ManageEngine DDI Central User Guide (1) - 1-232
ManageEngine DDI Central User Guide (1) - 1-232
Table of Contents
About ManageEngine DDI Central 5
System requirements 7
DNS64 134
DNSSEC 139
ManageEngine DDI Central is an comprehensive and easy to use DNS, DHCP and, IP
ManageEngine DDI Central helps you to discover and manage existing installation of
ISC-Bind9 and ISC-DHCP clusters. It can also be provisioned as new DNS and DHCP
clusters to manage the infrastructure. ManageEngine DDI Central has DNS and
DHCP bundled with the product and it gets deployed on your servers while installing
the product.
6
Table of Contents
DDI Console 1
ManageEngine DDI Central has two components DDI Console and DDI Node Agent
to be downloaded.
DDI Console
DDI Console provides centralized User Interface to manage all your DNS, DHCP
clusters and also helps to manage your IP address inventory.
configuration and provision new configuration changes from the DDI Console.
System requirements
8
Table of Contents
Software Requirements 3
Port Requirements 3
Database Requirements 4
Parameter Essential/Professional
RAM 32 GB
HDD 500 GB
ManageEngine DDI Central Node Agent is an small light-weight agent that has to be
Parameter Essential/Professional
RAM 24 GB
HDD 500 GB
Software Requirements
11
above
Port Requirements
12
Numbers
Central Console
Settings tab.
connect to the
PostgreSQL
database in DDI
13
Central node
Agent
communicates
connect web
console
Database Requirements
Note: In case of failover, please use PostgresSQL that has replication configured.
14
● TCP and UDP Port 53: Must be open for DNS query and response
traffic. DNS uses this port for both TCP and UDP protocols to handle
which the DHCP server listens for and responds to DHCP discovery
unavailable.
These port configurations are essential to allow the DDI Central system to
firewalls or network security systems are configured to permit traffic on these ports
Table of Contents
Licensing Information 8
Note:
ManageEngine DDI is available only for Linux platforms. ManageEngine DDI can
be deployed as an overlay for your existing Linux DNS and DHCP environment
that supports Internet Systems Consortium : ISC DHCP and ISC BIND9 DNS.
ManageEngine_DDI_Console_xxxx.bin where
17
./ManageEngine_DDI_Console_xxxx.bin -i console
4. Follow the instructions as they appear on the screen to successfully install DDI
./ManageEngine_DDI_Agent_xxxx.bin -i console
Follow the instructions as they appear on the screen to successfully install DDINode
an easy thing to do if you are working on a Windows box and want to install on a
Step 1: Execute the binary with administrator privileges (sudo) and -i console
option.
19
Step 2: Go through the license agreement and enter 'Y' to proceed. You can register
for technical support by providing the required details. (Name, E-mail ID, Phone,
Company Name)
20
Step 6: Verify the installation details and press 'Enter' to complete the installation.
22
23
i.e
During installation if you get an error message stating that the temp folder does not have enough
space, try executing this command with the -is:tempdiroption, where is the absolute path of an
existing directory.
./ManageEngine_DDI_xxxx.bin -is:tempdir
./ManageEngine_DDIr_xxxx.bin -i console
After ensuring service is started successfully, you can connect the web client using
http://server_ip:9090
https://server_ip:9443
Central.
Console Server is the name of the machine on which DDI Console Server is
admin/admin
Licensing Information
● Essential Edition
25
Manage 1 DNS Cluster(3 servers max), 1 DHCP Cluster(2 Servers max), 5 DNS
Zones, 5 IP Subnet, 1 User, and IPAM. This is entry level edition with basic DNS,
Professional edition.
● Professional Edition
other clusters configured within DDI Central. Each cluster you add has its own
DHCP manager.
A single cluster can accommodate any number of DNS servers and DHCP servers.
26
However, ManageEngine DDI enables you to add only one Primary DHCP server for
each cluster and the rest of DHCP servers act secondary servers configured under
Essential Plan:
The Essential plan includes one DNS cluster and one DHCP cluster. With the single
DNS cluster, you can add up to three DNS servers into the DDI Central console.
Similarly, the single DHCP cluster allows for the addition of up to two DHCP
servers.
These servers can be grouped together within a single cluster or distributed across
Professional Plan:
The Professional plan provides two DNS clusters and two DHCP clusters. This way
you can add up to six DNS servers and four DHCP servers in total. You have the
27
creating multiple clusters. You can configure the clusters in any combination that
You can also purchase additional DNS clusters, DHCP clusters, subnets, zones, and
users as add-ons. Please refer the ManageEngine Store page to check the prices of
Once installed, DDI Central runs in evaluation mode for 30 days. You can obtain a
registered license for DDI Central at any time during the evaluation period by
contacting DDI Central Support. If you have not upgraded to the Licensed Edition by
the end of the evaluation period, DDI Central evaluation license expires and you will
2. Click Admin logo/icon in the top right corner of the web client.
4. In the License window that opens up, browse for the new license file and
select it.
Note : The new license is applied with immediate effect. You do not have to shut
down or restart the DDI Central server after the license is applied.
run ManageEngine DDI Central in any environment like Windows using your VM
software.
Prerequisites
Virtual machine software like: VirtualBox, VMware, Hyper V, and KVM
● You will be greeted with a boot menu similar to the image below. Choose Live
System (amd64) to begin the Debian installation process. This live ISO image
You will reach a desktop environment, where you will see an unlisted desktop
This will take you to a different screen that will ask you for the Username. Enter the
username as root.
On entering the username, you'll be prompted to enter the password. Now, enter the
password provided by the DDI support team via a dedicated email sent for
Note: The password sent via email is only temporary. You should reset it in the steps
On successful login, you can install Debian onto the virtual machine's hard drive by
locating and double-clicking the Install Debian icon on the desktop, as shown in the
33
image below.
Now, the welcome screen of the Calamares installer appears. Here, choose the
Select your location and timezone from the respective dropdown menus and click
Next.
36
Choose your keyboard layout from the Keyboard Model dropdown menu. For an
7. Disk partitioning
38
okay with wiping the entire virtual disk, select Erase disk. This will delete all
● Confirm that the bootloader is installed to the correct location, typically the
Create a user account. Fill in the desired username and password, which will be used
40
The image below summarizes your choices. If all the details are correct, proceed by
clicking Install.
41
42
As shown in the image below, the installation process will begin. The progress bar
will indicate how far along the installation is. Wait for it to complete. After the
installation process completes, you will usually be prompted to restart the VM.
Note: Upon reboot, ensure to remove the installation ISO from the VM's settings to
Once Debian is installed, you can login to your new user account with the username
44
After successfully installing Debian, you can now set up ManageEngine DDI Central
On the terminal window, reset the temporary root password from Step 2 following
● Gain SuperUser access by entering the command sudo su to switch to the root
user. You will be prompted to enter the password for your current user (the
● Once you are logged in as root, reset the root password by typing the
command passwd. You will then be prompted to enter a new root password.
● After entering passwd, you’ll be asked to enter the new password twice to
confirm.
● Navigate to the directory where your application's .bin files are located
● cd /opt/ManageEngine/ddi/bin/
47
You might need to change the permissions of the scripts to make them executable.
Note: Use the chmod command as specified below, introducing a / (slash) anywhere
chmod 777 *
This command grants read, write, and execute permissions of all files in the current
directory.
49
● This executes a shell script named PostInstallation.sh with two arguments, 9090
and 9443, which are http and https port numbers that the script needs to
50
If you encounter errors, you can seek support from the ddi-support team.
