Microsoft Certified Systems Engineer: Types of Networks
Microsoft Certified Systems Engineer: Types of Networks
Microsoft Certified Systems Engineer: Types of Networks
Components of MAN:
1. Router
2. Brouter (Brouter is a combination of bridge or router)
3. ATM Switches
4. DSL connectivity (DSL – Digital Subscriber Link) ex: Star cables
.
3) Wide Area Networking (WAN): Interconnection of LANs or MANs located within the same
geographical area or different area it depends on telecommunication services.
Components of WAN: Same as MAN:
Networking devices:
Hubs, Switches, Routers and NICs.
HUB: Hub is a centralized device provides communication among systems when
we have more than 2 computers we need to have a device called hub to
interconnect.
Disadvantage of a Hub:
When we want to transfer some data from one system to another system.
If our network has 24 systems the data packet instead of being sent only to the destined system
it is being send to all the network participants. (i.e. 24 systems.) Hubs follow broadcasting
SWITCH: It is an advanced version over a Hub.
The main benefit of switch is Unicast. Data packets are transmitted only to the
target computer instead of all.
Switch maintains a table called MIT (Mac Information Table.) which is generated as soon as we
turn on the switch, which acts like an index table and easy the process of finding the networked
system. MIT contains the port no, IP address and MAC address.
MAC: (Media Access Control): It is an address burnt in the NIC by the
manufacturer.
MAC address is of 48 bits in the farm of Hexa decimal.
Every NIC has its own unique MAC address.
MAC address determines the physical location of a system.
ROUTER: Router is a device connects two different networks.
Class A network with Class C network etc.
Routing is a process of communication between two different networks.
Network Topologies:
The way of cabling is called topology.
The architecture of a network is called topology
E.g.: Bus, Star, Ring, and Mesh Topologies.
Bus Topology:
Components of Bus Topology:
1. Co-axial cable (back bone cable)
2. T- connectors
3. BNC (British Network Connector)
4. Terminator
5. Patch cable
Disadvantages of Bus:
If anything goes wrong with backbone cable whole network is down.
Follows a serial communication.
Outdated these days.
Star Topology:
Star topology is an advanced version over bus topology. Where it uses either a
hub or a switch, it uses cat5/6 cables.
It uses connecters called (Recommend Jack) - RJ45
Star topology offers faster data transfer or processing.
Ring Topology:
Ring topology is useful when we want redundancy (fault tolerance) we go with
this type of topology.
Ring topology uses a device called MSAU. (Multi Station Access Unit)
It is a unit inside which a logical ring is formed. This ring ensures the availability
of Network. The availability of ring ensures availability of network.
It was basically implemented in IBM networks.
Logical Topologies: are two types
1. Work group.
2. Domain
Workgroup (peer to peer):
•
Any O/S like, DOS, 95, 98, workstation, win 2000 pro, and XP pro can
be configured as work-group model.
•
No administrator is required
•
Where we are not using client server based applications. Like oracle,
SQL and exchange etc.
Domain (Client/Server)
Domain is a collection of computers connected together with a server and users
Domain model can have servers like UNIX, Novell NetWare, WIN-NT server,
2000 server, and 2003 server.
Provides centralized administration.
Suitable for medium to large size networks/organizations.
Suitable when we have client server architecture (Back ends & front ends)
Domain offers security and provides logon authentication.
Suitable if security is criteria
Requires an administrator.
The History of MS Network O/S:
1. Desktop O.S.: DOS, 95, WKS, 98, 2k Prof., XP-Prof.
2. Network O.S.: UNIX, Win NT server 4.0, Win 2000 server, Win 2003 server.
Win NT 3.1 – was introduced in 1993
Win NT 3.5 – was introduced in 1994
Win NT 4.0 – was introduced in 1996
Win NT5.0 was renamed as windows 2000 server.
.NET server was renamed as windows 2003 server
WINDOWS 2000
FAMILY
Professional (Client)
Standard Server
Advanced server
Data center server
WINDOWS 2003
FAMILY
Standard Server
Enterprise edition
Advanced server
Data center server
HARDWARE REQUIREMENTS
Windows 2003 Standard Edition:
RAM: Min:128 MB
Rec: 256 MB
Max. RAM 4 GB
Processor: Pentium 550 MHz
HDD free space 1.5GB
SMP: 4 processors
Windows 2003 Enterprise Editions:
RAM: Min:128 MB
Rec: 256 MB
Max. RAM 16 GB
Processor: Pentium 733MHz
HDD free space 1.5GB
SMP:16 processors
Windows 2003 Web Edition:
RAM: Min:128 MB
Rec: 256 MB
Max. RAM 2 GB
Processor: Pentium 550 MHz
HDD free space 1.5GB
SMP: 2 processors
Windows 2003 Data Center Edition:
RAM: Min: 1GB
Rec: 2GB
Max. RAM 64 GB
Processor: Pentium 733MHz
HDD free space 1.5GB
SMP: 64 processors
IP Addressing:
There are two versions of IPs
1. IP version 4: offers IPs up to 4.2 billion (32 bit size)
2. IP version 6: 128 bit size.
IP address is used for identifying the system and provides communication.
IP address is of 32 bits divided in four octets.
Each Octet is of 8 bits, separated by a (.) dot.
IP is a combination of Network ID & Host ID.
Uses subnet mask to differentiate Network ID with Host ID.
Subnet mask acts like a mask between Network ID & the Host ID.
Numbers range between 0-255.
Organizations responsible for assigning IPs to clients.
IANA: Internet Assign Naming Authority.
ICANN: Internet Corporation assigning for name Numbers.
IANA has classified IP addressing into classes.
Class A:
1-126(used in LAN/WAN)
Class B:
128 – 191(used in LAN/WAN)
Class C:
192 – 223(used in LAN/WAN)
Class D:
224 – 239 (used for multi casting)
Class E:
240 – 254 (used for experimentation & research)
Class Format
No of N/Ws
No of Hosts
Subnet mask Range
A
N.H.H.H
28-1126
2 24 – 2 16.777.214
255.0.0.0
1 – 126
B
N.N.H.H
216-216.384
2 16 – 2 65.534
255.255.0.0
128 - 191
C
N.N.N.H
224-32.097.152
2 8 – 2 254
255.255.255.0
192 – 223
D
MULTICAST
N/A
N/A
N/A
224 – 239
E
RESEARCH
N/A
N/A
N/A
240 - 254
Class A:The first octet is reserved for network ID.
The first bit of first octet is always (0).
Class B: The first two octets are reserved for Network IDs.
The first two bits of first octet are reserved as (10)
Class C: The first three octets are reserved as network portions.
The first three bits of first octet are reserved as (110)
Class D: Used for Multicasting.
The first four bits of first octet are reserved as (1110)
Class D: Used for Experimentation.
The first bit of first octet is called as priority bit which determines the class of N/W
Any O/S like, DOS, 95, 98, workstation, win 2000 pro, and XP pro can
be configured as work-group model.
•
No administrator is required
•
Where we are not using client server based applications. Like oracle,
SQL and exchange etc.
Domain (Client/Server)
Domain is a collection of computers connected together with a server and users
Domain model can have servers like UNIX, Novell NetWare, WIN-NT server,
2000 server, and 2003 server.
Provides centralized administration.
Suitable for medium to large size networks/organizations.
Suitable when we have client server architecture (Back ends & front ends)
Disadvantages of Bus:
If anything goes wrong with backbone cable whole network is down.
Follows a serial communication.
Outdated these days.
Star Topology:
Star topology is an advanced version over bus topology. Where it uses either a
hub or a switch, it uses cat5/6 cables.
It uses connecters called (Recommend Jack) - RJ45
Star topology offers faster data transfer or processing.
Ring Topology:
Ring topology is useful when we want redundancy (fault tolerance) we go with
this type of topology.
Ring topology uses a device called MSAU. (Multi Station Access Unit)
It is a unit inside which a logical ring is formed. This ring ensures the availability
of Network. The availability of ring ensures availability of network.
It was basically implemented in IBM networks.
Logical Topologies: are two types
1. Work group.
2. Domain
Workgroup (peer to peer):
•
Any O/S like, DOS, 95, 98, workstation, win 2000 pro, and XP pro can
be configured as work-group model.
•
No administrator is required
•
Where we are not using client server based applications. Like oracle,
SQL and exchange etc.
Domain (Client/Server)
Domain is a collection of computers connected together with a server and users
Domain model can have servers like UNIX, Novell NetWare, WIN-NT server,
2000 server, and 2003 server.
Provides centralized administration.
Suitable for medium to large size networks/organizations.
Suitable when we have client server architecture (Back ends & front ends)
Domains
Trees
Forest
Organizational units
PHYSICAL STRUCTURE
Sites
Domain controllers
A.D. Components:
•
Creating a site:
Extensible
•
Dynamic
•
“map” of AD implementation
•
Domains
•
Trust relationships
•
Subnets
•
Units of replication.
•
Domain controllers in a domain replicate with each other and contain a full
copy of the domain partition for their domain.
•
Useful when we are using AD integrated services like DNS, TAPI services
etc..
FSMO roles: (Flexible Single Master Operations):
Forest wide Master Operation
1. Schema master
2.Domain Naming master
Domain wide master operation
3. PDC emulator
4. RID master
5. Infrastructure master
Schema Master:
Responsible for overall management of the entire schema in a forest.
The first DC installed acts as a schema master in the entire forest.
There can be only one schema master in the entire forest
Domain Naming Master:
Responsible for addition /removal of domains.
It maintains the uniqueness of domain names.
There can be only one DNM in the entire forest.
3. PDC emulator:
PDC provides backward compatibility for existing NT BDCs and workstations. (If
it is running in mixed mode)
PDC updates the password changes made by the users.
It is also responsible for synchronizing the time.
There can be only one PDC emulator per domain.
4. RID master:
Responsible for assigning unique IDs to the objects created in the domain.
There can be only one RID master per domain
SID – Security Identifier it maintains a access control list. It is divided into two
parts.
1. DID (Domain Identifier)
2. RID (Relative Identifier)
For knowing the SID of the user
5. Infrastructure master:
Responsible for maintaining the updates made to the user & group membership.
It also maintains universal group membership.
There can be only one infrastructure master per domain
The term flexibility means we can transfer any of the 5 roles from DC to ADC.
Transfer of Roles
:We can transfer the roles for some temporary maintenance issues on to ADC
and again we can transfer back the roles onto DC.
DNS
NTFS volume with 250 MB of free HDD space
On Member Server or stand alone machine specify the server’s DNS.
>Start
>run>dcpromo>next>next>next>domain
controller
for
a
new
domain>next>
Child Domain in an existing tree>specify the parent domain’s administrator’s name & pwd.
>Specify the child name>next>netbios name> next> database folder>
next>Sysvol>next>restart.
Installing New Domain tree in an existing forest:
Requirements:
Forest (initial domain controller or root domain controller)
On member server or stand-alone machine.
Specify the server’s DNS.
Start>run>dcpromo>next>next>next>Domain Controller for a new domain.
Select Domain tree in an existing forest.
Specify the root domain’s admin’s name & pwd
Next> specify the new domain name>next>net bios name>next>database >
next>sysvol>next>DNS next>permission compatible >next>restore mode pwd>next
Trust Relationship: Trust is a process of enabling resources of one domain to be
accessed by another domain.
Functional Levels:
1. Domain Functional Level:
A) Windows 2000 mixed
B) Windows 2000 native
C) Interim
D) Windows 2003 server
2. Forest Functional Level:
a) Windows 2000 mixed
b) Interim
c) Windows 2003 server.
Windows 2000 mixed:
By default when we install 2000 or 2003 o/s it gets installed in win 2000 mixed
mode.
This mode supports older versions of win2003. We can add NT, 2000 flavors in
2003 networks.
Windows 2000 native:
It supports only 2000 and 2003; Native mode can have 2000&2003 flavors only.
Interim:
This mode can have NT and 2003. Useful when we upgrade NT to 2003
Establishing Trusts:
It supports only 2000 and 2003; Native mode can have 2000&2003 flavors only.
Interim:
This mode can have NT and 2003. Useful when we upgrade NT to 2003
RAS server
T.S.
Configuring a member server
Requirements:
DC
Stand alone server 2003 flavor
On Stand-alone server:
Configure TCP/IP
Specify DNS server’s address
My computer right click
Select properties
Computer name
Change
Domain
Specify name (ex: zoom.com)
Ok> it says welcome to domain
Restart system.
Configuring win2003 or XP professional as a client:
Same as configuring member server;
Server: Ex: NT, 2000, 2003
Client: ex: WKS, Prof., And XP
User Management:
User Account: User A/Cs is useful for assigning to the user to participate in the
network.
There are two types of accounts
Domain User Accounts
Local User Accounts
1. Domain User Accounts: These are created in the AD and they proved
centralized management of users besides easy administration
2. Local User Accounts: These can be created on the Local machines where the
client works. Ex. 2000 prof. XP prof. < win2003 member server etc.
These accounts do not provide centralized management.
Suitable only for smaller organizations where there is no server.
Creating a Domain User Accounts
.On DC
next logon>next>finish
Start>run>cmd
dsadd user cn=username,cn=users,dc=ibm,dc=com –pwd zoom_123
For removing
dsrm user cn=username…….
Creating a local user Account in Member Server
On member server
Log on to local user a/c
Right click on my computer
Manage
Expand local users
Right click on users.
New user
Supply the user name&pwd
Click on create
Log off
Log in as user
Creating a Local user a/c from command mode
On member server
Login as administrator
Go to command prompt
Net user username
Password
Ex: net user u1 zoom_123 /add
If we want to delete.. /del
User right assignments (Logon locally allowing logon locally right to a normal
user.)
On DC
Create a user a/c in ADUC
Allowing him to logon
Start >programs>admin tools>DCSP>expand local policies>user rights>D/C
allow logon locally>add the user.
Start>run>gpupdate.
Verify:
On DC logon as a user
The moment we create a share on a server, server acts like a file server.
Sharing a resource:
On DC
Open my computer
Select any drive
Create a new folder
Give name of the folder
Right click on the folder
Select sharing and security
Share this folder
Apply > ok
Accessing share resources from a client machine:
On client machine
Open my network places
Entire network
Microsoft windows n/w
Domain name (ex. Zoom)
Computer name
Creating a share through command line
:On DC
Go to command prompt
md sharename
net share sharename=c: \share name
Connecting to a share resource through a command prompt:
On member server
Go to command prompt
net use z:\\computername\sharename
Mapping a drive (connecting to the share from GUI):
On member server
Right click on my computer
Map network drive
Select the drive letter
Uncheck or check reconnect logon
Browse the share folder
Computer name>share name>ok>finish.
The moment we create a share on a server, server acts like a file server.
Sharing a resource:
On DC
Open my computer
Select any drive
Create a new folder
Give name of the folder
Right click on the folder
Select sharing and security
Share this folder
Apply > ok
Accessing share resources from a client machine:
On client machine
Open my network places
Entire network
Microsoft windows n/w
Domain name (ex. Zoom)
Computer name
Creating a share through command line
:On DC
Go to command prompt
md sharename
net share sharename=c: \share name
Connecting to a share resource through a command prompt:
On member server
Go to command prompt
net use z:\\computername\sharename
Mapping a drive (connecting to the share from GUI):
On member server
Right click on my computer
Map network drive
Select the drive letter
Uncheck or check reconnect logon
Browse the share folder
Computer name>share name>ok>finish.
Permissions
Using permissions an administrator can either allow or deny access to a
resource.
1. Share level
2. File system or NTFS
Share level permissions
Share level permissions are applied over the network.
Share level permissions are not applied on the local machine where the resource
is existing.
There are three types of share level permissions
Full control RWXDO (Read/Write/Execute/Delete/Ownership)
Change
RWXD
Read
R
Practice:
On DC
Create a share
Create three users
Set permissions
Setting permissions:
Create folder> share> right click on folder> properties> permission
> Remove everyone
>Add all the users whom you want to allow or deny.
>Apply>ok.
Verification:
Move on to client machine
Login as different users
Try to access the n/w resources.
2. NTFS permissions:
NTFS permissions are powerful permissions and they offer file and folder level
security. NTFS permissions are useful for securing locally available resources.
NTFS Features:
File/folder level security
Compress
Encryption
Quotas
Reduced fragmentation
Hot fixing
Volume shadow copy services
Mounting
Separate recycle bin for each user
NTFS permissions
Full control
RWXDO
Modify
RWXD
Read & Execute
RX
List folder contents L
Read
R
Write
RWX
Implementing NTFS permissions
:On member server-Create a folder
On DC-Create 3 users.
On member server
Right click on the folder
Properties
Security
Add the users we have created on DC
Ok
Select the user and set the permission
U1-full control
U2-modify
U3-read
Apply-ok.
Experiment2:
Login as administrator on member server
Create a folder
Folder properties
Security
Advanced-uncheck the box allow inheritable permissions..
Remove
Apply – ok.
Add the users we have created along with the administrator
Administrator -full control
U1 – full control
U2 – modify
U3 – read – apply – ok
When a user logs in for the first time the user will be loaded with a default user
profile.
Default user profile is located under
C:\documents and settings\default user
Types of profiles:
Local profile
Roaming profile
Mandatory profile
Local profile: It is a profile loaded for the user and saved in the local hard drive
where the user works.
And profile will be saved when a user logs off
Local profiles are limited only to the machine where they are saved.
A user with a local profile will not be loaded with a network profile when he logs
on from another machine.
Verifying the type of the profile:
My computer
Properties
Advanced
User profile – settings
Roaming Profile: It is a profile, which is saved in the shared folder on the server.
Hence available in the entire network.
Roaming profile is a n/w profile which is available in the entire network. As a result when a user
logs in from any machine in the n/e he will be loaded with a roaming.
Creating a roaming profile:
On DC
Create a user A/C
Create a folder
And share it and give full control permission for everyone
Start >P>ADUC
Double click the user
Profile
Profile path ex: \\sys1\profile\username
Apply – ok
Move on to member server
Log in as user
My computer
Properties
Advanced-profile settings-you should notice “roaming profile”.
environment setting especially used for restricting user from saving user data,
It is a type of roaming profile but settings are not saved when a user logs off.
Changes will be available only for the session where user is active. (Active
session)
Home folders: Home folders are separate folders where users save their data and protect their
data from other users every user can have one home folder either on the server on the local
machine.
If the home folder is in the server an administrator can secure it and back-up.
If the home folders are created in the local machine backing up is not that easy.
Remove everyone
Add administrator and user1
Give full control for both
Apply ok
Open ADUC
Create a user a/c
Go to user properties
Profile
Connect home folder
Select the drive letter
To mention the path
Ex: sys1\u1\home\u1
Apply ok
Verifying:
On client machine
Log in as user
Open my computer
We should notice an extra drive letter
Go to cmd prompt
We should not get the drive letter we have assigned.
Creating a local home folder:
On Member server
Login as administrator
Create a folder in any drive
Share it
Permissions
Remove everyone
Add administrator &u2
Give full access
Apply – ok
Move on to server or DC
Open
ADUC
create a user
Go to user properties
Profile
Home folder
Give local path
Ex: E:\u2home
Apply-ok
Verifying:
Move on to client machine
Login as user
Go to command prompt.
We should notice the local folder
Offline folders:
It is a feature of 2000&03-network resources in spite of no network connections
(offline)
Implementing offline folders
On server client
Open my computer
Tools
Folder options
Offline files
Check the box enable offline files
Apply – ok
Repeat same process on the client also
On server
Create a folder
Share it
Everyone full access
On the client machine
Access the share resources through the n/w places
Right click on the share resources
Make available offline
Next
Check the box automatically
Next – finish
On the client machine
Access the n/w share
Disabling NIC
Network places
Properties
Right
click
on
LAN
select disable
Open n/w places
We will notice another system
Access the offline folder from server
Do some modifications to that folder
Enable NIC.
DFS (Distributed File System)
DFS allows administrators to make it easier for users to access and manage file
that are physically distributed across a network.
With DFS, you can make files distributed across multiple servers. It may appear
for users that files actually reside in one place (computer) on the network.
Benefits of DFS
1. Easily access: users need not remember multiple locations form where they
get data just by remembering one location they get access to the data.
2. Fall tolerance: for master DFS server we can have a replica (Target) on another DFS server.
With the master DFS server face users can still continue accessing the data from back up DFS
(Target)
There is no interruption to accessing data
3. Load balancing: if all the DFS root servers and targets are working fine it leads
to load balancing.
This is achieved by specifying locations for separate users.
4. Security: We can implement security by using NTFS settings.
DFS Terminology:
1. DFS root
2. DFS links
3. DFS targets
4. Domain DFS root
5. Stand – alone DFS root
Domain DFS root: it is a server configurable in the domain and offers fall tolerance and load
balancing. It is a root server, which maintains links from other file servers
Requirements: DC or Member Server
Stand-alone DFS root: It is configurable work group model and does not provide
fall tolerance &load balancing
DFS root: DFS root is the beginning of a hierarchy of DFS links that points to
shared folders.
DFS link: a link from a DFS root to one or more shared file or folders.
Targets: the mapping destination of a DFS root or links, which corresponds to a
physical folder that has been shared.
Implementation of DFS
Creating a DFS root:
On DC
Create a folder in any drive
Share it
Give everyone full control
Use the folder name as DFS root
Create 2 more folders for links
Share them & everyone full control
Finish
Disk Quotas:
It is a new feature of 2000&03
Using this feature an administrator can restrict the users from using disk space.
i.e. an administrator can limit the size of the disk space usage.
Quotas can be implemented in two ways
On computer basis (local machine)
User basis (network resource)
Quotas can be implemented only on NTFS volumes.
Implementing & quota for a user (user basis)
On member server
Login as administrator
Open my computer
Right click on D or E drive
Properties
Quota
Check the box enable quota management and
Deny disk space to users
Click on quota entries tab
Select quota
New quota entry
Select the user
Set limit disk space to the user (in KB or MB only)
Verification
Login as user
Open the restricted or quota drive
Try to save something
Implementing quota on computers
On member server
Login as admin
Open my computer
E drive properties
Quota
Enable quota management
Deny disk space to user
Select limit disk space
Specify the limits in KB or MB
Apply – ok
Organizational Units (OU)
It is a logical component of AD
It is a container object
It can contain objects like users, groups, computers, share folder, printer, and
contacts.
OUs are basically used for dividing a single domain into smaller portions for
efficient management and organization of the resources
Creation of OUs:
On DC
Start >P>admin tools>ADUC
Right click on the domain
New
Organizational unit
Give the name of the unit
Delegate Control:
Useful when an administrator to handover partial administration of the domain to
an assistant administrator delegate control can be assigned to sub admins on
OUs or on domains.
Assigning Delegate control for sub administrator.
On DC
Open
ADUC
select domain controller (right click)
New user
Right click on OU
Delegate control
Next – add the user we’ve created.
Next>select as our wish
Next – finish
Verification:
Move on to member server
Login as sub administrator
Start – run – dsa.msc
Try to create users in delegated OU
Taking back delegation of control from a User:
On DC
Open ADUC
Click on view
Advanced features
Select the OU which we want to take back control
Right click > properties
Security
Select the sub admin user
Remove – apply – ok
Group Policy
It is a feature of 2000&03 with which an administrator can have full control on users and
computers. Using group policy we can implement security, policies, software deployment, folder
redirection, Internet explorer maintenance.
Disk Quotas:
It is a new feature of 2000&03
Using this feature an administrator can restrict the users from using disk space.
i.e. an administrator can limit the size of the disk space usage.
Quotas can be implemented in two ways
On computer basis (local machine)
User basis (network resource)
Quotas can be implemented only on NTFS volumes.
Implementing & quota for a user (user basis)
On member server
Login as administrator
Open my computer
Right click on D or E drive
Properties
Quota
Check the box enable quota management and
Deny disk space to users
Click on quota entries tab
Select quota
New quota entry
Select the user
Set limit disk space to the user (in KB or MB only)
Verification
Login as user
Open the restricted or quota drive
Try to save something
Implementing quota on computers
On member server
Login as admin
Open my computer
E drive properties
Quota
Enable quota management
Deny disk space to user
Select limit disk space
Specify the limits in KB or MB
Apply – ok
Organizational Units (OU)
It is a logical component of AD
It is a container object
It can contain objects like users, groups, computers, share folder, printer, and
contacts.
OUs are basically used for dividing a single domain into smaller portions for
efficient management and organization of the resources
Creation of OUs:
On DC
Start >P>admin tools>ADUC
Right click on the domain
New
Organizational unit
Give the name of the unit
Delegate Control:
Useful when an administrator to handover partial administration of the domain to
an assistant administrator delegate control can be assigned to sub admins on
OUs or on domains.
Assigning Delegate control for sub administrator.
On DC
Open
ADUC
select domain controller (right click)
New user
Right click on OU
Delegate control
Next – add the user we’ve created.
Next>select as our wish
Next – finish
Verification:
Move on to member server
Login as sub administrator
Start – run – dsa.msc
Try to create users in delegated OU
Taking back delegation of control from a User:
On DC
Open ADUC
Click on view
Advanced features
Select the OU which we want to take back control
Right click > properties
Security
Select the sub admin user
Remove – apply – ok
Group Policy
It is a feature of 2000&03 with which an administrator can have full control on users and
computers. Using group policy we can implement security, policies, software deployment, folder
redirection, Internet explorer maintenance.
Software setting
Windows setting
Administrative templates
Group Policy – II
Software Deployment
It is a feature of 2000&03 can be implemented through group policies either on
computers or users.
It is a process of spreading out the software required onto the client machines
when a user starts the computer.
With the help of software deployment we can install, uninstall, upgrade, repair
and add patches &service packets.
Software deployment is possible only when the software is with .msi extension.
(msi – Microsoft Installer)
MSI provides the services like
Installation
Uninstallation
Roll back
Repair over the network.
Software deployment is possible only with .msi or .zap extension.
Using WININSTALLLE 2003 software we can convert *.exe files to *.msi files
Setup.exe file cannot be deployed over the network but can be converted to setup.msi files with
the help of the software ‘wininstall le2003’. This is the product of Veritas Company.
Installing wininstall le2003 software
On DC
Open D or E drive
Application folder
Double click on wininstallle.exe
Next – I accept – next
Provide email details – next
Next – next – install – finish.
Phase – I
Converting .exe to .msi (before snap shot)
On DC
Open my computer
Select any drive
Create 2 folders with the names .exe and .msi
And share them with full access
Open D or E drive
Open application folder
Copy acrobat &retina
Paste it in the .exe folder we have created
On DC
Start > p> wininstall le2003
Right click on that
Run discover ok – next
Specify the name of the application (ex. Acrobat)
Click on the dotted tab
Browse .exe folder from my n/w places
Open the folder and name the application (ex. Acrobat.msi)
Open – next - select C drive
Add the drives, which we have
Next – finish
Phase – II
Installation
On DC
Open my computer
Open exe folder we have created
Install acrobat software
In this phase II process comes up to .mxi
Phase – III
Performing After snap shot
On DC
In wininstall le
Right click on wininstall le packages
Run discover – ok
Perform after snap shot
Next
P-I
P- II
P- III
Scans the system
install acrobat
changes made after
installation
Registry
Software
Available
. mxi
.msi
Conversion Process
Phase –I (before snap shot)
In this wininstall le scans the complete system and the register and checks for
installed applications. And takes the snap shot of the current condition of the OS.
Phase- II (Installation)
In this phase we have to install the software, which we want to convert to .msi
Phase – III (After snap shot)
In this phase wininstall le compares two previous states, before snap shot
&installation and takes another snap shot with installation.
Note: Using these three phases the Microsoft software installer can trouble-
shoot or deploy the software.
Software Deployment
On DC
Open ADUC
Create 2 OUs
Create a user in each OU
Select 1st OU properties
Group policy new
Name the GPO (ex. Deploy)
Edit user configuration
Software settings
Right click s/w installation
New package
Browse the msi s/w from my n/w places
Select .msi
Select publish
Ok
Verification:
On member server
Login as user we’ve created in OU
Open control panel
We should notice the s/w we’ve deployed
Add/remove program
Ok
Types of deployment
1) Publish
2) Assigned
3) Advanced
1) Publish
If we use publish software will be available in control panel and can be installed
when the user wants. (on demand)
2. Assigned
If we select assigned, s/w gets installed on the client machine when a user opens
the application for the first time.
3. Advanced:
It is useful when we want to upgrades s/w, install service packs or patches etc…
On DC
Start > p> wininstall le2003
Right click on that
Run discover ok – next
Specify the name of the application (ex. Acrobat)
Click on the dotted tab
Browse .exe folder from my n/w places
Open the folder and name the application (ex. Acrobat.msi)
Open – next - select C drive
Add the drives, which we have
Next – finish
Phase – II
Installation
On DC
Open my computer
Open exe folder we have created
Install acrobat software
In this phase II process comes up to .mxi
Phase – III
Performing After snap shot
On DC
In wininstall le
Right click on wininstall le packages
Run discover – ok
Perform after snap shot
Next
P-I
P- II
P- III
Scans the system
install acrobat
changes made after
installation
Registry
Software
Available
. mxi
.msi
Conversion Process
Phase –I (before snap shot)
In this wininstall le scans the complete system and the register and checks for
installed applications. And takes the snap shot of the current condition of the OS.
Phase- II (Installation)
In this phase we have to install the software, which we want to convert to .msi
Phase – III (After snap shot)
In this phase wininstall le compares two previous states, before snap shot
&installation and takes another snap shot with installation.
Note: Using these three phases the Microsoft software installer can trouble-
shoot or deploy the software.
Software Deployment
On DC
Open ADUC
Create 2 OUs
Create a user in each OU
Select 1st OU properties
Group policy new
Name the GPO (ex. Deploy)
Edit user configuration
Software settings
Right click s/w installation
New package
Browse the msi s/w from my n/w places
Select .msi
Select publish
Ok
Verification:
On member server
Login as user we’ve created in OU
Open control panel
We should notice the s/w we’ve deployed
Add/remove program
Ok
Types of deployment
1) Publish
2) Assigned
3) Advanced
1) Publish
If we use publish software will be available in control panel and can be installed
when the user wants. (on demand)
2. Assigned
If we select assigned, s/w gets installed on the client machine when a user opens
the application for the first time.
3. Advanced:
It is useful when we want to upgrades s/w, install service packs or patches etc…
Folder Redirection
It is useful when we have implemented mandatory profile for users as a result they cannot save
anything on the desktop, unknowingly if they save, that saved desktop contents should be
saved in another location we call it as folder redirection. (Users do not lose their data)
Implementing folder redirection:
On DC
Create a roaming profile for a user
And convert it into mandatory
Note: create a new OU at first and create a user in that and make that user
profile as mandatory.
On DC
Open ADUC
Right click on OU we’ve created
Group policy
New > GPO name> edit
User configuration
Windows settings
Folder redirection
On desktop right click
Properties
Select the settings as basic
Browse share folder from n/w places
Ok.
Create a folder
Share it
Every one full access
Verification
On member server
Login as user we’ve created in OU
Save something on the desktop
Ex: save some folders > properties
We should notice the location should be UNC path (Universal Naming
Convention)
Logoff &login
SCRIPTS
Scripts are useful to automate administrative tasks, which are routine. We can
have startup and shutdown scripts, administrative scripts, login & logoff scripts
On DC
Create a folder (in D or E drive)
Share it with full control
Start-run (notepad)
Type wscript.echo “use the force read the source”
Save the file as (filename.vbs) in the share folder we have created
Open ADUC
Create an OU and a user
OU properties
Group policy
GPO name (ex. Script)
Edit
User configuration
Windows settings
Scripts
Double click on logon
Add
Browse the script we’ve save in the share folder from n/w places
Ok
Verification:
Move on to member server
Log in as a user
We should notice a welcome message
Backup:
It is a process of protecting user data or system state data on to separate storage
devices.
NT supported only one type of storage media, i.e. tapes.
2000&03 supports tapes, floppies, HDDS (Hard Disk Drives), zip floppies, RSD
(Remote Storage Devices)
Back up utilities:
The default backup utility provided by NT, 2000, 2003.
NTbackup utility Comes along with the OS. Provides minimum benefits could
have optimum benefits.
There are some third part utilities
•
Veritas - BackupExec
•
Netback up
Starting back up utility:
On DC
Or member server
Start
5. Daily backup: it backs up all selected files & folders created or changed
during the day after backed up does not remove the archive bit.
Recommended backup strategy:
1. If we select incremental back up it is faster and restoration is slower. I.e.
more number of tapes have to be restored
2. If we go with differential backup, backup is slow, but restoration is fast i.e.,
just by restoring 2 tapes.
System state data:
Components of SSD:
A D
B o o t f i l e s
S y s t e m f i l e s
S e r v i c e s
R e g i s t r y
C o m + i n f
C l u s t e r i n f o
I . I . S .
SSD is a data store if we want to backup complete AD we can back up system
state data from backup utility.
Taking a back up of system state data:
Start - run – ntbackup – click on advanced mode – backup – next
Select 3rd one system state data – next – save in E drive - create a folder (SSD)
in this folder create a file with filename .bkf – next – advanced - next
Restoration
There are two types of restoration
Non-authoritative restore
Authoritative restore
Restoration of system state data can be done either authoritative or non
authoritative
Non-authoritative restore is a normal restore useful when we have only one DC in the network.
It does not increment the USN values of the objects after restoration. It uses older USN values
only.
1. Authoritative restore: This is useful when we want to restore a specific object
or specific object by incrementing the USN value.
Useful when we have multiple DCs in the N/W.
i.e. one Dc and multiple ADCs
USN Numbers: (Update Sequence Number)
It is a number assigned to the object and gets modify according to the changes
made on the object.
Obtaining a new IP
Note: when we have multiple scopes only one scope can be active in order to
enable all the scopes we have to merge all the scopes with super scope.
Creating super scope
Requires multiple scopes
5. Daily backup: it backs up all selected files & folders created or changed
during the day after backed up does not remove the archive bit.
