INTEGRATING VITALQIP® WITH MICROSOFT® WINDOWS™ NETWORKING/ ACTIVE DIRECTORY USE VITALQIP® TO CENTRALLY MANAGE WINDOWS DEPLOYMENTS STRATEGIC WHITE PAPER This white paper addresses: Meaning of “Active Directory” and possible meanings of “Integration” Terms and concepts of Microsoft Networking Supporting Windows clients with ALU DNS and DHCP Managing MS-DNS with VitalQIP GSS-TSIG Secure Zones for ALU DNS and MS-DNS Managing MS-DHCP with VitalQIP Domain Controller Generation of Sites and Subnets LDAP Authentication Callouts from VitalQIP to Active Directory TABLE OF CONTENTS Introduction / 1 Windows Networking Terms and Concepts / 1 Active Directory and Windows networking / 1 How can VitalQIP be “Integrated” with Active Directory? / 1 DNS Registration of Windows Clients / 1 SRV records / 2 DNS Records Used for Active Directory / 2 What is a Domain Controller? / 3 Supporting Windows Clients with ALU DNS and DHCP / 4 Resource Records for Domain Controllers / 4 Updating SRV and CNAME records in ALU DNS Primary Servers / 4 Updates of Resource Records from ALU DNS to VitalQIP / 4 Use of primary/secondary DNS servers and zone transfers / 6 Resource records for ALU DHCP clients: / 8 Getting DHCP Hostnames into VitalQIP and DNS / 8 Getting DHCP clients into DNS (Use of DHCP Option 81) / 9 Resource records for Windows clients with static IP addresses / 10 Allow or not allow DNS Registration of static clients? / 10 Understanding Internal, External, and Partially-managed IP objects in VitalQIP / 11 Solution Implementation / 12 Implementing a typical solution using ALU DNS and ALU DHCP / 12 Non-managed MS-DNS for a child domain / 13 Managing MS-DNS with VitalQIP / 15 Benefits of adding VitalQIP to existing Microsoft infrastructure / 15 How is MS-DNS different from ALU DNS or BIND DNS? / 15 Relationship with Active Directory Domain Services / 15 AD replication between DNS servers / 16 Ownership of resource records / 16 Secure zones and lack of allow-update ACL / 16 Interactions between VitalQIP and MS-DNS / 17 Use of qip-syncexternal to pull data from MS-DNS into VitalQIP / 17 External objects in VitalQIP for MS-DNS clients / 18 Two types of DNS Generation to MS-DNS / 18 Dynamic updates to non-secure zones in MS-DNS / 20 Dynamic updates to secure zones in MS-DNS / 20 Implementing VitalQIP management of MS-DNS servers / 21 Deciding how VitalQIP interacts with MS-DNS / 21 Pre-configure MS-DNS to be managed by VitalQIP / 21 Installing VitalQIP Services on MS-DNS remote servers / 21 What is VitalQIP MS DNS Update Service? / 22 “Semi-managed” MS-DNS servers / 23 Creating MS-DNS server profiles in VitalQIP / 23 Creating zone profiles in VitalQIP / 24 Considerations of 64-bit Windows / 25 Multi-master DNS / 25 Use VitalQIP GUI rather than MS DNS Manager / 25 GSS-TSIG Secure Zones for ALU DNS and MS-DNS / 26 Vocabulary for secure zones / 26 Allow-update permissions and secure zones / 26 Other meanings of “secure zone” / 26 How GSS-TSIG secure updates work / 26 When to use secure zones / 27 Key distribution centers (KDCs) and Kerberos keys / 27 Access control information for resource records in MS-DNS / 27 Managing Windows secure zones by VitalQIP / 27 Managing MS-DHCP with VitalQIP / 28 Differences between MS-DHCP and ALU DHCP / 28 BootP/DHCP Interchangeability / 28 Terminology of types of IP addresses / 28 DHCP configuration files and lease databases / 28 No DHCP failover and access control / 29 Authorization of MS-DHCP servers / 29 Implementation of VitalQIP support of MS-DHCP / 29 VitalQIP installation on the MS-DHCP Remote Server / 29 Create MS-DHCP server profile in VitalQIP / 29 Migration of DNS and Sites data into VitalQIP / 29 qip-msextract utility / 30 Defining new DHCP scopes for MS-DHCP in VitalQIP / 30 DHCP Generation to MS-DHCP / 30 Getting MS-DHCP client hostnames into MS-DNS / 30 Getting DHCP lease information into VitalQIP – VitalQIP MS DHCP Monitor Service / 31 Getting MS-DHCP client hostnames into ALU DNS / 32 Migration of MS-DHCP data to ALU DHCP / 33 VitalQIP management of Sites and Domain Controllers / 34 Overview / 34 What is Domain Controller Generation? / 34 Data Replication between domain controllers / 34 Implementation / 34 LDAP Authentication Callouts from VitalQIP to Active Directory Conclusion / 38 / 37 INTRODUCTION This document discusses integrating Active Directory (AD) and other Microsoft networking concepts with Alcatel-Lucent VitalQIP®. It is important to understand that using the Windows operating system (OS) with VitalQIP is different from integrating Active Directory and other Microsoft networking concepts with VitalQIP. In general, VitalQIP, Alcatel-Lucent DNS, or Alcatel-Lucent DHCP on a Windows platform has very similar functionality to the same software version running on a UNIX platform. Note: Unless otherwise specified, the term “Windows” in this paper refers to all versions of Microsoft Windows currently supported by VitalQIP. As of late 2013 (VitalQIP 8.0PR2), that is Windows 2003™ Server (32-bit) and Windows 2008™ R2 Server (32- or 64-bit). Support for Windows 2012™ is expected in future releases. “Microsoft DNS” (MS-DNS) and “Microsoft DHCP” (MS-DHCP) refer to the native DNS and DHCP of these Windows versions. WINDOWS NETWORKING TERMS AND CONCEPTS Active Directory and Windows networking In Windows 2000™ or higher, the old, proprietary WINS technology of Windows NT™ was replaced with the use of DNS and Request for Comments (RFC)-2136-compliant dynamic DNS updates. Microsoft’s design made extensive use of a resource record type called SRV to allow network clients to find the hostnames of critical network servers. In Microsoft’s design, DNS data may be stored and synchronized using Lightweight Directory Access Protocol (LDAP) technology, in a distributed database known as Active Directory. Sometimes, the term Active Directory is used more broadly, but not quite correctly, to refer to the entire Windows network structure instead of just the database itself. How can VitalQIP be “Integrated” with Active Directory? “Integration” could mean many things: • Supporting Windows clients in ALU DNS: Conventional VitalQIP remote servers running ALU DNS and ALU DHCP need at least a few configuration changes for Windows clients • Allowing all Windows clients to register directly in ALU DNS: This decision requires an understanding of external objects in VitalQIP, and a consideration of GSS-TSIG secure zones • DNS designs with both ALU DNS and non-managed MS-DNS: These designs might use child-zone delegations or slave zones, but also should consider reverse zones. • VitalQIP management of MS-DNS. • VitalQIP management of MS-DHCP as well. • Domain controller generation of sites and subnets. • LDAP authentication callouts for VitalQIP login requests. DNS registration of Windows Clients Ideally, each Windows client in a network should have both an A record and a PTR record in DNS. DHCP servers do this on behalf of DHCP clients, but Windows clients with static IP address are often configured to try to update DNS directory. This behavior is controlled by one of the TCP/IP settings of the Windows registry: “Register this connection’s address in DNS”. Another of these settings controls the preferred DNS server(s). Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 1 Windows clients that have DNS registration enabled will first query their preferred DNS server first to find the Start of Authority (SOA) record of their own domain. That SOA record indicates the name of the primary DNS server for the domain. Then the client tries to send a dynamic update to that DNS server to add an A record for itself. Then it does the same for its PTR record. The “Supporting Windows clients with ALU DNS and DHCP” section of this paper discusses the pros and cons of allowing these clients to register in ALU DNS, as well as an alternative approach. Later sections discuss methods of getting these records from MS-DNS. SRV records A central part of Windows networking is that domain controllers (DCs) need to advertise services by putting SRV records into DNS. SRV records are a resource record type to associate a service name with a server’s hostname. Windows clients query SRV records to find out which servers offer particular network services. For example, Windows domain controllers provide LDAP and Kerberos services for clients to use, so the SRV records for LDAP and Kerberos maps the service names to the hostnames of the domain controllers which provide the services. SRV records need to get into DNS quickly– not by manual entry from the VitalQIP graphical user interface (GUI) – and they need to propagate to all other DNS servers quickly. DNS Records Used for Active Directory Each DNS domain that supports Windows services needs to have some specific records. The first thing needed is an A record to resolve the name of the domain to the IP of each Domain Controller. For example: company.com. IN A 10.1.1.1 company.com. IN A 10.2.2.2 The other special DNS records are dotted names under the domain name. Microsoft networking uses special names which have underscores, such as “_ldap._tcp.comany. com”. The middle parts of these names include: • _msdcs for the MS domain controllers – usually created as a separate child domain with its own SOA record and name server (NS) records. • _sites for AD sites to indicate closely connected subnets • _tcp for SRV records of network services that run on TCP such as LDAP, Kerberos, and global catalogs • _udp for SRV records of network services that run on UDP For example: _kerberos._tcp.company.com. IN SRV 0 100 88 server1.company.com. _kpasswd.udp.comany.com. IN SRV 0 100 464 server1.company.com. _gc._tcp.default-first-site._sites.company.com. IN SRV 0 100 3268 server1.company. com. _ldap._tcp.dc._msdcs.company.com. IN SRV 0 100 389 server1.company.com. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 2 Besides the SRV records, special CNAME records called Globally Unique Identifier (GUID records are used. These have long hexadecimal strings pointing to the hostnames of domain controllers. For example: 73f53af0-e116-443d-acaf-6e71dfa5fd49._msdcs.company.com. IN CNAME server1. company.com. Windows 2003 or higher also has ForestDNSZones and DomainDNSZones concerning LDAP replication between the domain controllers. The A records for each of these point to the domain controllers with those partitions. Also there are also SRV records concerning the services available for these. For example: ForestDNSZones.company.com. IN A 10.1.1.1 _ldap._tcp.ForestDNSZones.company.com. IN SRV 10 100 389 server1.company.com. What is a Domain Controller? A Domain Controller is a system running a version of Microsoft Windows Server that has the Active Directory Domain Services role. This means that it has an LDAP data store (DFS File system and DFS Replication), as well as Kerberos Key Distribution Center, Net Logon service to allow Windows clients to login, and other services. Some – but not necessarily all – domain controllers in a traditional Microsoft network would also have DNS service installed, and some might also have DHCP service. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 3 SUPPORTING WINDOWS CLIENTS WITH ALU DNS AND DHCP Resource Records for Domain Controllers Updating SRV and CNAME records in ALU DNS primary servers If Windows networking is being added to an existing VitalQIP installation, a primary concern is how to get the SRV records into DNS and then into the VitalQIP database. The Windows clients need to be able to locate network services by querying SRV records in DNS and then resolving those server hostnames to IP addresses. Likewise, GUID CNAME records need to be updated in DNS quickly for Windows clients to find network services. SRV records are created and maintained by Microsoft domain controllers. The SRV records are created when the domain controllers come online and periodically thereafter, and deleted when the domain controllers do proper shutdowns. To determine which DNS server is to be updated, the domain controller first sends an SOA query to the IP address configured in its local TCP/IP properties as the Preferred DNS server. Then, DNS looks at the SOA record to see which DNS server is identified as the primary server for that domain or reverse zone, and sends the Dynamic DNS (DDNS) transaction to that server. In a traditional Microsoft design, the servers than run Active Directory Domain Services often also run Microsoft’s DNS Service – in other words they are both domain controllers and DNS servers. But this is not required, nor is MS-DNS. domain controllers can send updates to any DNS server able to receive RFC 2136 DDNS updates, for example, any server based on BIND 9.xDNS servers can accept updates from the domain controller if allow-update permissions for the appropriate domains and reverse zones have been set to include the IP address of the domain controller. In theory, SRV records can be entered through the VitalQIP GUI and then pushed to DNS, but this is difficult to do in a timely manner. It is usually better to add the domain controllers to the allow-update Access Control List (ACL) of the appropriate domains in Alcatel-Lucent DNS so that they can dynamically add or delete the necessary records. The next step is the connection from Alcatel-Lucent DNS to the VitalQIP database: Updates of resource records from ALU DNS to VitalQIP In a classic VitalQIP environment, the VitalQIP database is the “master” source of information, and DNS Generation pushes copies of its data to the DNS servers. In a Windows environment, however, the DNS servers receive dynamic updates of SRV and other resource records that the VitalQIP database does not know about – the data needs to flow from the DNS server to VitalQIP as well. If the DNS servers receive updates from DCs and/or Windows clients, but VitalQIP does not have this data, DNS Generation will replace the zones that have the current SRV records with new zones that lack the current information. If that occurs, the network clients will not be will be unable to locate network resources until the DCs publish their SRV records again. Data can flow from DNS to the VitalQIP database either by the External Updates feature of Alcatel-Lucent DNS (the continuous method), or by the qip-syncexternal commandline interface (CLI) command (the polling method). External updates are much faster and more efficient than running qip-syncexternal, and are preferred when using ALU DNS. The qip-syncexternal CLI is only needed for MS-DNS or other non-ALU DNS. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 4 External Updates are enabled in the VitalQIP GUI, in the zone options of those domains and reverse zones that are expected to receive updates from DCs. The policy setting is called Import External Updates. If External Updates are enabled, then the GUI selects the specific types of resources records. Only SRV and CNAME records should be enabled. Figure 1: Import External Updates in the VitalQIP GUI Each Domain Controller also needs two A records, but these usually can be entered manually. One A record is for its own hostname pointing to its IP address, and one A record is the domain name pointing to the IP address. To implement this in VitalQIP, create a static IP object for the domain controller’s hostname, and an additional A record on the DNS Resource Records tab of either the Object Profile or Domain Profile. For example, a static IP object can be created for “Server1.company.com” at the IP address 10.1.1.1, and then the Resource Records tab should have a second A record: company. com. IN A 10.1.1.1 ALU DNS servers with External Updates enabled create messages for the VitalQIP Message service whenever they receive dynamic updates from non-QIP sources. The messages are of the “DNSUpdateRR” type. Message Service then passes them to the destinations configured in the Message Routes. There should be one Message Route for DNSUpdateRR messages to go to the QIP Update Service on the Enterprise server so the new records will be added to the VitalQIP database. In addition, if there are multiple DNS primary servers for these domains, a second DNSUpdateRR message route should point to the DNS Update Service on the E/S so that other DNS primary servers will be updated. (Note: QIP updates from DNS sources are not automatically forwarded to DNS Update Service; that is only for QIP Updates from DHCP servers.) The qip.pcy of a DNS server should have message routes similar to: Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 5 MessageRoute=DNSUpdateRR:A:0:QIP Update Service (Update RR):VitalQIP QIP Update Service:<ip_address_of_Enterprise server> MessageRoute=DNSUpdateRR:A:0:DNS Update Service (Update RR):VitalQIP DNS Update Service:<ip_address_of_Enterprise server> The above information and more is also discussed in the white paper “Dynamic Update Configuration”. Use of primary/secondary DNS servers and zone transfers Differences between ALU (or BIND) DNS and MS-DNS: In most VitalQIP installations, one DNS server is a master (primary) for a particular domain and other DNS servers might be slaves (secondary). This contrasts with the multimaster configuration recommended by Microsoft, in which all DNS servers are master for the zone and LDAP replication keeps the data consistent. MS-DNS servers are usually also Domain Controllers . This means that they , which have a local copy of the LDAP repository containing the DNS data, as well as other AD-related information. Either approach works, as long as DDNS updates and/or zone transfers reach all necessary DNS servers. Multi-master DNS for ALU DNS: VitalQIP can support multiple primary ALU DNS servers for any zone, but it is less common than in MS-DNS and is not recommended except in special cases. ALU DNS servers that are primary for the same zone can pass updates between each other via the VitalQIP Enterprise server. The zones need to have External Updates enabled, the DNS servers need to have message routes to VitalQIP DNS Update Service on the E/S. Then DNS Update Service can forward each dynamic update to the other primaries for that zone. Caveats for multi-master DNS include: a.DNS Generation should be minimized in a multi-master design, because it only goes to one master and it will be at least slightly out of synch with the other masters. b.DNS Generation should be done to each of the master servers as closely as possible to the same time c.Do not deploy dynamic zones that have one primary DNS server on MS-DNS and one primary DNS server on ALU DNS – they will be unable to replicate with each other. Recovery from an offline DNS primary server: If a DNS primary server goes offline, the Windows clients would still have correct DNS resolution from the secondary DNS servers, but the DCs won’t be able to make updates in DNS. Therefore, the resource records for AD will become increasing stale if the primary is offline for an extended period. The domain controllers are unable to update a secondary server, and might not be able to update an alternative primary server either, unless they have an SOA record identifying it. However, a DNS server can easily be reconfigured from a secondary to a primary in the zone profile in VitalQIP, and DNS Generation to the newly-promoted primary server fixes the problem. Of course, downtime for production DNS servers should be avoided as much as possible; high-availability hardware might help. See the Alcatel-Lucent Disaster Recovery white paper for more details. Having two primary servers, therefore, does not really provide fault tolerance by itself. In most cases, it is best to assign one DNS server as the primary and other ALU DNS servers as secondaries. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 6 Primary/secondary for ALU DNS: Windows clients require resource records for Active Directory be as up to date as possible – records that are refreshed once every six hours are unacceptable. Any zones which contain SRV records should have Notify set to Yes. This causes the DNS primary server to immediately notify all secondary servers upon any change, and the secondary server requests an incremental zone transfer (IXFR). Though Notify=Yes can be set in the Zone options in VitalQIP, setting it in Server/Zone Options is better. In the Domain Profile of an AD-related domain, first set a reasonable Refresh Time, such as 900 seconds (15 minutes). Then go to the Zone Options Tab, and set the zone options such as allow-transfer and allow-update as appropriate. The GUI has separate settings for each type of DNS – be sure to set the zone options for all types that might eventually be used someday. Set Notify to No as the zone default, since the zone will have multiple secondary servers but only one primary sever, and the secondary servers should not send Notify messages to each other. Figure 2: ALU DNS Zone options Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 7 After saving the changes on the Zone options tab, assign the Primary DNS Server on the DNS Server tab. Under that assignment, the zone options can be customized, and the important customization for the DNS Primary server should be Notify=Yes. Then save, and assign the secondary servers – they can all keep the zone defaults. DNS Generation to the primary creates a named.conf with a master zone statement with Notify yes; DNS Generation to a secondary creates a named.conf with slave zone statements with Notify No. Likewise, allow-transfers can be None for secondaries and set to a correct allowtransfer ACL for just the primary. Figure 3: ALU DNS Server/Zone options Resource records for ALU DHCP clients: Getting DHCP hostnames into VitalQIP and DNS In many organizations, DHCP clients need to perform reverse lookups of their own hostnames in DNS to verify their IP addresses. In an ALU DHCP environment, the message flow is as follows: 1 The DHCP clients register their names in the DHCP server when they get leases. 