Manage Zone Database Files
When you work with DNS, you have many files to manage. Each DNS server may be responsible for many different DNS zones. Each zone contains its own files and folders that will require some degree of effort in order to create, maintain, update, manage, and secure.
As you work with your DNS environment, you will likely break down your forest into smaller segments that in DNS are referred to as zones. If the records in your DNS zone database are designed to allow the resolution of a name to an IP address, you would say the zone is working forward, and the zone database type you would create is called a forward lookup zone. If your object is to provide an option for the finding of names based on a provided IP address, then you would say your zone is working in reverse, or you would create a reverse lookup zone. What if you wanted a DNS server that only resolved the names of other authoritative DNS servers in your environment? You would create a stub zone to serve your purposes.
Each of the different zone types serves a particular purpose in DNS. You will likely want more than one server for each zone in order to maximize availability to your clients and to add some degree of fault tolerance to your network.
Creating a Forward Lookup Zone
As you learned earlier, when you install DNS as part of Active Directory, the appropriate forward lookup zones for the domain are created automatically. If you choose to add zones or if you are not using DNS as an integrated part of Active Directory, you will use DNS Manager to create and manage forward lookup zones. Not all forward lookup zones are created equally; there are actually three different types, called primary zones, secondary zones, and stub zones.
Primary zones are zones that are created and stored on the local server. They can be updated and maintained directly on the server and can also receive replicated updates from other servers.
Secondary zones are zones that are stored on the local server; however, all of their information comes from updates received from another designated primary server. Secondary servers are a good way to help share the workload that might otherwise be forced onto a standard primary server.
Stub zones create a copy of only the name server records for a given zone. This zone type is useful in helping clients find and query the appropriate internal DNS name server.
To create a new forward lookup zone, follow these steps:
- Open DNS Manager.
- Right-click the name of the server.
- Choose New Zone.
- Click Next in the Welcome To The New Zone Wizard.
- Select the type of zone you want to create.
- Choose whether you want the zone stored in Active Directory by selecting the box at the bottom of the Zone Type screen.
Depending on what type of zone you choose, the wizard will offer you the appropriate options from this point forward, including options for replication, zone name, and the types of updates you will allow.
Changing the Zone Type
One of the nice things about DNS zones is that they are pretty flexible. If you needed, you could actually change a primary zone to a secondary or stub zone, or vice versa. Usually you would do something like this if you were doing maintenance on a server and wanted to limit the effect on DNS or the clients that rely on DNS services. Changing the zone type is a simple procedure:
- Open DNS Manager.
- Find the chosen zone, and right-click it.
- Choose Properties.
- Next to Type on the General tab, click Change.
- Select the new zone type, and click OK.
Managing Resource Records
DNS zones contain resource records of various types. These records are created as you create DNS servers, clients, services, and applications. Generally speaking, once a resource record has been created, there is not much you need to do to maintain these records. You may want to change the DACL security permissions if your resource records are part of Active Directory, or you may need to modify a record or even delete one.
You can manage records in the DNS zone using DNS Manager or dnscmd. You simply need to find the resource record in the designated zone.
If you are interested in changing the DACL for a resource record, follow these steps:
- Open DNS Manger.
- Locate the zone that contains the resource record.
- Right-click the resource record.
- Choose Properties.
- Select the Security tab.
- Edit the permission to the resource record, and click OK.
If you want to delete the record, simply right-click the record, and choose Delete. When the message appears asking for confirmation to delete the record, simply click OK.
Configuring Dynamic Update
When you work with DNS servers, it is ideal to have them update one another with their information. Windows Server 2008 R2 allows the use of dynamic updates between configured DNS servers. This really eliminates the need for you to spend your valuable time administering zone databases. Clients who use DHCP can easily get access to an updated DNS server without having to call your help desk. You can configure each of your zones for dynamic updates. If you are using Active Directory integrated zones, you can also specify that the updates are done in a secure fashion and are based on the information in the DACL.
- Open DNS Manager.
- Locate the zone where you want to enable dynamic updates.
