V
V
vittmann2021-02-10 20:47:58
VPN
vittmann, 2021-02-10 20:47:58

Active Directory in the cloud and branches through VPN?

Greetings!

Essence. I am planning to deploy AD for a company.

  • The main requirement for AD is authentication, because the main fleet of machines is MacOS.
  • The percentage of machines running Windows may increase in the future (it is currently minimal), and accordingly, there may be a need for a GPO (but not in the near future). Providing local login to machines.
  • Also, synchronization of users/groups into an MDM system (poppy management) + integration with IdM (for logging in with the same credits to web resources) + plus a number of systems that can integrate with LDAP / AD. Any network share is not planned.


So far, branches are offices in the same city (3 pcs, the total number of users working simultaneously is up to 250 people), with good communication channels (up to 500Mbps in both directions) and duplication of providers.
In addition, there are remote workers and the entry into the domain of the equipment for which they work (mainly corporate laptops) is being considered. There can still be up to 100 simultaneously working users.
In the future, it is planned to open branches in other cities (potentially - in other countries, Europe, for example). But there will be no frankly bad channels, because in general, a good connection is needed for the office to work.

The idea came to deploy AD in the cloud (VMware Cloud, data center in the same city as the branches) on 2 virtualized DCs. Channel 100/50 (country / world.) Arrange access by creating a VPN from each Mikrotik in the branch to a virtual router in the cloud (and then route it to a network with domain controllers). Actually, she came because of the lack of desire to buy hardware for DC and a license for WinServer in each office.

At each branch, give clients via DHCP the ip addresses of the controllers + the ip of the Mikrotik itself as DNS (in order to survive without inconvenience those moments when / if the VPN drops and is stupid and the main DNS is not available. Workstations will then use Mikrotik's DNS). On the machines themselves, create a mobile account for each user (for caching credentials and the ability to log in to the machine, even if the connection with AD is currently broken).

As a rule, in any dock / book about AD, it is necessarily mentioned that, given the geographically distributed structure of the enterprise, it is necessary to install its own DC in each branch (mainly in the context of the fact that the wan channel is thin and generally unstable) . Those. this idea clearly doesn't follow MS guidelines.

  • How much does this recommendation have the same value now, when the channels are both wide and stable, and in general no one interferes with having 2-3 pieces in the office and auto-switching when any of them fall?
  • How much traffic is approximately generated when accessing a domain controller during authorization? It would be necessary to lay down the peak moments (in the morning everyone came and actively logs in to the machines), but how to calculate it?
  • What are the general performance requirements for DC servers, depending on the number of users?
  • Can prioritization of traffic and DNS help, maybe on the ports through which client machines access the DC? (but probably after the connection is established, reverse connections from DC to workstations will be on random ports, you don’t prioritize here)
  • How viable is the idea of ​​not placing controllers in branches? Are there any other pitfalls?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
A
Alexey Dmitriev, 2021-02-10
@vittmann

Normal plan - no comments.
Questions:
1. Recommendations for placing DCs in each branch are outdated. They are followed mainly in two cases - in an unstable channel and in the presence of important and working 24 hours a day services that need AD - factories, etc.
For example, one of the former projects that I was involved in was a transnational corporation. It has 2 DCs in Frankfurt and South Africa, which cover all offices in a couple of dozen countries throughout the African continent.
2. Traffic to the controllers is small, 250 people probably fit into 5 megabits at the peak. You will have replication in the data center - so this traffic will not be in external channels.
3. It's usually good practice for a DC to have enough RAM to fit the entire ntds.dit into RAM.
4-8GB of RAM and some core i3 will be enough for you.
4. Default prioritization is not needed.

T
TOParh, 2021-02-18
@Berezoff

Question you really need to manage client computers? If the answer is no, then look towards the terminal server - let the users work in the remote desktop system. It will be easier for you to manage and let them store important data on a server too - but this approach will require stronger material investments in licenses than in your plan.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question