Module 1: Microsoft Windows 2000 Networking Services Infrastructure Overview.

Slides:



Advertisements
Similar presentations
Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Nassau Community College
Module 5: Configuring Access for Remote Clients and Networks.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Active Directory: Final Solution to Enterprise System Integration
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Internet Protocol Security (IPSec)
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Windows 2008 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
Module 6: NAT As a Solution for Internet Connectivity.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Course 1562B: Designing a Microsoft ® Windows ® 2000 Networking Services Infrastructure.
1 Chapter Overview Understanding Windows Name Resolution Using WINS.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Name Resolution Domain Name System.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Chapter 9: Novell NetWare
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
70-411: Administering Windows Server 2012
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 10 Implementing Dynamic Host Configuration Protocol (DHCP)
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Designing Security for Internal Networks.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Module 13: Networking Service Designs. Overview Evaluating the Existing Configuration Identifying the Essential Design Decisions Providing Security Enhancing.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Introduction to Networking Concepts Lesson 1. TCP/IP Protocol Suite Network protocols provide the logical “language” for communication over the network.
Windows Vista Configuration MCTS : Advanced Networking.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Chapter Overview Understanding Windows Name Resolution Using WINS.
Windows 2008 Overview Lecture 1.
Module 8: Networking Services
Configuring and Troubleshooting Routing and Remote Access
Goals Introduce the Windows Server 2003 family of operating systems
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Presentation transcript:

Module 1: Microsoft Windows 2000 Networking Services Infrastructure Overview

Overview Introduction to Networking Services Design Microsoft Windows 2000 Networking Services Translating Organizational Goals into a Design

To develop an effective networking services infrastructure, you must be able to analyze the organizational goals and translate them into specific design strategies. In your networking services design, you must take into account the existing infrastructure. You will base all of your design decisions on the existing infrastructure. In addition, your design must be easily managed so that the organization is able to maintain the infrastructure operation within design specifications.

At the end of this module, you will be able to: Describe the process for designing the networking services infrastructure Identify the Microsoft® Windows® 2000 networking services that make up a networking services infrastructure Describe the design aspects used to translate organizational goals into a networking services design

Introduction to Networking Services Design

The cycle used for deploying networking services into a network consists of three main phases. You can further divide each phase of the deployment cycle into specific decisions. The characteristics of an organization make each network deployment cycle slightly different.

 Design A comprehensive design consists of several essential decisions. The selection of networking services is one of the decisions that requires knowledge of the existing infrastructure and current organizational goals. After you select the networking services to include in your design, you must consider how to combine the services. You need to combine the networking services to improve the administration and performance of the network. Finally, you must decide on a management strategy that ensures the design specifications are met on a day-to- day basis. Your management strategy must also specify actions taken, if any, when the network fails to meet the design specifications.

 Implement After your design is created and satisfactorily tested, the network design is ready for implementation. During this phase of the process, the network is configured to meet the specifications of the design. Management processes are put into place to collect information, and the network operation begins.

 Manage During this phase of the process, you begin collecting data on the day-to-day operation of the network. The data that you collect allows you to determine which actions are required to maintain the network within design specifications. If the network characteristics significantly differ from the design specifications, you may need to redesign the solution.

 Microsoft Windows 2000 Networking Services Designing the Network Foundation Designing Internet Connectivity Designing Remote Access Connectivity Creating an Integrated Networking Services Infrastructure Design

Microsoft Windows 2000 Advanced Server offers a number of networking services. These services were developed to address specific requirements within an organization. You can create a networking services solution to fulfill the connectivity needs of your organization. To design a solution, you must translate the goals of your organization into functional requirements and specifications. Each of the networking services implemented by Windows 2000 addresses a different set of requirements. Some are fundamental, such as Transmission Control Protocol/Internet Protocol (TCP/IP), which is required when you plan to implement the Windows 2000 Active Directory™ directory service. Other networking services, such as Routing and Remote Access, address more specific needs like providing remote user connectivity.

In this lesson you will learn about the following topics: Designing the network foundation Designing Internet connectivity Designing remote access connectivity Creating an integrated networking services infrastructure design

Designing the Network Foundation Name? IP Address TCP/IP Network Base Protocol Support: TCP/IP Networking Services: DHCP, DNS, WINS

Designing the Network Foundation The foundation of your networking services design is based upon services that are common to all designs. These networking services provide support for an addressing structure, automated client configuration, and name resolution services.

 TCP/IP TCP/IP is an industry-standard, vendor-independent routable protocol. Many of the services provided in Windows 2000, such as WINS, DNS, Active Directory, or Internet Information Services (IIS), require TCP/IP.

 DHCP For TCP/IP networks, managing TCP/IP configurations manually can be a time-consuming task that is prone to errors. DHCP automates and manages the TCP/IP configuration of the computers on the network, including the IP address, subnet mask, default gateway, DNS server addresses, and WINS server addresses. DHCP reduces the administrative overhead associated with TCP/IP configuration.

 DNS DNS provides domain name resolution within the network. This allows computers within the network to use a fully qualified domain name (FQDN), such as DNS resolves an FQDN to an IP address. FQDNs allow network designers to create meaningful resource names and implement DNS designs for resolving those names. DNS resolves FQDNs by querying a DNS database for a matching entry that relates FQDNs to IP addresses.

 WINS One of the most popular peer-to-peer communications application programming interfaces (APIs) is the network basic input/output system (NetBIOS) API. Earlier versions of Windows networking used NetBIOS as a communications API. As with DNS FQDNs, NetBIOS names must be resolved to IP addresses for network connections to occur. WINS is a NetBIOS name resolution service that resolves NetBIOS resource names to IP addresses. In Windows 2000, WINS is needed to support previous clients such as those running Microsoft Windows NT® version 4.0, Windows for Workgroups, or Microsoft Windows 95 without the Active Directory client. In addition, any applications that use NetBIOS for peer-to- peer communications rely on WINS for name resolution. WINS is also required to resolve NetBIOS resource names that are created on a server cluster.

Designing Internet Connectivity Internet Intranet NAT Microsoft Proxy Server NAT Proxy Server

The Internet provides tremendous opportunity for organizations to communicate through means previously impossible. However, Internet connectivity exposes the private network to risks that were not present when private networks were isolated. The Network Address Translation (NAT) protocol and Microsoft Proxy Server 2.0 are two networking services that provide organizations secured access to the Internet.

 NAT NAT, a protocol found in the Routing and Remote Access feature of Windows 2000, simplifies the Internet connection of all computers that are on a single subnet network. NAT provides Internet connectivity in solutions where simplistic implementation and management are necessary. NAT provides a method of securing the private network that are adequate to protect resources that are not available to Internet users.

 Microsoft Proxy Server Microsoft Proxy Server 2.0 allows organizations to control the exchange of information between their private network and the Internet. You can include Proxy Server like a firewall in your design to protect the private network. In addition, you can include Proxy Server in your design to improve the performance of Internet access through existing connections. You can enhance the availability of your Proxy Server solution by including Proxy Server arrays.

Designing Remote Access Connectivity Remote User Dial-Up Remote Access Client Authentication Phone Book Service Dial-Up Remote Access Client Authentication Phone Book Service IP Routing Remote Access RADIUS

Windows 2000 provides a comprehensive solution for remote access and routing requirements. In your network designs, include the routing services to connect private networking segments within a geographic location or between locations over public networks, such as the Internet. You include the remote access services in your design so that remote users can connect to the private network by using authenticated and encrypted connections.

 IP Routing Windows 2000 provides IP routing by using the Routing and Remote Access feature. Routing and Remote Access supports static routing and dynamic routing protocols. When you are connecting remote locations over nonpersistent connections, you can include demand-dial routing in your network design. You can secure the communications over public networks by using a variety of encryption algorithms.

 Remote Access When your design requires remote user access to the private network, you can also include Routing and Remote Access. You can create remote access solutions that include dial-up or virtual private network (VPN) connections to the private network. You can secure the user credentials and confidential data by using a variety of authentication methods and encryption algorithms.

