Deploying a Fault-Tolerant Microso Active Directory Environment

Deploying a Fault-Tolerant Microso Active Directory Environment

8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment Deploying a fault-tolerant Microso Active Directory environment This tutorial is the rst part of a series that helps you deploy a highly available Windows architecture on Google Cloud with Microsoft Active Directory, SQL Server, and Internet Information Services (IIS). In this tutorial, you set up a redundant pair of Windows domain controllers with Active Directory using a new Virtual Private Cloud (VPC) network and multiple subnets. The series consists of these tutorials: Deploying a fault-tolerant Microsoft Active Directory environment (this document) Deploying a multi-subnet SQL Server (/solutions/deploy-multi-subnet-sql-server) Deploying load-balanced IIS web servers (/solutions/deploy-load-balanced-iis-web-servers) Each tutorial builds on the infrastructure that you create in the preceding one. You can also use this tutorial to learn to set up an Active Directory conguration for use in other architectures. This guide does not cover replicating a remote Active Directory environment to the new Google Cloud- based Active Directory environment, although this is possible with Cloud VPN and additional Active Directory conguration. Architecture https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 1/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment Objectives Create a custom mode VPC network with two subnets spanning two zones. Create Windows Server virtual instances and enable Active Directory Domain Services. Congure a new domain with Active Directory. Join the new Windows Server instances to the new domain. Congure rewall rules to allow trac to the virtual machines. Test the conguration. Costs This tutorial uses billable components of Google Cloud, including: Compute Engine (/compute) Persistent Disk (/persistent-disk) The Pricing Calculator (/products/calculator#id=f1e0652a-76e4-402d-8694-b73681607893) estimates the cost of this environment at around $4 per day. Before you begin 1. In the Cloud Console, on the project selector page, select or create a Cloud project. Note: If you don't plan to keep the resources that you create in this procedure, create a project instead of selecting an existing project. After you nish these steps, you can delete the project, removing all resources associated with the project. Go to the project selector page (https://console.cloud.google.com/projectselector2/home/dashboar 2. Make sure that billing is enabled for your Google Cloud project. Learn how to conrm billing is enabled for your project (/billing/docs/how-to/modify-project). https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 2/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment 3. Enable the Compute Engine API. Enable the API (https://console.cloud.google.com/ows/enableapi?apiid=compute) Initializing common variables You must dene several environment variables that control where elements of the infrastructure are deployed. 1. Go to Cloud Shell. Open Cloud Shell (https://console.cloud.google.com/cloudshell) 2. In Cloud Shell, create the following environment variables to set values that you need later in the tutorial. The commands set the region to us-east-1. You can use a different region, but remember the region that you use so you can use the same region in the subsequent tutorials. export region=us-east1 export zone_1=${region}-b export zone_2=${region}-c export vpc_name=webappnet export project_id=your-project-id Replace your-project-id with the ID of the Google Cloud project that you're using. 3. Run the following commands to set the default region and project ID so you don't have to specify these values in every subsequent command: gcloud config set compute/region ${region} gcloud config set project ${project_id} Creating the network infrastructure https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 3/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment After you've dened the infrastructure variables, it's time to create the network and subnets that Active Directory will use. 1. In Cloud Shell, run the following command to create the VPC network: gcloud compute networks create ${vpc_name} \ --description "VPC network to deploy Active Directory" \ --subnet-mode custom You see the following warning, which you can ignore, because you create these rewall rules in later steps. Instances on this network will not be reachable until firewall rules are created. 2. Add two subnets to the VPC network: gcloud compute networks subnets create private-ad-zone-1 \ --network ${vpc_name} \ --range 10.1.0.0/24 gcloud compute networks subnets create private-ad-zone-2 \ --network ${vpc_name} \ --range 10.2.0.0/24 3. Create an internal rewall rule to allow trac between subnets: gcloud compute firewall-rules create allow-internal-ports-private-ad \ --network ${vpc_name} \ --allow tcp:1-65535,udp:1-65535,icmp \ --source-ranges 10.1.0.0/24,10.2.0.0/24 Note: In a production environment, it's a best practice to secure all the ports that your systems are not actively using. It's also a best practice to secure access to your machines using a bastion host https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 4/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment (/solutions/connecting-securely#bastion). 