Monday, November 14, 2016
Download FileZilla v3 10 0 2 Server v0 9 48
Download FileZilla v3 10 0 2 Server v0 9 48
FileZilla includes a site manager to store all your connection details and logins as well as an Explorer style interface that shows the local and remote folders and can be customized independently.
FileZilla offers support for firewalls and proxy connections as well as SSL and Kerberos GSS security.
Additional features include keep alive, auto ascii/binary transfer and more. A nice program for beginners and advanced user alike.

Here are some key features of "FileZilla":
- Ability to resume Uploads/Downloads (if the server supports it)
- Custom Commands
- Site Manager with folders
- Keep Alive system
- Timeout detection
- Firewall support
- SOCKS4/5 and HTTP1.1 Proxy support
- SSL secured connections
- SFTP support
- Upload/Download Queue
- Drag&Drop
- Multi-language support
- GSS authentication and encryption using Kerberos.


Go to link Download
Thursday, October 13, 2016
Download Microsoft Exchange Server 2013 SP1 x64 Direct Link
Download Microsoft Exchange Server 2013 SP1 x64 Direct Link
![]() |
Microsoft Exchange Server 2013 SP1 x64 [Direct Link] |
Go to link Download
Tuesday, September 20, 2016
DNS Stub Zones in Windows Server 2003
DNS Stub Zones in Windows Server 2003
DNS Stub Zones in Windows Server 2003
We would like to extend a warm welcome to Microsoft expert Mitch Tulloch as he presents his first article to the WindowsNetworking.com community. In this article well learn about stub zones, a new feature of DNS in Windows Server 2003. Stub zones can help reduce the amount of DNS traffic on your network by streamlining name resolution and zone replication. Well examine how stub zones work, when you would use them, and how to set them up in this tutorial.
Stub zones are a new feature of DNS in Windows Server 2003 that can be used to streamline name resolution, especially in a split namespace scenario. They also help reduce the amount of DNS traffic on your network, making DNS more efficient especially over slow WAN links. This article will look in detail at what stub zones are, how they work, and when to use them. Ill also walk you through the process of creating a stub zone to facilitate name lookups between two separate forests. But first, a little background on DNS zones is necessary to see where stub zones fit into the overall picture.
Types of DNS Zones
A zone is a contiguous portion of DNS namespace managed by one or more name servers. Zones contain resource records that specify the name of the DNS server authoritative for the zone (SOA record), the names and IP addresses of all name servers in the zone (NS records), the names and IP addresses of other hosts (A records), aliases for hosts (CNAME records), and so on.
In the original implementation of DNS found in RFCs 1034 and 1035, two different types of zones were defined:
- Primary zones, which store their zone information in a writable text file on the name server.
- Secondary zones, which store their zone information in a read-only text file on the name server.
In the implementation of DNS on Windows NT, these two types of zones were referred to as standard zones. A typical scenario for a company that had a single Windows NT domain deployed would involve setting up two name servers on the network, one containing the standard primary zone (the primary name server for the domain) and the other containing the standard secondary zone (the secondary name server). Whenever a new host (for example, a file server) was added to the network, both these name servers had to be updated so clients could find the new host using DNS. To do this, the administrator would create a new A record on the primary name server since the only the primary zone could be modified. The primary name server would then notify the secondary that its records had changed, and the secondary would pull the updated zone information from the primary until it had an identical copy of the primary zone. From the perspective of the secondary name server, the primary name server represents the master name server for this zone.
The main problem with this arrangement was that if the primary name server went down, no changes could be made to the resource records since secondary name servers contained read-only zone information. Also, it meant that all the changes you made to DNS had to be performed on a single name server (the primary), which could be an inconvenience if the company spanned several locations.
Windows 2000 provided a solution to these issues by introducing Active Directory Integrated zones, which stored their zone information within Active Directory instead of text files. The advantages of this new type of zone included using Active Directory replication for zone transfers and allowing resource records to be added or modified on any domain controller running DNS. In other words, all Active Directory Integrated zones are always primary zones as they contain writable copies of the zone database.
Active Directory Integrated zones work well for most Windows 2000-based networks, but they do have some issues. One limitation is if you are dealing with two separate forests (disjointed namespace), a common scenario when companies are merging or form part of a conglomerate. For example, say Company A has close business ties with Company B and employees in Company A need access to resources on Company Bs internal network. The usual way of providing them this access would be for the DNS administrator of Company A to add a standard secondary zone on each of Company As name servers. These secondary zones would then point to name servers on Company Bs network as their master name servers, and would obtain their resource records by zone transfers with Company Bs name servers. While that works, its overkill for several reasons. First, it generates a lot of zone transfer traffic between name servers in Company A and Company B, which can pose a problem if the companies are linked together by a slow WAN connection. Second, if Company B decides to decommission one of its name servers without telling the administrator of Company A, some of the secondary zones on Company As name servers could suddenly find themselves without a master, and once their records expire the Company A clients that use them will no longer be able to access resources in Company B.
What Stub Zones Do
Enter stub zones to the rescue. A stub zone is like a secondary zone in that it obtains its resource records from other name servers (one or more master name servers). A stub zone is also read-only like a secondary zone, so administrators cant manually add, remove, or modify resource records on it. But the differences end here, as stub zones are quite different from secondary zones in a couple of significant ways.
First, while secondary zones contain copies of all the resource records in the corresponding zone on the master name server, stub zones contain only three kinds of resource records:
- A copy of the SOA record for the zone.
- Copies of NS records for all name servers authoritative for the zone.
- Copies of A records for all name servers authoritative for the zone.
Thats it--no CNAME records, MX records, SRV records, or A records for other hosts in the zone. So while a secondary zone can be quite large for a big companys network, a stub zone is always very small, just a few records. This means replicating zone information from master to stub zone adds almost nil DNS traffic to your network as the records for name servers rarely change unless you decommission an old name server or deploy a new one. And to make replication even more efficient, stub zones dont use UDP as traditional DNS zone transfers do. Instead, stub zones use TCP, which supports much larger packet sizes than UDP. So while a typical zone transfer might involve many UDP packets flooding the network, stub zone transfer only involves a few packets at most. Also, while most DNS servers can be configured to prevent zone transfers to secondary zones from occurring, stub zones request only SOA, NS, and A records for name servers, all of which are provided without restriction by any name server since these records are essential for name resolution to function properly. Finally, since stub zones can be integrated within Active Directory (secondary zones cant), they can make use of Active Directory replication to propagate their information to all domain controllers on your network.
In our previous scenario, stub zones can be used instead of secondary zones to reduce the amount of zone transfer traffic over the WAN link connecting the two companies. To do this, the administrator for Company A would simply log on to one of the domain controllers, open the DNS console, and create a new stub zone that uses one or more of Company Bs name servers as master name servers. By making this stub zone an Active Directory Integrated zone, the stub zone will then be automatically replicated to all other domain controllers on Company As network. Now when a client on Company As network wants to connect to a resource on Company Bs network, the client issues a DNS query to the nearest Company A domain controller, which then forwards the query to one of Company Bs name servers to resolve.
How to Create a Stub Zone
Lets see how it works in practice. In my lab I have two forests set up, one for Company A running Windows 2003 Server and named test2003.local, and the other for Company B running Windows 2000 and named test2000.local. The domain controller for the root domain of Company A is named SRV220 while the domain controllers for the root domain of Company B are named SRV210, SRV211 and SRV212. Sally is an employee of Company A and her desktop computer is named DESK231, and she needs to access a share named CATALOG located on SRV210 in Company B. To do this she clicks Start, selects Run, and types srv210.test2000.localcatalog and the result is an error:
This is because her command issues a DNS query against her name server SRV220 which has no information in its DNS database about test2000.local, the root domain of Company B:
To allow users in Company A to access resources in Company B, the administrator of Company A decides to create a stub zone for Company Bs domain. To do this, right-click on Forward Lookup Zones in the figure above and select New Zone. This starts the New Zone Wizard:
Clicking Next brings up the Zone Type screen, and well choose Stub Zone here and select the checkbox to create an Active Directory Integrated stub zone:
Click Next and the Active Directory Zone Replication Scope screen is displayed, which well leave at its default setting for automatic replication of stub zone information to all domain controllers in the test2003.local domain.
