Wiley Pathways Windows Network Administration, First Edition
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Wiley Pathways Windows Network Administration, First Edition

English

You can get there

Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in Windows network administration.

Wherever you want to go, Windows Network Administration will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn fundamental Windows network administration concepts, it also helps you master the core competencies and skills you need to succeed in the classroom and in the real world. The book's brief, modular format and variety of built-in learning resources enable you to learn at your own pace and focus your studies.

With this book, you will be able to:
* Understand networking from the ground up
* Explore protocols and protocol suites, including TCP/IP, the most common protocol suite in use today
* Implement and administer WINS, DNS, and DHCP
* Troubleshoot name resolution and DHCP problems
* Manage network access with group polices and permissions
* Secure network communications with IPSec
* Configure and troubleshoot routing and remote access
* Master practical techniques you can use to fully support network users
* Learn time-saving techniques and best practices that all administrators should know

Wiley Pathways helps you achieve your goals

Not every student is on the same path, but every student wants to succeed. The Information Technology series in the new Wiley Pathways imprint helps you achieve your goals. The books in this series--Introduction to Databases, Introduction to Programming Using Visual Basic, Introduction to Operating Systems, Networking Basics, Windows Network Administration, Network Security Fundamentals, and PC Hardware Essentials--offer a coordinated information technology curriculum. Learn more at www.wiley.com/go/pathways

English

Steve Suehring (Stevens Point, Wisconsin) is currently a Systems Engineer at CoreComm, a 350,000-user Internet Provider. In addition to his other responsibilities, Steve maintains authentication infrastructure using MySQL as the database backend. Steve has built numerous applications with both the Oracle and MySQL databases. He is a Microsoft Certified Systems Engineer, Cisco Certified Design Associate, and Cisco Certified Network Professional. Steve has also written articles for Linux Magazine.

James Chellis, MCT, MCSE, is CEO of Comcourse, Inc., an online learning provider that delivers information technology courses through career colleges nationwide.

Matt Sheltz is a software engineer and systems administrator for Comcourse, Inc. and has more than a decade of experience writing bestselling training books and developing educational technologies.

Brian Hill has been working with personal computers since the days of the Atari 600XL, and has been networking computers since the days of bulletin boards and 300 baud modems. He has authored several books on networking, Cisco routing, and Windows operating systems. Brian currently works at Microsoft providing solutions to complex networking problems for enterprise customers.

English

1 Understanding Networks 1

Introduction 2

1.1 The Importance of the OSI Model 2

1.1.1 The OSI Model 2

1.1.2 Understanding Protocol Stacks 3

1.1.3 OSI Model Layers 3

1.1.4 Communication Between Stacks 12

Self-Check 14

1.2 Understanding Network Protocols 14

1.2.1 How Protocols Work 15

1.2.2 Examining Common Protocol Suites 18

Self-Check 22

1.3 Network Components and Classifications 22

1.3.1 Understanding Network Classifications 23

1.3.2 Examining Network Media 27

1.3.3 Examining Network Hardware 30

Self-Check 36

Summary 36

Key Terms 37

Summary Questions 38

Applying This Chapter 40

You Try It 41

2 The TCP/IP Suite 42

Introduction 43

2.1 Overview of TCP/IP 43

2.1.1 Understanding the Internet 43

2.1.2 TCP/IP Standards 45

2.1.3 The TCP/IP Reference Model 47

Self-Check 49

2.2 Understanding IP Addressing 49

2.2.1 Binary Numbering 49

2.2.2 IP Addresses 52

Self-Check 61

2.3 Understanding Routing 62

2.3.1 Understanding the Need for Routing 62

2.3.2 Understanding Static Routing 66

2.3.3 Understanding Dynamic Routing 67

Self-Check 68

2.4 TCP/IP Configuration 68

2.4.1 Basic TCP/IP Configuration 68

2.4.2 Advanced TCP/IP Configuration 73

2.4.3 Configuring Bindings 78

Self-Check 80

2.5 Basic TCP/IP Troubleshooting 80

2.5.1 Troubleshooting Methodology 80

2.5.2 TCP/IP Troubleshooting Tools 82

Self-Check 88

2.6 Monitoring TCP/IP Traffic 89

2.6.1 Understanding Network Monitor 89

2.6.2 Using Network Monitor 90

Self-Check 95

Summary 95

Key Terms 96

Summary Questions 98

Applying This Chapter 100

You Try It 102

3 Implementing and Administering WINS 103

Introduction 104

3.1 Understanding NetBIOS Naming 104

3.1.1 Understanding NetBIOS 104

3.1.2 Browsing 105

3.1.3 NetBIOS Name Resolution Methods 105

Self-Check 108

3.2 Understanding WINS 109

3.2.1 How WINS Works 109

3.2.2 Understanding WINS Replication 111

Self-Check 115

3.3 Configuring and Administering WINS 115

3.3.1 Basic WINS Configuration 115

3.3.2 Advanced WINS Configuration 121

3.3.3 Monitoring and Administering WINS 126

Self-Check 130

Summary 130

Key Terms 131

Summary Questions 132

Applying This Chapter 134

You Try It 135

4 Implementing and Administering DNS 136

Introduction 137

4.1 Understanding DNS 137

4.1.1 Understanding the Domain Name Space 138

4.1.2 Understanding DNS Resolution 140

4.1.3 Understanding the DNS Database 143

Self-Check 149

4.2 Configuring DNS 149

4.2.1 Basic DNS Configuration 149

4.2.2 Advanced DNS Configuration 154

Self-Check 161

4.3 Monitoring DNS 161

4.3.1 Monitoring Events 161

4.3.2 Using Debug Logs 164

Self-Check 166

Summary 166

Key Terms 167

Summary Questions 169

Applying This Chapter 172

You Try It 173

5 Troubleshooting Name Resolution  174

Introduction 175

5.1 Understanding Common Problems 175

5.1.1 Common NetBIOS Name Resolution Problems 175

5.1.2 Common DNS Resolution Problems 177

Self-Check 181

5.2 Troubleshooting using Command-Line Tools 181

5.2.1 Using ping, ipconfig, and nbstat 181

5.2.2 Using nslookup 184

Self-Check 190

5.3 Troubleshooting using Protocol Analyzers 190

5.3.1 Examining NetBIOS Name Resolution 191

5.3.2 Examining DNS Name Resolution 197

Self-Check 210

Summary 210

Key Terms 211

Summary Questions 212

Applying This Chapter 214

You Try It 215

6 Implementing and Administering DHCP 216

Introduction 217

6.1 Understanding DHCP 217

6.1.1 DHCP Overview 217

6.1.2 How DHCP Works 218

Self-Check 225

6.2 Configuring and Administering DHCP 226

6.2.1 Understanding DHCP Scopes 226

6.2.2 Installing DHCP 228

6.2.3 Basic DHCP Configuration 229

Self-Check 240

6.3 Advanced DHPC Configuration and Management 240

6.3.1 DDNS Integration 240

6.3.2 Building a Redundant DHCP Infrastructure 243

Self-Check 244

Summary 244

Key Terms 245

Summary Questions 246

Applying This Chapter 249

You Try It 250

7 Troubleshooting DHCP 251

Introduction 252

7.1 Understanding Common DHCP Problems 252

7.1.1 DHCP Server Configuration Problems 252

7.1.2 DHCP Router Configuration Problems 254

Self-Check 257

7.2 Advanced DHCP Monitoring, Management, and Troubleshooting 257

7.2.1 DHCP Monitoring 258

7.2.2 Advanced DHCP Management 262

7.2.3 Using Protocol Analyzers to Troubleshoot DHCP 263

Self-Check 270

Summary 270

Key Terms 271

Summary Questions 272

Applying This Chapter 274

You Try It 275

8 Managing Security 276

Introduction 277

8.1 Understanding Users and Groups 277

8.1.1 Overview of Active Directory 277

8.1.2 Understanding Users and Groups 280

Self-Check 282

8.2 Administering Users and Groups 282

8.2.1 Administering User Accounts 282

8.2.2 Administering Groups 299

Self-Check 306

8.3 Understanding and Administering Security Settings 306

8.3.1 Overview of Group Policy 307

8.3.2 Understanding and Administering Local Computer Policy 309

8.3.3 Understanding and Administering the Local Computer’s System Policies 314

Self-Check 321

Summary 322

Key Terms 324

Summary Questions 326

Applying This Chapter 328

You Try It 330

9 Managing Permissions 331

Introduction 332

9.1 Understanding Permissions and Shares 332

9.1.1 Understanding NTFS Permissions 332

9.1.2 Understanding Shares and Share Permissions 335

Self-Check 338

9.2 Administering Permissions and Shares 338

9.2.1 Administering Permissions 338

9.2.2 Administering Shares 344

Self-Check 349

Summary 349

Key Terms 351

Summary Questions 352

Applying This Chapter 354

You Try It 355

10 Administering Routing and Remote Access 356

Introduction 357

10.1 RRAS Overview 357

10.1.1 Understanding Dial-Up Networking 357

10.1.2 Understanding Virtual Private Networking 362

Self-Check 367

10.2 Configuring Routing 367

10.2.1 Enabling RRAS 368

10.2.2 Configuring IP Routing 369

Self-Check 380

10.3 Configuring Remote Access 380

10.3.1 General Configuration of the Remote Access Server 380

10.3.2 Configuring VPN Access 384

Self-Check 388

10.4 Remote Access Security 388

10.4.1 Configuring User Access 388

10.4.2 Understanding Remote Access Policies 390

10.4.3 Configuring Remote Access Policies 391

Self-Check 399

Summary 399

Key Terms 401

Summary Questions 402

Applying This Chapter 404

You Try It 406

11 Monitoring and Troubleshooting RRAS 407

Introduction 408

11.1 Monitoring RRAS 408

11.1.1 Configuring Monitoring 408

11.1.2 Examining Logs and Port Activity 412

Self-Check 413

11.2 Troubleshooting RRAS 414

11.2.1 Troubleshooting Static Routing 414

11.2.2 Troubleshooting Dial-Up Connectivity 415

11.2.3 Troubleshooting VPN Connectivity 417

Self-Check 418

Summary 418

Key Terms 419

Summary Questions 420

Applying This Chapter 421

You Try It 423

12 Configuring and Troubleshooting IPsec 424

Introduction 425

12.1 Understanding IPsec 425

12.1.1 IPsec Fundamentals 425

12.1.2 IPsec in Windows Server 2003 427

12.1.3 The IPsec Negotiation Process 428

12.1.4 Security Filters 430

12.1.5 Security Methods 431

12.1.6 Security Filter Actions 431

12.1.7 Security Policies 432

12.1.8 IPsec Authentication 433

Self-Check 435

12.2 Configuring IPsec Policies 435

12.2.1 Creating Local IPsec 435

12.2.2 Creating IPsec via Group Policy 436

12.2.3 Configuring IPsec Policies 439

12.2.4 Managing Filter Lists and Actions 444

Self-Check 451

12.3 Monitoring and Troubleshooting IPsec 451

12.3.1 Monitoring IPsec 451

12.3.2 Troubleshooting IPsec 458

Self-Check 460

Summary 460

Key Terms 462

Summary Questions 463

Applying This Chapter 465

You Try It 466

Glossary 467

Index 487

loading