Just to add further . the MP and SUP roles are not location aware, so once
you've got a site system with an MP and\or SUP into the DMZ you need to pay
some thought to controlling DMZ devices attempts to access CORP roles, and
the reverse from CORP to DMZ.

 

The ConfigMgr agent could treat all those MP's equal when performing
selection, you say you've got the forest split up into multiple domains,
well the ConfigMgr agent will select an MP based on Forest\Domain\Security
Realm (HTTP\HTTPS), so you may have a form of location 'bounding' in place
for the MP roles already.

 

If you didn't have that bounding taking place due to your Active Directory
design then you'd traditionally go with a Secondary Site server in the DMZ,
so as to 'bound' the MP and SUP usage, but this scenario has a drawback in
that your DMZ based devices will have to have a relationship with your
Primary Site servers Management Point(s), as well as the Proxy Management
Point, and that you can only put one of each role onto a Secondary so there
is no high availability options, either role fails and you fall back to a
(most likely) randomly selected role from the Primary.

You may be able to block all traffic going to and coming from the DMZ on
ports 80 and 8530\8531 at the DMZ's bridgehead just to make sure device
traffic doesn't hop out of the DMZ, or stuff comes into the DMZ, or,
introduce a ConfigMgr product extension called LocationAware that provides
full location awareness to these roles, and lock your ConfigMgr Agents into
specific MP's and SUP's. Think Boundary Groups for Management Points and
Software Update Points. I have to declare self-interest here as I wrote
LocationAware, but I'm certainly not herding you towards it, I'm also an ECM
MVP and ConfigMgr architect so I like to answer these questions where I can,
and go over what I can quickly recall around the area in question. I would
certainly look at how best to do this and fit my needs with existing product
or infrastructure design elements before venturing off to look at exotic and
advanced forms of control. To me it sounds like you are part way there.

 

Robert

 

From: [email protected] [mailto:[email protected]]
On Behalf Of Jason Sandys
Sent: 05 August 2014 01:27
To: [email protected]
Subject: [mssms] RE: Cross domain ConfigMgr Support

 

First note that there's no reason to set up a site server at all for a DMZ
or an alternate domain. This can easily be handled by a site system - note
the difference between a site server and site system. Also, a site system
can happily exist in an untrusted domain so it's really moot whether or not
you have a trust in place.

 

To directly answer one of your questions though, yes, two domains within a
forest automatically have two-way trusts - this is simply part of them being
part of the same forest. But as mentioned, is irrelevant for this scenario.

 

And finally, yes  you could also treat the systems in the DMZ as Internet
based clients.

 

J

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Beardsley, James
Sent: Monday, August 4, 2014 6:28 PM
To: [email protected] <mailto:[email protected]> 
Subject: [mssms] Cross domain ConfigMgr Support

 

We're looking at setting up a domain in our DMZ where some IIS servers
(10-20 at most) would reside and up until now, I've only ever managed one
domain so one of the items I'm researching is how we'd manage resources in a
separate domain with CM. One of the questions I had were about trusts. Would
something like the simplest scenario #1 in this blog post below require a
trust between the DMZ domain and our main domain where the CM primary site
resides? 

 

http://blogs.technet.com/b/neilp/archive/2012/08/20/cross-forest-support-in-
system-center-2012-configuration-manager-part-1.aspx

 

Theres a statement where it says "In order to install and configure a child
site (primary or secondary), the child site server must be located in the
same forest as the parent site or reside in a forest that contains a two way
trust with the forest of the parent (CAS or primary)". Am I reading that
correctly where as long as the two domains are in the same forest, we
wouldn't need a two-way trust? How about a one-way trust? I don't think
we're going to put a child site in the DMZ domain unless we have to. I'd
like to see those servers be managed directly from the primary site but I'm
not at all familiar with cross-domain authentication. Understandably,
certificate management is a factor but just from an SCCM communication
standpoint, would something like this require a one-way, two-way, or no
trust at all?

 

Another idea I had was just manage the servers like they are laptops on the
internet. Is there any reason that wouldn't work? Then they could just
communicate with CM through our external facing URL and no trust would be
needed at all. That would just require a lot of manual work to manage the
certificates and install the client so if it's easier to do the method
described in the blog post, we'll do that. 

 

Thanks in advance for your input.

 

Thanks,

James

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 

 



Reply via email to