Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 3)

3/11/2011 10:10:30 PM
Dynamic Update Triggers

The following events trigger the DHCP Client service to send a dynamic update to the DNS server:

  • An IP address is added, removed, or modified in the Transmission Control Protocol/Internet Protocol (TCP/IP) properties configuration for any one of the local computer’s installed network connections.

  • An IP address lease changes or renews with the DHCP server for any one of the local computer’s installed network connections—for example, when the computer is started or if the Ipconfig /renew command is used.

  • The Ipconfig /registerdns command is used on a DNS client computer to manually force a refresh of the client name registration in DNS.

  • The DNS client computer is turned on.

  • A member server within the zone is promoted to a domain controller.

Secure Dynamic Updates

Secure dynamic updates can be performed only in Active Directory–integrated zones. For standard zones, the Secure Only option does not appear in the Dynamic Updates drop-down list box. These updates use the secure Kerberos authentication protocol to create a secure context and ensure that the client updating the resource record is the owner of that record.

Note

Only clients running a version of Windows 2000, Microsoft Windows XP, or Windows Server 2003 can attempt to send dynamic updates to a DNS server. Dynamic updates are not available for any version of Windows NT, Windows 95, Microsoft Windows 98, or Microsoft Windows Millennium Edition (Me). However, a DNS client computer (such as a DHCP server) can perform dynamic updates on behalf of other clients if the server is configured to do so.


  • Secure Dynamic Updates and the DnsUpdateProxy group

    When only secure dynamic updates are allowed in a zone, only the owner of a record can update that record. (The owner of a record is the computer that originally registers the record.) This restriction can cause problems in situations where a DHCP server is being used to register host (A) resource records on behalf of client computers that cannot perform dynamic updates. In such cases, the DHCP server becomes the owner of the record, not the computers themselves. If the downlevel client computer is later upgraded to Windows 2000 or some other operating system that is capable of performing dynamic updates, the computer will not be recognized as the owner and will consequently be unable to update its own records. A similar problem might arise if a DHCP server fails that has registered records on behalf of downlevel clients: none of the clients will be able to have their records updated by a backup DHCP server.

    To avoid such problems, add to the DnsUpdateProxy security group DHCP servers that register records on behalf of other computers. Members of this group are prevented from recording ownership on the resource records they update in DNS. This procedure consequently loosens security for these records until they can be registered by the real owner.

Tip

Expect to be tested on DnsUpdateProxy on the exam.


Aging

By clicking Aging on the General tab, you can open the Zone Aging/Scavenging Properties dialog box, shown in Figure 8. These properties provide a means of finding and clearing outdated records from the zone database.

Figure 8. Zone Aging/Scavenging Properties dialog box


Enabling Aging

Aging in DNS refers to the process of placing a timestamp on a dynamically registered resource record and then tracking the age of this record. Scavenging refers to the process of deleting outdated resource records on which timestamps have been placed. Scavenging can occur only when aging is enabled. Both aging and scavenging are disabled by default.

To enable aging for a particular zone, you have to enable this feature both at the zone level and at the server level. To enable aging at the zone level, in the Zone Aging/Scavenging Properties dialog box, select the Scavenge Stale Resource Records check box. To enable aging at the server level, first open the Server Aging/Scavenging Properties dialog box by right-clicking the server icon in the DNS console and then clicking Set Aging/Scavenging For All Zones. Then, in the Server Aging/Scavenging Properties dialog box, select the Scavenge Stale Resource Records check box.

After aging is enabled, a timestamp based on the current server time is placed on all dynamically registered records in the zone. When the DHCP Client service or DHCP server later performs a dynamic update of the records, a timestamp refresh is attempted. Manually created resource records are assigned a timestamp of 0; this value indicates that they will not be aged.

Note

When aging and scavenging are enabled for a zone, zone files cannot be read by pre-Windows 2000 DNS servers.


Modifying no-refresh intervals

The no-refresh interval is the period after a timestamp during which a zone or server rejects a timestamp refresh. The no-refresh feature prevents unnecessary refreshes from being processed by the server and reduces unnecessary zone transfer traffic. The default no-refresh interval is seven days.

Modifying refresh intervals

The refresh interval is the time after the no-refresh interval during which timestamp refreshes are accepted and resource records are not scavenged. After the no-refresh and refresh intervals expire, records can be scavenged from the zone. The default refresh interval is 7 days. Consequently, when aging is enabled, dynamically registered resource records can be scavenged after 14 days by default.

Tip

If you modify the no-refresh or refresh interval, be sure to follow the guideline that the refresh interval should be equal to or greater than the no-refresh interval.


Performing Scavenging

Scavenging in a zone is performed either automatically or manually. For scavenging to be performed automatically, you must enable automatic scavenging of stale resource records on the Advanced tab of DNS server properties. When this feature is not enabled, you can perform manual scavenging in a zone by right-clicking the server icon in the DNS console tree and then selecting Scavenge Stale Resource Records from the shortcut menu.

Start Of Authority (SOA) Tab

The Start Of Authority (SOA) tab, shown in Figure 9, allows you to configure the SOA resource record for the zone. When a DNS server loads a zone, it uses the SOA resource record to determine basic, authoritative information about the zone. These settings also determine how often zone transfers are performed between primary and secondary servers.

Figure 9. Start Of Authority (SOA) tab


Serial Number

The Serial Number text box on the Start Of Authority (SOA) tab contains the revision number of the zone file. This number increases each time a resource record changes in the zone or when the value is manually incremented on this tab by clicking Increment.

