did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780619217549

70-293 MCSE Guide To Planning A Microsoft Windows Server 2003 Network, Enhanced

by
  • ISBN13:

    9780619217549

  • ISBN10:

    0619217545

  • Edition: CD
  • Format: Paperback
  • Copyright: 2005-04-07
  • Publisher: Cengage Learning
  • View Upgraded Edition
  • Purchase Benefits
List Price: $154.95
We're Sorry.
No Options Available at This Time.

Summary

This full-color hands-on guide book has been enhanced to make learning even easier by offering more detailed lab setup instructions, expanded chapter summaries, and new practice exams that will reinforce the skills learned.

Table of Contents

Introduction xv
Overview of Planning a Windows Server 2003 Network
1(36)
Installing Windows Server 2003
2(3)
Upgrading to Windows Server 2003 from Other Platforms
5(1)
Introducing Windows Server 2003 Network Architecture
5(4)
NDIS
7(1)
TDI
7(1)
Network Protocols
8(1)
Understanding Network Services
9(6)
Default Services
9(2)
Services Added to a Domain Controller
11(1)
Optional Network Services and Features
12(3)
Selecting the Operating System for the Enterprise
15(7)
Web Edition
15(1)
Standard Edition
16(1)
Enterprise Edition
17(1)
Datacenter Edition
17(2)
How Client Operating Systems Use Windows Server 2003 Services
19(3)
Planning a Windows Server 2003 Network Infrastructure
22(4)
The Team
22(1)
Goals
23(1)
Documentation
23(2)
Objectives and Tasks
25(1)
Testing
25(1)
Roll Out
25(1)
Chapter Summary
26(1)
Key Terms
27(4)
Review Questions
31(4)
Case Projects
35(2)
TCP/IP Architecture
37(46)
Introduction to TCP/IP
38(14)
IP Addresses
39(1)
Subnet Masks
40(3)
Default Gateway
43(2)
IP Address Classes
45(2)
Classless Inter-domain Routing
47(1)
Reserved Addresses
47(2)
DNS
49(1)
WINS
50(1)
DHCP
50(2)
TCP/IP Architecture Overview
52(2)
Application Layer Protocols
54(4)
HTTP
54(1)
FTP
55(1)
Telnet
56(1)
SMTP
56(1)
POP3
57(1)
IMAP4
58(1)
Transport Layer Protocols
58(8)
TCP
59(4)
UDP
63(3)
TCP Versus UDP
66(1)
Internet Layer Protocols
66(6)
IP
66(1)
RIP and OSPF
66(1)
ICMP
66(2)
IGMP
68(1)
ARP
69(3)
Network Interface Layer Protocols
72(1)
Chapter Summary
73(1)
Key Terms
74(3)
Review Questions
77(5)
Case Projects
82(1)
Planning Network Data Flow
83(36)
Types of Network Traffic
84(3)
Unicast Packets
84(1)
Broadcast Packets
84(2)
Multicast Packets
86(1)
Ethernet
87(3)
Collisions
87(1)
Collision Domains
88(1)
Transmission Modes
88(2)
Physical Components
90(5)
Media
90(1)
Hubs
91(1)
Latency
92(1)
Switches
93(2)
Routers
95(1)
Monitoring and Optimizing Network Performance
95(7)
Network Performance Problems and Solutions
96(6)
Optimizing Network Settings
102(3)
Utilizing the Binding Process
103(1)
Minimizing Network Protocols
104(1)
Implementing the Maximum Transmission Unit (MTU) Setting
104(1)
Troubleshooting Utilities
105(6)
Ping
105(1)
Tracert
106(1)
Pathping
106(1)
Nbtstat
107(1)
Netstat
108(1)
Network Diagnostics
109(1)
Ipconfig
110(1)
Netsh
110(1)
Nslookup
111(1)
Chapter Summary
111(1)
Key Terms
112(1)
Review Questions
113(4)
Case Projects
117(2)
Planning and Configuring Routing and Switching
119(58)
Building a Subnetted IP Network
120(13)
Binary Numbering and TCP/IP
120(4)
Binary Subnet Masks
124(2)
The Benefits of Subnets
126(1)
Subnetting a Network
127(2)
Subnet Hosts
129(2)
Supernetting
131(2)
Router Installation and Configuration
133(10)
Routing Tables
136(1)
Routing Protocols
137(2)
OSPF
139(1)
Configuring RIP
139(4)
Demand-Dial Connections
143(10)
Creating Demand-Dial Connections