Clicking Next displays the Zone Name screen, and here we type test2000.local as the name of the stub zone since this is the name of the target domain on Company Bs network:
Clicking Next displays the Master DNS Servers screen, and we enter the IP address 172.16.11.210 for one of the name servers on Company Bs network:
Clicking Next and then Finish runs the wizard and creates the new stub zone, which here is highlighted in the DNS console connected to SRV220 on Company As network:
Note in the above figure that as expected the stub zone contains only an SOA record, an NS record for each name server in the domain, and an A record for each name server in the domain. Now when Sally clicks Start, selects Run, and types srv210.test2000.localcatalog a window opens up displaying the contents of the CATALOG share on SRV210 in the remote forest:
Summary
Stub zones are easy to create and can make name resolution between forests more efficient, but they have other uses as well. For example, stub zones can enable name servers to perform recursion without needing to query the Internet root name servers or internal corporate root servers, thus decreasing the number of hops between name servers and making name resolution more efficient. Another use of stub zones is to keep delegated zone information up to date and prevent lame delegations from wrecking name resolution within a forest, and that would make a good topic for a future article. Both of these are good topics for future articles, so stay tuned for more on stub zones later.
Source: Windowsnetworking
Go to link Download
Thursday, September 1, 2016
DNS Conditional Forwarding in Windows Server 2003
DNS Conditional Forwarding in Windows Server 2003
In this article well look at conditional forwarding, a new feature of DNS in Windows Server 2003. Conditional forwarding can be used to speed up the DNS name resolution process by directing queries for specific domains to specific name servers. This tutorial explains in detail when conditional forwarding can be useful and how to set it up.
Conditional forwarding is a new feature of DNS in Windows Server 2003 that can be used to speed up name resolution in certain scenarios. They can also be used to help companies resolve each others namespace in a situation where companies collaborate a merger is underway. This article will look in detail at how conditional forwarding works, how to configure it, and when you might use it. But first, lets briefly review the concepts of forwarding and forwarders in traditional DNS, starting with different types of name queries.
Forwarders and Forwarding
When a name server is queried in DNS, the way it responds depends on the type of query issued, which can be either iterative or recursive. In an iterative query, the client asks the name server for the best possible answer to its query. The name server checks its cache and the zones for which it is authoritative and returns the best possible answer to the client, which could be either a full answer like "here is the IP address of the host you are looking for" or a partial answer like "try this other name server instead, it might know the answer." In a recursive query, things work a little different for here the client demands either a full answer (the IP address of the target host) or an error message like "sorry, name not found." In Windows DNS, client machines always send recursive queries to name servers, and name servers usually send iterative queries to other name servers.
Sometimes this process isnt enough however. A simple example is a company that has Active Directory deployed on its internal network and uses a private top-level domain like .local for its forest. For example, say a company has a single Active Directory domain named test2003.local, a domain controller (and DNS server) named SRV220 and has a dedicated connection to the Internet. A user named Bob goes to his desktop computer named DESK231, opens Internet Explorer, and tries to access Google (www.google.com). Heres what happens DNS-wise as far as name resolution is concerned:
- DESK231 sends a recursive query to SRV220 asking to resolve www.google.com into its associated IP address.
- SRV220 looks in its DNS database and finds zone information only for the test2003.local domain, realizes www.google.com is not part of that domain, decides it has no way of knowing how to resolve www.google.com into an IP address, and what happens next depends:
- If, when you promoted your standalone server to the role of domain controller using dcpromo, your machine was disconnected from the Internet and there were no other DNS servers on your network, then dcpromo creates a root zone (".") in its DNS database that specifies itself as the root name server for all DNS name resolution (that is, "the buck stops here"). In this case, SRV220 realizes it cant answer the query and returns a "name not found" error to the client and Bob cant open the Google home page.
- If however, when you promoted your server to a domain controller, your machine was connected to the Internet, then Windows contacts the first available Internet root name server and downloads a list of all Internet root name servers, which becomes its list of root hints. In that case name resolution now continues as follows:
- SRV220 sends an iterative query to the first available Internet root name server, which responds with the IP address of a name server authoritative for the .com top-level domain.
