HOW TO INTEGRATE ACTIVE DIRECTORY AND DNS Whitepaper

HOW TO INTEGRATE ACTIVE DIRECTORY AND DNS
Whitepaper
ii | BlueCat Networks
Use of this document
Copyright
This document and all information (in text, Graphical User Interface
(“GUI”), video and audio forms), images, icons, software, design,
applications, calculators, models, projections and other elements
available on or through this document are the property of BlueCat
Networks or its suppliers, and are protected by Canadian and
international copyright, trademark, and other laws. Your use of this
document does not transfer to you any ownership or other rights
or its content. You acknowledge and understand that BlueCat
Networks retains all rights not expressly granted.
Persons who receive this document agree that all information
contained herein is exclusively the intellectual property of BlueCat
Networks and will not reproduce, recreate, or other use material
herein, unless you have received expressed written consent from
BlueCat Networks.
Copyright © 2011, BlueCat Networks Inc. All rights reserved
worldwide.
Publisher Information
Published in Canada — No part of this publication may be
reproduced, transmitted, transcribed, stored in a retrieval system,
or translated into any human or computer language in any form or
by any means without the express written permission of:
BlueCat Networks Inc.
4101 Yonge Street, Suite 502
Toronto, Ontario
Canada M2P 1N6
Telephone: 416-646-8400
Fax: 416-225-4728
E-mail: [email protected]
Website: www.bluecatnetworks.com
This publication is provided as is without warranty of any kind,
express or implied, including, but not limited to, the implied
warranties of merchantability, fitness for a particular purpose, or
non-infringement.
All terms mentioned in this publication that are known to be
trademarks or service marks are appropriately capitalized. BlueCat
Networks cannot attest to the accuracy of this information. Use of
a term in this publication should not be regarded as affecting the
validity of any trademark or service mark. The trademarks, service
marks and logos (the “Trademarks”) displayed are registered and
unregistered Trademarks of BlueCat Networks, Inc. and others.
Users are not permitted to use these Trademarks for any purpose
without the prior written consent of BlueCat Networks or the third
party owning the Trademark.
No Professional Advice
This document is for convenience and informational purposes
only. This document is not intended to be a comprehensive or
detailed statement concerning the matters addressed; advice or
recommendations, whether scientific or engineering in nature or
otherwise; or an offer to sell or buy any product or service. BlueCat
Networks does not warrant or make any representations regarding
the use, validity, accuracy, or reliability of, or the results of the use
of, this website or any materials on this document or any website
referenced herein. This document is intended solely for the use of
the recipient. It does not institute a complete offering and is not to
be reproduced or distributed to any other person.
How to Integrate Active Directory and DNS | iii
Executive Summary
Windows® 2000 Server was a pivotal point for Microsoft in centralizing and consolidating directory services. Active Directory® (AD) is
based on well known network services such as Lightweight Directory Access Protocol (LDAP) and Kerberos. AD utilizes DNS for its
location mechanism. DNS has grown to become not only the cornerstone of the Internet, but a crucial fabric to connect Windows
clients with their Domain Controllers. This document outlines how
AD utilizes DNS and how the Adonis DNS Appliance integrates into
this environment. The integration of the Adonis Server can be performed easily while providing a robust, secure, and highly maintainable DNS management platform.
