MCSE Training Kit, Microsoft Windows 2000 Active Directory Services [Electronic resources]

Jill Spealman

نسخه متنی -صفحه : 113/ 26
نمايش فراداده

Lesson 1: Planning Active Directory Implementation

Active Directory provides methods for designing a directory structure that meet the needs of your organization. Before implementing Active Directory you must examine your organization's business structure and operations and plan the domain structure, domain namespace, OU structure, and site structure needed by your organization. With the flexibility of Active Directory, you can create the network structure that best fits your company's needs. This lesson walks you through the steps of planning an Active Directory implementation.

After this lesson, you will be able to

Plan a domain structure

Plan a domain namespace

Plan an OU structure

Plan a site structure

Estimated lesson time: 35 minutes

Planning a Domain Structure

Because the core unit of logical structure in Active Directory is the domain, which can store millions of objects, it is essential to plan the domain structure for your company carefully. When planning a domain structure, you must assess your company's

Logical and physical environment structure

Administrative requirements

Domain requirements

Domain organization needs

Assessing the Logical Environment

You must understand how your company conducts daily operations to determine the logical structure of your organization. Consider how the company operates functionally and geographically. For example, Figure 4.1 shows fictitious functional and geographical divisions for Microsoft. Functionally, Microsoft operates through its Administration, Purchasing, Sales, and Distribution departments. Geographically, Microsoft has offices in Kansas City, St. Paul, Chicago, and Columbus.

Figure 4.1 Functional and geographical divisions for Microsoft

Assessing the Physical Environment

By assessing your company's physical environment, you can determine the technical requirements for implementing Active Directory. Although you've already examined geographical locations, you must now consider your company's user and network requirements so you can determine the logical requirements for implementing Active Directory.

To assess user requirements, for each functional and geographical division determine

The number of employees

The growth rate

Plans for expansion

To assess network requirements, for each geographical division determine

How network connections are organized

Network connection speed

How network connections are utilized

TCP/IP subnets

For example, Figure 4.2 shows the physical environment for Microsoft. Employees are distributed fairly evenly among the four locations. However, among the functional divisions, more employees are employed in the Administration department. In the next five years, growth for all locations and all departments is estimated at 3 percent. The Chicago office is the hub of the Microsoft wide area network (WAN). Network connections are utilized moderately; however, the Kansas City-to-Chicago connection has a high degree of utilization.

Figure 4.2 Physical environment for Microsoft

Assessing Administrative Requirements

Assessing how your company's network resources are managed also helps you to plan your domain structure. Identify the method of network administration used by your company:

Centralized administration. A single administrative team provides network services. Smaller companies with fewer locations or business functions often use this method.

Decentralized administration. A number of administrators or administrative teams provide network services. Teams may be divided by location or business function.

Customized administration. The administration of some resources is centralized and it is decentralized for others, depending on business needs.

In the example, Microsoft requires decentralized administration methods. Each location requires its own team of administrators to provide network services for all four functional divisions.

After you've determined the logical and physical environment structure and the administrative requirements for your company, you can begin to determine the need for a domain in your organization.

Domain Requirements

The easiest domain structure to administer is a single domain. When planning, you should start with a single domain and only add domains when the single domain model no longer meets your needs.

One domain can span multiple sites and contain millions of objects. Keep in mind that site and domain structures are separate and flexible. A single domain can span multiple geographical sites, and a single site can include users and computers belonging to multiple domains. Planning your site structure is covered later in this lesson.

You do not need to create separate domains merely to reflect your company's organization of divisions and departments. Within each domain, you can model your organization's management hierarchy for delegation or administration using OUs for this purpose, which will act as logical containers for other objects. You can then assign group policy and place users, groups, and computers into the OUs. Planning OU structure is covered later in this lesson.

The following are some reasons to create more than one domain:

Decentralized network administration

Replication control

Different password requirements between organizations

Massive numbers of objects

Different Internet domain names

International requirements

Internal political requirements

In the example, Microsoft requires multiple domains for the following reasons:

Stricter password requirements exist at the Chicago office.

There is a need to control replication on the highly utilized Chicago-to-Kansas City network connection.

There are plans for adding a new office in Fargo, North Dakota within two years.

Assessing Domain Organization Needs

If you've determined that your company requires more than one domain, you must organize the domains into a hierarchy that fits the needs of your organization. You can arrange domains into a tree or a forest depending on the company's business needs. Recall that domains in trees and forests share the same configuration, schema, and global catalog. As domains are placed in a tree or forest hierarchy, the two-way transitive trust relationship allows the domains to share resources.

