DnsCluster: A networking tool for automatic domain zone updating

Size: px
Start display at page:

Download "DnsCluster: A networking tool for automatic domain zone updating"

Transcription

1 DnsCluster: A networking tool for automatic domain zone updating Charalambos Alatas and Constantinos S. Hilas * Dept. of Informatics and Communications Technological Educational Institute of Serres Serres, Greece * chilas@teiser.gr Abstract The Domain Name System can be considered as one of the most important services in the core of the Internet. It translates names that are meaningful to humans into numerical IP addresses. The most commonly used DNS server on the Internet is BIND. In this paper we present a client server application that is designed to cope with the problem of exchanging BIND information between a primary DNS Server and its secondary servers in large and/or different networks. I. INTRODUCTION The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource that is connected to the Internet. It associates various kind of information with domain names that are assigned to appliances and/or services. Its main contribution to the Internet semantics is that it translates humanly meaningful domain names to the numerical identifiers (IP addresses) that are associated with networking equipment locating and addressing. The DNS, also, makes it possible to assign names to groups of Internet users, independent of their physical location. This is the feature that permits Internet contact information (like hyperlinks and addresses) to remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device [1]. The Domain Name System (DNS) is maintained by a distributed database system, which uses the client-server model. The nodes of this database are the name servers. This is the largest and most distributed database currently on the planet, with the amazing feature of being updated and administered by millions of network administrators worldwide. DNS allows local administration of the segments on the overall database. Each domain or sub-domain has one or more authoritative DNS servers that publish information about that domain and any domains subordinate to it. The top of the hierarchy is served by the root nameservers, i.e. the servers that should be queried when looking up (resolving) a top-level domain name (TLD). Thus, data in each segment of the network (actually in each segment of the database) are available across the entire network through a client-server scheme consisting of name servers and resolvers. The most commonly used DNS server on the Internet, especially on Unix-like systems, is BIND (Berkeley Internet Name Domain or "named"). The BIND server allows a standard way of naming the different types of objects and resources that exist in distributed network environments, and provides operations for storing and retrieving information about these objects. BIND servers collectively manage a hierarchical name space that is partitioned into domains reflecting administrative entities [2]. Despite its wide use, BIND has been the target of some criticism as regards three of its features: configuration procedure, zone support and security. When configuring BIND one should always include all higher level domain labels in each domain name. BIND does not offer a store and retrieve mechanism for zone data, especially when communicating with secondary name servers. Last, BIND like many other popular Internet services has got no embedded security, though current implementations take care of this problem. In this paper we present a client server application that cooperates with Bind and adds automatic zone synchronization. We have named this application DnsCluster because it was primarily designed to cope with the problem of exchanging BIND information between a primary DNS Server and its secondary servers in large networks. DnsCluster is actually a plugin tool that cooperates with Bind and delivers a rock solid, load balancing, fault tolerant solution for serving the Domain Name System. The application was conceived three years ago when two or more Web Hosting Servers were demanding an all-in-one solution for managing their domains. The main concept was the development of an application that would be able to synchronize zones between different installations of the nameserver daemon. DnsCluster can be used from the smallest installation to the big enterprise DNS clustering system. It complies with the RCF-1591 and does not imply any new limitations. It is no exaggeration to state that the BIND nameserver is a great daemon for serving the Domain Name System, a statement