Recommended backup strategy:
1. If we select incremental back up it is faster and restoration is slower. I.e.
more number of tapes have to be restored
2. If we go with differential backup, backup is slow, but restoration is fast i.e.,
just by restoring 2 tapes.
System state data:
Components of SSD:
AD
Boot files
System files
Services
Registry
Com+inf
Cluster info
I.I.S.
SSD is a data store if we want to backup complete AD we can back up system
state data from backup utility.
Taking a back up of system state data:
Start - run – ntbackup – click on advanced mode – backup – next
Select 3rd one system state data – next – save in E drive - create a folder (SSD)
in this folder create a file with filename .bkf – next – advanced - next
Restoration
There are two types of restoration
Non-authoritative restore
Authoritative restore
Restoration of system state data can be done either authoritative or non
authoritative
Non-authoritative restore is a normal restore useful when we have only one DC in the network.
It does not increment the USN values of the objects after restoration. It uses older USN values
only.
1. Authoritative restore: This is useful when we want to restore a specific object
or specific object by incrementing the USN value.
Useful when we have multiple DCs in the N/W.
i.e. one Dc and multiple ADCs
USN Numbers: (Update Sequence Number)
It is a number assigned to the object and gets modify according to the changes
made on the object.
Obtaining a new IP
Super Scopes:
Note: when we have multiple scopes only one scope can be active in order to
enable all the scopes we have to merge all the scopes with super scope.
Creating super scope
Requires multiple scopes
Create 2 scopes.
Right click on server
Say new super scope
Specify the super scope name
Select 2 scopes by holding ctrl key
Next – finish
Address Pool: gives the range of IP addresses we have specified
Address leases: specifies the client (names) and the IP addresses assigned
Reservations: useful when we want to dedicate a particular IP to a particular
system.
Ex: managerial systems, important clients.
Start-run-cmd>getmac
Start-run-cmd>getmac /s \\systemname
Implementing reservation
Open DHCP
Right click on reservations
New – reservation – give name - mention reservation name - MAC address of the
remote machine – mention the IP address to be reserved
Close
Move on to client machine
Start - run – cmd – ipconfig /release – ipconfig - /renew
Scope options: Using scope options we can specify the other servers addresses available in the
network. So that the DHCP server maintains information about all other servers and provides it
to the client machines along with the I.P. addresses. For NT – 66servers addresses - for 2000-
03 - 77
Server options: Useful when we have multiple scopes and provide information to
all the scopes. Where as scope options are limited only to that scope.
Backing up DHCP:
Resolving: It is a process of converting IPs to host names & host names to IPs.
Computer that requests DNS resolution.
Issues queries that ask for specific types of mapping of computers and IP
addresses (records)
Query types determine behavior of DNS server receiving query.
Lookup types determine whether a name to IP mapping or an IP to name
mapping is sought.
Query:
Query is a request to find an address of the DNS there are 2 types of queries.
Recursive queries
Iterative queries
Recursive Queries: When a client start a query, query is passed onto local DNS for resolution if
a query cannot find the solution then the DNS on behalf of client forwards the query to another
DNS, And to another DNS and so on until it finds the mapping information or an answer.
Iterative Query: Query raised by the client to the DNS. If the DNS cannot resolve it sends a
negative response to the client, then the client has to contact another DNS and so on.
In this case the DNS is not forwarding the query but the client itself is contacting
other DNS.
Zone: Zone is a subtree of DNS database. Zone contains the mapping
information with the help of forward lookup zone & reverse look up zone.
Forward Look up zone: Contains host record, which contain host names to IP,
DNS requirements:
DC or member server
Static IP address
Installing DNS
Either on member server or on DC
Start - settings – control panel – add/remove programs – add/remove windows components –
select networking services – details – check the box DNS – ok – next
Nslookup 192.168.1.17
- Reverse lookup zone
Nslookup www.yahoo.com Forward lookup zone.
DNS: DNS server can be configured as follows>
Secondary
Stub (feature of 2003)
AD integrated
Forwarders
Root servers
Caching only server
Primary
Configuring a primary zone:
On DC
On Member server
If DNS is not available install DNS first
Open DNS - right click on FLZ
New zone – next – specify the primary – DNS servers IP address –add – next –
finish
Zone Transfer
On DC
On Primary DNS
Open DNS – right click on zone
Properties
Zone transfer – check box allow zone
Select only to the following servers
Specify the secondary DNS servers IP address
Apply – ok
Primary Zone: Primary zones are created on the primary DNS servers. It is a
read /write copy.
Secondary Zone: There are created on the second DNS server where it holds a
read only copy of the zone.
Secondary zones provide fall tolerance and load balancing to the primary zone.
Secondary zone is a back up for primary zone
Zone transfer:
Zone transfer is a process of transferring the zone from primary to secondary or secondary to
primary. Zone transfers occur when there is a change or modification taken place on either of
the zones.
AD integrated zones:
These are useful when we want to maintain zone information in the AD . zone is saved in the
AD as a result when we back up AD we are also backing up zone information.
If it is a primary zone, zone is saved as a normal text file as a result we have to back p the zone
separately, AD integrated zone is created when we install AD with a domain name.
Creating in AD integrated zone:
On DC
Open DNS
Right click on FLZ
New zone
Next - check the box store the zone
Next - specify zone name
Next – allow both – next – finish
Stub zone:
Stub zone is a newly added feature in WIN 2003 stub zone contains name server
information or name server records and SOA records (Start of Authority)
Stub zones provide fault tolerance & load balancing besides providing the name
server & SOA record information.
Stub zones are useful for resolving the query faster.
Creating stub zones:
On DC
Create a primary zone with a host record ex: hp.com
On member server
Open DNS
Right click on FLZ
New zone - next
Select stub zone
Next – zone name ex.hp.com
Zone file – specify the primary DNS server’s address - next – finish
Resource Records (RR):
RRS are useful to provide the information about the zone. There are a few types
of resource records.
Host a record
Pointer record
Alias record
MX record
AAAArecord
ATMA
HINFO etc…
Service Records: There are also called as SRV records. These are useful for locating the
services. There are totally 6 service records created when we install AD. They are located in
DNS under domain subtree.
When we install AD, system automatically creates an AD integrated zone with the
corresponding domain name.
Record types:
Msdcs: Contains the Dc’s information
Default site: Contains site name
Tcp: (server side) provides global catalog, Kerberos and LDAP information
Udp: (client side) provides Kerberos information
Domain DNS zone
Forest DNS zones
both are the part of application partition. Provides
On member server
Open
DNS
right
click
on
F
L
Z
next – secondary – specify the DC’s
Domain name (ex: zoom.com)
Specify the DC’s IP address
Next – finish
Move on to DC
Open DNS
DC’s zone properties
Zone transfers
Only on the following
Specify the IP address (secondary)
Move onto member server refresh the zone
This process is we call as safe zone transfer.
Note:
1) If the 6 service records are not found in secondary server we need to restart
2) Still if we can’t find the 6 service records we need to perform a forceful transfer
BIND secondaries: useful when we have older BIND servers (ex. UNIX) as
secondaries BIND is a standard followed by DNS.
All UNIX based machines older version used BIND servers as DNS. Ex. BIND
version 4.0 series.
Useful when our network has old BIND version based DNS servers with new BIND versions like
9.1.2, to provide zone transfer at faster rate to BIND secondaries.
Faster zone transfer is possible by transferring multiple zones at a time besides
compression.
Fail on Load if bad zone data:
If the secondary zone comes across stale records or unwanted records the zone
Useful when the DNS has multiple NICs to listen the queries all NICs. If the query
is not resolvable by one NIC it can be listened by another NIC
Enable net mask ordering:
Secure cache against pollution: By default the cache DNS information is secured
against pollution.
In windos\system32\DNS\cache.dns
Root Hints: Root hints provide the root server’s information
There are totally 13 root servers throughout the world.
2003 server can be configured as root server. Once configured as root sever
disable forwarders and root hints.
Root servers zone name is always represented by a dot. (.)
Configuring a root server:
On DC
Open DNS
Right click on FLZ - new zone –
Primary – next – specify the root name as dot (.)
Next - zone file – allow both-Next – finish
* We should notice that forwarders &root servers are disabled.
Security: We can add sub administrator for administrator and set permission on
these administrators.
Monitoring: used for troubleshooting DNS.
Event logging: Used for maintaining events occurred pertaining to DNS can be
Errors only
Errors & warnings
All events (by default)
Debug Logging: to assist with debugging we can record the packets sent and
received by the DNS server to a log file. Debug logging is disabled by default.
Implementing Round Robin:
Assigning multiple IPs to the NIC. By going to TCP/IP properties – advanced –
add – multiple ips – ok (ex. 192.168.1.17, 192.168.1.18, 192.168.1.19)
Open
DNS
create a primary zone – create a host record - create 3 more host records with
the IPs created above
Verification:
Go to command prompt.
For clearing DNS cache
C:\> ipconfig /flushdns
Pingww w.z onenam e.com
IIS
Internet Information Service (I.I.S.): It is a web server from Microsoft used for
administering, managing, controlling websites.
I.I.S. is the server component which provides services like www, http, ftp, nntp,
SMTP, FrontPage, .net frame works
WWW: World Wide Web: enables use of internet.
HTTP: (Hiper text transfer Protocol): Supports file types like text, audio &video
Gopher: used prior to http supported only text.
FTP: (File Transfer Protocol): used for uploading or downloading, huge size files.
NNTP (Network News Transfer Protocol): Used for publishing the same message
for a group of people.
SMTP: (Simple mail transfer protocol); Used by exchange server for sending
mails.
Front page: It is a designing tool for WebPages
Win – NT 4.0 had I.I.S. version 2, 3 and 4.
Win 2000 I.I.S. version is 5.0
Win 2003 - 6.0
Port number details are available at c:\windows\system32\drivers\etc\services
Port: port is a communication channel through which services of one system communicate with
the services of other system each service has one port number allotted
Features of I.I.S. (6.0)
Fully secured
Reliability
Salability
Manageability
Isolation of users.
Backup of websites
Requirements
:DC or member server
Static IP
NTFS partition
Web pages
DNS
and
Zones
with
concerned
records.
Installing I.I.S.:
On DC or member server
From Control Panel
Add/rem programs
Add/rem windows components
Select application server
Click on details
Select I.I.S.
Details
Select F.T.P. & www. Services
Ok – next
Requirements of a website
Web content or web pages
Zones with host records
Public IP
Creation of a Website:
(Create the zones in DNS with a host records)
Start - p – admin tools – I.I.S. right click on websites – new - website –
description ( site name, ex: yahoo)
Select the I.P> (system’s IP)
On DC
Open E drive
FTP commands:
Dir
-
for listing FTP contents
Get
-
for downloading
Put
-
uploading
Prompt
-
disable interactive mode
Mget
-
downloading multiple files
Mput
-
uploading multiple files
Bye
-
ending session
Close
-
close the session
Mkdir
-
to create a folder in ftp site
Rmdir
-
to delete a folder
Del
-
to delete a file
Pwd
-
to list present working dir
Lcd
-
locally change directory
Cd
-
change directory in ftp site
Bell
-
gives beep sound after the action
Anonymous account: It is a default a/c available with ftp any user can login to ftp
server despite no a/c in FTP server.
Connecting to FTP server as anonymous user
Go to command prompt
Ftp server’s I.P. or
Open I.P. address
Type anonymous
Provide password if it has
Disabling anonymous connections:
Open I.I.S.
FTP site properties
Security accounts
Uncheck the box allow anonymous connections - yes
Verification
Go to FTP prompt & try to login as anonymous user.
Isolation of Users:
When we want to secure the ftp contents or when we want ftp users to have their
Create 2 users in AD
Open E drive
Create a root folder
In the folder create a subfolder named as our domain name without extension ex.
Zoom, India. - - u1, u2, u3
Creating a FTP site for isolating users open I.I.S.
Right click on new FTP site
FTP site name – select the IP
Select isolate users – next
Browse the root folder we’ve created
Ok – next – check the box write – next - finish.
Verification:
On Member server
Open I.E.
Type ftp:\\I.P. add of ftp server
We should notice logon window
Provide user name & pwd
Then we notice the file we’ve created.
Groups
Groups: Are two types
Security
Distribution
Groups are useful for setting common privileges or type of access to a group of
users.
Security Groups: These are used for setting permissions on the objects (printer,
data) it can also be used as a distribution groups.
Group scope: identifies the extent of the group within in a domain or a forest.
•
1. Hardware router
2. Software router
Start > P> Admin tools>RRAS>r/c server> configure & enable routing.
Static routing: It does not require any protocols; an administrator has to create a
routing table which is constant or not changeable.
DHCP Relay agent:
It is a protocol responsible for listening to the client request for assigning an IP to
the clients dynamically on behalf of DHCP server from the other network
Implementing DHCP relay agent
On router
Open RRAS
Expand IP routing
Right click on general
New routing protocol
Select DHCP relay agent
Ok – add public interface
General new interface
Select public
Configuring public network
Move on to public network
Go to TCP/IP properties
Check ‘obtain IP automatically’
RAS (Remote Access Service)
It is a feature of 2000 & 2003 enables communication between a local machine &
a remote machine
RAS connectivity: types of connectivity
PSTN (public switch telephone network)
ISDN (Integrated Services Digital Network)
X.25
RS 232 (Recommended standard)
DSL (Digital Subscriber Link)
Direct cable
PSTN:
•
Modem
•
Telephone line
•
28.8 kbps
•
cheaper
•
analog communication
ISDN:
•
ISDN line
•
Digital communication
•
Costly
X – 25
•
Rarely found
•
Widely available
•
Easy to implement
Direct cable
•
Open RRAS
Right click server
Configure & enable routing
Next – custom configuration
Next – select VPN, dial up – next – finish.
Creating a dial connection
On the client machine
My network places - properties
Double click on new connection wizard
Next – select setup &advance connection
Next - connect directly to another computer – guest – next –computer name
(server’s name)
Select the device ‘communication cable between 2 computers
Connection availability – next – finish
Note: By default users are denied permission to dial in.
To enable a user to dial in
On server
Open ADUC
Go to user properties
Dial in
Allow access – ok
Error: 649 enable the user dial in access
Error: 777 – Reinstall the modem.
Establishing Dial up connection
Dialing into the server
On the client machine
My network places – properties
Double click DUN we’ve created
Provide user name & pwd
Click on connect
Accessing resources of a remote computer over RAS connection
On the client machine
Start – run (\\server name\resource name) ex: (\\sys1\c$)
LAN protocols:
NETBEUI protocols
IPX/SPX
TCP/IP
NW link
AppleTalk
DEC net
1. NETBEUI: It is a self-configurable protocol mostly use in small networks, outdated protocol,
jointly developed by IBM &Microsoft. Does not support routing.
2. IPX/SPX: It is a proprietary protocol of Novell NetWare. IPX stands for
Internet Packet exchanger SPX – Sequential Packet exchange.
Suitable for larger networks. It is a routable protocol.
3. TCP/IP: (Transmission Control Protocol): It is an industry standard
protocol.
IP – supported by many OS. It is a routable and robust (ever changing)
protocol.
4. NW Link: (Netware Link) from Microsoft enables communications between
NT, 2000&2003 & Novell NetWare.
5. Apple talk: from Microsoft enables communication between NT 2000/03
used in Mac. OS.
6. DEC Net: (Digital Equipment Corporation): protocol used by mini computers , super computers
and jet direct printers. (this printer has its own NIC)
WAN protocols:
SLIP
PPP(Point to Point Protocol)
SLIP: SERIAL LINE INTERNET PROTOCOL
It is used on UNIX networks
Outdated protocol (not available now)
Doesn’t support
Data compression
Data encryption
Error checking
Doesn’t support
NETBEUI
IPX/SPX
PPP: POINT TO POINT PROTOCOL
Most popularly used in WAN protocol replaced by SLIP
Supports various protocols
Supports data compression
Data encryption
Error checking
Terminal server provides only the subset portion of the desktop to the client machines. i.e. when
a client establishes a terminal session only the desktop portion is downloaded to the client
machine to interact with.
During the session the terminal server uses the protocol called RDP. (Remote
Desktop Protocol)
With the help of this protocol client obtains the server’s desktop on to the client it
is nothing but thin client. Only the mouse clicks and key stokes are sent to the TS
DC
Member server
Applications (MS office, oracle, java, PageMaker etc)
Installing terminal server
On DC
Open control panel add/remove programs
Add/rem windows components
Check the box terminal server - next – yes – next –
Select relaxed security - insert CD (win2003)
T.S. operates in two modes
r e m o t e d e s k t o p m o d e
a p p l i c a t i o n m o d e
If we want to configure T.S. only for remote administration we should select
remote administration mode.
If we want to configure T.S. for centralizing management application server we
should go with application mode.
Application mode offers remote administration as well as applications.
In win2003 we can install T.S. in 2 ways.
f u l l y s e c u r e d m o d e
f u l l y r e l a x e d m o d e
Fully secured mode: if we select this option users will not have access to registry files & system
files and it doesn’t provide backward compatibility for existing OS or applications.
Fully Relaxed mode: Provides access to registry and other system resources
useful when the security is not criteria or for performing remote administration.
Terminal Server Licensing:
By default when we install T.S. the clients can access T.S. only for 120 days.
Terminal server provides only the subset portion of the desktop to the client machines. i.e. when
a client establishes a terminal session only the desktop portion is downloaded to the client
machine to interact with.
During the session the terminal server uses the protocol called RDP. (Remote
Desktop Protocol)
With the help of this protocol client obtains the server’s desktop on to the client it
is nothing but thin client. Only the mouse clicks and key stokes are sent to the TS
DC
Member server
Applications (MS office, oracle, java, PageMaker etc)
Installing terminal server
On DC
Open control panel add/remove programs
Add/rem windows components
Check the box terminal server - next – yes – next –
Select relaxed security - insert CD (win2003)
T.S. operates in two modes
remote desktop mode
application mode
If we want to configure T.S. only for remote administration we should select
remote administration mode.
If we want to configure T.S. for centralizing management application server we
should go with application mode.
Application mode offers remote administration as well as applications.
In win2003 we can install T.S. in 2 ways.
fully secured mode
fully relaxed mode
Fully secured mode: if we select this option users will not have access to registry files & system
files and it doesn’t provide backward compatibility for existing OS or applications.
Fully Relaxed mode: Provides access to registry and other system resources
useful when the security is not criteria or for performing remote administration.
Terminal Server Licensing:
By default when we install T.S. the clients can access T.S. only for 120 days.
View Session: If the administrator selects this option, the remote control
session will be give only used for monitoring users.
•
2. Scanning: Scanning the system for bugs and loopholes in OS. Hacker uses scanning technique
to determine which ports are open what services are running and what is the OS
Ex: RATINA, shadow security scanner, ANSIL etc..
3. DOS attack: Denial of service attack which is an attempt to get the service
or the server down by overflowing the buffer. Eg. Win spoof a7, my spoof.
4. Exploits: Exploits are usually bugs in applications or OS which can be
exploited by using a piece of code often referred as scripts.
Ex: CGI scripts, perl scripts etc..
5. Trojan Horses: Trojan horses are a program that pretends to be a useful
tool but actually installs malicious or damaging software.
Trojan Horses can be used to take over the remote system sending viruses to
steal the data. Ex. Netbus, Bo2k.
7. Port scanner: Scanning the port to get into the application ex: port
scanner, etc.
ISA can be configured as firewall or proxy server.
If it is configured as a firewall,
Packet filtering: ex: routers controls data transfer based on source destination IP
addresses
TCP/UDP port of source destination IP address.
Packets are allowed or dropped through the device depending on the access
control list.
If it is configured as proxy it acts like a web server
Application gateway: ex: proxy server.
Packets are allowed based on type of application and IP address.
Filter application commands such as http, GET and POST etc..
Application level gateways can also be used to log user activity and logins.
Flavors of ISA server:
Standard edition
enterprise edition
Server deployment
stand-alone only
multiple servers with
centralized
management.
Policy based support
Local only
enterprise
&array
policies
Scalability
CPU’s only
no limit.
ISA server requirements:
Member server or DC
Service pack 1 or above
Two interfaces (public & private)
RRAS
Processor: PIII 300 MHz. Or above
256 MB RAM
20 MB of H.D. space on NTFS 5.0
Array considerations:
ISA server models:
Firewall model
Cache model
Integrated model.
Installing ISA
On router
Open D or E drive
ISA standard - ISA – setup.exe
Select integrated mode &continue
Private
Router
Pubic
IP: 192.168.1.2
192.168.1.1
202.153.32.2
202.153.32.1
G/W 192.168.1.1
202.153.32.1
DNS 202.153.32.2
202.153.32.2
202.153.32.2
1) Enable LAN routing
create websites & zones
2) Install ISA
Specify the range of address.
Installing ISA service pack
Open D or E drive
ISA 2k standard
ISA service pack2.enu
Update
Update.exe – next – agree – next
Cache mode: select this option if security is not the criteria as it is used for
accelerating the access speed of websites by the private network users. Since it
On RIS server
Install DHCP server
Authorize it
Create a scope
Verifying RIS server before performing RIS installation
On RIS server
Open
ADUC
Domain controllers
Right side pane- double click on the server
Remote install - verify server-Done.
Performing remote install on client
On the client machine
Boot from pxe enabled NIC or remote bootable floppy.
Press F12 key when the system prompts and installation proceeds.
Note: If don’t see “press F12 for booting from n/w” you have to restart the
services before performing RIS installation:
Start – Admin tools – services
Restart services following
RIS, DHCP, DNS, netlogon, remote installation, TFTPD, single instance store
On the client machine
Insert COMBO CD
Press F12 when it prompts
Creating a remote boot floppy requires 1.44MB floppy
On RIS server
Open the RIS folder from remote install\admin\i386
Insert floppy and double click Rbfg.exe
Creating Additional images.
Open
ADUC
DC properties (right side ex: sys1)
Remote install
Advance settings
Images – add – insert CD
Editing an answer file:
On RIS server
Open the folder remote install\setup\English\images\windows\i386\templates
Double click ristndrd.sif
Do whatever modifications you want
Ex: set it as, Use whole disk =no
Save – close.
RIPREP image
:It is a type of images which includes OS+ applications, settings, security and etc..
Useful when we want to perform remote installation of OS +applications.
To achieve this we have to install OS+ applications +settings & security on one of
the client machines & keep it read
Performing riprep image
On the client machines, which are ready with applications and settings
Start – run -\\ris server name; ex;\\s ys1
Double click reminst\admin\i386
Double click riprep
Next
Server name
Next
Folder name
Ex: client image
Friendly description ex; sales dept.
Next – answer further questions
NOTE: on completion of this, the client will get restarted and starts a mini windows setup where
you’ll have to provide the company name, CD key and so on. Once it is over the riprep image is
ready.
NOTE: riprep image requires a CD image also.
