Solved

enabling AD replication via IPsec on existing domain controllers

Posted on 2010-08-19
6
2,474 Views
Last Modified: 2012-05-10
I have an existing AD domain with numerous sites.  Currently, we are allowing AD replication through the firewalls with the "swiss cheese" method, allowing RPC, etc.  To trim this down, we would like to start using IPsec encapsulation for AD replication between DCs.  I'm currently following this article:

http://technet.microsoft.com/en-us/library/bb727063.aspx

There is one discrepancy in that article that is troubling me, however.  It says that I need to go to:
Start | Programs | Administrative Tools | Local Security Policy

However, this is not available on a domain controller.  I only have 'Domain Security Policy' and 'Domain Controller Security Policy'.  If I start defining ipsec policies using the 'Domain Controller Security Policy' link instead of 'Local Security Policy', won't those policies get replicated to all DCs?  Will that be an issue?

Ideally, I'd like to enable ipsec on certain DCs as a test, and roll it out to other DCs as I verify it's working.  I don't want to do a global ipsec configuration and activate it on every DC simultaneously.
0
Comment
Question by:NetAdSubs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 6

Expert Comment

by:craig_j_Lawrence
ID: 33481273
A little more information please, what OS are you running on your domain controllers? The article listed applies to Windows 2000, I would use this article as well http://support.microsoft.com/kb/816514 if running windows 2003.

I would strongly recommend that you create a test domain with domain controllers on different sites to test this, rather than on your production domain

Hope this helps
0
 

Author Comment

by:NetAdSubs
ID: 33481471
I apologize; I meant to include that info.  We are running Windows 2003 DCs in all sites.

I was indeed considering setting up a test domain, but we are limited on resources and time, so I was hoping to get some answers from the experts here first.  For what it's worth, we do already have a test domain up and running for a different project, but it's running Windows 2008R2 DCs.  I could certainly set up ipsec between those DCs, but I'm not sure how Windows 2003's ipsec functionality compares to 2008R2's.

Regarding the article you linked, that looks like it involves setting up an ipsec tunnel.  It was my understanding that with AD replication via ipsec (as discussed in the article I linked), you're not actually creating a tunnel, but rather just encapsulating your replication traffic inside of ipsec packets.
0
 
LVL 6

Expert Comment

by:craig_j_Lawrence
ID: 33481568
I was point out the secpol.msc tool, rather than how to set up a tunnel.

If you follow your original article, you shoul dbe fine. just be aware that as soon as you set up ipsec for replication to test, the other domain controllers will not be able to replicate to those DCs until you either diable IPSEC encapsulation or enable it everywhere

Hope this helps
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 7

Assisted Solution

by:CGretski
CGretski earned 100 total points
ID: 33483465
Just a word of warning setting IPSEC on DC communication via policy.

If you set group policy on one DC that it needs IPSEC for all communications with other DCs all communication between DCs will stop until they start using the same IPSEC settings

Because there's no communication replication won't work, so the other DCs will never get the new policy telling them to use IPSEC.

Your domain is now broken.

A possible work around is forcibly disabling the IPSEC service on windows, which will cause them to ignore IPSEC, talk clear-text until replication is complete,  then re-enable the service

Alternatively create the IPSEC policy so it only applies to certain source/destination IPs, to only 1 pair of domain controllers at a time.  That way (assuming you have more than 2 DCs) the policy could replicate indirectly via the non-IPSEC DCs
0
 
LVL 6

Accepted Solution

by:
craig_j_Lawrence earned 150 total points
ID: 33483497
Thanks for your input, I agree that applying ipsec settings via group policy is not a good idea, as you stated. I would definitely apply settings to 2 domain controllers via secpol.msc and ensure that the configuration is filtered via ip address
0
 

Author Comment

by:NetAdSubs
ID: 33487721
Thank you very much for the info.  The file secpol.msc is what I was looking for.  That pulls up the "Local Security Settings," which is exactly what I'm after.  I was wary of applying this via a group policy for the reasons you both mentioned.  Being able to apply it to one machine at a time is much preferable.  I wasn't aware that secpol.msc was still available on a DC, since the shortcut gets removed from the Administrative Tools menu when you promote a machine to a DC.  I had always just assumed that was something you just couldn't do on a DC.

Any idea why the shortcut gets removed?  Seems like there are still valid uses for it, even on a DC.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question