Module 1 - Implementing Advanced Network Services
Module 1 - Implementing Advanced Network Services
Module 1 - Implementing Advanced Network Services
Lesson 2:
Lesson 3:
Implementing IPAM
Lesson 4:
Lab:
Module Overview
In Windows Server 2012, network services such as Domain Name System (DNS) provide critical
support for name resolution of network and Internet resources. Within DNS, DNS Security
Extensions (DNSSEC) is an advanced feature that provides a means of securing DNS responses to
client queries so that malicious users cannot tamper with them. With Dynamic Host Configuration
Protocol (DHCP), you can manage and distribute IP addresses to client computers. DHCP is essential
for managing IP-based networks. DHCP failover is an advanced feature that can prevent clients from
losing access to the network in case of a DHCP server failure. IP Address Management (IPAM)
provides a unified means of controlling IP addressing.
This module introduces DNS and DHCP improvements, and IP address management, and it provides
details about how to implement these features.
Objectives
After completing this module, you will be able to:
Configure advanced DHCP features.
Configure advanced DNS settings.
Implement IPAM.
1/66
11/17/2014
DHCP plays an important role in the Windows Server 2012 operating system infrastructure. It is the
primary means of distributing important network configuration information to network clients, and it
provides configuration information to other network-enabled services, including Windows
Deployment Services and Network Access Protection (NAP). To support a Windows Server-based
network infrastructure, it is important that you understand the DHCP server role. Windows Server
2012 improves the functionality of DHCP by providing failover capabilities.
Lesson Objectives
After completing this lesson, you will be able to:
Describe DHCP components.
Explain how to configure DHCP interaction with DNS.
Explain how to configure advanced DHCP scope designs.
Explain how DHCP works with IPv6.
Describe DHCP name protection.
Describe DHCP failover.
Explain how to configure DHCP failover.
DHCP is a server role that you can install on Windows Server 2012. With the DHCP server role, you
can ensure that all clients have appropriate IP addresses and network configuration information,
which can help eliminate human error during configuration. A DHCP client is any device that takes a
DHCP address, and that can request and retrieve network settings from a DHCP server service.
DHCP clients may be computers, mobile devices, printers, or switches. DHCP may also provide IP
address information to network boot clients.
When key network configuration information changes in the network, (such as the default gateway
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
2/66
11/17/2014
address), you can update the configuration using the DHCP server role without having to change the
information directly on each computer. DHCP is also a key service for mobile users who change
networks often. You can install the DHCP Server role on a stand-alone server, a domain member
server, or a domain controller.
DHCP consists of the components that are listed in the following table.
Component
Description
DHCP Server
After installing the DHCP Server role, the DHCP server is implemented as a service. This service can distribute
service
IP addresses and other network configuration information to clients who request it.
DHCP scopes
The DHCP administrator configures the range of IP addresses and related information that is allotted to the
server for distribution to requesting clients. Each scope can only be associated with a single IP subnet. A scope
must consist of:
A subnet mask
A scope can also define:
DHCP options
You can configure a single DHCP server with multiple scopes, but the server must be either connected
directly to each subnet that it serves, or have a supporting and configured DHCP relay agent in place.
Scopes also provide the primary way for the server to manage and distribute any related configuration
parameters (DHCP options) to clients on the network.
DHCP options
When you assign the IP address to the client, you can also simultaneously assign many other network
configuration parameters. The most common DHCP options include:
Windows Internet Name Service (WINS) server IP address You can apply the options at different levels.
They can be applied as follows:
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
3/66
11/17/2014
Note: Internet Protocol version 6 (IPv6) scopes are slightly different, and will be discussed
later in this lesson.
DHCP database
The DHCP database contains configuration data about the DHCP server, and stores information about the IP
addresses that have been distributed. By default, the DHCP database files are stored in the
%systemroot%\System32\Dhcp folder. The DHCP database is a Microsoft JET database.
DHCP console
The DHCP console is the main administrative tool for managing all aspects of the DHCP server. This
management console is installed automatically on any server that has the DHCP role installed. However, you
also can install it on a remote server or Windows 8 client by using the Remote Server Administration Tools
(RSATs) and by connecting to the DHCP server for remote management.
DHCP Leases
DHCP allocates IP addresses on a dynamic basis. This is known as a lease. You can configure the
duration of the lease. The default lease time for wired clients is eight days, but mobile or handheld
devices such as tablets should usually have a shorter lease duration. Typically, where there is a
higher turnover of devices or users, the lease time should be shorter; and where there is more
permanency, it should be longer. You can configure the lease settings in the DHCP console, under
the server name and either the IPv4 or IPv6 node, by clicking Scope, and then clicking Properties
dialogue.
When the DHCP lease reaches 50 percent of the lease time, the client attempts to renew the lease.
This automatic process occurs in the background. Computers might have the same IP address for a
long time if they operate continually on a network without being shut down. Client computers also
attempt renewal during the startup process.
4/66
11/17/2014
Windows PowerShell
You can use Windows PowerShell cmdlets to provide command-line support for managing DHCP.
To be able to use the DHCP cmdlets, you must load the DhcpServer module. In addition to providing
command-line support, PowerShell cmdlets are used if you want to script your DHCP management.
The following table includes a subset of the nearly 100 Windows Server 2012 PowerShell cmdlets for
managing DHCP.
cmdlet
Additional information
Add-DhcpServerInDC
You use cmdlet to add the specified computer running the DHCP server
service as an authorized DHCP server in AD DS.
Add-DhcpServerv4Class
You use this cmdlet to add an IPv4 vendor or user class to the DHCP
server service.
Add-DhcpServerv4ExclusionRange
You use this cmdlet to add an IP address exclusion range to an IPv4 scope.
Add-DhcpServerv4Failover
You use this cmdlet to add a new IPv4 failover relationship on the DHCP
server service.
Add-DhcpServerv4FailoverScope
You use this cmdlet to add one or more scopes to an existing failover
relationship.
Add-DhcpServerv4Filter
You use this cmdlet to add a media access control (MAC) address filter of
the DHCP server service, the filter can be used on an allow list or Deny
list.
Add-DhcpServerv4Lease
You use this cmdlet to add a new IPv4 address lease in the DHCP server
service for testing purposes.
Add-DhcpServerv4OptionDefinition
You use this cmdlet to add a new DHCPv4 option definition to the DHCP
server service.
Add-DhcpServerv4Policy
You use this cmdlet to add a new IPv4 policy to a DCHP server or a DHCP
scope.
Add-DhcpServerv4PolicyIPRange
Add-DhcpServerv4Reservation
You use this cmdlet to reserve the specified IPv4 address in the specified
DHCP scope for a specified client.
Add-DhcpServerv4Scope
You use this cmdlet to add an IPv4 scope on the DHCP server service.
For a complete list of the available cmdlets, refer to DHCP Server Cmdlets in Windows PowerShell:
http://go.microsoft.com/fwlink/?LinkID=386639
Windows Server 2012 R2 added or improved the DHCP cmdlets for additional functionality and to
support new features in Windows Server 2012 R2. The following table lists some of the cmdlets that
have been added or improved.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
5/66
11/17/2014
Cmdlet
New or
Additional information
Improved
Add-DhcpServerSecurityGroup
New
Add-DhcpServerv4MulticastExclusionRange
New
Add-DhcpServerv4MulticastScope
New
Add-DhcpServerv4Policy
Improved
Get-DhcpServerDnsCredential
New
Get-DhcpServerv4DnsSetting
Improved
Get-DhcpServerv4MulticastExclusionRange
New
Get-DhcpServerv4MulticastLease
New
Get-DhcpServerv4MulticastScope
New
Get-DhcpServerv4MulticastScopeStatistics
New
For information about the DHCP cmdlets that were added or improved Windows Server 2012, refer
to What's New in DHCP in Windows Server 2012 R2:
http://go.microsoft.com/fwlink/?LinkID=386638
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
6/66
11/17/2014
During dynamic IP address allocation, the DHCP server creates resource records automatically for
DHCP clients in the DNS database. However, those records might not be deleted automatically when
the client DHCP lease expires. You can configure DHCP options to allow the DHCP server to own and
fully control the creation and deletion of those DNS resource records.