- Right-click the zone, and choose Properties.
- On the General tab, open the Dynamic Updates drop-down list.
- Choose the type of updates you want to allow, and click OK.
As you probably noticed, dynamic updates can be configured as nonsecure and secure. We know some of you are wondering why you would ever consider using nonsecure updates. Imagine if all the DNS servers for the zone were residents of your own private network. You already have tight control over the servers, so you might not choose to enable secure updates only. If your DNS zones are not part of Active Directory, you will not have the option for secure dynamic updates only.
If you are using Active Directory integrated zones, it really does not make sense to use nonsecure updates. Nonsecure updates will provide exposure to your DNS servers to accept updates from unknown, disreputable, or downright malicious sources, and they will open your DNS infrastructure to potential threats. It just doesn't make sense to use anything but secure updates.
Zone Transfer Settings
DNS servers transfer zone data between one another based on a schedule. You can control how the zone is transferred based on the following settings. Each of the settings can be changed or updated, so it is important to note that these settings will be limited if your DNS servers are Active Directory integrated.
- Whether or not the zone is transferred to any other server and to which servers it may be transferred
- The refresh interval, which describes how often the zone files will be transferred
- The retry interval, which describes how long a DNS server will wait to request a transfer after a transfer has failed
- The expire interval, which describes how long the DNS zone data is valid
- The list of servers that are notified when zone data changes
To configure zone transfer settings, follow these steps:
- Open DNS Manager.
- Locate the chosen zone.
- Right-click the zone, and choose Properties.
- Click the Zone Transfers tab.
- Select the box to allow zone transfers.
- Specify the servers that you will allow transfers with.
When you configure zone transfers, you can also build something called a notification list, which contains a list of servers that will be notified by the master DNS server in your domain when changes are made to the zone. Simply click the Notify button on the Zone Transfers tab to build a notification list.
The settings for Refresh Interval, Retry Interval, Expires After, and Minimum (Default) TTL are on the SOA tab.
- Open DNS Manager.
- Locate the chosen zone.
- Right-click the zone, and choose Properties.
- Click the Start Of Authority (SOA) tab.
- Set the values for the selected interval or TTL.
Securing a Zone
DNS provides name resolution services to clients. The information provided by DNS has a direct effect on the functional operation of your network. You want to make sure that you take security into consideration for each of your DNS zones. Generally, DNS has two potential security problems that you would worry about. First, you want to make sure that the zone files are secure from unauthorized changes. If an illicit source can update your zone database files, they could really cause problems for your network. Generally, these attacks occur as dynamic updates are pushed to your DNS servers from outside your organization. The easiest way to prevent this type of attack is to enable only secure dynamic updates.
Second, you want to make sure you have taken precautions to prevent unauthorized access to your zone files. Imagine if someone outside your organization set up a secondary server and managed to get updates from your internal primary server. You would effectively be sharing your DNS zone information with an imposter. The easiest way to prevent this type of attack is by configuring a list of servers to which you will allow zone transfers.
If your zones are Active Directory integrated, you can of course use the DACLs associated with the zone to further control access to the files.
Window Server 2008 R2 moves one step further when it comes to protecting the zone database files and adds something called Domain Name System Security Extensions (DNSSEC). DNSSEC allows the DNS zone and all the records in the zone to be cryptographically signed. When a DNS server receives a request for the signed zone files, it returns the files along with the digital signatures. By obtaining a public key, a resolver can verify that the files have not been tampered with.
As you will note, we've discussed each of these topics in earlier sections of this tutorial, and we've demonstrated how to do the configurations. Much of securing a DNS infrastructure really comes down to the way it is configured.
In this tutorial:
- Administering DNS
- Add and Remove DNS Servers
- Configure a New DNS Server
- Add Query Forwarding
- Configure a Caching-Only DNS Server
- Remove a DNS Server
- Manage a DNS Server
- Scavenge Properties for DNS
- Manage DNS Integration with Active Directory
- Change Zone Replication
- Manage Zone Database Files
- Configure Single-Label DNS Resolution
- Troubleshoot DNS