Adding extended perimeter network to existing domain

I had this question after viewing Advice on fixing AD replication.

So after everyone helped me resolve my replication tweak, I would appreciate some advice on my next task- creating a RODC on an extended perimeter network.

I need to create a new RODC on a new subnet that will be part of our existing domain. It will be a new "DMZ" site in ADSS. It will be located in the same colocation facility as my "VPN" site. My plan is to create a site link b/t the "DMZ" and "VPN" sites so the RODC only communicates with the local writable DC in the subnet closest to it.

I'm reading through all the TechNet guides now on all the various tasks to do (firewall rules, password policies, filtered attribute set).

I've created a server-core install of W2K12.

If anyone has any advice on their favorite doc that walks me through the details for this scenario, that would be greatly appreciated. TechNet is lacking on the details sometimes
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Krzysztof PytkoSenior Active Directory EngineerCommented:
OK, these 2 documents would be your friends for couple of days ;)

First one is about good practices to deploy RODC in DMZ

the second one is about securing replication between RODC from DMZ to your network by limiting dynamic ports range

You should avoid situation which allows to have all dynamic ports opened in perimeter network, for security reasons.

and of course also very important topic, setting up Site for RODC, defining Subnet(s) and connecting it to other Site(s). Please also take a look at this article explaining the topic about Sites, Subnets and Site links at

If you would have more questions, do not hesitate to ask.


Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
RhoSysAdminAuthor Commented:
So you were right. You have to take your time reading through these. I'm only through the first "design" doc now.

I have a bit of a chicken and egg situation. Our domain and forest functional levels are still at 2003 b/t we needed to hold on to a W2K3 DC for an old Exchange 2003 instance. That restriction is no longer in place. Should I replace that W2K3 DC first before adding the RODC, and up the domain and forest functional levels to 2008?

Our other DC's are 2008 already. The RODC will not rely on the W2K3 DC, but on one, and only one, of the W2K8 DC's. I already have this particular writable DC in its own site, so I can setup the proper site link with just the one DC and the RODC.

I also have questions about DNS, but will withhold my questions to a single file formation.

RhoSysAdminAuthor Commented:
Follow-up question: it looks like the cloud based servers just need to be able to do secure LDAP queries to our global catalog - i.e. the RODC we setup in the perimeter network. Does this change anyone's opinion on what to setup?
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.