Solved

recommend trusted domains?

Posted on 2006-11-20
2
259 Views
Last Modified: 2013-12-23
Here is my setup:

Datacenter (remote location):
Exchange 2003 Server/Domain Controller (configured) (DomainA)
Web Server (configured)
SQL Server (configured)


Corporate Office (local):
Domain Controller (not yet configured)
2nd Domain Controller (not yet configured)
File Server
File Server


We have a dedicated 3Mbit connection from the corporate office to the datacenter.

I would like to get all of my users on a domain.  Should I just use the domain (DomainA) that is currently in the datacenter and add DCs to my corporate location and allow them to communicate through the 3Mbit connection?  Or should I look into a trusted domain scenario?  What would be the pros/cons of either setup?


0
Comment
Question by:ryandale56
2 Comments
 
LVL 37

Accepted Solution

by:
bbao earned 500 total points
ID: 17992144
i think you can use one domain model with your broadband connecting the two sites. it seems that you know well about how to setup the systems. so what i recommend is only that you better establish a VPN connection over your broadband link, then you can treat the two subnets for local and remote sites as two local ones.

hope it helps,
bbao
0
 
LVL 6

Author Comment

by:ryandale56
ID: 17999938
sounds good to me, single domain it is!  thanks bbao.
0

Featured Post

Don't miss ATEN at NAB Show April 24-27!

Visit ATEN at NAB Show to learn how our "Seamlessly Entertaining" solutions deliver fast, precise video streaming without delays for the broadcasting and media environment. ATEN will showcase its 16x16 Modular Matrix Switch (VM1600) and KVM Over IP Solution (KE6900 series).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Domain Share problems 5 64
Issue with  IP address/conflict 10 109
Windows Remote Desktop Connection - changing default port. 6 64
Changing Lease Duration for DHCP clients 34 70
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question