did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735617988

Microsoft Windows 2000 Server TCP/IP Core Networking Guide

by
  • ISBN13:

    9780735617988

  • ISBN10:

    0735617988

  • Format: Paperback
  • Copyright: 2002-05-17
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99

Summary

Manage and troubleshoot all facets of TCP/IP based networking in Windows 2000 Server with comprehensive information and tools -- direct from the Windows 2000 product development team. Part of the official Microsoft Windows 2000 Server Resource Kit, this 900-page guide is now available separately for IT professionals focused on supporting core TCP/IP protocols and networking services. Coverage includes understanding and troubleshooting the TCP/IP suite in Windows 2000, using Dynamic Host Configuration Protocol (DHCP) to simplify IP configuration, implementing Domain Name System (DNS), configuring Windows Internet Name Service (WINS) for mixed network environments, ensuring network privacy and security with IPSec, managing network traffic and bandwidth with Quality of Service (QoS), and managing network resources with Simple Network Management Protocol (SNMP). The CD-ROM contains essential tools and utilities, along with a fully searchable eBook.

Table of Contents

Introduction xxxv
Document Conventions xxxv
Resource Kit Compact Disc xxxvi
Resource Kit Support Policy xxxvii
Part 1 Windows 2000 TCP/IP
Introduction to TCP/IP
3(60)
TCP/IP Protocol Suite
5(2)
Microsoft TCP/IP
5(1)
TCP/IP Standards
5(2)
TCP/IP Protocol Architecture
7(13)
TCP/IP Core Protocols
9(1)
IP
10(1)
ARP
11(1)
ICMP
11(2)
IGMP
13(1)
TCP
14(2)
UDP
16(1)
TCP/IP Application Interfaces
17(1)
Windows Sockets Interface
17(1)
NetBIOS Interface
18(2)
IP Addressing
20(24)
Address Classes
21(1)
Class A
21(1)
Class B
22(1)
Class C
22(1)
Class D
22(1)
Class E
23(1)
Network ID Guidelines
23(1)
Host ID Guidelines
24(1)
Subnets and Subnet Masks
24(2)
Subnet Masks
26(2)
Determining the Network ID
28(1)
Subnetting
28(1)
Step 1: Determining the Number of Host Bits
28(4)
Step 2: Enumerating Subnetted Network IDs
32(3)
Step 3: Enumerating IP Addresses for Each Subnetted Network ID
35(2)
Variable Length Subnetting
37(3)
Supernetting and Classless Interdomain Routing
40(2)
Address Space Perspective
42(1)
Public and Private Addresses
42(1)
Public Addresses
42(1)
Private Addresses
43(1)
Name Resolution
44(8)
Host Name Resolution
45(1)
Domain Names
45(2)
Host Name Resolution Using a Hosts File
47(1)
Host Name Resolution Using a DNS Server
48(2)
Combining a Local Database File with DNS
50(1)
NetBIOS Name Resolution
50(1)
NetBIOS Node Types
51(1)
IP Routing
52(8)
Direct and Indirect Delivery
52(2)
IP Routing Table
54(1)
IP Routing Table Entry Types
54(1)
Route Determination Process
55(1)
Example Routing Table for Windows 2000
55(2)
Routing Processes
57(1)
IP on the Sending Host
57(1)
IP on the Router
58(1)
IP on the Destination Host
58(1)
Static and Dynamic IP Routers
59(1)
Physical Address Resolution
60(2)
ARP Cache
60(1)
ARP Process
61(1)
Additional Resources
62(1)
Windows 2000 TCP/IP
63(64)
Overview of Windows 2000 TCP/IP
65(4)
Standard Features and Performance Enhancements
65(1)
Services Available
66(1)
Internet RFCs Supported by Microsoft Windows 2000 TCP/IP
66(3)
Architecture of Microsoft TCP/IP for Windows 2000
69(1)
NDIS Interface and Below
70(3)
Network Driver Interface Specification and TCP/IP
70(2)
Link Layer Functionality
72(1)
Maximum Transmission Unit
73(1)
Core Protocol Stack Components
73(36)
Address Resolution Protocol
74(1)
Using the ARP Tool
74(1)
ARP Cache Aging
75(1)
Updating Entries in the ARP Cache
76(1)
ARP and UDP Messages
76(1)
Internet Protocol
76(1)
Routing
76(2)
Using the Route Tool
78(4)
Duplicate IP Address Detection
82(1)
Multihoming
83(1)
Classless Interdomain Routing
84(1)
IP Multicasting
84(1)
IP Over ATM
84(1)
Internet Control Message Protocol
85(1)
Maintaining Route Tables
85(1)
PMTU Discovery
85(3)
Use of ICMP to Diagnose Problems
88(1)
Flow Control Using ICMP
89(1)
ICMP Router Discovery
89(1)
Quality of Service and Resource Reservation Protocol
