Question

You are setting up an IPAM solution for your Active Directory forest. The forest contains a...

You are setting up an IPAM solution for your Active Directory forest. The forest contains a single domain, adatum.com, with 10 large sites and 10 small sites. The large sites have between 800 to 1,000 users; the small sites have 100-200 users. All domain controllers are now running Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. The forest and domain functional levels are at Windows Server 2008 R2. Your CTO has asked you to ensure that you can manage all DHCP and DNS servers from the IPAM server. You also need to keep the data for three years. Explain what you would do, including how you would deploy and configure IPAM.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

IP Address management is a new feature introduced in windows server 2012 that allows you to configure, manage and have a general overview of the network's IP addresses and ranges. With IPAM, you can search for desired IP addresses and ranges, manage and configure DHCP scopes and DNS entries, view the status of your IP addresses blocks and search for free IP address. Large enterprises usually deploy one or multiple IPAM servers because, as the network evolves, the complexity of its IPs and subnets increses significantly.

I will show you how to configure IPAM and we'll also cover some of its basic features. Note that i will be using a virtual machine hosted in my VMware testing environment running windows server 2012. My VM is also a member of an active directory forest so make sure to cover this aspect as well.

Step 1 - Installation

IPAM can be installed in two ways: using Windows Powershell or by accessing the Roles and Features section from server manager Console with windows powerShell this operation can be performed much faster by executing the following command

install-windowsFeature IPAM-IncludeManagementTools

Step 2 - Provisioning

Once the installation has been successfully completed, open the Server Manager Console and navigate to the IPAM section. Here you will discover all available IPAM server tasks

Select the second option, Provision the IPAM, to start the IPAM configuration wizard. in this section is where the IPAM database, security groups, tasks and folders are created.

Step 3 - Provisioning Method

You must configure how the IPAM server interacts with network servers, there are two options avaible: manually or by using GPOs. Simply put, by selecting the first option, an administrator would have to configure security groups, firewall rules and network shares manually on each machine. This method is really not recommend since it adds a lot of extra configurations and increases the overall complexity of the IPAM deployment.

The second option is much easier to implement since it uses group policy objects to configure all IPAM managed server. Unless you simply cannot you use the second option, you should always use GPOs to configure servers managed by IPAM. Note that you have to specigy a prefix that will be set to the IPAM GPOs

Once the wizard has been successfully completed, three group policy objects will be created: one for DNS servers, one for DHCP servers and one for domain controllers.

Step 4 - Configure Server Discovery

Select the third task from the IPAM console to configure server discovery. This is where we specify what servers should be discovered by our IPAM machine. You will need to select and add domains to discover. By default, all three types of servers are selected: DNS, DHCP and domain Controllers. You can change the discovery options by selecting only desired types of server:

Step 5 - Start Discovery

Once this section has been covered, select the 4th task to start the server discovery procedure

If you receive an error stating that discovered machines were blocked, you need to execute the following PowerShell command to create the GPOs that later will be assigned to your machines:

Invoke-IpamGpoProvisioning -Domain ppscu.com -GpoPrefixName IPAMPPSCU

Step 6 - Verify GPOs

You can now verify the GPOs in the group Policy Management Console. Connect to the blocked machine and execute gpupdate /force to propagate the newly created GPOs.

For each machine you will have to change its manageablility status to managed, you can do so if you right click on the blocked machine and select edit server, The machine should change its IPAM Access status to Unblocked.

Step 7 - Import Data

Now that the server has been added to IPAM, you can retrieve and import its data to the IPAM server if you right click on the machine and select Retrieve All server data. You can also execute the 6th available task from the IPAM console to retrieve data from managed servers:

That's about it for the configuration part of an IPAM server. We've convered the most important steps that you need to take in order to successfully deploy IPAM within your enterprise. If you have followed these steps precisely. you should have installed and configured an IPAM machine with at least one discovered host. Note that same principles are applied when used in a large organization with multiple hosts.

I hope that will help you

Add a comment
Know the answer?
Add Answer to:
You are setting up an IPAM solution for your Active Directory forest. The forest contains a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You’re setting up a test environment that involves two subnets with three Windows Server 2016 servers...

    You’re setting up a test environment that involves two subnets with three Windows Server 2016 servers on each subnet. The servers are running broadcast-based network services, such as DHCP. The host computer is attached to the production network, so you must prevent any conflicts. You want the two subnets to be able to communicate with each other. The test environment consists of a single Windows Server 2016 machine running Hyper-V. Describe how you plan to configure the virtual network.

  • Think Critically 7-2: Choosing a Virtual Network Configuration. You're setting up a test environment that involves...

    Think Critically 7-2: Choosing a Virtual Network Configuration. You're setting up a test environment that involves two subnets with three Windows Server 2016 servers on each subnet. The servers are running broadcast-based network services, such as DHCP. The host computer is attached to the production network, so you must prevent any conflicts. You want the two subnets to be able to communicate with each other. The test environment consists of a single Windows Server 2016 machine running Hyper-V. Describe how...

  • Using the knowledge of Active Directory, what Domain/Tree/Forest Configuration do you recommend for the College with...

    Using the knowledge of Active Directory, what Domain/Tree/Forest Configuration do you recommend for the College with the following requirements ? Also, what Site configuration should be designed? 50-100 Students 2 Year Diploma Program Faculty Staff (Instructors for Year 1 and 2) 50 Shared Computers (25 1st year, 25 2nd year) Virtual Servers, switches, and storage VPN access for all users Firewall Redundancy

  • Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has...

    Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. These enterprises include the Regional Gardens Nursery which sells plants and garden supplies to the public, and Regional Garden Planners which provides garden advice, design and consultancy services. Regional Gardens Ltd has a small data center at its main site in Bathurst where the company’s servers and data...

  • Window server 2012 Create a Report -Users in AD-DS, Groups, OUs, Shares, and GPOs These are the Questions. A. Show and discuss how Domain users are set up in Active Directory.   B. Discuss how domain...

    Window server 2012 Create a Report -Users in AD-DS, Groups, OUs, Shares, and GPOs These are the Questions. A. Show and discuss how Domain users are set up in Active Directory.   B. Discuss how domain user accounts can be used. C. Show and discuss how Active directory groups are set up and users added to them. Discuss the purpose of Active Directory Groups (not Group Policies that is a different topic). D. Discuss as you work through the above topics...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public...

    1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public interest? 2. Being locked in to a product or technology is only a problem if such a product can be clearly shown to be inferior to an alternative. What difficulties might there be in establishing such a case? etwork effects Microsoft is a vertically integrated firm (see page 87), with a dominant position in the operating system market (i.e. Windows) and in certain application...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT