Solved

What is the best way to set up a redundant DHCP server on a second DC in a domain?

Posted on 2006-10-25
4
760 Views
Last Modified: 2013-12-23
I use W2K server and just setup a secondary DC.  I believe I can simply add DNS to it for redundancy but I would also like to add a redundant DHCP server.  My current DHCP server issues IP address to 10.1.1.100 through 10.1.1.254 subnet 255.255.255.0 with reservations 1-100

I am looking for the easiest possible way to do this.  Thanks
0
Comment
Question by:chitchcock
  • 2
  • 2
4 Comments
 
LVL 30

Accepted Solution

by:
Gareth Gudger earned 500 total points
ID: 17804727
Microsoft typically recommends a 80 / 20 lease split in your scope. Personally I have never quite understood there mentality behind this as this could still mean incomplete redundancy in my book.

The question I have to ask...how many hosts are using up those 154 IP addresses? If you only have say 50 hosts then I would configure one server with a lease range of 10.1.1.100 - 10.1.1.175 and the other as 10.1.1.176 - 10.1.1.254.

You don't want the scopes to overlap from each server or you might be handing out duplicate IPs. Ultimately you are creating the same exact scope on each server, with the same scope options (DNS server IP address etc) but you are going to reserve the block 10.1.1.100 - 10.1.1.175 on one and 10.1.1.176 - 10.1.1.254 on the other.
0
 

Author Comment

by:chitchcock
ID: 17804980
I have about 110 users accessing this segment.  So all I would need to do is enable DHCP on server 2, create a scope different then scope on server 1.  Or do I just set exlusion ranges on each that won't interfere with each other?  DHCP discovery by clients will just get the first handed to them but both will update DDNS automagically?
0
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 17808352
Yep. Create the same scope and set exclusions on each. In your case I guess the 80 / 20 IP scheme would work :D

You may also want to consider expanding your 10.x subnet so you can have total redundancy.
0
 

Author Comment

by:chitchcock
ID: 17808469
thanks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now