, the KCC reconfigures the topology to relect the change.
Intersite Topology Generator (ISTG), which is responsible for the connections among the sites.
By default Windows 2003 Forest level functionality has this role.
By Default the first Server has this role. If that server can no longer preform this role then the
next server with the highest GUID then takes over the role of ISTG.
28.What is GPO?
In the Windows 2000 operating system, a Group Policy Object (GPO) is a collection of settings that
define what a system will look like and how it will behave for a defined group of users. Microsoft
provides a program snap-in that allows you to use the Group Policy Microsoft Management Console
(MMC). The selections result in a Group Policy Object. The GPO is associated with selected Active
Directory containers, such as sites, domains, or organizational units (OUs). The MMC allows you to
create a GPO that defines registry-based polices, security options, software installation and maintenance
options, scripts options, and folder redirection options.
Group Policy gives you administrative control over users and computers in your network. By
using Group Policy, you can define the state of a user's work environment once, and then rely on
Windows Server 2003 to continually force the Group Policy settings that you apply across an
entire organization or to specific groups of users and computers.
Group Policy Container: The GPC is an Active Directory object that contains GPO status,
version information, WMI filter information, and a list of components that have settings in the
GPO. Computers can access the GPC to locate Group Policy templates, and domain controller
does not have the most recent version of the GPO, replication occurs to obtain the latest version
of the GPO.
Group Policy Template: The GPT is a folder hierarchy in the shared SYSVOL folder on a
domain controller. When you create GPO, Windows Server 2003 creates the corresponding GPT
which contains all Group Policy settings and information, including administrative templates,
security, software installation, scripts, and folder redirection settings. Computers connect to the
SYSVOL folder to obtain the settings.
The name of the GPT folder is the Globally Unique Identifier (GUID) of the GPO that you
created. It is identical to the GUID that Active Directory uses to identify the GPO in the GPC.
The path to the GPT on a domain controller is systemroot\SYSVOL\sysvol.
Managing GPOs
To avoid conflicts in replication, consider the selection of domain controller, especially because
the GPO data resides in SYSVOL folder and the Active Directory. Active Directory uses two
independent replication techniques to replicate GPO data among all domain controllers in the
domain. If two administrator's changes can overwrite those made by other administrator, depends
on the replication latency. By default the Group Policy Management console uses the PDC
Emulator so that all administrators can work on the same domain controller.
WMI Filter
WMI filters is use to get the current scope of GPOs based on attributes of the user or computer.
In this way, you can increase the GPOs filtering capabilities beyond the security group filtering
mechanisms that were previously available.
Linking can be done with WMI filter to a GPO. When you apply a GPO to the destination
computer, Active Directory evaluates the filter on the destination computer. A WMI filter has
few queries that active Directory evaluates in place of WMI repository of the destination
computer. If the set of queries is false, Active Directory does not apply the GPO. If set of queries
are true, Active Directory applies the GPO. You write the query by using the WMI Query
Language (WQL); this language is similar to querying SQL for WMI repository.
Also consider how you will implement Group Policy for the organization. Be sure to consider the
delegation of authority, separation of administrative duties, central versus decentralized
administration, and design flexibility so that your plan will provide for ease of use as well as
administration.
Planning GPOs
Create GPOs in way that provides for the simplest and most manageable design -- one in which
you can use inheritance and multiple links.
1:- Local Group Policy object-each computer has exactly one Group Policy object that is stored
locally. This processes for both computer and user Group Policy processing.
2:- Site-Any GPOs that have been linked to the site that the computer belongs to are processed
next. Processing is in the order that is specified by the administrator, on the Linked Group Policy
Objects tab for the site in Group Policy Management Console (GPMC). The GPO with the
lowest link order is processed last, and therefore has the highest precedence.
4:- Organizational units-GPOs that are linked to the organizational unit that is highest in the
Active Directory hierarchy are processed first, then GPOs that are linked to its child
organizational unit, and so on. Finally, the GPOs that are linked to the organizational unit that
contains the user or computer are processed.
At the level of each organizational unit in the Active Directory hierarchy, one, many, or no
GPOs can be linked. If several GPOs are linked to an organizational unit, their processing is in
the order that is specified by the administrator, on the Linked Group Policy Objects tab for the
organizational unit in GPMC. The GPO with the lowest link order is processed last, and
therefore has the highest precedence.
This order means that the local GPO is processed first, and GPOs that are linked to the
organizational unit of which the computer or user is a direct member are processed last, which
overwrites settings in the earlier GPOs if there are conflicts. (If there are no conflicts, then the
earlier and later settings are merely aggregated.)
Windows PowerShell Cmdlets for Group Policy: Ability to manage Group Policy from the Windows
PowerShell™ command line and to run PowerShell scripts during logon and startup
33.What are ADM files? What replaced them in Windows Server 2008?
in Windows Server 2003, then you know that group policies are stored in the .ADM file
format. In Windows Vista and Longhorn Server, this file format has been replaced by
.ADMX file format. The .ADMX file format it is based on XML, whereas .ADM files
used their own proprietary file format.
There are several major differences between the way that .ADMX files and .ADM files
are implemented. One major difference is that while .ADM files were all encompassing,
there are actually two different files used by their .ADMX counterparts. ADMX files are
divided into language neutral files and language specific files. This allows .ADMX files
to be used in a variety of different languages. The language neutral file contains the
actual policy components. The language specific file simply provides the text associated
with the policy in various localizations. For example, you could have English, French,
and Japanese language specific files that all apply to the same language neutral file.
The location in which these files are stored has also changed. In Windows Server 2003,
ADM files were stored in the %systemroot%\inf folder. In Windows Vista and in
Longhorn Server, the language neutral .ADMX files are stored in the %systemroot
%\policyDefinitions folder. The language specific files are stored in a subfolder whose
name reflects the files' localization. For example, language specific files for the English-
language are stored in the %systemroot%\policyDefinition\en-us folder.
34.What's the GPO repository?