90(1)
IP Security
90(2)
Internet Group Management Protocol
92(1)
Multicast Extensions to Windows Sockets
93(1)
Use of IP Multicasting by Windows 2000 Components
94(1)
Transmission Control Protocol
94(1)
TCP Receive Window Size Calculation and Window Scaling
94(3)
Delayed Acknowledgments
97(1)
TCP Selective Acknowledgment
97(1)
TCP Timestamps
98(2)
Dead Gateway Detection
100(1)
TCP Retransmission Behavior
101(2)
TCP Keep-Alive Messages
103(1)
Slow Start Algorithm and Congestion Avoidance
103(1)
Silly Window Syndrome
104(1)
Nagle Algorithm
104(1)
TCP TIME-WAIT Delay
105(1)
TCP Connections To and From Multihomed Computers
106(1)
Throughput Considerations
107(1)
User Datagram Protocol
108(1)
UDP and Name Resolution
109(1)
Mailslots Over UDP
109(1)
Network Application Interfaces
109(12)
Windows Sockets
109(1)
Applications
109(1)
Name and Address Resolution
110(1)
Support for IP Multicasting
110(1)
Backlog Parameter
110(1)
Push Bit Interpretation
111(1)
NetBIOS Over TCP/IP
111(1)
NetBIOS Names
112(2)
NetBIOS Name Registration and Resolution
114(2)
NetBIOS Name Registration and Resolution for Multihomed Computers
116(1)
Windows 2000 NetBT Internet/DNS Enhancements
117(2)
NetBIOS Over TCP/IP Sessions
119(1)
NetBIOS Datagram Services
120(1)
Client Services and Components
121(4)
Automatic Client Configuration
121(1)
Media Sense
122(1)
Dynamic Update DNS Client
123(1)
DNS Resolver Cache Service
123(1)
TCP/IP Filtering
124(1)
Additional Resources
125(2)
TCP/IP Troubleshooting
127(66)
Overview of TCP/IP Troubleshooting Tools
129(26)
Arp
130(1)
Hostname
131(1)
Ipconfig
131(2)
Nbtstat
133(2)
Netdiag
135(4)
Netdiag Syntax
139(1)
Netstat
140(3)
Nslookup
143(4)
PathPing
147(2)
Loss Calculation
149(1)
Ping
150(2)
Route
152(1)
Tracert
153(1)
How Tracert Works
154(1)
Interpreting Tracert Results
155(1)
Troubleshooting Overview
155(3)
TCP/IP Communication
156(1)
Resolving a Name to an IP Address
156(1)
Resolving a NetBIOS Name to an IP Address
156(1)
Resolving a Host or Domain Name to an IP Address
157(1)
Determining Whether an Address Is Local or Remote
157(1)
If the Destination Address Is Local, IP Uses ARP to Identify the Destination MAC Address
157(1)
If the Address Is Remote, Determine the Correct Gateway
158(1)
ARP for Gateway Address
158(1)
Unable to Reach a Host or NetBIOS Name
158(10)
Error 53
162(1)
Cannot Connect to Remote Systems Using Host Name
163(1)
Check the Hosts File
163(1)
Check Your DNS Configuration
164(2)
Check the LMHOSTS File
166(1)
Check the WINS Configuration
167(1)
Unable to Reach an IP Address
168(10)
Check Configuration with IPConfig
168(1)
Test Network Connection with Ping and PathPing
169(2)
Clear ARP Cache
171(1)
Verify Default Gateway
171(1)
Ping Remote Host
172(1)
Test IP-to-MAC Address Resolution with ARP
173(1)
Detecting Duplicate IP Addresses Using ARP
174(1)
Detecting Invalid Entries in the ARP Cache
174(2)
Verify Persistent Routing Table Entries
176(1)
Use Tracert and PathPing
176(1)
Verify Server Services on the Remote Computer
176(1)
Check IP Security on the Initiating Host
177(1)
Check Packet Filtering
177(1)
Troubleshooting IP Routing
178(7)
Cannot Connect to a Specific Server
178(1)
Connection to Remote Host Hangs
179(1)
Examining the Routing Table with Route
179(1)
Enabling IP Routing
179(1)
Examine Paths with Tracert
180(1)
Troubleshooting Gateways
181(1)
Troubleshooting ARP
181(1)
Troubleshooting Translational Bridging
182(1)
Using Ping to Determine Maximum Transmission Units
183(1)
Troubleshooting PMTU Black Hole Routers
184(1)
Discovering PMTU with Ping
184(1)
Troubleshooting Services
185(4)
Cannot Ping Across a Router as a Remote Access Client
186(1)
Troubleshooting TCP/IP Database Files
186(1)
Removing and Reinstalling TCP/IP
187(1)
SNMP Registry Keys
187(1)
TCP/IP Printing Registry Keys
188(1)
Simple TCP/IP Services Registry Keys
188(1)
DHCP Registry Keys
188(1)
WINS Registry Keys
188(1)
DNS Registry Keys
189(1)
Additional Resources
189(4)
Part 2 Address Allocation and Name Resolution
Dynamic Host Configuration Protocol
193(104)
What Is DHCP?
