Adding Windows DNS-DHCP servers

Adding Windows DNS-DHCP servers

 

Note: PowerShell version 5.1.2 or higher is required for a successful setup. Ensure that Windows Remote Management services are running on the Windows DNS and DHCP servers you plan to onboard into DDI Central's Management UI Console.

 

Step-by-step guide to enable WinRM HTTP on DNS-DHCP server

  1. Enabling WinRM

    Run the following command below:

    winrm quickconfig
  2. Modifying Ideal Timeout and Connection Parameters

    Run the following command below:

    winrm set winrm/config/service '@{MaxConnections="2000"}'
    winrm set winrm/config/service '@{MaxConcurrentOperationsPerUser="2000"}'
    winrm set winrm/config/winrs '@{IdleTimeout="900000"}'
  3. Enabling Authentication

    1. Basic Authentication:

    Description: Sends the username and password in plain text (Base64 encoded). Requires a secure channel (e.g., HTTPS) to protect the credentials during transmission.

    Setup:

    winrm set winrm/config/service/auth '@{Basic="true"}'

    2. CredSSP (Credential Security Support Provider):

    Description:  Enables delegation of user credentials from the client to the target server, allowing the server to access network resources on behalf of the user.

    Setup:

    Enable-WSManCredSSP -Role "Server"

    3. Negotiate:

    Description: Uses either Kerberos or NTLM for authentication, automatically selecting the most secure protocol supported by both the client and server.

    Setup:

    winrm set winrm/config/service/auth '@{Negotiate="true"}'
  4. Setting up the Windows Remote Machine:

    1. Enable unencrypted Communication:

    winrm set winrm/config/service '@{AllowUnencrypted="True"}'

    2. Configure Trusted Hosts:

    winrm set winrm/config /client '@{TrustedHosts="ip_address"}'

    Note: Enter the IP address of the host running the DDI Central Console for WinRM to treat it as a trusted host.


    3. Restarting the WinRM Service

    Restart-Service WinRM
  5. Inspecting WinRM listener configuration for remote management readiness


    By reviewing the listener details, administrators can ensure that the correct addresses and ports are being used and check for any misconfigurations that may block remote access or cause connectivity issues.

    Execute the command as shown below to ensure that the WinRM service is properly configured and enabled, which is necessary for remote management, especially while using PowerShell remoting.

    winrm enumerate winrm/config/listener

Step-by-step guide to enable WinRM HTTPS on DNS-DHCP server

  1. Modifying Ideal Timeout and Connection Parameters

    Run the following command below:

    winrm set winrm/config/service '@{MaxConnections="2000"}'
    winrm set winrm/config/service '@{MaxConcurrentOperationsPerUser="2000"}'
    winrm set winrm/config/winrs '@{IdleTimeout="900000"}'
  2. Enabling Authentication

    1. Basic Authentication:

    Description: Sends the username and password in plain text (Base64 encoded). Requires a secure channel (e.g., HTTPS) to protect the credentials during transmission.

    Setup:

    winrm set winrm/config/service/auth '@{Basic="true"}'

    2. CredSSP (Credential Security Support Provider):

    Description:  Enables delegation of user credentials from the client to the target server, allowing the server to access network resources on behalf of the user.

    Setup:

    Enable -WSManCredSSP -Role "Server"

    3. Negotiate:

    Description: Uses either Kerberos or NTLM for authentication, automatically selecting the most secure protocol supported by both the client and server.

    Setup:

    winrm set winrm/config/service/auth '@{Negotiate="true"}'
  3. Setting up the Windows Remote Machine:

    1. Enable encrypted Communication:

    winrm set winrm/config/service '@{AllowUnencrypted="False"}'

    2. Configure Trusted Hosts:

    winrm set winrm/config /client '@{TrustedHosts="ip_address"}'

    Note: Enter the IP address of the host running the DDI Central Console for WinRM to treat it as a trusted host.

    3. Restarting the WinRM Service:

    Restart-Service WinRM
  4. Verifying the valid server certificate

    Ensure that the Windows DNS/DHCP server has a valid server certificate installed. If you already have a valid certificate, follow the steps below.

    If not, generate a valid certificate and get it installed. To verify the installation of a valid certificate, refer to the screenshot below:

    Execute the command below, as demonstrated in the screenshot below.


    Get-ChildItem -Path Cert:\LocalMachine\My


    Note: Copy the Thumb print value generated by the above command and store it securely.

  5. Execute the following commands to enable HTTPS


    New-Item -Path WSMan:\LocalHost\Listener -Transport HTTPS -Address $ipAddress -CertificateThumbprint $certThumbprint -Force

    Note: In the above command, for $ipaddress, enter the IP address of the target Windows DNS/DHCP server in double quotes (" "), and for $certThumbprint, enter the hexadecimal value of the thumbprint from the previous step in double quotes (" ").
  6. Enabling WinRM

    Run the following command below:

    winrm quickconfig -transport:https
  7. Inspecting WinRM listener configuration for remote management readiness


    By reviewing the listener details, administrators can ensure that the correct addresses and ports are being used and check for any misconfigurations that may block remote access or cause connectivity issues.

    Execute the command as shown below to ensure that the WinRM service is properly configured and enabled, which is necessary for remote management, especially while using PowerShell remoting.

    winrm enumerate winrm/config/listener

Creating Microsoft Clusters in DDI Central

Upon successful signup, the first glimpse within the DDI console reveals an empty dashboard. To get started, create clusters and add your DNS and DHCP servers to your clusters for effective management of your network infrastructure.

To create new clusters

  • Click on the blue plus ( + ) sign at the top right corner.


  • The Add Cluster window appears prompting you to enter the name and type of the cluster: DNS, DHCP or Both. Selecting either DNS or DHCP will create a cluster dedicated only for DNS servers or DHCP servers, respectively. Selecting both enables you to add both DNS and DHCP servers into the cluster.

    Now select the OS (Operating System). This dropdown allows you to select the operating system of the servers that will be part of the cluster.

    Options include:

    • Linux (ISC): Indicates the servers that are managed using Linux OS and are implementing ISC's (Internet Systems Consortium) DNS and DHCP software.
    • Windows: Indicates the servers that are managed using Microsoft Windows OS and are implementing Microsoft DNS and DHCP software. This ensures that the cluster configuration is compatible with the operating systems of the included servers. Choose Windows.


  • Note: Clusters in DDI Central are logical groupings of servers - DNS, DHCP or both organized for identification and administrative purposes. These clusters operate independently of other clusters configured within DDI Central. Each cluster you add has its own internalized IP address plans, IP inventory, IP Address Manager, DNS manager and DHCP manager. A single cluster can accommodate any number of DNS servers and DHCP servers.

  • Click Save to finalize the cluster configurations.
  • Once the cluster is created. You'll be immediately directed to Settings->Servers page, prompting you to add new Microsoft servers into the Cluster.

Adding Microsoft DNS and DHCP servers

  1. On the Servers page, click the Add Server button in the top left corner.
  2. The Create Server page appears on the screen. Here, you can add your DNS-DHCP servers either by discovering existing server configurations or by simply adding the server to the DDI Central console and configure it using the DDI Central user interface at later stages.
  3. Enter the server details like,

    SERVER NAME: Assign a unique name to the server for identification purposes. This helps administrators easily identify and manage the server within the management console.

  4. TYPE:Defines the scope of services managed by the server. Here specify the type of network services the server will provide. Options include:
  5. Both: The server will provide both DNS and DHCP services.

    DNS: The server will provide only DNS services.

    DHCP only: The server will provide only DHCP services.


  6. SERVER IP: Enter the IP address of the server. DDI Central console uses this IP address to connect to and manage the server remotely.
  7. USERNAME: Username is used to authenticate with the server. This way DDI Central ensures that only authorized users can manage and configure the server.

    Special Instructions for entering usernames when adding microsoft DNS and DHCP servers in DDI Central (installed via .exe installer)

    For successful authentication using CredSSP, Negotiate, or NTLM, follow these cases:

    Case 1:

    If the Domain Controller is running on the Windows DNS/DHCP machine, enter the username in the format:

    username@domainname


    Case 2:

    If the Domain Controller is not running on the Windows DNS/DHCP machine, enter the username as:

    hostname\\username

    hostname: The Windows machine’s hostname


    username: The Windows machine’s username

  8. PASSWORD: Enter the password in conjunction with the username to authenticate with the server. Provides secure access to the server for management and configuration.


  9. WINDOWS HTTP PORT: Specify the port number to be used by the DDI Central Console  for non-secure HTTP connections directly to the Microsoft server. The default port is typically 5985.


  10. WINDOWS HTTPS PORT: Specify the port number to be used by the DDI Central Console used for secure HTTPS connections directly to the Microsoft server. The default port is typically 5986.


  11. Specify whether SSL (Secure Sockets Layer) is to be used for secure communication. This way, it enhances the security by encrypting data transmitted between the server and clients. Options include:

    Choosing Yes: SSL is enabled, ensuring encrypted communication.

    Choosing No: SSL is disabled, meaning communication is not encrypted.

  12. Select the authentication method that is to be  used to verify the identity of users. This defines the security level and method of the authentication process, ensuring secure access to the server.Options include:

    Basic: Basic authentication, where the username and password are encoded with Base64. This method is simple but less secure.

    CredSSP (Credential Security Support Provider): Provides a secure delegation of user credentials from the client to the target server, allowing the server to access network resources on behalf of the user.

    Negotiate: Uses either Kerberos or NTLM protocol for authentication. The protocol used depends on the client's environment and configuration.

    NTLM (NT LAN Manager): A suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users.

  13. ENCRYPTION: Ensures that data transmitted to and from the server is encrypted, providing security against data interception. Options include:

    Encryption is never used, meaning all data is transmitted in plain text. This option is the least secure and should only be used in trusted, secure environments.

    Encryption is used based on the capabilities of the client and server. If both support encryption, it will be enabled. This option provides a balance between security and compatibility.

    Always: Encryption is always used, ensuring that all data transmitted to and from the server is encrypted. This option provides the highest level of security

  14. DDI Central discovery process

    DISCOVER EXISTING CONFIGURATIONS? : Specify whether to discover existing DNS and DHCP configurations on the server. This helps in discovering and  importing all the  existing DNS-DHCP-IP configurations into the DDI Central management console for easier management. Options include:

    No: Do not discover existing configurations. Specify No if you just want to add and setup a new server from the scratch. You can setup the required DNS, DHCP or combined configurations to your server to get it configured through the user-friendly DDI Central user interface later.

        DNS only: Discovers only DNS configurations.

        DHCP only: Discovers only DHCP configurations.

        Both: Discovers both DNS and DHCP configurations.


    1. Specifying any one of the options :DNS, DHCP, or Both  above prompts DDI Central to instantly connect to the target Microsoft server to fetch and list all the existing configurations from the server, in the DNS DISCOVERY DETAILS and DHCP DISCOVERY DETAILS sections respectively. DDI Central in discovery mode  discovers all the advanced configurations of DNS-DHCP services, the whole IP address plan and the current IP address inventory.





    Note: When discovering a DNS server with DDNS-enabled domains, ensure that both DNS and DHCP servers are discovered at the same time for DDI Central to capture the combined configurations. Similarly, while discovering DHCP servers that provision IP addresses for dynamic domains, it is essential to discover the corresponding DNS servers as well.

    What are the DNS configurations discovered during DDI Central's discovery process?

    DDI Central sweeps in the following DNS configurations from your remotely managed Windows DNS server into its unified UI

    • DNS Authoritative Zones and their respective records
    • Active Directory or AD Zones and their records
    • Stub Zones and Forwarders
    • DDNS Zones (Discovery of both DNS and DHCP configurations required)
    • DNS Zone Scopes
    • Named IPv4 and IPv6 ClientSubnets
    • Named Query resolution Policies
    • Response Rate Limiting setting
    • Named Response Rate Limiting exception policies
    • Forwarders list
    • DNS Recursion Settings

    What are the DHCP configurations discovered during DDI Central's discovery process?

     

    DDI Central sweeps in the following DHCP configurations from your remotely managed Windows DHCP server into its unified UI:

    • DHCP scopes including, Subnets with declared address pools, Superscopes, Multicast subnets
    • DHCP reservations/ Host Configurations
    • DHCP policies
    • Dual stack IP address plan
    • Dual Stack IP address inventories of configured subnets along with their availability status
    • DHCP failover configurations
    • DHCP Vendor Classes
    • DHCP User Classes
    • Standard DHCP options under each Vendor and User Classes
    • Custom option under each Vendor and User Classes

    With the discovered configurations consolidated and catalogued in DDI Central, you can begin making updates targeting specific DNS or DHCP objects, or set up configurations and policies for individual servers or groups of servers in a particular cluster. You can also add new configurations directly through the DDI Central interface and the same will be updated onto your DHCP and DNS to modify the existing configurations as needed.

    Note:

    AD zones can be discovered from your existing Microsoft DNS servers, and their records can be seamlessly managed within DDI Central. However, you cannot create an AD zone or perform advanced configurations for AD Zones using DDI Central, as it does not have full-fledged integration with Active Directory and its services.

    When discovering dynamic AD zones updated via Group Policy, DDI Central retains and preserves their active, ongoing live timestamps without disrupting the automatic scavenging procedures of Windows AD. Any update operations carried out using DDI Central do not interfere with Windows AD's ability to continue scavenging records based on the stipulated aging policies. This ensures accurate record lifecycle management and enhances synchronization between DDI Central and Windows DNS servers for dynamic updates.

    Any record added or updated in the discovered AD domains through DDI Central will be subject to Windows scavenging procedures as per Group Policy. However, for any new subdomain created using the DDI Central UI, all records added or updated under it will remain static, and Windows Group Policy or scavenging procedures will not apply to them.


    Bypassing the Discovery process to setup new servers from scratch
    1. Specify No if you just want to add and setup a new server from the scratch. You can setup the required DNS, DHCP configurations to your server through the user-friendly DDI Central user interface later. 
       

    Note:If you are adding a new server directly, bypassing the discovery process, to an existing cluster, DDI Central lists all the domains managed by the DNS servers in the cluster and allows you to migrate all or select domains from the DNS servers. You can also specify whether the server you are onboarding will act as the primary or secondary nameserver for the migrated zones as shown in the image below. This is especially useful when servers are overloaded with large volumes of zones, as it enables you to scale DNS servers and optimize capacity management.


     


    1. This way you can add new servers to DDI Central's Management UI console and enable  DDI Central to implement, configure, and manage DNS, DHCP and IPAM services of your network infrastructure from scratch. 

    2. If you have chosen the discovery option as outlined in Step 14, ManageEngine DDI Central will begin to discover configurations from the designated Microsoft server for each service.
      Note: The discovery process takes a considerable amount of time depending on the volume of configurations in the servers. Wait until the whole process completes.

      Once you add your server into the DDI Central console you can further proceed modifying the discovered DNS-DHCP-IPAM configurations or quickly start setting up  the DNS-DHCP-IPAM configurations for the new server through the user-friendly DDI Central user interface.
       

    3. You can access the added servers with all the configurations in place, listed under the Setting->Servers Page. Here you can perform general actions like editing the server configurations, deleting the server, monitoring the server(s) health stats.
       

    4. Other than the general actions, you can also perform the following actions:

      Action 1: Flush DNS Cache:

      Hit the button Flush DNS Cache to refresh the DNS cache of the selected server to ensure that the DNS information hosted on the server is up-to-date.  


    1. A dialog box appears prompting you to specify the scope of the cache flush. If you want to flush the cache of all the zones on the server, click Flush All, or if you just want to flush the cache of a specific zone on the server, click Flush Specific
       


          

    1. Subsequently, specify the zone name and click Flush Cache

      Note: Flush DNS Cache action is crucial for maintaining the reliability and speed of DNS resolutions of within your network.


    2. Action 2: Server Reconfiguration:

      The Server Reconfiguration action in DDI Central simplifies the recovery process for failed or ejected Windows DNS and DHCP servers. If a server goes down, administrators can seamlessly replace it with a new server using the same IP address. By selecting Server Reconfiguration from the Actions menu under Settings → Server, all DNS and DHCP configurations from the original server are automatically transferred to the new server, ensuring minimal downtime. This eliminates the need for manual data restoration and accelerates service recovery, allowing for quick and effortless server replacement while maintaining network stability.


    3. Action 3: DNS and DHCP Rediscover:

      The Rediscover option ensures that Windows-based DNS and DHCP configurations remain synchronized, even when changes are made outside DDI Central using Windows UI, PowerShell, or remote tools. By selecting Rediscover from the Actions menu under Settings → Server, administrators can automatically detect and apply the DNS or DHCP configuration changes, keeping the system updated without manual intervention. Additionally for DNS, just clicking on a zone name will trigger zone rediscovery, fetching the latest settings from the primary/master server. This feature provides real-time synchronization, centralized visibility, and consistent network management.

     
Note: You can now able to view the node agent version installed in the server in the Agent Version in the table.

DDI Central now enables users to update their server status, including the status of the service, by clicking on Check status button after selecting the specific server you want to update. This reloads the current status of both the server and service hosted in it. You can single and multi select servers for updating the server status.

Note: The server in which the DDI Central application running, which can be identified with a yellow icon, cannot be selected for Check Status.

                  New to ADSelfService Plus?

                    • Related Articles

                    • FAQs for Windows Microsoft DNS and DHCP servers

                      FAQ for the Microsoft Windows DNS and DHCP servers Which versions of the Windows Server OS are supported? You can onboard your DNS and DHCP servers running on Windows Server OS 2016, 2019, and 2022 in DDI Central. DDI Central also provides seamless ...
                    • Adding servers

                      Adding Servers Creating Servers Once the cluster is created, you'll be immediately directed to the Servers page to add your DNS and DHCP servers. If not, you can add servers by selecting the Settings menu from the menu bar along the left side of the ...
                    • Guidelines for managing Microsoft Windows DHCP servers

                      Guidelines for managing Microsoft Windows DHCP servers Follow the guidelines below to setup your Microsoft Windows DHCP infrastructure using DDI Central. Creating and managing DHCP scopes in DDI Central Managing Dynamic domains Creating DHCP policies ...
                    • DDI Central for Microsoft DNS DHCP

                      About ManageEngine DDI Central DDI Central is a comprehensive network management solution that unifies DNS, DHCP, and IP Address Management (IPAM) to enhance operational efficiency and network stability. It is deployed as an overlay on your existing ...
                    • Managing microsoft windows DHCP server

                      Managing Microsoft Windows DHCP Scopes Table of Contents What is a Scope in Microsoft Windows DHCP servers? Subnets (DHCPv4 and DHCPv6 Subnets) Special case for IPv6 based subnet Multicast subnets Shared Networks or Superscopes Hosts or DHCP ...