The primary difference between domain trees and forests is in their Domain Name Service (DNS) name structure. All domains in a domain tree have a contiguous DNS namespace. Unless your organization operates as a group of several entities, such as a partnership or conglomerate, your network probably lends itself to a contiguous DNS namespace, and you should set up multiple domains in a single domain tree. If you need to combine organizations with unique domain names, create a forest. You can also use a forest to separate DNS zones. Each tree in the forest has its own unique namespace.

In the example, the Microsoft organizational structure maps to a group of domains in a domain tree. Microsoft is not a part of any other entity, nor are there any known plans for creating multiple entities in the future.

Planning a Domain Namespace

In Windows 2000 Active Directory, domains are named with DNS names. But before you begin using DNS on your network, you must plan your DNS namespace. You must make some decisions about how you intend to use DNS naming and what goals you are trying to accomplish using DNS. For instance:

Have you previously chosen and registered a DNS domain name for use on the Internet?

Will your company's internal Active Directory namespace be the same or different from its external Internet namespace?

What naming requirements and guidelines must you follow when choosing DNS domain names?

Choosing a DNS Domain Name

When setting up DNS servers, it is recommended that you first choose and register a unique parent DNS name that can be used for hosting your organization on the Internet. For example, Microsoft uses microsoft.com. This name is a second-level domain within one of the top-level domains used on the Internet.

Before you decide on a parent DNS name for your organization to use on the Internet, perform a search to see if the name is already registered to another entity. The Internet DNS namespace is currently managed by Network Solutions, Inc., though other domain name registrars are also available.

Once you have chosen your parent DNS name, you can combine this name with a location or organizational name used within your organization to form other subdomain names. For example, a subdomain added to the Microsoft second-level domain might be chicago, forming the namespace chicago.microsoft.com.

Internal and External Namespaces

To implement Active Directory, there are two choices for namespace design. The Active Directory namespace can either be the same or separate from the established, registered DNS namespace.

Same Internal and External Namespaces

In this scenario, the company uses the same name for the internal and external namespaces as shown in Figure 4.3. Microsoft.com is used both inside and outside of the company. To implement this scenario, the following requirements must be met:

Users on the company's internal, private network must be able to access both internal and external servers (both sides of the firewall).

Clients accessing resources from the outside must not be able to access internal company resources or resolve names to protect company data.

Figure 4.3 Same internal and external namespaces

For this scenario to work, two separate DNS zones must exist. One zone will exist outside the firewall, providing name resolution for public resources. This zone is not configured to resolve internal resources, thereby making internal company resources nonaccessible to external clients.

The challenge in this configuration is making publicly available resources accessible to internal clients, as the external DNS zone is not configured to resolve internal resources. One suggestion is to duplicate the external zone on an internal DNS for internal clients to resolve resources. If a proxy server is being used, the proxy client should be configured to treat microsoft.com as an internal resource.

The advantages to using the same internal and external namespaces are as follows:

The tree name, microsoft.com, is consistent both on the internal private network and on the external public Internet.

This scenario extends the idea of a single logon name to the public Internet, allowing users to use the same logon name both internally and externally. For example, jsmith@microsoft.com would serve as both the logon and e-mail ID.

The disadvantages to using the same internal and external namespaces are as follows:

It results in a more complex proxy configuration. Proxy clients must be configured to know the difference between internal and external resources.

Care must be taken not to publish internal resources on the external public Internet.

There will be duplication of efforts in managing resources; for example, maintaining duplicate zone records for internal and external name resolution.

Even though the namespace is the same, users will get a different view of internal and external resources.

Separate Internal and External Namespaces

In this scenario, the company uses separate internal and external namespaces as shown in Figure 4.4. Basically, the names will be different on either side of the firewall. Microsoft.com is the name that is used outside the firewall and msn.com is the name used inside the firewall.

Figure 4.4 Separate internal and external namespaces

Separate names are used inside and outside the corporation. Microsoft.com is the name that the Internet community sees and uses. Msn.com is the name that the private network sees and uses. To do this, two namespaces must be registered with the Internet DNS. The purpose of registering both names is to prevent duplication of the internal name by another public network. If the name were not reserved, internal clients would not be able to distinguish between the internal name and the publicly registered DNS namespace.

Two zones will be established. One zone will resolve microsoft.com and the other DNS zone will resolve msn.com on the inside of the firewall. Users can clearly distinguish between internal and external resources.

The advantages to using the separate internal and external namespaces are as follows:

Based on different domain names, the difference between internal and external resources is clear.

There is no overlap or duplication of effort, resulting in a more easily managed environment.

Configuration of proxy clients is simpler because exclusion lists only need to contain microsoft.com when identifying external resources.

The disadvantages to using the separate internal and external namespaces are as follows:

Logon names are different from e-mail names. For example, John Smith would log on as jsmith@msn.com and his e-mail address would be jsmith@microsoft.com.

Multiple names must be registered with an Internet DNS.

NOTE In this scenario, logon names are different by default. An administrator can use the MMC to change the user principal name (UPN) suffix properties of users so that the user logon will match the user e-mail address. However, this requires additional intervention.

Domain Naming Requirements and Guidelines

When you plan your company's domain namespace, consider the following domain naming requirements and guidelines for root domains and subdomains:

Select a root domain name that will remain static. Changing a root domain name may be impossible or costly in the future.

Use simple names. Simple and precise domain names are easier for users to remember and they enable users to search intuitively for resources.

Use standard DNS characters and Unicode characters. Windows 2000 supports the following standard DNS characters: A-Z, a-z, 0-9, and the hyphen (-), as defined in Request for Comment (RFC) 1035. The Unicode character set includes additional characters not found in the American Standard Code for Information Exchange (ASCII) character set, which are required for some languages other than English.

NOTE Use Unicode characters only if all servers running DNS service in your environment support Unicode. For more information on the Unicode character set, read RFC 2044, by searching for RFC 2044 with your Web browser.

Limit the number of domain levels. Typically, DNS host entries should be three or four levels down the DNS hierarchy and no more than five levels down the hierarchy. Multiple levels increase administrative tasks.

Use unique names. Each subdomain must have a unique name within its parent domain to ensure that the name is unique throughout the DNS namespace.

Avoid lengthy domain names. Domain names can be up to 63 characters, including the periods. The total length of the name cannot exceed 255 characters. Case-sensitive naming is not supported.

Taking into account the logical, physical, and administrative requirements, as well as the need for domains and domain organization, Figure 4.5 shows the domain structure for Microsoft. The company's root domain, microsoft.com, contains subdomains for its four offices.

Figure 4.5 Microsoft domain structure and domain names

Planning an OU Structure

After you determine your company's domain structure and plan its domain namespace, you must plan its OU structure. You can create a hierarchy of OUs in a domain. In a single domain, organize users and resources by using a hierarchy of OUs to reflect the structure of the company. OUs allow you to model your organization in a meaningful and manageable way and to assign an appropriate local authority as administrator at any hierarchical level.

Each domain can implement its own OU hierarchy. If your enterprise contains several domains, you can create OU structures within each domain, independent of the structures in the other domains.

Consider creating an OU if you want to do the following:

Reflect your company's structure and organization within a domain. Without OUs, all users are maintained and displayed in a single list, regardless of a user's department, location, or role.

Delegate administrative control over network resources, but maintain the ability to manage them. You can grant administrative permissions to users or groups of users at the OU level.

Accommodate potential changes in your company's organizational structure. You can reorganize users between OUs easily, whereas reorganizing users between domains generally requires more time and effort.

Group objects to allow administrators to locate similar network resources easily, to simplify security, and to perform any administrative tasks. For example, you could group all user accounts for temporary employees into an OU called TempEmployees.

Restrict visibility of network resources in Active Directory. Users can view only the objects for which they have access.

Planning an OU Hierarchy

When planning an OU hierarchy, it's important to consider two main guidelines:

Although there are no restrictions on the depth of the OU hierarchy, a shallow hierarchy performs better than a deep one.

OUs should represent business structures that are not subject to change.

There are many ways to structure OUs for your company. It is important to determine what model will be used as a base for the OU hierarchy. Consider the following models for classifying OUs in the OU hierarchy:

Business function-based OUs can be created based on various business functions within the organization. A business function-based OU hierarchy for domain.com is shown in Figure 4.6. The top level of OUs—ADMIN, DEVELOPMENT (DEVEL), and SALES—corresponds to the company's business divisions. The second level of OUs represents the functional divisions within the business divisions.

Figure 4.6 A business function-based OU structure

Geographical-based OUs can be created based on the location of company offices. A geographical-based OU hierarchy for domain.com is shown in Figure 4.7. The top level of OUs—WEST, CENTRAL, and EAST—corresponds to the regions set up for the organization. The second level of OUs represents the physical locations of the company's eight offices.

Figure 4.7 A geographical-based OU structure

Business function and geographical-based OUs can be created based on both business function and the location of company offices. A business function and geographical-based OU hierarchy for domain.com is shown in Figure 4.8. The top level of OUs—NORTH AMERICA and EUROPE—corresponds to the continents on which the company has offices. The second level of OUs represents the functional divisions within the company.

Figure 4.8 A business and geographical-based OU structure

Planning a Site Structure

Recall that a site is part of the Active Directory physical structure and is a combination of one or more Internet Protocol (IP) subnets connected by a highly reliable and fast network connection. In Active Directory, site structure is concerned with the physical environment and is maintained separately from the logical environment, the domain structure. A single domain can include multiple sites, and a single site can include multiple domains or parts of multiple domains. The main role of a site is to provide good network connectivity.

The way in which you set up your sites affects Windows 2000 in two ways:

Workstation logon and authentication. When a user logs on, Windows 2000 will try to find a domain controller in the same site as the user's computer to service the user's logon request and subsequent requests for network information.

Directory replication. You can configure the schedule and path for replication of a domain's directory differently for inter-site replication, as opposed to replication within a site. Generally, you should set replication between sites to be less frequent than replication within a site.

Optimizing Workstation Logon Traffic

When planning sites, consider which domain controller(s) the workstations on a given subnet should use. To have a particular workstation only log on to a specific set of domain controllers, define the sites so that only those domain controllers are in the same subnet as that workstation.

Optimizing Directory Replication

When planning sites, consider where the domain controllers and the network connections between the domain controllers will be located. Because each domain controller must participate in directory replication with the other domain controllers in its domain, configure sites so that replication occurs at times and intervals that will not interfere with network performance. Consider establishing a bridgehead server to provide criteria for choosing which domain controller should be preferred as the recipient for inter-site replication.

Designing a Site Structure

Designing a site structure for a network that consists of a single local area network (LAN) is simple. Because local area connections are typically fast, the entire network can be a single site. Establish a separate site with its own domain controllers when you feel domain controllers are not responding fast enough to meet the needs of your users. Determining what is fast enough depends on your criteria for network performance. Inadequate performance is more common when deployments span a wide geographic range. Other inadequacies may be attributed to poor network design and implementation.

Follow these steps to design a site structure for an organization with multiple physical locations:

Assess the physical environment. Review the information you gathered when determining domain structure, including site locations, network speed, how network connections are organized, network connection speed, how network connections are utilized, and TCP/IP subnets.

Determine the physical locations that form domains. Determine which physical locations are involved in each domain.

Determine which areas of the network should be sites. If the network area requires workstation logon controls or directory replication, the area should be set up as a site.

Identify the physical links connecting sites. Identify the link types, speeds, and utilization that exist so the links can be determined as site link objects. A site link object contains the schedule that determines when replication can occur between the sites that it connects.

For each site link object, determine the cost and schedule. The lowest cost site link performs replication; determine the priority of each link by setting the cost (default cost is 100; lower cost provides a higher priority). Replication occurs every 3 hours by default; set the schedule according to your needs.

Provide redundancy by configuring a site link bridge. A site link bridge provides fault tolerance for replication.

NOTE For detailed information on configuring sites and inter-site replication, see Chapter 6, "Configuring Sites."

Lesson Summary

In this lesson you learned that before implementing Active Directory you must examine your organization's business structure and operations and plan the domain structure, domain namespace, OU structure, and site structure needed by your organization.

When planning a domain structure, you must assess your company's logical and physical environment structure, administrative requirements, need for multiple domains, and domain organization needs.

You also learned that you must make some decisions about how you intend to use DNS naming, including the use of previously chosen DNS domain names, and whether your company's internal Active Directory namespace will be the same or different from its external Internet namespace. You learned the naming requirements and guidelines you must follow when choosing DNS domain names.

You learned how OUs allow you to model your organization in a meaningful and manageable way and assign an appropriate local authority as administrator at any hierarchical level. You explored various ways to structure OUs for your company.

Finally, you learned how setting up sites affects Windows 2000 workstation logon traffic and directory replication. You learned about the steps necessary to design a site structure for an organization with multiple physical locations.