Understanding, Configuring, and Securing TCP/IP Networks Lesson 11.

Slides:



Advertisements
Similar presentations
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Advertisements

Understanding Internet Protocol
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Chapter 18. IP: Internet Protocol Addresses
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 11 Configuring Dynamic Host Configuration Protocol
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 Chapter Overview Subnet. What is a subnet When you break a network into a few smaller networks, you have created several subnets Like IP address where.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
4: Addressing Working At A Small-to-Medium Business or ISP.
DIT314 ~ Client Operating System & Administration CHAPTER 9 SUPPORTING TCP/IP, DNS USING WINDOWS XP Prepared By : Suraya Alias.
IP Addressing Basics LAB 8.
Name Resolution Domain Name System.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Using Windows Firewall and Windows Defender
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
TCP/IP Addressing & Subnetting Unit objectives Discuss TCP/IP addressing and determine the IP address class and default subnet mask Discuss subnetting.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
C HAPTER 9 Supporting TCP/IP, DNS using Windows XP.
Configuring and Troubleshooting Access Lesson 12.
Introduction to Networking Concepts Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Configuring IPv4 and IPv6 Addressing Configure.
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Module 5: Designing Security for Internal Networks.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
10.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 10: Exploring TCP/IP and.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. TCP/IP Addressing and Data Delivery  The TCP/IP Protocol Suite  IP Addressing.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Introduction to Networking Concepts Lesson 1. TCP/IP Protocol Suite Network protocols provide the logical “language” for communication over the network.
Windows Vista Configuration MCTS : Advanced Networking.
Networks Connecting Two Computers With UTP. Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail,
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
LESSON Networking Fundamentals Understand IPv4.
Instructor Materials Chapter 4: Network Addressing
Chapter 9 Objectives Understand TCP/IP Protocol.
Week 6: Network Protocols Part 2
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Presentation transcript:

Understanding, Configuring, and Securing TCP/IP Networks Lesson 11

Skills Matrix Technology SkillObjective Domain SkillDomain # Introducing TCP/IPConfigure and troubleshoot network protocols 4.1 Understanding IP Addresses IPv6 IPv4 4.1 Understanding Subnetting and Subnet Masks IPv44.1 Configuring TCP/IP Network Settings Auto vs. manual configuration 4.1

Skills Matrix Technology SkillObjective Domain SkillDomain # Understanding DNSConfigure and troubleshoot network services at the client level DNS 4.2 Understanding DHCPDHCP4.2 Understanding and Configuring Wireless Networking and Security Configure and troubleshoot wireless networking Configure wireless network security WPA WEP 4.5

Skills Matrix Technology SkillObjective Domain SkillDomain # Configuring Wireless Networking in Group Policy Configure policy settings4.5 Understanding and Securing Data with IPsec by Using Windows Firewall Configure network security IPsec 4.6 Using Windows Firewall with Advanced Security to Implement IPsec IPsec Windows Firewall 4.6

Transmission Control Protocol/Internet Protocol (TCP/IP) – Most commonly used protocol for communication on computer networks. It is the network communications protocol that is the basis for the Internet. Understanding TCP/IP Introducing TCP/IP

Computers running Windows Vista are by default TCP/IP hosts, meaning that they have all of the software required for taking part in a TCP/IP network. Understanding TCP/IP (cont.) Introducing TCP/IP

TCP/IP hosts, such as computers running Windows Vista, are identified on TCP/IP networks with an IP address. Other network entities, such as printers or routers, can also be identified with an IP address. Understanding IP Addresses Introducing TCP/IP

IP addresses are 32 bits in length and are expressed in four octets separated from one another with a dot (the “.” character). Each octet is 8 bits long (32 bits for each address divided by 4 octets = 8 bits), which is why they are called octets.  Example IP address: Understanding IP Addresses (cont.) Introducing TCP/IP

Octets are expressed as values between 0 and 255 (with some restrictions). The first octet determines the class of the address. Classes – Divide the IP address space into sections that are used for different purposes Understanding IP Addresses (cont.) Introducing TCP/IP

Understanding IP Addresses (cont.) Introducing TCP/IP IP Address Class First Octet Range Purpose Class A1-126Very large networks Class B Medium to large networks Class C Small networks Class D Multicasting (sending messages to more than one host at a time) Class E Reserved for experimental purposes

TCP/IP hosts that are directly exposed to the Internet must receive their IP addresses from the Internet Corporation for Assigned Names and Numbers (ICANN) or some other authority. These IP addresses are called public-facing IP addresses. Understanding IP Addresses (cont.) Introducing TCP/IP

Almost all organizations today use private networks, in which the IP addresses internal to the organization are hidden from hosts external to the organization. Understanding IP Addresses (cont.) Introducing TCP/IP