You can change the Enable DNS dynamic updates according to the settings below: option to
Always dynamically update DNS records so that it instructs the DHCP server to always
dynamically update DNS host (A) and pointer (PTR) resource records no matter what the client
requests. In this way, the DHCP server becomes the resource record owner because the DHCP
server performed the registration of the resource records. Once the DHCP server becomes the
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
7/66
11/17/2014
owner of the client computers host (A) and pointer (PTR) resource records, only that DHCP server
can update the DNS resource records for the client computer based on the duration and renewal of
the DHCP lease.
You can configure advanced DHCP scope designs called superscopes. A superscope is a collection of
individual scopes that are grouped together for administrative purposes. This configuration allows
client computers to receive an IP address from multiple logical subnets even when the clients are
located on the same physical subnet. You can create a superscope only if you have created two or
more IP scopes already in DHCP. You can use the New Superscope Wizard to select the scopes that
you wish to combine to create a superscope.
Benefits of Superscopes
A superscope is useful in several situations. For example, if a scope runs out of addresses, and you
cannot add more addresses from the subnet, you can add a new subnet to the DHCP server instead.
This scope will lease addresses to clients in the same physical network, but the clients will be in a
separate network logically. This is known as multinetting. Once you add a new subnet, you must
configure routers to recognize the new subnet so that you ensure local communications in the
physical network.
A superscope is also useful when you need to move clients gradually into a new IP numbering
scheme. When you have both numbering schemes coexist for the original leases duration, you can
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
8/66
11/17/2014
move clients into the new subnet transparently. When you have renewed all client leases in the new
subnet, you can retire the old subnet.
Multicast Scopes
A multicast scope is a collection of multicast addresses from the Class D IP address range of
224.0.0.0 to 239.255.255.255 (224.0.0.0/3). These addresses are used when applications need to
communicate with numerous clients efficiently and simultaneously. This is accomplished with
multiple hosts that listen to traffic for the same IP address. Multicast addresses are used in addition
to the Network IP address.
A multicast scope is commonly known as a Multicast Address Dynamic Client Allocation Protocol
(MADCAP) scope. Applications that request addresses from these scopes need to support the
MADCAP application programming interface (API). Windows Deployment Services is an example of
an application that supports multicast transmissions.
Multicast scopes allow applications to reserve a multicast IP address for data and content delivery.
IPv6 can configure itself without DHCP. IPv6-enabled clients have a self-assigned link-local IPv6
address. A link-local address is intended only for communications within the local network. It is
equivalent to the 169.254.0.0 self-assigned addresses IPv4 uses. IPv6-enabled network interfaces
can, and often do, have more than one IPv6 address. For example, addresses might include a selfassigned link-local address and a DHCP-assigned global address. By using DHCP for IPv6 (DHCPv6),
an IPv6 host can obtain subnet prefixes, global addresses, and other IPv6 configuration settings.
Note: You should obtain a block of IPv6 addresses from a Regional Internet Registry. There
are five regional Internet registries in the world. They are:
African Network Information Centre (AfriNIC) for Africa.
Asia-Pacific Network Information Centre (APNIC) for Asia, Australia, New Zealand, and
neighboring countries.
American Registry for Internet Numbers (ARIN) for Canada, many Caribbean and North
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
9/66
11/17/2014
Property
Use
Prefix
The IPv6 address prefix is analogous to the IPv4 address range. It defines the network
portion of the IP address.
Preference
This property informs DHCPv6 clients which server to use if you have multiple DHCPv6
servers.
Exclusions
This property defines single addresses or blocks of addresses that fall within the IPv6
prefix but will not be offered for lease.
DHCP options
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
10/66
11/17/2014
1.
In the DHCP console, right-click the IPv6 node, and then click New Scope.
2.
3.
4.
5.
You should protect the names that DHCP registers in DNS on behalf of other computers or systems
from being overwritten by other systems that use the same names. In addition, you should also
protect the names from being overwritten by systems that use static addresses that conflict with
DHCP-assigned addresses when they use unsecure DNS, and when DHCP is not configured for
conflict detections. For example, a UNIX-based system named Client1 potentially could overwrite
the DNS address that was assigned and registered by DHCP on behalf of a Windows-based system
also named Client1. A new feature in Windows Server 2012 called DHCP Name Protection addresses
this issue.
Name squatting is the term that describes the conflict that occurs when one client registers a name
with DNS, but that name is used already by another client. This problem causes the original machine
to become inaccessible, and it typically occurs with systems that have the same names as Windows
operating systems. DHCP Name Protection addresses this by using a resource record known as a
Dynamic Host Configuration Identifier (DHCID) to track which machines originally requested which
names. The DHCP server provides the DHCID record, which is stored in DNS. When the DHCP server
receives a request by a machine with an existing name for an IP address, the DHCP server can refer
to the DHCID in DNS to verify that the machine that is requesting the name is the original machine
that used the name. If it is not the same machine, then the DNS resource record is not updated.
You can implement name protection for both IPv4 and IPv6. In addition, you can configure DHCP
Name Protection at both the server level and the scope level. Implementation at the server level
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
11/66
11/17/2014
2.
Right-click the IPv4 or IPv6 node, and then open the Property page.
3.
Click DNS, click Configure, and then select the Enable Name Protection check box.
2.
Expand the IPv4 or IPv6 node, right-click the scope, and the open the Property page.
3.
Click DNS, click Configure, and then select the Enable Name Protection check box.
DHCP manages the distribution of IP addresses in TCP/IP networks of all sizes. When this service
fails, clients lose connectivity to the network and all of its resources. A new feature in Windows
Server 2012, DHCP failover, addresses this issue.
DHCP Failover
DHCP clients renew their leases on their IP addresses at regular, configurable intervals. When the
DHCP service fails and the leases time out, the clients no longer have IP addresses. In the past,
DHCP failover was not possible because DHCP servers were independent and unaware of each
other. Therefore, if you configured two separate DHCP servers to distribute the same pool of
addresses, that could lead to duplicate addresses. Additionally, to provide redundant DHCP services,
you had to configure clustering and perform a significant amount of manual configuration and
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
12/66
11/17/2014
monitoring.
The new DHCP failover feature enables two DHCP servers to provide IP addresses and optional
configurations to the same subnets or scopes. Therefore, you now can configure two DHCP servers
to replicate lease information. If one of the servers fails, the other server services the clients for
the entire subnet.
Note: In Windows Server 2012, you can configure only two DHCP servers for failover, and
only for IPv4 scopes and subnets.
Mode
Characteristics
Hot standby
In this mode, one server is the primary server and the other is the secondary server. The primary server
actively assigns IP configurations for the scope or subnet. The secondary DHCP server assumes this role
only if the primary server becomes unavailable. A DHCP server can simultaneously act as the primary for
one scope or subnet, and the secondary for another. Administrators must configure a percentage of the
scope addresses to be assigned to the standby server. These addresses are supplied during the Maximum
Client Lead Time (MCLT) interval if the primary server is down. The default MCLT value is five percent of
the scope, for example, 5% of the available addresses are reserved for the secondary server. The
secondary server takes control of the entire IP range after the MCLT interval has passed. When the
primary server is down, addresses from the secondary server use a lease time equal to the MCLT, one
hour by default. Hot Standby mode is best suited to deployments in which a disaster recovery site is
located at a different location. That way, the DHCP server will not service clients unless there is a main
server outage.
Load sharing
This is the default mode. In this mode, both servers supply IP configuration to clients simultaneously. The
server that responds to IP configuration requests depends on how the administrator configures the load
distribution ratio. The default ratio is 50:50.
MCLT
The administrator configures the MCLT parameter to determine the amount of time a DHCP server
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
13/66
11/17/2014
should wait when a partner is unavailable, before assuming control of the address range. This value
cannot be zero, and the default is one hour.
Message Authentication
Windows Server 2012 enables you to authenticate the failover message traffic between the
replication partners. The administrator can establish a shared secretmuch like a passwordin the
Configuration Failover Wizard for DHCP failover. This validates that the failover message comes
from the failover partner.
Firewall Considerations
DHCP uses TCP port 647 to listen for failover traffic. The DHCP installation creates the following
inbound and outbound firewall rules:
Microsoft-Windows-DHCP-Failover-TCP-In
Microsoft-Windows-DHCP-Failover-TCP-Out
2.
Switch to LON-DC1. In Server Manager, click Tools, and then on the drop-down list, click
DHCP.
3.
4.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
14/66
11/17/2014
Note: LON-SVR1 has two NICs one on the 131.107.0.0 subnet and one on the
172.16.0.0 subnet. LON-DC1 also resides on the 172.16.0.0 subnet.
5.
6.
Switch back to LON-SVR1, refresh the IPv4 node, and note that the Adatum scope is configured
and is active.
Lesson Objectives
After completing this lesson, you will be able to:
Manage DNS services.
Optimize DNS name resolution.
Describe global name zones.
Describe options for implementing DNS security.
Explain how DNSSEC works.
Describe the new DNSSEC features for Windows Server 2012.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
15/66
11/17/2014
As with other important network services, you must manage DNS. DNS management consists of the
following tasks:
Delegating DNS administration.
Configuring logging for DNS.
Aging and scavenging.
Backing up the DNS database.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
16/66
11/17/2014
For more verbose logging, you can enable debug logging. Debug logging options are disabled by
default, but they can be selectively enabled. Debug logging options include the following:
Direction of packets.
Contents of packets.
Transport protocol.
Type of request.
Filtering based on IP address.
Specifying the name and location of the log file, which is located in the %windir%\System32\DNS
directory.
Log file maximum size limit.
Debug logging can be resource intensive. It can affect overall server performance and consume disk
space. Therefore, you should enable it only temporarily when you require more detailed information
about server performance. To enable debug logging on the DNS server, do the following:
1.
2.
3.
4.
Select Log packets for debugging, and then select the events for which you want the DNS
server to record debug logging.
Note: Logging can generate a large number of files, and if it is left on too long, it can
fill a drive. We highly recommend that you turn on logging only while you are actively
troubleshooting; at all other times, logging should be turned off.
17/66
11/17/2014
DNS dynamic updates add resource records to the zone automatically, but in some cases, those
records are not deleted automatically when they are no longer required. For example, if a computer
registers its own host (A) resource record and is improperly disconnected from the network, the
host (A) resource record might not be deleted. These records, known as stale records, take up space
in the DNS database and may result in an incorrect query response being returned. Windows Server
2012 can search for those stale records and, based on the aging of the record, scavenge them from
the DNS database.
Aging and scavenging is disabled by default. You can enable automatic scavenging and the interval
at which it will take place in the Advanced properties of the DNS server. Each individual zone then is
configured to indicate whether or not the stale records should be scavenged and the aging settings
that determine when records become stale. The aging settings are found in the zones properties
General tab.
Aging is determined by using parameters known as the No-refresh interval and the Refresh interval.
The No-refresh interval is the period of time that the record is not eligible to be refreshed. By
default, this is seven days. The Refresh interval is the date and time that the record is eligible to be
refreshed by the client. The default is seven days. Usually, a client host record cannot be refreshed
in the database for seven days after it is first registered or refreshed. However, it then must be
refreshed within the next seven days after the No-refresh interval, or the record becomes eligible to
be scavenged out of the database. A client will attempt to refresh its DNS record at startup, and
every 24 hours while the system is running.
Note: Records that are added dynamically to the database are time stamped. Static records
that you enter manually have a time stamp value of zero (0); therefore, they will not be
affected by aging and will not be scavenged out of the database.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
18/66
11/17/2014
2.
<zone name> is the name of your DNS zone, and <zone file name> is the file that you want to
create to hold the backup information.
The dnscmd tool exports the zone data to the file name that you designate in the command, to the
%windir%\System32\DNS directory.
You can also use Windows PowerShell to perform the same task. In Windows PowerShell, you use
the Export-DnsServerZone cmdlet. For example, if you want to export a zone named
contoso.com, type the following command:
Note: If DNSSEC is configured, the security information will not be exported with these
commands.
In a typical DNS query event, a client computer attempts to resolve a FQDN to an IP address. For
example, if a user tries to go to the FQDN www.microsoft.com, the client computer will perform a
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
19/66
11/17/2014
recursive query to the DNS server that it is configured to discover the IP address associated with
that FQDN. The local DNS server must then respond with an authoritative response.
If the local DNS server has a copy of the DNS zone for which it was queried, it will respond with an
authoritative answer to the client computer. If the local DNS server does not have that information,
it will perform recursion.
Recursion is the process in which the local DNS server itself makes a recursive query to another
DNS server until it finds the authoritative answer, and then returns that answer to the client that
made the original request. By default, this server will be one of the servers on the Internet that is
listed as a root hint. When the local DNS server receives a response, it will return that information
to the original requesting client computer.
There are a number of options available for optimizing DNS name resolution, which include features
such as:
Forwarding
Conditional forwarding
Stub zones
Netmask ordering
Forwarding
A forwarder is a DNS server that you configure to forward DNS queries for host names that it cannot
resolve to other DNS servers for resolution. In a typical environment, the internal DNS server
forwards queries for external DNS host names to DNS servers on the Internet. For example, if the
local network DNS server cannot resolve a query for www.microsoft.com, then the local DNS
server can forward the query to the Internet service providers (ISPs) DNS server for resolution.
Conditional Forwarding
You also can use conditional forwarders to forward queries according to specific domain names. A
conditional forwarder is a setting that you configure on a DNS server that enables forwarding DNS
queries based on the query's DNS domain name. For example, you can configure a DNS server to
forward all queries that it receives for names ending with corp.adatum.com to the IP address of a
specific DNS server, or to the IP addresses of multiple DNS servers. This can be useful when you
have multiple DNS namespaces in a forest, or a partners DNS namespace across firewalls. For
example, suppose Contoso.com and Adatum.com merge. Rather than requiring each domain to host
a complete replica of the other domains DNS database, you could create conditional forwarders so
that they point to each others specific DNS servers for resolution of internal DNS names.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
20/66
11/17/2014
Stub Zones
A stub zone is a copy of a zone that contains only those resource records necessary to identify that
zones DNS servers. A stub zone resolves names between separate DNS namespaces, which might
be necessary when you want a DNS server that is hosting a parent zone to remain aware of all the
DNS servers for one of its child zones. A stub zone that is hosted on a parent domain DNS server
will receive a list of all new DNS servers for the child zone, when it requests an update from the
stub zone's master server. By using this method, the DNS server that is hosting the parent zone
maintains a current list of the DNS servers for the child zone as they are added and removed.
A stub zone consists of the following:
The delegated zones start of authority (SOA) resource record, name server (NS) resource
records, and host (A) resource records.
The IP address of one or more master servers that you can use to update the stub zone.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
21/66
11/17/2014
Netmask Ordering
There are various reasons to associate multiple IP addresses with a single name, for example, load
balancing a web page. Netmask ordering returns addresses for DNS queries that prioritize resources
on the client computers local subnet and returns those addresses to the client. In other words,
addresses of hosts that are on the same subnet as the requesting client will have a higher priority in
the DNS response to the client computer.
Localization is based on IP addresses. For example, if multiple A records are associated with the
same DNS name, and each A record is located on a different IP subnet, netmask ordering returns an
A record that is on the same IP subnet as the client computer that made the request.
This image shows an example of netmask ordering.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
22/66
11/17/2014
The GlobalNames zone was introduced with Windows Server 2008, and support for this zone
continues in Windows Server 2012. The GlobalNames zone contains single-label names that are
unique across an entire forest. This eliminates the need to use the NetBIOS-based Windows Internet
Name Service (WINS) to provide support for single-label names.
GlobalNames zones provide single-label name resolution for large enterprise networks that do not
deploy WINS and that have multiple DNS domain environments. GlobalNames zones are created
manually and do not support dynamic record registration.
When clients try to resolve short names, they append their DNS domain name automatically.
Depending on the configuration, they also try to find the name in upper-level domain name, or work
through their name suffix list. Therefore, short names are resolved primarily in the same domain.
You use a GlobalNames zone to provide a short name to multiple DNS suffixes. For example, if an
organization supports two DNS domains, such as adatum.com and contoso.com, and has a server
called intranet in contoso.com, only contoso domain users would be able to query it using the short
name. Adatum domain users would not be able to use the short name to access the server.
