Solved

Configuring DNS server on server2k

Posted on 2004-09-03
3
167 Views
Last Modified: 2010-04-14
Hi, in my home lab I'm running a DNS proxy (windows 2000 server machine). All of my PC's are querying the DNS proxy which in turn querys my ISP's DNS.


While watching some traffic, I noticed that a few of my clients were communicating with my ISPs DNS server directly. Something i wanted to avoid (just for testing purposes).  What setting changes this?

Also, what are some other good settings to configure under the Advanced Tab? I have everything set up default pretty much (apart from entering my ISP's DNS server in the forwarder section).
I noticed "round robin etc.." can someone explain the different features and settings to configure or provide a nice link?

Thanks
0
Comment
Question by:dissolved
  • 2
3 Comments
 
LVL 15

Expert Comment

by:adamdrayer
Comment Utility
on the clients, run "ipconfig /all"  This will tell you what DNS servers your clients are configured to use.  To accomplish want you want, they should only be using your internal DNS server.  If you are using DHCP, you can modify the DNS servers that are handed out during the automatic configuration
0
 

Author Comment

by:dissolved
Comment Utility
Yea, they are set to autoconfig and are pulling info from the DHCP server. I found the setting. You have to check "only use this DNS server"

Any help on my other question though? What are some good things to configure in the Advanced Tab of the DNS ?
0
 
LVL 15

Accepted Solution

by:
adamdrayer earned 500 total points
Comment Utility
Well I believe that round robin is this:

if you have multiple webservers that are serving the same page, you can create multiple DNS entries for it, and the DNS server will resolve the first request to the first IP address, then the next request to the next one, etc...

basically, you can configure load balancing so that 100 computers requesting pages from 4 identical servers would be directed so that 25 computers would be using each server (obviously this is theoretical in nature.  It won't be that perfect)
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now