
Résumé
Contents
Exam Insights xxvii
Self-Assessment lv
Chapter 1
Introduction to Windows 2000 1
New Features and Enhancements 2
Windows 2000 Server 2
Windows 2000 Advanced Server 11
Installing Windows 2000 Server and Advanced Server 21
System Requirements 21
Installation Preparation 22
Step-by-Step Installation of Windows 2000 Server
and
Windows 2000 Advanced Server 28
Chapter Summary 32
Review Questions 34
Real-World Projects 38
Chapter 2
Network Architecture 41
Windows 2000 Networking Overview 42
Small Business Networks 42
Growing Business Networks 43
Enterprise-Ready Infrastructure 44
Networking Architecture 44
LANs 45
WANs 45
The Internet 45
Intranet 46
Virtual Private Network 47
Identifying and Planning a Network Architecture 47
Simple LAN Topologies 47
Hybrid LAN Topologies 50
Enterprise-Wide Topologies 52
WAN Topologies 54
Network Optimization 56
Network Analysis Tools 56
Network Monitoring Tools 59
Monitoring Network Performance 61
System Monitor 62
Performance Logs and Alerts 65
Advice for Monitoring a Network 66
Evaluating Your Monitoring Results 74
Archiving Data and Monitoring Trends 74
Network Management Tools 74
Network Troubleshooting Tools 79
Chapter Summary 79
Review Questions 81
Real-World Projects 85
Chapter 3
Network Protocols 89
What Are Network Protocols? 90
TCP/IP 91
ARP 91
IP 94
ICMP 95
IGMP 95
UDP 96
TCP 96
IP Addressing 98
IP Address Classes 98
Subnet Masks 98
IP Routing 99
Routing Tables 99
Name Resolution 100
Obtaining IP Addresses 100
Registering and Resolving NetBIOS Names 100
Registering and Resolving DNS Names 100
Determining How to Use This Computer with Your TCP/IP Network 100
Configuring Additional or Secondary Methods to Obtain
and
Resolve NetBIOS and DNS Names 105
The ipconfig/all Command 106
The ping Command 106
The nslookup Command 107
IPX/SPX 107
NWLink 108
NetBIOS 111
NetBIOS Name Resolution 111
Disabling NetBIOS over TCP/IP 113
NetBEUI 114
AppleTalk 114
Monitoring Network Activity and Protocol Management and Optimization 115
Binding Network Protocols 115
Chapter Summary 115
Review Questions 117
Real-World Projects 120
Chapter 4
Dynamic Host Configuration Protocol 123
How DHCP Works 124
The Benefits of DHCP 124
The Terminology of DHCP 125
Microsoft Predefined User Classes 126
DHCP Options 127
Applying Options 127
The DHCP Server 127
Server Usage by Clients 128
Servers and Optional Data 128
Configuring Clients Automatically 128
The How-To of Client Configuration 129
The Initial Lease Process 130
The Lease Renewal Process 130
DHCP Server Authorization 131
The Unauthorized Server 132
Authorizing a Server 132
Detecting Unauthorized Servers 133
Remote Management of DHCP Servers 135
Database Files for DHCP 135
The DHCP Database 136
Restoring a Server’s Data 137
The DHCP Client 137
DHCP Clients for Microsoft 138
Microsoft DHCP Client Options 138
Supporting Clients 139
Using Reservations for Clients 140
The DHCP Relay Agent Component 141
Design Considerations for the Relay Agent 141
What You Should Do 142
What You Shouldn’t Do 142
Using DHCPINFORM and the Relay Agent 142
Routing and Remote Access Servers with DHCP 143
Dynamic Configuration 144
Manual Configuration 144
DHCP and WINS Interoperability 145
DNS Servers and DHCP 145
The DHCP for DNS Update 145
Windows Clients and the DNS Dynamic Update Protocol 146
The DnsUpdateProxy Security Group 146
DHCP Audit Logging 148
How It Works 148
Tools for DHCP 150
Chapter Summary 151
Review Questions 152
Real-World Projects 155
Chapter 5
Domain Name System (DNS) 157
Domain Name System Hierarchy 158
Fully Qualified Domain Name (FQDN) 159
Installing the DNS Server Service 159
Zone Transfer with BIND 160
Supporting Active Directory 160
Windows DNS Server Interoperability 161
DNS on the Internet 161
DNS Domain Names 163
Understanding DNS Domain Namespaces 163
DNS Domain Namespace Organization 164
Interpreting DNS Domain Names 165
DNS and the Internet 166
DNS Namespace Planning 166
Your First DNS Domain Name 167
Planning for Active Directory 167
Selecting Names 167
DNS Server Planning 170
Planning Server Capacity 170
Placing DNS Servers 171
Integrating Active Directory 172
How DNS and Active Directory Integrate 173
The Benefits of Integration 173
Installing the DNS Server Service 175
Adding a Primary Server for an Existing Zone 175
Adding a New Primary Zone to an Existing Server 176
DNS Client Configuration 176
Setting Computer Names 176
Setting Domain Names 177
Configuring a DNS Servers List 178
Configuring a DNS Suffix Search List 178
Configuring Multiple Names 179
Using Connection-Specific Names 179