iv | BlueCat Networks
Contents
Executive Summary �����������������������������������������������������������������������������������������������iii
Active Directory and DNS��������������������������������������������������������������������������������������� 1
Dynamic DomainController Registration���������������������������������������������������������������� 1
Integrating Adonis into Active Directory���������������������������������������������������������������� 2
DNS Replication����������������������������������������������������������������������������������������������������� 3
Advantages Of Adonis For ActiveDirectory DNS Services���������������������������������������� 4
Interoperability with Existing DNS Architecture ���������������������������������4
Quick Migration�������������������������������������������������������������������������4
Superior Configuration Management�����������������������������������������������4
Controlled Deployment����������������������������������������������������������������4
Improved Security�����������������������������������������������������������������������5
Total Cost of Ownership (TCO)��������������������������������������������������������5
Summary��������������������������������������������������������������������������������������������������������������� 5
Active Directory DNS Records��������������������������������������������������������������������������������� 5
SRV Records������������������������������������������������������������������������������5
A Records��������������������������������������������������������������������������������������������������������������� 7
CNAME Records������������������������������������������������������������������������������������������������������ 7
About BlueCat Networks���������������������������������������������������������������������������������������� 8
BlueCat Networks White Papers����������������������������������������������������������������������������� 9
Slave DNS Server
Master DNS Server
Domain Controller
2
How to Integrate Active Directory and Slave
DNSDNS Server
| 1
2
1
1 Update locator records
Active Directory and DNS
2 Send updates to slave servers
Active Directory is an essential element of the Windows server
architecture that provides a centrally managed directory service
for distributed computing environments. The directory is a central
authority for network security, resources, users and services. AD
is based upon LDAP and uses security based on MIT’s Kerberos
project. AD was first available in Windows 2000 Server. Microsoft
chose to change its Windows Domain discovery process to use
DNS instead of its legacy discovery protocol. This acts like a boot
strapping mechanism for client systems to find the closest or most
appropriate Domain Controller (DC). This information is stored in a
series of DNS records specifying the following information:
▪▪
▪▪
▪▪
▪▪
▪▪
Dynamic Domain
Controller Registration
Without the proper DNS information, a client cannot discover
which server to contact for authentication. Each Domain Controller
registers and maintains its own Active Directory DNS integration
records consisting of several A (Address), CNAME (Canonical Name)
and SRV (Service) records. These records are initially registered by
the DC’s NetLogon service. This is performed via a standard DNS
zone transfer (AXFR) and updated Dynamic DNS (DDNS) by the DC
(RFC 2136).
Slave DNS Server
LDAP Servers
Kerberos Domain Controllers
Addresses of the Domain Controllers
Global Catalog Servers
Kerberos Password Change Servers
Master DNS Server
Domain Controller
3
Slave DNS Server
3
1
2
1 Perform transfer of Active Directory Zone
2 Send Dynamic Updates to add/update controller’s records
Before a client can connect to the Windows Domain, a suitable
DC needs to be found. The Windows client contains a service
called NetLogon which uses a DC locating algorithm to find the
appropriate server.
This algorithm works in the following manner:
1. A List of DCs is obtained via a DNS query using the domain
name, domain Globally Unique Identifier (GUID) and/or site
name.
2. The locator pings each controller in random order and uses
the weighting factor discovered while getting the list of
DCs. It waits up to one tenth of a second for a reply from
the DC. The pinging continues until all controllers are tried
or until a successful response is received.
3. After a DC responds successfully to a ping, the results from
the response are compared to the parameters required by
the client. If there is a match, then the DC is used. Otherwise,
the pinging of other DCs resumes.
3 Send updates to slave via Incremental Zone Transfer (IXFR)
When examining these records in the Microsoft DNS server, one
is led to believe that this data must reside in sub zones of the
parent domain. This is not necessarily the case, since Dynamic DNS
(DDNS) updates have no way of creating additional zones. The
records are simply added as resource records with label separators
(“.”) into the parent domain’s zone file. Additionally, one will notice
that several of the records contain underscore (“_”) characters
as part of the names. This technique is common practice used
in Microsoft development tools and was borrowed for the DNS
naming technique for Active Directory. The following list contains
the naming conventions used in the records:
DNS Label
Description
_ldap
LDAP service
_tcp
Service uses TCP connections
_udp
Service uses UDP connections
_kerberos
Record contains information about a Kerberos
Key Distribution Center (KDC)
_msdcs
Service is running on a Domain Controller
_kpasswd
Kerberos Password Change service
_gc
Global Catalog service
_sites
Record contains information on a specific site
dc
Domain Controller (DC)
gc
Global Catalog (GC)
Slave DNS Server
Domain Controller
Master DNS Server
2
Slave DNS Server
2
1
1 Update locator records
2 Send updates to slave servers
A registered DNS record can contain one or more of the above
names to describe a service that can be queried.
2 | BlueCat Networks
For example, the following record locates an LDAP service, on
server1.bluecatnetworks.com in bluecatnetworks.com:
_ldap._tcp.bluecatnetworks.com SRV 0 0
389 server1.bluecatnetworks.com
An alternative form of this record that indicates that the LDAP
service is on a DC would have the following syntax:
_ldap._tcp.dc._msdcs.bluecatnetworks.
com SRV 0 0 389 server1.bluecatnetworks.com
For a detailed list of these records see the “Active Directory DNS
Records” section of this document.
4. For each slave zone, allow update forwarding using the
ACL. This forwards dynamic updates to the master zone.