195(6)
DHCP Terminology
195(2)
How DHCP Works
197(1)
Benefits of DHCP
197(1)
New Features
198(1)
DHCP Client Support
199(2)
DHCP Lease Process
201(12)
DHCP Messages
201(2)
How the Lease Process Works
203(1)
DHCP Client States in the Lease Process
204(2)
Initializing
206(1)
Selecting
207(1)
Requesting
208(1)
Binding
209(1)
Renewing
210(1)
Rebinding
210(1)
Restarting a DHCP Client
211(1)
Lease Renewals
212(1)
Managing Lease Durations
213(1)
Managing Scopes
213(8)
80/20 Rule
215(1)
Managing Reservations
215(1)
Superscopes
216(4)
Removing Scopes
220(1)
Preventing Address Conflicts
221(1)
Server Conflict Detection
221(1)
Client Conflict Detection
222(1)
Managing DHCP Options
222(10)
DHCP Option Parameters
225(1)
Information Options
225(1)
Internal Protocol Options
226(1)
Options for Routing and Remote Access Clients
226(2)
Option Classes
228(1)
Vendor Classes
228(1)
User Classes
229(2)
Configuring Options
231(1)
Options Precedence
232(1)
Multicast DHCP
232(2)
Background on Multicasting
232(1)
Dynamic Membership
233(1)
Multicast Address Ranges
233(1)
Supporting MADCAP
233(1)
DHCP Database
234(3)
Database Management
234(1)
Record Management
234(1)
Storage Space Management
235(1)
Database Backup
235(1)
DHCP Service Database Files
235(2)
Supporting BOOTP Clients
237(4)
Differences Between BOOTP and DHCP
238(1)
BOOTP Clients Requesting IP Address Information Only
239(1)
BOOTP Clients Requesting Boot File Information
239(1)
DHCP Options Supported for BOOTP Clients
240(1)
Configuring the BOOTP Table
241(1)
Planning for DHCP
241(16)
Best Practices
241(5)
DHCP Service Installation
246(2)
Upgrading the DHCP Database for Windows 2000
248(2)
Configuring DHCP
250(1)
Preventing Rogue DHCP Servers
251(1)
How DHCP Servers Are Authorized
252(1)
How Unauthorized Servers Are Detected
253(1)
Clustering DHCP Servers
254(1)
Example of Clustered DHCP Servers
255(2)
DHCP Scenarios
257(18)
DHCP in Small Networks
257(1)
DHCP in Large Networks
258(1)
DHCP in Routed Networks
258(1)
Relay Agent Deployment
259(1)
Recommended General Configuration
260(1)
Windows 2000 Server Routing and Remote Access Relay Agents
261(1)
Windows NT Server 4.0 Relay Agents
261(1)
DHCP and Routing and Remote Access
262(1)
DHCP and WINS
263(1)
Adding Fault Tolerance to DHCP/WINS Service
264(1)
Additional Recommendations
265(1)
DHCP and DNS
266(1)
Additional Recommendations
267(1)
Windows-Based DHCP Clients and DNS with Dynamic Updates
268(1)
DHCP and Automatic Private IP Addressing
269(1)
Multihomed DHCP Servers
270(1)
Configuring a Multihomed DHCP Server
270(3)
Managing Relay Agents
273(1)
How Relay Agents Work
273(2)
Troubleshooting
275(21)
Using Ipconfig and Winipcfg
275(1)
Troubleshooting DHCP Clients
276(2)
Troubleshooting DHCP Servers
278(1)
Common Problems
278(4)
Monitoring Server Performance
282(1)
DHCP System Monitor Counters
282(2)
DHCP Manager Statistical Data
284(1)
DHCP Audit Logging
285(1)
Naming Audit Log Files
286(1)
Starting a Daily Audit Log
286(1)
Disk Checks
286(1)
Ending a Daily Audit Log
287(1)
Restoring Server Data
287(1)
Detecting DHCP Jet Data Corruption
288(1)
Simple Recovery: Restoring from Backup
289(2)
Rebuilding a Stopped DHCP Server
291(1)
Moving the DHCP Server Database
291(1)
Compacting the DHCP Server Database
292(1)
Using Reconcile to Salvage Scopes
293(1)
Analyzing Server Log Files
294(1)
DHCP Server Log File Format
294(1)
DHCP Server Log Event Codes
295(1)
Additional Resources
296(1)
Introduction to DNS
297(36)
Introduction to the Domain Name System
299(7)
Domain Namespace
299(2)
Domain Name
301(1)
Internet Domain Namespace
301(2)
Basic DNS Concepts
303(1)
Zones
304(2)
DNS Servers
306(3)
Caching-Only Servers
307(1)
Forwarders and Slaves
307(1)
Load Sharing
308(1)
Name Resolution
309(3)
Recursive and Iterative Queries
309(2)
Caching and Time to Live
311(1)
Negative Caching
312(1)
Resource Records and Zones
312(16)
Resource Record Format
312(1)
Resource Record Types
313(1)
SOA Resource Records
314(1)
NS Resource Records
315(1)
A Resource Records
315(1)
PTR Records
315(1)
CNAME Resource Records
315(1)
MX Resource Records
316(1)
SRV Records
317(1)
Less Common Resource Records
318(3)
Resource Records Not Defined in RFCs
321(1)
Delegation and Glue Records
321(1)
Zones
322(1)
Forward Lookup Zone
323(1)
Reverse Lookup Zone
323(2)
Root Hints Files
325(1)
Boot Files
326(2)
Zone Transfer
328(3)
Full Zone Transfer
328(1)
Incremental Transfer
329(1)
DNS Notify
330(1)
Dynamic Update
331(1)
DNS Standards
332(1)
Additional Resources
332(1)
Windows 2000 DNS
333(154)
Introduction to the Windows 2000 Implementation of DNS
335(2)
Naming Hosts and Domains
337(7)
Complying With Name Restrictions for Hosts and Domains
341(2)
Using Group Policy to Specify a DNS Suffix
343(1)
Windows 2000 Resolver
344(20)