143(6)
Demand-dial Interface Properties
149(1)
Dial-out Hours
150(1)
Demand-Dial Filters
150(3)
Virtual LANs
153(1)
Network Address Translation
154(7)
How NAT Works
154(2)
Installing NAT
156(3)
Configuring NAT
159(2)
Internet Connection Sharing
161(1)
Internet Connection Firewall
162(5)
Enabling ICF
162(1)
Configuring ICF
163(4)
Planning Internet Connectivity
167(2)
Chapter Summary
169(1)
Key Terms
170(1)
Review Questions
171(4)
Case Projects
175(2)
Planning, Configuring, and Troubleshooting DHCP
177(40)
The DHCP Process
178(3)
Leasing an IP Address
179(1)
Renewing an IP Address
180(1)
Planning DHCP
181(5)
When You Have a Small Network
182(1)
When You Have a Large Network
182(4)
Installing DHCP
186(1)
DHCP Server Authorization
187(2)
Configuring DHCP
189(14)
Scopes
190(3)
Superscopes
193(2)
Multicast Scopes
195(2)
Reservations
197(2)
Additional Options
199(2)
Vendor and User Classes
201(2)
Managing and Monitoring DHCP
203(6)
Backing Up and Restoring DHCP Databases
203(1)
Reconciling Scopes
204(1)
Viewing Statistics
204(1)
Enabling DHCP Audit Logging
205(1)
Enabling Conflict Detection
205(1)
Modifying File Paths
206(1)
Changing Bindings
206(1)
Viewing DHCP Events in Event Viewer
206(2)
Viewing DHCP Statistics in the Performance Snap-in
208(1)
DHCP Troubleshooting
209(1)
Chapter Summary
210(1)
Key Terms
211(1)
Review Questions
212(3)
Case Projects
215(2)
Planning, Configuring, and Troubleshooting WINS
217(36)
NetBIOS Name Resolution
218(4)
NetBIOS Name Cache
219(1)
WINS
219(1)
Broadcast
220(1)
LMHOSTS
220(2)
Choosing NetBIOS Name Resolution Methods
222(2)
Single Subnet Networks
222(1)
Large Multisubnet Networks
222(1)
Small Multisubnet Networks
223(1)
Non-WINS Clients
223(1)
WINS Functions
224(4)
Name Registration
224(2)
Name Renewal
226(1)
Name Release
226(1)
Name Query
227(1)
Installing WINS
228(1)
WINS Fault Tolerance
229(1)
WINS Replication
229(6)
Managing WINS
235(8)
Viewing Database Records
237(2)
Adding Static Records
239(1)
Backing Up and Restoring the Database
240(1)
Migrating the WINS to a New Server
241(1)
Compacting the WINS Database
242(1)
NetBIOS Security
243(2)
Chapter Summary
245(1)
Key Terms
246(1)
Review Questions
247(4)
Case Projects
251(2)
Planning a DNS Strategy
253(36)
Functions of the Domain Name System
254(7)
Host Name Resolution
254(2)
Forward Lookup
256(3)
Registering a Domain Name
259(1)
Reverse Lookup
259(1)
DNS Record Types
260(1)
DNS and BIND
260(1)
DNS Namespace Strategies
261(2)
Using the Existing External Namespace
261(1)
Using a Delegated Subdomain of the External Namespace
262(1)
Using a Separate Unique Namespace
263(1)
Installing DNS
263(2)
DNS Zones
265(3)
Primary and Secondary Zones
265(3)
Active Directory Integrated Zones
268(8)
Stub Zones
273(3)
Active Directory and DNS
276(3)
Dynamic DNS
277(1)
Dynamic DNS and DHCP
278(1)
WINS Integration
279(1)
Chapter Summary
280(1)
Key Terms
281(2)
Review Questions
283(4)
Case Projects
287(2)
Managing and Troubleshooting DNS
289(42)
Optimizing DNS Performance
290(6)
Delegating Authority
290(2)
Caching-only DNS Servers
292(1)
Nonrecursive DNS Servers
293(1)
Forwarding-only DNS Servers
294(1)
Conditional Forwarders
295(1)
DNS Security
296(5)
Zone Replication Security
296(3)
Dynamic DNS Security
299(1)
Dynamic DNS and DHCP Servers
300(1)
Managing DNS Servers
301(8)
Configuring Aging and Scavenging
301(1)
Updating Server Data Files
301(2)
Clearing Cache
303(1)
Configuring Bindings
303(1)
Editing the Root Hints
303(3)
Setting Advanced Options
306(2)
