Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Understanding Internet Protocol
Configuring and Troubleshooting Network Connections
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Defining Network Infrastructure and Security
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Internet Protocol Security (IPSec)
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Windows Server 2008 Chapter 8 Last Update
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Security Data Transmission and Authentication
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Implementing Dynamic Host Configuration Protocol
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Configuring Network Access Protection
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Introduction to Windows Server 2003,. 2 Objectives Identify the key features of each platform that makes up the Windows Server 2003 family Understand.
Hands-On Microsoft Windows Server 2003 Chapter 1 Introduction to Windows Server 2003, Standard Edition.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Windows Vista Configuration MCTS : Advanced Networking.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
MTA Network Fundamental Cram Sesion
Module 8: Networking Services
Configuring and Troubleshooting Routing and Remote Access
Understand Networking Services
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

Network Services Lesson 6

Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding network services 3.5 Defining more network services Understanding network services 3.5 Defining Name Resolution Techniques Understand Name Resolution 3.4

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that enables configured client computers to obtain IP addresses automatically The IP information obtained might include the following: IP addresses Subnet masks Gateway addresses DNS server addresses Other advanced options The DHCP Server service provides the following benefits: Reliable IP address configuration Reduced network administration DHCP

Before a DHCP server can start leasing IP addresses to client computers, the following steps must be performed: 1. Install the DHCP service 2. Configure an IP scope 3. Activate the scope 4. Authorize the server 5. Configure advanced IP options (optional) DHCP Server

DEMO: Install and view the DHCP Service (and console)

DHCP sessions use a four-step process known as DORA. Discovery: The client sends a broadcast to the network to find a DHCP server Offer: The DHCP server sends a unicast “offering” of an IP address to the client Request: The client broadcasts to all servers that it has accepted the offer Acknowledge: The DHCP server sends a final unicast to the client that includes the IP information the client will use DHCP utilizes ports 67 and 68 DORA

DEMO: Add a DHCP Scope

Automatic Private IP Addressing (APIPA) is a service for assigning unique IP addresses on small office/home office (SOHO) networks without deploying the DHCP service APIPA can get in the way of a client obtaining an IP address properly (e.g., when a client attempts to obtain an IP address from a DHCP server, but the DHCP server is too busy) APIPA

APIPA is disabled using Registry Editor 1. Open Registry Editor 2. In Registry Editor, navigate to the following registry key: KEY_LOCAL_MACHINE\SYSTEM\Curre ntControlSet\Services\Tcpip\Parameters 3. Create the following entry: IPAutoconfigurationEnabled: REG_DWORD 4. Assign a value of 0 to disable Automatic Private IP Addressing (APIPA) support. 5. Close Registry Editor. Disable APIPA

DEMO: Disable APIPA

Remote Desktop Services, formerly known as Terminal Services, is a type of thin-client terminal server computing. RDS enables virtual desktop infrastructure (VDI), session-based desktops, and applications, allowing users to work anywhere Thin-client computers and PCs can connect to servers running Remote Desktop Services Remote Desktop Services

Remote Desktop Connection (DEMO) Computer Name

Routing and Remote Access Service (RRAS) supports remote user or site-to-site connectivity by using virtual private network (VPN) or dial- up connections. RRAS consists of the following components: Remote Access. By using RRAS, you can deploy VPN connections to provide end users with remote access to your organization's network. You can also create a site-to-site VPN connection between two servers at different locations. Routing. RRAS is a software router and an open platform for routing and networking. It offers routing services to businesses in local area network (LAN) and wide area network (WAN) environments or over the Internet by using secure VPN connections. Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services. Microsoft RRAS was formerly known as Remote Access Service (RAS) Routing and Remote Access Service

Internet/ISP

DEMO: Install and view Routing and Remote Access

Protocol within the TCP/IP suite that encrypts and authenticates IP packets Ensures private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services Designed to secure any application traffic because it resides on the network layer (or Internet layer for the TCP/IP reference model) Used in conjunction with virtual private networks and is an integral part of IPv6 IPsec has been defined to work in two different modes: Tunnel mode is most often used for site-to-site VPN connections Transport mode is most often used for securing IP traffic on private networks Internet Protocol Security (IPSec)

IPSec Protocol Types ProtocolRequirementUsage Authentication Header (AH) The data and the header need to be protected from modification and authenticated, but remain readable. Use for data integrity in situations where data is not secret but must be authenticated — for example, where access is enforced by IPSec to trusted computers only, or where network intrusion detection, QoS, or firewall filtering requires traffic inspection. Encapsulating Security Payload (ESP) Only the data needs to be protected by encryption so it is unreadable, but the IP addressing can be left unprotected Use when data must be kept secret, such as file sharing, database traffic, RADIUS protocol data, or internal Web applications that have not been adequately secured by SSL. Both AH and ESP The header and data, respectively, need to be protected while data is encrypted. Use for the highest security. However, there are very few circumstances in which the packet must be so strongly protected. When possible, use ESP alone instead.

Domain Name System (DNS) is a worldwide service that resolves host names to IP addresses DNS architecture is a hierarchical distributed database and an associated set of protocols that define: A mechanism for querying and updating the database A mechanism for replicating the information in the database among servers A schema of the database DNS is part of the application layer of the TCP/IP reference model DNS servers use inbound port 53 to accept name resolution requests DNS

Windows Internet Name Service (WINS) is a service that resolves NetBIOS names to IP addresses WINS is required for any environment in which users access resources that have NetBIOS names It is Microsoft’s version of the NetBIOS Name Service (NBNS) combined with a name server If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name unless you use Lmhosts files, and you might be unable to establish file and print sharing connections WINS and DNS are both name resolution services for TCP/IP networks WINS

Be able to install and configure DHCP to hand out IP addresses to client computers. You have learned the four-step DHCP process known as DORA. Be able to install and configure Remote Desktop Services so that client computers can connect remotely to a server. Understand how to install and configure Routing and Remote Access Service (RRAS) as a LAN router. You have learned how to define IPsec and the various protocols that can be used. Understand how DNS and WINS function, how the services are installed and configured and when WINS is needed on your network. Summary

Additional Resources & Next Steps Books Exam : MTA Networking Fundamentals (Microsoft Official Academic Course) Instructor-Led Courses 40033A: Windows Operating System and Windows Server Fundamentals: Training 2-Pack for MTA Exams and (5 Days) 40349A: Windows Operating System Fundamentals: MTA Exam (3 Days) 40032A: Networking and Security Fundamentals: Training 2-Pack for MTA Exams and (5 Days) 40366A: Networking Fundamentals: MTA Exam Exams & Certifications Exam : Networking Fundamentals Remote Desktop Poster us/download/confirmation.aspx?id= us/download/confirmation.aspx?id=3 262