1. Group Policy Management Console (GPMC) can provide assistance when you need to
troubleshoot GPO behaviour. It allows you to examine the settings of a specific GPO, and is can
also be used to determine how your GPOs are linked to sites, domains, and OUs. The Group
Policy Results report collects information on a computer and user, to list the policy settings
which are enabled. To create a Group Policy Results report, right-click Group Policy Results, and
select Group Policy Results Wizard on the shortcut menu. This launches the Group Policy Results
Wizard, which guides you through various pages to set parameters for the information that
should be displayed in the Group Policy Results report.
2. Gpresult.exe Click Start > RUN > CMD > gpresult, this will also give you information of applied
group policies.
43.A user claims he did not receive a GPO, yet his user and computer
accounts are in the rightOU, and everyone else there gets the GPO.
What will you look for?
This also can be a reason of slow network, you can change the default setting by using the Group
Policy MMC snap-in. This feature is enabled by default, but you can disable it by using the
following policy: Administrative Templates\System\Logon\Always wait for the network at
computer startup and logon.
Identify which GPOs they correspond to, verify that they are applicable to the computer/user
(based on the output of RSOP.MSC/gpresult)
Information technology (IT) professionals can use Active Directory Recycle Bin to undo an accidental
deletion of an Active Directory object. Accidental object deletion causes business downtime. Deleted users
cannot log on or access corporate resources. This is the number one cause of Active Directory recovery
scenarios. Active Directory Recycle Bin works for both AD DS and Active Directory Lightweight Directory
Services (AD LDS) objects. This feature is enabled in AD DS at the Windows Server 2008 R2 forest
functional level. For AD LDS, all replicas must be running in a new "application mode." For more
information, see What's New in AD DS: Active Directory Recycle Bin.
Active Directory module for Windows PowerShell and Windows PowerShell™ cmdlets
The Active Directory module for Windows PowerShell provides command-line scripting for administrative,
configuration, and diagnostic tasks, with a consistent vocabulary and syntax. It provides predictable
discovery and flexible output formatting. You can easily pipe cmdlets to build complex operations. The
Active Directory module enables end-to-end manageability with Exchange Server, Group Policy, and other
services. For more information, see What's New in AD DS: Active Directory Module for Windows
PowerShell.
The Active Directory Best Practices Analyzer (BPA) identifies deviations from best practices to help IT
professionals better manage their Active Directory deployments. BPA uses Windows PowerShell cmdlets to
gather run-time data. It analyzes Active Directory settings that can cause unexpected behavior. It then
makes Active Directory configuration recommendations in the context of your deployment. The Active
Directory BPA is available in Server Manager. For more information, see What's New in AD DS: Active
Directory Best Practices Analyzer.
Active Directory Web Services (ADWS) provides a Web service interface to Active Directory domains and
AD LDS instances, including snapshots, that are running on the same Windows Server 2008 R2 server as
ADWS. For more information, see What's New in AD DS: Active Directory Web Services.
Authentication mechanism assurance makes it possible for applications to control resource access based
on authentication strength and method. Administrators can map various properties, including
authentication type and authentication strength, to an identity. Based on information that is obtained
during authentication, these identities are added to Kerberos tickets for use by applications. This feature is
enabled at the Windows Server 2008 R2domain functional level. For more information, see What's New in
AD DS: Authentication Mechanism Assurance.
Offline domain join makes provisioning of computers easier in a datacenter. It provides the ability to
preprovision computer accounts in the domain to prepare operating system images for mass deployment.
Computers are joined to the domain when they first start. This reduces the steps and time necessary to
deploy computers in a datacenter. For more information, see What's New in AD DS: Offline Domain Join.
Managed Service Accounts provide simple management of service accounts. At the Windows Server 2008
R2 domain functional level, this feature provides better management of service principal names (SPNs).
Managed Service Accounts help lower total cost of ownership (TCO) by reducing service outages (for
manual password resets and related issues). You can run one Managed Service Account for each service
that is running on a server, without any human intervention for password management. For more
information, see the Service Accounts Step-by-Step Guide (http://go.microsoft.com/fwlink/?
LinkId=134695).
The Active Directory Management Pack enables proactive monitoring of availability and performance of AD
DS. It discovers and detects computer and software states, and it is aligned with the health state
definitions. The Active Directory Management Pack works with Windows Server 2008 and Windows Server
2008 R2 and Microsoft® Systems Center Operations Manager 2007.
The bridgehead server selection process enables domain controllers to load balance incoming connections.
The new logic for bridgehead server selection allows for even distribution of workload among bridgehead
servers. For more information see, Bridgehead Server Selection (http://go.microsoft.com/fwlink/?
LinkId=208721).
Starting in Windows Server 2008 R2, Active Directory now implements a true recycle bin. No longer will you
need an authoritative restore to recover deleted users, groups, OU’s, or other objects. Instead, it is now
possible to use PowerShell commands to bring back objects with all their attributes, backlinks, group
memberships, and metadata. AD Recycle Bin (ADRB) was a long time coming and it definitely has its
idiosyncrasies
This feature is currently known as the “Database Mounting Tool” (DMT), which is better than the previous name of
“Data Mining Tool”. Who knows what we’ll end up calling this at RTM, but I like the previous name “Snapshot Viewer”
the best so this is what I entitled the post.
DMT allows you to quickly take snapshots of your AD database at any point in time and view those snapshots using
the LDP viewer of your choice. At first I was extremely excited about this feature, but after realizing the command-line
action you have to go through in order to do this (see below), it killed my buzz a little bit. If you compare this to
automating ldifde/csvde backups of your AD, I can see these advantages to snapshots:
You can mount a snapshot and attach GUI LDP tools to it. Ldifde/csvde method doesn’t do this.
You can “backup” the entire database in one shot. Ldifde/csvde only allows a single DN or partition per shot.
The ldifde/csvde dump of your entire partition is in clear text and snapshots are not. However, from a
security standpoint there’s not much difference considering if someone has the snapshot file they can also
open it up but not as easily.