2 supported by its widespread use. DnsCluster respects all of its features and simply adds an extra one. The present paper proceeds as follows. In the next chapter the DNS operation is briefly discussed along with several applications that are responsible for exchanging domain zone information between primary and secondary nameservers. In Chapter III the features and the development of the DnsCluster application are discussed. Three common DNS server cluster configurations are presented in Chapter IV and the role of DnsCluster within them is presented. In the last chapter conclusions are drawn. II. DNS OPERATION AND COMMERCIAL PRODUCTS A. How DNS works The basic operation of DNS that allows a domain name to direct customers to a web site is depicted in Fig 1. The figure describes basic steps that are followed when a web browser attempts to view pages on a web site. The DNS system needs to determine which primary name server contains the requested domain name. So, the following procedure is followed. 1. The local name server contacts the root domain name server maintained by several Internet root server authorities. The local name server has already been contacted by the web browser, which is not shown in the figure. One may assume it is hosted in the same machine. 2. The root domain name server returns the IP address of the primary name server responsible for the requested domain name. 3. The local name server contacts the primary name server. 4. The primary name server holds the IP address information for the domain name in a database and satisfies the request from the local name server. 5. If the primary name server is unavailable, the local name server contacts the secondary name server that satisfies the request from the local name server. The local name server replies to the Web browser with the IP address for the requested domain name. It is common to contact directly the secondary name server and not the primary. 6. Using this IP address, the web browser contacts the web server. 7. Last, the web server (target machine) sends the web page to the web browser. In cases of large domains, one may maintain several secondary name servers. And to make things more complex, the secondary name servers may be geographically dispersed. DnsCluster application is responsible to always keep the secondary name servers updated with information served by the primary name server. B. Prior Work and Commercial Solutions DnsCluster is not the only solution around. Several applications are available that try to cope with the challenge. WHM/CPanel has developed a plugin, namely the cpanel DNS Only, that works quite similar to the way that the DnsCluster does. The major difference is that the WHM/CPanel's solution requires a dedicated and fresh installed server system to be installed on and may only cooperate with other WHM/CPanel installations [3]. On the contrary, DnsCluster can cooperate in virtually any hosting control panel environment using BIND nameserver. Figure 1. Basic DNS Operation Microsoft provides a redundant system that relies on Active Directory Services. Using a Primary Domain controller and a Secondary/Slave Domain Controller one can easily build a fault tolerant system that replicates every zone from the Primary Domain Controller to the Slave Domain Controller. The drawback of Microsoft's approach is that it only works when these two systems are in the same subnet. Moreover, it can be used with only two nameservers and in simple network topologies [4]. As already mentioned the most popular DNS server is the BIND. Every bind nameserver can be setup to query another nameserver and cache the results given. This solution provides load balancing but no fault tolerance features are available because if the primary nameserver fail then the other nameservers are not able to reach and query each other. Also, cache is only stored in memory which renders it unusable in case of a secondary server reboot. Bind cannot handle zones synchronization between servers and there is no plugin doing so. Bind can only transfer zone data and keep them up-to-date but every zone must be explicitly declared in the named.conf file. So there must be a mechanism for syncronizing the zone records in the named.conf file because bind is not doing this. DnsCluster handles exactly this situation with safety and reliability without adding any extra limitations to bind. III. DESCRIPTION OF THE DNSCLUSTER APPLICATION A. Basic Operations The DnsCluster implementation follows the classic client server paradigm. Thus, it consists of two distinct programs. The DnsCluster is the server side application/ daemon and the DnsNode which runs on the client side (and is also a daemon). The concept is to monitor for zone changes (added or deleted) and serve these changes to the DnsNode clients. When DnsCluster starts running, it reads the zones file and uses the zones found to build a set of active zones. Then it starts building a log. This log contains and describes every change that DnsCluster will find in the named.conf file. DnsCluster will serve these changes to all DnsNode instances.

