Solved

Windows 2008 R2 cluster static or dynamically assigned IP addresses?

Posted on 2013-01-29
2
970 Views
Last Modified: 2013-01-31
Windows 2008 clustering introduces the ability to use dynamically assigned IP addresses for the server nodes, whereas Windows 2003 required statically configured IP addresses.  I can think of several reasons why this would be beneficial.  For example, if I needed to change the primary DNS server address, I could change it in DHCP and avoid having to change it manually on potentially hundreds of cluster nodes throught our enterprise.  In most cases, dynamic is better than static when managing a large enterprise.

Can anyone think of any disadvantages or problems with configuring cluster nodes and cluster names with dynamically assigned addresses?  I still create reservations in DHCP for the resources so that they don't change and to avoid IP address conflicts.  The only potential disadvantage I can think of would be if there was a failure of DHCP.  We have a high availability solution for DHCP to help mediate this risk.  Am I missing anything?
0
Comment
Question by:davestarcher
2 Comments
 
LVL 5

Assisted Solution

by:albert_miquel
albert_miquel earned 250 total points
ID: 38832550
The only thing that it will be a trouble is if you change ip clusterand nodes ,you can have some DnS replication problem , if you don't change ips you won't have this problem
0
 
LVL 36

Accepted Solution

by:
ArneLovius earned 250 total points
ID: 38833727
The only issue is somebody introducing a device with the same MAC address to the network, if however your servers are on a protected network in a different VLAN to accessible network ports, then this risk is minimized.

For your DNS server issue, you can script DNS server all NIC address configuration with netsh.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Scenario:  You do full backups to a internal hard drive in either product (SBS or Server 2008).  All goes well for a very long time.  One day, backups begin to fail with a message that the disk is full.  Your disk contains many, many more backups th…
I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now