62.What tool would I use to try to grab security related packets from the
wire?
you must use sniffer-detecting tools to help stop the snoops. ...
A good packet sniffer would be "ethereal
(wireshark, tcpdump)
You frequently backup the system state data on domain controllers so that you can restore the
most current data. By establishing a regular backup schedule, you have a better chance of
recovering data when necessary.
To ensure a good backup includes at least the system state data and contents of the system
disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any
backup older than 60 days is not a good backup. Plan to backup at least two domain
controllers in each domain, one of at least one backup to enable an authoritative restore of the
data when necessary.
Active Directory system state data does not contain Active Directory unless the server, on
which you are backing up the system state data, is a domain controller. Active Directory is
present only on domain controllers.
The SYSVOL shared folder: This shared folder contains Group policy templates and logon
scripts. The SYSVOL shared folder is present only on domain controllers.
The Registry: This database repository contains information about the computer's
configuration.
System startup files: Windows Server 2003 requires these files during its initial startup phase.
They include the boot and system files that are under windows file protection and used by
windows to load, configure, and run the operating system.
The COM+ Class Registration database: The Class registration is a database of information
about Component Services applications.
The Certificate Services database: This database contains certificates that a server running
Windows server 2003 uses to authenticate users. The Certificate Services database is present
only if the server is operating as a certificate server.
System state data contains most elements of a system's configuration, but it may not include
all of the information that you require recovering data from a system failure. Therefore, be
sure to backup all boot and system volumes, including the System State, when you back up
your server.
Restoring Active Directory
In Windows Server 2003 family, you can restore the Active Directory database if it becomes
corrupted or is destroyed because of hardware or software failures. You must restore the
Active Directory database when objects in Active Directory are changed or deleted.
Active Directory restore can be performed in several ways. Replication synchronizes the
latest changes from every other replication partner. Once the replication is finished each
partner has an updated version of Active Directory. There is another way to get these latest
updates by Backup utility to restore replicated data from a backup copy. For this restore you
don't need to configure again your domain controller or no need to install the operating
system from scratch.
Primary restore: This method rebuilds the first domain controller in a domain when there is
no other way to rebuild the domain. Perform a primary restore only when all the domain
controllers in the domain are lost, and you want to rebuild the domain from the backup.
Members of Administrators group can perform the primary restore on local computer, or user
should have been delegated with this responsibility to perform restore. On a domain
controller only Domain Admins can perform this restore.
Normal restore: This method reinstates the Active Directory data to the state before the
backup, and then updates the data through the normal replication process. Perform a normal
restore for a single domain controller to a previously known good state.
Authoritative restore: You perform this method in tandem with a normal restore. An
authoritative restore marks specific data as current and prevents the replication from
overwriting that data. The authoritative data is then replicated through the domain.
Perform an authoritative restore individual object in a domain that has multiple domain
controllers. When you perform an authoritative restore, you lose all changes to the restore
object that occurred after the backup. Ntdsutil is a command line utility to perform an
authoritative restore along with windows server 2003 system utilities. The Ntdsutil
command-line tool is an executable file that you use to mark Active Directory objects as
authoritative so that they receive a higher version recently changed data on other domain
controllers does not overwrite system state data during replication.
-or-
o To reset the password for another server, type reset password on server servername,
where servername is the DNS name for the server on which you are resetting the DSRM
password. Type the new password when you are prompted. Note that no characters
appear while you type the password.
4. At the DSRM command prompt, type q.
5. At the Ntdsutil command prompt, type q to exit.
You can configure different server roles for your DNS servers. The server role that you configure
for a name server affects the following operations of the server:
Whether the DNS data in the database file can be directly edited.
In DNS, a standard primary DNS server is the authoritative DNS server for a DNS zone. There
are a number of zones used in Windows Server 2003 DNS:
Primary zone: This is only zone type that can be directly updated or edited because the
data in the zone is the original source of the data for all domains in the zone. Updates
made to the primary zone are made by the DNS server that is authoritative for the specific
primary zone.
Secondary zone: This is a read-only copy of the zone that was copied from the master
server during zone transfer
Active Directory-integrated zone: This is an authoritative primary zone that stores its data
in Active Directory. Active Directory-integrated zones can be regarded as enhanced
standard primary zones.
Stub zone: Stub zones only contain those resource records necessary to identify the
authoritative DNS servers for the master zone
Standard secondary DNS servers are usually implemented to provide a number of features for
the DNS environment, including:
Provide redundancy: It is recommended to install one primary DNS server, and one
secondary DNS server for each DNS zone (minimum requirement). Install the DNS
servers on different subnets so that if one DNS server fails, the other DNS server can
continue to resolve queries.
Provide fast access for clients in remote locations: Secondary DNS servers can also
assist in preventing clients from transversing slow links for name resolution requests.
In addition to two server roles just mentioned, you can als configure the DNS server as a DNS
forwarder, or as a caching-only DNS server. The remainder of this Article focuses on the
different DNS server roles that you can configure for your DNS servers.
A DNS primary server is created when a new primary zone is added. The primary server that is
created becomes the mechanism for updating the specific primary zone.
When a query is sent to the standard primary DNS server for name resolution, the following
events take place:
1. The request for name resolution is sent to the primary DNS server.
2. The primary DNS server compares the requested name to the information it contains in
its local zone database.
3. If the primary DNS server locates a match for the queried name, the requested
information is returned to the client.
4. If the DNS server cannot find a matching record in its local zone database file, the DNS
server then attempts a number of name resolution methods to resolve the request on
behalf of the client.
5. If all attempts for name resolution in unsuccessful, the DNS server returns an error
message to the client.
Secondary DNS servers are usually implemented to provide fault tolerance, provide fast access
for clients in remote locations, and to distribute the DNS server processing load evenly. If a
secondary DNS server is implemented, that DNS server can continue to handle queries when the
primary DNS becomes unavailable. Secondary DNS servers also assist in reducing the
processing load of the primary DNS server. It is recommended to install at least one primary
DNS server, and one secondary DNS server for each DNS zone.
