Active Directory™ (AD) is a distributed directory service that authenticates network users and — by working with DHCP and DNS — provides the location of and authorizes access to services running on devices in a Windows® network.
You can integrate a NIOS appliance providing DHCP and DNS services with servers running Windows 2000 Server, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 with the Active Directory service installed. Assuming that you already have AD set up and it is currently in use, you can migrate DHCP and DNS services away from internal operations on the AD domain controller or from other third party DHCP and DNS systems to NIOS appliances that serve DHCP and DNS.
A NIOS appliance providing DHCP and DNS services to an AD environment can send and receive DDNS updates. In addition, a NIOS appliance can use GSS-TSIG (Generic Security Service-Transaction Signatures) authentication for DDNS updates. The basic DHCP, AD, and DNS services are shown in bookmark1964.
Figure 21.5 DHCP, Active Directory, and DNS
Sending DDNS Updates to a DNS Server
You can configure an Infoblox DHCP server to send unauthenticated or GSS-TSIG-authenticated DDNS updates to a DNS server in an AD domain. There are no special configurations to consider when configuring a NIOS appliance to send unauthenticated DDNS updates to the DNS server. (For information about configuring DHCP, see Chapter 26, Configuring DHCP Properties, and for information on configuring the DHCP server to send DDNS updates, see Configuring DHCP for DDNS.) For information about configuring a DHCP server to send GSS-TSIG authenticated updates, see About GSS-TSIG .
This page has no comments.