Name Resolution
344(2)
DNS Name Resolution
346(4)
DNS Queries
350(5)
Configuring Query Settings
355(3)
Configuring Caching and Negative Caching
358(2)
Configuring Subnet Prioritization
360(3)
Preventing the Resolver from Accepting Responses from Non-Queried Servers
363(1)
Setting Up DNS for Active Directory
364(12)
Using the Active Directory Installation Wizard
365(2)
Using the Configure DNS Server Wizard
367(3)
Adding a Reverse Lookup Zone
370(1)
Planning for Reverse Lookup Zones
370(1)
Configuring a Standard Reverse Lookup Zone
371(1)
Configuring and Delegating a Classless In-addr.arpa Reverse Lookup Zone
372(4)
Active Directory Integration and Multimaster Replication
376(14)
Integrated Storage
377(4)
Storage Location
381(3)
Creating, Converting, and Deleting Zones
384(4)
Multimaster Replication
388(1)
Name Collisions
389(1)
Causing Immediate Replication
389(1)
Dynamic Update and Secure Dynamic Update
390(21)
Dynamic Update
392(1)
Dynamic Update Process
393(2)
DHCP Clients and Servers
395(7)
Statically Configured and Remote Access Clients
402(1)
Multihomed Clients
402(1)
Time to Live
403(1)
Resolving Name Conflicts
404(1)
Secure Dynamic Update
405(1)
Configuring Secure Dynamic Update
405(1)
Controlling Update Access to Zones
405(1)
Reserving Names
406(1)
DNS Standards for Secure Dynamic Update
406(2)
Secure Dynamic Update Process
408(2)
Security for DHCP Clients That Do Not Support the FQDN Option
410(1)
Aging and Scavenging of Stale Records
411(6)
Aging and Scavenging Parameters
412(2)
Record Life Span
414(2)
Server Behavior
416(1)
Configuring Scavenging Parameters
417(1)
Integration with WINS
417(6)
Format of WINS and WINS-R Resource Records
418(1)
Example of WINS Lookup
419(2)
Configuring WINS Lookup
421(1)
Advanced Parameters for WINS Lookups
422(1)
Interoperability with Other DNS Servers
423(10)
Dynamic Update and Secure Dynamic Update Considerations
423(1)
WINS Lookup Interoperability Considerations
424(1)
Using WINS Referral
425(2)
Zone Transfer Considerations
427(1)
Unicode Character Set Considerations
428(1)
Configuring Non-Windows 2000 DNS Servers to Support Active Directory
429(1)
Using Non-Microsoft DNS Servers to Support Active Directory
429(1)
Using the Name of a Delegated Zone as an Active Directory Domain Name
430(1)
Using the Existing Zone Name as the Active Directory Domain Name
431(2)
Internet Access Considerations
433(16)
Planning Your Namespace
433(2)
Namespace Planning Example
435(2)
Configuring the External Namespace
437(1)
Configuring the Internal Namespace
437(1)
Examples of Queries
438(1)
Query for a Name in the Internal Namespace
438(3)
Query for a Name in the External Namespace
441(3)
Query for a Name in the External Namespace of an Organization
444(3)
Query for a Name in the Namespace of the Merged Organization
447(2)
Troubleshooting
449(36)
Troubleshooting Tools
450(1)
Nslookup
450(4)
Using IPConfig
454(1)
Event Viewer
455(1)
DNS Log
456(1)
Stopping and Flushing the Cache
457(1)
Monitoring in the DNS Console
457(1)
Best Practices for Configuring and Administering DNS
458(1)
Verifying Your Basic DNS Configuration
459(1)
Verifying That Your DNS Server Can Answer Queries
460(1)
Verifying That the Forward Lookup Zone Is Properly Configured
460(1)
Testing for Reverse Lookup Zones and PTR Resource Records
461(1)
Verifying Your DNS Configuration After Installing Active Directory
462(2)
Diagnosing Name Resolution Problems
464(7)
Cannot Find Name or IP Address
471(1)
Incorrect Answer
472(1)
Checking the DNS Server for Problems
472(2)
Diagnosing Problems with Incorrect Authoritative Data
474(1)
Diagnosing Problems with Recursion
475(2)
Diagnosing Zone Transfer Problems
477(2)
Solving Other Common DNS Problems
479(5)
Solving Dynamic Update and Secure Dynamic Update Problems
484(1)
Troubleshooting Dynamic Update
484(1)
Troubleshooting Secure Dynamic Update
485(1)
Additional Resources
485(2)
Windows Internet Name Service
487(112)
WINS Overview
489(1)
New for Windows 2000
489(1)
Origins of WINS
490(5)
NetBIOS Legacy of WINS
492(1)
NetBIOS Name Resolution
492(2)
Broadcasts in NetBIOS Name Resolution
494(1)
LMHOSTS Files
494(1)
Continuing Need for WINS
495(1)
Microsoft WINS Clients
495(13)
How WINS Clients Register Their Names
497(2)
How WINS Clients Renew Their Names
499(1)
How WINS Clients Release Their Names
500(1)
How WINS Clients Resolve Names
501(2)
Client Conflicts Detected During Registration
503(1)
WINS Client Behavior
504(1)
Daily Startup
505(1)
Plugging Into a Different Subnet
505(1)
Prolonged Shutdowns
506(1)
Joining Two WINS Systems
506(1)
Best Practices for WINS Clients
506(1)
Configure Clients with a Full List of WINS Servers
507(1)
Use Nbtstat-RR to Manage Client Connectivity
507(1)
Client Configuration Practices
507(1)
Microsoft WINS Servers
