I’d like to isolate a DC from regular user authentication.  I only want certain applications/processes using it.  Obviously it will need to replicate with the other DC’s.  I don’t have an interface on the firewall to use, so I would probably have to do something software based on the DC itself.  Any recommendations on what to read, how to isolate it and what ports are required?

 

Bryan Lucas

Server Administrator

Texas Christian University

 

Reply via email to