2 Whenever an ALU DHCP server has DHCP lease activity, it generates messages to the VitalQIP Message Service (according the DHCP policy UpdateQIP). 3 The Message Service has a message route to send DHCP messages to the VitalQIP QIP Update Service, which is usually on the Enterprise server. 4 The QIP Update Service can then check the database to be certain that the new DHCP client hostname does not conflict with an existing static IP object’s hostname (such as “www”) of the same domain. 5 The QIP Update Service has the policy UpdateDNS set to True by default, in which case it forwards those updates to the DNS Update Service, via the VitalQIP Message Service for type DNSUpdateObject. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 8 6 The VitalQIP DNS Update Service sends DDNS updates to the DNS primary server. 7 Then the DNS primary server has IXFR zone transfers to secondary DNS servers. Figure 4: Typical VitalQIP management of Windows Clients using ALU DNS and ALU DHCP E/S Pushes Dynamic Updates Pushes EDUP Updates ALU DHCP ALU DNS Dynamic updates SRV, CNAME DORA Windows Clients Windows Logons Domain Controller Getting DHCP clients into DNS (Use of DHCP Option 81) By default, an Alcatel-Lucent DHCP server registers the client hostname in the domain associated with the IP object in the VitalQIP database. A Windows client, however, can also be configured locally with its own domain, which does not necessarily match the domain configured in VitalQIP. That domain name is passed to the DHCP server in DHCP Option 81 (client fully qualified domain name) in the DHCP-Discover or DHCP-Request from the client. The Alcatel-Lucent DHCP policy Option81Support tells the DHCP server what, if anything, should be done with this data. The default setting is “Suppress”, which tells the DHCP server to ignore the client’s domain name and use the one that is configured in VitalQIP. The setting of Suppress works well when each subnet is in only one domain and where the users who configure desktop systems do not necessarily understand the DNS infrastructure. This is the default because it is the most common situation for VitalQIP customers. There may, however, be some cases where it is advantageous to use the domain requested by the client, if it exists. This can be accomplished by setting the Option81Support value for the Alcatel-Lucent DHCP server to the appropriate value (Client, Server, or Ignore) • “Client” sets the flags in the option 81 data of the outgoing DHCP Offer and acknowledgement (ACK) packets to allow the DHCP client to update its A record while the server updates the PTR record. • “Server” sets the flags in the option 81 data of the outgoing DHCP Offer and ACK packets to tell the DHCP client that the server will update the A and PTR records. • “Ignore” precludes echoing the option 81 data in the outgoing DHCP Offer and ACK packets, which causes some Windows DHCP clients to update their own A and PTR records Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 9 Figure 5: Option 81 Support E/S Client DHCP dhcpd.conf DB has D-DHCP: 10.1.2.3 udp00123uds.company.com Discover Push company.com No IP Name=JoesPC MyDomain.com Offer dhcp.db 10.1.2.3 JoesPC.??? ??? JoesPC.??? Update Req Ack If “Option81Support” is set to Suppress (default), then “???” = “company.com” If Option81Support is set to Client, Server, or Ignore, then “???” = “MyDomain.com” (difference between Client, Server, and Ignore is only the source of the updates to DNS) Resource records for Windows clients with static IP addresses Allow or not allow DNS registration of static clients? Devices whose IP addresses are statically configured are often important servers or network printers. They don’t use DHCP, but their IP addresses need to be in DNS. In a traditional VitalQIP environment, static IP objects are created in the VitalQIP GUI, which then puts their A and PTR records into DNS. But as discussed, many devices, such as Windows servers, also try to register their own IP addresses in DNS. In Windows, this is controlled by the Windows registry setting “Register this connection’s address in DNS”. Some non-Windows clients also try to emulate this Windows behavior. VitalQIP administrators can choose whether or not to allow these registrations, by setting “Allow-update” permissions for each zone in DNS. Updates from DCs will be from known IP addresses, but DNS needs “Allow-update=any” if the administrator wants to allow any device to plug into the network and get into DNS automatically. The advantages of “Allow-update=any” are: 1.The VitalQIP administrators don’t need prior notice of new servers and printers before they come online, and don’t need to take the time to create static IP objects. 2.The devices can unregister themselves if they go offline with proper shutdowns – whereas static objects in VitalQIP might remain and use up IP addresses for years if device owners don’t report it. 3.It is more like a traditional Microsoft-centric network. The disadvantages are: 1.There is no protection against users having device names that conflict with other IP addresses. For example, if any Windows user renames his computer as “www”, the name in DNS would become indistinguishable from a corporate website. 2.More load is created on DNS and VitalQIP to process many external updates to DNS. 3.Incorrectly configured devices can erroneously delete correct records. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 10 4.Hackers could easily make changes to DNS to redirect names such as “www” to their own systems. (GSS-TSIG secure zones as well as allow-update permissions are needed to fully prevent this, but allow-update permissions alone will help greatly). For most customers using Alcatel-Lucent DNS, the disadvantages far outweigh the advantages, so they do not put “allow-update any” for their zones in DNS. For customers using MS-DNS with GSS-TSIG secure zones, problem #1 (above) is not overwhelming – there is some protection against duplicate device names due to its concept of ownership of resource records. In solutions that use Alcatel-Lucent DNS, therefore, the best-practice is to not allow updates from static devices. That means VitalQIP administrators need to create static IP objects for each domain controller, and each of them should have at least two A records: one for its real hostname, and one for the domain name to point to its IP. Other types of servers and printers that need fixed static IPs also need static IP objects, and customers need to have some business process for VitalQIP administrators to know about these systems before they are put onto the network. Understanding Internal, External, and Partially-managed IP objects in VitalQIP For special cases in which customers have some control over the end-user devices and really want them to automatically register in ALU DNS without intervention from VitalQIP administrators, VitalQIP has special object types. When any IPv4 object is created in VitalQIP – either static, Manual-DHCP, or DynamicDHCP – it is given an object class, such as Workstation, Printer, Server, Undefined, etc. These are collectively considered as Internal objects. Any of these internal Object Classes could be used for either static or dynamic IP objects. In solutions with ALU DNS following the best practices discussed above, all IPv4 Objects have one of the internal Object Classes. These Objects can be modified only via VitalQIP– either the GUI or a CLI, or automatically by QIP Update Service in response to DHCP activity. With an alternative design, however, DNS can receive dynamic updates from external sources to create A or PTR records for IPs that don’t yet exist in VitalQIP. If the zone has external updates enabled for A or PTR records, and if the devices are in a subnet that is managed by VitalQIP, then VitalQIP is updated with new IPv4 objects for the IP addresses that already exist in DNS. These are created as IPv4 objects with an object class set to External. As long as they remain External objects, they can only be modified via dynamic updates to DNS, with DNS then passing the updates to QIP. In other words, devices that are A) running Windows, B) configured to register in DNS, and C) have static IP address send dynamic updates to DNS. If DNS allows these updates, it creates A and PTR records for them. Then, if it is ALU DNS with Import External Updates enabled for A and PTR records, it sends updates to VitalQIP, which results in External objects. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 11 Figure 6: DNS Registration of Static Windows Clients (if allowed) E/S Pushes Dynamic Updates EDUP ALU DNS Dynamic updates A, PTR Dynamic updates SRV, CNAME Windows Clients Domain Controller VitalQIP also has Partially- managed objects. These are created in VitalQIP like static IP objects and pushed to DNS like static objects to provide the initial hostname. If, however, the devices later register in DNS and change those records, then updates to them are accepted by VitalQIP. This allows the users of that device to change the hostname at a later time without VitalQIP administrator intervention. Figure 7: Sources of updates to each object type in VitalQIP Vital QIP Database Hostname A checkbox PTR checkbox Hostname DHCP DHCP object messages ALU DHCP qip-qipupdated Static object GUI or CLIs Hostname A checkbox External object Partially-managed object DNSUpdateRR messages PTR checkbox ALU DNS AFXR qip-syncexternal MS DNS Solution Implementation Implementing a typical solution using ALU DNS and ALU DHCP 1 Review the design decisions discussed above. 2 The global policy settings for DynamicDNS should have Static DDNS Updates set to True, Use DNS Update Service set to True, and Update Secondaries set to False. The Global Policy “FirstIn-LastIn” should always be set to LastIn. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 12 3 In the VitalQIP GUI, create any additional networks, subnets, domains, or reverse zones necessary to support Windows, beyond what already exists in your VitalQIP infrastructure. 4 In the VitalQIP GUI, enter the Windows domain controllers as static IP objects. 