508(13)
Overview of WINS Servers
508(2)
Registration of Group Names
510(1)
Normal Group Names
510(1)
Special Group Names
510(2)
Secondary WINS Servers
512(1)
Microsoft WINS Proxy
512(2)
Querying with a WINS Proxy Server
514(1)
Burst Handling
515(1)
How Burst Handling Works
516(1)
Configuring Burst Mode Support
516(1)
Clustering
517(1)
Best Practices for WINS Servers
518(1)
Use the Default Configuration
518(1)
Minimize the Number of WINS Servers
518(1)
Use High-Performance Disk Hardware
519(1)
Add Network Interface Hardware Carefully
519(1)
Configure Each Server to Point to Itself
519(1)
WINS Server Fault Tolerance
520(1)
Do Not Use Extended Characters
520(1)
Align the Lease and Refresh Periods for DHCP and WINS
521(1)
WINS Database
521(15)
Managing the WINS Server Database
521(1)
Backing Up the WINS Database
522(1)
Repairing a WINS Database
522(1)
Using Replication to Restore Data
523(1)
Compacting the WINS Database
524(1)
Scavenging the Database
525(2)
Consistency Checking
527(1)
WINS Database Files
528(1)
Timers
528(3)
Server Clocks
531(1)
Deletion of WINS Database Records
531(2)
Example of Record Registration and Extinction
533(1)
Manual Tombstoning
533(1)
Best Practices for WINS Databases
534(2)
WINS Replication
536(18)
Overview of the Replication Process
537(2)
WINS Server Push and Pull Partners
539(1)
Detailed Replication Example
539(2)
Small-Scale Replication Example
541(5)
Pulling WINS Database Entries by Version Number
546(2)
How Records Change and Update
548(1)
Conflicts Detected During Replication
549(2)
Persistent Connections
551(1)
Autodiscovery of WINS Partners
552(1)
Best Practices for WINS Replication
552(1)
Configure Push/Pull Replication Partners
553(1)
Use a Hub-and-Spoke Design for WINS Replication and Convergence
553(1)
Replication Across a Firewall
554(1)
Managing WINS Servers
554(10)
Viewing WINS Server Operational Status
555(3)
Configuring Server and Client Behavior
558(2)
Managing Static Address Mappings
560(1)
Managing Multihomed Servers
561(1)
Administering WINS Through a Firewall
562(1)
Best Practices for WINS Management Console
563(1)
Deploying Microsoft WINS Service
564(15)
WINS Configuration Examples
565(2)
Assessing Network Traffic
567(2)
Typical Network Traffic
569(1)
WINS Client Traffic on Routed Networks
570(1)
Traffic and Topology
570(1)
How Many Servers To Use
570(1)
Clients Per Server
570(1)
WINS Server Performance
571(1)
Configuring Replication
571(1)
Automatic Partner Configuration
571(1)
Replication Between Untrusted Domains
572(1)
Replication Across Wide Area Networks
572(2)
Replication Convergence Time
574(1)
Example of WINS Server Fault Tolerance
575(2)
Duplicate Replication Traffic
577(1)
Replication Partners and Network Configuration
578(1)
Decommissioning WINS
579(3)
Reconfigure Client Computers' Use of WINS
580(1)
Verify DNS Configuration
580(1)
Decommission WINS Servers
580(1)
Reducing and Redirecting WINS Traffic
581(1)
Interoperability
582(2)
Using DHCP with WINS
582(1)
Using DNS with WINS
583(1)
WINS Interoperability Options for DNS
583(1)
Best Practices
584(1)
Consolidate Subnets
584(1)
Update Older Clients
584(1)
Troubleshooting WINS
584(7)
Common problems
585(1)
Troubleshooting WINS Clients
586(2)
Troubleshooting WINS Servers
588(1)
Troubleshooting WINS Replication
589(2)
Server Troubleshooting Utilities
591(1)
Troubleshooting the WINS Server
591(1)
Resources
591(5)
NetBIOS Names
591(1)
NetBIOS Names Reference
591(2)
NetSheel Commands
593(3)
WINS Specifications (RFCs)
596(1)
Additional Resources
596(3)
Part 3 Network Security and Management
Internet Protocol Security
599(52)
Security Issues with IP
601(3)
Common Types of Network Attacks
601(1)
Eavesdropping
601(1)
Data Modification
601(1)
Identity Spoofing (IP Address Spoofing)
601(1)
Password-Based Attacks
602(1)
Denial-of-Service Attack
602(1)
Man-in-the-Middle Attack
603(1)
Compromised-Key Attack
603(1)
Sniffer Attack
603(1)
Application-Layer Attack
604(1)
Introducing IPSec
604(4)
In-Depth Defense
605(1)
Aggressive Protection Against Attacks
605(1)
Layer 3 Protection
606(1)
Policy-Based Security
607(1)
Simplified Deployment
607(1)
Services
608(6)
Security Properties
609(1)
Public Key Certificate-Based Authentication
610(1)
Pre-Shared Key Authentication
610(1)
Public Key Cryptography
611(1)
Integrity with Hash Functions
611(1)
Data Encryption: Confidentiality
612(1)
DES
612(1)
Key Management
613(1)
Dynamic Re-Keying
613(1)
Key Lengths
614(1)
Key Material Generation: The Diffie-Hellman Algorithm
614(1)
IPSec Protocol Types
614(4)
Authentication Header
614(2)
Packet Signature
616(1)
Encapsulating Security Payload
616(1)
Packet Signature and Encryption
617(1)
IPSec Components
618(10)
IPSec Policy Agent Service
618(1)
Internet Key Exchange
619(1)
What Is an SA?