When zones are configured to perform zone transfers, the master server is intermittently queried for the serial number of the zone. This query is called the SOA query. If, through the SOA query, the serial number of the master zone is determined to be equivalent to the local serial number, no transfer is made. However, if the serial number for the zone at the master server is greater than that at the requesting secondary server, the secondary server initiates a transfer.

Primary Server

The Primary Server text box on the Start Of Authority (SOA) tab contains the full computer name for the primary DNS server of the zone. This name must end with a period.

Responsible Person

When this text box is configured, it contains a responsible person (RP) resource record of the person responsible for administering the zone. An RP resource record specifies a domain mailbox name for the responsible person. The name of the record entered into this field should always end with a period.

Refresh Interval

The value you configure in the Refresh Interval field determines how long a secondary DNS server waits before querying the master server for a zone renewal. When the refresh interval expires, the secondary DNS server requests a copy of the current SOA resource record for the zone from its master server source, which then answers this SOA query. The secondary DNS server then compares the serial number of the source server’s current SOA resource record (as indicated in the master’s response) with the serial number of its own local SOA resource record. If they are different, the secondary DNS server requests a zone transfer from the primary DNS server. The default value for this setting is 15 minutes.

Tip

Increasing the refresh interval decreases zone transfer traffic.


Retry Interval

The value you configure in the Retry Interval box determines how long a secondary server waits before retrying a failed zone transfer. Normally, this time is less than the refresh interval. The default value is 10 minutes.

Expires After

The value you configure in the Expires After box determines the length of time that a secondary server, without any contact with its master server, continues to answer queries from DNS clients. After this time elapses, the data is considered unreliable. The default value is 1 day.

Minimum (Default) TTL

The value you configure in the Minimum (Default) TTL box determines the default Time to Live (TTL) that is applied to all resource records in the zone. The default value is 1 hour.

TTL values are not relevant for resource records within their authoritative zones. Instead, the TTL refers to the cache life of a resource record in nonauthoritative servers. A DNS server that has cached a resource record from a previous query discards the record when that record’s TTL has expired.

Tip

If you have deployed caching-only servers in your network in addition to a primary server, increasing the minimum TTL can decrease name resolution traffic between the caching-only servers and the primary server.


TTL For This Record

The value you configure in this text box determines the TTL of the present SOA resource record. This value overrides the default value setting in the preceding field.

Once configured in the DNS console, an SOA resource record is represented textually in the zone file, as shown in this example:

@IN SOA computer1.domain1.local. hostmaster.domain1.local. (
5099 ; serial number
3600 ; refresh (1 hour)
600 ; retry (10 mins)
86400 ; expire (1 day)
60 ) ; minimum TTL (1 min)
Other -----------------
- Windows Server 2008 R2 : Server Manager Storage Page
- Windows Server 2008 R2 : Server Manager Configuration Page
- Windows Server 2008 R2 : Server Manager Diagnostics Page
- Windows Server 2008 R2 : Server Manager
- Managing Windows Server 2008 R2 Roles and Features
- Windows Server 2008 R2 : Initial Configuration Tasks
- Going Green with Windows Server 2008 R2
- Windows Server 2003 : Configuring DNS Server Properties - Exploring DNS Server Properties Tabs
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 2)
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 1) - Faulty TCP/IP Configuration & Network Diagnostics
- Windows Server 2008 R2 :Task Scheduler
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 3)
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 2) - TCP/IP Tools
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 1) - Best Practices Analyzer Tools
- Windows Server 2008 R2 : Logging and Debugging - Setting Baseline Values
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 3) - Adding Parsers to Network Monitor
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 2) - How Network Monitor Works
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 1)
- Windows Server 2003 : Configuring DNS Clients (part 2)
- Windows Server 2003 : Configuring DNS Clients (part 1) - Configuring Client Settings
 
 
Most view of day
- Windows Phone 8 : Designing for the Phone - Blend Basics (part 2) - Brushes
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 1) - Viewing and Managing Active Directory Site Details
- Windows Phone 8 : Designing for the Phone - Implementing the Look and Feel of the Phone
- Windows Server 2003 : Windows Firewall (part 3) - Service Pack Firewall Modifications - Modifying firewall behavior using the Windows Firewall INF file and unattend.txt
- Microsoft Exchange Server 2010 : Completing Transport Server Setup (part 8) - Configuring Transport Rules
- Microsoft Exchange Server 2010 : Managing Connectivity with Hub Transport Servers - Transport Improvements in Exchange Server 2010
- Adobe After Effects CS5 : Building a 3D object - Adding a camera
- Extending Dynamics AX 2009 (part 1)
- Microsoft Visio 2010 : Linking External Data to Shapes (part 2) - Preparing the Light Bulb Shape for Data Linking
- System Center Configuration Manager 2007 : Operating System Deployment - Drivers
Top 10
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
- Microsoft Project 2010 : Linking Tasks (part 5) - Creating Links by Using the Task Information Dialog Box
- Microsoft Project 2010 : Linking Tasks (part 4) - Entering Leads and Lags, Creating Links by Using the Menu or Toolbar
- Microsoft Project 2010 : Linking Tasks (part 3) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 2) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 1) - Defining Dependency Links
- Microsoft Project 2010 : Defining Task Logic - Manipulating Your Schedule
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro