Domain and Forest Trusts:
Trusts is a relationship that allows users in a domain to be
authenticated and using resources in another domain.
Trust types are: External, Forest, Realm and Shourtcut.
All Trusts types can be created in one way or two way
direction.
Forest Trust and Shourtcut Trust are transitive, External
Trust is nontransitive and Realm Trust is transitive or nontransitive.
The Trust Transitivity allows the trust relationship to be
extended outside the two domains which the trust was created.
In Windows Server 2008/2008 R2 enviroment any time a child
domain in a forest is created a two way transitive trust is created by default
with the parent domain.
The two way trust means that users in domain A can access
resources in domain B and users in domain B can also access resources in domain
A.
One way trust means that in trust between domain A and
domain B, users in domain A can access resources in domain B. However, users in
Domain B cannot access resources in Domain A.
Forest Trust:
Forest Trust is created between two root domains in two
different forest .
Before creating forest trust you must ensure that your DNS
is set up properly. You can verufy your DNS using nslookup and for more info
you can read this article: http://go.microsoft.com/fwlink/?LinkId=92715
You can configure DNS conditional forwarders in each DNS
namespace or creating a secondary DNS Zone to route queries for names in the
other namespace.
External Trust:
External Trust created when you need to access recources
that located in a separate forest or when users need access to resources in a
Windows NT 4.0.
Shourtcut trust:
It used when you want to optmize the authentication process,
authentication request must pass through the domain trees. In some complex
forests it may take time for users to be authenticated. Shourtcut trust is
needed when users in domain alaways need some resources in a spacific domain
the located in another forest.
How to create Two Way Forest Trust:
Clikc Start Menu > Administrative Tools > Active
Directory Domains and Trusts.
Right-click the domain node for the domain that you want to
establish a trust with, and then click Properties.
Choose Trusts tab, click New Trust, and then click Next.
Type the DNS or NetBIOS name of the domain, then click Next.
Choose Forest trust, then
click Next.
Choose Two-way, then click Next.
Choose Both this domain and the specified domain, then click
Next.
This option to quickly create both sides of a trust by
completing a single instance of the New Trust Wizard , the administrator
running the wizard must acquire the appropriate administrative credentials for
each domain in the trust relationship.
The option “This domain only” is used when you want to
create each side of the trust separately.
Now you must type the user name and password for the
appropriate administrator in the specified domain.
On the Outgoing Trust Authentication Level--Local Forest box
choose Forest-wide authentication.
Again you must choose Forest-wide authentication.
On the Trust Selections Complete box, review the results,
and then click Next.
On the Trust Creation Complete box, review the results, and
then click Next.
On the Confirm Outgoing Trust box, click Yes, confirm the
outgoing trust and type administrative credentials from the specified domain.
On the Confirm Incoming Trust box , click Yes, confirm the
outgoing trust and type administrative credentials from the specified domain.
Now Trust relationship is created, ckick Finish.
How to configure a firewall for domains and trusts:
For Windows Server 2008/Windows Server 2008 R2
Client Port(s)
|
Server Port
|
Service
|
49152 -65535/UDP
|
123/UDP
|
W32Time
|
49152 -65535/TCP
|
135/TCP
|
RPC-EPMAP
|
49152 -65535/TCP
|
138/UDP
|
Netbios
|
49152 -65535/TCP
|
49152 -65535/TCP
|
RPC
|
49152 -65535/TCP/UDP
|
389/TCP/UDP
|
LDAP
|
49152 -65535/TCP
|
636/TCP
|
LDAP SSL
|
49152 -65535/TCP
|
3268/TCP
|
LDAP GC
|
49152 -65535/TCP
|
3269/TCP
|
LDAP GC SSL
|
53, 49152 -65535/TCP/UDP
|
53/TCP/UDP
|
DNS
|
49152 -65535/TCP
|
135, 49152 -65535/TCP
|
RPC DNS
|
49152 -65535/TCP/UDP
|
88/TCP/UDP
|
Kerberos
|
49152 -65535/TCP/UDP
|
445/NP-TCP/NP-UDP
|
SAM/LSA
|
For more information about Domains and Trust: http://technet.microsoft.com/en-us/library/cc736526(WS.10).aspx
No comments:
Post a Comment