Subnetting – Using subnet masks to partition a network into smaller networks called subnets Subnet mask – Used by subnetting to divide an IP address into a network ID and a host ID Network ID – Identifies the subnet Host ID – Identifies the host within that subnet Understanding Subnetting and Subnet Masks Introducing TCP/IP

Subnet masks – Divide IP addresses into network IDs and host IDs and can be used to partition networks into subnets  Example of a subnet mask for the IP address : Understanding Subnetting and Subnet Masks (cont.) Introducing TCP/IP

In Calculator in the View menu, click Scientific. Key the decimal octet. In the upper left just below the text box, select Bin. The number is displayed in binary. Add zeros to the left side until there are eight digits. Converting Octets from Decimal to Binary Introducing TCP/IP

Open Calculator in Scientific view. Select Bin in the upper left. Key the binary value, with the exclusion of leading 0s. Select Dec in the upper left. The value is displayed in decimal. Converting Octets from Binary to Decimal Introducing TCP/IP

Compare the first digit of each octet, and follow these rules.  1 AND 1 = 1  0 AND 0 = 0  0 AND 1 = 0 Do the same for the remaining 7 digits. Combining Octets Using a Logical AND Introducing TCP/IP

Replace each 1 with a 0. Replace each 0 with a 1. Applying a Logical NOT to an Octet Introducing TCP/IP

IP Address Classes Introducing TCP/IP IP Address Class Default Subnet Mask Purpose Class A Very large networks Class B Medium to large networks Class C Small networks

Calculating a Network ID Introducing TCP/IP Decimal Octets Binary Octets IP Address Subnet mask Network ID (IP address AND subnet mask)

Calculating a Host ID Introducing TCP/IP Decimal Octets Binary Octets IP Address NOT subnet mask Host ID (IP address AND NOT subnet mask)

Classless Inter-Domain Routing (CIDR) notation – Common way of expressing a subnetted network address, from which you can derive the IP addresses and subnet mask for the hosts on each network  Example: /26 Understanding Classless Inter- Domain Routing Notation Introducing TCP/IP

Domain Name System (DNS) – Hierarchical naming convention for identifying TCP/IP hosts on a network Fully qualified domain names (FQDNs) – User-friendly names to which IP addresses are mapped in DNS  Example FQDN: client42.northwind.contoso.com Understanding DNS

DNS Hierarchy Introducing TCP/IP LevelExamplesNotes root(.)The root domain is represented by the “.” Character. It is not expressed in FQDNs. Top-level domainnet, org, com, uk, govThere are many other TLDs, most of them country codes. Second-level domainmicrosoft, contosoTypically the second-level domain is a good indication of who owns the FQDN. Additional domain levels NorthwindThere can be any number of additional levels in a FQDN. Host nameclient42, wwwYes, www is a host name. Most FQDNs with www designated as the host resolve to the IP address of one or more web servers.

Both DNS clients and servers can cache DNS name resolutions. DNS caching – After the answer is found to a resolution, clients and servers store it locally for some time in case they need it. In this way, they won’t have to look it up again, which increases performance. DNS Caching Understanding DNS

Dynamic Host Control Protocol (DHCP) – Protocol that DHCP clients, such as computers running Windows Vista, can use to request and lease IP addresses from a DHCP server. The client can also use DHCP to request DHCP options. Understanding DHCP

DHCP client – Machine that uses DHCP to request an IP address lease and other information, called DHCP options DHCP server – Allocates IP addresses from a pool of IP addresses to DHCP clients and optionally offers supporting information to DHCP clients, called DHCP options Understanding DHCP (cont.) Understanding DHCP

DHCP option – Piece of information that DHCP servers can optionally offer to DHCP clients, including default gateway IP addresses and IP addresses for DNS name servers DHCP lease – Entire package that a DHCP client receives from a DHCP server Understanding DHCP (cont.) Understanding DHCP

The process of a DHCP client requesting and receiving a DHCP lease from a DHCP server is completed in the following four steps.  DHCPDISCOVER – The DHCP client broadcasts a request for a DHCP lease.  DHCPOFFER – DHCP servers on the network offer DHCP leases of specific IP addresses to the DHCP client. Understanding DHCP (cont.) Understanding DHCP

Requesting and receiving a DHCP lease (cont.)  DHCPREQUEST – The DHCP client chooses from which DHCP server to obtain a DHCP lease and broadcasts that it has chosen that server in a broadcast message. The other offering DHCP servers receive the DHCPREQUEST message and return the IP addresses they offered to their pools of available IP addresses for lease. Understanding DHCP (cont.) Understanding DHCP

Requesting and receiving a DHCP lease (cont.)  DHCPACK – The chosen DHCP server also receives the DHCPREQUEST message. It sends an acknowledgement to the DHCP client and assigns it any configured DHCP options. The client configures its TCP/IP settings with the IP address and DHCP options supplied by the DHCP server. Understanding DHCP (cont.) Understanding DHCP