A secondary DNS server obtains its data from the primary DNS server's zone database, as a copy
of that database. During zone transfer, the primary DNS server's zone database is replicated to
the secondary DNS server. A secondary DNS server cannot make changes to its zone
information. All changes have to be made on the primary zone, and then have to be replicated to
the secondary DNS server through DNS zone transfer.
DNS Notify is a mechanism that enables a primary DNS server to inform secondary DNS servers
when its database has been updated. The mechanism informs the secondary DNS servers when
they need to initiate a zone transfer so that the updates of the primary DNS server can be
replicated to them. When a secondary DNS server receives the notification from the primary
DNS server, it can start an incremental zone transfer or a full zone transfer to pull zone changes
from the primary DNS server.
The information stored by caching-only DNS servers is the name resolution data that it
has collected through name resolution queries.
A caching-only DNS server just performs queries and then stores the results of these queries. All
information stored on the caching-only DNS server is therefore only that data which has been
cached while the server performed queries. Caching-only DNS servers only cache information
when the queries have been resolved.
when a caching-only DNS servers starts or the first time, it has no cached information. The
caching-only DNS server collects information as it sends and resolves queries. One of the main
advantages of implementing caching-only DNS servers is that they are excluded from the zone
transfer process, and therefore do not generate network traffic from zone transfers.
5. In the Networking Services dialog box, select the checkbox for Domain Name System
(DNS) in the list.
6. Click OK. Click Next.
7. Click Finish.
8. Do not add or configure any zones for the DNS server. The DNS Server service functions
as a caching-only DNS server by default. This basically means no configuration is
necessary to set up a caching-only DNS server.
9. You should verify that the server root hints are configured correctly.
2. In the console tree, find and select the DNS server that you want to create a new DNS
zone.
5. Select the zone type that you want to create. The options are:
o Stub, to create a copy of zone but for only the NS record, SOA record, and the
glue A record.
7. To integrate the new zone with Active Directory, and if the DNS server is a domain
controller; then you can select the Store the zone in Active Directory (available only if
DNS server is a domain controller) checkbox.
8. Click Next.
9. On the Active Directory Zone Replication Scope page, accept the default setting for DNS
replication: To all domain controllers in the Active Directory domain. Click Next.
10. Select the Forward lookup zone option on the following page which is displayed by the
New Zone Wizard, and then click Next.
11. Enter a zone name for the new zone. Click Next.
The options that you can select on the following page with regar to dynamic updates are:
o Allow only secure dynamic updates (recommended for Active Directory) option:
This option is only available if you are using Active Directory-integrated zones.
o Allow both non-secure and secure dynamic updates option: Select this option with
caution!
o Do not allow dynamic updates option: You have to manually update zone
information and resource records.
12. Choose the best option for your circumstance, and then click Next.
13. Click Finish to add the new zone to your DNS server.
1. Click Start, Administrative Tools, and then click DNS to open the DNS console.
2. In the console tree, expand the DNS server node that contains the authoritative zone that
you want to work with.
5. Right-click the zone, and then select Properties on the shortcut menu.
6. When the Zone's Properties dialog box opens, leave the General tab displayed.
o None
o Secure only
2. In the left pane, expand the HKEY_LOCAL_MACHINE key, expand System, expand
CurrentControlSet, and then expand Services.
5. To disable dynamic updates for the host computer, click the Parameters node. In the
details pane, double-click the DisableDynamicUpdate entry. Change the value data of
DisableDynamicUpdate to 1 to disable dynamic updates. Click OK.
6. To disable dynamic updates for a single interface, expand the Parameters node, and then
expand the Interface node. Select the interface, and then double-click the
DisableDynamicUpdate entry in the details pane. Change the value data of
DisableDynamicUpdate to 1 to disable dynamic updates. Click OK.
2. In the console tree, right-click the DNS server that you want to test and then select
Properties on the shortcut menu.
3. When the DNS Server's Properties dialog box opens, click the Monitoring tab.
4. You can choose to perform a simple query test, a recursive query test, or you can specify
that the DNS server automatically performs testing at an interval that you set.
5. In the Select A Test Type area of the Monitoring tab, select the A Simple Query Against
This DNS Server checkbox.
7. The Test Results area of the tab displays the results of the test.
8. Click OK.
81.You want to look at the RID allocation table for a DC. What do you
need to do?
2.In Command prompt type dcdiag /test:ridmanager /s:system1 /v (system1 is the name of our
DC)
82.What's the difference between transferring a FSMO role and seizing
one? Which one shouldyou NOT seize? Why?
Seizing an FSMO can be a destructive process and should only be attempted if the existing server with
the FSMO is no longer available.
If the domain controller that is the Schema Master FSMO role holder is temporarily unavailable, DO NOT
seize the Schema Master role.
If you are going to seize the Schema Master, you must permanently disconnect the current Schema
Master from the network.
If you seize the Schema Master role, the boot drive on the original Schema Master must be completely
reformatted and the operating system must be cleanly installed, if you intend to return this computer to
the network.
NOTE: The Boot Partition contains the system files (\System32). The System Partition is the partition that
contains the startup files, NTDetect.com, NTLDR, Boot.ini, and possibly Ntbootdd.sys.
The Active Directory Installation Wizard (Dcpromo.exe) assigns all 5 FSMO roles to the first domain
controller in the forest root domain. The first domain controller in each new child or tree domain is
assigned the three domain-wide roles. Domain controllers continue to own FSMO roles until they are
reassigned by using one of the following methods:
The current role holder is operational and can be accessed on the network by the new FSMO
owner.
You are gracefully demoting a domain controller that currently owns FSMO roles that you want
to assign to a specific domain controller in your Active Directory forest.
The domain controller that currently owns FSMO roles is being taken offline for scheduled
maintenance and you need specific FSMO roles to be assigned to a "live" domain controller. This
may be required to perform operations that connect to the FSMO owner. This would be
especially true for the PDC Emulator role but less true for the RID master role, the Domain
naming master role and the Schema master roles.
