Frequently Asked Questions About Windows 2000 DNS and Windows Server 2003 DNS
Frequently Asked Questions About Windows 2000 DNS and Windows Server 2003 DNS
MORE INFORMATION
DNS is the backbone of Active Directory and the primary name resolution mechanism of Windows
2000 and Windows Server 2003. Windows 2000 and Windows Server 2003 domain controllers
dynamically register information about themselves and about Active Directory in DNS. Other
Windows 2000 and Windows Server 2003 domain controllers, servers, and workstations that are part
of the domain query DNS to find Active Directory-related information. If DNS is not set up correctly,
domain-wide issues can occur such as replication between domain controllers. You may also be
unable to log on to the domain or to join the domain from a workstation or server.
Question: What are the common mistakes that are made when administrators set up DNS on
network that contains a single Windows 2000 or Windows Server 2003 domain controller?
Answer: The Netlogon service on the domain controller registers a number of records in DNS that
enable other domain controllers and computers to find Active Directory-related information. If the
domain controller is pointing to the Internet service provider's (ISP) DNS server, Netlogon does not
register the correct records for Active Directory, and errors are generated in Event Viewer. In
Windows Server 2003, the recommended DNS configuration is to configure the DNS client settings
on all DNS servers to use themselves as their own primary DNS server, and to use a different
domain controller in the same domain as their alternative DNS server, preferably another domain
controller in the same site. This process also works around the DNS "Island" problem in Windows
2000. You must always configure the DNS client settings on each domain controller's network
interface to use the alternative DNS server addresses in addition to the primary DNS server address.
Question: What does a domain controller register in DNS?
Answer: The Netlogon service registers all the SRV records for that domain controller. These
records are displayed as the _msdcs, _sites, _tcp, and _udp folders in the forward lookup zone that
matches your domain name. Other computers look for these records to find Active Directory-related
information.
Question: Why can't I use WINS for name resolution like it is used in Microsoft Windows NT 4.0?
Answer: A Windows 2000 or Windows Server 2003 domain controller does not register Active
Directory-related information with a WINS server; it only registers this information with a DNS server
that supports dynamic updates such as a Windows 2000 or Windows Server 2003 DNS server. Other
Windows 2000-based and Windows Server 2003-based computers do not query WINS to find Active
Directory-related information.
Question: If I remove the ISP's DNS server settings from the domain controller, how does it resolve
names such as Microsoft.com on the Internet?
Answer: As long as the "." zone does not exist under forward lookup zones in DNS, the DNS service
uses the root hint servers. The root hint servers are well-known servers on the Internet that help all
DNS servers resolve name queries.
Answer: This setting designates the Windows 2000 or Windows Server 2003 DNS server to be a root
hint server and is usually deleted. If you do not delete this setting, you may not be able to perform
external name resolution to the root hint servers on the Internet.
For additional information, click the article number below to view the article in the Microsoft
Knowledge Base:
229840 DNS Server's Root Hints and Forwarder Pages Are Unavailable
Question: Do I need to configure forwarders in DNS?
Answer: No. By default, Windows 2000 and Windows Server 2003 DNS use the root hint servers on
the Internet; however, you can configure forwarders to send DNS queries directly to your ISP's DNS
server or other DNS servers. In most cases, when you configure forwarders, DNS performance and
efficiency increases, but this configuration can also introduce a point of failure if the forwarding DNS
server is experiencing problems. The root hint server can provide a level of redundancy in exchange
for slightly increased DNS traffic on your Internet connection.
Question: Should I point the other Windows 2000-based and Windows Server 2003-based
computers on my LAN to my ISP's DNS servers?
Answer: No. If a Windows 2000-based or Windows Server 2003-based server or workstation does
not find the domain controller in DNS, you may experience issues joining the domain or logging on
to the domain. A Windows 2000-based or Windows Server 2003-based computer's preferred DNS
setting should point to the Windows 2000 or Windows Server 2003 domain controller running DNS. If
you are using DHCP, make sure that you view scope option #15 for the correct DNS server settings
for your LAN.
Question: Do I need to point computers that are running Windows NT 4.0 or Microsoft Windows 95,
Microsoft Windows 98, or Microsoft Windows 98 Second Edition to the Windows 2000 or Windows
Server 2003 DNS server?
Answer: Legacy operating systems continue to use NetBIOS for name resolution to find a domain
controller; however it is recommended that you point all computers to the Windows 2000 or
Windows Server 2003 DNS server for name resolution.