Global names are based on creating alias (CNAME) resource records in a special forward lookup
zone that uses single names to point to FQDNs. For example, GlobalNames zones would enable
clients in both the adatum.com and contoso.com domains to use a single-label name, such as
intranet, to locate a server whose FQDN is intranet.contoso.com, without using the FQDN.
2.
Create a new forward lookup zone named GlobalNames (not case sensitive). Do not allow
dynamic updates for this zone.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
23/66
11/17/2014
3.
Manually create CNAME records that point to records that already exist in the other zones that
are hosted on your DNS servers.
For example, you could create a CNAME record in the GlobalNames zone named Data that points to
Data.contoso.com. This enables clients from any DNS domain in the organization to find this server
by the single-label name Data.
You also can use the Windows PowerShell cmdlets Get-DnsServerGlobalNameZone and SetDnsServerGlobalNameZone to configure GlobalNames zones.
Because DNS is a critical network service, you must protect it as much as possible. A number of
options are available for protecting the DNS server, including:
DNS cache locking
DNS socket pool
DNSSEC
24/66
11/17/2014
resource record is received. If a malicious user overwrites information in the cache, known as a
cache poisoning attack, the malicious user might be able to redirect your network traffic to a
malicious site. When you enable cache locking, the DNS server prohibits cached records from being
overwritten for the duration of the TTL value or a portion thereof.
You configure cache locking as a percentage value. For example, if the cache locking value is set to
50, then the DNS server will not overwrite a cached entry for half of the duration of the TTL. By
default, the cache locking percentage value is 100. This means that cached entries will not be
overwritten for the entire duration of the TTL. As a best practice, you should set your cache locking
settings to at least 90%.
You can configure cache locking with the dnscmd tool by performing the following procedure:
1.
2.
3.
Alternatively, you can use the Windows PowerShell Set-DnsServerCache LockingPercent cmdlet
to set this value. For example:
25/66
11/17/2014
list. The socket pool exclusion list allows you to specify port ranges that will never be used as a
source port for DNS queries.
You can configure the DNS socket pool size by using the dnscmd tool as follows:
1.
2.
3.
In Windows 2012 the dnscmd command functions have been ported to Windows PowerShell
commands. To configure the DNS socket pool size, open an elevated Windows PowerShell window
and perform the following steps:
1.
2.
3.
4.
DNSSEC
DNSSEC enables a DNS zone and all records in the zone to be signed cryptographically so that client
computers can validate the DNS response. DNS is often subject to various attacks, such as spoofing
and cache-tampering. DNSSEC helps protect against these threats and provides a more secure DNS
infrastructure.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
26/66
11/17/2014
Intercepting and tampering with an organizations DNS query response is a common attack method.
If malicious users can alter responses from DNS servers, or send spoofed responses to point client
computers to their own servers, they can gain access to sensitive information. Any service that
relies on DNS for the initial connectionsuch as e-commerce web servers and email serversare
vulnerable. DNSSEC protects clients that are making DNS queries from accepting false DNS
responses.
When a DNS server that hosts a digitally signed zone receives a query, it returns the digital
signatures along with the requested records. A resolver or another server can obtain the public key
of the public/private key pair from a trust anchor, and then validate that the responses are authentic
and have not been tampered with. To do this, you must configure the resolver or server with a trust
anchor for the signed zone or for a parent of the signed zone.
Trust Anchors
A trust anchor is an authoritative entity that is represented by a public key. The TrustAnchors zone
stores preconfigured public keys that are associated with a specific zone. In DNS, the trust anchor is
the DNSKEY or DS resource record. Client computers use these records to build trust chains. You
must configure a trust anchor from the zone on every domain DNS server to validate responses
from that signed zone. If the DNS server is a domain controller, then Active Directory-integrated
zones can distribute the trust anchors.
Deploying DNSSEC
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
27/66
11/17/2014
To deploy DNSSEC:
1.
Install Windows Server 2012, and assign the DNS role to the server. Typically, a domain
controller also acts as the DNS server. However, this is not a requirement.
2.
Sign the DNS zone by using the DNSSEC Configuration Wizard, which is located in the DNS
console.
3.
4.
Note: Zones also can be unsigned, by using the DNSSEC management user interface to
remove zone signatures.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
28/66
11/17/2014
Note: A key rollover is the act of replacing one key pair with another at the end of a keys
effective period.
Windows Server 2012 has simplified DNSSEC implementation. Although DNSSEC was supported in
Windows Server 2008 R2, most of the configuration and administration tasks were performed
manually, and zones were signed when they were offline.
29/66
11/17/2014
DNS response validation is achieved by associating a private/public key pair (as generated by the
administrator) with a DNS zone, and then defining additional DNS resource records to sign and
publish keys. Resource records distribute the public key, while the private key remains on the
server. When the client requests validation, DNSSEC adds data to the response that enables the
client to authenticate the response.
The following table describes the new resource records in Windows Server 2012.
Resource record
Purpose
DNSKEY
This record publishes the public key for the zone. It checks the authority of a response against the
private key held by the DNS server. These keys require periodic replacement through key rollovers.
Windows Server 2012 supports automated key rollovers. Every zone has multiple DNSKEYs that are
then broken down to the ZSK and KSK.
This record is a delegation record that contains the hash of the public key of a child zone. This record
is signed by the parent zones private key. If a child zone of a signed parent also is signed, the DS
records from the child must be manually added to the parent so that a chain of trust can be created.
This record holds a signature for a set of DNS records. It is used to check the authority of a response.
(RRSIG)
Next Secure (NSEC)
When the DNS response has no data to provide to the client, this record authenticates that the host
does not exist.
NSEC3
This record is a hashed version of the NSEC record that prevents alphabet attacks by enumerating the
zone.
cmdlet
Description
Add- DnsServerResourceRecordDnsKey
You use this cmdlet to add a type DNSKEY resource record to a DNS zone.
Add-DnsServerResourceRecordDS
You use this cmdlet to add a type DS resource record to a DNS zone.
Add-DnsServerTrustAnchor
You use this cmdlet to add a trust anchor to a DNS server. Windows Server
2012 R2 now includes the Root option. This option allows you to retrieve
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
30/66
11/17/2014
Export-DnsServerDnsSecPublicKey
You use this cmdlet to export DS and DNSKEY information for a DNSSECsigned zone.
Get-DnsServerDnsSecZoneSetting
You use this cmdlet to get the DNSSEC settings for a zone.
Get-DnsServerSetting
You use this cmdlet to retrieve DNS server settings. Windows Server 2012
R2 adds the RootTrustAnchorsURL to the output.
Set-DnsServerDnsSecZoneSetting
You use this cmdlet to make changes to the settings for a DNSSEC zone.
Step-DnsServerSigningKeyRollover
You use this cmdlet to force a KSK rollover when the DS record has been
manually updated in the parent.
2.
3.
Use the DNSSEC Zone Signing Wizard to sign the Adatum.com zone.
4.
5.
6.
Add the Key Signing Key by accepting default values for the new key.
7.
Add the Zone Signing Key by accepting the default values for the new key.
8.
9.
Do not choose to enable the distribution of trust anchors for this zone.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
31/66
11/17/2014
With the development of IPv6 and the proliferation of devices that require IP addresses, networks
have become complex and difficult to manage. Maintaining an updated list of static IP addresses that
have been issued has often been a manual task, which can lead to errors. To help organizations
manage IP addresses, Windows Server 2012 provides the IP Address Management (IPAM) tool.
Lesson Objectives
After completing this lesson, you will be able to:
Describe IPAM.
Describe IPAM architecture.
Describe the requirements for IPAM implementations.
Explain how to manage IP addressing by using IPAM.
Explain how to install and configure IPAM.
Explain how to manage and monitor IPAM.
Describe considerations for implementing IPAM.
What Is IPAM?
IP address management is a difficult task in large networks, because tracking IP address usage is
largely a manual operation. Windows Server 2012 introduces IPAM, which is a framework for
discovering, auditing, monitoring utilization, and managing the IP address space in a network.
IPAM enables the administration and monitoring of DHCP and DNS, and provides a comprehensive
view of where IP addresses are used. IPAM collects information from domain controllers and
Network Policy Servers (NPSs), and then stores that information in the Windows Internal Database.
IPAM assists in the areas of IP administration, as shown in the following table.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
32/66
11/17/2014
IP administration
IPAM capabilities
area
Planning
Provides a tool set that can reduce the time and expense of the planning process when network
changes occur.
Managing
Provides a single point of management, and assists in optimizing utilization and capacity
planning for DHCP and DNS.
Tracking
Auditing
Assists with compliance requirements, such as the Health Insurance Portability and
Accountability Act (HIPAA) and Sarbanes-Oxley Act of 2002, and provides reporting for
forensics and change management.
Characteristics of IPAM
Characteristics of IPAM include:
A single IPAM server can support up to 150 DHCP servers and 500 DNS servers.
A single IPAM server can support up to 6,000 DHCP scopes and 150 DNS zones.
IPAM stores three years of forensics data (IP address leases, host MAC addresses, user logon and
logoff information) for 100,000 users in a Windows Internal Database when using Windows Server
2012. Windows Server 2012 R2 added the option to select a Windows Internal Database or SQL
Server. There is no database purge policy provided, and the administrator must purge the data
manually as needed.
IPAM on Windows Server 2012 supports only Windows Internal Database. An external database is
supported only when IPAM is implemented on Windows Server 2012 R2.
IP address utilization trends are provided only for IPv4.
IP address reclamation support is provided only for IPv4.
IPAM does not check for IP address consistency with routers and switches.
Benefits of IPAM
IPAM benefits include:
IPv4 and IPv6 address space planning and allocation.
IP address space utilization statistics and trend monitoring.
Static IP inventory management, lifetime management, and DHCP and DNS record creation and
deletion.
Service and zone monitoring of DNS services.
IP address lease and logon event tracking.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
33/66
11/17/2014
Note: IPAM has limited support for management and configuration of non-Microsoft
network elements.
For a complete list of the available commands, review IPAM Server cmdlets in Windows
PowerShell.
http://go.microsoft.com/fwlink/?LinkID=386637
IPAM Overview
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
34/66
11/17/2014
IPAM architecture consists of four main modules, as listed in the following table.
Module
Description
IPAM discovery
You use AD DS to discover servers that are running Windows Server 2008 and newer Windows Server
operating systems, and that have DNS, DHCP, or AD DS installed. You can define the scope of discovery to
a subset of domains in the forest. You also can add servers manually.
IP address space
You can use this module to view, monitor, and manage the IP address space. You can issue addresses
management
dynamically or assign them statically. You also track address utilization and detect overlapping DHCP
scopes.
Multi-server
You can manage and monitor multiple DHCP servers. This enables tasks to execute across multiple servers.
management and
For example, you can configure and edit DHCP properties and scopes, and track the status of DHCP and
monitoring
scope utilization. You also can monitor multiple DNS servers, and monitor the health and status of DNS
zones across authoritative DNS servers.
Operational auditing
You can use the auditing tools to track potential configuration problems. You can also collect, manage, and
and IP address
view details of configuration changes from managed DHCP servers. You also can collect address lease
tracking
tracking from DHCP lease logs, and collect logon event information from NPS and domain controllers.
The IPAM server can manage only one Active Directory forest. As such, you can deploy IPAM in one
of three topologies:
Distributed. You deploy an IPAM server to every site in the forest.
Centralized. You deploy only one IPAM server in the forest.
Hybrid. You deploy a central IPAM server together with a dedicated IPAM server in each site. You
can manage DHCP services, DNS services, and NPS services for multiple IPAM servers with a
central server. This allows local administrators to manage local servers, while allowing all the
servers to be managed from a central location, if necessary.
Note: IPAM servers do not communicate with one another or share database information.
If you deploy multiple IPAM servers, you must customize each servers discovery scope.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
35/66
11/17/2014
Configuration
Domain
Setting
Controller
DHCP Servers
DNS Servers
Servers
and NPS
<domain>\IPAM UG
Added as a
group
member of the
BUILTIN\Ev
ent Log
Readers group
Windows Firewall with
Inbound firewall
Advanced Security
rules to allow
Remote Event
Log
Management
Managemen t
Log Management
Network Share
Share the
%SYSTEMROOT%\System32\
DHCP folder as DHCPAudit. Grant
IPAMUG read permissions
Modify the
on DNS servers
HKLM\SYSTEM\CurrentCont rolSet
\Services\EventLog\DNS Server
registry key
Additional settings
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
36/66
11/17/2014
If you choose to use GPO provisioning, you will run the Invoke-IpamGpoProvisioning Windows
PowerShell command. Running this command will create three GPOs to configure the settings
described in the table above.
IPAM_DC_NPS. This GPO is applied to all managed AD DS servers and NPS servers.
IPAM_DHCP. This GPO is applied to all managed DHCP servers. This GPO includes scripts to
configure the network share for DHCP monitoring.
IPAM_DNS. This GPO is applied to all managed DNS servers. This GPO includes scripts to configure
the event log for DNS monitoring and to configure the IPAMUG group as a DNS administrator.
To ensure a successful IPAM implementation, you must meet the following prerequisites:
The IPAM server must be a domain member, but it cannot be a domain controller.
The IPAM server should be a single-purpose server. Do not install other network roles such as
DHCP or DNS on the same server.
To manage the IPv6 address space, you must have IPv6 enabled on the IPAM server.
Sign in on the IPAM server with a domain account, and not with a local account.
You must be a member of the correct IPAM local security group on the IPAM server.
You must enable logging of account logon events on domain controller and NPS servers for IPAMs
IP address tracking and auditing feature.
37/66
11/17/2014
In addition to the previously mentioned requirements, if you manage Windows Server 2008 and
Windows Server 2008 R2 with IPAM, the Windows 2008 or Windows 2008 R2 servers require the
following:
Service Pack 2 (SP2) must be installed on Windows Server 2008.
Microsoft .NET Framework 4.0 full installation must be installed.
Windows Management Framework 3.0 must be installed (KB2506146).
For Windows Server 2008 SP2, Windows Management Framework Core (KB968930) also is
required.
Windows Remote Management must be enabled.
Verify that service principal names (SPNs) are written.
2.
In the Server Manager, add the IPAM feature and all required supporting features.
Configure IPAM
1.
In the IPAM Overview pane, provision the IPAM server using Group Policy.
2.
Enter IPAM as the Group Policy Object (GPO) name prefix, and provision IPAM. Provisioning will
take a few minutes to complete.
3.
In the IPAM Overview pane, configure server discovery for the Adatum domain.
4.
In the IPAM Overview pane, start the server discovery process. Discovery may take five to 10
minutes to run. The yellow bar indicates when discovery is complete.
5.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
38/66
11/17/2014
6.
7.
Use Windows PowerShell to grant the IPAM server permission to manage LON-DC1 by using the
following command:
Invoke-IpamGpoProvisioning Domain Adatum.com GpoPrefixName IPAM IpamServerFqdn
LON-SVR2.adatum.com DelegatedGpoUser Administrator
8.
9.
Switch to LON-DC1.
Beginning with Windows Server 2012 R2, IPAM offers a centralized management console for both
physical and virtual address spaces. When IPAM is integrated with Microsoft System Center 2012
R2 Virtual Machine Manager (VMM), you can use automation for your Microsoft cloud-based network.
You can use IPAM to manage multiple instances of VMM to provide a single console for detecting
conflicts, duplicates, and overlaps of the IP Address spaces in your data center.
Virtualization support is provided when you use the two types of IPAM virtual address spaces, which
are called the provider and the customer virtual address spaces. The provider address space
typically contains the addresses associated with the datacenter, the customer address spaces
typically hold the virtual addresses used by the customers. The only address space created during
installation is the Default IP Address Space, which is a provider address space located in the
VIRTUALIZED IP ADDRESS SPACE pane.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
39/66
11/17/2014
To create a new Address space, you use the Add-IpamAddressSpace Windows PowerShell cmdlet.
When you create a virtual address space, you must specify a friendly name for the address space,
regardless of whether it is a provider or a customer address space. Additionally, you can add an
optional description. When you create a customer address space, you also must specify the provider
address space in which the customer address space resides, and the isolation method the customer
network uses.
To create a new provider address space for the AdatumHQ datacenter based virtual systems, use
the following Windows PowerShell cmdlet.
