Solved

PDC and BDC DNS

Posted on 2006-11-08
3
791 Views
Last Modified: 2012-06-27
I have a PDC and a BDC. I have AD and DNS installed on PDC. I have AD installed on BDC.

Do I need DNS installed on BDC also?

I'm having DNS problems!

Thanks,

Lee.
0
Comment
Question by:LeeGolding
  • 2
3 Comments
 
LVL 70

Accepted Solution

by:
Chris Dent earned 125 total points
Comment Utility

Hi Lee,

PDCs and BDCs don't exist in AD you know (someone is bound to say it even if I don't), everything is equal and while the FSMO roles are more equal than others those can be very easily moved around.

Anyway, it would be a good idea to install it on your second DC as it gives you some resilience in your DNS System should the first DC go down. Provided the Zone on the first DNS Server is configured as AD Integrated then all you have to do is install the DNS Service on the second and give it a couple of minutes to replicate.

All that leaves is configuring everywhere to use it as an Alternate DNS Server in TCP/IP configuration, easy enough if you're using DHCP of course.

If you haven't already, it would be a good idea to ensure that your second DC is also a Global Catalog, that's done through AD Sites and Services, your Site, Servers, second DC then the Properties for NTDS Settings. Just tick the box.

HTH

Chris
0
 

Author Comment

by:LeeGolding
Comment Utility
Hi Chris,

I could install DNS on the BDC (second domain controller lol).

But I can't explore the PDC from BDC in windows explorer for example, or access its shares. On the BDC I'm getting netlogon problems, etc. And have some replication problems.

Would installing DNS cause any problems? I'm very tempted to demote the BDC and remove everything from the AD on PDC.


Lee.
0
 
LVL 70

Expert Comment

by:Chris Dent
Comment Utility

It's not likely to cause any problems, but unfortunately it's not likely to resolve any. The problems in your other thread need fixing before anything here will help.

Chris
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

by Batuhan Cetin In this article I will be guiding through the process of removing a failed DC metadata from Active Directory (hereafter, AD) using the ntdsutil tool in a Windows Server 2003 environment. These steps are not necessary in a Win…
Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now