5 On the Resource Records tab of each static object of a domain controller, or on the Resource Records tab of the domain, enter an A record for the domain name to resolve to the IP address of each domain controller. 6 On the zone options tab of the domain profile of each domain that will have AD-integrated Windows clients, open the zone options for the correct DNS server type and set correct values. Import External Updates should be enabled for but only for SRV and CNAME records. Set the allow-update to Use List, and the list should be the IPs of the VitalQIP E/S and all domain controllers. Set Notify to No at the zone level. Then, on the Servers tab, change Notify to Yes just for the DNS primary server as an override of the zone default. There should usually be one primary server and multiple secondary servers. 7 Set the correct zone options and server/zone options of each reverse zone that will have AD-integrated Windows clients. These should be the same as the domains, except that import external updates should be disabled for reverse zones. 8 Set the options and message routes in the qip.pcy file on the Enterprise server and all Remote servers as mentioned above: • Each DHCP server should have a DHCP message route to QIP Update Service on the E/S • Each Alcatel-Lucent DNS servers should have a DNSUpdateRR message route to the QIP Update Service on the Enterprise server. (The DNSUpdateRR message route to DNS Update Service is needed only if there are zones with multiple primary servers.) • The Enterprise server (that is, QIP Update Service) should have a DNSUpdateObject message route to the DNS Update Service, and have the UpdateDNS policy set to True. 9 Arrange a cut-over time. 10 At the appropriate time, assign the domains and reverse zones to the correct DNS primary and secondary servers. (Do not do this too far in advance of the actual change on the servers, since the VitalQIP assignments affect dynamic updates immediately). 11 Perform DNS and DHCP Generation to all servers. 12 Verify thatWindows clients are getting their hostnames into DNS, and that they can access the necessary SRV records. Non-managed MS-DNS for a child domain Some VitalQIP customers prefer to have Microsoft AD only loosely integrated with VitalQIP. In this type of design, MS-DNS servers have separate domains that contain the SRV records in addition to any DNS registrations from clients. The ALU DNS servers might have child-zone delegations or forwarding to or from MS-DNS servers. The ALU DNS servers can be designated as secondary servers for the zones hosted by the MS-DNS servers, or vice-versa. VitalQIP has a “non-managed DNS servers” feature, which means entering the IP address and zone information for a DNS primary server for which a VitalQIP DNS server will Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 13 be a secondary. This translates to a slave zone statement in the named.conf when DNS Generation is performed to the VitalQIP DNS server. This is appropriate when the VitalQIP database does not have any IP objects or other records for the domains and is not expected to send any updates. Figure 8: Non-managed MS-DNS for a child domain E/S Pushes Dynamic Updates Pushes EDUP Updates ALU DNS ALU DHCP (company.com) Zone Transfers DORA Windows Clients Dynamic updates MS-DNS (ad.company.com) Dynamic updates Windows Logons Domain Controller Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 14 MANAGING MS-DNS WITH VITALQIP Benefits of adding VitalQIP to existing Microsoft infrastructure Even if an organization is already running a Microsoft Windows network using MS-DHCP, MS-DNS, and all of Microsoft’s recommendations, you can add VitalQIP to provide a central management point. VitalQIP is highly interoperable with third-party software such as MS-DNS and MS-DHCP, so it can easily provide centralized management for these systems. VitalQIP provides additional functionality to that available from Microsoft tools. VitalQIP is an IP management tool, not a directory service. VitalQIP provides the ability to: • Manage IP address spaces holistically • Manage networks centrally or in a distributed fashion • Manage subnets and IP addresses • Manage DNS and DHCP servers from a central location, regardless of the vendor or platform • Report and audit DNS and DHCP changes • Manage administrators and their capabilities at a very granular level • Define policies to ensure consistency throughout networks • Operate in a mixed platform environment • Perform error checking to ensure networks and servers are properly defined and overlapping scopes are not present How is MS-DNS different from ALU DNS or BIND DNS? All DNS servers are based on the Internet RFCs for DNS, but there are important differences between DNS servers. ALU DNS is based on ISC BIND DNS, though it has extensions such as External Updates that allow it to work better in a VitalQIP environment. MS DNS – as used in Windows Server 2003 and Windows Server 2008 – however, has some important differences. The following sections explain some of the differences that are important to VitalQIP management of MS-DNS. Relationship with active directory domain services MS-DNS is tightly integrated with Microsoft AD. A Windows server has Roles, and each Role consists of Services. When a Windows server has a Role of Active Directory Domain Services, it is a Domain Controller. It has a few services which provide it with the AD database, replication of data to other domain controllers, Netlogon Service to allow Windows clients to login to the domain, and Kerberos Key Distribution Service to provide security. “DNS Services” is a separate Role for a Windows server, but Microsoft strongly recommends that it be installed on the same server as AD Domain Services. This is because MS-DNS does not keep zones and configuration data in flat text files (as BIND and ALU DNS does), but instead keeps data in the same distributed datastore that holds the User and Computer information. The AD database is based on LDAP and is organized in partitions that replicate between domain controllers. Microsoft Windows has several GUIs to manage the data in AD, such as Active Directory Users and Computers; AD Sites and Services; and AD Domains and Trusts. The Microsoft DNS Manager GUI is a similar tool to directly manage DNS data which is in the AD database. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 15 AD replication between DNS servers Because DNS data is part of the AD datastore, it is replicated between all domain controllers via remote procedure calls (RPCs). This means that all MS-DNS servers are primary DNS servers for the domains that are in AD. If one MS-DNS server for an AD domain is dynamically updated, then all of the other MS-DNS servers for that domain are automatically updated as well. MS-DNS servers can still have slave zones pulled from other servers and can still send zone transfers to other servers, but MS-DNS servers with site links for replication don’t need to perform DNS zone transfers between each other. Ownership of resource records In BIND or ALU DNS, each DNS resource record is saved as a line in a flat text file. But in MS-DNS, resource records are elements in the AD database. Each record has ownership and permissions, much like files in a Windows file system. These can be seen by right-clicking and selecting Properties in Microsoft’s DNS Manager. Important resource records in DNS are protected against change by Windows users who lack permissions to make such changes. Figure 9: Resource Record level security in MS-DNS (using Windows Server 2008R2 DNS Manager) Secure zones and lack of allow-update ACL In BIND or ALU DNS, each zone has Allow-update permissions. Allow-update can be set to none, any, or use list. If it is a list, the list specifies the IPs allowed to send updates for each zone. Optionally, zones can also have TSIG or GSS-TSIG security to authenticate Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 16 the updater. But, because MS-DNS has the owners and permissions for each resource record that are based on Windows users, it does not have any allow-update list based on IP addresses. In MS-DNS, each zone can have Dynamic updates set to none; secure and non-secure (same as “allow-update=any”); or secure only. The setting “secure only” uses the Kerberos which is built into all Windows systems to authenticate the updater via GSS-TSIG. In other words, the identity of the client that sent the dynamic update is confirmed by a domain controller. The client computer that sent the update is associated with a Windows user account, and the permissions associated with the Windows user account are compared with the permissions of the resource record being updated in DNS. GSS-TSIG and secure updates are discussed in more detail in the next chapter. Interactions between VitalQIP and MS-DNS VitalQIP is an IP address management (IPAM) tool, which can manage multiple DNS and DHCP remote servers. The DNS servers can be any mix of ALU DNS, third-party BIND 9.x DNS, and MS-DNS. “Management” can mean getting data from the remote servers to display in the IPAM GUI, creating zone files and configuration files for DNS, and sending updates to DNS. Some, but not all of these functions require VitalQIP services to be installed on the DNS servers. The following discussions explain the various ways in which the VitalQIP Enterprise server can interface with MS-DNS. Use of qip-syncexternal to pull data from MS-DNS into VitalQIP MS-DNS gets data from several sources: domain controller that are advertising services; perhaps Windows static clients registering in DNS; perhaps MS-DHCP servers sending updates to MS-DNS based on DHCP activity; and perhaps Windows administrators making entries into the Microsoft DNS Manager GUI. For VitalQIP to function as an IPAM, that data needs to be in the VitalQIP database as well. VitalQIP has the qip-syncexternal CLI command for this purpose. In brief, this CLI requests a zone transfer from a particular DNS server, compares the contents of that zone or zones with the VitalQIP database, and updates the database as necessary. Because it uses standard AXFR zone transfers, it does not require Alcatel-Lucent DNS. Almost all DNS servers, including all Microsoft and BIND DNS versions so far, support AXFR zone transfer and, therefore, work with qip-syncexternal. This CLI is run from an Enterprise server or a distributed server console, and its IP needs to be in the allow-transfer permissions of the DNS server from which it pulls data. For VitalQIP to be able to process the data from the zone transfer that is the first part of qip-syncexternal, it must have a DNS server profile of the DNS server, and it must have zones that match the zones on the DNS server. The zones on the MS-DNS server might include a “_msdcs” child zone of the main AD zone – for example “_msdcs.company. com” – which might have its own SOA record. If so, that zone should also be defined in VitalQIP. But the resource for _tcp, _udp, and _sites are usually just dotted names under the parent domain, not separate child zones, so they should not be separate child zones in VitalQIP either (a change from previous Alcatel-Lucent recommendations). Likewise, the resource records for forestdnszones and domaindnszones in Windows 2008 should also not be separate child zones. The qip-syncexternal CLI can be run manually, or scheduled via “cron” or some other scheduler; or run automatically via a user exit script. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 17 Figure 10: Domain Controller updates and DNS registration Windows 2000 Client/Domain Controller Client MS DNS qip-syncexternal MS DNS MS DNS VitalQIP database External objects in VitalQIP for MS-DNS clients In general, qip-syncexternal puts the new resource records to the Resource Records tab of the domain profile or reverse zone profile in VitalQIP. For A and PTR records whose IPs are within VitalQIP-managed subnets, however, it will create or update IPv4 Objects of type External. These objects can only be changed via dynamic updates to DNS, unless VitalQIP administrators first change them to internal. Figure 11: (also used in the previous section) Sources of updates to each object type in VitalQIP Vital QIP Database Hostname A checkbox PTR checkbox Hostname DHCP DHCP object messages ALU DHCP qip-qipupdated Static object GUI or CLIs Hostname A checkbox External object DNSUpdateRR messages PTR checkbox Partially-managed object ALU DNS AFXR qip-syncexternal MS DNS Two types of DNS Generation to MS-DNS DNS Generation from VitalQIP to an ALU or BIND DNS server involves creating zone files for some or all of the master zones, as well as the configuration information such as the named.conf. It requires two selections: • Type: Update or Configuration and Data • Target Zones: All Zones, Selected Zones, or Changed-Zones Only “Update” means that the files are produced and then DNS will reload. “Configuration and Data” lacks the reload at the end. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 18 DNS Generation from VitalQIP to an MS-DNS server is different, however, since MS-DNS doesn’t really have zone files. DNS Generation to an MS-DNS server also requires two selections but one of them is different: • Type: All Records or Changed Records Only • Target Zones: All Zones, Selected Zones, or Changed-Zones Only DNS Generation of All Records means VitalQIP sends entire zones to the MS-DNS server and also creates dnscmd commands telling the MS-DNS server to delete all the existing resource records from the AD database and replace them with new records. (In some VitalQIP versions before 8.0PR2, this is called a “Configuration and Data” push even though its operation to MS-DNS is very different from its operation to an ALU or BIND DNS server). DNS Generation of Changed Records Only (previously called “Update”) pushes only the changed resource records for each zone. DNS generation of “Changed Records Only” can be considered as a reverse of qipsyncexternal. Both involve an AXFR zone transfer from MS-DNS and comparing the zone transfer to the VitalQIP database. But qip-syncexternal updates the VitalQIP database (for external objects) whereas DNS Generation with “Changed Records Only” updates MS-DNS. This selection is independent of the “Changed Zones only” selection, which is based on database flags on each zone. When a changed records only DNS Generation is performed, the RMI QAPI process on the Enterprise server creates add.delta files and delete.delta files, which are lists of the resource records that were in VitalQIP but not in MS-DNS, or vice-versa. The VitalQIP Remote Service then transfers them to the MS-DNS server, Then MS DNS Update Service updates the local MS-DNS Service based on these files. An All Records DNS Generation to an MS-DNS server should be performed only under special circumstances, such as setting up a new DNS environment. It should not be performed on any existing MS-DNS server unless a) qip-syncexternal has already been run; and b) AD replication is turned off. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 19 Figure 12: Static IPs for MS-DNS Secure Zones VitalQIP GUI VitalQIP database Enterprise server File Generation Service Changed records only Remote Server/ Domain Controller VitalQIP Remote Service VitalQIP MS DNS Update Service MS DNS Dynamic updates to non-secure zones in MS-DNS The current best-practice is to only perform DNS generation rarely, and instead rely on dynamic updates from VitalQIP to DNS. This is even more important for MS-DNS than for ALU DNS. If MS-DNS has a master zone with dynamic updates set to “Secure and Non-secure”, and if VitalQIP has associated that server to that zone, then VitalQIP generates dynamic updates to MS-DNS whenever there are DHCP-related changes to the zone, or whenever VitalQIP administrators make changes through the GUI or CLIs. The updates are sent by VitalQIP DNS Update Service/qip-dnsupdated, and the process is exactly the same as with ALU DNS remote servers. Dynamic updates to non-secure zones do not require any software to be installed on the MS-DNS server. Dynamic updates to secure zones in MS-DNS If the zone has dynamic updates set to “secure only” in MS-DNS, then the process is more complex. When the VitalQIP Enterprise server processes updates from DHCP clients, or from the VitalQIP GUI or CLIs, then VitalQIP DNS Update Service on the Enterprise server knows which DNS servers need to receive dynamic updates, and if those zones are on MS-DNS and/or are secure zones. If it is a secure zone on MS-DNS, the VitalQIP DNS update service on the enterprise server does not attempt to send dynamic updates directly to MS-DNS, but rather sends messages to VitalQIP MS DNS Update Service running locally on the MS-DNS server via the VitalQIP Message Service. This is a conduit request; no Message Route is needed. GSS-TSIG secure zones and the VitalQIP MS DNS Update Service are discussed in more detail in the next chapter. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 20 Implementing VitalQIP management of MS-DNS servers Deciding how VitalQIP interacts with MS-DNS Plan carefully before performing any installations or changing any configurations. One of the most basic questions is which zones will be hosted on MS-DNS, and what level of management is needed from VitalQIP. Based on the above discussion of types of interaction between VitalQIP and MS-DNS, decide whether the zones in MS-DNS are to be managed by VitalQIP. The MS-DNS servers could be handled in any one of the following ways by VitalQIP: 1.Fully managed by VitalQIP, including the ability for DNS generation 2.VitalQIP able to send updates to any zones on MS-DNS, including secure zones 3.VitalQIP only able to send non-secure updates to MS-DNS 4.No updates from VitalQIP to MS-DNS, but VitalQIP still able to pull data from MS-DNS 5.Completely unmanaged by VitalQIP (potentially linked to VitalQIP-managed DNS servers through DNS forwarding or child zone delegations or zone transfers) The first two methods require installing VitalQIP components on the MS-DNS server. The first four require creating a DNS server profile in VitalQIP and creating appropriate permissions in MS-DNS. Pre-configure MS-DNS to be managed by VitalQIP The IP address of the VitalQIP Enterprise server must be added to the allow-transfer permissions for each existing MS-DNS zone for which qip-syncexternal or DNS Generation will be run in the future. If dynamic updates from VitalQIP are required for any existing zones, the Dynamic Updates settings for those zones should be set to “Nonsecure and Secure” or “Secure only”. If set to “Secure only”, the GSS-TSIG secure zones section of this paper provides more detail. Installing VitalQIP Services on MS-DNS remote servers VitalQIP installation should be performed on those MS-DNS servers that need to get DNS Generation or secure dynamic updates from VitalQIP. Only minimal VitalQIP components are needed: • VitalQIP remote service, which handles DNS generation for any type of DNS/DHCP remote server. • VitalQIP message service which connects the remote server to the enterprise server. • VitalQIP SSL tunnel service, to add SSL tunneling to message service if secure message routes are defined. • VitalQIP MS DNS Update Service (see below). When the VitalQIP installation asks for features selection, only the remote server package should be selected. The subcomponent remote service is required by the installer for any remote service package – this includes the VitalQIP Message Service and SSL Tunnel Service as well as the remote service itself. Then select “MS-DNS Support” as a second component of the remote service package – this causes VitalQIP MS DNS Update Service to be installed as well. Deselect ALU DNS component – ALU DNS cannot run on the same server as MS-DNS. It is possible to support both MS-DNS and MS-DHCP on the same server. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 21 Figure 13: VitalQIP installation on an MS-DNS Server What is VitalQIP MS DNS Update Service? VitalQIP has a service that is installed only on VitalQIP Remote Servers running MS-DNS. The VitalQIP MS DNS Update Service has two different functions: a Processing add.delta and delete.delta files from changed-records-only DNS generation for both secure zones and non-secure zones. b Processing dynamic update messages from the Enterprise server for secure zones. In either case, VitalQIP MS DNS Service updates the zone in MS-DNS on the same server. MS DNS Update Service will first try to do a GSS-TSIG update, and then call dnscmd if the update fails. Using both methods means that secure updates from the VitalQIP E/S can be handled reliably and efficiently, without the Enterprise server needing to have correct and up-to-date Kerberos keys. This should also make VitalQIP support of MS-DNS secure zones more adaptable to future Windows releases. This process uses a sec.dat file created from VitalQIP to obtain the security principal and the zone information – though the security principal is used only for the GSS-TSIG updates and is not needed to run dnscmd commands. The sec.dat file is created during DNS Generation to an MS-DNS server, or it could also be copied manually. Please contact VitalQIP Support or use the AskAL Knowledgebase for more details of configuring the sec.dat. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 22 Figure 14: VitalQIP management of MS-DNS with secure zones E/S Pushes Dynamic Updates VQIP MS-DNS Update Service qip-syncexternal MS-DNS Dynamic updates A, PTR Dynamic updates SRV, CNAME Windows Clients Windows Logons Domain Controller “Semi-managed” MS-DNS servers Some customers prefer that MS-DNS servers be “semi-managed” by VitalQIP. In this scenario the MS-DNS servers don’t have any locally installed VitalQIP components, but VitalQIP is still able to run qip-syncexternal to pull data from them and still attempts to send non-secure dynamic updates. In this case, the MS-DNS servers and their zones are entered in VitalQIP as if they were managed. VitalQIP needs a DNS server profile with the correct name and IP address, even if there won’t ever be any DNS Generation to the MS-DNS server. Please consult with VitalQIP Support or Professional Services for more details. Creating MS-DNS server profiles in VitalQIP The VitalQIP GUI allows several types of DNS servers to be defined in VitalQIP. The supported version(s) of MS-DNS varies depending on the VitalQIP version – please refer to your VitalQIP Release Notes to learn if the MS-DNS should be Windows 2003, Windows 2008(R2), or some other version of Windows. The correct name, domain, and IP address of the MS-DNS server is always required. The Default Directory should always be %systemroot%\system32\dns – but see the information in the Administrator’s Reference Guide concerning 64-bit Windows. The “Boot type” should be “Directory”, which means AD integrated. Once Boot Type is set correctly, then “Secure DNS Updates” can be set to true or false. If “Secure DNS Updates” is true, then zone assignments to this server can be changed to “secure”. If VitalQIP is to send either DNS Generations or secure dynamic updates for those zones, it needs to have appropriate usernames/passwords. The Windows user names are called Principal Names. The user for Strong Kerberos Principal can be any Windows user who exists in Active Directory Users and Computers under the applicable Domain (Realm). The user for Proxy Kerberos Principal needs to be a member of the DNSUpdateProxy Security Group. Please see the Administrator’s Reference Manual for more details. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 23 Figure 15: Microsoft DNS server profile Creating zone profiles in VitalQIP VitalQIP requires domain profiles and reverse zone profiles of the zones managed by MS-DNS before it can send updates or pull data from those zones using qip-syncexternal. The MS-DNS server is assigned on the Primary/Secondary servers tab of each zone profile. The Zone options tab of each zone has Windows 2000 Zone options, such as allow-transfer and allow-query permissions, that are applicable to all MS-DNS servers but not to ALU DNS servers. In addition, associating one particular server to one particular zone can override the general zone options. MS-DNS secure zones are indicated here. Note that VitalQIP has a policy “allow-update” (yes or no) and a checkbox for “Send Secure Updates” which translate into the single MS-DNS policy “Dynamic updates” of none, secure and non-secure, or secure only. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 24 Figure 16: Zone/server options for MS-DNS Considerations of 64-bit Windows As of the end of 2013, the only 64-bit Windows for which VitalQIP can manage MS-DNS or MS-DHCP is Windows 2008 R2. VitalQIP 7.3 or 8.0 can manage MS-DNS and MS-DHCP on Windows 2003 and original non-R2 Windows 2008 only if they are 32-bit. The new Windows 2012 is not yet supported by VitalQIP. VitalQIP is currently a 32-bit application, and as such requires a “sysnative” path to be able to read MS-DNS and MS-DHCP data from the Windows system directory. Please refer to the Administrator’s Reference Guide for your version of VitalQIP for more details of how to do this. Multi-master DNS Since MS-DNS servers use AD, MS-DNS servers can replicate data with each other. VitalQIP only needs to update one of them. If a zone has multiple primary servers, it is best to avoid having secondary servers on more than one of them, since this may cause serial numbers to become out of sync. Additionally, verify all primary servers for a given zone are MS-DNS or that all are Alcatel-Lucent DNS; zone replication does not work if the two types are mixed, since they use different methods. Use VitalQIP GUI rather than MS-DNS manager Once VitalQIP is configured to manage the MS-DNS server, administrators should refrain from using the Microsoft DNS Manager GUI to enter records to DNS. Static IP objects entered via VitalQIP are easier to manage and will have better error checking than external objects created via the MS-DNS console and then processed via qip-syncexternal. Conflicts might result if both GUIs are used. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 25 GSS-TSIG SECURE ZONES FOR ALU DNS AND MS-DNS Vocabulary for secure zones TSIG: (Transaction SIGnature)(RFC 2845) uses shared secret keys to securely identify each endpoint of a connection as allowed to make or respond to a DNS update or transfer. GSS-TSIG: Generic Security Service for TSIG (RFC 3645): uses Kerberos services to exchange keys rather than distributing the keys manually. Kerberos: Works on the basis of “tickets” to authenticate nodes; used on domain controllers. KDC: Key distribution center, used in Kerberos. Kerberos key distribution center is a service that runs on Windows servers that are Domain Controllers DES: (Data Encryption Standard) legacy encryption used in original Windows, but not accepted in Windows 2008 or BIND 9.7 by default. RC4-MAC: Stronger encryption, default for Windows 2003 and Windows 2008. AES128 and AES256: Strongest encryption supported in Windows 2008. Allow-update permissions and secure zones If all clients are allowed to update DNS, security is needed to prevent any client from taking over the resource records of critical network resources, such as web servers. For example, a general user should not be able create an A record for “www.company.com”, when that name is already in use and associated with a static IP address. With ALU or BIND DNS, this is prevented by setting allow-update to not allow general users to update DNS directly, and by the fact that the QIP Update Service checks for such duplicates arising from DHCP and gives preference to the static IP address before sending the dynamic updates on to DNS. In others, ALU and BIND DNS servers have an Access Control List (ACL) for allow-update. With MS-DNS, unwanted updates are prevented by the use of secure zones. The use of secure zones is a stronger solution that prevents hostile attacks not just accidents, although it is more complicated to set up and use and requires more resources for DNS. ALU DNS can use both allow-update ACLs and secure zones. Other meanings of “secure zone” Note that “secure zone” in other contexts can refer to TSIG secure updates to BIND DNS, using manually generated and copied keys. It can also refer to DNSSEC, which, in short, uses keys to authenticate data to DNS resolver clients. But within the context of AD integration, “secure zone” implies GSS-TSIG and Kerberos. How GSS-TSIG secure updates work When a dynamic update is made to a secure zone on a DNS server, security verification happens in (very simplistically) two stages. First the GSS-TSIG protocol verifies the identity of the sender and the receiver, and validates the contents of the update have not been tampered with. This stage uses Kerberos as the underlying security provider. Both ALU DNS and MS-DNS use keys from a Windows KDC to authenticate the identity of the system sending updates. All Windows systems that are members of the AD domain are authenticated, as are non-Windows systems with appropriate keytab information. MS-DNS – but not ALU or BIND DNS – then compares the identity of the updater to the access control information for the resource record. Last, the DNS server adds or deletes a record or a set of records from the zone. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 26 When to use secure zones GSS-TSIG security is more important when all IPs in a network are allowed to update DNS than it is when only the Enterprise server and a few others systems have permission. Since MS-DNS does not have allow-update ACLs, its use is more common for MS-DNS than for ALU DNS. ALU DNS can use GSS-TSIG secure zones, which can be useful in special cases. If the ALU DNS server has zones that have “allow-update” set to “any”, the GSS-TSIG security will at least authenticate that the system sending the update has a key, such as having logged into the Windows domain. GSS-TSIG security can also be useful for highly secure environments, where hackers spoofing IP addresses inside the network is a realistic threat, such that an allow-update ACL is insufficient security. Most VitalQIP customers prefer not to use secure zones, however, since they add complication and overhead. Internet-facing external DNS servers usually should not allow any dynamic updates, even secure ones. Key distribution centers (KDCs) and Kerberos keys VitalQIP’s implementation of GSS-TSIG – like Microsoft’s – requires keys from a Windows domain controller running Key Distribution Service (a KDC). An MS-DNS server gets the keys automatically via the OS. If the VitalQIP Enterprise server is Windows-based and is already a member of the AD domain, then its DNS Update Service can get these keys automatically via the Windows OS. For a Linux- or Solaris-based Enterprise server – or for any ALU or BIND DNS server even if running on Windows – keys are obtained by running the Microsoft’s “ktpass” utility on the KDC. Please see the VitalQIP Administrator’s Reference Manual for details. Access control information for resource records in MS-DNS As discussed in the previous chapter, AD keeps security information for each data item, including every DNS resource record. If the access control information does not forbid the updater from making changes to the AD entry it is trying to modify, the update succeeds. At this stage, if the entry had no security or did not previously exist, the access control information for the entry is updated such that only the updaters (and administrators) are allowed to make changes to the entry. There is one exception to this rule: when the updater is a member of a special security group called DNSUpdateProxy. Objects created by members of the DNSUpdateProxy group have no security; therefore, any authenticated user can take ownership of the objects. Managing Windows secure zones with VitalQIP VitalQIP does not attempt to store the access control information for each DNS record. Therefore, the clients associated with these records do not own the records