620(1)
Phase I SA
620(1)
Phase II SA
621(1)
SA Lifetimes
622(1)
Key Protection
623(1)
Key Lifetimes
623(1)
Session Key Refresh Limit
623(1)
Diffie-Hellman Groups
624(1)
Perfect Forward Secrecy
624(1)
IPSec Driver
625(1)
IPSec Model
626(2)
Tunneling
628(1)
ESP Tunnel Mode
628(1)
AH Tunnel Mode
629(1)
IPSec Policy Structure
629(5)
Policy Inheritance
630(1)
Rules
630(1)
IP Packet Filtering
631(1)
Filters
631(1)
Filter Actions
632(1)
Connection Types
633(1)
Authentication
633(1)
IPSec Planning
634(6)
Best Practices
634(1)
Establishing an IPSec Security Plan
635(1)
Minimal Security
636(1)
Standard Security
636(1)
High Security
636(1)
Special IPSec Considerations
636(1)
IP Filter Lists
636(1)
Filter Actions
637(1)
Remote Access Communications
637(1)
SNMP
638(1)
Security Gateways
638(1)
DHCP, DNS, and WINS Services; Domain Controllers
638(1)
Predefined Configurations
639(1)
Client (Respond Only)
639(1)
Server (Request Security)
639(1)
Secure Server (Require Security)
639(1)
Predefined Rules
639(1)
Predefined Filter Actions
640(1)
Common IPSec Example
640(3)
Policies Required
642(1)
Troubleshooting
643(6)
General Troubleshooting
643(1)
Remote Communications Fail
643(1)
Intranet Communications Fail
643(1)
Other Causes of Failure
644(1)
Solving Basic IPSec Problems
644(1)
IPSec Policy Mismatch Error
644(1)
``Bad SPI'' Messages in Event Viewer
645(1)
Verifying IPSec Secured Communications
645(1)
Using Ping to Verify a Valid Network Connection
645(1)
Verifying Policy Has Been Assigned
646(1)
IPSec Monitoring Tool
646(1)
Only IPSec-Secured Communication Fails
647(1)
Broken Links in Policy Components
647(1)
Restarting the Policy Agent
648(1)
Reinstalling IPSec Components
648(1)
Additional Resources
649(2)
Quality of Service
651(70)
What is QoS?
653(5)
Windows 2000 QoS Components
654(2)
How QoS Works
656(2)
Invoking QoS
658(1)
Generic QoS API
658(1)
QoS Service Provider (RSVP SP, RSVP Service)
658(1)
Traffic Control
659(5)
Traffic Control Components
661(1)
Generic Packet Classifier (Msgpc.sys)
661(1)
QoS Packet Scheduler (Psched.sys)
661(1)
Packet Marking
662(1)
Traffic Service Levels
662(2)
Resource Reservation Protocol
664(15)
RSVP Messages
666(1)
Flowspecs and Filterspecs
667(1)
Filterspec
667(1)
Filter Styles
668(1)
Flowspec
668(2)
How RSVP Works
670(3)
RSVP Message Structures
673(6)
Windows 2000 QoS Support
679(6)
Signaled QoS Architecture
679(1)
Qualitative Applications
679(1)
Layer 2 Integration
680(1)
Differentiated Class of Service
681(2)
Integrated Services over Slow Links
683(1)
ATM
684(1)
Service Level Agreements
684(1)
Windows 2000 QoS Admission Control Service
685(6)
How QoS ACS Works
687(2)
Implementing the QoS ACS
689(2)
QoS Admission Control Policies
691(2)
Local Policy Module
691(1)
Security
692(1)
Policy Store
692(1)
Defining QoS ACS Policies
693(2)
Policy Hierarchy
693(1)
Enterprise-Level Policies
694(1)
Subnet-Level Policies
694(1)
Subnet Objects in the QoS ACS Console
695(1)
Troubleshooting
695(24)
Basic Troubleshooting
695(2)
Troubleshooting Methodology
697(3)
QoS ACS Logs
700(1)
Accounting Logs
701(1)
Accounting and Billing
702(1)
RSVP Logs
703(1)
RSVP Error Codes
704(4)
Tools
708(1)
PathPing
708(1)
Wdsbm
708(1)
Rsvptrace
709(2)
Netmon
711(1)
Rsping
712(1)
Tcmon
713(1)
System Monitor
714(1)
Qtcp
714(2)
Readpol
716(1)
Rsvpsm
717(1)
Qossp.aid, Rapilib.aid
717(1)
Ttcp
717(1)
Tracert
718(1)
Additional Resources
719(2)
Simple Network Management Protocol
721(226)
What is SNMP?