DISK MANAGEMENT
2000 and 2003 uses a tool called Disk management for administering or
managing Hard Disk Drives
Using this we can create, delete, modify, partitions and volumes.
We can also implement software rate, and disk analysis.
To open Disk manager
Start – run – diskmgmt.msc
Or right click on my computer – select manage.
Creation of a primary partition:
Start – run – diskmgmt.msc
Select free space (black color)
R/C -new – partition – select primary
Alter the size - select drive letter
Select the type of format – ex: NTFS
Next – finish.
Striped volumes:
from internet, if internet is available to all the client machines whole network will
be busying updating OS &software. This leads to network traffic
To overcome this problem we have to use a separate server configure as SUS, which is
connected to Internet and obtains updates. Client machines instead of contacting Internet for
updates contact the intranet SUS server for updates. This can be scheduled.
SUS software has to be downloaded from the internet and also I.I.S.
Implimenting SUS:
On DC
Open ADUC
Create an OU
Join the client machines to this OU
OU properties
Group policy
GPO name
Edit
Expand computer configuration
Administrative templates
Windows components
Windows updates
Double click on specified intranet
Enable – specify the server’s add in both the boxes.
To schedule the updates;
Double click o configure automatic updates
Specify the schedule
MBSA (Microsoft Baseline Security Analyzer):
It is a new feature of 2003. It is a service responsible for preparing a report which reveals a loop
holes and draw backs of the OS and the applications installed in the server. Using this report an
administrator can take some precautions.
It is also freely available software in internet. We can download it.
Using MBSA
:start
-
programs
–
MBSA
select scan a computer/scan more than one computer
Provide the IP address of the computer
Click on start scan
It creates a report contains the information about the system.
RSOP: (Resultant Set of Policies):
It is a new feature of 2003 using which we can gather all the policies
implemented by group policy in the entire forest.
RSOP works in two modes logging and planning
Logging: Generates the reports for the users who all have logged in and effected
with the policy.
Planning: it is useful for experimentation. I.e. as an admin Would like to see the
result of the policy before it is implemented.
Using RSOP
Open ADUC
Right click on the OU
Select RSOP
CIMOM (Common Information Management Object Model) is database where
GP settings are registered.
GPMC (Group Policy Management Consol):
It is a new feature in 2003 which centralizes the management of group policies for ex. multiple
forests, sites, OUs; Domains can be administered from a central location.
Gathering of group policies implemented in the entire forest is easy.
Implementing Group policy is also very easy
Back and restore of G.Ps is easy
Once installed, disables group policy option for local, sites & domain.
Software available in internet. Filename is gpmc.msi
Create 2 scopes.
Right click on server
Say new super scope
Specify the super scope name
Select 2 scopes by holding ctrl key
Next – finish
Address Pool: gives the range of IP addresses we have specified
Address leases: specifies the client (names) and the IP addresses assigned
Reservations: useful when we want to dedicate a particular IP to a particular
system.
Ex: managerial systems, important clients.
Start-run-cmd>getmac
Start-run-cmd>getmac /s \\systemname
Implementing reservation
Open DHCP
Right click on reservations
New – reservation – give name - mention reservation name - MAC address of the
remote machine – mention the IP address to be reserved
Close
Move on to client machine
Start - run – cmd – ipconfig /release – ipconfig - /renew
Scope options: Using scope options we can specify the other servers addresses available in the
network. So that the DHCP server maintains information about all other servers and provides it
to the client machines along with the I.P. addresses. For NT – 66servers addresses - for 2000-
03 - 77
Server options: Useful when we have multiple scopes and provide information to
all the scopes. Where as scope options are limited only to that scope.
Backing up DHCP:
Resolving: It is a process of converting IPs to host names & host names to IPs.
Computer that requests DNS resolution.
Issues queries that ask for specific types of mapping of computers and IP
addresses (records)
Query types determine behavior of DNS server receiving query.
Lookup types determine whether a name to IP mapping or an IP to name
mapping is sought.
Query:
Query is a request to find an address of the DNS there are 2 types of queries.
Recursive queries
Iterative queries
Recursive Queries: When a client start a query, query is passed onto local DNS for resolution if
a query cannot find the solution then the DNS on behalf of client forwards the query to another
DNS, And to another DNS and so on until it finds the mapping information or an answer.
Iterative Query: Query raised by the client to the DNS. If the DNS cannot resolve it sends a
negative response to the client, then the client has to contact another DNS and so on.
In this case the DNS is not forwarding the query but the client itself is contacting
other DNS.
Zone: Zone is a subtree of DNS database. Zone contains the mapping
information with the help of forward lookup zone & reverse look up zone.
Forward Look up zone: Contains host record, which contain host names to IP,
DNS requirements:
DC or member server
Static IP address
Installing DNS
Either on member server or on DC
Start - settings – control panel – add/remove programs – add/remove windows components –
select networking services – details – check the box DNS – ok – next
i n F L Z
P T R r e c o r d ( p o i n t e r ) u s e d i n
R L Z
A l i a s r e c o r d ( n i c k n a m e o f a
h o s t r e c o r d )
M X r e c o r d ( u s e d f o r m a i l
s e r v e r )
1. Creating a host record:
Right click on the zone you have created - new host – specify the servers
address –and IP
Add host - ok - done
Nslookup 192.168.1.17
- Reverse lookup zone
Nslookup www.yahoo.com Forward lookup zone.
DNS: DNS server can be configured as follows>
S e c o n d a r y
S t u b ( f e a t u r e o f 2 0 0 3 )
A D i n t e g r a t e d
F o r w a r d e r s
R o o t s e r v e r s
C a c h i n g o n l y s e r v e r
P r i m a r y
Configuring a primary zone:
On DC
On Member server
If DNS is not available install DNS first
Open DNS - right click on FLZ
New zone – next – specify the primary – DNS servers IP address –add – next –
finish
Zone Transfer
On DC
On Primary DNS
Open DNS – right click on zone
Properties
Zone transfer – check box allow zone
Select only to the following servers
Specify the secondary DNS servers IP address
Apply – ok
Primary Zone: Primary zones are created on the primary DNS servers. It is a
read /write copy.
Secondary Zone: There are created on the second DNS server where it holds a
read only copy of the zone.
Secondary zones provide fall tolerance and load balancing to the primary zone.
Secondary zone is a back up for primary zone
Zone transfer:
Zone transfer is a process of transferring the zone from primary to secondary or secondary to
primary. Zone transfers occur when there is a change or modification taken place on either of
the zones.
AD integrated zones:
These are useful when we want to maintain zone information in the AD . zone is saved in the
AD as a result when we back up AD we are also backing up zone information.
If it is a primary zone, zone is saved as a normal text file as a result we have to back p the zone
separately, AD integrated zone is created when we install AD with a domain name.
Creating in AD integrated zone:
On DC
Open DNS
Right click on FLZ
New zone
Next - check the box store the zone
Next - specify zone name
Next – allow both – next – finish
Stub zone:
Stub zone is a newly added feature in WIN 2003 stub zone contains name server
information or name server records and SOA records (Start of Authority)
Stub zones provide fault tolerance & load balancing besides providing the name
server & SOA record information.
Stub zones are useful for resolving the query faster.
Creating stub zones:
On DC
Create a primary zone with a host record ex: hp.com
On member server
Open DNS
Right click on FLZ
New zone - next
Select stub zone
Next – zone name ex.hp.com
Zone file – specify the primary DNS server’s address - next – finish
Resource Records (RR):
RRS are useful to provide the information about the zone. There are a few types
of resource records.
Host a record
Pointer record
Alias record
MX record
AAAArecord
ATMA
HINFO etc…
Service Records: There are also called as SRV records. These are useful for locating the
services. There are totally 6 service records created when we install AD. They are located in
DNS under domain subtree.
When we install AD, system automatically creates an AD integrated zone with the
corresponding domain name.
Record types:
M s d c s : C o n t a i n s t h e D c ’ s
i n f o r m a t i o n
D e f a u l t s i t e : C o n t a i n s s i t e
n a m e
T c p : ( s e r v e r s i d e ) p r o v i d e s
g l o b a l c a t a l o g , K e r b e r o s a n d
L D A P i n f o r m a t i o n
U d p : ( c l i e n t s i d e ) p r o v i d e s
K e r b e r o s i n f o r m a t i o n
D o m a i n D N S z o n e
F o r e s t D N S z o n e s
both are the part of application partition. Provides
On member server
Open
DNS
right
click
on
F
L
Z
next – secondary – specify the DC’s
Domain name (ex: zoom.com)
Specify the DC’s IP address
Next – finish
Move on to DC
Open DNS
DC’s zone properties
Zone transfers
Only on the following
Specify the IP address (secondary)
Move onto member server refresh the zone
This process is we call as safe zone transfer.
Note:
1) If the 6 service records are not found in secondary server we need to restart
2) Still if we can’t find the 6 service records we need to perform a forceful transfer
s e r v e r ’ s a d d r e s s
Z o n e t r a n s f e r
G e n e r a l ( s t a t u s , t y p e , a g i n g ,
D y n a m i c U p d a t e )
S O A ( S e r i a l n o . , R e s p o n s i b l e
p e r s o n , r e f r e s h i n t e r v a l )
W I N S ( e x i s t i n g W I N S a d d r e s s ,
u s e d f o r N e t B I O S r e s o l u t i o n )
DNS Server Properties:
f o r w a r d e r s
e v e n t l o g g i n g
i n t e r f a c e s ( u s e d w h e n w e
h a v e m u l t i p l e N I C s )
M o n i t o r i n g
S e c u r i t y
R o o t h i n t s
D e b u g l o g g i n g
A d v a n c e d
Interfaces:
Useful when our system has multiple NICs and the DNS can listen the queries
from all available NICs
Offers load balancing
Forwarders: If the query is not resolvable by the local DNS it is being forwarded
to another DNS server for name resolution
Configuring Forwarding
:On DC
Create a primary zone with a host
On Member server
Open DNS – properties
Forwarders
Add the DC’s IP (DNS1’s IP)
Verification:
On Member server
Start - run cmd – ping www.Zonename.com
Advanced:
D i s a b l e r e c u r s i o n
B I N D s e c o n d a r y ( B e r k e l e y
i n t e r n e t n a m i n g d o m a i n )
F a i l o n l o a d i f b a d z o n e d a t a
E n a b l e r o u n d r o b i n
E n a b l e n e t m a s k o r d e r i n g
S e c u r e c a c h e a g a i n s t
p o l l u t i o n
Disable recursion: By default this is disabled i.e., recursion is enabled
BIND secondaries: useful when we have older BIND servers (ex. UNIX) as
secondaries BIND is a standard followed by DNS.
All UNIX based machines older version used BIND servers as DNS. Ex. BIND
version 4.0 series.
Useful when our network has old BIND version based DNS servers with new BIND versions like
9.1.2, to provide zone transfer at faster rate to BIND secondaries.
Faster zone transfer is possible by transferring multiple zones at a time besides
compression.
Fail on Load if bad zone data:
If the secondary zone comes across stale records or unwanted records the zone
Useful when the DNS has multiple NICs to listen the queries all NICs. If the query
is not resolvable by one NIC it can be listened by another NIC
Enable net mask ordering:
Secure cache against pollution: By default the cache DNS information is secured
against pollution.
In windos\system32\DNS\cache.dns
Root Hints: Root hints provide the root server’s information
There are totally 13 root servers throughout the world.
2003 server can be configured as root server. Once configured as root sever
disable forwarders and root hints.