3 This is done by means of appropriate commands executed at the DnsNode side. On the client's site, DnsNode polls, in preset time intervals, a DnsCluster installation (or more) for changes. DnsNode accepts the commands an associated DnsCluster sends to it and executes them one by one to reproduce the zones file. The server side of the program keeps track of every client connected to it. Thus, the next time a DnsNode daemon will communicate, DnsCluster will send only the new log commands (update). The application s operation is very simple. It complies with all the standards that a POSIX compliant system needs to work as a daemon [5]. DnsCluster has minimum memory footprint and requests less that a second of CPU time per day. It has also several security features embedded in its design. B. A closer look to the program DnsCluster periodically monitors the BIND nameserver for changes and when a change occurs the program logs it. DnsNode, the client side daemon, communicates with the server, DnsCluster, and queries it for newly added or deleted zones records (Fig 2). Figure 2. Diagram of basic DnsCluster and DnsNode functions and communication The communication takes place via a secure SSL channel. DnsCluster must accept the Certification Authority (CA) that provided DnsNode's certificate. Otherwise communication stops. Adding to SSL channels, DnsNode validates all received data by means of SHA1 Hashes. Traffic burden is not an issue since DnsCluster can transfer up to 1,000 domain zones with as little as 100kbytes of traffic. Also, thanks to its great feature of keeping account of changes, DnsCluster generates even less traffic in the internet. DnsNode also notifies the Bind nameserver for changes. The rndc (remote name daemon control) provided with every installation of BIND nameserver is used to notify BIND that changes are present in the zones file. Rndc is a tool that controls Bind nameserver and it can do some very useful things like triggering named.conf to re-read the configuration file and reload all zones from scratch or refresh a particular zone from its master nameserver. C. Important Features DnsCluster instances communicate with each other only through SSL channels. DnsCluster and DnsNode authenticate each other by means of the machine's IP address and appropriate digital certificates. If an invalid certificate is presented to the application then communication is canceled and terminated. DnsCluster works seamlessly and transparently for very long periods, just listening for changes. When a change in the zones file happens then the distribution mechanism is triggered to update all the DnsNode clients with the new changes. Changes are propagated throughout the cluster in a few minutes. Both may run for very long periods without crunching the resources of the host machine. They also provide great stability with a rustworthy memory management. DnsCluster consumes 6 MBytes of memory to operate and DnsNode consumes at most 3 MBytes to serve as much as 1,000 domain zones. These numbers confirm that DnsCluster can run in very small installations providing great performance and a rock solid stability. DnsCluster incorporates an incremental zone logging system so every DnsNode gets only the new data. Every time a host authenticates itself in order to receive the new zone records or to delete old ones, the logging system records the last command sent to the client. So, the next time the same client connects, DnsCluster will send only the changes from the previous state. DnsCluster also incorporates mechanisms to track client reboots in order to resubmit the entire zone list and thus avoid having consistency problems. D. Security Issues There are no known security issues concerning DnsCluster and DnsNode. ACE Wrappers, [6], is used for the communication which provides great stability in the client server communication. Three authentication methods are used to authenticate each connected client. First, every client must have a security certificate issued by a CA known and accepted by the DnsCluster application. Because the communication is two way, SSL encrypted DnsCluster must also provide an SSL certificate from a known and accepted CA to the DnsNode. Second, DnsCluster must validate the IP address of the connected client against the list of known members of the cluster. If this is not the case then the connection is terminated.

4 Third, DnsCluster authenticates the client via a digital signature. Every client must have its own. Every IP address in the cluster (i.e. every machine) is binded to a different signature. If any of these security checks fail then the communication is terminated immediately. One may consider this validation procedure extreme but there it is not limiting the functionality of the application and it is offering a more than adequate level of security. Running the service with root privileges is also not needed. DnsCluster may run with named or another user's uid. Also, DnsNode does not need root rights but it needs to be run with at least named uid so it can gain access to the rndc binary. E. DnsCluster development process The DnsCluster application was totally developed with open source / free software tools. The Eclipse platform with CDT was used as the editor to develop the application. Eclipse has a powerful interface to develop applications using most programming languages [7]. The communication interface was developed with ACE Wrappers [6]. ACE makes socket programming a simple and straightforward procedure. Moreover, ACE supports SSL which is a very good reason to use the Wrappers. The application was compiled with the free GNU/Gcc compiler with static libraries to make deployment a simple procedure. Valgrind was used to troubleshoot all the issues concerning memory leakages and problems in the code [8]. IV. CASE STUDIES DNS cluster topologies may differ from installation to installation. The simplest installation used in rather small web hosting environments is depicted in Fig 3. information between the primary and the secondary nameserver. Figure 4. A more complex topology (arrows show the flow of information between DnsCluster and DnsNode) In Fig. 4 a more realistic, though more complex, configuration is depicted. Here, the host machine is the web server, with a Bind instance that is only responsible to transfer the zones to the DNSnode servers. The DnsCluster and the DnsNode cooperate to transfer zone information to the slave nameserver who is the actual server of domain names to the rest of the network. The most common web hosting environment is shown in Fig 5. Here many web servers exist, each serving different domain zones. Usually only two (or three) nameservers are used to serve the zones of all the hosting servers. Web servers synchronize their zones with all the DnsNode servers in the cluster. Figure 3. A simple primary - secondary DNS topology A host machine, usually the same that hosts the web server, is hosting the master nameserver. The DnsCluster application is installed on the same host. DnsNode is running on the machine that hosts the secondary (slave) nameserver. DnsCluster is responsible for synchronizing zone related Figure 5. A topology with several WEB servers. Each one serves different zones (arrows show the flow of zone related information). DnsNode servers are serving all the zones together. This configuration provides an extra benefit. If the network connection between a web server and a secondary nameserver is lost then this secondary nameserver may learn domain zone changes by querying its primary nameserver (dotted arrow in Fig 5). Using multiple A records, Heartbeat and other familiar

5 clustering techniques one can achieve maximum fault tolerance and load balancing. V. CONCLUSIONS In this paper a client server application is presented that copes with the problem of exchanging BIND information between a primary DNS Server and its secondary servers in large domains. We have named this application DnsCluster. It is a plugin tool that can cooperate with Bind nameserver and deliver a rock solid, load balancing, fault tolerant solution for serving the Domain Name System. DnsCluster has been designed and developed to be used in diverse Web Hosting environments and may server different hosting control panels simultaneously. It has been tested in real networks and has proved to be a stable and lightweight application. Extra features are added daily and statistics are collected in order to help us enhance its features. REFERENCES [1] Mockapetris, P. RFC1035: Domain Names - Implementation and Specification. November, [2] Douglas Brian Terry, Mark Painter, David W. Riggle and Songnian Zhou, The Berkeley Internet Name Domain Server, Proceedings USENIX Summer Conference, Salt Lake City, Utah, June 1984, pp [3] cpanel Inc, [4] Microsoft TechNet, Designing DNS Zones, [5] POSIX FAQ Ver 1.12, [6] Douglas C. Schmidt and Stephen D. Huston. C++ Network Programming, Volume 1: Mastering Complexity with ACE and Patterns, Addison-Wesley, Boston, [7] Eclipse. [8] Julian Seward and Nicholas Nethercote. Using Valgrind to detect undefined value errors with bit-precision. Proceedings of the USENIX'05 Annual Technical Conference, Anaheim, California, USA, April 2005.

Implementing Domain Name Service (DNS)

Implementing Domain Name Service (DNS) Implementing Domain Name Service (DNS) H C A 1 P T E R ITINERARY Objective 1.01 Objective 1.02 Objective 1.03 Install and Configure DNS for Active Directory Integrate Active Directory DNS Zones with Existing

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

DNS and BIND. David White

DNS and BIND. David White DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Conquering the Challenges of IP Network Management with DHCP and DNS

Conquering the Challenges of IP Network Management with DHCP and DNS Conquering the Challenges of IP Network Management with DHCP and DNS A white paper by Incognito Software 2006 Incognito Software Inc. All rights reserved. Page 1 of 9 Conquering the Challenges of IP Network

More information

How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers.

How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers. 1 How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers. Back to Basics Series By Steve Smith, MVP SharePoint Server,

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Domain Name System Submitted in partial fulfillment of the requirement for the award of degree of Computer Science

Domain Name System Submitted in partial fulfillment of the requirement for the award of degree of Computer Science A Seminar report On Domain Name System Submitted in partial fulfillment of the requirement for the award of degree of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org

More information

Drobo How-To Guide. Topics. What You Will Need. Prerequisites. Deploy Drobo B1200i with Microsoft Hyper-V Clustering

Drobo How-To Guide. Topics. What You Will Need. Prerequisites. Deploy Drobo B1200i with Microsoft Hyper-V Clustering Multipathing I/O (MPIO) enables the use of multiple iscsi ports on a Drobo SAN to provide fault tolerance. MPIO can also boost performance of an application by load balancing traffic across multiple ports.

More information

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Planning and Maintaining a Microsoft Windows Server Network Infrastructure Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security

More information

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. . Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Lightweight DNS for Multipurpose and Multifunctional Devices

Lightweight DNS for Multipurpose and Multifunctional Devices IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar

More information

Shared File Room Field Guide. Version 5.5

Shared File Room Field Guide. Version 5.5 Shared File Room Field Guide Version 5.5 Summer 2008 Copyright: 2008, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming Names & Addresses CS 9: Distributed Systems: Naming Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 970-77 What is a?

More information

Domain Name System Security

Domain Name System Security Abstract Domain Name System Security Ladislav Hagara hgr@vabo.cz Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Managing Name Resolution

Managing Name Resolution 3 CHAPTER THREE Managing Name Resolution Terms you ll need to understand: Windows Internet Naming Service (WINS) WINS Proxy Agent LMHOSTS Tombstoning Persistent Connections Push/pull partner Hostnames

More information

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:

More information

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

Citrix NetScaler Global Server Load Balancing Primer:

Citrix NetScaler Global Server Load Balancing Primer: Citrix NetScaler Global Server Load Balancing Primer: Theory and Implementation www.citrix.com Background...3 DNS Overview...3 How DNS level GSLB works...4 Basic NetScaler GSLB Configuration...8 Accepting

More information

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997 Network Working Group Request for Comments: 2182 BCP: 16 Category: Best Current Practice R. Elz University of Melbourne R. Bush RGnet, Inc. S. Bradner Harvard University M. Patton Consultant July 1997

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Introduction to the Domain Name System

Introduction to the Domain Name System CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

DNS and E-mail Interface User Guide

DNS and E-mail Interface User Guide DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule

More information

A New Look at the Old Domain Name System

A New Look at the Old Domain Name System A New Look at the Old Domain Name System Yair Amir 1, Daniel Massey 2, Ciprian Tutu 1 Technical Report CNDS-2003-2 http://www.cnds.jhu.edu July 18, 2003 Abstract The Domain Name System (DNS) is undergoing

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Carisbrooke. End User Guide

Carisbrooke. End User Guide Carisbrooke Contents Contents... 2 Introduction... 3 Negotiate Kerberos/NTLM... 4 Scope... 4 What s changed... 4 What hasn t changed... 5 Multi-Tenant Categories... 6 Scope... 6 What s changed... 6 What

More information

Automatic Configuration of Slave Nameservers (BIND 9.7.2 only)

Automatic Configuration of Slave Nameservers (BIND 9.7.2 only) DNSSHIM 1 DNSSHIM is an open-source software that implements the Domain Name Name System (DNS) protocol for the Internet. Its main feature is to work as a Hidden Master nameserver, that is, provide information

More information

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet SEC Ensuring a secure Internet What is SEC? SEC is an extension of the Domain Name System (), that ensures the authenticity and integrity of the data in replies. Technical measures have been implemented

More information

Multi-Datacenter Replication

Multi-Datacenter Replication www.basho.com Multi-Datacenter Replication A Technical Overview & Use Cases Table of Contents Table of Contents... 1 Introduction... 1 How It Works... 1 Default Mode...1 Advanced Mode...2 Architectural

More information

Polycom RealPresence Resource Manager System Getting Started Guide

Polycom RealPresence Resource Manager System Getting Started Guide [Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003 Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

Meeting Worldwide Demand for your Content

Meeting Worldwide Demand for your Content Meeting Worldwide Demand for your Content Evolving to a Content Delivery Network A Lucent Technologies White Paper By L. R. Beaumont 4/25/01 Meeting Worldwide Demand for your Content White Paper Table

More information

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Network Time Management Configuration. Content CHAPTER 1 SNTP CONFIGURATION... 1-1 CHAPTER 2 NTP FUNCTION CONFIGURATION... 2-1

Network Time Management Configuration. Content CHAPTER 1 SNTP CONFIGURATION... 1-1 CHAPTER 2 NTP FUNCTION CONFIGURATION... 2-1 Content Content CHAPTER 1 SNTP CONFIGURATION... 1-1 1.1 INTRODUCTION TO SNTP... 1-1 1.2 TYPICAL EXAMPLES OF SNTP CONFIGURATION... 1-1 CHAPTER 2 NTP FUNCTION CONFIGURATION... 2-1 2.1 INTRODUCTION TO NTP

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS

NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Managing, Monitoring, and Troubleshooting the Exchange Organization...

Managing, Monitoring, and Troubleshooting the Exchange Organization... 6 Managing, Monitoring, and Troubleshooting the Exchange Organization............................................... Terms you ll need to understand: Back-end server Child folder Default public folder

More information

Domain Name Server. Training Division National Informatics Centre New Delhi

Domain Name Server. Training Division National Informatics Centre New Delhi Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations

More information

WHM Administrator s Guide

WHM Administrator s Guide Fasthosts Customer Support WHM Administrator s Guide This manual covers everything you need to know in order to get started with WHM and perform day to day administrative tasks. Contents Introduction...

More information

Netezza PureData System Administration Course

Netezza PureData System Administration Course Course Length: 2 days CEUs 1.2 AUDIENCE After completion of this course, you should be able to: Administer the IBM PDA/Netezza Install Netezza Client Software Use the Netezza System Interfaces Understand

More information

Using Webmin and Bind9 to Setup DNS Sever on Linux

Using Webmin and Bind9 to Setup DNS Sever on Linux Global Open Versity Systems Integration Hands-on Labs Training Manual Using Webmin and Bind9 to Setup DNS Sever on Linux By Kefa Rabah, krabah@globalopenversity.org March 2008 Installing and Configuring

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: DNS Delegation How To Guide DNS Delegation (The Simple Redundancy Solution) The key requirement when performing DNS based network redundancy and load

More information

McAfee SMC Installation Guide 5.7. Security Management Center

McAfee SMC Installation Guide 5.7. Security Management Center McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam 1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives

More information

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Introduction to Active Directory Services

Introduction to Active Directory Services Introduction to Active Directory Services Tom Brett A DIRECTORY SERVICE A directory service allow businesses to define manage, access and secure network resources including files, printers, people and

More information

netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)

netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s) netkit lab load balancer dns Version Author(s) 1.2 Massimo Rimondini E-mail Web Description contact@netkit.org http://www.netkit.org/ A lab showing how to perform simple load balancing on a set of web

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Domain Name System (DNS) Services

Domain Name System (DNS) Services 12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

DNS/Hostmaster Architecture for the Greek Network of Health

DNS/Hostmaster Architecture for the Greek Network of Health DNS/Hostmaster Architecture for the Greek Network of Health and Welfare Services Petros Lampsas, Aristides Vagelatos, Dimitris Sofotassios, Christos Papanikolaou, Christos Manolopoulos Computer Technology

More information

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide To Register This exam is offered at Apple Authorized Training Centers and Prometric Testing Centers worldwide. For information on exam

More information

Domain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible

Domain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable The Internet continues

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE

Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE Table of Contents Overview... 2 Installation and Initial Configuration of SharePoint services... 3 System Requirements...

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

Chapter 3: Building Your Active Directory Structure Objectives

Chapter 3: Building Your Active Directory Structure Objectives Chapter 3: Building Your Active Directory Structure Page 1 of 46 Chapter 3: Building Your Active Directory Structure Objectives Now that you have had an introduction to the concepts of Active Directory

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

In this chapter, we will introduce works related to our research. First, we will

In this chapter, we will introduce works related to our research. First, we will Chapter 2 Related Works In this chapter, we will introduce works related to our research. First, we will present the basic concept of directory service and Lightweight Directory Access Protocol (LDAP).

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section

More information

Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction

Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction Volume 3 New User To Technical Expert Solaris Bookshelf Stewart Watkiss This document is currently under construction This version is to be considered a preview only Solaris Networking Guide Copyright

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

Privileged Access Management Upgrade Guide

Privileged Access Management Upgrade Guide Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 1 New features

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Architecting User Identification (User-ID) Deployments

Architecting User Identification (User-ID) Deployments Architecting User Identification (User-ID) Deployments Strategies and Tactics guide PANOS 5.0+ Table of Contents SECTION 1: USER IDENTIFICATION SOFTWARE COMPONENTS EXTERNAL SYSTEMS REFERENCED BY USER IDENTIFICATION

More information

Panorama High Availability

Panorama High Availability Panorama High Availability Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054

More information

Appendix D: Configuring Firewalls and Network Address Translation

Appendix D: Configuring Firewalls and Network Address Translation Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.

More information