Solved

RODC Build and Deployment

Posted on 2014-12-05
3
90 Views
Last Modified: 2014-12-15
Hello All,

I have a remote site with poor ADSL link.  Users currently have severe issues authentication against Head Office DC's.  I am looking to place an RODC on site - there are only 10 users so will place them in the RODC password cache.  My question is regarding the build.

I was looking to build and promote on site - is it acceptable to change IP and Gateway l before shipping? I think that the DC will struggle to pull an major sync.

I don't want to change site configuration until the server is actually resident on site - anyone see any problem with this?

I will be setting Universal Caching

Is there anything else I should note?

0
Comment
Question by:BYRONJACKSON
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 37

Accepted Solution

by:
Neil Russell earned 500 total points
ID: 40483235
It is standard practice to set up on site, set the IP details after you finish a sync, to what the new site will be using, shut down and then ship.  You should configure sites and services correctly before the final sync .

Nothing wrong with that at all, your plan is normal.
0
 

Author Comment

by:BYRONJACKSON
ID: 40483368
On syncing - am I right is saying avoid SMTP?  I remember reading that it will only partially sync?  ISTG will deal with the replication to KCC? can I schedule replication and what is the standard replication between sites - 180 minutes?
0
 

Author Closing Comment

by:BYRONJACKSON
ID: 40500775
Confirmation was all I required - thank you. Helped me a lot
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will review the basic installation and configuration for Windows Software Update Services (WSUS) in a Windows 2012 R2 environment.  WSUS is a Microsoft tool that allows administrators to manage and control updates to be approved and ins…
I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and …
In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question