Root servers zone name is always represented by a dot. (.)
Configuring a root server:
On DC
Open DNS
Right click on FLZ - new zone –
Primary – next – specify the root name as dot (.)
Next - zone file – allow both-Next – finish
* We should notice that forwarders &root servers are disabled.
Security: We can add sub administrator for administrator and set permission on
these administrators.
Monitoring: used for troubleshooting DNS.
Event logging: Used for maintaining events occurred pertaining to DNS can be
E r r o r s o n l y
E r r o r s & w a r n i n g s
A l l e v e n t s ( b y d e f a u l t )
Debug Logging: to assist with debugging we can record the packets sent and
received by the DNS server to a log file. Debug logging is disabled by default.
Implementing Round Robin:
Assigning multiple IPs to the NIC. By going to TCP/IP properties – advanced –
add – multiple ips – ok (ex. 192.168.1.17, 192.168.1.18, 192.168.1.19)
Open
DNS
create a primary zone – create a host record - create 3 more host records with
the IPs created above
Verification:
Go to command prompt.
For clearing DNS cache
C:\> ipconfig /flushdns
Pingww w.z onenam e.com
IIS
Internet Information Service (I.I.S.): It is a web server from Microsoft used for
administering, managing, controlling websites.
I.I.S. is the server component which provides services like www, http, ftp, nntp,
SMTP, FrontPage, .net frame works
WWW: World Wide Web: enables use of internet.
HTTP: (Hiper text transfer Protocol): Supports file types like text, audio &video
Gopher: used prior to http supported only text.
FTP: (File Transfer Protocol): used for uploading or downloading, huge size files.
NNTP (Network News Transfer Protocol): Used for publishing the same message
for a group of people.
SMTP: (Simple mail transfer protocol); Used by exchange server for sending
mails.
Front page: It is a designing tool for WebPages
Win – NT 4.0 had I.I.S. version 2, 3 and 4.
Win 2000 I.I.S. version is 5.0
Win 2003 - 6.0
Port number details are available at c:\windows\system32\drivers\etc\services
Port: port is a communication channel through which services of one system communicate with
the services of other system each service has one port number allotted
Features of I.I.S. (6.0)
F u l l y s e c u r e d
R e l i a b i l i t y
S a l a b i l i t y
M a n a g e a b i l i t y
I s o l a t i o n o f u s e r s .
B a c k u p o f w e b s i t e s
Requirements
:DC or member server
Static IP
NTFS partition
Web pages
DNS
and
Zones
with
concerned
records.
Installing I.I.S.:
On DC or member server
From Control Panel
Add/rem programs
Add/rem windows components
Select application server
Click on details
Select I.I.S.
Details
Select F.T.P. & www. Services
Ok – next
Requirements of a website
Web content or web pages
Zones with host records
Public IP
Creation of a Website:
(Create the zones in DNS with a host records)
Start - p – admin tools – I.I.S. right click on websites – new - website –
description ( site name, ex: yahoo)
Select the I.P> (system’s IP)
On DC
Open E drive
FTP commands:
Dir
-
for listing FTP contents
Get
-
for downloading
Put
-
uploading
Prompt
-
disable interactive mode
Mget
-
downloading multiple files
Mput
-
uploading multiple files
Bye
-
ending session
Close
-
close the session
Mkdir
-
to create a folder in ftp site
Rmdir
-
to delete a folder
Del
-
to delete a file
Pwd
-
to list present working dir
Lcd
-
locally change directory
Cd
-
change directory in ftp site
Bell
-
gives beep sound after the action
Anonymous account: It is a default a/c available with ftp any user can login to ftp
server despite no a/c in FTP server.
Connecting to FTP server as anonymous user
Go to command prompt
Ftp server’s I.P. or
Open I.P. address
Type anonymous
Provide password if it has
Disabling anonymous connections:
Open I.I.S.
FTP site properties
Security accounts
Uncheck the box allow anonymous connections - yes
Verification
Go to FTP prompt & try to login as anonymous user.
Isolation of Users:
When we want to secure the ftp contents or when we want ftp users to have their
Create 2 users in AD
Open E drive
Group scope: identifies the extent of the group within in a domain or a forest.
•
1. Hardware router
2. Software router
N A T ( N e t w o r k A d d r e s s
T r a n s m i s s i o n )
B a s i c f i r e w a l l
V P N ( V i r t u a l P r i v a t e N e t w o r k )
L A N r o u t i n g
Start > P> Admin tools>RRAS>r/c server> configure & enable routing.
ISDN:
•
ISDN line
•
Digital communication
•
Costly
X – 25
•
Rarely found
•
Widely available
•
Easy to implement
Direct cable
•
T C P / I P
N W l i n k
AppleTalk
D E C n e t
1. NETBEUI: It is a self-configurable protocol mostly use in small networks, outdated protocol,
jointly developed by IBM &Microsoft. Does not support routing.
2. IPX/SPX: It is a proprietary protocol of Novell NetWare. IPX stands for
Internet Packet exchanger SPX – Sequential Packet exchange.
Suitable for larger networks. It is a routable protocol.
3. TCP/IP: (Transmission Control Protocol): It is an industry standard
protocol.
IP – supported by many OS. It is a routable and robust (ever changing)
protocol.
4. NW Link: (Netware Link) from Microsoft enables communications between
NT, 2000&2003 & Novell NetWare.
5. Apple talk: from Microsoft enables communication between NT 2000/03
used in Mac. OS.
6. DEC Net: (Digital Equipment Corporation): protocol used by mini computers , super computers
and jet direct printers. (this printer has its own NIC)
WAN protocols:
S L I P
P P P ( P o i n t t o P o i n t P r o t o c o l )
SLIP: SERIAL LINE INTERNET PROTOCOL
It is used on UNIX networks
Outdated protocol (not available now)
Doesn’t support
Data compression
Data encryption
Error checking
Doesn’t support
NETBEUI
IPX/SPX
PPP: POINT TO POINT PROTOCOL
Most popularly used in WAN protocol replaced by SLIP
Supports various protocols
Supports data compression
Data encryption
Error checking
VPN (Virtual Private Network)
Using public network for private use we call it as VPN.
To protect the private data over internet, It uses protocols like L2TP, PPTP
VPN uses internet for providing communication between two different networks and With the
help of these VPN protocols private data is tunneled and sent to the destination.
L2TP: (Layer 2 Tunneling Protocol)
Jointly developed b Microsoft & CISCO
Supports all types of networks ex: IP, frame relay, IP sec etc..
Supports header compression
PPTP: (Point to Point Tunneling Protocol):
Developed by Microsoft runs only on IP based networks
Doesn’t support header compression
Establishing VPN connection:
VPN connection requires a primary connection which can be DUN, ISDN,
internet etc.,
Creating a VPN connection
On client machine
My network places – properties
Double click new connection wizard
Next- connect to network at my work place
Next – VPN – name – public network
Specify the server name ex: sys1
Anyone’s use – finish
Terminal Services:
Terminal Server is a server used for centralizing the management of applications
It provides remote administration for administrators.
T.S. provides sharing of application and resources.
It is used when a company cannot upgrade their client machines, hardware
infrastructure.
Benefits of terminal services:
Centralized management applications
Centralized security using NTFS permissions
Easy to administer
Easy management of TS clients
Remote administration
Terminal server provides only the subset portion of the desktop to the client machines. i.e. when
a client establishes a terminal session only the desktop portion is downloaded to the client
machine to interact with.
During the session the terminal server uses the protocol called RDP. (Remote
Desktop Protocol)
With the help of this protocol client obtains the server’s desktop on to the client it
is nothing but thin client. Only the mouse clicks and key stokes are sent to the TS
DC
Member server
Applications (MS office, oracle, java, PageMaker etc)
Installing terminal server
On DC
Open control panel add/remove programs
Add/rem windows components
Check the box terminal server - next – yes – next –
Select relaxed security - insert CD (win2003)
T.S. operates in two modes
r e m o t e d e s k t o p m o d e
a p p l i c a t i o n m o d e
If we want to configure T.S. only for remote administration we should select
remote administration mode.
If we want to configure T.S. for centralizing management application server we
should go with application mode.
Application mode offers remote administration as well as applications.
In win2003 we can install T.S. in 2 ways.
f u l l y s e c u r e d m o d e
f u l l y r e l a x e d m o d e
Fully secured mode: if we select this option users will not have access to registry files & system
files and it doesn’t provide backward compatibility for existing OS or applications.
Fully Relaxed mode: Provides access to registry and other system resources
useful when the security is not criteria or for performing remote administration.
Terminal Server Licensing:
By default when we install T.S. the clients can access T.S. only for 120 days.
View Session: If the administrator selects this option, the remote control
session will be give only used for monitoring users.
•
On DC
Open
ADUC
Go to the user properties
Following program
Specify the program (ex. Notepad, cmd, etc.)– File name – ok
Allowing a common application for all the users from TS
On DC
Start – p admin tools – open TS configuration – double click RDP
Environment – check the box override setting – specify the application name
Ok
ISA (Internet Security Accelerator)
It is useful to speedup internet access and to protect private network from public
network. It is actually firewall & acts as a proxy.
Types of firewalls:
Hardware firewall
Software firewall
Hardware firewall: CISCO pix, watch guard, multi com Ethernet II
Software firewall: ISA server
Checkpoint
Smooth wall
Firewall: a firewall protects networked computers from international hostile
intrusions.
Types of Attacks:
1. Foot printing
2. Scanning
3. Dos attack (denial of service)
4. Exploits ex. Cgi scripts, perl scripts etc.)
5. Trojan horses ex: netbus, bo2k
6. Port scanner
1. Foot printing: the art of gathering the complete security profiles of an organization or a target
computer. By using a combination of tools and techniques the hacker can take up the system
and determine its IP address and domain names.
2. Scanning: Scanning the system for bugs and loopholes in OS. Hacker uses scanning technique
to determine which ports are open what services are running and what is the OS
Ex: RATINA, shadow security scanner, ANSIL etc..
3. DOS attack: Denial of service attack which is an attempt to get the service
or the server down by overflowing the buffer. Eg. Win spoof a7, my spoof.
4. Exploits: Exploits are usually bugs in applications or OS which can be
exploited by using a piece of code often referred as scripts.
Ex: CGI scripts, perl scripts etc..
5. Trojan Horses: Trojan horses are a program that pretends to be a useful
tool but actually installs malicious or damaging software.
Trojan Horses can be used to take over the remote system sending viruses to
steal the data. Ex. Netbus, Bo2k.
7. Port scanner: Scanning the port to get into the application ex: port
scanner, etc.
ISA can be configured as firewall or proxy server.
If it is configured as a firewall,
Packet filtering: ex: routers controls data transfer based on source destination IP
addresses
TCP/UDP port of source destination IP address.
Packets are allowed or dropped through the device depending on the access
control list.
If it is configured as proxy it acts like a web server
Application gateway: ex: proxy server.
Packets are allowed based on type of application and IP address.
Filter application commands such as http, GET and POST etc..
Application level gateways can also be used to log user activity and logins.
Flavors of ISA server:
Standard edition
enterprise edition
Server deployment
stand-alone only
multiple servers with
centralized
management.
Policy based support
Local only
enterprise
&array
policies
Scalability
CPU’s only
no limit.
ISA server requirements:
Member server or DC
Service pack 1 or above
Two interfaces (public & private)
RRAS
Processor: PIII 300 MHz. Or above
256 MB RAM
20 MB of H.D. space on NTFS 5.0
Array considerations:
ISA server models:
Firewall model
Cache model
Integrated model.
