Introduction |
|
xix | |
Assessment Test |
|
xxvii | |
|
Planning a Network Infrastructure: A Technology Primer |
|
|
1 | (38) |
|
Defining a Network Infrastructure |
|
|
3 | (1) |
|
Network Infrastructure in Windows Server 2003 |
|
|
4 | (1) |
|
Windows Server 2003 Version Updates |
|
|
5 | (12) |
|
Windows Server 2003 Release 2 |
|
|
6 | (2) |
|
Windows Server 2003 Service Pack 1 |
|
|
8 | (2) |
|
Network Configuration and Connectivity Improvements |
|
|
10 | (2) |
|
Data Security Improvements |
|
|
12 | (2) |
|
Security Infrastructure Improvements |
|
|
14 | (1) |
|
High Availability Improvements |
|
|
14 | (3) |
|
Planning the Network Topology and Name Resolution Strategies |
|
|
17 | (4) |
|
Planning TCP/IP and the Network Topology Strategy |
|
|
17 | (2) |
|
Planning a Routing Strategy |
|
|
19 | (1) |
|
Planning an Internet Connectivity Strategy |
|
|
19 | (1) |
|
Planning a Name Resolution Strategy |
|
|
19 | (2) |
|
Planning for Secure Data Flow |
|
|
21 | (3) |
|
Planning a Remote Access Strategy |
|
|
21 | (1) |
|
Planning Protocol Security |
|
|
22 | (2) |
|
Planning and Implementing a Security Infrastructure |
|
|
24 | (3) |
|
Planning Policy-Based Security for Server Roles |
|
|
25 | (1) |
|
Planning a Security Update Infrastructure |
|
|
25 | (2) |
|
Enhancing Authentication through Certificate Services |
|
|
27 | (1) |
|
Planning for High Server Availability |
|
|
27 | (2) |
|
Planning Clustering and Network Load Balancing |
|
|
28 | (1) |
|
Planning Secure Methods for Remote Administration |
|
|
29 | (1) |
|
Monitoring Network Performance |
|
|
29 | (1) |
|
Planning a Disaster Recovery Strategy |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (4) |
|
Answers to Review Questions |
|
|
37 | (2) |
|
Planning a TCP/IP Network Infrastructure |
|
|
39 | (70) |
|
Understanding and Choosing Network Protocols |
|
|
41 | (7) |
|
How Network Protocols Work |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
Connectionless versus Connection-Oriented Protocols |
|
|
44 | (2) |
|
Network Protocols and Windows Server 2003 |
|
|
46 | (2) |
|
Planning an IP Routing Strategy |
|
|
48 | (3) |
|
Hardware versus Software Routing |
|
|
48 | (1) |
|
Static versus Dynamic Routing |
|
|
49 | (2) |
|
Understanding IP Addressing |
|
|
51 | (4) |
|
The Hierarchical IP Addressing Scheme |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
55 | (18) |
|
|
56 | (9) |
|
|
65 | (8) |
|
Analyzing IP Addressing Requirements |
|
|
73 | (9) |
|
Choosing an Address Assignment Model |
|
|
74 | (3) |
|
Choosing a System for the IP Subnet Structure |
|
|
77 | (1) |
|
Choosing Public or Private Addresses |
|
|
78 | (3) |
|
Planning for Automatic IP Configuration |
|
|
81 | (1) |
|
|
82 | (6) |
|
|
83 | (1) |
|
|
84 | (2) |
|
Automatic Configuration in IPv6 |
|
|
86 | (2) |
|
Troubleshooting TCP/IP Addressing |
|
|
88 | (10) |
|
Identifying the TCP/IP Configuration |
|
|
88 | (3) |
|
Testing IP Communications |
|
|
91 | (5) |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (5) |
|
Answers to Review Questions |
|
|
105 | (4) |
|
Planning a Network Connectivity Strategy |
|
|
109 | (90) |
|
|
111 | (13) |
|
|
112 | (3) |
|
|
115 | (8) |
|
Routing in Windows Server 2003 |
|
|
123 | (1) |
|
|
124 | (30) |
|
Creating and Managing Interfaces |
|
|
125 | (17) |
|
Setting IP Routing Properties |
|
|
142 | (2) |
|
Managing Routing Protocols |
|
|
144 | (7) |
|
|
151 | (3) |
|
|
154 | (5) |
|
|
154 | (2) |
|
Creating VPN Packet Filters |
|
|
156 | (3) |
|
Troubleshooting IP Routing |
|
|
159 | (4) |
|
Understanding Network Connectivity |
|
|
163 | (7) |
|
Understanding Private Addressing |
|
|
164 | (1) |
|
NAT in Windows Server 2003 |
|
|
165 | (1) |
|
The Fate of the Outbound Packet |
|
|
165 | (1) |
|
The Fate of the Inbound Packet |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (12) |
|
|
170 | (3) |
|
Adding and Removing NAT Interfaces |
|
|
173 | (6) |