The current role holder is experiencing an operational error that prevents an FSMO-dependent
operation from completing successfully and that role cannot be transferred.
A domain controller that owns an FSMO role is force-demoted by using the dcpromo
/forceremoval command.
The operating system on the computer that originally owned a specific role no longer exists or
has been reinstalled.
As replication occurs, non-FSMO domain controllers in the domain or forest gain full knowledge of
changes that are made by FSMO-holding domain controllers. If you must transfer a role, the best
candidate domain controller is one that is in the appropriate domain that last inbound-replicated, or
recently inbound-replicated a writable copy of the "FSMO partition" from the existing role holder. For
example, the Schema master role-holder has a distinguished name path of
CN=schema,CN=configuration,dc=<forest root domain>, and this mean that roles reside in and are
replicated as part of the CN=schema partition. If the domain controller that holds the Schema master
role experiences a hardware or software failure, a good candidate role-holder would be a domain
controller in the root domain and in the same Active Directory site as the current owner. Domain
controllers in the same Active Directory site perform inbound replication every 5 minutes or 15 seconds.
A domain controller whose FSMO roles have been seized should not be permitted to communicate with
existing domain controllers in the forest. In this scenario, you should either format the hard disk and
reinstall the operating system on such domain controllers or forcibly demote such domain controllers on
a private network and then remove their metadata on a surviving domain controller in the forest by
using the ntdsutil /metadata cleanup command. The risk of introducing a former FSMO role holder
whose role has been seized into the forest is that the original role holder may continue to operate as
before until it inbound-replicates knowledge of the role seizure. Known risks of two domain controllers
owning the same FSMO roles include creating security principals that have overlapping RID pools, and
other problems.
Back to the top
To transfer the FSMO roles by using the Ntdsutil utility, follow these steps:
Note To see a list of available commands at any one of the prompts in the Ntdsutil utility, type ?,
and then press ENTER.
4. Type connections, and then press ENTER.
5. Type connect to server servername, and then press ENTER, where servername is the name of
the domain controller you want to assign the FSMO role to.
6. At the server connections prompt, type q, and then press ENTER.
7. Type transfer role, where role is the role that you want to transfer. For a list of roles that you
can transfer, type ? at the fsmo maintenance prompt, and then press ENTER, or see the list of
roles at the start of this article. For example, to transfer the RID master role, type transfer rid
master. The one exception is for the PDC emulator role, whose syntax is transfer pdc, not
transfer pdc emulator.
8. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil
prompt. Type q, and then press ENTER to quit the Ntdsutil utility.
To seize the FSMO roles by using the Ntdsutil utility, follow these steps:
1. Log on to a Windows 2000 Server-based or Windows Server 2003-based member computer or
domain controller that is located in the forest where FSMO roles are being seized. We
recommend that you log on to the domain controller that you are assigning FSMO roles to. The
logged-on user should be a member of the Enterprise Administrators group to transfer schema
or domain naming master roles, or a member of the Domain Administrators group of the
domain where the PDC emulator, RID master and the Infrastructure master roles are being
transferred.
2. Click Start, click Run, type ntdsutil in the Open box, and then click OK.
3. Type roles, and then press ENTER.
4. Type connections, and then press ENTER.
5. Type connect to server servername, and then press ENTER, where servername is the name of
the domain controller that you want to assign the FSMO role to.
6. At the server connections prompt, type q, and then press ENTER.
7. Type seize role, where role is the role that you want to seize. For a list of roles that you can
seize, type ? at the fsmo maintenance prompt, and then press ENTER, or see the list of roles at
the start of this article. For example, to seize the RID master role, type seize rid master. The one
exception is for the PDC emulator role, whose syntax is seize pdc, not seize pdc emulator.
8. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil
prompt. Type q, and then press ENTER to quit the Ntdsutil utility.
Notes
o Under typical conditions, all five roles must be assigned to "live" domain controllers in
the forest. If a domain controller that owns a FSMO role is taken out of service before its
roles are transferred, you must seize all roles to an appropriate and healthy domain
controller. We recommend that you only seize all roles when the other domain
controller is not returning to the domain. If it is possible, fix the broken domain
controller that is assigned the FSMO roles. You should determine which roles are to be
on which remaining domain controllers so that all five roles are assigned to a single
domain controller. For more information about FSMO role placement, click the
following article number to view the article in the Microsoft Knowledge Base: 223346
(http://support.microsoft.com/kb/223346/ ) FSMO placement and optimization on
Windows 2000 domain controllers
o If the domain controller that formerly held any FSMO role is not present in the domain
and if it has had its roles seized by using the steps in this article, remove it from the
Active Directory by following the procedure that is outlined in the following Microsoft
Knowledge Base article: 216498 (http://support.microsoft.com/kb/216498/ ) How to
remove data in active directory after an unsuccessful domain controller demotion
o Removing domain controller metadata with the Windows 2000 version or the Windows
Server 2003 build 3790 version of the ntdsutil /metadata cleanup command does not
relocate FSMO roles that are assigned to live domain controllers. The Windows Server
2003 Service Pack 1 (SP1) version of the Ntdsutil utility automates this task and removes
additional elements of domain controller metadata.
o Some customers prefer not to restore system state backups of FSMO role-holders in
case the role has been reassigned since the backup was made.
o Do not put the Infrastructure master role on the same domain controller as the global
catalog server. If the Infrastructure master runs on a global catalog server it stops
updating object information because it does not contain any references to objects that
it does not hold. This is because a global catalog server holds a partial replica of every
object in the forest.
1. Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Sites
and Services.
2. Double-click Sites in the left pane, and then locate the appropriate site or click Default-first-site-
name if no other sites are available.
3. Open the Servers folder, and then click the domain controller.
4. In the domain controller's folder, double-click NTDS Settings.
5. On the Action menu, click Properties.
6. On the General tab, view the Global Catalog check box to see if it is selected.
2. What is LDAP?
LDAP stands for Light Weight Directory Access Protocol which provide simple read and
write access to the directory over Transport protocol such as TCP, similar to but
lighter than X.500. Just like RDBMS LDAP has adopted Client- Server Models and the
directory is top-bottom hierarchical structure. Microsoft Active Directory and Novell
Network Directory is best example of LDAP implementation. LDAP listen to port 389.
3. Where is the AD database held? What other folders are related to AD?
In LDAP, like X.500, the servers that host the copies of the information base are
called Directory Service Agent. DSA can host full or the partial information base. The
portion of the information base which forms a hierarchy is called DIT. The very top of
the hierarchy has the single object which is not the part of LDAP specification rather
it is defined by DNS name space.
The Directory Information Base can be separated into parts called naming contexts, or
NCs. In Active Directory, each domain represents a separate naming context. Domain
controllers in the same domain have a read/write replica of that Domain naming
context. Configuration and Schema objects are stored in their own naming contexts,
as are DNS Record objects when using Active Directory Integrated DNS zones.
When a client submits a query for information about a particular object, the system
must determine which DSA hosts the naming context that contains the particular
object. It does this using the object’s distinguished name and knowledge about the
directory topology.
If a DSA cannot respond to a query using information in the naming contexts it hosts,
it sends the client a referral to a DSA hosting the next higher or lower naming context
in the tree (depending on the distinguished name of the object in the search). The
client then submits the request to a DSA hosting the naming context in the referral.
This DSA either responds with the information being requested or a referral to
another DSA. This is called walking the tree.
DSA that host the copies of the same naming context must replicate changes to each
other. It’s important to keep this in mind as you work with Active Directory servers. If
you have separate domains, then clients in one domain must walk the tree to get
access to Active Directory objects in another domain. If the domain controllers for the
domains are in different locations in the WAN, this can slow performance. Many of the
architectural decisions you’ll make as you design your system focus on the location,
accessibility, and reliability of naming contexts
Global catalog is the central repository which stores the partial replica of every
object’s information in the directory but with only few attributes which is know is
Partial Attribute Sets (PAS). The information stored in Global Catalog is read-only.
However GC server stores full writable copies of the schema and configuration
directory partitions- the same as any domain controller. By default the first DC in the
First Domain in the First Tree in AD forest is configured as GC. Another DC can be set
as global catalog server from Active Directory Sites and Services snap-in. When client
request the searches to GC server the queries are directed to port 3268 which
indicates that Global Catalog semantics is required.
With too many DCs are configured to become the GC servers, it will cause the
replication overhead between the DCs across the forest.
11. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is
REPADMIN?
Sites in Active Directory are the physical network structure of Active Directory based
on subnet or subnets. Each site in Active Directory resembles well connected network.
It is sometimes referred as physical structure of AD. Depending upon the locations and
connection quality sites are created which include a domain or domains. Creating
these sites lets you control replication traffic over WAN links. In a way Sites help
define the AD’s replication topology.
Site link allow the connections between two or more sites define. Site link is
configured under two different protocols IP and SMTP. The most commonly used
default protocol IP under reliable connections. SMTP is often used under poor network
connections.
15. What’s the difference between a site link’s schedule and interval?
Schedule enables you to list weekdays or hours when the site link is available for
replication to happen in the give interval. Interval is the reoccurrence of the inter
site replication in given minutes. It range from 15 – 10,080 mins. The default interval
is 180 mins.
KCC is Knowledge Consistency Checker, which creates the connection object that
links the DCs into common replication topology and dictates the replication routes
between one DC to another in Active Directory forest. The default run interval is 15
mins. There are two type of algorithm of KCC - Intrasite KCC – which is responsible for
the connection within the site, and Intersite Topology Generator (ISTG) – which is
responsible for the connections among the sites.
Intersite Topology Generator (ISTG), which is responsible for the connections among
the sites. By default Windows 2003 Forest level functionality has this role.
This is one of the significant changes made AD 2003. In Windows 2000 the slight
change made within multi value attributes, every single value is replicated causing
clog in network bandwidth. However in AD 2003, when changes are made in single
value under multi value attributes only single entity get replicated. For example, if
the new user is created under the security group containing 1000 of users, instead of
replicating all 1000 users as in Win2K, Linked Value Replication allow replicating the
newly created use only.
19. What is cached credential?
In the event when the client machines are not able to contact their Global Catalog
server in there domain during logon process, locally cached credentials from the
previous successful logon will be used to authenticate each unique user to the local
machine. This is also know is Domain cached credentials and is processed by Local
Security Authority (LSA). By default number of cached logon information is 10 and it
can be set from 0 to 50 in registry.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\Winlogon\
CachedLogonsCounts.
21. What can you do to promote a server to DC if you’re in a remote location with
slow WAN link?
Take a System State Backup from another DC and restore locally to the server that are
going to be the next Domain Controller. Run DCPromo /adv which will prompt in the
next screen to specify the path to restore the System Backup. This will prevent
replication of the entire configuration over the slow network.
22. How can you forcibly remove AD from a server, and what do you do later?
DCPromo /Forceremoval. Though this command will seize the Domain Controller role,
we have to use NTDSUTIL to cleanup the metadata.
This is the number of days before the object marked for deletion in the Active
Directory is permanently deleted. The default is 180 days in Windows 2003 with SP1
and 60 days in Windows 2000 and Windows 2003 without SP1. During Tombstone
lifetime the object mark for deletion stays in Deleted Object folder and every 15 mins
Garbage collector comes along to check if the tombstone lifetime of expired for any
objects. If found the object/objects will be permanently deleted.
