Hi Mike,

 

I think you’re going to have some more fun than you’re planning, particularly with the DCs.

 

I’m not entirely sure what this member server is hosting a secondary zone of. I do understand that whatever it is, is good DNS and that’s what you want. There is no need to promote this member server to a DC in order to AD integrate it, given a little bit of handy work. Does this secondary server have a zone with the same name as what’s in AD now? If so, delete whatever’s in AD, let that replicate. Setup the secondary member server to allow zone transfers to one of your DCs, one which is well connected to the DNS server is good, and convert the zone on the member server to a primary. On the DC, set it up as a secondary to this new zone. Transfer the zone; make sure it’s a good copy. Convert this newly transferred zone to a primary zone, hit the AD integrate button. Make sure dynamic updates are on as well, secure only is usually a good choice here.

 

Now at this point, since you’ve blown away AD DNS, your replication and logon traffic is busted to say the least. If you haven’t already, point the DC to itself for primary DNS. Do an ipconfig /registerdns, and then a net stop netlogon/net start netlogon. This *should* get the DC reregistered in DNS right. Sometimes it takes a reboot or two. At this point, you can point the other DCs at this first one for DNS and do the same ipconfig /registerdns and stop/start netlogon. THye should pick up the new DNS, replicate right – might take a reboot or two.

 

Finally, you can remove the 127.0.0.1 primary DNS from your first DC in this circus and point it at another one. Once you’ve got all your ducks in a row here, do a netdiag and dcdiag on each DC and see what’s cooking. Give them time to do a replication cycle or two and pickup anything from before you started this. I’d do this all at night during your maintenance window as logon traffic, Exchange, others will be totally broke. People may need to restart computers in the morning.

 

I’m not sure I understand where your BIND DNS, and other stuff comes in here, but you’ll need to ensure that if clients point to them, they (the DNS servers) point back to AD. Other solution is to just throw them out and use your AD DNS to resolve internal and external.

 

Now, I think this would work. It certainly seems like it would wherever my mind is at 11:15PM.

 

 

Thanks.

 

--Brian Desmond

[EMAIL PROTECTED]

Payton on the web! www.wpcp.org

 

v - 773.534.0034 x135

f - 773.534.8101

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mike Hogenauer
Sent: Friday, December 17, 2004 9:50 AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Deleting AD DNS zones

 

I’ve just inherited 3 AD controllers and the DNS in just a mess, some clients point to External Bind Cache servers and there are 2 zones in MS DNS that are used for intern resolution with half the resources in one zone and half in the other, I’ve build another Member server just running DNS and have allowed zone transfers and I think I have it all running correctly now on the new server. Does anyone know or see a problem with pointing the current AD integrated ones to the new Secondary server for resolution then deleting the current AD integrated Zones and then promoting the new secondary server to a DC, then change the DNS on that server to AD integrated and let it populate to the rest of the domain controllers?

 

All servers are windows 2003. All Bind Servers are 9.0.

 

Thanks in advance

 

Mike

 

Mike Hogenauer

[EMAIL PROTECTED]

Rendition Networks, Inc.

10735 Willows Rd NE, Suite 150

Redmond, WA 98052

425.636.2115 | Fax: 425.497.1149

 

Reply via email to