Automatic Private IP Addressing (APIPA) – Another scheme for assigning IP addresses automatically. It is a part of Windows operating systems. If you configure a computer to automatically obtain an IP address and no DHCP server is available, you will receive an APIPA address.  APIPA addresses always start with the octets Understanding DHCP (cont.) Understanding DHCP

Configuring IPv4 TCP/IP Network Settings Manually Configuring TCP/IP Network Settings Properties dialog box for an example connection

Configuring IPv4 TCP/IP Network Settings Manually (cont.) Configuring TCP/IP Network Settings Example settings for a Class C private network with 64 subnets

Using DHCP to Configure TCP/IP Settings Automatically Configuring TCP/IP Network Settings Open the Properties dialog box for the connection you want to configure. In the ConnectionName Properties dialog box, select Internet Protocol Version 4 (TCP/IPv4), and then click Properties. Select Obtain an IP address automatically.

Using DHCP to Configure TCP/IP Settings Automatically (cont.) Configuring TCP/IP Network Settings Select one of the following:  Obtain DNS server addresses automatically  Use the following DNS server addresses

Configuring an Alternate IP Address Configuring TCP/IP Network Settings Example alternate IP address settings for a class A private network

Configuring Windows Vista Wired Network Policy in Group Policy Configuring TCP/IP Network Settings You can configure network settings through Group Policy in the Computer Configuration > Windows Settings > Security Settings > Wired Network (IEEE 802.3) Policies folder of Group Policy objects (GPOs).

Configuring Vista Wired Network Policy in Group Policy (cont.) Configuring TCP/IP Network Settings The Security tab of the WiredNetworkPolicyName Properties dialog box

Configuring Vista Wired Network Policy in Group Policy (cont.) Configuring TCP/IP Network Settings In the Select a network authentication method drop-down list, select one of the following:  Smart Card or other certificate – Select this option if you want wireless users to authenticate with a smart card.  Protected EAP (PEAP) – Protected Extensible Authentication Protocol. Usernames and passwords fall into this authentication category.

Configuring Vista Wired Network Policy in Group Policy (cont.) Configuring TCP/IP Network Settings In the Authentication Mode drop-down list, select one of the following:  User re-authentication – Authentication uses the computer’s credentials when a user is not logged on. When a user logs on, re- authentication using the user’s credentials is performed.  Computer Authentication – Authentication uses the computer’s credentials.

Configuring Vista Wired Network Policy in Group Policy (cont.) Configuring TCP/IP Network Settings In the Authentication Mode drop-down list, select one of the following (cont.):  User authentication – Authentication uses the computer’s credentials until a new wireless access point is connected to, at which time re- authentication takes place with the user’s credentials.

Configuring Vista Wired Network Policy in Group Policy (cont.) Configuring TCP/IP Network Settings In the Authentication Mode drop-down list, select one of the following (cont.):  Guest authentication – All connections to the network are regulated by the settings for the Guest user account. This is the least restrictive and most flexible authentication and is recommended when you are creating a wireless policy for a network where guests are welcome.

Wireless Networking and Security Understanding and Configuring Wireless Networking and Security Security is very important in wireless networks because anybody with a receiver can potentially log on to the network if security is weak.

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security In Vista, networks are differentiated into two broad classes.  Infrastructure networks – Networks that connect to wireless access points on your network  Ad-hoc networks – Networks that you can form on the fly with other wireless users

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security Wired Equivalent Policy (WEP) – Least secure technology. It requires a WEP key, which you supply to the wireless devices that connect to the access point. WEP has known vulnerabilities that enable hackers to crack it with retail hardware. WEP is not recommended for enterprise use.

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security Wi-Fi Protected Access (WPA) – Designed to eliminate the known security flaws of WEP. Wireless devices and the access point use a pre- shared key (PSK) that can be either a 256-bit number or an alphanumeric password between 8 and 63 characters long.

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security Wi-Fi Protected Access 2 (WPA2) – Preferred security technology for enterprise wireless networks. It uses 802.1X-based authentication and Advanced Encryption Standard (AES) encryption.

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security There are two versions of WPA2.  WPA2-personal  WPA2-enterprise WPA2-enterprise requires that a user authenticate on the network before wireless connectivity is granted.

Wireless Networking and Security (cont.) Understanding and Configuring Wireless Networking and Security Enterprise Single Sign-on – Enables users to authenticate to the wireless network access point and the domain in a single step. In Enterprise Single Sign-on, 802.1X authentication to the wireless network precedes logon to the domain, and users are only prompted for wireless credential information if needed.