The Tombstone Lifetime can be changed by using the ADSIEdit tool. Right click on the
CN=Directory Service folder and select Properties. Find Tombstone Lifetime in the
attribute list, click the Edit button and enter the number of days in the value field. Or
you can use dsquery as: dsquery * "CN=DirectoryService, CN=WindowsNT,CN=Services,
CN=Configu ration, DC=yourdomain, DC=com" -scope base -attr tombstonelifetime
DHCP Server Interview Questions and
Answers
1. What is DHCP?
DHCP stands for "Dynamic Host Configuration Protocol".
2.What is DHCP's purpose?
DHCP's purpose is to enable individual computers on an IP network to extract
their configurations from a server (the 'DHCP server') or servers, in particular,
servers that have no exact information about the individual computers until
they
request the information. The overall purpose of this is to reduce the work
necessary to administer a large IP network. The most significant piece of
information distributed in this manner is the IP address.
3. Can DHCP work with AppleTalk or IPX?
No, it is too tied to IP. Furthermore, they don't need it since they have always
had automated mechanisms for assigning their own network addresses.
4. Who Created It? How Was It Created?
DHCP was created by the Dynamic Host Configuration Working Group of the
Internet Engineering Task Force (IETF; a volunteer organization which defines
protocols for use on the Internet). As such, it's definition is recorded in an
Internet RFC and the Internet Activities Board (IAB) is asserting its status as
to
Internet Standardization. As of this writing (June 1998), DHCP is an Internet
Draft Standard Protocol and is Elective. BOOTP is an Internet Draft Standard
subnet and plug it into another and have it come alive immediately, it having
been reconfigured automatically. In conjunction to Dynamic DNS, it could
automatically be given its same name in its new place. VLAN-capable LAN
equipment with dynamic VLAN assignment allows you to configure things so a
client computer can be plugged into any port and have the same IP number
(as
well as name) and be on the same subnet. The VLAN-capable network either
has
its own configuration that lists which MAC addresses are to belong to each
VLAN,
or it makes the determination from the source IP address of the IP packets
that
the client computer sends. Some differences in the two approaches:
•
DHCP handles changes by reconfiguring the client while a VLAN-
capable
network handles it by reconfiguring the network port the client is moved to.
•
DHCP dynamic reconfiguration requires a DHCP server, forwarding
agent
in each router, and DHCP capability in each client's TCP/IP support. The
analogous capability in VLANs requires that all hubs throughout the
network be VLAN-capable, supporting the same VLAN scheme. To this
point VLAN support is proprietary with no vendor interoperability, but
standards are being developed.
•
DHCP can configure a new client computer for you while a VLAN-
capable
network can't.
•
DHCP is generally aimed at giving "easy moves" capability to networks
that are divided into subnets on a geographical basis, or on separate
functional and unique IP number into the hands of the computers that make
use
of the Internet.
9. What is a MAC address?
A MAC address (also called an Ethernet address or an IEEE MAC address) is a
number (typically written as twelve hexadecimal digits, 0 through 9 and A
through F, or as six hexadecimal numbers separated by periods or colons, i.e.
0080002012ef, 0:80:0:2:20:ef) which uniquely identifes a computer that has
an
Ethernet interface. Unlike the IP number, it includes no indication of where
your
computer is located. In DHCP's typical use, the server uses a requesting
computer's MAC address to uniquely identify it.
10. What is a DHCP lease?
A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its
administrator to set the lease time.
11. What is a Client ID?
What is termed the Client ID for the purposes of the DHCP protocol is
whatever
is used by the protocol to identify the client computer. By default, DHCP
implementations typically employ the client's MAC address for this purpose,
but
the DHCP protocol allows other options. Some DHCP implementations have a
setup option to specify the client ID you want. One alternative to the MAC
address is simply a character string of your choice. In any case, in order for
DHCP to function, you must be certain that no other client is using the client
ID
you choose, and you must be sure the DHCP server will accept it.
12.Can DHCP support statically defined addresses?
Yes. At least there is nothing in the protocol to preclude this and one expects
it
to be a feature of any DHCP server. This is really a server matter and the
client
should work either way. The RFC refers to this as manual allocation.
13. How does DHCP and BOOTP handle multiple subnets?
For the situations where there is more than one LAN, each with its own
subnet
number, there are two ways. First of all, you can set up a seperate server on
each subnet. Secondly, a feature of some routers known as "BOOTP
forwarding"
to forward DHCP or BOOTP requests to a server on another subnet and to
forward the replies back to the client. The part of such a router (or server
acting
as a router) that does this is called a "BOOTP forwarding agent". Typically you
have to enable it on the interface to the subnet to be served and have to
configure it with the IP address of the DHCP or BOOTP server. On a Cisco
router,
the address is known as the "UDP Helper Address".
14. Can a BOOTP client boot from a DHCP server?
Only if the DHCP server is specifically written to also handle BOOTP queries.
such communications servers could also support the use of DHCP to acquire
the
IP addressees to give out.
The DHCP protocol is capable of allocating an IP address to a device without
an
IEEE-style MAC address, such as a computer attached through SLIP or PPP,
but
to do so, it makes use of a feature which may or may not be supported by the
DHCP server: the ability of the server to use something other than the MAC
address to identify the client. Communications servers that acquire IP
numbers
for their clients via DHCP run into the same roadblock in that they have just
one
MAC address, but need to acquire more than one IP address. One way such a
communications server can get around this problem is through the use of a
set
of unique pseudo-MAC addresses for the purposes of its communications with
the DHCP server. Another way (used by Shiva) is to use a different "client ID
type" for your hardware address. Client ID type 1 means you're using MAC
addresses. However, client ID type 0 means an ASCII string.
23.How can I relay DHCP if my router does not support it?
A server on a net(subnet) can relay DHCP or BOOTP for that net. Microsoft
has
software to make Windows NT do this.
24.What is DHCP Spoofing?
These are independent "features": a particular server can offer or not offer
any
of them:
•
Manual allocation: the server's administrator creates a configuration
for
the server that includes the MAC address and IP address of each DHCP
client that will be able to get an address: functionally equivalent to
BOOTP though the protocol is incompatible.