Question: What if my Windows 2000 or Windows Server 2003 DNS server is behind a proxy server
or firewall?
Answer: If you are able to query the ISP's DNS servers from behind the proxy server or firewall,
Windows 2000 and Windows Server 2003 DNS server is able to query the root hint servers. UDP and
TCP Port 53 should be open on the proxy server or firewall.
Question: What should I do if the domain controller points to itself for DNS, but the SRV records still
do not appear in the zone?
Answer: Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install
Support Tools from the Windows 2000 Server or Windows Server 2003 CD-ROM to run Netdiag.exe.
For additional information about checking for a disjointed namespace, click the article number below
to view the article in the Microsoft Knowledge Base:
257623 Domain Controller's DNS Suffix Does Not Match Domain Name
Question: How do I set up DNS for other domain controllers in the domain that are running DNS?
Answer: For each additional domain controller that is running DNS, the preferred DNS setting is the
parent DNS server (first domain controller in the domain), and the alternate DNS setting is the actual
IP address of network interface.
Answer: To set up DNS for a child domain, create a delegation record on the parent DNS server for
the child DNS server. Create a secondary zone on the child DNS server that transfers the parent
zone from the parent DNS server. Set the child DNS server to point to itself only.
For additional information, click the article number below to view the article in the Microsoft
Knowledge Base:
255248 How to Create a Child Domain in Active Directory and Delegate the DNS Namespace to the
Child Domain
DNS Server's Root Hints and Forwarder Pages Are
Unavailable
SYMPTOMS
Clients that use a DNS server may not be able to gain access to hosts on the Internet. When you try
to configure root hints or forwarders on the DNS server, the options for these items may be
unavailable.
CAUSE
A DNS server behaves as a root server if there is a zone named "." on the server. The "." zone
indicates that the server is a top-level root server. Because a root server is at the top of the DNS
hierarchy, it cannot be configured to forward and does not require root hints.
When you run the Active Directory Installation Wizard (Dcpromo.exe), you can configure a DNS
server on the local computer and configure the forward lookup zones. The wizard examines the
TCP/IP configuration on the computer and determines whether the computer is configured to use
any DNS servers. If so, the Active Directory Installation Wizard queries for the root servers. If the
computer is not configured to use any DNS servers, the wizard queries the root servers that are
listed in the Cache.dns file (the Internet root servers). If the wizard cannot contact any root servers,
it configures the local computer as a root server and creates the "." zone.
RESOLUTION
To resolve this issue:
1. Delete the "." zone by using DNS Manager, or type the following command at a command prompt:
dnscmd /ZoneDelete . /DsDel
Note The /DsDel switch is required only if the zone is integrated with Active Directory.
2. Right-click the DNS server name, and then click Refresh to refresh the screen. The root hints and
forwarders are now enabled.
The actual DNS request is being sent to the local DNS cache. If the entry is listed there, Windows
uses the entry and does not make the request to the DNS server. After the entry has timed out
(based on its Time to Live, or TTL value), it is cleared from the local DNS cache. The next attempt
sends the request to the DNS server.
To delete the entries in the DNS cache, type ipconfig /flushdns at a command prompt.
This section lists several common DNS problems and explains how to solve them.
If you see event ID 7062 in the event log, the DNS server has sent a packet to itself. This is usually
Make sure that there is no lame delegation for this server. A lame delegation occurs
when one server delegates a zone to a server that is not authoritative for the zone.
Check the forwarders list to make sure that it does not list itself as a forwarder.
If this server includes secondary zones, make sure that it does not list itself as a master
If this server includes primary zones, make sure that it does not list itself in the notify
list.
Zone transfers to secondary servers that are running BIND are slow.
By default, the Windows 2000 DNS server always uses a fast method of zone transfer. This method
uses compression and includes multiple resource records in each message, substantially increasing
the speed of zone transfers. Most DNS servers support fast zone transfer. However, BIND 4.9.4 and
earlier does not support fast zone transfer. This is unlikely to be a problem, because when the
Windows 2000 DNS Server service is installed, fast zone transfer is disabled by default. However, if
you are using BIND 4.9.4 or earlier, and you have enabled fast zone transfer, you need to disable fast
zone transfer.
1. In the DNS console, right-click the DNS server, and then click Properties.
You see the error message "Default servers are not available."
