When identifying the host systems that will be used in your deployment, consider the following:
Will the system be dedicated to a single server?
Will the system be running other applications, and if so, what will the other applications be?
What percentage of the system's resources will these applications require?
When the host systems have been identified, select a host name for each host in the topology. Make sure that each host system has a static IP address.
Restrict physical access to the host system. Although Directory Server Enterprise Edition includes many security features, directory security is compromised if physical access to the host system is not controlled.
If the Directory Server instances do not provide a naming service for the network, or if the deployment involves remote administration, a naming service and the domain name for the host must be properly configured.