Configuring Security
308(1)
Modifying EDNSO
308(1)
Managing DNS Zones
309(7)
Reloading Zone Information
309(1)
Changing the Type of Zone and Replication
309(1)
Configuring Aging and Scavenging
310(2)
Modifying the Start of Authority Record
312(1)
Modifying the List of Name Servers
313(1)
Enabling WINS Resolution
313(1)
Enabling Zone Transfers
314(2)
Configuring Security
316(1)
Troubleshooting DNS
316(8)
Server Functionality
316(1)
Nslookup
317(2)
DNSLint
319(2)
DNSCmd
321(1)
Resetting Default Settings
321(1)
Resetting Default Security
322(1)
DNS Server Logging
322(2)
Chapter Summary
324(1)
Key Terms
325(1)
Review Questions
326(3)
Case Projects
329(2)
Planning and Managing Certificate Services
331(38)
Cryptography
332(1)
Symmetric Encryption
332(1)
Asymmetric Encryption
333(1)
Hash Encryption
333(1)
Uses for Cryptography
333(3)
Encrypting E-Mail
334(1)
Digital Signatures
334(1)
Secure Sockets Layer
335(1)
Certificate Services Components
336(4)
Certificates
337(1)
Certification Authority
337(2)
Certificate Revocation List
339(1)
Certificate-enabled Applications
340(1)
Installing and Managing Certificate Services
340(8)
Certificate Hierarchy
341(1)
Installing Certificate Services
342(4)
Back Up and Restore Certificate Services
346(2)
Managing Certificates
348(8)
Issuing Certificates
348(4)
Renewing Certificates
352(1)
Revoking Certificates
352(2)
Importing and Exporting Certificates
354(2)
Smart Card Authentication
356(4)
Preparing the Certification Authority to issue Smart Card Certificates
357(1)
Preparing a Smart Card Certificate Enrollment Station
357(1)
Configuring a Smart Card for User Logon
358(1)
Mapping the Smart Card Certificate to a User Account
358(2)
Attaching a Smart Card Reader to the Client Workstation
360(1)
Chapter Summary
360(1)
Key Terms
361(2)
Review Questions
363(3)
Case Projects
366(3)
Planning and Managing IP Security
369(40)
Why IPSec Is Important
370(3)
How Hackers Work
370(1)
Authentication, Encryption, and Digital Signatures
370(1)
Advantages of IPSec
371(1)
Disadvantages of IPSec
371(2)
IPSec Modes
373(3)
AH Mode
373(1)
ESP Mode
373(1)
Transport Mode
374(1)
Tunnel Mode
375(1)
IPSec Authentication
376(1)
Preshared Key
376(1)
Certificates
376(1)
Kerberos
377(1)
Enabling IPSec
377(1)
Assigning a Default IPSec Policy
378(2)
Creating Your Own IPSec Policy
380(18)
Adding and Creating Rules
384(3)
IPSec Filter Lists
387(5)
Filter Actions
392(4)
Cryptography Algorithms
396(2)
Troubleshooting IPSec
398(2)
Ping
398(1)
IPSec Security Monitor
399(1)
Event Viewer
399(1)
Resultant Set of Policy Snap-in
399(1)
Netsh
399(1)
Oakley Logs
400(1)
Network Monitor
400(1)
Chapter Summary
400(1)
Key Terms
401(1)
Review Questions
402(4)
Case Projects
406(3)
Planning Network Access
409(70)
Introducing Remote Access Methods
410(19)
Dial-up Remote Access
410(11)
VPN Remote Access
421(8)
Configuring Remote Access Servers
429(6)
Authentication Methods
432(1)
IP Address Management
433(2)
Allowing Client Access
435(8)
Creating a VPN Client Connection
438(2)
Configuring a VPN Client Connection
440(3)
Remote Access Policies
443(13)
Remote Access Policy Components
444(6)
Remote Access Policy Evaluation
450(5)
Default Remote Access Policies
455(1)
Radius
456(11)
Outsourcing Dial-up Requirements
457(1)
Configuring IAS as a RADIUS Server
458(4)
Configuring IAS as a RADIUS Proxy
462(5)
Troubleshooting Remote Access
467(3)
Software Configuration Issues
467(1)
Hardware Errors
468(1)
Logging
468(1)
Troubleshooting Tools
469(1)
Chapter Summary