- SRV220 sends a second iterative query to the name server authoritative for .com, and this machine responds with the IP address of a name server authoritative for the google.com domain.
- SRV220 sends a third iterative query to the name server authoritative for google.com, and this machine responds with the IP address of the host named www.google.com.
- SRV220 returns the IP address of www.google.com to DESK231 and Bob sees the Google home page appear in his browser.
Now thats a lot of steps, and if the company has a slow WAN link to the Internet then youre using valuable bandwidth. A better approach than "going up to root" to resolve www.google.com would be to configure a forwarder. A forwarder is a name server that handles name queries that cant be resolved by another name server. Lets see how the above scenario works when a forwarder is configured on the internal name server SRV210:
- DESK231 sends a recusrive query to SRV220 asking to resolve www.google.com into its associated IP address.
- SRV220 looks in its DNS database and finds zone information only for the test2003.local domain, realizes www.google.com is not part of that domain, decides it has no way of knowing how to resolve www.google.com into an IP address, and checks its list of forwarders to see if any forwarders have been configured for it.
- On the forwarders list it finds the IP address of the external name server hosted by the companys Internet Service Provider, so it forwards the query to the ISPs name server to handle.
- The ISPs name server goes up to root as needed (which can involve two or more additional queries) to resolve www.google.com into its IP address and returns this address to SRV220.
- SRV220 returns the address to Bob and he sees Google appear in his browser.
Note that this procedure takes about the same number of steps as before, but most of these steps are performed offsite by the ISPs name server, so the amount of bandwidth used over the Internet connection is considerably less and the processing load on the internal name server SRV220 is minimized as well. And these are good things from an administrators perspective. Of course, if the forwarder doesnt respond within the timeout configured, the server can either try another forwarder (if configured) or use root hints (if available) or give up and return an error.
On Windows 2000, forwarders are configured using the General tab of the DNS servers properties sheet in the DNS console:
Whats different in Windows Server 2003 is the concept of conditional forwarding, which Ill look at next.
What Conditional Forwarding Does
A conditional forwarder is one that handles name resolution only for a specific domain. For example, you could configure your name server to forward any requests for hosts in the domain google.com directly to a specific name server that is authoritative for the google.com domain. What this does is speed up the name resolution process by eliminating the need to go up to root to find this authoritative server. In this case our previous example would now look like this:
- DESK231 sends a recusrive query to SRV220 asking to resolve www.google.com into its associated IP address.
- SRV220 looks in its DNS database and finds zone information only for the test2003.local domain, realizes www.google.com is not part of that domain, decides it has no way of knowing how to resolve www.google.com into an IP address, and checks its list of forwarders to see if any forwarders have been configured for it.
- On the forwarders list it finds a conditional forwarder configured, which specifies the IP address of an authoritative name server for the google.com domain, so it forwards the query to this name server to handle it.
- The google.com name server immediately resolves www.google.com into its IP address without the need of going up to root and returns this address to SRV220.
- SRV220 returns the address to Bob and Google quickly shows up in his browser, prompting Bob to say, "Hey, the network sure is fast today!"
Lets now see how to configure this in Windows Server 2003 DNS.
How to Configure Conditional Forwarding
First lets find a name server authoritative for the google.com domain. To do this well use the WHOIS lookup tool on the NetworkSolutions website at http://www.networksolutions.com/en_US/whois/index.jhtml. Go to this page, type google.com into the WHOIS search box, enter the code displayed (a feature that prevents mass lookups by automated programs), and the following results are displayed:
google.com
Whois Server Version 1.
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.Domain Name: GOOGLE.COM
Registrar: ALLDOMAINS.COM INC.
Whois Server: whois.alldomains.com
Referral URL: http://www.alldomains.com
Name Server: NS2.GOOGLE.COM
Name Server: NS1.GOOGLE.COM
Name Server: NS3.GOOGLE.COM
Name Server: NS4.GOOGLE.COM
Status: REGISTRAR-LOCK
Updated Date: 03-oct-2002
Creation Date: 15-sep-1997
Expiration Date: 14-sep-2011
Lets find out the IP address of name server NS1.GOOGLE.COM using ping:
Now that we have the IP address of one of the name servers authoritative for the google.com domain, we can configure Windows Server 2003 DNS to conditionally forward all name queries for this domain to this name server.