Once the configuration has been deployed, it takes anywhere from
a few minutes to an hour for the DCs to register their records. This
time interval is dependent on the DC’s registration settings that
can be changed to suit an organization’s requirements. Domain
Controllers usually inspect their records after the interval has
expired. After the DCs have registered their records, a simple refresh
of the master server’s configuration in the Adonis Management
Console reveals the Active Directory records.
Windows 2000 type networks also enable clients to register their
Integrating Adonis into Active Directory
own Address (A) and Pointer (PTR) records with their local DNS
The Adonis DNS Appliance easily integrates into the Active
Directory environment. The simplest way to perform this operation
is to use the “Active Directory Wizard” for each zone that requires
AD integration. The wizard asks for the IP addresses of each
Domain Controller that will register their records. Once complete,
the configuration is deployed and the Active Directory servers
are informed that their primary DNS server is now an Adonis DNS
Appliance. Once this is performed, the DC’s register their records
and client machines, then use the information to gain access to
the AD domain.
perform the registration directly on the DNS server, which is a
Manually performing the integration without the Wizard involves
a few simple steps:
1. Create an Access Control List (ACL) that contains the addresses of all the Domain Controllers. Add this ACL to each
DNS server.
2. For the master DNS server, allow zone transfers.
3. For each master zone, allow dynamic updates using the
ACL.
server. In most cases, organizations use DHCP servers that can
more secure method. However, if desired, clients can still register
themselves directly with the DNS server by allowing those specific
clients to make dynamic updates. In either case, an ACL should be
used to secure these updates.
How to Integrate Active Directory and DNS | 3
DNS Replication
There are two schools of thought about DNS record replication:
Master — Slave and Master — Master.
Master — Slave The current industry standard outlined in RFC
1034 and 1035, states that a secondary zone (slave) replicates its
contents from a primary (master) zone on a given internal network.
This was enhanced by the DNS Notify mechanism (RFC 1996)
that lets master servers notify their slaves when their contents
have changed. With the advent of Dynamic DNS (DDNS), faster
incremental zone transfers (IXFR) were developed. Slave servers
could then accept and forward updates to their respective master
servers. The Master - Slave architecture works on Windows, UNIX®,
and other operating systems. It is the recommended method for
managing DNS. The following table lists some of the pros and cons
of a Master-Slave replication system:
Master-Slave Replication System
Pros
•
An industry standard
method for maintaining
zone data
•
The master server always
contains most up-to-date
information
•
A central repository for
zone data
•
It does not require other
services to replicate data
Master — Master When Microsoft introduced Active Directory with
Windows 2000, it changed its DNS implementation. The changes
included the ability to allow special characters in DNS labels and
to store the entire DNS configuration inside the Active Directory.
Since Active Directory had its own replication scheme, a different
DNS architecture known as Master - Master was developed. The
recommended Microsoft architecture for Active Directory specifies
that the DNS servers should reside on the domain controller, thus
eliminating the need to perform zone transfers.
The following table lists the pros and cons of the Master - Master
method of replication:
Master-Master Replication System
Pros
•
A central repository for all
zone data
•
Editing the DNS in one zone
replicates to all others
•
Saves bandwidth and
processing power by using
existing LDAP replication to
replicate DNS data
Cons
•
•
•
Master server updates
are required to make
changes on other servers
If a slave server is
updated, a small delay
exists before the update
is propagated
It requires latest version
of BIND software to take
advantage of updateforwarding
Cons
•
•
•
•
•
•
Microsoft-only implementations
Zone serial numbers can
be inconsistent in SOA
data
Non-standard architecture
Not favored in heterogeneous environments.
Relies on LDAP for replication
LDAP replication may
not be acceptable for
external zone data
Slave DNS Server
Master DNS Server
Domain Controller
2
Slave DNS Server
2
1
1 Update locator records
2 Send updates to slave servers
The Adonis DNS Appliance uses the BIND 9.x name server
software. Therefore all architectures are Master - Slave based. If
this technique becomes more widely accepted with other vendors,
future releases of the Adonis DNS Appliance may contain a Master
- Master replication system.
Slave DNS Server
Master DNS Server
Domain Controller
3
Slave DNS Server
3
1
2
1 Perform transfer of Active Directory Zone
4 | BlueCat Networks
Advantages Of Adonis For Active Directory
DNS Services
Although Windows Server ships with the Microsoft DNS service,
many network administrators use a non-Microsoft implementation
of DNS. A non-Microsoft DNS-based solution such as the Adonis DNS
Appliance integrates well into an Active Directory Environment.
Interoperability with Existing DNS Architecture
The Adonis Server is based upon ISC’s BIND, the most widely used
DNS service implementation and the international benchmark for
DNS. Existing BIND architectures can interoperate easily with the
Adonis Server, while maintaining a similar architecture.
Quick Migration
Existing BIND-based configurations can be quickly imported
and deployed to Adonis Servers. Current Windows DNS
implementations (NT 4.0, 2000, and 2003) can be imported via
BlueCat Networks’ DNS extraction tool. The current Microsoft DNS
management application requires low level scripting or manual
import via zone transfers to migrate from BIND to Windows DNS.
The Adonis Server performs additional data checking on the
imported data to isolate and assist with the resolution of issues
before deployment.
Worm viruses can unload payloads that attack internal systems and
replicate while bringing a network to its knees. The SQL Slammer
worm that exploited a known vulnerability in the Microsoft Data
Engine (MSDE) attacked available root servers by generating
bogus queries. These queries resulted in a large number of ICMP
packets being sent out which eventually rendered some of the
root servers to be off line. Many organizations also discovered that
their own internal DNS servers were being attacked in a similar
manner. The Adonis DNS Appliance contains an integrated firewall,
IP packet spoofing, and a hardened Linux operating system that
resists these types of attacks. Indeed, it is common knowledge that
heterogeneous networks are more resilient to effective attacks
since only some of the servers will be vulnerable to system-specific
exploits.
Total Cost of Ownership (TCO)
The total cost of the Adonis DNS Appliance is considerably lower
than that of a Microsoft DNS server solution. Considering the
volume of Windows updates, vulnerabilities, and scheduled
maintenance combined with the simplistic management
surrounding the Windows solution, the Adonis solution offers a
lower cost of total ownership, even in the first year of deployment.
For more detailed information about the TCO, see the BlueCat
Networks documentation on the Adonis Server’s Return on
Investment (ROI).
MS DNS Server
Superior Configuration Management
The Adonis Server contains an elegant and user-friendly interface
for manipulating DNS configurations and record data. Powerful
features found in most applications include multi-level undo/redo,
cut/copy/paste and data checking functionality that is absent from
the Microsoft DNS application.
Controlled Deployment
Changes are not visible on the DNS server until the user has
deployed the configuration. The current implementation of the
Microsoft DNS application applies the changes to the DNS server as
they are made. This can create issues for applications when simple
typos are introduced into a configuration because records can be
cached for a defined duration. This can lead to network application/
service outages and stability issues. This issue is compounded by
the fact that some applications do not respect DNS Time to Live
(TTL) values and will hold onto invalid data until restarted.
Improved Security
DNS security is often overlooked for private networks because an
internal network is seen as secure and separate from the outside
world. The real problem lies with the sheer volume of exploits in the
Windows operating system that plague network administrators.
Active Directory
MS DNS Server
Domain Controller
Update zone data
Update locator records
MS DNS Server
How to Integrate Active Directory and DNS | 5
Summary
Active Directory DNS Records
Active Directory is the back bone of the Windows Server
architecture and is centered on the LDAP service. DNS plays an
important role in providing the information used by the Windows
Domain locator service to connect and authenticate with Active
Directory. The Adonis DNS Appliance provides features that allow
easy integration with Active Directory, while providing BINDbased DNS services throughout an organization. Organizations
with existing DNS configurations that utilize BIND can be rest
assured that migration to the Adonis DNS Appliance will yield
a compatible, reliable and dependable DNS solution. For more
information about the Adonis DNS Appliance, visit the BlueCat
Networks website at http://www.bluecatnetworks.com.
The following section lists Active Directory-specific records that
are registered by the NetLogon service.
SRV Records
_ldap._tcp.<DomainName>
SRV record that identifies an LDAP server in the domain named
by <DomainName>. The LDAP server is not necessarily a Domain
Controller (DC). This record is registered by all DCs. For example:
_ldap._tcp.bluecatnetworks.com
_ldap._tcp.<SiteName>._sites.<DomainName>
Enables a client to find an LDAP server in the domain named by
<DomainName>. This record is registered by all DCs. For example:
_ldap._tcp.richmondhill.bluecatnetworks.com
_ldap._tcp.dc._msdcs.<DomainName>
Used by clients to locate a Domain Controller (DC) in the domain
named by <DomainName>. This record is registered by all DCs. For
example:
_ldap._tcp.dc._msdcs.bluecatnetworks.com
_ldap._tcp.<SiteName>._sites.dc._msdcs.<DomainName>
Enables a client to locate a DC for the given site and domain named
by <SiteName> and <DomainName> respectively. For example:
_ldap.tcp.richmondhill._sites.dc._msdcs.
bluecatnetworks.com
_ldap._tcp.pdc._msdcs.<DomainName>
Enables a client to locate the Primary Domain Controller (PDC) for
a domain named by <DomainName>. This record is registered only
by the PDC of the domain. For example:
_ldap._tcp.pdc._mscdcs.bluecatnetworks.com
_ldap._tcp.gc._msdcs.<DomainName>
Enables a client to find the Global Catalog (GC) server for the forest
named by <ForestName>. Only the DC for the GC will register this
record. For example:
_ldap._tcp.gc._msdcs.bluecatnetworks.com
_ldap._tcp.<SiteName>._sites.gc._msdcs.<ForestName>
Enables a client to find a GC for the forest named by <ForestName>.
Only an LDAP server responsible for the GC will register this record.
For example:
_ldap._tcp.richmondhill._sites.gc._msdcs.
bluecatnetworks.com
6 | BlueCat Networks
_gc._tcp.<ForestName>
Enables a client to locate a GC for the forest named by <ForestName>. Only an LDAP server responsible for the GC will register
this record. The LDAP server is not necessarily a DC. For example:
_gc._tcp.bluecatnetworks.com
_gc._tcp.<SiteName>._sites.<ForestName>
Enables a client to find a GC for the site and forest named by <SiteName> and <ForestName> respectively. Only an LDAP server responsible for the GC will register this record. For example:
_gc._tcp.richmondhill._sites.bluecatnetworks.com
_kerberos._tcp.<SiteName>._sites.dc._msdcs.<DomainName>
Used by clients to locate the DC running a Kerberos KDC for the
site and domain named by <SiteName> and <DomainName> respectively. For example:
_kerberos._tcp.richmondhill._sites.dc._msdcs.
bluecatnetworks.com
_kpasswd._tcp.<DomainName>
Enables a client to find a Kerberos Password Change Server for the
domain named by <DomainName>. The server is not necessarily a
DC. All DC running the Kerberos KDC will register this record. For
example:
_kpasswd._tcp.bluecatnetworks.com
_ldap._tcp.<DomainGuid>.domains._msdcs.< ForestName>
Used by clients to find a DC given the domain GUID of <DomainGuid> in the forest named by <ForestName>. This lookup can used
to resolve the DC if the domain name has changed. This record is
used infrequently and will not work if the <ForestName> has been
changed. For example:
_ldap._tcp.01693484-b5c4-4b31-8608-80e77ccc78b8.
domains._msdcs.bluecatnetworks.com
_kerberos._tcp.<DomainName>
Enables a client to find a Kerberos Key Distribution Center (KDC)
for the domain named by <DomainName>. This record will be
registered by all DCs providing the Kerberos service. This service is
RFC-1510 compliant with Kerberos 5 KDC. The server is not necessarily a DC. For example:
_kerberos._tcp.bluecatnetworks.com
_kerberos._udp.<DomainName>
Enables a client to find a Kerberos Key Distribution Center (KDC)
for the domain named by <DomainName>. This record will be
registered by all DCs providing the Kerberos service. This service is
RFC-1510 compliant with Kerberos 5 KDC. The server is not necessarily a DC. This service supports UDP.For example:
_kpasswd._udp.<DomainName>
Enables a client to find a Kerberos Password Change Server for the
domain named by <DomainName>. The server is not necessarily a
DC. All DC running the Kerberos KDC will register this record. For
example:
_kpasswd._udp.bluecatnetworks.com
A Records
<ServerName>.<DomainName>
The server name named by <ServerName> is registered in the domain named by <DomainName>. This record is used by referral
lookups to SRV and CNAME records. For example:
dc1.bluecatnetworks.com
gc._msdcs.<ForestName>
Enables a client to find a GC for a given forest named by
<ForestName>. This record is used by referral from SRVrecords. For
example:
gc._msdcs.bluecatnetworks.com
_kerberos._tcp.bluecatnetworks.com
_kerberos._tcp.<SiteName>._sites.<DomainName>
Enables a client to locate a server running the Kerberos KDC for a
site and domain named by <SiteName> and <DomainName> respectively. The server is not necessarily a DC. For example:
_kerberos._tcp.richmondhill._sites.
bluecatnetworks.com
CNAME Records
<DSAGuid>._msdcs.<ForestName>
Enables a client to locate any DC in the forest named by <ForestName> by the GUID of the MSFT-DSA (Directory Services) object.
For example:
01693484-b5c4-4b31-8608-80e77ccc78b8._msdcs.
bluecatnetworks.com
About BlueCat Networks
Founded in 2001, BlueCat Networks – the IPAM Intelligence Company is a leader in providing
enterprise-class IP Address Management (IPAM) platforms and secure DNS/DHCP network
appliances. BlueCat services an account base of over 1000 accounts with thousands of units
sold worldwide. Our award-winning ProteusTM IPAM platforms and AdonisTM family of DNS/
DHCP appliances has successfully garnered end-user acceptance by meeting the rising IP
management demands of healthcare, government, financial services, education, retail, and
manufacturing organizations.
BlueCat Networks, a worldwide market leader in IPAM innovation and thought leadership, is
benchmarking IPAM excellence in the networking industry. BlueCat Networks experiences
overwhelming marketplace acceptance of its networking solutions, resulting in high double
digit growth, year over year, since the company’s inception.
BlueCat Networks is headquartered in Toronto, Ontario, Canada with offices in the United
States, Europe and the Asia Pacific region. It sells networking appliances and services
worldwide through direct and indirect sales channels in over 50 countries.
To Learn More
For more information on BlueCat Networks, and our award winning Proteus IPAM solutions,
please visit our website at www.bluecatnetworks.com or call us at 1-866-895-6931.
North American
Corporate/R&D
Headquarters:
502-4101 Yonge Street
Toronto, ON M2P 1N6
Phone: +1.416.646.8400
Fax: +1.416.225.4728
Toll Free: +1.866.895.6931
European Head Office:
BlueCat Networks BV
Herengracht 466-2
1017CA Amsterdam
The Netherlands
T: +31 20 754 64 85
United Kingdom
BlueCat Networks Europe
Merlin House
Brunel Road
Theale Berkshire RG7 4AB
Phone: +44.118.902.6680
Fax: +44.118.902.6401
Germany
BlueCat Networks
(Zentraleuropa)
Altrottstrasse 31
D-69190 Walldorf, Germany
Telephone: +49.6227.38489.10
Fax: +49.6227.38489.18
Asia Pacific Head Office
1 Fullerton Road
#02-01
Singapore 049213
Phone: +65 6832 5124
Fax: +65 6408 3801
Shanghai, China
12/F, Shui On Plaza, No. 333 Huai
Hai Zhong Rd
Luwan District
Shanghai, China
US Offices:
Reston, VA
1818 Library Street
Suite 500
Reston, VA
20190
Phone: +1.703.956.3551
Atlanta, GA
1165 Sanctuary Parkway
Suite 260
Alpharetta, GA 30009
Phone: +1.770.777.2461
Fax: +1.770.777.2464
Chicago, IL
300 East 5th Avenue
Suite 440
Naperville, IL
60563
Phone: +1.630.946.6297
Philadelphia, PA
1500 Market Street
12th Floor / East Tower
Philadelphia, PA
19102
Phone: +1.215.246.3400
Los Angeles,CA
4640 Campus Drive
Suite 103
Newport Beach, CA
92660
Phone: +1.949.260.8444
Beijing, China
D202/2502 Topbox, No. 69
West Beichen Road
Chaoyang District,
Beijing China, 100029
Phone:+ 86.10.8202.4226
Fax: +86.10.8202.6488
Hong Kong S.A.R.
Suite 1308, 655 Nathan Rd
Kowloon, Hong Kong
Phone: +852.2309.6874
Fax: +852.2216.6656
©2011. BlueCat Networks, the BlueCat Networks logo, the Proteus logo, IPAM Appliance, the Adonis logo, Adonis are trademarks of BlueCat Networks, Inc.
Microsoft, Windows, and Active Directory are registered trademarks of Microsoft Corporation. Any product photos shown are for reference only and are subject to
change without notice. All other product and company names are trademarks or registered trademarks of their respective holders. Printed in Canada.
bluecatnetworks.com