Installing ISA
On router
Open D or E drive
ISA standard - ISA – setup.exe
Select integrated mode &continue
Private
Router
Pubic
IP: 192.168.1.2
192.168.1.1
202.153.32.2
202.153.32.1
G/W 192.168.1.1
202.153.32.1
DNS 202.153.32.2
202.153.32.2
202.153.32.2
1) Enable LAN routing
create websites & zones
2) Install ISA
Specify the range of address.
Installing ISA service pack
Open D or E drive
ISA 2k standard
ISA service pack2.enu
Update
Update.exe – next – agree – next
Cache mode: select this option if security is not the criteria as it is used for
accelerating the access speed of websites by the private network users. Since it
d e t e c t i o n )
s e c u r e s e v e r p u b l i s h i n g
W e b c a c h i n g s e r v e r .
Secure NAT.
I n t e g r a t e d V P N .
T i e r e d p o l i c y m a n a g e m e n t
W e b f i l t e r s ( f o r b l o c k i n g
a u d i o , i m a g e s e t c . , )
A l e r t s
M u l t i p r o c e s s o r s u p p o r t
Q O S ( Q u a l i t y o f S e r v i c e )
C l i e n t s i d e a u t o d i s c o v e r y .
Access is controlled based on
c l i e n t a d d r e s s s e t s
d e s t i n a t i o n s e t s
p r o t o c o l r u l e s
b a n d w i d t h p r i o r i t i e s
Allowing websites
On router (ISA)
Start - programs – ISA server
ISA management – expand server
Creating a client address set:
Expand policy elements
Right click on client address set
New – set name of the set – ex. Sales
Add the range of available IP adds. Including ISA – ok
Setting Protocol rules:
For allowing websites
Expand access policy
Right click on protocol rules
New rule
On RIS server
Install DHCP server
Authorize it
Create a scope
Verifying RIS server before performing RIS installation
On RIS server
Open
ADUC
Domain controllers
Right side pane- double click on the server
Remote install - verify server-Done.
Performing remote install on client
On the client machine
Boot from pxe enabled NIC or remote bootable floppy.
Press F12 key when the system prompts and installation proceeds.
Note: If don’t see “press F12 for booting from n/w” you have to restart the
services before performing RIS installation:
Start – Admin tools – services
Restart services following
RIS, DHCP, DNS, netlogon, remote installation, TFTPD, single instance store
On the client machine
Insert COMBO CD
Press F12 when it prompts
Creating a remote boot floppy requires 1.44MB floppy
On RIS server
Open the RIS folder from remote install\admin\i386
Insert floppy and double click Rbfg.exe
Creating Additional images.
Open
ADUC
DC properties (right side ex: sys1)
Remote install
Advance settings
Images – add – insert CD
Editing an answer file:
On RIS server
Open the folder remote install\setup\English\images\windows\i386\templates
Double click ristndrd.sif
Do whatever modifications you want
Ex: set it as, Use whole disk =no
Save – close.
RIPREP image
:It is a type of images which includes OS+ applications, settings, security and etc..
Useful when we want to perform remote installation of OS +applications.
To achieve this we have to install OS+ applications +settings & security on one of
the client machines & keep it read
Performing riprep image
On the client machines, which are ready with applications and settings
Start – run -\\ris server name; ex;\\s ys1
Double click reminst\admin\i386
Double click riprep
Next
Server name
Next
Folder name
Ex: client image
Friendly description ex; sales dept.
Next – answer further questions
NOTE: on completion of this, the client will get restarted and starts a mini windows setup where
you’ll have to provide the company name, CD key and so on. Once it is over the riprep image is
ready.
NOTE: riprep image requires a CD image also.
DISK MANAGEMENT
2000 and 2003 uses a tool called Disk management for administering or
managing Hard Disk Drives
Using this we can create, delete, modify, partitions and volumes.
We can also implement software rate, and disk analysis.
To open Disk manager
Striped volumes:
from internet, if internet is available to all the client machines whole network will
be busying updating OS &software. This leads to network traffic
To overcome this problem we have to use a separate server configure as SUS, which is
connected to Internet and obtains updates. Client machines instead of contacting Internet for
updates contact the intranet SUS server for updates. This can be scheduled.
SUS software has to be downloaded from the internet and also I.I.S.
Implimenting SUS:
On DC
On DC
Open ADUC
Create an OU
Join the client machines to this OU
OU properties
Group policy
GPO name
Edit
Expand computer configuration
Administrative templates
Windows components
Windows updates
Double click on specified intranet
Enable – specify the server’s add in both the boxes.
To schedule the updates;
Double click o configure automatic updates
Specify the schedule
MBSA (Microsoft Baseline Security Analyzer):
It is a new feature of 2003. It is a service responsible for preparing a report which reveals a loop
holes and draw backs of the OS and the applications installed in the server. Using this report an
administrator can take some precautions.
It is also freely available software in internet. We can download it.
Using MBSA
:start
-
programs
–
MBSA
select scan a computer/scan more than one computer
Provide the IP address of the computer
Click on start scan
It creates a report contains the information about the system.
RSOP: (Resultant Set of Policies):
It is a new feature of 2003 using which we can gather all the policies
implemented by group policy in the entire forest.
RSOP works in two modes logging and planning
Logging: Generates the reports for the users who all have logged in and effected
with the policy.
Planning: it is useful for experimentation. I.e. as an admin Would like to see the
result of the policy before it is implemented.
Using RSOP
Open ADUC
Right click on the OU
Select RSOP
CIMOM (Common Information Management Object Model) is database where
GP settings are registered.
GPMC (Group Policy Management Consol):
It is a new feature in 2003 which centralizes the management of group policies for ex. multiple
forests, sites, OUs; Domains can be administered from a central location.
Gathering of group policies implemented in the entire forest is easy.
Implementing Group policy is also very easy
Back and restore of G.Ps is easy
Once installed, disables group policy option for local, sites & domain.
Software available in internet. Filename is gpmc.msi
Link - http://www.scribd.com/doc/8876332/Mcse-Notes
d e t e c t i o n )
s e c u r e s e v e r p u b l i s h i n g
W e b c a c h i n g s e r v e r .
Secure NAT.
I n t e g r a t e d V P N .
T i e r e d p o l i c y m a n a g e m e n t
W e b f i l t e r s ( f o r b l o c k i n g
a u d i o , i m a g e s e t c . , )
A l e r t s
M u l t i p r o c e s s o r s u p p o r t
Q O S ( Q u a l i t y o f S e r v i c e )
C l i e n t s i d e a u t o d i s c o v e r y .
Access is controlled based on
c l i e n t a d d r e s s s e t s
d e s t i n a t i o n s e t s
p r o t o c o l r u l e s
b a n d w i d t h p r i o r i t i e s
Allowing websites
On router (ISA)
Start - programs – ISA server
ISA management – expand server
Creating a client address set:
Expand policy elements
Right click on client address set
New – set name of the set – ex. Sales
Add the range of available IP adds. Including ISA – ok
Setting Protocol rules:
For allowing websites
Expand access policy
Right click on protocol rules
New rule
On RIS server
Install DHCP server
Authorize it
Create a scope
Verifying RIS server before performing RIS installation
On RIS server
Open
ADUC
Domain controllers
Right side pane- double click on the server
Remote install - verify server-Done.
Performing remote install on client
On the client machine
Boot from pxe enabled NIC or remote bootable floppy.
Press F12 key when the system prompts and installation proceeds.
Note: If don’t see “press F12 for booting from n/w” you have to restart the
services before performing RIS installation:
Start – Admin tools – services
Restart services following
RIS, DHCP, DNS, netlogon, remote installation, TFTPD, single instance store
On the client machine
Insert COMBO CD
Press F12 when it prompts
Creating a remote boot floppy requires 1.44MB floppy
On RIS server
Open the RIS folder from remote install\admin\i386
Insert floppy and double click Rbfg.exe
Creating Additional images.
Open
ADUC
DC properties (right side ex: sys1)
Remote install
Advance settings
Images – add – insert CD
Editing an answer file:
On RIS server
Open the folder remote install\setup\English\images\windows\i386\templates
Double click ristndrd.sif
Do whatever modifications you want
Ex: set it as, Use whole disk =no
Save – close.
RIPREP image
:It is a type of images which includes OS+ applications, settings, security and etc..
Useful when we want to perform remote installation of OS +applications.
To achieve this we have to install OS+ applications +settings & security on one of
the client machines & keep it read
Performing riprep image
On the client machines, which are ready with applications and settings
Start – run -\\ris server name; ex;\\s ys1
Double click reminst\admin\i386
Double click riprep
Next
Server name
Next
Folder name
Ex: client image
Friendly description ex; sales dept.
Next – answer further questions
NOTE: on completion of this, the client will get restarted and starts a mini windows setup where
you’ll have to provide the company name, CD key and so on. Once it is over the riprep image is
ready.
NOTE: riprep image requires a CD image also.
DISK MANAGEMENT
2000 and 2003 uses a tool called Disk management for administering or
managing Hard Disk Drives
Using this we can create, delete, modify, partitions and volumes.
We can also implement software rate, and disk analysis.
To open Disk manager
Start – run – diskmgmt.msc
Or right click on my computer – select manage.
Creation of a primary partition:
Start – run – diskmgmt.msc
Select free space (black color)
R/C -new – partition – select primary
Alter the size - select drive letter
Select the type of format – ex: NTFS
Next – finish.
Striped volumes:
from internet, if internet is available to all the client machines whole network will
be busying updating OS &software. This leads to network traffic
To overcome this problem we have to use a separate server configure as SUS, which is
connected to Internet and obtains updates. Client machines instead of contacting Internet for
updates contact the intranet SUS server for updates. This can be scheduled.
SUS software has to be downloaded from the internet and also I.I.S.
Implimenting SUS:
On DC
On DC
Open ADUC
Create an OU
Join the client machines to this OU
OU properties
Group policy
GPO name
Edit
Expand computer configuration
Administrative templates
Windows components
Windows updates
Double click on specified intranet
Enable – specify the server’s add in both the boxes.
To schedule the updates;
Double click o configure automatic updates
Specify the schedule
MBSA (Microsoft Baseline Security Analyzer):
It is a new feature of 2003. It is a service responsible for preparing a report which reveals a loop
holes and draw backs of the OS and the applications installed in the server. Using this report an
administrator can take some precautions.
It is also freely available software in internet. We can download it.
Using MBSA
:start
-
programs
–
MBSA
select scan a computer/scan more than one computer
Provide the IP address of the computer
Click on start scan
It creates a report contains the information about the system.
RSOP: (Resultant Set of Policies):
It is a new feature of 2003 using which we can gather all the policies
implemented by group policy in the entire forest.
RSOP works in two modes logging and planning
Logging: Generates the reports for the users who all have logged in and effected
with the policy.
Planning: it is useful for experimentation. I.e. as an admin Would like to see the
result of the policy before it is implemented.
Using RSOP
Open ADUC
Right click on the OU
Select RSOP
CIMOM (Common Information Management Object Model) is database where
GP settings are registered.
GPMC (Group Policy Management Consol):
It is a new feature in 2003 which centralizes the management of group policies for ex. multiple
forests, sites, OUs; Domains can be administered from a central location.
Gathering of group policies implemented in the entire forest is easy.
Implementing Group policy is also very easy
Back and restore of G.Ps is easy
Once installed, disables group policy option for local, sites & domain.
Software available in internet. Filename is gpmc.msi