Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

The DNS Server, Essay Example

Pages: 5

Words: 1338

Essay

DNS server Benefits

As we have already selected a domain environment for Jane and Kim’s network, now there is a requirement of setting up a DNS server. DNS server has various benefits and organizations prefer to maintain DNS servers for their internal computer networks rather than relying on ISP DNS servers that are slow and may become vulnerable. Primary reason for maintain a private DNS server ensures security, reliability, robustness and consistency. In order to provide security, all the employees will access the DNS server via 128 bit encryption with SSL connections. Moreover, security controls must be up to date on the servers, for instance, security patches. DNS servers also provide error checking so that websites can be resolved without disruption. Moreover, network administrators can manage many Internet domains and sub domains (Benefits and features of DNS for your server, n.d). As Jane and Kim’s network is connected to an Internet gateway, DNS server is required to resolve IP addresses in to host names. Likewise, DNS server is also required for identifying network nodes. For instance, if any user wants to share a file, DNS will resolve the IP address of that computer to a specific computer name that is easy to understand. Moreover, DNS server will also maintain host names and IP addresses and all the computers available on the network. If we move one step further, step by step process for a typical DNS process consists of a file that is transmitted to a specific location i.e. on the Internet or computer within the network, the request will initially reach to the DNS server for translating hostname to IP addresses. After retrieving the required IP address, connectivity will be established for transferring the file. DNS server is recommended because it will provide security, reliability and fast access to web requests. For instance, if any user wants to open a website, web request will initially ask the DNS to resolve the names in to numbers. If an organization does not have a DNS server, web request will reach the DNS server of the ISP that will consume time.

There are some issues related to DNS servers that clients may face. For instance, DNS server stops responding to client’s request. The cause for this issue is due to a network failure. Solution will be to check the connectivity of DNS server with the local network, check the Ethernet system software or physical hardware status and perform basic troubleshooting procedures for restoring services. In order to test the effectiveness of a DNS server, network administrators can execute ‘nslookup’ command, as there are issues related to restricting certain IP addresses. Restrictions were applied in a testing phase and were not removed since then (Troubleshooting DNS servers: Domain name system (DNS), n.d ).

DNS servers are exposed to threats if all issues and proper configuration options are not addressed. Threats may involve foot printing, redirection, cache pollution and Denial of Service (DOS) attacks. Foot printing is a type of a threat that retrieves resource records of specific servers of an organization from the DNS server (Snedaker, Shinder, & Shinder, 2004). After getting the resource records, attackers successively attacks these system and find out the purpose of these systems in an internal network. Vulnerability for this threat triggers when zone transfers are not protected. If the zone transfers are not secure, attacker may initialize a name dump that can be executed from authoritative servers. Likewise, ‘nslookup -ls’ command is executed to successfully perform this attack (Snedaker, Shinder, & Shinder, 2004). Cache pollution is another threat that can be achieved by recursion to query the locally configured DNS server for targeting resources that are located in the attacker’s domain. Mitigation can be done by deactivating recursion option from the DNS server. Furthermore, Denial of service attacks are performed, when the DNS server is overloaded or receiving many requests and denies any further request for translation. At this point, attackers can use a TCP/UDP port 53 for buffer overflow. However, counter measures are to configure two or more DNS servers for this purpose, so that if anyone of them is compromised, it can be isolated and there will be no operational and business impact (Snedaker, Shinder, & Shinder, 2004).

DNS Installation

After installing Active Directory, step by step guide of DNS server installation is illustrated below:

Figure 1.1

Figure 1.1

Click on the ‘Active Directory Services Installation Wizard’, options will appear, as shown in Fig 1.1. Click ‘Next’

Figure 1.2

Figure 1.2

Expand and click on the option named as‘roles’, as specified in Fig 1.2

Figure 1.3

Figure 1.3

Select ‘Add Roles’ and select DNS role in order to execute a wizard, as shown in Fig 1.3.

Figure 1.4

Figure 1.4

Install the DNS Server, as shown in Fig 1.4

Figure 1.5

Figure 1.5

As shown in Fig. 1.5, forward lookup zone will only be used for address resolution. Forward and reverse lookup zone facilitates the DNS server to discover host names. Lastly, root hints are easy to configure and contains overall DNS server functionality. Click next to create a ‘forward lookup zone’.

Figure 1.6

Figure 1.6

Click ‘yes’ to create the forward lookup zone

Figure 1.7

Figure 1.7

As shown in Fig 1.7, a primary and secondary option requires active directory installation and the stub zone option is for load balancing. As we have considered a domain environment, primary zone will be selected.

Figure 1.8

Figure 1.8

It depends, whether the network infrastructure is based on IPv4 or IPv6. User will select the options that are identical to the network.

Figure 1.9

Figure 1.9

Figure 1.10

Figure 1.10

User will define a new zone file in case of new DNS server installation.

Figure 1.11

Figure 1.11

In fig 1.11, the selection will be ‘No, it should not forward queries’ in case of a single DNS server. If an organization is maintain more than one DNS servers, and then the selection will be yes.

Figure 1.12

Figure 1.12

After setting up all the options, click finish to end the installation.

The proposed domain will be integrated via Microsoft active directory that will maintain access management functions associated with services on the network. However, users, groups, DNS server, active directory and Windows server operating system will operate as a domain controller, in order to provide effective management of a domain environment. Moreover, more than one domains controllers will lead to significant advantages including additional security in terms of service availability and supporting load balancing features in peak business hours.

References

Benefits and features of DNS for your server, (n.d) Retrieved 10/17/2011, 2011, from http://dns.servers.co.uk/dns-features-and-benefits

Troubleshooting DNS servers: Domain name system(DNS) (n.d) Retrieved 10/17/2011, 2011, from http://technet.microsoft.com/en-us/library/cc787724(WS.10).aspx

Snedaker, S., Shinder, D. L., & Shinder, T. W. (2004). The best damn windows server 2003 book period . Burlington: Syngress Publishing.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!