470(1)
Key Terms
471(2)
Review Questions
473(4)
Case Projects
477(2)
Planning and Implementing Server Availability and Scalability
479(40)
Availability and Scalability
480(2)
Server Availability
480(1)
Scalability
481(1)
Stateful and Stateless Applications
481(1)
Windows Server 2003 Clustering
482(5)
Server Clusters
482(2)
Network Load Balancing
484(1)
An Example of Windows Server 2003 Clustering
485(2)
Installing and Configuring Server Clusters
487(4)
Server Cluster Concepts
491(7)
Shared Disks
492(2)
Quorum Resource
494(1)
Cluster Communication
494(1)
Resource Groups
494(1)
Failover and Failback
495(1)
Virtual Servers
495(3)
Network Load Balancing Concepts
498(5)
NLB Driver
498(1)
Virtual IP Address
499(1)
Application Requirements
499(1)
Affinity
500(1)
Load Balancing Options
500(1)
Network Communication
501(2)
Port Rules
503(1)
Implementing Network Load Balancing
503(6)
Installing Applications on an NLB Cluster
509(2)
Chapter Summary
511(2)
Key Terms
513(1)
Review Questions
514(3)
Case Projects
517(2)
Planning Server and Network Security
519(40)
Types of Security
520(8)
Physical Security
520(1)
Network Security
521(2)
Data Security
523(1)
Encrypting File System
524(4)
Planning Security Configuration for Server Roles
528(4)
Securing Domain Controllers
529(1)
Securing Web Servers
530(1)
Securing Database Servers
531(1)
Securing Mail Servers
531(1)
Planning Network Protocol Security
532(2)
Using VPNs to Secure Network Traffic
532(1)
Using IPSec to Secure Network Traffic
533(1)
Securing Web-based Applications
533(1)
Planning Wireless Network Security
534(6)
Wired Equivalent Protocol
534(1)
Authorized MAC Addresses
535(1)
Using VPNs to Secure Wireless Access
535(1)
The 802.1X Protocol
536(1)
Configuring Wireless Networks
537(3)
Default Security Settings
540(2)
Planning a Secure Baseline
542(4)
Configuring Client Computers
542(2)
Configuring Servers
544(2)
Software Updates
546(4)
Windows Update
547(1)
Automatic Updates
548(1)
Software Update Services (SUS)
549(1)
Microsoft Baseline Security Analyzer
549(1)
Hfnetchk
550(1)
Securing Administrative Access
550(1)
Chapter Summary
551(1)
Key Terms
552(1)
Review Questions
553(4)
Case Projects
557(2)
Problem Recovery
559(36)
File Backup and Recovery
560(10)
The Backup Utility
560(7)
Volume Shadow Copy
567(3)
Recovery Tools
570(7)
Device Driver Rollback
570(1)
Safe-Mode
570(2)
Last Known Good Configuration
572(3)
Recovery Console
575(2)
Remote Management
577(7)
Remote Desktop for Administration
577(4)
Remote Assistance
581(3)
Imaging Client Computers and Servers
584(4)
Remote Installation Services
584(3)
Third-party Imaging Utilities
587(1)
Chapter Summary
588(1)
Key Terms
589(1)
Review Questions
590(3)
Case Projects
593(2)
APPENDIX A Exam Objectives Tracking for MCSE Certification Exam #70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
595(6)
Planning and Implementing Server Roles and Server Security
596(1)
Planning, Implementing, and Maintaining a Network Infrastructure
596(1)
Planning, Implementing, and Maintaining Routing and Remote Access
597(1)
Planning, Implementing, and Maintaining Server Availability
598(1)
Planning and Maintaining Network Security
599(1)
Planning, Implementing, and Maintaining Security Infrastructure
599(2)
APPENDIX B Detailed Lab Setup Guide
601(4)
Hardware
602(1)
Software
602(1)
Setup Instructions
603(2)
APPENDIX C Expanded Chapter Summaries
605(32)
Practice Exam 637(10)
Glossary 647(18)
Index 665

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program