Updating Client Information 180
DNS Tools 181
The DNS Console 181
Command-Line Utilities 182
Event Monitoring Utilities 183
Performance Monitoring Utilities 183
Verifying Server Configuration 185
Chapter Summary 186
Review Questions 187
Real-World Projects 190
Chapter 6
Domain Name System (DNS) Servers 193
DNS Servers 194
Dynamic Domain Name Server (DDNS) 195
DNS Server Types 198
Primary Name Server 199
Secondary Name Servers 200
Caching-Only Servers 201
Multihomed DNS Servers 201
Server Planning for DNS 202
Server Capacity Planning 203
Where to Place DNS Servers 204
Prioritizing Local Subnets 205
Simple Local Network Prioritizing 205
Complex Local Subnet Prioritizing 206
DNS Zones 207
The Differences between Zones and Domains 207
Why Zone Replication and Zone Transfers Are Needed 207
Incremental Zone Transfers 208
DNS Notify 208
Aging and Scavenging 209
Caching and Time to Live 210
Negative Caching 210
DNS Database Files and DNS-Related Files 210
Database File 211
Database File Records 212
Cache File 217
The Reverse Lookup File 218
Boot File 219
Monitoring Server Performance 219
Sample DNS Server Performance Test Results 220
DNS Server Performance Counters 220
Chapter Summary 221
Review Questions 222
Real-World Projects 226
Chapter 7
Windows Internet Name Service (WINS) 229
WINS Overview 230
NetBIOS Names 231
Type Description 232
NetBIOS Unique Names 233
NetBIOS Group Names 234
NetBIOS Node Types 235
NetBIOS Before Windows 2000 237
NetBIOS Name Servers 239
Configuring Replication Partners 240
Installing and Configuring the WINS Service 245
Installing and Configuring WINS Clients 246
Configuring WINS for TCP/IP Clients 246
Configuring WINS for DHCP-Enabled Clients 247
Releasing Names 248
Implementing and Configuring a WINS Proxy for Non-WINS Clients 248
Name Registration 249
Burst Handling 251
Name Query and Resolution 251
Browser Roles 252
Browser Processes 254
Planning Browsing Services 254
WINS Database Replication 256
Configuration Scenarios 256
Persistent Connections 257
Configuring DHCP Server for WINS 258
Monitoring and Managing 259
Using NBTSTAT 259
Microsoft Management Console 260
WINS Database Backup 260
Scavenging the Database 262
Restoring the WINS Database 263
Compacting the WINS Database 264
The lmhosts File 264
Limitations of lmhosts Files 265
Chapter Summary 266
Review Questions 267
Real-World Project 270
Chapter 8
IP Routing 275
Routing Concepts 276
Host Routing 276
Router Routing 278
Routing Tables 278
Static and Dynamic Routers 280
IP Routing 281
IP Routers 282
Routing Interfaces, Devices, and Ports 282
Routing Interface 282
Device 283
Port 283
IP Routing Protocols 283
RIP for IP 284
OSPF for IP 284
Routing Infrastructure 285
Single Path vs. Multipath 285
Flat vs. Hierarchical 286
Autonomous Systems 286
Interior Gateway Protocols 287
Exterior Gateway Protocols 287
Implementing a Windows 2000 Router 287
Installation 288
Setting Up Static IP Routing 288
Deploying Static IP Routing 289
Setting Up RIP-for-IP Routing 290
RIP-for-IP Considerations 290
Deploying RIP for IP 290
Deploying RIP 291
Setting Up OSPF Routing 291
External Routes and ASBRs 291
Deploying OSPF 292
Autonomous System Planning 292
Area Planning 292
Network Planning 293
Deploying a Single-Area OSPF Internetwork 293
Default Global Settings 293
Default Interface Settings 294
OSPF Deployment 294
Administration and Management Tools 294
Using Ping 295
Using Tracert 296
Chapter Summary 296
Review Questions 297
Real-World Projects 299
Chapter 9
Multicasting and Network Address Translation 303
Multicasting Overview 304
Internet Group Management Protocol 304
What Is IP Multicasting? 305
Multicast Addressing 305
IGMP Messages 306
Multicast Forwarding 306
Multicast Routing 307
Single-Router Intranets 307
Single-Router Intranets and the Internet 307
Multicast Boundaries and Heartbeat 309
Multicast Boundaries 309
Multicast Heartbeat 309
Using Multicast Scopes 310
Background on Multicast Addresses 310
Determining the Ranges to Use for Multicast Scopes 311
MADCAP and DHCP 312
Understanding NAT 313
Internet Connection Sharing and NAT 313
Private Network Addressing 315
Single or Multiple Public Addresses 316
Allowing Inbound Connections 316
Configuring Applications and Services 317
VPN Connections from a Translated SOHO Network 318
Deploying NAT 318
Configuring Other Computers on the Small Office or Home Network 319
Advanced NAT Translation Settings 319
NAT Editors 320
Chapter Summary 321
Review Questions 322
Real-World Projects 324
Chapter 10
Remote Access 327
Remote-Access Connectivity 328
Dial-Up Networking 328
Virtual Private Networking 329
Remote-Access Protocols 330
PPP 331
SLIP 331
MS-RAS 331
VPN Tunneling Protocols 331
PPTP 332
L2TP 332
TCP/IP and Remote Access 333
Assigning IP Addresses to Remote Access Clients 333
Authentication vs. Authorization 336
Remote-Access Dial-In Permissions 336
How Security Works 337
Security after the Connection Is Made 337
Account Lockout 338
Introduction to Remote-Access Policies 339
Local vs. Centralized Policy Management 339
Elements of a Remote-Access Policy 340
Conditions 340
Remote-Access Permission 340
Profile 341
Remote-Access Policy Administration Models 343
Access by User 343
Access by Policy in a Native-Mode Domain 344
Access by Policy in a Mixed-Mode Domain 345
Installing the RAS 346
Installing the Software 346
Chapter Summary 346
Review Questions 347
Real-World Projects 350
Chapter 11
Security 351
Internet Protocol Security (IPSec) 352
Using IP Security Policy Management 353
Security Features of TCP/IP for Windows 2000 353
IPSec Policy Properties 354
Predefined IPSec Policies 355
IPSec Connection Types 357
Virtual Private Networking with IPSec 359
Point-to-Point Tunneling Protocol 362
Kerberos V5 Authentication 363
Kerberos V5 and Domain Controllers 363
Public Key Policies Overview 364
Setting Up Permissions and Auditing 365
Permissions 365
Objects and Object Managers 366
Chapter Summary 368
Review Questions 369
Real-World Projects 371
Chapter 12
Certificate Authority (CA) 373
Installing CA 374
Root and Subordinate CA Types 374
Enterprise and Stand-Alone Policy Modules 374
Installation Requirements 375
Enterprise Adminstrator 376
Installing Certificate Services 376
Setting Object and Folder Permissions 379
Configuring the Policy and Exit Modules for Use by the Service 382
Creating Certificates 384
Setting Up an Automatic Certificate Request 384
Issuing Certificates 386
Obtaining a Certificate 388
Viewing a Certificate 389
Exporting Certificates 389
Importing Certificates 390
Managing a Computer’s Certificates 390
Revoking Certificates 391
Creating CRLs 391
EFS 392
EFS Standards 393
Using EFS Recovery Keys 394
Chapter Summary 395
Review Questions 396
Real-World Projects 399
Chapter 13
File, Web, and Print Services 401
Active Server Pages 402
Windows Media Services 402
Monitoring IIS 402
FTP Service Object Counters 402
Internet Information Services Global Object 403
Active Server Pages Object 403
Site Server ILS Service 405
Printer and Protocol Support 405
Internet Printing 405
Monitoring 406
Printers Published in Active Directory 406
Connecting Clients to a Printer 406
File and Printer Sharing for Microsoft Networks 407
Windows File Systems 407
NTFS, FAT, or FAT32? 408
Connection Point Services 409
Phone Book Service 409
Phone Book Administrator 409
Microsoft Connection Manager 410
How the Components Work Together 410
Administering PBS and PBA 410
Remote Administration of PBAs 411
Monitoring Phone Book Service Activity 412
Unix and Windows Network Management 413
Overview of NIS 413
Overview of Windows Network Management 414
NIS Server Architecture 414
User Name Mapping 418
Chapter Summary 419
Review Questions 420
Real-World Projects 423
Chapter 14
Troubleshooting 425
Where to Start 426
Windows 2000 Utilities 426
Backup 427
Utility Manager 429
Active Directory 430
The ipconfig Command 432
Windows 2000 Troubleshooters 434
Microsoft Management Console 436
Creating Consoles 436
Snap-In Components 437
Stand-Alone and Extension Snap-Ins 437
Windows Management Instrumentation (WMI) 441
Administrative Tools 442
Component Services 442
Computer Management 443
Data Sources (ODBC) 444
Event Viewer 444
Event Logging for Internet Authentication Service (IAS) 445
Local Security Policy 445
System Monitor 446
Causes of Bottlenecks 446
Strategy for Tuning and Testing 446
Tuning and Upgrading Tips by Component 447
Network Monitor 448
Detecting Other Installations of Network Monitor 448
The Network Data Stream 449
Displaying Captured Data 449
Troubleshooting Phone Book Service 450
Chapter Summary 451
Review Questions 452
Real-World Projects 456
Chapter 15
Practice Test 459
Chapter 16
Answer Key 487
Appendix A
Answers to Review Questions 511
Appendix B
Exam Objectives 525
Appendix C
Study Resources 529
Glossary 533
Index 547
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Coriolis |
Auteur(s) | Carl H. Smith, Smeeton |
Parution | 15/09/2000 |
Nb. de pages | 560 |
Format | 19 x 24 |
Couverture | Relié |
Poids | 1400g |
Intérieur | Noir et Blanc |
EAN13 | 9781576106433 |
ISBN13 | 978-1-57610-643-3 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse