Dynamic Host Configuration Protocol Analysis

Amazing Essays
Business users and applications rely on core infrastructure components to be available in order to effectively do the job for which they have been tasked. An internet protocol (IP) network is critical to business functions; however, obtaining an IP address is not enough. Client workstations should make use of the Dynamic Host Configuration Protocol (DHCP) for the dynamic assignment of addresses, as well as other name resolution components, such as DNS, and WINS. Active Directory is also essential in providing authorization, and authentication mechanisms for the people, and systems used throughout the network.
DHCP Infrastructure Strategy
The first step in an effective DHCP infrastructure strategy is to ensure the right number of
…show more content…
This increases the security of DNS and allows reasonable assurance against DNS related attacks, such as denial of service (DoS), and DNS hijacking. Due to the criticality of DNS, and the successful operation of Active Directory, a functioning and healthy DNS service is …show more content…
Maintenance windows can take place where each server is restarted on alternate schedules, which reduces downtime. In the even both domain controllers go offline, auto-site coverage can be configured for GPO settings that allow a domain controller within another AD site to provide authentication services for the impacted site.
AD Troubleshooting
The domain controllers are the servers that run and support Active Directory. Troubleshooting Active Directory is more than troubleshooting the servers that run the service. While there are physical components that can cause problems, such as a failed power supply or faulty network conditions, AD itself has specialized tools to troubleshoot the service effectively.
The first tool used should be REPADMIN. Since replication is a critical component of a healthy AD environment, if two servers are failing to replicate there could be network related issues that are the cause. DNS may not be resolving correctly, or a firewall is preventing proper replication traffic. If replication is healthy; however, there are other problems the DCDIAG tool should be executed. This command line utility can identify issues with a local DC or potentially issues with other DCs that may be impacting the operations of the local

Related Documents

  • Good Essays

    user, and behavior control. The firewall categories are: packet filtering firewall, which is beneficent in controlling the Internet Protocol (IP) address spoofing, source routing, and tiny fragments attacks; stateful inspection firewalls; application level gateways; and circuit level gateways. Similarly, the IPS systems are either host-based or network-based. Host-based IPS is used to protect against the modification of system resources, exploits related to privilege-escalation and buffer-overflow…

    • 1380 Words
    • 6 Pages
    Good Essays
  • Amazing Essays

    Wireless Networking Essay

    • 5190 Words
    • 21 Pages

    each other in the form of digital data packets. The networking protocols are responsible for the safe delivery of these packets to their respective destinations. Despite their significance, these protocols have not evolved over the years. They are complex and they restrict innovation. In the current networking environment, network administrators have to configure each device manually by using proprietary commands. Newer policies or protocols cannot be introduced in the network on the fly, while automatic…

    • 5190 Words
    • 21 Pages
    Amazing Essays
  • Decent Essays

    By the end of the 1980s the number of hosts connected to the public Internet, a confederation of networks looking much like today‚Äôs Internet, would reach a hundred thousand. The 1980s would be a time of tremendous growth. Much of that growth resulted from several distinct efforts to create computer…

    • 69202 Words
    • 277 Pages
    Decent Essays