If it is performance as designed then you'll likely get the same response. You might get some way by raising a DCR but if use of HTTPS is the answer then that sounds like a reasonably easy fix
> On 5 Aug 2014, at 16:31, "Daniel Ratliff" <[email protected]> wrote: > > Hopefully we get a better answer. Will let you know. > > Daniel Ratliff > > From: [email protected] [mailto:[email protected]] > On Behalf Of Krueger, Jeff > Sent: Tuesday, August 05, 2014 10:19 AM > To: [email protected] > Subject: RE: [mssms] RE: Cross domain ConfigMgr Support > > Yep exact same thing we saw, it tries first to talk to the HTTPS MP and would > not fail over, and PE would error out because it couldn’t download policy. > MS support told us that was by design and we’d have to use a static boot > image or put a cert in our boot images. > > From: [email protected] [mailto:[email protected]] > On Behalf Of Daniel Ratliff > Sent: Tuesday, August 5, 2014 9:59 AM > To: [email protected] > Subject: RE: [mssms] RE: Cross domain ConfigMgr Support > > Ours is expected behavior too, except for one piece. Once it tries to hit the > DMZ MPs and failed, it should rollover to the HTTP MPs internally, but it’s > not. > > Daniel Ratliff > > From: [email protected] [mailto:[email protected]] > On Behalf Of Krueger, Jeff > Sent: Tuesday, August 05, 2014 9:44 AM > To: [email protected] > Subject: RE: [mssms] RE: Cross domain ConfigMgr Support > > We had a case open with Microsoft for the same issue, was told that it was > expected behavior. So we’re using static boot images, which ultimately is > not a huge issue for us (only a single primary) but still annoying. > > From: [email protected] [mailto:[email protected]] > On Behalf Of Daniel Ratliff > Sent: Tuesday, August 5, 2014 9:30 AM > To: [email protected] > Subject: RE: [mssms] RE: Cross domain ConfigMgr Support > > We have a case open with Microsoft for this exact issue. > > Having separate boot disks for all of our primaries is not an option. I think > we may end up just making all our MPs HTTPS. > > Daniel Ratliff > > From: [email protected] [mailto:[email protected]] > On Behalf Of CE5AR.ABREG0 > Sent: Tuesday, August 05, 2014 9:26 AM > To: [email protected] > Subject: Re: [mssms] RE: Cross domain ConfigMgr Support > > Sorry for highjacking the thread a little bit. > > If you do bare metal OSD with dynamic boot disk, make sure you do additional > testing. > > Behavior we have seen. When there is only one HTTPS MP, during WINPE client > will try contacting it first because it will be at the top of the list due to > preference and the client will not be able to download policies and display > any TSs. We are currently dealing with this issue. > > Unless we are missing something, the only way to get around this issue, it is > not to make the boot disk dynamic but when you have a CAS and multiple > primaries/domains you need to have one per primary. > > Fun stuff, I hope it helps or get input from others. > > Cesar A. > Meaning is NOT in words, but inside people! Dr. Myles Munroe > My iPad takes half the blame for misspells. > > On Aug 5, 2014, at 4:21 AM, David O'Brien <[email protected]> wrote: > > Just to add, never cut your clients in a secondary site off from the primary > site. Even if you have a management point in your secondary, upon > registration, the client will always talk to a primary site's management > point. No matter what command line parameters you're using to point it > somewhere else. > I had to learn that recently, you can't completely separate networks. > > Cheers > David > > Sent from my Windows Phone > From: Robert Marshall > Sent: 5/08/2014 8:29 PM > To: [email protected] > Subject: RE: [mssms] RE: Cross domain ConfigMgr Support > > Just to add further … the MP and SUP roles are not location aware, so once > you’ve got a site system with an MP and\or SUP into the DMZ you need to pay > some thought to controlling DMZ devices attempts to access CORP roles, and > the reverse from CORP to DMZ. > > The ConfigMgr agent could treat all those MP’s equal when performing > selection, you say you’ve got the forest split up into multiple domains, well > the ConfigMgr agent will select an MP based on Forest\Domain\Security Realm > (HTTP\HTTPS), so you may have a form of location ‘bounding’ in place for the > MP roles already. > > If you didn’t have that bounding taking place due to your Active Directory > design then you’d traditionally go with a Secondary Site server in the DMZ, > so as to ‘bound’ the MP and SUP usage, but this scenario has a drawback in > that your DMZ based devices will have to have a relationship with your > Primary Site servers Management Point(s), as well as the Proxy Management > Point, and that you can only put one of each role onto a Secondary so there > is no high availability options, either role fails and you fall back to a > (most likely) randomly selected role from the Primary. > You may be able to block all traffic going to and coming from the DMZ on > ports 80 and 8530\8531 at the DMZ’s bridgehead just to make sure device > traffic doesn’t hop out of the DMZ, or stuff comes into the DMZ, or, > introduce a ConfigMgr product extension called LocationAware that provides > full location awareness to these roles, and lock your ConfigMgr Agents into > specific MP’s and SUP’s. Think Boundary Groups for Management Points and > Software Update Points. I have to declare self-interest here as I wrote > LocationAware, but I’m certainly not herding you towards it, I’m also an ECM > MVP and ConfigMgr architect so I like to answer these questions where I can, > and go over what I can quickly recall around the area in question. I would > certainly look at