When you create a customer address space, you must configure additional settings. A customer
address space must reside in a provider address space. Additionally, you must specify how the
customer network will interact with other networks when you specify the network isolation method
as either IPRewrite or Network Virtualization using Generic Routing Encapsulation (NVGRE).
IPRewrite is a static isolation method in which each customer IP address gets rewritten when you
use a physical address from the provider network. Network Virtualization using Generic Routing
Encapsulation (NVGRE) is an isolation method that encapsulates the customer traffic and sends all of
that traffic using a single IP address from the provider network.
To create a new customer address space for the Security department, using the AdatumHQ provider
address space and NVGRE isolation, use the following Windows PowerShell cmdlet.
Add-IpamAddressSpace -Name "Security Department" -CustomerAddressSpace AssociatedProviderAddressSpace "AdatumHQ" -IsolationMethod NVGRE Description
Security Department Network
You can create additional optional settings as part of the Windows PowerShell command or add them
manually after creation. These optional settings include custom fields such as AD site or VMM IP
Pool Name.
IPAM RBAC
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
40/66
11/17/2014
Description
IPAM administrator
Access scopes. Access scopes define the objects to which an administrator has access. By default,
the Global access scope is created when IPAM is installed, and all administrator-created access
scopes are sub-scopes of the Global access scope. Users or groups assigned to the Global access
scope can manage all the network objects in IPAM. Access scopes have up to 15 major operations
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
41/66
11/17/2014
that can be assigned, such as DHCP server operations. These are further defined by multiple
related operations, such as Create DHCP scope, that can be assigned individually. This allows for a
large administrative permissions customization range in IPAM. You can create and add new access
scopes in the IPAM console, in the ACCESS CONTROL pane.
Access Policies. An access policy combines a role with an access scope to assign RBAC
permissions within IPAM. You can create and add new access policies in the IPAM console, in the
ACCESS CONTROL pane.
Lesson Objectives
After completing this lesson, you will be able to:
Use IPAM to manage IP addressing.
Add address spaces to IPAM.
Import and update address spaces.
Maintain an IPAM inventory.
Monitor IPAM.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
42/66
11/17/2014
IP address space management allows administrators to manage, track, audit, and report on an
organizations IPv4 and IPv6 address spaces.
The IPAM IP address space console provides administrators with IP address utilization statistics and
historical trend data so that they can make informed planning decisions for dynamic, static, and
virtual address spaces. IPAM periodic tasks discover the address space and utilization data
automatically, as configured on the DHCP servers that are managed in IPAM. You also can import IP
address information from comma separated values (.csv) files.
IPAM also enables administrators to detect overlapping IP address ranges that are defined on
different DHCP servers, find free IP addresses within a range, create DHCP reservations, and create
DNS records.
IPAM provides a number of ways to filter the view of the IP address space. You can customize how
you view and manage the IP address space by using any of the following views:
IP address blocks, which contain:
o IP address subnets
o IP address ranges
o IP addresses
IP address inventory
IP address range groups
IP Address Blocks
IP address blocks are the highest-level entities within an IP address space organization.
Conceptually, an IP block is either a private IP address space or a public IP address space assigned
to an organization by various Regional Internet Registries. Network administrators use IP address
blocks to create and allocate IP address ranges to DHCP. They can add, import, edit, and delete IP
address blocks. IPAM automatically maps IP address subnets to the appropriate IP address block
based on the boundaries of the range. IPAM utilization statistics and trends are summarized at the
block level.
IP Address Subnets
IP address subnets are the next hierarchical level of address space entities after IP address blocks.
IPAM summarizes utilization statistics and trends at the IP address subnet level for the IP address
ranges that the IP address subnet contains. Additionally, you can create subnets as either physical
or virtual; if subnets are virtual, they can be assigned to either a provider or a customer virtual
network.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
43/66
11/17/2014
IP Address Ranges
IP address ranges are the next hierarchical level of IP address space entities after IP address
subnets. Conceptually, an IP address range is an IP subnet, or part of an IP subnet marked by a
start and end IP address. It typically corresponds to a DHCP scope, or to a static IPv4 or IPv6
address range or address pool that assigns addresses to hosts. An IP address range is uniquely
identifiable by the value of the mandatory Managed by Service and Service Instance options, which
help IPAM manage and maintain overlapping or duplicate IP address ranges from the same console.
You can add or import IP address ranges from within the IPAM console. Whenever an IP address
range is created, it is associated automatically with an IP address subnet. If a subnet does not exist,
one can be automatically created when the IP address range is created.
IP Addresses
IP addresses are the addresses that make up the IP address range. IPAM enables end-to-end life
cycle management of IPv4 and IPv6 addresses, including record synchronization with DHCP and DNS
servers. IPAM automatically maps an address to the appropriate range based on the ranges start
and end address. An IP address is uniquely identifiable by the value of mandatory Managed By
Service and Service Instance options that help IPAM manage and maintain duplicate IP addresses
from the same console. You can add or import IP addresses from within the IPAM console.
IP Address Inventory
In the IP address inventory view, you can view a list of all IP addresses in the enterprise, along with
their device names and type. IP address inventory is a logical group defined by the Device Type
option within the IP addresses view. These groups allow you to customize the way your address
space displays for managing and tracking IP usage. You can add or import IP addresses from within
the IPAM console. For example, you could add the IP addresses for printers or routers, assign IP
addresses to the appropriate device type of printer or router, and then view your IP inventory
filtered by the device type that you assigned.
View
Description
By default, managed DHCP and DNS servers are arranged by their network interface in /16 subnets for IPv4 and
servers
/48 subnets for IPv6. You can select the view to see just DHCP scope properties, just DNS server properties, or
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
44/66
11/17/2014
both.
DHCP scopes
The DHCP scope view enables scope utilization monitoring. Utilization statistics are collected periodically and
automatically from a managed DHCP server. You can track important scope properties such as Name, ID, Prefix
Length, and Status.
DNS zone
Zone monitoring is enabled for forward and reverse lookup zones. Zone status is based on events collected by
monitoring
Server groups
You can organize your managed DHCP and DNS servers into logical groups. For example, you might organize
servers by business unit or geography. Groups are defined by selecting the grouping criteria from built-in fields or
user-defined fields.
Note: The term prefix length is equivalent to using the term subnet mask when you define
an address range. Prefix length is used in PowerShell and refers to the routing prefix that
Classless Inter-Domain Routing (CIDR) notation uses. For example:
192.168.2.0/24, i.e. the 192.168.2.0 network with a prefix length of 24, is equivalent to
192.168.2.0/255.255.255.0, i.e. 192.168.2.0 with a network mask of 255.255.255.0.
An address space is a container that consists of a set of connected IP blocks, IP subnets, IP ranges
or IP addresses. The IP ADDRESS SPACE pane contains all the IP objects discovered or created.
Non-virtualized network objects are always in the IP ADDRESS SPACE pane.
When you add IP addresses to IPAM manually, you can add either IPv4 or IPv6 addresses. When you
use the IPAM console to add IP addresses, default values are automatically filled in for required
fields, except for the IP addresses. You can add or import any of the following:
IP Address Block. When you add an IP Address Block, when you supply the Network ID and Prefix
length, the start IP address and End IP address will be calculated automatically. Additionally, if
you enter a non-private IP address range, you must specify the Regional Internet Registry where
the addresses are registered and the registration date range. Optionally, you can add a brief
description and an owner.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
45/66
11/17/2014
The following Windows PowerShell cmdlet Add-IpamBlock also can be used to add an IP Address
block:
Add-IpamBlock NetworkID <network prefix, in Classless InterDomain Routing (CIDR) notation> Rir <string>
The RIR value is optional for private addresses. If you specify the RIR, the value must be one of:
AFRNIC, APNIC, ARIN, LACNIC, or RIPE.
IP Address Subnet. When you add an IP Address subnet, you must provide a friendly name for the
subnet. Additionally, you must specify the Network ID and Prefix length.
There are several optional settings when you add an IP Address subnet. You can specify one or more
VLANs to be associated with the subnet, whether or not the subnet is virtualized, or custom fields
such as AD site or VMM IP Pool Name. As with the other IP address types, you can add a brief
description and an owner.
The Windows PowerShell cmdlet Add-IpamSubnet also can be used to add an IP address subnet.