created by DNS Generation from VitalQIP. Instead, records created by VitalQIP have one of two owners: either the Strong Kerberos Principal, or the Proxy Kerberos Principal. VitalQIP uses the Strong Kerberos Principal to create the records for Static IP objects, so that only VitalQIP can update them. The Proxy account is used to create External or Partially Managed Objects. This allows the clients themselves, or the MS-DHCP server, to take over ownership of these records, and be able to update the records as changes occur. Records for dynamic Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 27 DHCP addresses can be generated with either the Strong Kerberos Principal or the Proxy Kerberos Principal, depending on the value of the allow DHCP clients to modify dynamic object resource records policy. If this is set to true, the records are associated with the Proxy account and can be taken over by the DHCP clients. If, however, the policy is set to false, the records are owned by the Strong account and only VitalQIP can update them. Although this is a global policy, it can be overridden at a more granular level. MANAGING MS-DHCP WITH VITALQIP Differences between MS-DHCP and ALU DHCP BOOTP/DHCP interchangeability Bootstrap Protocol (BOOTP) is a legacy protocol used before DHCP, and still in use today by a few older devices on some networks. MS-DHCP and ALU DHCP can both hand out BOOTP addresses in addition to DHCP addresses, if necessary. ALU DHCP can give out BOOTP addresses in two ways: either BOOTP objects are defined in VitalQIP and pushed to the DHCP server, or the DHCP Policy “ShareAutoBootpAndDynDHCP” needs to be at a non-default setting of “true”. MS-DHCP, however, treats DHCP and BOOTP addresses interchangeably by default. Therefore, A-BOOTP and M-BOOTP objects should not be defined for subnets that are pushed to MS-DHCP. Terminology of types of IP addresses Both MS-DHCP and ALU DHCP have dynamic DHCP scopes: any address in the scope can be leased to any device in that subnet. Both types of DHCP use the concept of reserving specific IP addresses for certain devices, identified by their MAC address. In VitalQIP and ALU DHCP, this is called Manual-DHCP. In MS-DHCP, this is called “reservations”. When VitalQIP performs DHCP Generation to MS-DHCP, Manual DHCP objects are pushed out as reservations. VitalQIP also has Automatic DHCP, which is similar to Dynamic DHCP with the exception that Automatic DHCP objects are, by default, assigned an infinite lease time. This has no equivalent in MS-DHCP. Only Dynamic DHCP and Manual DHCP objects can be pushed to MS-DHCP, not Automatic DHCP or either type of BOOTP objects. All subnets have some IPs (e.g., router IPs) that should not be handed out by DHCP. VitalQIP is an IPAM solution, so it has a few classifications of IP addresses that are not DHCP and are not pushed to DHCP servers. These include static IPs which are in DNS but not in DHCP, “reserved” IPs which are marked as in use but not pushed to either DNS or DHCP, and unused addresses. (Note that “Reserved” has a different meaning in VitalQIP than it does in MS-DHCP). When VitalQIP performs DHCP Generation to ALU DHCP, the non-DHCP IPs in the subnets are not included in any way. The dhcpd. conf has a list of subnets, and a list of Manual DHCP objects and Dynamic DHCP scopes within each subnet. In MS-DHCP, however, the non-DHCP IPs are pushed out as Excluded. All IPs in each subnet between the start address and end address are available for any DHCP client except for those designated as “Reserved” or “Excluded”. DHCP configuration files and lease databases When ALU DHCP reloads after a push, the reload is fast because it is just loading the dhcpd.conf and dhcpd.pcy are loaded. But when MS-DHCP reloads after a push, the DHCP configuration is processed into AD via a series of netsh.exe commands that delete Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 28 the old configuration and create a new one. Therefore, it can take a long time if the MS-DHCP server is large. Both ALU DHCP and MS-DHCP have local database files to store the lease information: in ALU DHCP it is the text file dhcp.db; in MS-DHCP for Windows 2008 it is the binary file %systemroot%\systems32\dhcp\Dhcp.mdb No DHCP failover and access control The VitalQIP concepts of DHCP primary and DHCP failover do not apply to MS-DHCP; fault tolerance can be provided only with split-scope DHCP. Many other ALU DHCP features – such as Access Control – are also not available with MS-DHCP or any other non-ALU DHCP. Authorizing MS-DHCP servers Microsoft DHCP for Windows has a feature in which the DHCP Service queries the LDAP data store (that is, AD) to see if it is authorized. It will fail to start if unauthorized, to prevent “rogue” DHCP servers. Any user with a Windows installation media can install a DHCP server with a few mouse clicks, even by accident, and that server could potentially hand out IP addresses that conflict with the real DHCP server or with static IP addresses. Only an administrator with the proper permissions, however, can authorize a DHCP server in the AD database. Therefore, unauthorized Windows DHCP servers will not start and become rogue servers. Alcatel-Lucent DHCP doesn’t need authorization. It is designed to be configured and managed by VitalQIP, and is not designed to be a stand-alone DHCP server. VitalQIP ensures that DHCP servers with overlapping scopes are not deployed in the network. VitalQIP, however, does create the authorization record in AD when it performs DHCP Generation to a Remote server that is running MS-DHCP Implementing VitalQIP support of MS-DHCP VitalQIP installation on the MS-DHCP Remote Server As with MS-DNS, a VitalQIP installation is required on the Windows server, but it is only minimal services. All remote servers have VitalQIP Remote Service, VitalQIP Message Service, and VitalQIP SSL Tunnel Service. The sub-component “MS-DHCP Support” adds the qip-msextract utility and the VitalQIP MS DHCP Monitor Service. Create MS-DHCP server profile in VitalQIP The VitalQIP database requires basic information about each DHCP server before it can perform DHCP Generation or process data from its leases. The Microsoft DHCP Server settings in VitalQIP are mostly a subset of the settings for ALU DHCP, but there is a setting “Active Directory server”. This is to create the AD authorization for the MS-DHCP server. For details, see the Web Client User’s Guide chapter on DHCPv4 servers, which explains the MS-DHCP type as well as ALU DHCPv4. Migrating DNS and Sites data into VitalQIP During early stages of a migration, it can be helpful to run qip-dnscsv to get data from MS-DNS zones and to run the Microsoft LDIFDE utility to get the Sites and Subnets data from AD. The data files created by qip-dnscsv are imported to VitalQIP using other CLI utilities, such as “entersubnet” and “entersimpleobj”. The procedures to use qip-dnscsv are explained in detail in Chapter 3 of the VitalQIP Command Line Interface Guide. The data from LDIFDE can be read into VitalQIP using the qip-siteimport utility, which is described in detail in Chapter 1 of the VitalQIP Command Line Interface Guide. Some data might need to be edited or entered via the GUI after completing this process. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 29 qip-msextract utility When the VitalQIP environment is first set up, the qip-msextract utility can be used to migrate the existing MS-DHCP DHCP scopes, reservations, exclusions, and current leases into the VitalQIP database. This utility is installed as part of VitalQIP remote server installation on an MS-DHCP server – it needs the VitalQIP library files and needs to run the Microsoft utility “netsh.exe” locally on the DHCP server. It creates some text files that can be read by other VitalQIP CLIs, which can put the information in the VitalQIP database. Please refer to the AskAL knowledgebase “How to use the qip-msextract CLI” or the “Advanced DHCP Configurations” chapter of the VitalQIP Administrator Reference Manual for details. Note that the MS-DHCP Server profile, domains, and subnet profiles must exist in VitalQIP before qip-msextract is run, because it will not create new subnets automatically. Defining new DHCP scopes for MS-DHCP in VitalQIP Even if the previous information is migrated from AD to VitalQIP, some changes and editing are likely necessary. All dynamic objects in the subnets associated with MS-DHCP must be either “Dynamic DHCP” or “Manual-DHCP”. Manual-DHCP corresponds to “Reserved” addresses in MS-DHCP terminology: the address is reserved for one specific MAC address, and can therefore have a fixed hostname. MS-DHCP should not have more than one DHCP template per subnet. DHCP Generation to MS-DHCP When the DHCP Server Profile, subnets, and other DHCP-related data are correct in VitalQIP, it can perform DHCP Generation to done to the MS-DHCP server. This is a series of netsh commands to give the DHCP a new configuration, though it keeps its lease data for existing scopes. Getting MS-DHCP client hostnames into MS-DNS MS-DHCP can send secure dynamic updates directly to MS-DNS. If this is already working, then it is unnecessary to make any changes after introducing VitalQIP. Although Windows clients are able to register their own hostnames in DNS by DDNS updates directly from the client to the server, both Microsoft and Alcatel-Lucent recommend the MS-DHCP server perform these updates. This allows all DHCP clients, not just Windows DHCP clients, to have their hostnames in DNS. It also provides more security. The DHCP server sends the DDNS updates to the DNS primary server for that domain and reverse zone, potentially using GSS-TSIG secure updates. MS-DHCP has several options for updating DNS that are similar to the “Option81Support” policy of ALU DHCP. By default, it updates DNS on behalf of all its clients that send DHCP Option 81 (Client fully qualified domain name [FQDN]) information, which is mostly Windows clients. The updates go to the primary DNS server for the domain requested by the client, not necessarily to the domain that is configured in VitalQIP. MS-DHCP can be configured to send DDNS updates for all clients, not just those that send Option81, in which case the MS-DHCP server assumes the client is the same domain as itself. The various options are configured under Additional Policies in the MS-DHCP Server profile in VitalQIP, as netsh commands to set dnsconfig options for DHCP. Please refer to Microsoft documentation to find the correct netsh commands. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 30 Figure 17: VitalQIP management of MS-DNS and MS-DHCP E/S Pushes Dynamic Updates VQIP MS-DNS Update Service qip-syncexternal MS-DNS Dynamic updates A, PTR Dynamic updates SRV, CNAME Windows Clients Windows Logons Domain Controller Getting DHCP lease information into VitalQIP – VitalQIP MS DHCP Monitor Service VitalQIP has a service to monitor MS-DHCP’s leases and send them to the VitalQIP Enterprise server. In brief, the VitalQIP MS DHCP Monitor Service works by monitoring the debug logs of Microsoft’s DHCP Service. It restarts MS-DHCP and turns this logging on automatically, if necessary. The VitalQIP MS DHCP Monitor Service processes this log on a periodic basis, with the time period configured by the “SleepTime” parameter in the qip.pcy file. The Monitor Service then creates VitalQIP Messages of Type “DHCP” for the VitalQIP Message Service, in the same way that Alcatel-Lucent DHCP does. The VitalQIP Message Service then handles these messages according to the Message Routes. In this case, the MS-DHCP server should have a Message Route of type DHCP going to the QIP Update Service at the Enterprise server IP address. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 31 Figure 18: MS-DHCP client updates for MS-DNS secure zones Client DHCP Client Remote server MS DHCP VitalQIP MS DHCP Monitor Service Enterprise server VitalQIP Message Service Remote server VitalQIP SIP Update Service MS DNS VitalQIP database Getting MS-DHCP client hostnames into ALU DNS MS-DHCP can send DDNS updates directly to Alcatel-Lucent DNS, just as it can to MS-DNS. It is advantageous, however, to perform DNS updates after the Enterprise server has checked the names for duplicates and renamed DHCP hosts to avoid duplicates. MS-DHCP should have the DNSConfig options set so that it does not send dynamic updates. Instead, the VitalQIP MS DHCP Monitor Service sends the DHCP lease information to the QIP Update Service (via the Message Service), the QIP Update Service checks for duplicates, and then forwards the corrected names to the DNS Update Service, which can send DDNS updates to Alcatel-Lucent DNS. The flow of DHCP Client updates is shown below. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 32 Figure 19: MS-DHCP Client Updates for Alcatel-Lucent DNS Client DHCP Client MS DHCP Remote server VitalQIP MS DHCP Monitor Service Enterprise server VitalQIP Message Service VitalQIP SIP Update Service VitalQIP database VitalQIP DNS Update Service Remote server Lucent DNS Secure Zone Migrating MS-DHCP data to ALU DHCP Though VitalQIP can manage MS-DHCP – as explained above – few VitalQIP customers have chosen to do so. More commonly, customers replace the MS-DHCP servers with ALU DHCP – even if they continue to use MS-DNS. ALU DHCP has better integration with the other VitalQIP components, ALU DHCP offers better scalability and better features, and DHCP Generation to ALU DHCP is much easier and faster than DHCP Generation to MS-DHCP. The qip-msextract utility can be used to migrate MS-DHCP scopes and configurations to VitalQIP. See the Advanced DHCP Configuration chapter in the Administrator Reference Manual. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 33 VITALQIP MANAGEMENT OF SITES AND DOMAIN CONTROLLERS Overview Windows clients use Sites information from AD to find network services at their own location. A Site is an association of subnets that have an affinity to one another and low “ping times” between them. Sites and Subnet data can be seen in the Microsoft “Active Directory Sites and Services” GUI. VitalQIP is an IPAM that should already have complete information about all subnets. Subnet Organizations in VitalQIP are user-defined groupings of subnets. These can be used to correspond to AD Sites, and then VitalQIP is able to send that data to AD. Using VitalQIP to manage sites and subnets reduces the administrator workload, since data is now only entered in one place instead of two, thereby leveraging the power of VitalQIP and minimizing data entry errors. What is Domain Controller Generation? The Domain Controller Generation feature of VitalQIP pushes the assigned Subnet Organizations from VitalQIP to a Domain Controller. VitalQIP creates LDAP Data Interchange Format (LDIF) files to add, delete, or rename AD sites that correspond to Subnet Organizations in VitalQIP, and the subnets under each of them. It then connects directly to the Directory Services on the domain controller via the LDAP port, provides a username/password to the domain controller, and the domain controller processes the adds and deletes. Some customers prefer for VitalQIP to push out additions but not deletions. The VitalQIP policy Delete Sites/Subnets from Active Directory controls whether VitalQIP can delete sites and subnets in AD. domain controller Generation is a very different process from DNS Generation and DHCP Generation. The domain controller does not need a VitalQIP Remote service or any other VitalQIP components, and File Generation Service on the E/S is not involved. It is done with the “qip-sitegen” CLI command, or via the web GUI that invokes the CLI. Note that the Sites and Subnet data is just a small part of the AD database of a domain controller. Data replication between domain controllers Like other data in AD, Sites and Subnets are replicated between domain controllers. VitalQIP allows multiple domain controllers to be assigned to a Windows Site (Subnet Organization), but this should not be configured if the multiple domain controllers will replicate among themselves. Implementation 1.Have correct subnets in VitalQIP If subnets are listed in AD and not in VitalQIP, they can be migrated. Data about subnets and sites can easily be transferred from AD to VitalQIP using Microsoft’s LDIFDE utility, together with Alcatel-Lucent’s qip-siteimport utility. 2.Create the Domain Controller Profile in VitalQIP VitalQIP does not require a Remote Service to be installed on the domain controller, but it does need to know the correct IP address, LDAP port number and other Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 34 information. The username needs to be fully qualified, such as “CN=Administrator ,CN=Users,DC=company,DC=com”. This username/password must have suitable permissions in AD. Figure 20: Domain Controller profile in VitalQIP: 3.Have Subnet Organizations in VitalQIP that correspond to Windows Sites In VitalQIP, the term “Subnet Organization” is any grouping of subnets and it could be used for a few purposes. However, in this case, each Subnet Organization must correspond to a Windows Site. Each Subnet Organization has a Windows Site tab, which allows the Windows site to have a different name than the subnet organization, and also allows assignment of Domain Controllers. No subnet can belong to more than one Subnet Organization, but not all Subnet Organizations in VitalQIP need to be Windows Sites that are assigned to domain controllers. 4.Assign domain controllers to each Site (Subnet Organization) Finally, the domain controllers are associated with the appropriate Sites (that is, subnet organizations) in the Subnet Organization Profile’s Windows 2000 Site tab. Do not assign redundant domain controllers that already replicate between themselves; this could cause data inconsistencies. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 35 Figure 21: Assign just one domain controller to each Site if they have replication 5.Perform a Domain controller Generation Preview for All Sites and Subnets. Verify that the .ldf produced are correct, for all Sites that are assigned to that domain controller in VitalQIP, and all subnets within the corresponding Subnet Organization. 6.Perform Domain Controller Generation to server, for all sites and subnets. On the first push, the adds are expected to fail for those sites and subnets that already exist in AD 7.Perform subsequent pushes as Changed Sites and Subnets This type of push creates adds and deletes based on the VitalQIP database’s change flags of what was changed since the last push to that server. The Web Client User’s Guide has a chapter titled “Domain Controllers” which has the details of the above operations. Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 36 LDAP AUTHENTICATION CALLOUTS FROM VITALQIP TO ACTIVE DIRECTORY Another type of “Active Directory integration” is authenticating VitalQIP users against Windows usernames/passwords, which is based on AD Domain Controllers. When users login to the VitalQIP GUI or CLIs, they need to enter a username/password. Permissions in VitalQIP are determined by the username used. In a default VitalQIP configuration, a master administrator defines administrator accounts for other VitalQIP users, and assigns passwords at the time of each account’s creation. When the user logs into QIP, the username/password are checked against the VitalQIP database, and then the permissions are assigned accordingly. A few security policies such as expiration times and password reuse can be set in QIP, though security is not as extensive as in the Windows OS. However, it is also possible to configure VitalQIP to check passwords against AD domain controllers. The VitalQIP master admin still must create accounts in VitalQIP because permissions must be defined, but the passwords in VitalQIP are not used. Instead, the qip-ldapauth CLI is invoked when a user enters a username/password, and then the domain controller replies about whether or not the username/password is authenticated. Then the VitalQIP permissions are read. This way users don’t need to learn and maintain a separate username/password from the one that they already have for Windows, and the stronger password security of the Windows OS can be applied. Please refer to the Authenticate Administrator’s chapter of the VitalQIP Administrator Reference Manual for more details about setting this up. The follow diagram gives an overview of the components involved, including the qip.pcy, qip-ldapauth.pcy, and ApplicationContext.xml which have the configuration for it. Figure 22: LDAP Authentication Callouts from VitalQIP to Active Directory applicationcontext.xml Web GUI Tomcat qip-ldapauth.pcy Web CLIs qip.pcy qip-ldapauth Thick client qip-logind qip-ldapauth.log Old CLIs Integrating VitalQIP ® with Microsoft ® Windows™ Networking /Active Directory ALCATEL-LUCENT ENTERPRISE WHITE PAPER 37 Domain Controllers CONCLUSION VitalQIP offers powerful features for managing a Windows network. Many large organizations have various groups and components using various types of networks, DNS platforms, and DHCP platforms, usually including at least some groups that use MS Active Directory. VitalQIP is an ideal solution for tying it all together. www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2014 Alcatel-Lucent. All rights reserved. E2014014022EN (April)