Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.

Slides:



Advertisements
Similar presentations
The subnet /28 has been selected to be further subnetted to support point-to-point serial links. What is the maximum number of serial links.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Chapter 8 Administering TCP/IP.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
© N. Ganesan, All rights reserved. Chapter IP Routing.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Configuring Routing and Remote Access (RRAS) and Wireless Networking Lesson 5.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Chapter Overview TCP/IP Overview Configuring TCP/IP Clients
Implementing Dynamic Host Configuration Protocol
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Module 3: Planning and Troubleshooting Routing and Switching.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Implementing Dynamic Host Configuration Protocol
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter Overview Routing Principles Building Routing Tables.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
USING ROUTING & REMOTE ACCESS.  When you have only 2 network sites, then only 1 topology is available in which you install a router on each site & connect.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
10.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 10: Exploring TCP/IP and.
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
NetTech Solutions Common Connectivity Problems Lesson Eight.
1 Version 3.1 Module 6 Routed & Routing Protocols.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Configuring Routing and Remote Access (RRAS) and Wireless Networking Lesson 5.
Windows Vista Configuration MCTS : Advanced Networking.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Module 9: Configuring Network Access
Planning and Troubleshooting Routing and Switching
Chapter 6 – Routing.
Troubleshooting IP Addressing
Chapter 9 Objectives Understand TCP/IP Protocol.
Chapter 3: Dynamic Routing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Presentation transcript:

Using Routing and Remote Access Chapter Five

Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified environment Plan routing for IP multicast traffic  Plan security for remote access users Plan remote access policies Analyze protocol security requirements Plan authentication methods for remote access clients  Troubleshoot TCP/IP routing. Tools might include the route, tracert, ping, pathping, and netsh commands, and Network Monitor

Lessons in this Chapter:  Planning a Routing and Remote Access Strategy  Static and Dynamic Routing  Securing Remote Access  Troubleshooting TCP/IP Routing

Planning a Routing and Remote Access Strategy  Choosing a WAN Topology WAN Router

Planning a Routing and Remote Access Strategy  5 Network Sites WAN Mesh Topology

Planning a Routing and Remote Access Strategy  5 Network Site WAN Ring Topology

Planning a Routing and Remote Access Strategy  5 Network Site WAN Star Topology

Selecting a WAN Technology  Using Leased Lines  Using Dial-On-Demand Connections  Using Frame Relay  Using VPN

Exam Tip  Be sure to understand the ramifications of using persistent WAN connections as

Using Frame Relay

Static and Dynamic Routing  Selecting Routers Using Route Print

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value.  The subnet mask for the destination network address follows the MASK parameter.  The IP address following the subnet mask is the Gateway column value.  The Metric column value follows the METRIC parameter, and  The number following the IF parameter identifies one of the computer’s network interfaces.  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value. MASK  The subnet mask for the destination network address follows the MASK parameter.  The IP address following the subnet mask is the Gateway column value.  The Metric column value follows the METRIC parameter, and  The number following the IF parameter identifies one of the computer’s network interfaces.  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value. MASK  The subnet mask for the destination network address follows the MASK parameter. IP address  The IP address following the subnet mask is the Gateway column value.  The Metric column value follows the METRIC parameter, and  The number following the IF parameter identifies one of the computer’s network interfaces.  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value. MASK  The subnet mask for the destination network address follows the MASK parameter. IP address  The IP address following the subnet mask is the Gateway column value. Metric  The Metric column value follows the METRIC parameter, and  The number following the IF parameter identifies one of the computer’s network interfaces.  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value. MASK  The subnet mask for the destination network address follows the MASK parameter. IP address  The IP address following the subnet mask is the Gateway column value. Metric  The Metric column value follows the METRIC parameter, and IF  The number following the IF parameter identifies one of the computer’s network interfaces.  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Using Static Routing  The drawbacks of static routing are the amount of manual maintenance the process requires and the routers’ inability to compensate for changes in the network configuration  Example Route Add Statement: ADD ROUTE ADD MASK METRIC 2 IF 1 ADD  The address following the ADD parameter is the Network Destination column value. MASK  The subnet mask for the destination network address follows the MASK parameter. IP address  The IP address following the subnet mask is the Gateway column value. Metric  The Metric column value follows the METRIC parameter, and the number following the IF parameter identifies one of the computer’s network interfaces. DELETECHANGEADD  By substituting the DELETE or CHANGE parameter for ADD, you can create commands that remove entries from the routing table or modify existing entries.

Planning  When you consider the number of networks, routers, and sites that make up your enterprise, you can decide whether the amount of time and effort needed to maintain static routes is worth the savings in network traffic.