how best to do this and fit my needs with existing product > or infrastructure design elements before venturing off to look at exotic and > advanced forms of control. To me it sounds like you are part way there. > > Robert > > From: [email protected] [mailto:[email protected]] > On Behalf Of Jason Sandys > Sent: 05 August 2014 01:27 > To: [email protected] > Subject: [mssms] RE: Cross domain ConfigMgr Support > > First note that there’s no reason to set up a site server at all for a DMZ or > an alternate domain. This can easily be handled by a site system – note the > difference between a site server and site system. Also, a site system can > happily exist in an untrusted domain so it’s really moot whether or not you > have a trust in place. > > To directly answer one of your questions though, yes, two domains within a > forest automatically have two-way trusts – this is simply part of them being > part of the same forest. But as mentioned, is irrelevant for this scenario. > > And finally, yes you could also treat the systems in the DMZ as Internet > based clients. > > J > > From: [email protected] [mailto:[email protected]] > On Behalf Of Beardsley, James > Sent: Monday, August 4, 2014 6:28 PM > To: [email protected] > Subject: [mssms] Cross domain ConfigMgr Support > > We’re looking at setting up a domain in our DMZ where some IIS servers (10-20 > at most) would reside and up until now, I’ve only ever managed one domain so > one of the items I’m researching is how we’d manage resources in a separate > domain with CM. One of the questions I had were about trusts. Would something > like the simplest scenario #1 in this blog post below require a trust between > the DMZ domain and our main domain where the CM primary site resides? > > http://blogs.technet.com/b/neilp/archive/2012/08/20/cross-forest-support-in-system-center-2012-configuration-manager-part-1.aspx > > Theres a statement where it says “In order to install and configure a child > site (primary or secondary), the child site server must be located in the > same forest as the parent site or reside in a forest that contains a two way > trust with the forest of the parent (CAS or primary)”. Am I reading that > correctly where as long as the two domains are in the same forest, we > wouldn’t need a two-way trust? How about a one-way trust? I don’t think we’re > going to put a child site in the DMZ domain unless we have to. I’d like to > see those servers be managed directly from the primary site but I’m not at > all familiar with cross-domain authentication. Understandably, certificate > management is a factor but just from an SCCM communication standpoint, would > something like this require a one-way, two-way, or no trust at all? > > Another idea I had was just manage the servers like they are laptops on the > internet. Is there any reason that wouldn’t work? Then they could just > communicate with CM through our external facing URL and no trust would be > needed at all. That would just require a lot of manual work to manage the > certificates and install the client so if it’s easier to do the method > described in the blog post, we’ll do that. > > Thanks in advance for your input. > > Thanks, > James > Confidentiality Notice: This e-mail is intended only for the addressee named > above. It contains information that is privileged, confidential or otherwise > protected from use and disclosure. If you are not the intended recipient, you > are hereby notified that any review, disclosure, copying, or dissemination of > this transmission, or taking of any action in reliance on its contents, or > other use is strictly prohibited. If you have received this transmission in > error, please reply to the sender listed above immediately and permanently > delete this message from your inbox. Thank you for your cooperation. > > > > > > > > The information transmitted is intended only for the person or entity to > which it is addressed > and may contain CONFIDENTIAL material. If you receive this > material/information in error, > please contact the sender and delete or destroy the material/information. > > > > CONFIDENTIALITY NOTICE: This email contains information from the sender that > may be CONFIDENTIAL, LEGALLY PRIVILEGED, PROPRIETARY or otherwise protected > from disclosure. This email is intended for use only by the person or entity > to whom it is addressed. If you are not the intended recipient, any use, > disclosure, copying, distribution, printing, or any action taken in reliance > on the contents of this email, is strictly prohibited. If you received this > email in error, please contact the sending party by reply email, delete the > email from your computer system and shred any paper copies. > > Note to Patients: There are a number of risks you should consider before > using e-mail to communicate with us. See our Privacy & Security page on > www.henryford.com for more detailed information as well as information > concerning MyChart, our new patient portal. If you do not believe that our > policy gives you the privacy and security protection you need, do not send > e-mail or Internet communications to us. > > > The information transmitted is intended only for the person or entity to > which it is addressed > and may contain CONFIDENTIAL material. If you receive this > material/information in error, > please contact the sender and delete or destroy the material/information. > > > > The information transmitted is intended only for the person or entity to > which it is addressed > and may contain CONFIDENTIAL material. If you receive this > material/information in error, > please contact the sender and delete or destroy the material/information. >

