Boswell's Q&A

Rooted in DNS

Many AD problems stem from DNS. Here's a quick DNS configuration best practices checklist.

Bill: We are planning on building a root domain from scratch at our HQ called "root.com" and then having separate child domains for Europe and North America. Can you provide some "best practice" steps and information on configuring DNS prior to installing AD for an environment such as this? I'd be very appreciative.

On a side note, our new 2003 AD structure will eventually include Exchange Server, but it will not start out that way. Will it cause any problems if we go ahead and extend the schema for the forest and domain ahead of time? If extending the schema will not be a problem, is it best to do it before or after the service packs are applied to the OS?
—Steve

Get Help from Bill

Got a Windows or Exchange question or need troubleshooting help? Or maybe you want a better explanation than provided in the manuals? Describe your dilemma in an e-mail to Bill at mailto:[email protected]; the best questions get answered in this column.

When you send your questions, please include your full first and last name, location, certifications (if any) with your message. (If you prefer to remain anonymous, specify this in your message but submit the requested information for verification purposes.)

Steve: It's a great idea to get your DNS infrastructure configured and tested prior to deploying Active Directory. Nearly all AD problems have a root cause in DNS.

In your example, you specified a DNS domain name of Root.com. I'm assuming that you're actually going to use another name that you've registered to assure uniqueness. I'll use root.com in all the examples.

Start with a Standalone DNS Server
Start by installing a standalone DNS server running Windows Server 2003. You'll eventually integrate DNS into Active Directory and use the domain controllers as DNS servers, but installing a separate DNS server at first gives you more control over the process in case something goes wrong.

You don't need server-class hardware for this machine. You'll only be using it temporarily. I often use a virtual machine (using either VMware or Microsoft Virtual Server) to act as the initial DNS server in a new forest.

Before you install DNS on the server, change the Server Properties to include a DNS suffix. Access the Server Properties window by holding down the Window key and tapping the Pause key. Select the Computer Name tab then click Change then click More.

Assign a DNS suffix of Root.com to the server. This creates a Registry entry called NVDomain that Windows concatenates to the host name (NVHost) to get a Fully Qualified DNS Name (FQDN), such as RootDC.Root.com.

Important: A Windows DNS server will not accept dynamic updates unless it has an FQDN, which means you must make the NVDomain entry on the standalone server.

You'll be required to restart the server after making the NVDomain entry.

Install DNS on the Standalone Server
Following the restart, install the DNS service on the server. Create a new zone called Root.com. Configure the zone to accept dynamic updates. You can't use secure updates until you have integrated DNS into Active Directory, so don't point any clients at this DNS server.

You can create a reverse lookup zone, if you like, but that isn't absolutely required at this point.

By default, the DNS service will be able to resolve out-of-zone queries (such as queries for Internet hosts) using Root Hints. You may prefer to configure the server to use a forwarder.

Configure DNS Settings at the Domain Controller
You’re now ready to install the first domain controller in the root domain. Install the operating system and configure the TCP/IP settings to use the standalone DNS server for DNS lookups. Don't make any changes in the DNS tab of the TCP/IP settings or to the DNS suffix in System Properties. DCPromo will automatically configure these settings based on the domain name you supply during the promotion.

To make sure that the DNS settings are correct, run DCDiag with the following syntax:

dcdiag /test:dcpromo /dnsdomain:root.com /newforest

You should get the following response:

Starting test: DcPromo
Messages logged below this line indicate whether this domain controller will be able to dynamically register DNS records required for the location of this DC by other devices on the network. If any misconfiguration is detected, it might prevent dynamic DNS registration of some records, but does not prevent successful completion of the Active Directory Installation Wizard. However, we recommend fixing the reported problems now, unless you plan to manually update the DNS database. DNS configuration is sufficient to allow this domain controller to dynamically register the domain controller Locator records in DNS. The DNS configuration is sufficient to allow this computer to dynamically register the A record corresponding to its DNS name.

......................... RootDC passed test DcPromo

If you get a failure, the error message will give you a hint as to the cause. The most common causes are typos in the DNS IP address or in the DCDiag strings.

Run DCPromo and create the new forest. During DCPromo, you will get a DNS Registration Diagnostics window that hopefully contains no errors. Here's an example:

Diagnostic Results
The registration diagnostic has been run 1 times.
DNS registration support for this domain controller has been verified. To continue, click Next.

Details
The primary DNS server tested was: DNS1.Root.com (10.10.0.1)
The zone was: Root.com
The test for dynamic DNS update support returned:
"The operation completed successfully."

If the window says you have an error, you can continue with the promotion then troubleshoot later. That's the advantage of having a separate DNS server.

Following the restart of the domain controller, check the DNS zone to ensure that it contains a set of SRV records for the root.com zone. If these records do not appear, run netdiag /fix at the newly promoted domain controller. This takes the SRV records from a flat file called Netlogon.dns and uses them to perform the DNS dynamic registration. If the SRV records still do not appear, check the Event Log for errors.

Change Default Site Name
Assuming that everything looks good at this point, use Active Directory Sites and Services to change the name of the first site from Default-First-Site-Name to the name of your headquarters site. Let's call it HQ. Verify that this change is reflected in DNS. Drill down through the SRV records and make sure that the site name now reads HQ in any place it appears. If this does not happen, refresh the display then run netdiag /fix at the domain controller.

Initial Exchange 2003 Configuration
Since you're going to be running Exchange 2003, now would be a good time to run Forestprep and Domainprep for Exchange. This will make the required Schema changes, install a placeholder Exchange organization in the Configuration naming context, and create the necessary Exchange groups in the root domain of the forest. By doing this work now, all the forest changes will automatically get replicated to any new domain controllers you install.

Create DNS Child Domains
You're now ready to create DNS zones for the child domains (let's call them NA.Root.com and EU.Root.com) and install domain controllers for these domains. I'm assuming that you're going to want a server from each child domain in the company headquarters, so you don't need to create additional sites at this time.

Create the zones for the child domains on the same DNS server where you created the root zone. Eventually you'll integrate these zones into Active Directory. Be sure to enable dynamic updates on these zones.

Note: You don't have to create separate zones. The dynamic update process will create child DNS domains in the root zone file. But I like keeping the resource records in their own zones because it makes the transition to Active Directory a little easier to follow.

So, you now have three zones on the standalone DNS server. Install a domain controller in the two child domains using the same steps that I outlined for the root domain. Configure the TCP/IP settings on both DCs to point at the standalone DNS server as their sole DNS server. Use DCDiag to confirm that the zone information is correct. The DCDiag syntax for the child domains would be:

dcdiag /test:dcpromo /dnsdomain:NA.Root.com /childdomain

Following the restart after DCPromo, be absolutely sure that all SRV records are present in each zone. The critical records, at least from the perspective of Active Directory replication, are the CNAME records in the _msdcs.root.com zone. The replication agent on each domain controller queries DNS for this record based on the Globally Unique Identifier (GUID) of its replication partner. The GUID information is stored in Active Directory.

Wait 15 to 30 minutes for the KCC on each DC to grok (that is, to fully understand) the new topology and to create the necessary connection objects between the DCs. Then use Active Directory Sites and Services to force replication between the three domain controllers. If you get a "Naming Context in the process of being moved..." error, then wait a while longer for the KCC to do its thing. If you get an "RPC Server not found..." error, then you have a DNS configuration problem.

Additional Exchange 2003 Configuration
Exchange requires you to run Exchange Domainprep in every domain that hosts Exchange servers. Take a few minutes right here to run Domainprep in the two child domains.

AD-Integrate the DNS Zones
Okay, with everything working fine up to this point, you're ready to integrate the zones into Active Directory. Once a zone file has been integrated into Active Directory, any domain controller running DNS automatically becomes a primary master for that zone.

It's essential to integrate DNS into Active Directory if you're going to use dynamic updates. If you configure your DNS servers to accept dynamic update requests from unvalidated sources, it's just a matter of time before someone inadvertently or purposefully poisons your zone file with invalid resource records.

Windows only accepts one form of secure dynamic updates, a proprietary method that relies on the underlying object-based security in Active Directory. For this reason, secure updates require that you integrate the zone records into Active Directory.

Here's where DNS can get a little complicated. Under most circumstances, you don't want to replicate resource records for the NA.Root.com zone to the domain controllers in Europe, and vice versa. Windows Server 2003 has a feature where you can place DNS records in separate naming contexts then target replication for those naming contexts.

In LDAP, a naming context forms a replication boundary. It's often called a "partition" although that's not formally correct as per the LDAP RFCs.