•
Automatic allocation: the server's administrator creates a configuration
for the server that includes only IP addresses, which it gives out to
clients. An IP address, once associated with a MAC address, is
permanently associated with it until the server's administrator intervenes.
•
Dynamic allocation: like automatic allocation except that the server
will
track leases and give IP addresses whose lease has expired to other
DHCP clients.
Other features which a DHCP server may or may not have:
•
Support for BOOTP clients.
•
Support for the broadcast bit.
•
Administrator-settable lease times.
•
Administrator-settable lease times on manually allocated addresses.
•
Ability to limit what MAC addresses will be served with dynamic
addresses.
•
Allows administrator to configure additional DHCP option-types.
•
Interaction with a DNS server. Note that there are a number of
interactions that one might support and that a standard set & method is
in the works.
•
Interaction with some other type of name server, e.g. NIS.
•
Allows manual allocation of two or more alternative IP numbers to a
single MAC address, whose use depends upon the gateway address
through which the request is relayed.
•
Ability to define the pool/pools of addresses that can be allocated
dynamically. This is pretty obvious, though someone might have a server
that forces the pool to be a whole subnet or network. Ideally, the server
does not force such a pool to consist of contiguous IP addresses.
•
Ability to associate two or more dynamic address pools on separate IP
networks (or subnets) with a single gateway address. This is the basic
support for "secondary nets", e.g. a router that is acting as a BOOTP
relay for an interface which has addresses for more than one IP network
or subnet.
•
Ability to configure groups of clients based upon client-supplied user
and/or vendor class. Note: this is a feature that might be used to assign
different client-groups on the same physical LAN to different logical
subnets.
•
Administrator-settable T1/T2 lengths.
•
Interaction with another DHCP server. Note that there are a number of
interactions that one might support and that a standard set & method is
in the works.
•
Use of PING (ICMP Echo Request) to check an address prior to
dynamically allocating it.
•
Server grace period on lease times.
•
Ability to force client(s) to get a new address rather than renew.
DHCP Discovery:
The client broadcasts on the local physical subnet to find available servers.
Network
administrators can configure a local router to forward DHCP packets to a
DHCP server on a
different subnet. This client-implementation creates a UDP packet with the
broadcast
destination of 255.255.255.255 or subnet broadcast address and also
requests its last-known
IP address (in the example below, 192.168.1.100) although the server may
ignore this optional
parameter....
DHCP Offers:
When a DHCP server receives an IP lease request from a client, it extends an
IP lease offer.
This is done by reserving an IP address for the client and broadcasting a
DHCPOFFER message
across the network. This message contains the client's MAC address, followed
by the IP
address that the server is offering, the subnet mask, the lease duration, and
the IP address of
the DHCP server making the offer.
The server determines the configuration, based on the client's hardware
address as specified in
the CHADDR field. Here the server, 192.168.1.1, specifies the IP address in
the YIADDR field.
DHCP Requests:
Whenever a computer comes on line, it checks to see if it currently has an IP
address leased. If
it does not, it requests a lease from a DHCP server. Because the client
computer does not know
the address of a DHCP server, it uses 0.0.0.0 as its own IP address and
255.255.255.255 as
Groups
Distribution Groups -- Used for email. Useful for programs such as MS Exchange.
Domain Local -- At the same time they can contain Accounts ( Any user/computer account ),
and global groups. Access to the same domain.
Global groups - They can contain Accounts ( user/computer accounts ). Access to Any domain
Universal - N/A not applicable at this DFL. Access to any domain
Domain Local - Accounts ( users/computers ), Domain local Groups ( same domain ) , global
groups, and universal groups.
Global Groups - Accounts ( users/computers from the same domain ), Global groups ( same
domain )
Group Conversion
Domain Local - You can convert it to Universal ( A Domain Local group must already contain a
Domain Local group in order for the conversion to take place )
Global Group - You can convert it to Universal ( A Global group must already contain a Global
group in order for the conversion to take place )
Universal Group - You can convert it to either Domain Local, or Global Group.
Group Nesting
Same Domain
Start By adding Users to Global Groups. At the same global groups can be nested within
Domain Local Groups, and Univerisal groups.
Global Groups can also be nested within Global Groups in the same domain.
Global Groups can be nested within Domain Local groups, or within another Universal Group in
the other domain.
Global Groups cannot be nested across domains. You cannot take a Global Group from
proprofs.local, and nest it within another global group in proprofs.com.
You cannot take a user/computer account from one domain, and nest it within a global group in
another domain.
Global Groups can be used to grant access to files/folders ( NTFS Permissions) in the same
domain, and in a different domain as well.
Domain Local groups can accept anything, except for Domain Local groups from another
domain. It accepts user accounts from the same domain, and a different domain as well. A
global/universal group from the same domain/different domain can also be nested within a
Domain Local group.
Resources - Domain Local Groups can only access resources on the domain on which it
resides. For example a domain Local group Named HelpDesk on the proprofs.local domain can
only access resources on that domain, and not on proprofs.com
Universal Groups - Accept user/computer accounts from the same domain, and a different
domain as well. A global group can also be nested within a Universal Group ( from the
same/different domain(s) )
Note: You cannot take a Domain Local Group, and nest it within a Universal Group ( from the
same/different domain(s) )
A Universal Group can be nested within another Universal Group in the same domain, and in
different domains as well. They can also be nested within Domain Local Groups in the same
domain, and in different domains as well. Universal Groups can never be a member of Universal
Groups.
Resources - It can be used to access resources ( NTFS Permissions ) on the same domain, and
in different domains as well.
One benefit of Universal Groups is that they list its members on the Global Catalog. Whenever a
change was made to a Universal Group, it updates the membership of all its members in the
Global Catalog, causing a lot of unnecessary traffic between GCs ( windows 2000 )
Windows 2003 solves the aforementioned problem by updating the membership of only the
affected member. In other words, it does not replicate all the accounts in the Universal group,
only the one you made changes to. ( Note: This new feature is only available if the Domain
Functional Level ( DFL ) is on indows 2003 )