Once the installation is complete and all configurations are set, start the application
services. Use the command systemctl for this purpose: systemctl start DDI
51
interfaces and IP addresses. From the response generated, the IP address near
inet shows the IPv4 address assigned to the interface. This is the ip address
that is used to run the DDI application using the web browser.
52
● The netmask indicates the network mask for the IP address, defining which
portion of the address is the network and which part is the host.
Note: Make sure that the correct ports are open and listening for the application to
● Ensure that the application is running by accessing its web GUI through the
browser.
● Example: Using the IPv4 address and the port number from the image. DDI
http://172.21.252.47:9090/ or http://172.21.252.47:9443/
expected.
Note: DDI Console and DDI Node Agent cannot run in the same machine.Please
ensure to install DDI Node Agent in a different machine you want to manage.
Navigate to the directory where your application's .bin files are located using the cd
cd /opt/ManageEngine/ddiagent/bin/
54
You might need to change the permissions of the scripts to make them executable.
Note: Use the chmod command as specified below, introducing a / (slash) anywhere
55
chmod 777 *
This command grants read, write, and execute permissions of all files in the current
directory.
56
● This executes a shell script named PostInstallation.sh with two arguments, 9090
and 9443, which are http and https port numbers that the script needs to
If you encounter errors, you can seek support from the ddi-support team.
Once the installation is complete and all configurations are set, start the application
services. Use the command systemctl for this purpose: systemctl start DDI
57
interfaces and IP addresses. From the response generated, the IP address near
inet shows the IPv4 address assigned to the interface. This is the ip address
that is used to run the DDI application using the web browser.
58
● The netmask indicates the network mask for the IP address, defining which
portion of the address is the network and which part is the host.
Note: Make sure that the correct ports are open and listening for the application to
Getting Started
To get started with ManageEngine DDI Central,
1. Add Clusters
2. Add Servers
Adding Clusters
Upon successful signup, the first glimpse within the DDI Central UI reveals an empty
59
dashboard. To get started, create clusters and add your DNS and DHCP servers to
● The Add Cluster window appears prompting you to enter the name and type
● Clusters are logical groupings of servers - DNS, DHCP or both organized for
you add has its own internalized IP address plans, IP inventory, IP Address
● After making the necessary selection, click Save to create the cluster.
61
Once the cluster is created you will be directed to the servers page where you'll be
Servers can be added to the DDI Clusters using the Discovery mode or can be set up
manage DNS, DHCP and IPAM services on your network infrastructure from scratch
as you install
Adding Servers
Table of Contents
Creating Servers
Creating Servers
page to add your DNS and DHCP servers. If not, you can add servers by
selecting the Settings menu from the menu bar along the left side of the
● On the Servers page, click the Add Server button on the top left
corner.
● The Create Server page appears on the screen. Here, you can add your
or by simply adding the server to the DDI Central console and configure
1. SERVER NAME: A required field where you assign a unique name to the server
Note: No two servers in the same or different clusters can have the same
name.
2. TYPE: Select the type of server being set up, such as DNS, DHCP, or both
65
4. AGENT HTTP PORT: Specify the port number used by the DDI Central Node
5. AGENT HTTPS PORT: Specify the port number used by the DDI Central Node
Specify any one of the options :DNS, DHCP, or Both to discover all the
Specify No if you just want to add and setup a new server from the scratch.
You can setup the required DNS, DHCP or combined configurations to your
server to get it configured through the user-friendly DDI Central user interface
later.
Choose any one of the three options: DNS, DHCP, Both, for the Discover
Existing Configurations?
Note: Selecting either DNS or DHCP will result in the discovery of only the
both DNS and DHCP servers are discovered at the same time for DDI Central
Provide the essential Config Path and the Zone File path for the DNS servers,
while providing the Lease Path and the DHCP server path for the DHCP
servers.
8. You can add new servers to DDI Central console and enable ManageEngine
68
DDI Central to implement, configure, and manage DNS, DHCP and IPAM
As DDI Central has DNS and DHCP bundled with the product and it gets
option.
9. APP CONSOLE: Enter the static IP address of the central server that hosts the
connection between the central DDI Central console server and the Node
10.HTTP PORT: Specify the port number of the central DDI Central application
11. HTTPS PORT: Specify the port number of the central DDI Central application
12. Click Save to add the server into the ME DDI Central console.
DDI Central will begin to discover configurations from the designated paths
on the volume of configurations in the servers. Wait until the whole process
completes.
Once you add your server into the DDI Central console you can further
DDI Central Admins can configure to send email using a particular SMTP host.
70
● Configure the SMTP host, sender address, and optional username and
password.
either TLS (Transport Layer Security) or SSL (Secure Sockets Layer), both of
2. HOST: Provide the FQDN(Fully Qualified Domain Name) of your mail server in
3. PORT: The port number used for SMTP connections. It's set to 587 for TLS, 465
for SSL. If no encryption protocol is chosen the port number switches to the
Note: Port 25 does not imply any encryption and is often used for relaying
emails across servers. Due to its lack of security features, it's generally not
4. FROM ADDRESS: A valid sender email address DDI uses to send mails incase
6. USERNAME: The username for authenticating with the SMTP host, often the
cluster, set up a Contact group under the cluster by selecting Settings-> Contact
groups.
Adding Users
● Select Settings->Users.
● Under the User Management tab, click on the Add User button in the right
corner.
73
● Enter the essential details of the user, including Name, Username, email, and
password. You can enable or disable the login for this particular user. Set Yes
to enable the login. Enable the TOTP login for the user to add an extra layer of
security.
● DDI Central provides two roles: Admin and Operator. The Admin role has
unrestricted access, while the Operator role has limited access, which can be
● Click Save.
74
● Provide the Username, Password, and URL for the other users you've added.
Make sure they login using the URL from their web browser.
● Once they login they'll be prompted to reset their password and login to the
authentication (2FA) for all users associated with your organization. This
secret code displayed on the DDI Central login page or by entering the
app. The OTP adds an extra layer of security and can be generated
6. Upon first accessing DDI Central, all users except the Admin who
accounts is secure, combining something the user knows (their password) with
User permissions
-
Create, update, and delete user
76
Add, update, and delete zones Update zone if operator has zone
permission
the operator
the user
Add, update, and delete records in zone Add, update, and delete records in zone
Add, update, and delete named options Add, update, and delete named options
Add, update and delete dhcp options Add, update and delete dhcp options if
Add, update, and delete custom options Add, update, and delete custom options
Add, update, and delete subnet, shared Add, update and delete subnets, shared
network, client class, host, host group network, client classes, host, host group
permission
Add, update and delete supernet Add, update and delete supernet if
Add, update, and delete failover Add, update, and delete failover if the
Enable, add, update, and delete named update named_view if operator has
Add, update and delete DHCP Zone Add, update, and delete DHCP Zone if
Add, update, and delete records in Update view if operator has zone
79
views permission
User Audits
The User Audit tab can be accessed by selecting the Audit menu from the left
menu bar. The User audit tab helps you monitor your users' login activities by
capturing the username, date, and timestamp of the latest login activities.
80
DDI Central enables you to group specific users under your organization to create
special contact groups. You can associate the relevant contact group to be notified
1. Select Contact from the left menu bar. In the Contact page, under the
Contact Groups tab, CloudDNS displays the list of contact groups created
4. For the group email, add the list of email ids of the members to send
notifications to, one by one, and click Add after each selection.
5. Select the required clusters one by one and click the Add button after each
displays the list of members in the Contact Group as well as the list of
Associated Clusters.
7. To dissociate any cluster or contact from the Contact Group, click on the Edit
82
button on the extreme right. From the Edit Group window, deselect the email
ids or the clusters using the minute close button at the top right corner of
each selection.
Monitoring servers
To monitor the load and performance of your DNS and DHCP servers:
Select Settings-> Servers . The Servers page appears listing the servers added.
First it displays the status of the DNS, DHCP4, and DHCP6 services of the cluster.
83
84
DDI Central also gives a visual snapshot of a different part of your server's load,
health and performance. CPU, memory, and disk percentages of your server
represent different aspects of the server's system resource usage, each playing a
between them can help diagnose performance issues or guide system upgrades.
1. CPU Percentage
85
the CPU.
system's RAM is being used. If the server runs out of RAM, it starts using
usage can slow down the system, cause programs to respond more
● Definition: Disk usage percentage shows how actively the server's hard
drive (or SSD) is being read from or written to. It’s different from disk
● Implications: High disk activity can indicate that a lot of data is being
transferred to and from the storage device. This could be due to various
applications, or because the server is using the disk for virtual memory.
Prolonged high disk usage can slow down the server, as the disk is
For optimal performance, it's crucial to have a balanced server where no single
underutilized if the server doesn't have enough RAM or if the disk is too slow to
provide data quickly. Similarly, having a lot of RAM is less useful if the CPU isn't fast
enough to process the data held in the RAM, or if the disk is too slow to load new
data into the RAM efficiently. Regular monitoring of these percentages can help in
crucial for ensuring that websites and online services are accessible, reliable, and
secure. It involves tasks like configuring DNS records (such as A, AAAA, CNAME, MX
records), managing domain names, setting up reverse DNS, and ensuring DNS
tasks, handle large volumes of DNS traffic, and protect against DNS-related attacks.
Good DNS management also plays a key role in optimizing website performance and
DDI Central enables you to add new DNS servers through a special mode called the
DNS Domain Migrations mode. When using this mode, it is necessary to skip the
Configurations option.
This approach is particularly advantageous when integrating a new DNS server that
manages a vast number of domains. These domains can be added to your existing
The DNS Domain Migration mode facilitates the rapid inclusion of all domains or the
selective migration of specific domains from the server being added. If you choose
None, the new DNS server will be incorporated into your DDI cluster without any
domains, allowing you to configure zones and other settings manually at a later
stage.
89
recognized as Primary or Secondary within your cluster, and click Save to begin the
migration process. As this can take some time, it is advisable to wait for further
Add Domain
On clicking the Add Domain button, the Create Domain page appears as shown
below.
In the Create Domain page enter the value for the fields based on the descriptions
below.
91
1. NAME: Name the new domain name you wish to create or manage.
2. TYPE: Select the type of DNS zone. DDI Central offers three types of Zones:
Authoritative.
Authoritative: This type indicates that the DNS server has the authority to
answer queries for the specified domain with authoritative data. This means it
holds the actual DNS records, such as A records, MX records, and so on, for
the domain. It is the definitive source for information about that domain, and
Note: The type of the domain once chosen cannot be updated. To update the type
3. TTL (Time to Live): Specifies the resolving servers how long to cache
5. EMAIL: Enter the email address of the domain administrator or the personnel
7. RETRY: Incase the secondary nameserver fails to reach the primary, this value
nameserver will attempt to contact the primary nameserver. After this period,
9. MINIMUM: Specifies the minimum TTL that tells the resolving servers how
used.
11. MASTER(S): Specifies the master DNS server for the zone. In a primary-
secondary setup, the master server is where the zone records are originally
12. SLAVE(S): Specifies secondary or slave DNS servers. These servers get their
13. DDNS: Dynamic DNS allows for the automatic updating of a name server in
93
14. Failing to enable DDNS here, you can alternative enable DDNS by navigating
to DHCP-> Domains, Add the domain there and specify the TSIG key for secure
dynamic updates.
Click the Save button at the bottom to create or update the domain with the
Import Domains
DDI Central enables you to bulk import records into the DDI Central console using
On clicking the Import button, the Import Domains window appears on screen.
94
On the Import Domains window, enter the values for the following fields:
1. ZIP FILE: Upload the ZIP file containing domain information in a specific
2. TYPE: Specify the type of DNS zone being imported. The default option
3. MASTER(S): Select one or more master DNS servers. The master server would
be the primary source of data for the zones being imported and would handle
4. SLAVE(S): Similar to the MASTER(S) field, select one or more slave (or
secondary) DNS servers. Slave servers receive zone data from the master
different sets of clients based on some pre-defined criteria. For example, you
might have an "internal" view for clients on your local network and an
6. IMPORT: Once all fields are filled out and you are ready to import the domain
The two methods discussed above can help you create authoritative zones.
commonly used for services such as email servers to verify that an IP address maps
(Pointer) record in the reverse DNS zone. This zone is named after the reversed IP
address in the case of IPv4, and after the reversed nibbles of the IP address in the
case of IPv6. Reverse zones can only be configured for authoritative zones.
Follow the steps below to create reverse authoritative zones for IPv4 addresses.
Prerequisites
● Determine the subnet for which you want to create the reverse zone.
1. Create a reverse authoritative zone just like how you create a standard
2. However while entering the reverse zone name, make sure to derive it from
your IP block in reverse order, followed by .in-addr.arpa. For example, for the
97
addr.arpa.
3. Create PTR (Pointer) records within the reverse zone. PTR records map the IP
4. You can enable DDNS Dynamic updates. Ensure the DHCP server is in the
same network as the Zone. This automates the creation of PTR records,
configure the DHCP options to allow dynamic updates from the DHCP server
to the domain.
5. If you want to secure the reverse zone with DNS Security Extensions
(DNSSEC), you can sign the zone to generate the necessary keys and signing
policies.
ensure that the PTR records are correctly resolving to their respective domain
names.
For IPv6 addresses, the process is similar to IPv4, but the notation and the domain
used for reverse DNS delegation are different. The domain used for IPv6 reverse DNS
is .ip6.arpa.
Here is how you derive the reverse zone name from an IPv6 address block:
Let's say you have an IPv6 address block of 2001:0db8:85a3::/48. To create a reverse
1. Expand the IPv6 address: Write out the full IPv6 address, filling in any
3. Remove the bits beyond the prefix length: Since the prefix is /48, you keep
only the first 48 bits (which correspond to the first three blocks of the IPv6
address).
5. Reverse the nibbles: Split the address into individual hexadecimal digits
7. Add the .ip6.arpa domain: Append this reversed string of nibbles to .ip6.arpa.
DNS Zone Forwarding or Forward Zones in DDI Central refers to the process of
redirecting queries for a specific DNS zone to another DNS server. This is typically
used when a DNS server is not authoritative for a particular zone but is configured to
pass queries for that zone to a server that is. This zone doesn’t contain actual DNS
1. Select the DNS menu from the menu bar along the left side of the
2. Click on Add Domain and choose the type of the domain as Forward Zone.
3. The Create Domain page will appear as shown below with the following
100
fields:
NAME: Enter the name of the domain that you want to create.
FORWARDERS: In this field, add the IP address of the DNS servers to forward
queries to.
DNS SERVER(S): Here you select the server that will be authoritative for the
101
VIEW: Allows you to select a DNS view, which can provide different data
responses based on the source of the DNS query. You can configure views for
forward zones in DDI Central. This would allow you to specify different
forwarding behaviors based on the client making the request. For example,
Note: Certain configurations like DDNS and DNSSEC do not exist for Forward zones.