Resource records for a domain are placed in a naming context called DomainDNSZones under the same domain. For example, resource records for the NA.Root.com zone would be placed in a naming context with the following Distinguished Name:

DC=DomainDNSZones,DC=NA,DC=Root,DC=com

Resource records intended for replication throughout the forest are placed in a naming context called ForestDNSZones under the root domain namespace as follows:

DC=ForestDNSZones,DC=Root,DC=com

Create the DNS Naming Contexts
When you install DNS on the Infrastructure Master in each domain, it will automatically create the DomainDNSZones naming context in its domain. When you install DNS on the Infrastructure Master in the forest root domain, it will also create the ForestDNSZones naming context.

Also, Windows Server 2003 allows you to target replication of these naming contexts to Active Directory domain controllers that are actually running the DNS service. After all, why waste time replicating DNS resource records to a domain controller that can't reply to DNS queries?

The next step, then, is to install DNS on the three domain controllers. Since each of these DCs is also the Infrastructure Master for its domain, this will result in the creation of the special DNS naming contexts.

Since you now have multiple DNS servers, it makes sense to use a forwarder to handle Internet host lookups. Most organizations either contract with their ISP to use a DNS server at the ISP or they put a caching-only DNS server in their DMZ.

Starting with the domain controller in Root.com, change the TCP/IP settings on each DC to point the server at itself for DNS lookups. In other words, the IP address in the Primary DNS setting should match the IP address of the server. (Don't do this in a Windows 2000 forest root domain. There's a flaw in the way Windows 2000 obtains the CNAME records for domain controllers and this flaw can cause replication failures if you point a root DC at itself for DNS. This flaw is fixed in Windows Server 2003.)

Now, install the DNS service on each of the DCs. On the root DC, create a zone for the Root.com domain. Configure the zone as Active Directory integrated and set the security to accept only secure updates. In the Active Directory Zone Replication Scope window, select the radio button labeled "To All DNS Servers in the Active Directory domain root.com."

On the other two domain controllers, configure a zone for each server's domain: NA.Root.com and EU.Root.com. Configure the zones as Active Directory integrated with secure updates only. Select the option to replicate the zone only to DNS servers in the respective domain. Populate the zones with resource records by running netdiag /fix at each DC. Verify that the SRV records appear in the three zones.

One more zone to go. At the root DC, create a new Forward Lookup Zone called _msdcs.root.com. Make this an Active Directory integrated zone and configure the scope option to replicate to every DNS server in the forest. When you do this, the zone will automatically populate with SRV records and a dimmed folder will be left behind in the root.com zone. This zone contains the records required to support forest-wide replication, so that's why you want a copy of it on every domain controller. The number of records is small, so the intercontinental replication load is trivial.

Configure Stub Zones
At this point, the domain controllers face a dilemma. They point at themselves for DNS lookups and there are no resource records in their copy of Active Directory to tell them where to find domain controllers in the other domains. This will cause replication failures.

The classic DNS way to handle this situation would be to configure the child domain controllers to forward their out-of-zone lookups to the DNS server in the root domain and to create delegation records in the root domain that point at the name servers in the child domains.

However, it's simpler to use another new Windows Server 2003 feature called "stub zones."

A stub zone is a special copy of a zone that contains only the Name Server (NS) records and their associated A (Host) records, often called glue records. If the DNS server receives a query for a host in the stub zone, it refers to the NS records in the stub zone to find the DNS servers in that domain. It then uses the IP addresses in the glue records to send the query to one of the DNS servers in the target zone. When it gets a resource record as a reply, it returns a copy of the record to the client who originated the query.

Stub zones do not require special replication permissions. The zone only contains NS and glue records, which are freely available via a standard DNS query. To repeat, stub zones do not require zone transfers.

Stub zones, then, take the place of traditional DNS delegation. They are especially handy in a Windows Server 2003 forest because you can integrate the stub zone into Active Directory so that every DNS server in a domain can find the NS and glue records.

The final step, then, is to create an Active Directory integrated stub zone in each domain representing the other domains. For example, the Root.com domain would need stub zones for NA.Root.com and EU.Root.com, while the NA.Root.com would need stub zones for Root.com and EU.Root.com.

With the stub zones in place, you should be able to get error-free replication between the domain controllers. You can now join a few clients to the domains and make sure that they can authenticate and get access to resources in the other domains and resolve Internet host addresses.

Go Forth and Configure DNS
Configuring DNS in a multiple-domain forest can get fairly complex, but this quick checklist should help you anticipate most of the problems.

comments powered by Disqus
Most   Popular