To configure conditional forwarding, open the DNS console under Administrative Tools, right-click on the DNS server node, select properties to open the Properties sheet for the DNS server, and select the Forwarding tab:
If you compare this to the previous figure for Windows 2000 DNS above, youll see a few differences. First, if you just want to configure a regular forwarder here, leave "All other DNS domains" selected in the DNS domain listbox, enter the IP address of the forwarder (typically the address of your ISPs name server) in the dotted box, and click Add. If you want to add a conditional forwarder however, do the following. First, click the New button and type the name of the domain you want your name server to conditionally forward to:
Click OK and the new domain appears in the top listbox (make sure it is selected for the next step):
Now type the IP address of your conditional forwarder into the dotted box and click Add to add it to the selected domains forwarders list:
Click OK to apply the change and close the properties sheet and youre done. Now any name queries for the google.com domain that are issued against the name server are forwarded directly to the name server for the google.com domain to resolve.
Using Conditional Forwarding
When might you want to use conditional forwarding in the real world? I can think of several situations where it might be useful:
- To improve name resolution between two separate companies that need to provide their users with access to resources in the other companys intranet. This sort of situation is common in a merger situation or between supply-chain partners. Just set up DNS servers in each company to forward name requests for resources in the other companys network directly to the IP addresses of name servers in the other company and youre done. Of course, this can also be done using stub zones as I discussed in my previous article DNS Stub Zones in Windows Server 2003 and Ill compare the two approaches in a moment.
- To improve name resolution within an Active Directory implementation that has a disjointed namespace (separate forests or multiple domain trees) or a deep hierarchy of subdomains. In this kind of situation you can set up conditional forwarding so users in one domain can avoid having to go all the way to root to find resources in a separate forest, another domain tree, or way down the domain hierarchy in a tree. Again, stub zones could also be used for this purpose if desired.
- And then theres using it simply to forward name queries for specific Internet sites like google.com as in the example above, but that example was meant only to be illustrative of the procedure for configuring conditional forwarding on your name server--my company has no plans on merging with Google anytime soon.
Finally, is there anything you need to watch out for regarding using conditional forwarding? Two things come to mind First, conditional forwarding is suitable if you are dealing with a fixed DNS infrastructure. That means in a merger or supply-chain scenario you must be sure the other company doesnt plan on changing their DNS infrastructure by decommissioning old name servers, deploying new ones, or changing the IP addresses of existing ones. If they do change their infrastructure and dont inform you of this, then your name server may suddenly find itself forwarding queries to non-existing name servers resulting in failed name queries and frustrated users flooding help desk with calls. In that case, it might be better to create stub zones on your name servers for zones for which the other companys name servers are authoritative. Thats because stub zones automatically update themselves with the current list of name servers in the zone while configuring forwarders is a process that has to be done manually. Same thing in a large enterprise that has a complex Active Directory forest--if you arent sure that administrators in other divisions of your company are going to tell you in advance when they change their DNS infrastructures, dont implement conditional forwarding--use stub zones instead.
The second caveat concerning conditional forwarding is not to get to carried away implementing it. You might think you could improve name resolution for your users by adding dozens of forwarders for the most popular Internet sites they use for work purposes, but this might be a bad idea. The reason is, when you have a long list of conditional forwarders configured, your name server has to go through the entire list until it either finds the domain requested or fails to find it, in which case standard forwarding is used (if configured), after which root hints is tried and standard recursion employed. The result of this is that your name server has to perform extra processing to go through the forwarders list each time a query is received, and in addition to increasing the CPU load on your server this can also result in slower name resolution rather than faster due to the time it takes to process an especially long list. And if the forwarder itself is also part of your own companys DNS infrastructure then be aware that the added load of receiving forwarded queries from other name servers and performing recursive queries to resolve them means your forwarders will experience especially heavy CPU utilization and may need to have their hardware beefed up considerably to handle it. So if you do plan on using conditional forwarding, particularly within your own enterprise, be sure to use it only where it really makes a difference and use it sparingly.
Source: Windowsnetworking
Go to link Download