RPZ (Response Policy Zone) allows a nameserver to modify DNS responses based
on policies. It's often used for implementing security measures, such as blocking
policies. When a query matches an RPZ policy, the DNS server can return a different
A DNS Firewall using Response Policy Zones (RPZ) is a powerful mechanism in DNS
servers for implementing custom security policies. It's often used for implementing
or applying other customized policies. When a query matches an RPZ policy, the
DNS server can return a different answer than what is stored in the authoritative
1. Intercepts DNS Queries: When a client device makes a DNS query, the DNS
Firewall with RPZ intercepts this query. It then checks the requested domain
2. Uses Policy Zones (RPZs): RPZs are special DNS zones that contain lists of
domain names along with the policy actions to be applied to them. These can
3. Overrides Standard Responses: Based on the RPZ rules, the DNS Firewall can
modify the standard DNS response. For instance, if a client requests a domain
that is listed in the RPZ as malicious, the DNS Firewall can redirect it to a safe
103
third-party RPZ feeds, which are regularly updated lists of harmful domains.
6. Logging and Reporting: DNS Firewall RPZs can log queries to blocked
security measures.
● Go to DNS-> Domains . Click on Add Domain button on the top right corner.
● On the Create Domain page, Choose the type of the domain as Response
104
● You can create the RPZ just like how an authoritative zone is created and the
records are added. It is just you are controlling the local access to a publicly
● Configure various types of individual records for the RPZ offered by DDI
Central, so that whenever a client in your network queries for any subdomain
● DDI Central logs the queries to the RPZs and the different views configured for
105
it. All the stats can be visualized under DNS-> Analytics page.
apply a variety of DNS options to RPZs to have a granular control over the
● DNS Firewall with RPZ is a proactive tool for enhancing network security by
thereby safeguarding the network from various online threats and undesirable
content.
Resource Records (RRs) are the fundamental information elements of the Domain
Name System (DNS). Each RR defines a specific piece of information about the
2. Type: The type of the resource record, which defines the type of data
3. TTL: Time to Live, which specifies how long the record should be cached by
DNS resolvers.
4. RDATA: Resource Data, the data of the resource record, varies according to
The combination of these elements within a DNS record allows DNS servers to
accurately resolve queries by clients for various services related to a domain, such as
The following are the types of resource records supported by DDI Central:
IPv4 network.
2. AAAA (IPv6): Address record similar to the A record but for IPv6 addresses,
name, allowing multiple DNS records to map to the same server without
specifying IP addresses.
priority level.
which is responsible for presenting information about the domain's DNS zone.
8. PTR (Pointer): Used primarily for reverse DNS lookups, mapping an IP address
services, containing the hostname and port number for services such as VoIP,
108
IM, etc.
11. TXT (Text): Allows administrators to insert arbitrary text into a DNS record.
1. Click on the domain name of your choice from the list of the domains that
2. This will take you inside that particular domain, displaying various types of
3. Select the relevant record type you'd like to configure for your domain and
click on it.
4. To create a new record under the chosen record type, Click on the blue Add
button at the extreme right corner of the table header under the chosen
record type.
local resolver ought to cache the response for a record before requesting a
new one. The default is set to 86400 but can be modified as per your
domain's requirements.
7. DDI Central enables you to configure multiple hosts to provide responses for
a domain by clicking Add IP. To configure multiple hosts for a DNS record
DDI Central enables you to quickly create all of the records for your zone by
importing a zone file in BIND format, that represents zone files in a text format.
Importing
To create DNS records by importing a zone file in BIND format:
1. Get the zone file exported and saved as BIND file from the other DNS server
2. In the DDI Central, create a new zone or select a zone by clicking on its name.
3. Once you are inside the new zone, click the Import button in the top right
corner.
Click the Import button at the bottom to start importing. You may have to wait a
few minutes for the records to be created as it depends on the number of records in
Exporting
The same process is followed to export your zone files in DDI Central. Click the
Export button in the top right corner. On clicking the Export button, the zone files
are automatically downloaded as text files with the respective domain name in
BIND format.
DNS views or Domain views serve different responses to DNS queries based on
various criteria, most commonly the source of the query or the host accessing it.
This indicates that the DNS server can present one set of DNS information to one
group of clients and a different set to another group, based on predefined views.
113
DDI Central enables you to create multiple views and name them for better
identification
Select the DNS menu the left menu bar. Now select Views from the submenus that
1. Select the DNS menu from the menu bar along the left side of the screen.
3. If views have never been enabled for any of the existing zones, the screen will
4. Clicking on the Enable View button now will move all the existing domains to
a Default view. Clicking Yes will create a Default View entry in the Views page.
Here you can see under the match client field holding the value any,
Default View
Default view for a domain refers to the unnamed or implicit view that is used
when no specific view has been defined for a set of DNS queries. In the default
view, BIND handles DNS queries as any standard DNS server would, without
applying different rules or data sets based on the query source. It simply
116
In more complex configurations where named views are used, the default
view can still exist. It would handle any queries that don't match the criteria of
the named views. For example, if there are views for internal and external
networks, the default view could handle queries from sources not covered by
5. To create a named View, click on the Add View button in the top right corner.
7. For the Match Clients field, input the list of IP addresses or specify named
9. Once all the necessary information is provided and options are selected, click
Save.
network) the view applies to. It can be used to differentiate between internal
118
3. Recursion: Controls whether the server will perform recursive queries for
clients using this view. This can be enabled for internal clients and disabled
for clients that match the view. This can redirect query traffic based on client
the views are defined in the configuration file determines which one finally
applies.
clients that match the view. This might be enabled for external views to
119
Table of Contents
Dynamic DNS (DDNS) can be enabled for various types of zones where it is necessary
120
to dynamically update DNS records without manual intervention. Here are the types
1. Primary Zones:
the DNS records are stored and managed directly on the authoritative
DNS server.
● With DDNS, clients such as DHCP servers or DHCP clients can add,
often used for automatically updating the DNS records of hosts as they
2. Secondary Zones:
secondary zones can receive updates indirectly via zone transfers from
3. Reverse Zones:
121
● When creating a domain via Domains -> Add Domain , enable DDNS and
assign a TSIG key for secure dynamic updates. If DDNS is not enabled at this
● On the Domains page, Click on the Add Domain button in the top right
corner.
122
Note: For your DHCP server to provision network parameters like IP addresses to
your domains make sure your Domains and DHCP server are in the same network
address.
Dynamic DNS (DDNS) allows the automatic updating of a DNS record when an IP
123
address changes. This is often used for hosts with dynamic IP addresses assigned by
a DHCP server.
● Enable DDNS for the zone via one of the methods discussed above This would
automatically enable the following DHCP options for the domain: ddns-
● Now select the subnet that you would like to provision IP addresses to the
domain. Within that subnet specify the option domainname and specify the
domain name you would like to create hosts to via dynamic updates like:
automatically create an A record with a host name assigned to it. the host
mapping zone. Upon enabling DDNS, the DNS server will automatically
generate a AAAA record for the zone. Within the AAAA record you can find the
host name that holds dynamically variable IPv6 address provisioned by the
DHCP server.
125
generate PTR records that correspond to the hostnames within the authoritative A
Example:
enabling DDNS, the DNS server will automatically generate a PTR record within this
reverse zone. These PTR records will correspond to the hostnames defined in the
linked.
126
The PTR record's name is the reverse of the IPv4 address appended to in-addr.arpa.
The reverse zone name 1.1.1.in-addr.arpa. would be the reverse of the assigned IPv4
address and the corresponding PTR record within that zone points to
host.check.com. which is the hostname of the system that was assigned the IPv4
address. This enables reverse DNS lookups, where querying the IPv4 address in
127
Domain Scavenging
process of cleaning up stale DNS records that remain idle over time in the DNS
records, such as those for IP addresses no longer in use, and can help prevent DNS-
related issues such as name resolution conflicts and unwanted bloats in the DNS
database. This practice is essential for maintaining an accurate and efficient Domain
1. Purpose: Scavenging helps remove stale resource records from DNS, which
servers are configured to periodically scan the DNS records and remove those
3. Aging and Refresh: Scavenging relies on two key concepts: the aging of
records and the refresh of these records. When a DNS record is created or
frequency at which the DNS server checks for stale records. If a record is older
than the aging period by the time of this check, it will be notified to the user
5. Prevents DNS Bloat: Regular scavenging prevents the DNS database from
becoming bloated with unnecessary records, which can slow down DNS
clients come and go, their DNS records need to be updated or removed to
also enhance network security. Stale DNS entries can be a security risk, as
actors.
Domain scavenging is a crucial maintenance activity for any network that uses DNS
and DHCP. It helps ensure that the DNS database remains up-to-date and free from
Note: Scavenging can be configured only for A, AAAA. CNAME, PTR and TXT
● Select the DNS menu from the menu bar along the left side of the screen.
● First configure scavenging for your DNS infrastructure under the Configure
tab.
● On the Configure window that appears, the top field SCAVENGING PERIOD
is meant for all the A, AAAA. CNAME, PTR of the domains selected. This is the
duration after which a DNS record becomes eligible for scavenging if it has
not been refreshed. If the DNS record still remains un refreshed after this
period, DNS server considers the record stale and eligible for deletion and put
● SCHEDULE INTERVAL: This dropdown menu allows the user to select how
often the scavenging process should be scheduled to run. The options could
● DOMAINS: Here, you can specify which domains are subject to the
● Once it detects stale records, the records will be displayed in the reports
section. Depending on the current state of the records, the user can delete it
DNS64
IPv6-only clients and IPv4-only servers. This is especially important in the context of
the ongoing transition from IPv4 to IPv6. Since these are two different protocols and
not directly compatible, mechanisms like DNS64 are essential for interoperability.
Configuring dns64 option involves setting up a DNS server that can synthesize
AAAA records (IPv6 addresses) from A records (IPv4 addresses) when no native
AAAA records are available. This configuration is typically done on a DNS server
DNS64 works by prefixing an IPv4 address with a specific IPv6 prefix. This prefix is
usually a /96 prefix, which leaves room for the entire IPv4 address. A common prefix
1 options {
135
2 // other options...
3 dns64 64:ff9b::/96 {
4 clients { any; };
6 };
7 };
In this configuration:
from all clients. You can restrict this to certain clients or networks if necessary.
● On the DNS options page, click on the Options drop down box to search for
dns64 option.
● The dns64 option appears with all its attributes. Fill in the values for each
136
netprefix: This is the IPv6 prefix that is used to synthesize AAAA records. It's
typically a /96 prefix, and the IPv4 address is appended to this prefix to create the
IPv6 address in the synthesized AAAA record. Example value: dns64 64:ff9b::/96 {
... };
break-dnssec: This attribute, when set, allows DNS64 to synthesize AAAA records
137
even for DNSSEC-signed domains. This can potentially break DNSSEC validation, as
the synthesized AAAA record does not actually exist in the DNS. Example value:
break-dnssec yes;
clients: Specifies for which clients the DNS64 rule applies to. You can define a
match list of IP addresses or subnets from which the clients are allowed to use
exclude: Used to define IP address ranges for which DNS64 should not synthesize
AAAA records. This is useful for networks or hosts that are reachable over native
recursive-only: When set to yes, DNS64 synthesis is performed only for recursive
recursive-only yes;
mapped: This attribute controls whether DNS64 synthesis is applied to domains that
have both A and AAAA records. If set, it will synthesize AAAA records even if native
suffix: This optional attribute specifies a suffix to append to the synthesized IPv6
address. It's rarely used as the default behavior (without a suffix) is generally
138
protect the Domain Name System (DNS), a critical component of your network
integrity, implementing response rate limiting (RRL) to mitigate DDoS attacks, and
software updated, and using access control lists (ACLs) to restrict unauthorized
reliability and trustworthiness of DNS services, crucial for the seamless operation of
DNSSEC
Name System (DNS). It is designed to protect against a range of DNS attacks such as
site.
1. Integrity: DNSSEC ensures that the information you receive from a DNS query
140
2. Authentication: It provides a means to verify that the source of your DNS data
3. Trust: By building a chain of trust from the root DNS servers down to the
specific DNS entry for a domain, DNSSEC prevents attackers from inserting
● Digital Signing: DNSSEC works by digitally signing these records for DNS
lookup using public-key cryptography. Each DNS zone has a private key that is
used to sign the zone's DNS records, and a public key that is used to validate
the signatures.
● Chain of Trust: Starting from the DNS root zone, each level of the DNS
hierarchy has its own pair of keys and signs the keys for the level below it,
● Validation: Resolving name servers, which are configured to use DNSSEC, can
then validate these signatures using the public key, ensuring that the DNS data
verify the authenticity of DNS data, DNSSEC adds a layer of security to the domain
To enable DNSSEC:
particular zone. Navigate to the domain of your choice and click on the
DNSSEC button with the icon of an opened lock on the top right corner.
142
DS record are created automatically within the zone. DDI Central displays the
DNSSEC key tag, algorithm, digest type, digest under DS Records, flags
along with a public key, Key Signing Keys(KSK), Zone Signing Keys(ZSK)
143
associated with the particular zone. Copy these details in your clipboard as
● You can also see the Unsign button with a closed lock on the top right corner
● You can also revoke DNSSEC for a particular zone by clicking the Unsign
mitigate the impact of Distributed Denial of Service (DDoS) attacks, particularly DNS
amplification attacks. It works by limiting the rate at which DNS responses are sent
When a DNS server receives an unusually high volume of requests, possibly as part
144
of an attack, RRL kicks in to restrict the number of responses sent back to any given
requester over a specified period. This helps to prevent the server from being used
On the DNS options page, click on the Options drop down box to search for rate-
limit option.
The rate-limit option appears with all its attributes. Fill in the values for each attribute
per second.
second.
for aggregating IPv4 and IPv6 addresses. This dictates how broadly the rate
For example, ipv4-prefix-length of 24 means that the server will apply rate limits
to all addresses in each /24 subnet as a group. Therefore, all requests originating
from the 192.168.1.0/24 subnet, for instance, would be collectively subject to the
exempt from rate limiting. This is often used for trusted networks.
actually enforcing the limits. This is useful for testing the configuration.
larger table can track more clients but requires more memory.
second.
147
13. slip: Defines the behavior when a rate limit is exceeded. Typically, every nth
The slip setting determines how often the DNS server will send a truncated
effect. A truncated response is a response that tells the querying client that it
should retry the request over TCP instead of UDP. Since TCP connections
require more resources to establish, attackers are less likely to use them,
1. Value 0: The server will drop all responses that exceed the rate limit.
2. Value 1: The server will send a truncated response for every request
Values 2 and higher: The server will send truncated responses for one out
of every 'slip' number of requests that exceed the rate limit. For example, if
the slip value is set to 2, then the server will send a truncated response for
14. window: The time period, in seconds, over which BIND calculates the rate of
Example
1 rate-limit {
2 responses-per-second 10;
3 window 5;
4 ipv4-prefix-length 24;
5 ipv6-prefix-length 48;
6 slip 2;
7 nxdomains-per-second 5;
8 nodata-per-second 5;
9 errors-per-second 2;
10 all-per-second 20;
11 max-table-size 100000;
12 exempt-clients { 192.168.0.0/24; };
13 log-only yes;
14 };
15
149
From the above configuration example, ME DDI Central will limit identical DNS
responses to 10 per second over a 5-seconds window. If the limit exceeds, DDI
Central will start sending truncated responses every second request (split=2). The
local network (192.168.1.0/24) is exempt from these limits, and the log-only setting
means the limits will be logged but not enforced, which is helpful for initial testing.
Domain blocking using a DNS Firewall is a security measure that prevents users from
website, their device sends a DNS query to resolve the domain name into an IP
address. A DNS Firewall steps in at this point to screen the query against a set of
The DNS Firewall first intercepts DNS queries from client devices on the network
before they reach the internet. It analyzes the domain name requested against a
database of blocked or suspicious domain names. If the domain is on the block list,
150
the DNS Firewall applies the configured policy, which typically involves preventing
the resolution of the domain name into an IP address. Finally, the DNS Firewall
redirects the query to a safe page. DDI Central's Firewall based Domain Blocking
measure blocks collections of recognized malicious domains and directs the users
adult content, social media, or streaming services. DDI Central also curates
party services and enables you add your own custom collection of malicious
sites.
2. You can start adding the domains to the blacklist one by one under a particular
category. Check the Block subdomains check box if you want to block all the
3. Once you click Add, you will see two separate lists, one that says Domains
Blocked and the other says Domains blocked along with subdomains. This
way, you can build your categories of malicious domains on your own.
152
4. Once you are done building the list, specify the Redirection IP and click Save.
5. You can bulk import a customized list of malicious domains via CSV import for
quicker addition. You can also block as many categories based on your
organizational needs.
6. You can also click on the View list button on the top right corner of the page,
to import already existing categories into the current blacklist you are
building.
153
TSIG is a security protocol used in the Domain Name System (DNS) to provide
authenticated and secure communications between DNS servers and between DNS
servers and clients. TSIG uses shared secret keys and cryptographic signatures to
validate that the DNS messages are authentic and have not been tampered with. It's
1. Securing Zone Transfers: Ensuring that AXFR zone transfers occur only
TSIG adds an additional layer of security to DNS operations that is not provided by
standard DNS, which by itself has no mechanism for authenticating the source or
The Key Templates are saved under the TSIG Key Templates tab on the Config
Key Name
The Key Name is mainly used to identify the key across the primary and secondary
Algorithm
156
HMAC operations to generate the TSIG key value. Currently, CloudDNS supports
the following algorithms HMAC MD5, HMAC SHA1, HMAC SHA224, HMAC SHA256,
Secret Key
The secret key value is an encoded base64 string with a maximum value of 255
An ACL in the context of network administration is a set of rules that control network
traffic and limit access to networks and network resources based on predefined criteria.
In DNS servers like ISC BIND, ACLs are used to define which clients (based on IP
addresses or networks) are allowed or denied access to certain DNS services. Common
157
1. Restricting Query Access: Defining which clients are allowed to query the DNS
server.
DNS records, often used in conjunction with TSIG for secure DDNS.
ACLs allow for the implementation of security policies by controlling who can access
the DNS server and what actions they can perform, which is critical for maintaining the
ACL templates are predefined configurations that simplify the creation of Access
Control Lists (ACLs) in various network services, including DNS and DHCP servers. An
ACL template allows administrators to define a set of rules or criteria once and then
apply them across multiple instances, reducing redundancy and potential for error in
158
configurations.
ACL templates are typically used in environments where the same access restrictions or
permissions are needed across different zones, views, or services. Instead of defining
the same ACL multiple times, a template is created once and then referenced wherever
needed.
They can be applied gobally on the cluster level, within specific zones, views, or options.
● You can choose the type of the ACL: ISC Format or Template based ACL.
● For the DDI Central template, just enter the IPv4/IPv6 addresses one by one in the
1 acl "internal-network" {
notation
CIDR notation
the ACL
notation
transactions
9 };
DNS analytics dashboard provides a network administrator with quick insights into
the DNS and leased IP activity related to a particular domain or network segment. It
traffic patterns.
● Select the Select the DNS menu from the menu bar along the left side of the
screen.
● The analytics page appears, showing the current query rate and the total
queries handled by all the DNS servers in the cluster. At the top right corner of
the analytics Page, choose the type of Zones to view the query analytics.
hosted.
blocked.
162
Moreover, choose the required timeframe along which you want to analyze the
performance of domains.
Queries Per Second: Indicates the current rate at which DNS queries are being
Total Queries: Displays the total volume of queries handled over a specific time
period.
Below these metrics, you can find the list of domains and their views queried. The list
also bears the query volume for even the non-hosted- domains un-resolvable by your
DNS servers.
163
from the list. This will display the domain's specific performance metrics,
● You'll also see details for IP addresses leased under this domain, such as lease
duration, MAC addresses identifying each host, and the vendors of the host
machines.
● Additionally, the total query load across all IPs, as well as individual query
respective IP.
164
query volume for different types of DNS records, illustrating the distribution
ManageEngine DDI Central enables you to view the audit logs of specific domains.
Select the DNS menu from the menu bar along the left side of the screen. From the
The Audit page helps you continuously evaluate the overall security posture of your
domains and records using security audit logs to track who, what, and when with
You can also filter the logs for filtering the specific activities carried out by a
166
specific user or a specific activity carried out around a certain time frame to detect
Regularly reviewing your DNS infrastructure's security logs helps you ensure that
employees are sticking to your security practices, and catch new potential security
weaknesses.
reduces the potential for error in assigning IP addresses, and conserves the number
of addresses used.
join the network with minimal manual setup, maintain connectivity, and have the
correct network settings for accessing local resources and the Internet. Effective
servers, and ensuring the reliability and security of the service within an
organization's IT infrastructure.
subnet. Each scope represents a range of IP addresses that are available for lease to
Subnets
● A subnet represents a basic segment of IP addresses (IPv4 or IPv6) within a
addresses that the DHCP server can assign to clients on a specific network
segment.
● Define a new subnet by providing values for various attributes of the subnet
like:
Provide the first address of the pool to be associated with the new subnet.
● Provide a suitable description for the subnet to quickly identify its purpose
and convey the policy associated with it, for a common understanding of its
layout.
● Specify the subnet size using an appropriate prefix, which denotes the
● Enable DHCP failover and select a DHCP server to take over the task of
● Click Save.
● Note: DDI Central also offers the option to clear the active subnets currently in
lease. Clearing all the leases for a subnet removes it from your database,
revert to their original states as per the lease records after a short interval of 5
minutes.
Shared Networks
● A shared-network defined in DDI Central is used when multiple logical IP
170
network segment.
● Just add the required subnets and apply the necessary DHCP or custom
options .
● Click Save.
171
Hosts
● A host declaration specifies settings for individual clients based on their
particular clients, ensuring that a specific client always receives the same IP
● On the Host page, provide a unique name for the host, the mac address of the
host.
Host Groups
● Host groups are a group of hosts combined logically for easier management.
● You can apply a multiple DHCP options over this combination of hosts for
customized management.
173
Supernets
● Supernets, or supernetting, refers to aggregating multiple networks into a
larger network. In the context of DHCP, this is not a direct feature but rather a
about combining smaller subnets into a larger address space for routing
purposes.
174
● DDI Central enables DHCP servers to serve different VLANs as distinct subnets
or shared networks.
● Each VLAN you create within a subnet functions as a separate network, which
● Name and provide a suitable description to quickly identify the new VLAN.
● Note: VLAN IDs are represented by a 12-bit number, but the usable range of
Note: DDI Central enables you to define Supernets and VLANs only to simplify
Also, when discovering your current configurations from your network infrastructure
using DDI Central discovery tools, it's crucial to note that VLANs and Supernets
configured in your network will not be discovered. Therefore, ensure that you
configure them separately in DDI Central for comprehensive and accurate network
management.