4. Create a rewall rule to allow an RDP connection on port 3389 from any location: gcloud compute firewall-rules create allow-rdp \ --network ${vpc_name} \ --allow tcp:3389 \ --source-ranges 0.0.0.0/0 Creating the rst domain controller Next you create a domain controller that has the following properties: Name: ad-dc1 IP Address: 10.1.0.100 1. Create a Compute Engine instance of Windows Server 2016 to use as the rst domain controller: gcloud compute instances create ad-dc1 --machine-type n1-standard-2 \ --boot-disk-type pd-ssd \ --boot-disk-size 50GB \ --image-family windows-2016 --image-project windows-cloud \ --network ${vpc_name} \ --zone ${zone_1} --subnet private-ad-zone-1 \ --private-network-ip=10.1.0.100 Note: You can increase the boot disk size based on your expected needs. 2. Wait approximately one minute, and then create a password for the Windows instance ad-dc1: gcloud compute reset-windows-password ad-dc1 --zone ${zone_1} --quiet https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 5/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment The username is your Google account username. Note the username and password for future use. Note: If the instance is not ready to accept the request, you see the following error message. If so, retry the command in a few minutes. ERROR: (gcloud.compute.reset-windows-password) The instance may not be ready for use. This can occur if the instance was recently created or if the instance is not running Windows. Please wait a few minutes and try again. 3. Use RDP to connect to the domain controller instance with the credentials you created in the previous step. 4. Open a PowerShell terminal as Administrator. (Click Start, type PowerShell, and then press Shift+Ctrl+Enter.) 5. Set the Windows credentials for the Administrator account: net user Administrator * Note: To paste commands into a PowerShell terminal, press Alt+Space+P. You're prompted to create a password. Use a strong password, and store the password in safe location for future use. The Administrator account will become a domain admin account after you've created the Active Directory forest (https://technet.microsoft.com/en-us/library/cc759073(v=ws.10).aspx) with it. 6. Enable the account: net user Administrator /active:yes 7. Install Active Directory Domain Services, including Management Tools: https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 6/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment Install-WindowsFeature -Name AD-Domain-Services -IncludeManagementTools 8. Set the following variables: $DomainName = "example-gcp.com" $DomainMode = "7" $ForestMode = "7" $DatabasePath = "C:\Windows\NTDS" $SysvolPath = "C:\Windows\SYSVOL" $LogPath = "C:\Logs" 9. Install the new Active Directory forest conguration in Windows Server 2016 mode: Install-ADDSForest -CreateDnsDelegation:$false ` -DatabasePath $DatabasePath ` -LogPath $LogPath ` -SysvolPath $SysvolPath ` -DomainName $DomainName ` -DomainMode $DomainMode ` -ForestMode $ForestMode ` -InstallDNS:$true ` -NoRebootOnCompletion:$true ` -Force:$true 10. When you're prompted, enter a Safe Mode Administrator password. Store the password in a safe location for future use. 11. Dismiss the following warnings. Each warning will appear two times, once during prerequisites verication and a second time during the installation process. WARNING: Windows Server 2016 domain controllers have a default for the security setting named Allow cryptography algorithms compatible with Windows NT 4.0 that prevents weaker cryptography algorithms when establishing security channel sessions. For more information about this setting, see Knowledge Base article 942564 (http://go.microsoft.com/fwlink/?LinkId=104751). https://cloud.google.com/solutions/deploy-fault-tolerant-active-directory-environment 7/17 8/23/2020 Deploying a fault-tolerant Microsoft Active Directory environment WARNING: This computer has at least one physical network adapter that does not have static IP address(es) assigned to its IP Properties. If both IPv4 and IPv6 are enabled for a network adapter, both IPv4 and IPv6 static IP addresses should be assigned to both IPv4 and IPv6 Properties of the physical network adapter. Such static IP address(es) assignment should be done to all the physical network adapters for reliable Domain Name System (DNS) operation. WARNING: A delegation for this DNS server cannot be created because the authoritative parent zone cannot be found or it does not run Windows DNS server. If you are integrating with an existing DNS infrastructure, you should manually create a delegation to this DNS server in the parent zone to ensure reliable name resolution from outside the domain "example-gcp.com".

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us