LAB 02 : Server 2019, ADDS, and DNS - Zacham17/my-tech-journal GitHub Wiki
Brief Summary
In this lab, I used a virtual machine with Windows Server 2019 to install and configure DNS and Active Directory services to use with the firewall and workstation virtual machines.
Notes
I configured Active Directory Domain Services(ADDS) and DNS
I set the domain up as a forest.
I used Active Directory Users and Computers to configure an administrative user in the domain and a basic user in the domain.
I connected the Workstation VM to the domain and logged in as the users that I created on the domain successfully. I also made sure to configure the workstation's network settings to use the DNS IP I set when setting up DNS on the server VM.
I was able to ping the domain and the firewall form the workstation and I used nslookup to resolve hostnames.
Commands Used:
whoami: Displays the current user
hostname: Displays the hostname of of the machine you are on
ping: Sends packets to a destination address to test the connection
nslookup: Is used to query the DNS service. It can be used to obtain the domain name attached to an IP address.
New Terms/Steps
I have worked with Windows Server 2019, DNS, and Active Directory before, so not much was new to me regarding those.
One step in the lab that was new to me was setting up a forward and reverse lookup zones and PTR, which allow for the resolution between hostname/domain name and IP address
A term I encountered in this lab is "Forest", which is a collection of domains that don't share the same name.