 RADIUS To support a variety of remote access servers, or outsource remote access connectivity to an Internet service provider (ISP), you can include Remote Authentication Dial-In User Service (RADIUS) in your network design. RADIUS is an industry standard protocol that provides user authorization, authentication, and accounting services for distributed dial-up networks. You would include Routing and Remote Access and Internet Authentication Service (IAS) in your design to provide a complete RADIUS solution.

Creating an Integrated Networking Services Infrastructure Design Designing Management Strategies Collecting data Analyzing data Responding to service variations Combining Services Providing Networking Solutions for Organizations

The selection of networking services is an essential decision when creating your networking services infrastructure. Your final design must produce a network that is manageable and clearly identifies the criteria for ensuring that the security, availability, and performance of the network are maintained.

 Designing Management Strategies The objective of your management strategy is to ensure that the criteria specified in your networking services design are reflected in the actual network. The following are the major categories to include in your management design: Collecting data. Provides the required information on network status Analyzing data. Evaluates the information specified in data collection against design specification. Responding to service variations. Acts to bring the services back into compliance with design specification.

 Combining Services You can combine multiple networking services on a single computer running Windows 2000 to simplify the network and to use hardware resources efficiently. When you dedicate individual computers to a single networking service, you increase the number of computers in the design. As the number of computers in your design increases, the administration and ongoing support for the network becomes more complex and unmanageable.

 Providing Networking Solutions for Organizations When you create your networking services design, remember that your design is the platform for the connectivity and protocol requirements of the organization. You include multiple networking services into your design to: Establish a network foundation. Provide access to public networks. Include connectivity for remote users and locations. Support network-based applications and authentication methods.

Translating Organizational Goals into a Design Design Aspect Is Achieved When the Design Functionality Fulfills the basic reason for implementing the technology. Security Ensures the confidentiality of data. Availability Provides access to the technology for a high percentage of the time. Performance Provides response times specified by the design requirements.

The organizational goals drive the requirements of your networking services infrastructure. Your challenge is to translate the organizational goals into design criteria, which you can divide into the following design aspects: functionality, security, availability, and performance. Some designs may have criteria affecting all design aspects, whereas other designs may incorporate only functionality and security aspects. When you evaluate or create a design, you need to remember to consider each of these design aspects.

 Functionality Your design is functional when the design fulfills the basic reason for implementing the networking service. For example, if a remote access server allows users to connect to private network resources, your remote access design is functional. Functionality is independent of the other categories. Your design may be functional but not secure or highly available, or it may not meet performance criteria. When reviewing a design, you must evaluate the functionality requirements of the design first. If your design is not functional, the remaining design aspects are irrelevant.

 Security The security aspect of your design ensures the confidentiality of data. Your design is secure when only authorized users are provided access to confidential data. Security is based on the functionality aspects of your design, but is independent of the availability and performance aspects. Your design may be secure but not highly available, or it may not meet performance criteria. Organizations should perform a risk analysis to establish those security aspects that must be addressed in any design projects. Set priorities for essential security elements to ensure that the design meets or exceeds the organization's minimum expected security standards.

 Availability Your design is available to the extent that users have access to the functionality that is provided by the networking service. You calculate availability by measuring the percentage of time that users have access to the service. The higher the availability, the higher the ratio between uptime and downtime provided by the service. Availability is based on the functionality aspects of your design, but is independent of the security and performance aspects. Your design may be highly available but not secure, or it may not meet performance criteria.

 Performance The performance aspect of your design is based on response times specified by the organization's goals. The performance of a networking service is typically driven by real-world events that must occur within a period of time, such as purchasing a product from an e- commerce Internet site. Performance is based on the functionality aspects of your design, but is independent of the security and availability aspects. Your design may exceed the performance criteria of the design but not be secure or exhibit high availability.

Review Introduction to Networking Services Design Microsoft Windows 2000 Networking Services Translating Organizational Goals into a Design