Address Pools
including setting different options or restrictions for different pools within the
same subnet.
● When configuring options at the subnet level, you can add and define the
pool or address range within the subnet that should be configured with a
client classes for dynamic IP provisioning. If "Allow" is set to "yes," the pool
permits provisioning for the chosen client class, while setting it to "NO"
excludes provisioning for that class. Choosing "none" means the address pool
is open for dynamic provisioning to all clients in the subnet without class
restrictions.
177
by providing hierarchical tree-view that show how different scopes relate to one
another within the network. The DHCP scope tree view enables admins to quickly
DDI Central provides flexible and powerful ways to manage IP address assignment
178
scheme.
clients) and apply specific DHCP options or behaviors to those groups. These
classes and subclasses enable more granular control over how DHCP services are
Client Classes
● A client class in ISC DHCP is a grouping of DHCP clients that share common
specific criteria in the DHCP discovery or request messages that the clients
send.
clients. For example, you might have different classes for different types of
1 class "Printers" {
3 }
5 pool {
8 }
180
9 }
● In this example, a class named "Printers" is defined, which includes any client
whose MAC address starts with 00:11:22. Printers are then assigned IP
Subclasses
● A subclass in ISC DHCP is a more specific grouping within a class. Subclasses
client identifier.
● Subclasses allow for even more specific targeting of DHCP options and
Example of Subclasses:
1 class "MobileDevices" {
3 }
7 }
11 }
● Description: This configuration first defines a broad class for mobile devices,
and then two subclasses for iPhones and Android devices, respectively. Each
● ASSIGN TO: Assign the scope level for the client class, whether its
level or global level. The Global option suggests it could be applied across all
● CLASS TYPE: The class type field likely refers to the basis of the class
template that can be reused or that you are creating this class based on a pre-
defined template.
● MATCH TYPE: This defines the method by which the DHCP server will match
clients to this class. Substring indicates that the server will look for a
position in the client's DHCP message where the matching should begin.
● LENGTH: This specifies the length of the substring that the DHCP server
● MATCH STRING: The actual string of characters the DHCP server will look for
● Match Value / Sub Class: This section has a checkbox that is used to indicate
whether a match value should be used to further define subclasses within this
client class.
● MATCH VALUE: If subclasses are being defined, this field would be where you
● DHCP OPTIONS: Here, you would specify any DHCP options that should be
applied to clients within this class. These could include options like DNS
● CUSTOM OPTIONS: This section is likely for defining additional DHCP options
that are not part of the standard set, which could be specific to the
● Cilck Save.
185
Classes and subclasses in DDI Central add flexibility and precision to DHCP
client class parameters to provide a means for more granular network management
and resource allocation. This process involves the DHCP client sending additional
information to the DHCP server, which in turn uses this information to identify the
user class identifiers (UCI). These identifiers are part of the DHCP discovery or
request packets.
identifiers and categorize clients into different classes based on the provided
information.
specific types of devices, like VoIP devices, and a separate pool for data
187
devices. This is useful in networks where different device types have different
network requirements.
● Policy Enforcement: For source routing policies, where voice and data
Example Scenario:
Consider a network where VoIP devices and data devices need to be segregated:
1 class "VoIP-Phones" {
= "VoIP";
3 }
4 class "Data-Devices" {
!= "VoIP";
6 }
188
9 pool {
12 }
13 pool {
16 }
17 }
● In this configuration, two classes are defined based on the vendor class
separate from the range used for data devices. The same can be configured
using DDI Central GUI using templates or the above can be given ISC bind
efficiency.
● Quality of Service (QoS): Ensures that devices like VoIP phones that require
190
● Scalability: Makes the network more adaptable to the addition of new types of
Considerations:
● Accuracy: The accuracy of DHCP fingerprinting depends on the uniqueness
devices.
testing.
DHCP Options
191
Table of Contents
DHCP Options 2
Global Configuration 4
Subnet Level 4
Pool Level 5
Host Level 5
DHCP Options
DHCP (Dynamic Host Configuration Protocol) options are additional pieces of
specific code, and the values associated with these codes convey specific types of
information.
Here are some common DHCP options and what they typically do:
1. Subnet Mask (Option 1): Provides the subnet mask information, allowing
router that devices should use for routing traffic outside their local subnet.
3. Domain Name Server (DNS) (Option 6): Supplies the IP addresses of DNS
4. Domain Name (Option 15): Specifies the domain name for devices on the
network.
5. Time Offset (Option 2): Provides the time zone offset in seconds from
6. NTP Servers (Option 42): Supplies the IP addresses of Network Time Protocol
7. Hostname (Option 12): Communicates the preferred host name for the client.
8. Broadcast Address (Option 28): Informs devices about the broadcast address
10.Bootfile Name (Option 67): Specifies the name of the boot file that devices
These options enhance the DHCP process by providing crucial configuration details,
Configuration Protocol for IPv6) have separate sets of options. Each version of the
DHCP protocol has its own set of option codes to convey specific configuration
While some options may serve similar purposes in both DHCPv4 and DHCPv6 (e.g.,
DNS options), the option codes and formats are different due to the differences in
Global Configuration
Options can be set at the global level, affecting the entire DHCP server. This is useful
Subnet Level
DHCP options can be configured at the subnet level. Each subnet declaration in the
DHCP server configuration can have its own set of options. This allows for
Pool Level
Within a subnet, you define address pools. Options can be set at the pool level,
affecting the devices that receive IP addresses from that specific pool. Useful for
based on the type or characteristics of DHCP clients. Once clients are grouped into
196
Host Level
Options can be set for specific hosts, providing individualized configuration
parameters. This is useful when you need to apply specific settings to particular
devices.
level apply to all subnets within that shared network. It allows for common settings
In ISC DHCP, options can be specified at multiple levels, and the server determines
which options to apply to a client based on a defined precedence. The typical order
specific host (identified by its MAC address or client identifier), these options
subclass, options set for these take precedence next, unless overridden by
host-specific options.
3. Pool-Level Options: Options defined at the pool level come after class and
that pool.
applied to all IPs within the subnet unless overridden by higher precedence
next, followed by global options which are the default settings across the
DHCP requests, the server will provide these options if they are available and
DDI Central processes and applies the options according to these rules when
determining the final set of options to send to a DHCP client in the offered lease. It's
important to note that the most specific option will take precedence in the case of
conflicts, with host declarations being the most specific and global options being
options provide a way to convey specific information to DHCP clients during the
lease negotiation process. Here's a general process for defining custom DHCP
options:
In ManageEngine DDI Central, Custom Options are defined and values are provided
within the respective fields provided within the GUI by specifying details like: the
200
user-defined option name, code, and any data type restrictions as shown in the
image below. These custom options can be defined at multiple levels. To define
code] are the parameters that help define a custom DHCP option.
Click on the green + (plus) button besides the Options dropdown box.
The Add Definition window appears. Here you can declare and define your
1. NAME: This is a required field where you would enter the name of the new
2. USE EXISTING SPACE: This toggle indicates whether the new custom option
should be added to an existing set of options (an option space) or if it's going
to define a new one. If the toggle is enabled (turned on), you should select an
3. OPTION SPACE: If you are using an existing space (as indicated by the toggle
above), you would enter the name of that space here. This would be the
explanation of what the custom option does and what values it expects; the
valid punctuation like: some data types accept only spaces while some
5. DATA TYPE: Here, you choose the type of data the custom option will use. The
6. CODE: This is a required field where you enter the specific code that identifies
the custom option. This is often a numeric value that is used in configuration
7. Save Button: After filling out all the necessary information, click Save to save
Note:
unsigned integer 8, 16, 32], string, text and IPv4 or IPv6 address, array of IP
Once declared, this option can accept values based on the grammar defined.
string.
domain name.
Array options provide a way to specify multiple values for boolean integer or IP
207
address data type values (all of the same type) by simply inserting 'array of' before
the data type. Array elements are defined when setting the option values using
comma-separated values.
Note:
Options can contain arrays of any of the supported data types except for the text
An option space groups multiple options, typically with a common purpose. This
connection suboptions.
208
Setting value:
The first line option space db; defines the db option space. Next three suboptions
are defined within this space. Each suboption has a unique code which is typically
numbered from 1 since these are suboption code values. These suboptions are
The setting statements below would set values to suboptions 1 2 and 3 encapsulated
While array options provide specification of multiple elements of the same type,
The following example defines an option of data type record including an integer (16
Note:
Unlike arrays, record element values accept only space separated not comma
separated.
● Click on the Add DHCP Failover button on the top right corner.
● The Create Configuration page appears on the screen. Here enter the values
Primary DHCP
211
The primary DHCP server is the main server responsible for handling DHCP requests
provide redundancy and high availability. The primary server typically handles the
majority of DHCP requests and coordinates with the secondary server to ensure
Specify the network port number that the primary DHCP server will use for its
operations. The default port for DHCP services is typically 67 for servers. However, in
might choose to customize this port number. It's important to ensure that this port is
consistent and properly configured in both the primary and secondary DHCP servers
Secondary DHCP
Specify the configuration of the backup DHCP server. In a DHCP failover setup, there
are typically two servers: a primary and a secondary. The secondary server is on
212
standby to take over the DHCP responsibilities if the primary server becomes
Allows you to specify the network port number that the secondary DHCP server will
use for communication. The standard port for DHCP is 67 for servers and 68 for
time that a DHCP client can extend its lease on an IP address without contacting the
server. This setting is important for ensuring consistency between the primary and
Split
Split is a special property that enables you to specify the percentage of the IP traffic
It is defined only on the primary DHCP server. Its values range from 0 to 256.
A value 256 indicates no load balancing. Even if the failover is enabled for a DHCP
server. The primary DHCP Server is the one solely responsible for listening and
A value 0 indicates that most of the requests are handled by the Secondary DHCP
A value of 128 means 50-50 load balancing where both the primary and the
Determines the maximum time a DHCP server will wait before responding to a client
request. This parameter is important for efficient allocation of IP leases and ensures
that clients are not left waiting too long for a response, which could lead to network
access issues.
lease information with each other. This setting controls the maximum number of
updates (regarding lease information) that can be sent from one server to another
without receiving an acknowledgment. It's important for ensuring that both servers
This parameter sets the maximum time a DHCP server in a failover pair will wait to
receive a response from its partner during load balancing operations. It ensures that
if one server is not responding (possibly due to being down or overloaded), the other
215
server can take over more of the load to maintain service continuity.
Click Save to bring the failover configurations into effect. Select the failover server
you create while enabling failover for each scope you define in DDI Central.
The DHCP scope audit logs page provides you an overview of the actions performed
on each scope configured in your network. It help you to continuously evaluate the
216
overall security posture of your scopes using security audit logs to track the who,
what, and when with respect to each DDNS Zone, VLAN, Supernet, Custom Options,
Options, Pool Data, Client Class, Host, Host Group, Shared Network and Subnet.
You can also filter the logs for filtering the specific activities carried out by a specific
user, or a specific activity carried out around a certain time frame on a particular
Regularly reviewing your DHCP security logs helps you ensure that the access
217
sticking to your security practices, and catch new potential security weaknesses.
addresses.
with your DNS and DHCP services, IPAM emerges as a key player in the evolving
The IPAM stats dashboard presents an overview of the DHCP scopes or network
topological units.
2. Select the IPAM menu from the left menu bar. With the IPAM selected, an inner
The IPAM stats offering insights on the IP address inventory managed by your DHCP
server, referred as the Stats dashboard appears on screen. View IP address statistics
for DHCPv4 and DHCPv6 address spaces using the toggle at the top right corner.
219
network.
Displays a bar graph showcasing the top 5 subnets with the highest IP utilization
Devices Usage
Device Usage statistics provide insights into the distribution of assigned IPs among
IP Usage
Displays bar graphs illustrating the total number of fixed, available, and active IPs in
● Select the Lease menu from the left inner menu bar.
221
● The Lease page appears displaying the list of IP addresses currently leased by
the DHCP server from a specific subnet, along with its the total lease duration,
the current availability state of the IP, the MAC address and the manufacturer
details of the host device associated with the IP during the lease period.
Note:
You can also export these lease records and download them as a CSV file for future
222
references.
To select a different subnet, click on the dropdown box at the top right end and
Click on an IP address to probe through the lease history of that particular address.
The History page for the IP address appears displaying the following sections:
223
DNS Relations
The DNS relations section displays a list of domain name records that was previously
leased with the selected IP address. It includes information such as the type of
record, the exact Fully Qualified Domain Name (FQDN) linked to the record, and the
History
The history section provides a comprehensive audit trail detailing the evolution of
the IP over time. It includes information on the host, identified by its MAC address
and the manufacturer of the host device, to which the IP was leased and the duration
of that lease. Additionally, it records the type of connection and precisely indicates
the availability state of the IP during the entire span of the lease.
DNS Queries
The DNS Queries provides two sections to help you quantify and visualize the query
The section on the left, lists a historical overview of the total query volume to each
224
Additionally, the section on the right helps you visualize, in the form of line graphs,
the hourly query volume handled by the IP when it was associated with different
domain names along a custom time frame. To analyze these hourly readings more
accurately, make sure you select a custom time frame from the drop down calendar
To visualize and take control of the IP allocations for the VLANs managed by the
DHCP server:
● Select the DHCP -> VLAN menu from the left menu bar.
225
● The VLAN page appears displaying the list of all VLANS serviced by the DHCP
server.
● Click on a VLAN entry from the list to view detailed stats on that specific VLAN
● Along the the top section of the Stats page, find the VLAN ID and the VLAN
Name along with the essential details like: the dedicated subnet leasing IP
addresses to the VLAN, the total number of available IPs in the subnet for the
● The mid section of the Stats page displays the following infographics:
Number of IPs in the subnet: A doughnut plot that illustrates and quantifies
● Available: IPs that are not currently assigned and are ready for
allocation.
● Free: Typically includes both IPs that are available for immediate
assignment and those that are reserved but not currently in use.
At the bottom section, you'll discover a list of each IP address in the subnet
availability states. You can click on any Available or Free IP address to directly
Note:
You can also search through the list for a specific VLAN by its VLAN ID. In addition,
You can directly export the VLAN stats and download them as a CSV file for future
references.
To visualize and take control of the IP allocations of each subnet managed by the
DHCP server:
Select DHCP -> Manage IP menu from the left menu bar.
The first section - Manage IP on the left displays the list of available/free IP(s) within
the subnet. Click on any desired IP from the list. This directly takes you to the Host
Page. Here you can directly assign the chosen IP address to any host or client.
The second section- Number of IP (s) on the top right visually depicts the volume
● Available: IPs that are not currently assigned and are ready for allocation.
230
● Active: IPs that are currently in use and assigned to active devices on the
network.
● Abandoned: IPs that were previously assigned but are no longer in use or
● Fixed: IPs that are reserved for specific devices or purposes, ensuring they are
● Free: Typically includes both IPs that are available for immediate assignment
The third section-Subnet Usage, on the bottom right corner, illustrates the overall