Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Dynamic DNS update from Linux DHCP Server

Posted on 2009-07-07
1
Medium Priority
?
1,033 Views
Last Modified: 2012-05-07
We have our primary DNS & DHCP servers running on linux. we also having active directory in our company. we have enabled zone forwarding on our linux dns server to point out the active directory DNS server. Also i have enabled scavenging on active directory integrated DNS servers.

In our company machines are frequently changed to different subnets and we change the hostnames too.so we do have duplicate entries in our active directory integrated DNS server. it will take 15 day to scavange these records. I don't want to reduce the default scavange period time.


Is there is any way to configure dynamically update DNS records in the Linux DHCP servers.so that when ever a new ip address assigned to a computer from Linux DHCP server same will be updated automatically in the Active Directory Integerated DNS zone.
0
Comment
Question by:kumarnirmal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Duncan Roe earned 2000 total points
ID: 24799110
Certainly you can have DHCP update DNS - I have that here at home (and subsequently cloned at work). In my etc/named.conf below. The critical entries for dynamic updating are the "allow-update" lines. Not sure why I don't have them for reverse-ARP, must check if it's working one of these days. There's a matching ddns-update-style entry in my /etc/dhcpd.conf.
How active directory would integrate with the above I have no idea
08:17:50$ cat named.conf
acl "locals" { 10.255.255.0/24; 192.168.0.0/24; 127.0.0.0/8; };
options {
  directory "/var/named";
  forward only;
  forwarders { 198.142.0.51; 203.2.75.132; };
  allow-transfer { none; };
  allow-query { "locals"; };
  allow-recursion { "locals"; };
};
 
zone "mshome.net" IN {
  type master;
  file "mshome.net";
  forwarders { };
  allow-query { "locals"; };
  allow-transfer { "locals"; };
  allow-update { 192.168.0.120; };
};
zone "0.168.192.in-addr.arpa" IN {
  type master;
  file "ten.emohsm";
  forwarders { };
  allow-query { "locals"; };
  allow-transfer { "locals"; };
  allow-update { 192.168.0.120; };
};
zone "local.net" IN {
  type master;
  file "local.net";
  forwarders { };
  allow-query { "locals"; };
};
zone "255.255.10.in-addr.arpa" IN {
  type master;
  file "ten.lacol";
  forwarders { };
  allow-query { "locals"; };
};
 
===============================
 
08:22:20$ cat dhcpd.conf
option domain-name "mshome.net";
option domain-name-servers 127.0.0.1;
ddns-update-style interim;
ignore client-updates;
 
subnet 192.168.0.0 netmask 255.255.255.0
{
  range 192.168.0.1   192.168.0.119;
  range 192.168.0.121 192.168.0.254;
  max-lease-time 2592000;
  default-lease-time 604800;
  option subnet-mask 255.255.255.0;
  option broadcast-address 192.168.0.255;
  option routers 192.168.0.120;
  option domain-name-servers 192.168.0.120;
}

Open in new window

0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question