How can I quickly converge the IPV4/V6 address usage information in an enterprise?
In many internal cases, the following events occur:
1. You need to track the usage of the overall IP address space;
2. You need to know which address is idle to quickly allocate to a new device or a dns srv record;
3. When the IP address range of the DHCP server is exhausted, an emergency address space is required;
4. If you change some parameters on the DHCP server, such as the proxy server, you want to apply them to all servers as soon as possible;
5. Update the range from the existing DHCP server to create an address space allocated to the subnet;
6. Collect statistics and records of users' obtained addresses for troubleshooting network faults.
Here we can use the IPAM feature of windows server 2012, which is a very practical function.
This IPAM application is described as follows.
I. Environment Information
1.1 What Can IPAM do?
650) this. width = 650; "width =" 746 "height =" 560 "style =" width: 577px; height: pixel PX; "src =" http://www.bkjia.com/uploads/allimg/131228/020I34415-0.jpg "border =" 0 "/>
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I3K12-1.jpg "border =" 0 "/>
1.2 device information
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I35J0-2.jpg "border =" 0 "/>
Ii. Case Process
2.1 deploy IPAM server
Disable IPAM deployment on DC
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I31D2-3.jpg "border =" 0 "/>
2.2 configure IPAM SERVER
Connect to IPAM
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I345J-4.jpg "border =" 0 "/>
Set IPAM
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I3D26-5.jpg "border =" 0 "/>
Add permission
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I32D6-6.jpg "border =" 0 "/>
Server discovery
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I360W-7.jpg "border =" 0 "/>
Enable server discovery
Manage and verify IPAM Access Permissions
650) this. width = 650; "src =" http://img1.51cto.com/attachment/201303/160027622.jpg "border =" 0 "/>
650) this. width = 650; "src =" http://img1.51cto.com/attachment/201303/081109636.jpg "border =" 0 "/>
View the added IPAM Group Policy
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I359E-10.jpg "border =" 0 "/>
Optional action: refresh Group Policy
Configure the IPAM server status to hosted
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I36125-11.jpg "border =" 0 "/>
The IPAM status is successfully updated.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I359D-12.jpg "border =" 0 "/>
View monitored server types
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I3H07-13.jpg "border =" 0 "/>
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I34455-14.jpg "border =" 0 "/>
After refreshing the data, view the existing address pool
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I35K4-15.jpg "border =" 0 "/>
Monitor DNS running status
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I35M1-16.jpg "border =" 0 "/>
Query address usage
Serial number |
Project |
Components |
Remarks |
1 |
Query Method |
IP-based |
|
2 |
Based on the identifier |
|
3 |
Client-based |
|
4 |
User-based |
|
Query the IP addresses obtained by domain users.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I33Y9-17.jpg "border =" 0 "/>
Client-Based Query
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I32K3-18.jpg "border =" 0 "/>
Based on IP Address
Through the IPAM review, we can see that this ip address has been used by three users, and the results are clear at a glance.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I33U3-19.jpg "border =" 0 "/>
You can also view the address Usage Details on the image interface through IPAM.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/020I3BV-20.jpg "border =" 0 "/>
OK. You have basically implemented IPAM to manage and monitor IP address usage. This is just a simple case. If you have any shortcomings, please forgive me.
This article is from the "server & security" blog, please be sure to keep this source http://ciscoart.blog.51cto.com/1066670/1163538