|
Configuring NAT Properties |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (3) |
|
|
186 | (8) |
|
Answers to Review Questions |
|
|
194 | (5) |
|
|
199 | (80) |
|
DNS in Windows Server 2003 Networks |
|
|
200 | (2) |
|
New in DNS for Windows Server 2003 SP1 |
|
|
202 | (1) |
|
|
202 | (1) |
|
New in DNS for Windows Server Release 2 |
|
|
203 | (1) |
|
|
204 | (22) |
|
|
205 | (3) |
|
DNS and Windows Server 2003 |
|
|
208 | (4) |
|
|
212 | (1) |
|
|
213 | (13) |
|
|
226 | (3) |
|
Understanding Domain Names |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (10) |
|
Selecting the Appropriate Zone Type |
|
|
230 | (1) |
|
Selecting the Zone Data Location |
|
|
230 | (3) |
|
|
233 | (3) |
|
|
236 | (3) |
|
Planning DNS Zone Replication and Delegation |
|
|
239 | (5) |
|
|
239 | (1) |
|
Zone Transfers and Replication |
|
|
240 | (1) |
|
Securing DNS Zone Transfers |
|
|
241 | (1) |
|
|
242 | (2) |
|
Determining DNS Caching and Forwarding |
|
|
244 | (4) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (1) |
|
Planning DNS Server Resources |
|
|
248 | (4) |
|
Planning General DNS Server Requirements |
|
|
248 | (1) |
|
Planning for Server Capacity |
|
|
249 | (1) |
|
|
250 | (2) |
|
|
252 | (4) |
|
Troubleshooting Host Name Resolution |
|
|
256 | (10) |
|
|
257 | (2) |
|
|
259 | (7) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (8) |
|
Answers to Review Questions |
|
|
276 | (3) |
|
|
279 | (72) |
|
Understanding NetBIOS Name Resolution |
|
|
282 | (16) |
|
How Name Resolution Works |
|
|
282 | (2) |
|
WINS in Windows Server 2003 |
|
|
284 | (1) |
|
|
285 | (3) |
|
|
288 | (1) |
|
Supporting Non-WINS Clients |
|
|
289 | (2) |
|
Using LMHOSTS as an Alternative to WINS |
|
|
291 | (4) |
|
Introducing WINS Replication |
|
|
295 | (3) |
|
Designing a WINS Strategy |
|
|
298 | (14) |
|
Determining How Many WINS Servers to Install |
|
|
298 | (1) |
|
Planning for Availability and Fault Tolerance |
|
|
299 | (1) |
|
Securing the WINS Infrastructure |
|
|
300 | (1) |
|
Monitoring WINS Client Traffic |
|
|
300 | (2) |
|
Planning Replication Partnerships |
|
|
302 | (5) |
|
Comparing WINS Deployment Scenarios |
|
|
307 | (5) |
|
|
312 | (13) |
|
|
312 | (6) |
|
Controlling WINS Replication |
|
|
318 | (7) |
|
|
325 | (5) |
|
|
326 | (1) |
|
|
326 | (3) |
|
Compacting the WINS Database |
|
|
329 | (1) |
|
Deleting and Tombstoning WINS Records |
|
|
330 | (1) |
|
Configuring Inter-Forest WINS Replication |
|
|
330 | (2) |
|
|
332 | (1) |
|
|
332 | (3) |
|
|
333 | (1) |
|
|
333 | (1) |
|
Using the Nbtstat Command |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (9) |
|
Answers to Review Questions |
|
|
346 | (5) |
|
Planning Secure Network Access |
|
|
351 | (96) |
|
Evaluating Remote Access Security |
|
|
352 | (14) |
|
|
353 | (5) |
|
|
358 | (8) |
|
Planning Remote Access Policies |
|
|
366 | (12) |
|
Modifying the Default Remote Access Policies |
|
|
367 | (7) |
|
Creating a Remote Access Policy |
|
|
374 | (4) |
|
|
378 | (20) |
|
|
380 | (14) |
|
|
394 | (1) |
|
Planning an IPSec Deployment |
|
|
395 | (3) |
|
|
398 | (29) |
|
Using the IP Security Policy Management Console |
|
|
398 | (4) |
|
|
402 | (6) |
|
Configuring IPSec Policies |
|
|
408 | (12) |
|
Configuring IPSec for Tunnel Mode |
|
|
420 | (7) |
|
|
427 | (1) |
|
Troubleshooting Security for Data Transmission |
|
|
428 | (8) |
|
Verifying Effective Results of IPSec Policies with Resultant Set of Policy (RSoP) |
|
|
429 | (2) |
|
Monitoring IPSec Status with the IP Security Monitor |
|
|
431 | (1) |
|
Viewing IPSec-Related Events in the Event Log |
|
|
432 | (2) |
|
Best Practices for Troubleshooting IPSec |
|
|
434 | (2) |
|
|
436 | (1) |
|
|
436 | (2) |
|
|
438 | (6) |
|
Answers to Review Questions |
|
|
444 | (3) |
|
Planning Server-Level Security |
|
|
447 | (104) |
|
|
450 | (26) |
|
Using the Configure Your Server Wizard |
|
|
457 | (2) |
|
Using the Manage Your Server Tool |
|
|
459 | (2) |
|
The Security Configuration Wizard |
|
|
461 | (15) |
|
Evaluating the Windows Server 2003 Editions |
|
|
476 | (7) |
|
Managing Server Configurations with Security Policy |
|
|
483 | (36) |
|
Understanding Group Policy and Active Directory |
|
|
484 | (14) |
|
Configuring Security Settings Options |
|
|
498 | (15) |
|
Configuring System Options |
|
|
513 | (6) |
|
Analyzing Security Configurations with the Security Configuration and Analysis Tool |
|
|
519 | (10) |
|
Specifying a Security Database |
|
|
519 | (1) |
|
Importing a Security Template |
|
|
520 | (4) |
|
Performing a Security Analysis |
|
|
524 | (1) |
|
Reviewing the Security Analysis and Resolving Discrepancies |
|
|
524 | (5) |
|
Deploying Security Policies |
|
|
529 | (2) |
|
Planning a Security Update Infrastructure |
|
|
531 | (7) |
|
Using Microsoft Software Update Services |
|
|
532 | (3) |
|
Using Microsoft Baseline Security Analyzer |
|
|
535 | (3) |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
540 | (8) |
|
Answers to Review Questions |
|
|
548 | (3) |
|
Planning Certificate Services |
|
|
551 | (76) |
|
Understanding the Public Key Infrastructure |
|
|
554 | (20) |
|
|
556 | (5) |
|
|
561 | (7) |
|
|
568 | (6) |
|
Planning and Managing the Certificate Server |
|
|
574 | (27) |
|
Installing Microsoft Certificate Server |
|
|
574 | (6) |
|
Controlling the CA Service |
|
|
580 | (4) |
|
|
584 | (8) |
|
Configuring Revocation and Trust |
|
|
592 | (9) |
|
|
601 | (14) |
|
Introducing the Certificates Snap-In |
|
|
601 | (1) |
|
Viewing and Changing Certificate Properties |
|
|
602 | (4) |
|
Requesting New Certificates |
|
|
606 | (4) |
|
Rekeying an Existing Certificate |
|
|
610 | (1) |
|
|
610 | (1) |
|
Importing, Exporting, and Locating Certificates |
|
|
610 | (5) |
|
|
615 | (1) |
|
|
615 | (3) |
|
|
618 | (6) |
|
Answers to Review Questions |
|
|
624 | (3) |
|
Planning High Availability Services |
|
|
627 | (54) |
|
Evaluating Availability and Scalability Solutions |
|
|
629 | (9) |
|
|
633 | (1) |
|
Identifying Threats to High Availability |
|
|
634 | (1) |
|
Evaluating Scalability Methods |
|
|
635 | (1) |
|
Evaluating Clustering Technologies |
|
|
636 | (2) |
|
|
638 | (20) |
|
Understanding the Terminology |
|
|
639 | (1) |
|
Analyzing Business and Application Requirements |
|
|
640 | (1) |
|
Evaluating Application Deployment Considerations |
|
|
641 | (9) |
|
Determining the Cluster Model |
|
|
650 | (3) |
|
Planning Multisite Clusters |
|
|
653 | (3) |
|
|
656 | (2) |
|
Clustering Best Practices |
|
|
658 | (2) |
|
Planning Network Load Balancing |
|
|
660 | (6) |
|
|
661 | (4) |
|
Administering NLB Remotely |
|
|
665 | (1) |
|
Recovering from Cluster Node Failure |
|
|
666 | (3) |
|
|
666 | (1) |
|
Recovering from Cluster Failure |
|
|
667 | (2) |
|
|
669 | (1) |
|
|
670 | (1) |
|
|
671 | (8) |
|
Answers to Review Questions |
|
|
679 | (2) |
|
Planning Network Monitoring, Remote Admin., and Recovery |
|
|
681 | (98) |
|
Monitoring Network Traffic |
|
|
683 | (13) |
|
Installing the Network Monitor Driver and Application |
|
|
684 | (4) |
|
|
688 | (8) |
|
Monitoring and Optimizing System Performance |
|
|
696 | (38) |
|
Understanding System Monitor |
|
|
700 | (5) |
|
Monitoring Server Performance with System Monitor |
|
|
705 | (19) |
|
Using Additional Tools to Monitor Performance |
|
|
724 | (10) |
|
Planning Secure Remote Administration Methods |
|
|
734 | (15) |
|
Planning to Remotely Administer Computers with Remote Desktop for Administration |
|
|
734 | (9) |
|
Planning to Offer Remote Assistance to Client Computers |
|
|
743 | (6) |
|
Planning a Backup and Recovery Strategy |
|
|
749 | (17) |
|
|
749 | (12) |
|
|
761 | (2) |
|
Using Automated System Recovery |
|
|
763 | (3) |
|
|
766 | (1) |
|
|
767 | (1) |
|
|
768 | (7) |
|
Answers to Review Questions |
|
|
775 | (4) |
Glossary |
|
779 | (36) |
Index |
|
815 | |