{"id":30,"date":"2014-04-29T16:00:07","date_gmt":"2014-04-29T21:00:07","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=30"},"modified":"2014-04-29T20:27:16","modified_gmt":"2014-04-30T01:27:16","slug":"ad-reading-active-directory-replication","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=30","title":{"rendered":"AD Reading: Active Directory Replication"},"content":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Replication.<\/p>\n<p><strong>Replication<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx\">How Active Directory Replication Topology Works<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_uvgz\">Active Directory KCC Architecture and Processes<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_yipb\">Replication Topology Physical Structure<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_qvtw\">Performance Limits for Replication Topology Generation<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_mmhv\">Goals of Replication Topology<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_rrnv\">Topology-Related Objects in Active Directory<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_imft\">Replication Transports<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_bwzg\">Replication Between Sites<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_ludi\">KCC and Topology Generation<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_ueyj\">Network Ports Used by Replication Topology<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994.aspx#w2k3tr_repto_how_uhrf\">Related Information<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc782376%28WS.10%29.aspx\">Active Directory Replication Model<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc737314%28v=ws.10%29.aspx\">What Is the Active Directory Replication Model?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772726%28v=ws.10%29.aspx\">How the Active Directory Replication Model Works<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc739941%28v=ws.10%29.aspx\">Active Directory Replication Tools and Settings<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755326%28WS.10%29.aspx\">Active Directory Replication Topology<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc775549%28v=ws.10%29.aspx\">What Is Active Directory Replication Topology?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755994%28v=ws.10%29.aspx\">How Active Directory Replication Topology Works<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc739941%28v=ws.10%29.aspx\">Active Directory Replication Tools and Settings<\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=5838\">AD Branch Office Guide<\/a> (download)<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=CB42FC06-50C7-47ED-A65C-862661742764&amp;displaylang=en\">Microsoft Active Directory Topology Diagrammer<\/a><\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/224815\">The Role of the Inter<\/a><a href=\"http:\/\/support.microsoft.com\/kb\/224815\">&#8211;<\/a><a href=\"http:\/\/support.microsoft.com\/kb\/224815\">Site Topology Generator in Active Directory Replication<\/a><\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/?id=315071\">How to view and set LDAP policy in Active Directory by using Ntdsutil.exe<\/a><\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/default.aspx\/kb\/884776\">How to configure the Windows Time service against a large time offset<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bridgehead_server_selection%28WS.10%29.aspx\">BridgeHead Server Selection<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/DOWNLOADS\/details.aspx?FamilyID=9353a4f6-a8a8-40bb-9fa7-3a95c9540112&amp;displaylang=en\">Active Directory Load Balancing<\/a><a href=\"http:\/\/www.microsoft.com\/DOWNLOADS\/details.aspx?FamilyID=9353a4f6-a8a8-40bb-9fa7-3a95c9540112&amp;displaylang=en\">Tool (ADLB)<\/a><\/li>\n<li><a href=\"http:\/\/blogs.technet.com\/b\/askds\/archive\/2013\/01\/21\/configuring-change-notification-on-a-manually-created-replication-partner.aspx?Redirected=true\">Configuring Change Notification on a MANUALLY created Replication partner<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Replication. Replication How Active Directory Replication Topology Works o\u00a0\u00a0 Active Directory KCC Architecture and Processes o\u00a0\u00a0 Replication Topology Physical Structure o\u00a0\u00a0 Performance Limits for Replication Topology Generation o\u00a0\u00a0 Goals of Replication Topology o\u00a0\u00a0 Topology-Related Objects in Active Directory o\u00a0\u00a0 Replication Transports o\u00a0\u00a0 Replication Between &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=30\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-30","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-adreading","tag-mcm","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/30","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/30\/revisions"}],"predecessor-version":[{"id":31,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/30\/revisions\/31"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}