Solved

Mysterious case of DNS not getting entry update from DHCP for non Windows machine.

Posted on 2010-11-22
8
383 Views
Last Modified: 2012-05-10
Hi,

I'm having mysterious issue that confused me for such a long time till now, I've got one DC which acted as DNS and DHCP as well. I'm using Windows Server 2003 R2 SP2 64 bit AD integrated for both DNS and DHCP server.

However it is successfully giving out IP address to all IP enabled device and machine but when updating the DNS entry, only the Windows machine (workstations and server) gets their IP registered in the DNS server, therefore i cannot ping and access the other Linux machine apart from using IP address only.

restarting the DNS (plus RELOAD the entry) and DHCP services doesn't help at all and also entering the DHCP assigned IP address into the DNS server caused more problem since the address is assigned to different host already by DHCP but not gets updated in the DNS server (only to non-windows machine).

If anyone know how to diagnose and help me solve this problem that'd be very great helps.

Thanks.
0
Comment
Question by:jjoz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
  • 2
8 Comments
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 250 total points
ID: 34187939
Go to the Properties of the DNS zone make sure you have non-secure updates for DNS updates
0
 
LVL 1

Author Comment

by:jjoz
ID: 34187979
"non-secure updates" --> does this applies to the workstation or to the other DNS server type eg. BIND server ?
0
 
LVL 1

Author Comment

by:jjoz
ID: 34188023
ok, I've changed the Dynamic Updates into "Nonsecure and secure" is that what you mean ?
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 34188035
Yes, that is what I mean this allows non windows clients to update
0
 
LVL 71

Assisted Solution

by:Chris Dent
Chris Dent earned 250 total points
ID: 34188948

If DHCP is updating DNS the updates (all updates) are Secure and the client will not be permitted to update DNS directly. If that is the case, please re-enable secure updates.

However:

If your client does not have a DNS Suffix the record has no where in DNS to go. All clients must have a DNS Suffix listed in DHCP matching your Forward Lookup Zone name or they will not register.

Chris
0
 
LVL 1

Author Comment

by:jjoz
ID: 34193562
ah... you could be right Chris, "All clients must have a DNS Suffix listed in DHCP matching"
so in this case when I name the non Windows machine i must put FFQDN eg. newLinux.domain.com ?

apart from changing the Dynamic Updates into "Nonsecure and secure" mode ?
0
 
LVL 71

Expert Comment

by:Chris Dent
ID: 34195057

Yep, that's right.

Then DHCP will post the full name into DNS for you (allowing you to continue using Secure Updates).

Chris
0
 
LVL 1

Author Closing Comment

by:jjoz
ID: 34195261
thanks man for your reply.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question