723(2)
Overview of SNMP
725(4)
Management Systems and Agents
725(2)
Management Information Base
727(1)
SNMP Messages
727(2)
Windows 2000 SNMP Agent Properties
729(1)
Security
730(5)
Traps
730(1)
Communities
731(2)
Configuring SNMP Security Options
733(1)
SNMP Event Translator
734(1)
Architecture of Windows 2000 SNMP
735(1)
Special Considerations in Implementing SNMP
736(3)
Changing SNMP Port Settings
737(1)
Securing SNMP Messages with IP Security
737(1)
Managing DHCP, Windows Internet Name Service, and Internet Authentication Service
738(1)
System Monitor Counters
738(1)
Managing DHCP
738(1)
Managing WINS
739(1)
Managing IAS
739(1)
SNMP Tools
739(1)
Registry Settings
740(1)
Troubleshooting SNMP
740(2)
Event Viewer
740(1)
WINS Service
741(1)
IPX Addresses
741(1)
SNMP Service Files
741(1)
Additional Resources
742(5)
Part 4 Appendixes
Appendix A OSI Model
747(12)
OSI Layers
749(1)
Physical Layer
749(1)
Data-Link Layer
750(1)
Network Layer
751(1)
Transport Layer
752(1)
Session Layer
753(1)
Presentation Layer
753(1)
Application Layer
754(1)
Data Flow in the OSI Model
754(2)
Vertical Interface Terminology in the OSI Model
756(3)
Appendix B Windows 2000 Network Architecture
759(56)
Overview of Windows 2000 Network Architecture
761(3)
Network Driver Interface Specification
764(2)
NDIS New Features
766(1)
Connection-Oriented NDIS
766(1)
Wake-On-LAN
766(1)
Media Sense
767(1)
Network Plug and Play
767(1)
TCP/IP Task Offload
767(2)
NDIS Driver Types
769(1)
Intermediate Drivers
769(1)
Miniport Drivers
770(4)
Network Protocols
774(1)
TCP/IP
775(1)
Large Window Support
775(1)
Selective Acknowledgments
775(1)
RTT Estimation
776(1)
IP Security
776(1)
Generic Quality of Service
776(1)
ATM
777(2)
NWLink
779(1)
NetBEUI
780(1)
AppleTalk
780(1)
DLC
780(1)
IrDA
781(1)
Transport Driver Interface
782(1)
Emulator Modules
783(1)
Network Application Programming Interfaces
783(1)
Winsock API
784(1)
Winsock Architecture
784(1)
Winsock Files
785(1)
Winsock 1.1 API
786(1)
Winsock 2.0 API
786(1)
Winsock 2.0 SPI Transport Service Providers
787(1)
Layered Service Provider Layer
787(1)
Winsock Helper DLLs
787(1)
Winsock 2.0 Name Resolution Providers
787(1)
Generic Quality of Service and Resource Reservation Protocol
787(5)
Telephony API
792(3)
NetBIOS API
795(1)
Messaging API
796(1)
WNet API
796(1)
Other Network APIs
796(1)
Interprocess Communication
797(1)
Distributed Component Object Model
798(1)
Advantages of Using DCOM
799(1)
Remote Procedure Call
799(3)
RPC Name Resolution
802(1)
Named Pipes and Mailslots
802(1)
Named Pipes
802(1)
Mailslots
803(1)
Common Internet File System
803(3)
Basic Network Services
806(1)
Server Service
807(1)
Workstation Service
808(1)
Windows 2000 Redirector
809(1)
Accessing a Remote File
810(1)
Network Resource Access
810(1)
Multiple Universal Naming Convention Provider
811(1)
Multi-Provider Router
812(1)
Additional Resources
813(2)
Appendix C TCP and UDP Port Assignments
815(12)
Port Assignments and Protocol Numbers
817(1)
Port Assignments for Well-Known Ports
817(4)
Port Assignments for Registered Ports
821(1)
Port Assignments for Commonly-Used Services
822(4)
Protocol Numbers
826(1)
Additional Resources
826(1)
Appendix D TCP/IP Remote Utilities
827(14)
Finger
829(1)
Ftp
829(3)
Rcp
832(1)
Remote Privileges
833(1)
Rhosts File
833(1)
Specifying Hosts
834(1)
Remote Processing
834(1)
Copying Files
834(1)
Rcp Syntax
835(1)
Rexec
835(1)
Using Rexec
836(1)
Using Redirection Symbols
836(1)
Using Interactive Commands
836(1)
Rsh
836(1)
Using Rsh
837(1)
Using Redirection Symbols
837(1)
Using Rsh on a Windows 2000 Server Domain
837(1)
Rhosts File
838(1)
Telnet
838(1)
Tftp
839(2)
Appendix E DHCP Options
841(36)
Basic Options (RFC 1497)
843(1)
Pad Option
843(1)
End Option
843(1)
Subnet Mask
844(1)
Time Offset
844(1)
Router
845(1)
Time Server
845(1)
IEN Name Server
845(1)
DNS Server
846(1)
Log Server
846(1)
Cookie Server
846(1)
LPR Server
847(1)
Impress Server
847(1)
Resource Location Server
847(1)
Host Name
848(1)
Boot File Size
848(1)
Merit Dump File
849(1)
DNS Domain Name
849(1)
Swap Server
849(1)
Root Path
850(1)
Extensions Path
850(1)
IP Host Options
850(1)
IP Forwarding Enable/Disable
851(1)
Nonlocal Source Routing Enable/Disable
851(1)
Policy Filter
851(1)
Maximum Datagram Reassembly Size
852(1)
Default IP Time-To-Live