When you Add-IpamSubnet, you also must specify if the network type is NonVirtualized, Provider, or
Customer IP Subnet. You must specify the address space to which the Customer IP Subnet will be
added.
Add-IpamSubnet NetworkID <network prefix, in Classless InterDomain Routing (CIDR) notation> Rir <string>
IP Address Range. You can use an IP Address range to further divide an IP Subnet. When you
create an IP address range you must specify the Network ID and either the Prefix length or
Subnet mask. Additionally, if an IP address does not already exist that contains the addresses in
the IP address range you create, you can select to have one created automatically. The other
required fields, Managed by Service, Service Instance, and Assignment Type will use default
values unless otherwise specified. As with the other IP address types, a large variety of custom
fields is available to describe the IP address range.
You also can use the Windows PowerShell cmdlet Add-IpamRange to add an IP Address range.
When you use Add-IpamRange, you must also specify if the network type is NonVirtualized,
Provider, or Customer IP range. You must specify the address space to which the Customer IP
Subnet will be added.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
46/66
11/17/2014
Add-IpamRange NetworkID <network prefix, in Classless InterDomain Routing (CIDR) notation> CreateSubnetIfNotFound
You can use the Windows PowerShell cmdlet Add-IpamAddress to add an IP Address. When you
use Add-IpamAddress, you also must specify the IP address.
You can create IP address objects when you import IP address information into IPAM using a text
file. When you import information for a file, you must include the required fields for the address
type, just as you do when you add addresses through the console. The file you create is a comma
delimited file with the field names in the first row.
You can import information into custom fields; however, they must be defined before you import the
data, and you must include the defined field name in the first line. The fields are not required to be
in any particular order; however, the data must be in the same order as the fields.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
47/66
11/17/2014
When you create test files, the following rules apply to the data:
Field names and Data can be enclosed quotes.
Field names and Data can contain spaces.
Field names and Data are not case sensitive.
Data must be valid for the field into which it is being imported.
For example, you can use the following entries in a text file to import two addresses into the IPAM
database that manages a DHCP server named DHCP1.adatum.com:
For IP address blocks, subnets, and ranges, the network ID and network prefix length are combined
in a single field named Network. For example, to import an IP Address block of 65.52.0.0/14
assigned by the ARIN regional authority, use the following entries in a text file:
If a required field is missing or you try to import the wrong data type for a field, an error report is
created in the users Documents folder. The mandatory fields for importing data are as follows:
IP address block import: Network, Start IP address, End IP address, RIR
IP address subnet import: Name, Network
IP address range import: Network, Start IP address, End IP address, Managed by Service, Service
Instance, Assignment Type, Utilization Calculation
IP address import: IP address, Managed by Service, Service Instance, Device Type, IP Address
State, Assignment Type
48/66
11/17/2014
will create new ranges as appropriate. The import and update process is specific for a defined
Managed by Service and Service Instance pair.
You can perform two operations on an IP Address Range: You can Find and Allocate Available IP
Address or Reclaim IP Addresses.
49/66
11/17/2014
If you configure the DHCP Reservation and DNS Record sections, only the IPAM database is affected
by default. If you want to configure a DHCP reservation for a managed IP address, complete the
DHCP Reservation section and check the Automatically create DHCP reservation for this IP
address check box. To create DNS records for the selected IP Address, complete the DNS Record
section and check the Automatically create DNS records for this IP address check box.
Reclaim IP Addresses
When manually added IP Addresses are no longer in use, you need to reclaim them to make them
available for use with other devices. Additionally, the reclaim operations cleans DHCP reservations
and DNS records on managed DNS and DHCP servers. There are two ways to reclaim IP addresses:
To reclaim IP addresses in a range, in the IP ADDRESS SPACE, change the current view to IP
Address Ranges. The Reclaim IP Addresses task is available if you right-click the desired IP address
range. If you choose this operation, it opens the Reclaim IP Addresses dialog box.
The Reclaim IP Addresses dialog box displays all the utilized IP addresses for the range, the IP
Address State, and additional information such as the Device Name and Device Type. Once you have
determined the IP addresses that you want to reclaim, check the select check box next to the IP
addresses, and click the Reclaim button. By default, this operation removes the DNS resource
records and DHCP reservations.
You can manage individual addresses through the IPAM console as necessary. When you want to
manage an individual address, there are two locations where you can accomplish this. In the IP
ADDRESS SPACE, you change the current view to IP Addresses or the IP Address Inventory pane.
The management options are available when you right-click the desired IP address. The context
menu includes three types of operations: Edit, Create, and Delete.
Edit IP Address
The Edit IP Address dialog box allows you to add
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
50/66
11/17/2014
information to an IP address or change information that was previously configured. You can modify
all aspects of the IP address information.
Create Operations
There are three options available for creating records for an IP Address. These include:
Create DHCP Reservation. This option creates a DHCP reservation in the appropriate IP Address
Range.
Create DNS Host Record. This option creates a DNS record on the appropriate DNS server or
servers for the IP Address Range.
Create DNS PTR Record. This option creates a DNS OTR record on the appropriate DNS server or
servers for the IP Address Range.
Delete Operations
There are four options available for deleting IP addresses or the information associated with them.
These include:
Delete. The delete option will remove the IP address from the IPAM database. By default, this will
remove the DNS records and DHCP reservations if they exist.
Delete DHCP Reservation. The option will remove any DHCP reservations created for the IP
address, without removing the IP address from the IPAM database.
Delete DNS Host Record. The option will remove any DNS Host Records for the IP address,
without removing the IP address from the IPAM database.
Delete DNS PTR Record. The option will remove any DNS PTR Records for the IP address, without
removing the IP address from the IPAM database.
Demonstration Steps
1.
On LON-SVR2, add an IP address block in the IPAM console with the following parameters:
Network ID: 172.16.0.0
Prefix length: 16
Description: Head Office
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
51/66
11/17/2014
2.
Add IP addresses for the network router by adding to the IP Address Inventory with the
following parameters:
IP address: 172.16.0.1
MAC address: 112233445566
Device type: Routers
Description: Head Office Router
3.
4.
Use the IPAM console to create the DNS host record as follows:
Device name: Webserver
Forward lookup zone: Adatum.com
Forward lookup primary server: LON-DC1.adatum.com
Automatically create DNS records for this IP address
5.
On LON-DC1, open the DHCP console and confirm that the reservation was created in the
172.16.0.0 scope.
6.
On LON-DC1, open the DNS Manager console and confirm that the DNS host record was created.
IPAM Monitoring
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
52/66
11/17/2014
The IPAM address space management feature allows you to efficiently view, monitor, and manage
the IP address space on the network.
Address space management supports IPv4 public and private addresses, and IPv6 global and unicast
addresses. By using the MONITOR AND MANAGE section and the DNS and DHCP, DHCP Scopes, DNS
Zone Monitoring, and Server Groups views, you can view and monitor health and configuration of all
the DNS and DHCP servers that IPAM manages. IPAM uses scheduled tasks to periodically collect
data from managed servers.
You also can retrieve data on demand by using the Retrieve All Server Data option.
Utilization Monitoring
Utilization data is maintained for IP address ranges, IP address blocks, and IP range groups within
IPAM. You can configure thresholds for the percentage of the IP address space that is utilized, and
then use those thresholds to determine under-utilization and over-utilization.
You can perform utilization trend building and reporting for IPv4 address ranges, blocks, and range
groups. The utilization trend window allows you to view trends over time periods, such as daily,
weekly, monthly, or annually. You also can view trends over custom date ranges. Utilization data
from managed DHCP scopes is auto-discovered, and you can view this data.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
53/66
11/17/2014
For DHCP servers, the server view allows you to track various server settings, server options, the
number of scopes, and the number of active leases that are configured on the server. For DNS
servers, this view allows you to track all zones that are configured on the server, along with details
of the zone type. The view also allows you to see the total number of zones that are configured on
the server, and the overall zone health status as derived from the zone status of individual zones on
the server.
54/66
11/17/2014
In this demonstration, you will see how to use the IPAM console to monitor DNS and DHCP.
Demonstration Steps
1.
On LON-SVR2, review the information displayed in the DNS and DHCP Servers pane in the
IPAM console.
2.
3.
4.
Objectives
In this lab, you will see how to:
Configure advanced DHCP settings.
Configure advanced DNS settings.
Configure IP address management.
Lab Setup
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
55/66
11/17/2014
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V
Manager.
2.
In Hyper-V Manager, click 20412D-LON-DC1, and in the Actions pane, click Start.
3.
In the Actions pane, click Connect. Wait until the virtual machine starts.
4.
5.
Configure a superscope.
2.
3.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
56/66
11/17/2014
1.
2.
Configure a second scope named Scope2 with a range of 192.168.1.50 192.168.1.100, and
with the following settings:
Subnet mask: 255.255.255.0
Router: 192.168.1.1
DNS Suffix: Adatum.com
Choose to activate the scope later.
3.
Create a superscope called AdatumSuper that has Scope1 and Scope2 as members.
4.
Switch to the DHCP console on LON-DC1, and enable DHCP Name Protection found on the DNS
tab of the IPv4 node.
1.
On LON-SVR1, start the DHCP console and observe the current state of DHCP. Note that the
server is authorized, but that no scopes are configured.
2.
3.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
57/66
11/17/2014
5.
On LON-SVR1, refresh the IPv4 node. Notice that the IPv4 node is active, and that Scope
Adatum is configured.
6.
7.
8.
9.
Results: After completing this exercise, you will have configured a superscope, configured DHCP
Name Protection, and configured and verified DHCP failover.
Configure DNSSEC.
2.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
58/66
11/17/2014
3.
4.
1.
2.
Use the DNSSEC Zone Signing Wizard to sign the Adatum.com zone.
3.
4.
5.
Add the Key Signing Key by accepting the default values for the new key.
6.
Add the Zone Signing Key by accepting the default values for the new key.
7.
8.
9.
10. Verify that the DNSKEY resource records have been created in the Trust Points zone.
11. Minimize the DNS console.
12. Use the Group Policy Management Console, in the Default Domain Policy object, to configure the
Name Resolution Policy Table.
13. Create a rule that enables DNSSEC for the Adatum.com suffix, and that requires DNS clients to
verify that the name and address data were validated.
1.
2.
Run the following command to view the current size of the socket pool:
Get-DNSServer
3.
Run the following command to change the socket pool size to 3,000:
dnscmd /config /socketpoolsize 3000
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
59/66
11/17/2014
4.
5.
Run the following command to confirm the new socket pool size:
Get-DnsServer
1.
Run the following command to view the current cache lock size:
Get-DnsServer
2.
Run the following command to change the cache lock value to 75 percent:
Set-DnsServerCache LockingPercent 75
3.
4.
Run the following command to confirm the new cache lock value:
Get-DnsServer
1.
Create an Active Directory-integrated forward lookup zone named Contoso.com, by running the
following command:
Add-DnsServerPrimaryZone Name Contoso.com ReplicationScope Forest
2.
3.
Create an Active Directory-integrated forward lookup zone named GlobalNames by running the
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
60/66
11/17/2014
following command:
Add-DnsServerPrimaryZone Name GlobalNames ReplicationScope Forest
4.
Open the DNS Manager console, and add a new host record to the Contoso.com domain named
App1 with the IP address of 192.168.1.200.
5.
In the GlobalNames zone, create a new alias named App1 using the FQDN of
App1.Contoso.com.
6.
Results: After completing this exercise, you will have configured DNSSEC, the DNS socket pool,
DNS cache locking, and the GlobalName zone.
2.
3.
4.
5.
6.
Configure IP address blocks, record IP addresses, and create DHCP reservations and DNS
records.
7.
On LON-SVR2, install the IP Address Management (IPAM) Server feature by using the Add
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
61/66
11/17/2014
1.
On LON-SVR2, in the Server Manager, in the IPAM Overview pane, provision the IPAM server
using Group Policy.
2.
Enter IPAM as the GPO name prefix, and provision IPAM using the Provision IPAM Wizard.
1.
In the IPAM Overview pane, configure server discovery for the Adatum domain.
2.
In the IPAM Overview pane, start the server discovery process. Discovery may take five to 10
minutes to run. The yellow bar will indicate when discovery is complete.
1.
In the IPAM Overview pane, add the servers that you need to manage. Verify that IPAM access
is currently blocked for both LON-DC1 and LON-SVR1.
2.
Use Windows PowerShell to grant the IPAM server permission to manage by running the
following command:
Invoke-IpamGpoProvisioning Domain Adatum.com GpoPrefixName IPAM IpamServerFqdn
LON-SVR2.adatum.com DelegatedGpoUser Administrator
3.
For both LON-DC1 and LON-SVR1, set the manageability status to Managed.
4.
Switch to LON-DC1, and force the update of Group Policy using gpupdate /force.
5.
Switch to LON-SVR1, and force the update of Group Policy by using gpupdate /force.
6.
Return to LON-SVR2, and refresh the server access status for LON-DC1 and LON-SVR1 and the
Server Manager console view. It may take up to 10 minutes for the status to change. If
necessary, repeat both refresh tasks as needed until a green check mark displays next to LONDC1 and the IPAM Access Status displays as Unblocked.
7.
In the IPAM Overview pane, right click LON-SVR1 and Retrieve All Server Data.
8.
In the IPAM Overview pane, right-click LON-DC1 and Retrieve All Server Data.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
62/66
11/17/2014
1.
On LON-SVR2, use IPAM to create a new DHCP scope with the following parameters:
Scope Name: TestScope
Scope start address: 10.0.0.50
Scope end address: 10.0.0.100
Subnet mask: 255.0.0.0
Default gateway: 10.0.0.1
2.
Use IPAM to configure failover for the TestScope on LON-DC1 with the following parameters:
Partner server: LON-SVR1.adatum.com
Relationship name: TestFailover
Shared secret: Pa$$w0rd
Maximum client lead time: 15 minutes
Mode: Load balance
Load balance percentage: 50%
State Switchover Interval: 60 minutes
3.
4.
Task 6: Configure IP address blocks, record IP addresses, and create DHCP reservations and DNS records
1.
On LON-SVR2, add an IP address block in the IPAM console with the following parameters:
Network ID: 172.16.0.0
Prefix length: 16
Description: Head Office
2.
Add IP addresses for the network router by adding to the IP Address Inventory with the
following parameters:
IP address: 172.16.0.1
MAC address: 112233445566
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
63/66
11/17/2014
4.
Use the IPAM console to create the DNS host record as follows:
Device name: Webserver
Forward lookup zone: Adatum.com
Forward lookup primary server: LON-DC1.adatum.com
Automatically create DNS records for this IP address
5.
On LON-DC1, open the DHCP console and confirm that the reservation was created in the
172.16.0.0 scope.
6.
On LON-DC1, open the DNS Manager console and confirm that the DNS host record was created.
1.
2.
In the Virtual Machines list, right-click 20412D-LON-DC1, and then click Revert.
3.
4.
Results: After completing this exercise, you will have installed IPAM and configured IPAM with
IPAM-related GPOs, IP management server discovery, managed servers, a new DHCP scope, IP
address blocks, IP addresses, DHCP reservations, and DNS records.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
64/66
11/17/2014
Question: Will client computers immediately stop communicating on the network if there is no
functioning DHCP server?
Question: What is the default size of the DNS socket pool?
Question: What value does the DNS cache lock use to determine when to update an IP
address in the DNS cache?
Troubleshooting Tip
Review Question
Question: What is one of the drawbacks of using IPAM?
65/66
11/17/2014
Answer: There may be a rogue DHCP server on the network. Common things to look for will be
gateway devicessuch as cable modems or Private Branch Exchange (PBX) boxesthat have a
DHCP component enabled. Another possibility is that someone configured the IP address on the
client manually.
Tools
Tool
Use
Location
Dnscmd
%systemroot%\System32\dnscmd.exe
management
DHCP console
%systemroot%\System32\dhcpmgmt.msc
%systemroot%\System32\dnsmgmt.msc
Server Manager
management
Get-DnsServer
Windows PowerShell
information.
Set-DnsServer
Windows PowerShell
Windows PowerShell
Windows PowerShell
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/f0dbeef0-b272-48dd-8dc9-110f5b924b47?ChapterNumber=3&FontSize=2&
66/66