When you start Nslookup, you might see the following error message:
*** Can't find server name for address <address>: Non-existent domain
Address: 127.0.0.1
If you see this message, your DNS server is still able to answer queries and host Active Directory. The
resolver cannot locate the PTR resource record for the name server that it is configured to use. The
properties for your network connection must specify the IP address of at least one name server, and
when you start Nslookup, the resolver uses that IP address to look up the name of the server. If the
resolver cannot find the name of the server, it displays that error message. However, you can still
use Nslookup to query the server.
Make sure that a reverse lookup zone that is authoritative for the PTR resource record
exists. For more information about adding a reverse lookup zone, see "Adding a Reverse
Make sure that the reverse lookup zone includes a PTR resource record for the name
server.
Make sure that the name server you are using for your lookup can query the server that
contains the PTR resource record and the reverse lookup zone either iteratively or
recursively.
For information about how to add or update records by using the DNS console, see Windows 2000
Server Help. For more information about using resource records in zones, search for the keywords
For Active Directory–integrated zones, it is also possible that the affected records for the query have
been updated in Active Directory but not replicated to all DNS servers that are loading the zone. By
default, all DNS servers that load zones from Active Directory poll Active Directory at a set interval —
typically, every 15 minutes — and update the zone for any incremental changes to the zone. In most
cases, a DNS update takes no more than 20 minutes to replicate to all DNS servers that are used in
an Active Directory domain environment that uses default replication settings and reliable high-
speed links.
User cannot resolve name that exists on a correctly configured DNS server.
First, confirm that the name was not entered in error by the user. Confirm the exact set of characters
entered by the user when the original DNS query was made. Also, if the name used in the initial
query was unqualified and was not the FQDN, try the FQDN instead in the client application and
repeat the query. Be sure to include the period at the end of the name to indicate the name entered
is an exact FQDN.
If the FQDN query succeeds and returns correct data in the response, the most likely cause of the
problem is a misconfigured domain suffix search list that is used in the client resolver settings.
If queries destined for the Internet are slow or intermittent, or you cannot resolve names on the
Internet, but local Intranet name resolution operates successfully, the cache file on your
Windows 2000–based server might be corrupt, missing, or out of date. You can either replace the
cache file with an original version of the cache file or manually enter the correct root hints into the
cache file from the DNS console. If the DNS server is configured to load data on startup from Active
Directory and the registry, you must use the DNS console to enter the root hints.
1. Stop the DNS service by typing the following at the command prompt:
cd %Systemroot%\System32\DNS
4. Copy the original version of the cache file, which might be found in one of two places, by
typing either of the following:
copy backup\cache.dns
– Or –
copy samples\cache.dns
If name resolution to the Internet still fails, repeat the procedure, copying the cache file from your
To copy the cache file from your Windows 2000 source media
where drive is the drive that contains your Windows 2000 source media.
Windows 2000 includes subnet prioritization, a new feature, which reduces network traffic across
subnets. However, it prevents the resolver from using the round robin feature as defined in
RFC 1794. By using the round robin feature, the server rotates the order of A resource record data
returned in a query answer in which multiple resource records of the same type exist for a queried
DNS domain name. However, if the resolver is configured for subnet prioritization, the resolver
reorders the list to favor IP addresses from networks to which they are directly connected.
If you would prefer to use the round robin feature rather than the subnet prioritization feature, you
can do so by changing the value of a registry entry. For more information about configuring the
subnet prioritization feature, see "Configuring Subnet Prioritization" earlier in this chapter.
WINS Lookup record causes zone transfer to a third-party DNS server to fail.
If a zone transfer from a Windows 2000 server to a third-party DNS server fails, check whether the
zone includes any WINS or WINS-R records. If it does, you can prevent these records from being
1. In the DNS console, double-click your DNS server, right-click the zone name that contains
the WINS record, and then click Properties.
2. In the Properties dialog box for the zone, click the WINS tab and select the check box Do
not replicate this record.
2. In the properties page for the zone, click the WINS-R tab and select the check box Do not
replicate this record.
If you have a problem with incorrect authoritative data in a zone for which WINS lookup integration is
enabled, the erroneous data might be caused by WINS returning incorrect data. You can tell whether
WINS is the source of the incorrect data by checking the TTL of the data in an Nslookup query.
Normally, the DNS service answers with names stored in authoritative zone data by using the set
zone or resource record TTL value. It generally answers only with decreased TTLs when providing
answers based on non-authoritative, cached data obtained from other DNS servers during recursive
lookups.