Using Dynamic Routing  Dynamic routing uses specialized protocols that enable routers to communicate with each other and share their routing table information  Dynamic routing eliminates the need for network administrators to manually create static routes on each router

Selecting a Routing Protocol  The routing protocols most commonly used on private networks are the two supported by the Routing and Remote Access service in Windows Server 2003: Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).  In most cases, the designer of a routing strategy selects one of these two protocols

Understanding Routing Metrics  The lower the metric value, the more efficient the route  In dynamic routing, the metric values must represent a specific attribute for routing protocols to compute them  Different Routing Protocols: Distance Vector Routing Link State Routing

Exam Tip  Be sure to understand that the metrics in distance vector routing protocols represent the number of hops to the destination, regardless of the type or speed of the network connecting the routers at each hop. RIP is a distance vector routing protocol.

Distance Vector Routing  RIP makes no distinction between different types of networks. A hop is a hop, whether the packets are passing over a 1,000 Mbps Gigabit Ethernet network or a 33 Kbps dial-up modem connection.

Link State Routing  Use a route cost value, which OSPF factors into the equation  Link state routing is more processor intensive than distance vector routing, but it is also more precise and more capable of compensating for changes in the network infrastructure.

Understanding Routing Protocol Communications  Link state routing is one of the main reasons that administrators choose OSPF over RIP  When a RIP router starts, it generates a RIP request message and transmits it as a broadcast over all its network interfaces.  After the initial exchange of messages, the RIP routers all transmit periodic updates at regular intervals.

Administering Routing Protocols  OSPF’s link state routing capabilities and its ability to form areas make it more efficient and scaleable than RIP, but it does have drawbacks. Deploying RIP on a network is usually simplicity itself.

Exam Tip  When preparing for the exam, no time spent familiarizing yourself with the RIP and OSPF configuration parameters in the Routing And Remote Access console will be wasted.  Use the online help to learn the functions of the routing protocol parameters.

Routing IP Multicast Traffic unicast  A unicast transmission, by definition, involves two systems only, a source and a destination.  Multicast  Multicast transmissions use a single destination IP address that identifies a group of systems on the network, called a host group.  MulticastsClass D addresses  Multicasts use Class D addresses, as assigned by the Internet Assigned Numbers Authority (IANA), which can range from to

Multicast Promiscuous Mode  To receive all the IP multicast traffic on the network, the network interface adapters in a router must support a special mode called multicast promiscuous mode.  Unlike promiscuous mode, in which the network interface adapter processes all incoming packets, multicast promiscuous mode has the network interface adapter process all incoming packets with the multicast bit (that is, the last bit of the first byte of the destination hardware address) set to a value of 1.

Practice:  Installing RIP Exercise 1: Configuring Routing and Remote Access as a LAN Router  Page 5-21 Exercise 2: Installing RIP  Page 5-22 Exercise 3: Disabling Routing and Remote Access  Page 5-23

Securing Remote Access  Determining Security Requirements Which users require remote access? Do users require different levels of remote access? Do users need access to the network? What applications must users run?

Securing Remote Access  Controlling Access Using Dial-In Properties Remote Access Permission (Dial-in Or VPN) Verify Caller ID Callback Options  Planning Authentication Extensible Authentication Protocol (EAP) Microsoft Encrypted Authentication Version 2 (MS-CHAP v2) Microsoft Encrypted Authentication (MS-CHAP) Encrypted Authentication (CHAP) Shiva Password Authentication Protocol (SPAP) Unencrypted Password (PAP) Allow Remote Systems To Connect Without Authentication

Exam Tip  You should understand the differences among these authentication protocols and how they provide their respective levels of security.

Using Remote Access Policies  Remote Access Policy Components Conditions Remote access permission Remote access profile  Creating Remote Access Policies

Important:  Before RRAS can use remote access policies to regulate access to the server by group membership, you must configure the user’s account by selecting the Control Access Through Remote Access Policy option button in the Dial-in tab in the user’s Properties dialog box in the Active Directory Users And Computers console.

Practice:  Installing a Routing and Remote Access Server Exercise 1: Configuring Routing and Remote Access as a Remote Access Server  Page 5-35 Exercise 2: Creating a Remote Access Policy for Domain Users  Page 5-36 Exercise 3: Creating a Remote Access Policy for Domain Administrators  Page 5-37

Troubleshooting TCP/IP Routing  Isolating Router Problems Using Ping Using Tracert Using Pathping

Troubleshooting the Routing and Remote Access Configuration  Verify that the Routing and Remote Access service is running  Verify that routing is enabled  Check the TCP/IP configuration settings  Check the IP addresses of the router interfaces

Troubleshooting the Routing Table  Troubleshooting Static Routing  Troubleshooting Routing Protocols  Troubleshooting RIP  Troubleshooting OSPF

Summary  Case Scenario Exercise Page5-50  Troubleshooting Lab Page 5-52  Exam Highlights Key Points Key Terms  Page 5-53