Configuring Wireless Networking in Group Policy Understanding and Configuring Wireless Networking and Security You can configure wireless networking in Group Policy in the Computer Configuration > Windows Settings > Security Settings > Wireless Network (IEEE ) Policies node in Group Policy objects.

Configuring Wireless Policy for Infrastructure Networks Understanding and Configuring Wireless Networking and Security To configure Windows Vista wireless policy, you must first create a new Vista wireless policy in a GPO. You can only have one Vista policy per GPO, but you can configure policies for multiple wireless networks in the single policy.

Configuring Wireless Policy for Infrastructure Networks (cont.) Understanding and Configuring Wireless Networking and Security Connection tab of the New Profile properties dialog box for an infrastructure wireless network profile

Configuring Wireless Policy for Infrastructure Networks (cont.) Understanding and Configuring Wireless Networking and Security Security tab of the New Profile properties dialog box

Configuring Wireless Policy for Infrastructure Networks (cont.) Understanding and Configuring Wireless Networking and Security Network Permission tab of the WirelessPolicyName Properties dialog box with example settings configured

Understanding and Securing Data with IPSec Understanding and Securing Data with IPsec by Using Windows Firewall Internet Protocol Security (IPsec) – Suite of protocols for securing communication between two TCP/IP hosts.

Understanding and Securing Data with IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall Data integrity – Ensuring that the transmitted data is identical to the data received Encryption – Making the data unreadable by anybody but the intended reader Authentication – When IPsec validates the identity of both hosts in an IPsec session

Understanding and Securing Data with IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The two hosts in an IPsec session must share a common key with which to decrypt the encrypted data. Windows Vista does not exchange the key, but instead exchanges information that each host uses to generate identical keys locally.  The algorithm used to do this is called the Diffie- Hellman algorithm (DH).

Understanding and Securing Data with IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall Authentication methods offered by Windows Vista and commonly used in IPsec include the following:  Kerberos V5  NTLMv2  Certificate  Pre-shared key

Using Windows Firewall to Implement IPSec Understanding and Securing Data with IPsec by Using Windows Firewall You can use the New Connection Security Rule Wizard to help you create connection security rules. The wizard offers five rule types.  Isolation – Uses authentication criteria that you supply to restrict connections and thus isolate computers from other computers, such as those outside your domain

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The wizard offers five rule types (cont.).  Authentication exemption – Used to exempt computers from IPsec connection restrictions rather than subject them to IPsec connection restrictions. It is often used to grant access to infrastructure computers, such as domain controllers and DHCP servers, that computers need to communicate with before authenticating.

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The wizard offers five rule types (cont.).  Server-to-server – Used to authenticate the communications between two specific computers, between two groups of computers, between two subnets, or between a specific computer and a group of computers or a subnet

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The wizard offers five rule types (cont.).  Tunnel – Used for securing communications between two peer computers through tunnel endpoints, such as virtual private networking (VPN)  Custom – Used to create custom IPsec configurations

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall New Connection Security Rule Wizard

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall Endpoints page of the New Security Connection Wizard with example settings

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The Requirements page includes:  Request authentication for inbound and outbound connections  Require authentication for inbound connections and request authentication for outbound connections  Require authentication for inbound and outbound connections  Do not authenticate

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The Authentication Method page includes:  Default  Computer and user (Kerberos V5)  Computer (Kerberos V5)  Computer certificate  Advanced

Using Windows Firewall to Implement IPSec (cont.) Understanding and Securing Data with IPsec by Using Windows Firewall The Profile page includes:  Domain check box  Private check box  Public check box

Summary TCP/IP is the most commonly used network communications protocol in use today. It is used on the Internet and in most other networks, such as enterprise networks. IP addresses are how hosts in a TCP/IP network identify each other. Subnetting enables you to split a network into multiple networks by using a subnet mask. You Learned

Summary You learned how to convert decimal octets into binary octets and vice-versa. You learned how to perform AND and NOT operations on binary octets. Domain Name System is a user-friendly naming convention. DNS names, called fully qualified domain names, are converted into IP addresses by DNS name servers so that TCP/IP hosts can communicate. You Learned (cont.)

Summary Dynamic Host Control Protocol is a protocol by which TCP/IP hosts can automatically obtain IP addresses and supporting information. You learned how to configure IPv4 TCP/IP network settings manually. You learned how to use DHCP to configure IPv4 TCP/IP settings automatically. You Learned (cont.)

Summary You learned how to configure an alternate IP address. You learned how to configure Windows Vista wired network policy through Group Policy. You learned the importance of wireless network security and how to implement it. You learned how to configure Windows Vista wireless policy for infrastructure networks. You Learned (cont.)

Summary IP security protocol in Windows Vista can be implemented using Windows Firewall with Advanced Security. You can configure custom IP security policies to fit a variety of requirements. You learned how to create connection security rules. You Learned (cont.)