However, WINS lookups are an exception. The DNS server represents data from a WINS server as
authoritative but stores the data in the server cache only, rather than in zones, and decreases the
nslookup -d2
server <server>
where <server> is a server that is authoritative for the name that you want to test.
This starts nslookup in user-interactive, debug mode and makes sure that you are querying the
correct server. If you query a server that is not authoritative for the name that you test, you are
not able to tell whether the data comes from a WINS server.
set querytype=a
– Or –
3. Enter the forward or reverse DNS domain name that you want to test.
If you have determined that the data comes from a WINS server, check the WINS server for
problems. For more information about checking the WINS server for problems, see "Windows Internet
In some cases, when you delete a secondary copy of the zone, it might reappear. If you delete a
secondary copy of the zone when an Active Directory-integrated copy of the zone exists in Active
Directory, and the DNS server from which you delete the secondary copy is configured to load data
on startup from Active Directory and the registry, the zone reappears.
If you want to delete a secondary copy of a zone that exists in Active Directory, configure the DNS
server to load data on startup from the registry, and then delete the zone from the DNS server that is
hosting the secondary copy of the zone. Alternatively, you can completely delete the zone from
Active Directory when you are logged into a domain controller that has a copy of the zone.
You see error messages stating that PTR records could not be registered
When the DNS server that is authoritative for the reverse lookup zone cannot or is configured not to
perform dynamic updates, the system records errors in the event log stating that PTR records could
not be registered. You can eliminate the event log errors by disabling dynamic update registration of
PTR records on the DNS client. To disable dynamic update registration, add the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
Most failed name resolution attempts fail in one of two general ways:
A user receives a negative response when attempting to resolve a name, such as an error message
A user receives a positive response when attempting to resolve a name, but the information returned is
incorrect.
Important
Whenever you are trying to troubleshoot problems with name resolution, always submit an FQDN. In that way, you can
make sure that your problem is not caused by an incorrect domain suffix appended to the queried name.
The following flowcharts and associated text in Figures 6.36–6.41 explain how to diagnose each of these problems. For
another good source of information for diagnosing common problems, see RFC 1912, "Common DNS Operational and
Configuration Errors."
Note
The flowcharts in Figures 6.36–6.41 direct you to other flowcharts in other figures. To locate the correct flow chart, see
from Ping, the DNS server did not find the name or IP address that you are looking up. Use the following process, shown
1. Check that the client and server computers have a valid IP configuration.
To check IP configuration, type ipconfig /all at the command prompt. In the command-line output, verify the IP
2. Check that the server is working properly. For more information about verifying that the server is working
properly, see "Checking the DNS Server for Problems" later in this chapter.
3. Check whether the DNS server is authoritative for the name that is being looked up.
If the DNS server is authoritative for the name that is being looked up, you probably have a problem with
authoritative data. For more information about checking for problems with authoritative data, see "Checking for
– Or –
If the DNS server is not authoritative for the name that is being looked up, proceed to the next step.
4. Query for the name by using Nslookup. At the command prompt, type the following:
where IP address of server is the IP address of the server that you queried originally, and query address is the name
or IP address you are attempting to resolve. If you get the message "Server failed" or "Request to server timed out,"
you probably have a problem involving a broken delegation. For more information about problems with broken
– Or –
If you get an incorrect answer or the message "Non-existent domain," proceed to the next step.
5. Flush the resolver cache. At the command prompt, type the following:
where IP address of server is the IP address of the server that you queried originally, and query address is the name
or IP address you are attempting to resolve. If the answer is correct, the problem was a stale cache entry, and your
problem is solved.
– Or –
If the answer is still not correct, you probably have a problem with authoritative data. For more information about
problems with authoritative data, see "Checking for Problems with Authoritative Data" later in this chapter.
Incorrect Answer
If you query a DNS server and it responds with incorrect information, use the following process, shown in Figure 6.37, to
where IP address of server is the IP address of the server that you queried originally, and query address is the name
or IP address you are attempting to resolve. If the answer is correct, the problem was a stale cache entry, and your
problem is solved.
– Or –
If the answer is still not correct, you probably have a problem with authoritative data. For more information about
how to diagnose problems with authoritative data, see "Checking for Problems with Authoritative Data" later in this
chapter.
Use the following process, shown in Figure 6.41, to check the DNS server for problems.
1. Check Event Viewer for error messages. For information about Event Viewer, see "Troubleshooting Tools"
earlier in this chapter.
2. Check for basic connectivity between the client computer and the DNS server that you used for your original
query by pinging the DNS server by its IP address.
If the DNS server does not respond to a direct ping of its IP address, you probably have a network connectivity
– Or –
– Or –
If the resolver returns the response "Request to server timed out" or "No response from server," proceed to step 5.
4. If the resolver returns the response "Server failure," the zone 1.0.0.127.in-addr.arpa is probably paused, or the
server is possibly overloaded. You can find out whether it is paused by checking the General tab of the zone
properties, from within the DNS console.
5. If the resolver returns the response "Request to server timed out" or "No response from server," the DNS server
probably is not running. Try to restart the server by typing the following at the command prompt on the server:
– Or –
If it is running, the server might not be listening on the IP address that you used in your Nslookup query. From the
Interfaces tab of the server properties page in the DNS console, administrators can restrict a DNS server to listen
only on selected addresses. If the DNS server has been configured to limit service to a specific list of its configured
IP addresses, it is possible that the IP address used to contact the DNS server is not in the list. You can try a
different IP address in the list or add the IP address to the list. For more information about restricting a DNS server
– Or –
In rare cases, the DNS server might be configured to disable the use of its automatically created default zones. By
default, the DNS service automatically creates the following standard reverse lookup zones based on RFC
recommendations:
0.in-addr.arpa
127.in-addr.arpa
255.in-addr.arpa
The automatic creation of these zones can only be disabled through the registry, so it is unlikely that this has
happened. However, if you think automatic creation has been disabled, you can use the DNS console to make sure
that the zones exist.
– Or –
In rare cases, the DNS server might have an advanced security or firewall configuration. If the server is located on
another network that is reachable only through an intermediate host (such as a packet filtering router or proxy
server), the DNS server might use a non-standard port to listen for and receive client requests. By default, Nslookup
sends queries to DNS servers on UDP port 53, so if the DNS server uses any other port, Nslookup queries fail. If you
think this might be the problem, check whether an intermediate filter is intentionally used to block traffic on well-
known DNS ports. If not, try to modify the packet filters or port rules on the firewall to allow traffic on UDP/TCP port
53.
If you have determined that the server contains incorrect authoritative (non-cached) data, use the following process to
1. Determine whether the server that is returning the incorrect response is either a primary or secondary server
for the zone.
If the server is a primary server for the zone — either the standard primary server for the zone or a server that uses
Active Directory integration to load the zone — the data is incorrect on the primary zone. Go to step 5.
– Or –
If the server is hosting a secondary copy of the zone, proceed to the next step.
2. Examine the zone on the master server (the server from which this server pulls zone transfers). You can
determine which server is the master server by examining the properties of the secondary zone in the DNS console.
Is the name correct on the master server?
If the name is not correct on the master server, go to step 1. When prompted to examine a server, examine the
– Or –
If the name was correct on the master server, proceed to the next step.
3. Check whether the serial number on the master server is lower than or equal to the serial number on the
secondary server. If not, proceed to the next step.
– Or –
If the serial number on the master server is lower than or equal to the serial number on the secondary server,
modify either the master server or the secondary server so that the serial number on the master server is higher
than the serial number on the secondary server. Then, proceed to the next step.
4. Force a zone transfer from within the DNS console. (For information about how to force a zone transfer, see
Windows 2000 Server Help.) Next, examine the secondary server again to see whether the zone was transferred
correctly. If not, you probably have a zone transfer problem; see "Zone Transfer Problems" later in this chapter.
– Or –
If the zone was transferred correctly, check whether the data is now correct. If not, the data is incorrect on the
5. If the data is incorrect on the primary zone, the problem might be caused by user error when entering data into
the zone, a problem with Active Directory replication, a problem with dynamic update, or a WINS lookup problem.
For information about problems with user error and Active Directory replication, see "Troubleshooting DNS
Problems" later in this chapter. For information about problems with dynamic update, see "Troubleshooting
Dynamic Update." For information about WINS lookup problems, see "Solving Common DNS Problems" later in this
chapter.
If you are responsible for maintaining the zone, you can solve the problem. Otherwise, ask the person who is
For recursion to work successfully, all DNS servers that are used in the path of a recursive query must be able to
respond and forward correct data. If they cannot, a recursive query can fail for any of the following reasons:
If you have determined that you have a problem with recursion, use the following process, shown in Figure 6.39, to help
troubleshoot the problem. Start with the server used in your original query:
1. Check whether this server forwards queries to another server by examining the Forwarders tab in the server
properties in the DNS console. If the check box Enable forwarders is selected and one or more servers are listed,
this server forwards queries.