852(1)
Path MTU Aging Time-out
852(1)
Path MTU Plateau Table
853(1)
IP Interface Options
853(1)
Interface MTU
853(1)
All Subnets Are Local
853(1)
Broadcast Address
854(1)
Perform Mask Discovery
854(1)
Mask Supplier
854(1)
Perform Router Discovery
855(1)
Router Solicitation Address
855(1)
Static Route
855(1)
Link Layer Options
856(1)
Trailer Encapsulation
856(1)
ARP Cache Time-Out
856(1)
Ethernet Encapsulation
856(1)
TCP Options
857(1)
TCP Default TTL
857(1)
TCP Keep-Alive Interval
857(1)
TCP Keep-Alive Garbage
857(1)
Application Layer Options
858(1)
NIS Domain Name
858(1)
NIS Servers
858(1)
NTP Servers
859(1)
X Window System Font Servers
859(1)
X Window System Display Manager Servers
859(1)
NIS+ Domain Name
860(1)
NIS+ Servers
860(1)
Mobile IP Home Agents
860(1)
NetBIOS over TCP/IP Options
861(1)
NetBIOS Name Server
861(1)
NetBIOS Datagram Distribution (NBDD) Server
861(1)
NetBIOS Node Type
861(1)
NetBIOS Scope ID
862(1)
Vendor-Specific Options
862(1)
Vendor-Specific Information
862(1)
Vendor Class Identifier
863(1)
User Class Options
864(1)
User Class Information
864(1)
DHCP Extensions
865(1)
Requested IP Address
865(1)
IP Address Lease Time
865(1)
Option Overload
866(1)
TFTP Server Name
866(1)
Boot File Name
867(1)
DHCP Message Type
867(1)
Server Identifier
867(1)
Parameter Request List
868(1)
Optional Message
868(1)
Maximum Message Size
869(1)
Renewal Time Value (T1)
869(1)
Rebinding Time Value (T2)
869(1)
Client Unique Identifier
870(1)
Options Not Defined
871(1)
Simple Mail Transport Protocol (SMTP) Server
871(1)
Post Office Protocol (POP3) Server
871(1)
Network News Transport Protocol (NNTP) Server
871(1)
Default World Wide Web Server
872(1)
Default Finger Server
872(1)
Default Internet Relay Chat Server
872(1)
StreetTalk Server
873(1)
StreetTalk Directory Assistance Server
873(1)
Microsoft Options
873(1)
Disable NetBIOS over TCP/IP (NetBT)
873(1)
Release DHCP Lease on Shutdown
874(1)
Default Router Metric Base
874(1)
Proxy Autodiscovery (Microsoft® Internet Explorer 5 Only)
875(2)
Chapter F DHCP Message Formats
877(6)
DHCP Messages
879(4)
Chapter G MIB Object Types
883(8)
Management Information Base
885(1)
Object Identifiers
885(1)
Windows 2000 SNMP Agent
886(3)
Additional Resources
889(2)
Appendix H LMHOSTS File
891(16)
Using the LMHOSTS File to Find Computers and Services
893(1)
Locating Remote Computers
894(1)
Specifying Domain Controllers
895(1)
Using Centralized LMHOSTS Files
896(1)
Creating the LMHOSTS File
896(1)
Creating Entries in the LMHOSTS File
897(3)
Adding Remote System Names by Using #PRE
900(1)
Adding Domain Controllers by Using #DOM
901(1)
Adding User-Defined Special Groups by Using #SG
902(1)
Adding Multihomed Devices by Using #MH
902(1)
Defining a Central LMHOST File by Using #INCLUDE
903(1)
Configuring TCP/IP to Use LMHOSTS Name Resolution
904(1)
Maintaining the LMHOSTS File
904(1)
Troubleshooting the LMHOSTS File
905(2)
Appendix I Windows 2000 Browser Service
907(40)
Introduction to the Browser Service
909(1)
Windows 2000 Browser System Overview
909(1)
Specifying Browser Computers
910(2)
Browser System Roles
912(1)
Non-Browser
913(1)
Potential Browser
913(1)
Backup Browser
913(1)
Master Browser
914(1)
Domain Master Browser
915(1)
Browser Elections
916(2)
Browser Announcements
918(2)
Non-Browser Announcements
920(1)
Potential-Browser Announcements
920(1)
Backup-Browser Announcements
920(1)
Browser Announcement Time Configuration
921(1)
Browser Requests
921(1)
Number of Browsers in a Domain or Workgroup
922(1)
Browser Shutdown or Failure
923(1)
Nonbrowser Failure
923(1)
Backup-Browser Failure
923(1)
Master-Browser Failure
924(1)
Domain Master Browser Failures
924(1)
Browse Service Across Multiple Workgroups and Domains
925(1)
Browse Service Across an IP Router
926(1)
Name Resolution
927(1)
Browse Service Across an IP Router with TCP/IP
928(1)
Domain Name System
928(1)
Windows Internet Name Service
928(1)
LMHOSTS File
929(1)
NetBIOS Name Service Broadcasts
930(1)
Computers Running Windows for Workgroups, Windows 95, and Windows 98 as Master Browsers
930(1)
Registration and Propagation
931(2)
Testing Techniques
933(1)
Monitoring Browsers
934(1)
Tracing a Problem
934(11)
Other Considerations
945(2)
Glossary 947(52)
Index 999

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program