If this server does forward queries to another server, check for problems with the server to which this server
forwards queries. To check for problems, follow the troubleshooting steps in "Checking the DNS Server for
Problems." When that section instructs you to perform a task on the client, perform it on the server instead.
If the server is healthy and can forward queries, repeat this step, examining the server to which this server forwards
queries.
– Or –
If this server does not forward queries to another server, proceed to the next step.
2. Test whether this server can query a root server by typing the following:
nslookup
set querytype=NS
If the resolver returns the IP address of a root server, you probably have a broken delegation between the root
server and the name or IP address that you are attempting to resolve. Follow the procedure "To test for a broken
–Or –
If the resolver returns the response "Request to server timed out," check whether the root hints points to
functioning root servers by following the procedure "To view the current root hints." If the root hints does point to
functioning root servers, you might have a network problem, or the server might use an advanced firewall
configuration that prevents the resolver from querying the server, as described in "Checking the Server for
Problems," earlier in this chapter. It is also possible that the recursive time-out default (15 seconds) is too short. For
information about how to change this time-out, see the Windows 2000 Server Help. Search for "tuning advanced
parameters."
Note
Begin the tests in the following procedure by querying a valid root server. The test takes you through a process of
querying all the DNS servers from the root down to the server that you are testing for a broken delegation.
nslookup
set norecursion
<FQDN >
where resource record type is the type of resource record that you were querying for in your original query, and
FQDN is the FQDN for which you were querying (terminated by a period).
2. If the response includes a list of NS and A resource records for delegated servers, repeat step 1 for each server
and use the IP address from the A resource records as the server IP address.
– Or –
If the response does not contain an NS resource record, you have a broken delegation.
–Or –
If the response contains NS resource records, but no A resource records, type set recursion and query individually
for A resource records of servers listed in the NS records. If for each NS resource record in a zone, you do not find at
least one valid IP address of an A resource record for each NS resource record, you have a broken delegation.
If you determine that you have a broken delegation, fix it by adding or updating an A resource record in the parent zone
with a valid IP address for a correct DNS server for the delegated zone.
If the root servers do not respond to pinging by IP address, the IP addresses for the root servers might have
If you have determined that a secondary server cannot pull a zone transfer from a master server, use the following
process, shown in Figure 6.40, to diagnose and solve your zone transfer problems.
1. Check Event Viewer for both the primary and secondary DNS server. For information about Event Viewer, see
"Troubleshooting Tools" earlier in this chapter.
2. Check the master server to see whether it is refusing to send the transfer for security reasons. Check the Zone
Transfers tab of the zone properties in the DNS console. If the server restricts zone transfers to a list of servers,
such as those listed on the Name Servers tab of the zone properties, make sure that the secondary server is on
that list. Make sure that the server is configured to send zone transfers.
3. Check the master server for problems by following the steps in "Checking the DNS Server for Problems" earlier
in this chapter. When prompted to perform a task on the client, perform the task on the secondary server instead.
4. Check whether the secondary server is running another DNS server implementation, such as BIND. If so, the
problem might have one of several causes:
The Windows 2000 master server might be configured to send fast zone transfers, but the third-
party secondary server might not support fast zone transfers. If so, disable fast zone transfers on the
master server by selecting the check box Bind secondaries on the Advanced tab of the properties for
If a forward lookup zone on the Windows 2000 server contains a WINS lookup record or the
reverse lookup zone contains a WINS-R record, the BIND server might not be able to transfer the zone. For
information about diagnosing problems in which a BIND server cannot transfer a zone, see "Solving
If a forward lookup zone on the Windows 2000 server contains a record type (for example, an SRV
record) the secondary server does not support, the secondary server might have problems pulling the
zone.
5. Check whether the master server is running another DNS server implementation, such as BIND.
If so, it is possible that the zone on the master server includes incompatible resource records that Windows 2000
does not recognize. For a complete list of all RFC-compliant resource record types that are supported by DNS
servers that are running under Windows 2000 Server, see Windows 2000 Server Help.
6. If either the master or secondary server is running another DNS server implementation, check both servers to
make sure that they support the same features. You can check the Windows 2000 server from the Advanced tab of
the properties page for the server from within the DNS console. In addition to the Bind secondaries box, this page
includes the Name checking drop down list, which enables you to select enforcement of strict RFC compliance for
characters in DNS names.