Rights Contact Login For More Details
- Wiley
More About This Title Wiley Pathways Windows Network Administration, First Edition
- English
English
Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in Windows network administration.
Wherever you want to go, Windows Network Administration will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn fundamental Windows network administration concepts, it also helps you master the core competencies and skills you need to succeed in the classroom and in the real world. The book's brief, modular format and variety of built-in learning resources enable you to learn at your own pace and focus your studies.
With this book, you will be able to:
* Understand networking from the ground up
* Explore protocols and protocol suites, including TCP/IP, the most common protocol suite in use today
* Implement and administer WINS, DNS, and DHCP
* Troubleshoot name resolution and DHCP problems
* Manage network access with group polices and permissions
* Secure network communications with IPSec
* Configure and troubleshoot routing and remote access
* Master practical techniques you can use to fully support network users
* Learn time-saving techniques and best practices that all administrators should know
Wiley Pathways helps you achieve your goals
Not every student is on the same path, but every student wants to succeed. The Information Technology series in the new Wiley Pathways imprint helps you achieve your goals. The books in this series--Introduction to Databases, Introduction to Programming Using Visual Basic, Introduction to Operating Systems, Networking Basics, Windows Network Administration, Network Security Fundamentals, and PC Hardware Essentials--offer a coordinated information technology curriculum. Learn more at www.wiley.com/go/pathways
- English
English
Steve Suehring (Stevens Point, Wisconsin) is currently a Systems Engineer at CoreComm, a 350,000-user Internet Provider. In addition to his other responsibilities, Steve maintains authentication infrastructure using MySQL as the database backend. Steve has built numerous applications with both the Oracle and MySQL databases. He is a Microsoft Certified Systems Engineer, Cisco Certified Design Associate, and Cisco Certified Network Professional. Steve has also written articles for Linux Magazine.
James Chellis, MCT, MCSE, is CEO of Comcourse, Inc., an online learning provider that delivers information technology courses through career colleges nationwide.
Matt Sheltz is a software engineer and systems administrator for Comcourse, Inc. and has more than a decade of experience writing bestselling training books and developing educational technologies.
Brian Hill has been working with personal computers since the days of the Atari 600XL, and has been networking computers since the days of bulletin boards and 300 baud modems. He has authored several books on networking, Cisco routing, and Windows operating systems. Brian currently works at Microsoft providing solutions to complex networking problems for enterprise customers.
- English
English
1 Understanding Networks 1
Introduction 2
1.1 The Importance of the OSI Model 2
1.1.1 The OSI Model 2
1.1.2 Understanding Protocol Stacks 3
1.1.3 OSI Model Layers 3
1.1.4 Communication Between Stacks 12
Self-Check 14
1.2 Understanding Network Protocols 14
1.2.1 How Protocols Work 15
1.2.2 Examining Common Protocol Suites 18
Self-Check 22
1.3 Network Components and Classifications 22
1.3.1 Understanding Network Classifications 23
1.3.2 Examining Network Media 27
1.3.3 Examining Network Hardware 30
Self-Check 36
Summary 36
Key Terms 37
Summary Questions 38
Applying This Chapter 40
You Try It 41
2 The TCP/IP Suite 42
Introduction 43
2.1 Overview of TCP/IP 43
2.1.1 Understanding the Internet 43
2.1.2 TCP/IP Standards 45
2.1.3 The TCP/IP Reference Model 47
Self-Check 49
2.2 Understanding IP Addressing 49
2.2.1 Binary Numbering 49
2.2.2 IP Addresses 52
Self-Check 61
2.3 Understanding Routing 62
2.3.1 Understanding the Need for Routing 62
2.3.2 Understanding Static Routing 66
2.3.3 Understanding Dynamic Routing 67
Self-Check 68
2.4 TCP/IP Configuration 68
2.4.1 Basic TCP/IP Configuration 68
2.4.2 Advanced TCP/IP Configuration 73
2.4.3 Configuring Bindings 78
Self-Check 80
2.5 Basic TCP/IP Troubleshooting 80
2.5.1 Troubleshooting Methodology 80
2.5.2 TCP/IP Troubleshooting Tools 82
Self-Check 88
2.6 Monitoring TCP/IP Traffic 89
2.6.1 Understanding Network Monitor 89
2.6.2 Using Network Monitor 90
Self-Check 95
Summary 95
Key Terms 96
Summary Questions 98
Applying This Chapter 100
You Try It 102
3 Implementing and Administering WINS 103
Introduction 104
3.1 Understanding NetBIOS Naming 104
3.1.1 Understanding NetBIOS 104
3.1.2 Browsing 105
3.1.3 NetBIOS Name Resolution Methods 105
Self-Check 108
3.2 Understanding WINS 109
3.2.1 How WINS Works 109
3.2.2 Understanding WINS Replication 111
Self-Check 115
3.3 Configuring and Administering WINS 115
3.3.1 Basic WINS Configuration 115
3.3.2 Advanced WINS Configuration 121
3.3.3 Monitoring and Administering WINS 126
Self-Check 130
Summary 130
Key Terms 131
Summary Questions 132
Applying This Chapter 134
You Try It 135
4 Implementing and Administering DNS 136
Introduction 137
4.1 Understanding DNS 137
4.1.1 Understanding the Domain Name Space 138
4.1.2 Understanding DNS Resolution 140
4.1.3 Understanding the DNS Database 143
Self-Check 149
4.2 Configuring DNS 149
4.2.1 Basic DNS Configuration 149
4.2.2 Advanced DNS Configuration 154
Self-Check 161
4.3 Monitoring DNS 161
4.3.1 Monitoring Events 161
4.3.2 Using Debug Logs 164
Self-Check 166
Summary 166
Key Terms 167
Summary Questions 169
Applying This Chapter 172
You Try It 173
5 Troubleshooting Name Resolution 174
Introduction 175
5.1 Understanding Common Problems 175
5.1.1 Common NetBIOS Name Resolution Problems 175
5.1.2 Common DNS Resolution Problems 177
Self-Check 181
5.2 Troubleshooting using Command-Line Tools 181
5.2.1 Using ping, ipconfig, and nbstat 181
5.2.2 Using nslookup 184
Self-Check 190
5.3 Troubleshooting using Protocol Analyzers 190
5.3.1 Examining NetBIOS Name Resolution 191
5.3.2 Examining DNS Name Resolution 197
Self-Check 210
Summary 210
Key Terms 211
Summary Questions 212
Applying This Chapter 214
You Try It 215
6 Implementing and Administering DHCP 216
Introduction 217
6.1 Understanding DHCP 217
6.1.1 DHCP Overview 217
6.1.2 How DHCP Works 218
Self-Check 225
6.2 Configuring and Administering DHCP 226
6.2.1 Understanding DHCP Scopes 226
6.2.2 Installing DHCP 228
6.2.3 Basic DHCP Configuration 229
Self-Check 240
6.3 Advanced DHPC Configuration and Management 240
6.3.1 DDNS Integration 240
6.3.2 Building a Redundant DHCP Infrastructure 243
Self-Check 244
Summary 244
Key Terms 245
Summary Questions 246
Applying This Chapter 249
You Try It 250
7 Troubleshooting DHCP 251
Introduction 252
7.1 Understanding Common DHCP Problems 252
7.1.1 DHCP Server Configuration Problems 252
7.1.2 DHCP Router Configuration Problems 254
Self-Check 257
7.2 Advanced DHCP Monitoring, Management, and Troubleshooting 257
7.2.1 DHCP Monitoring 258
7.2.2 Advanced DHCP Management 262
7.2.3 Using Protocol Analyzers to Troubleshoot DHCP 263
Self-Check 270
Summary 270
Key Terms 271
Summary Questions 272
Applying This Chapter 274
You Try It 275
8 Managing Security 276
Introduction 277
8.1 Understanding Users and Groups 277
8.1.1 Overview of Active Directory 277
8.1.2 Understanding Users and Groups 280
Self-Check 282
8.2 Administering Users and Groups 282
8.2.1 Administering User Accounts 282
8.2.2 Administering Groups 299
Self-Check 306
8.3 Understanding and Administering Security Settings 306
8.3.1 Overview of Group Policy 307
8.3.2 Understanding and Administering Local Computer Policy 309
8.3.3 Understanding and Administering the Local Computer’s System Policies 314
Self-Check 321
Summary 322
Key Terms 324
Summary Questions 326
Applying This Chapter 328
You Try It 330
9 Managing Permissions 331
Introduction 332
9.1 Understanding Permissions and Shares 332
9.1.1 Understanding NTFS Permissions 332
9.1.2 Understanding Shares and Share Permissions 335
Self-Check 338
9.2 Administering Permissions and Shares 338
9.2.1 Administering Permissions 338
9.2.2 Administering Shares 344
Self-Check 349
Summary 349
Key Terms 351
Summary Questions 352
Applying This Chapter 354
You Try It 355
10 Administering Routing and Remote Access 356
Introduction 357
10.1 RRAS Overview 357
10.1.1 Understanding Dial-Up Networking 357
10.1.2 Understanding Virtual Private Networking 362
Self-Check 367
10.2 Configuring Routing 367
10.2.1 Enabling RRAS 368
10.2.2 Configuring IP Routing 369
Self-Check 380
10.3 Configuring Remote Access 380
10.3.1 General Configuration of the Remote Access Server 380
10.3.2 Configuring VPN Access 384
Self-Check 388
10.4 Remote Access Security 388
10.4.1 Configuring User Access 388
10.4.2 Understanding Remote Access Policies 390
10.4.3 Configuring Remote Access Policies 391
Self-Check 399
Summary 399
Key Terms 401
Summary Questions 402
Applying This Chapter 404
You Try It 406
11 Monitoring and Troubleshooting RRAS 407
Introduction 408
11.1 Monitoring RRAS 408
11.1.1 Configuring Monitoring 408
11.1.2 Examining Logs and Port Activity 412
Self-Check 413
11.2 Troubleshooting RRAS 414
11.2.1 Troubleshooting Static Routing 414
11.2.2 Troubleshooting Dial-Up Connectivity 415
11.2.3 Troubleshooting VPN Connectivity 417
Self-Check 418
Summary 418
Key Terms 419
Summary Questions 420
Applying This Chapter 421
You Try It 423
12 Configuring and Troubleshooting IPsec 424
Introduction 425
12.1 Understanding IPsec 425
12.1.1 IPsec Fundamentals 425
12.1.2 IPsec in Windows Server 2003 427
12.1.3 The IPsec Negotiation Process 428
12.1.4 Security Filters 430
12.1.5 Security Methods 431
12.1.6 Security Filter Actions 431
12.1.7 Security Policies 432
12.1.8 IPsec Authentication 433
Self-Check 435
12.2 Configuring IPsec Policies 435
12.2.1 Creating Local IPsec 435
12.2.2 Creating IPsec via Group Policy 436
12.2.3 Configuring IPsec Policies 439
12.2.4 Managing Filter Lists and Actions 444
Self-Check 451
12.3 Monitoring and Troubleshooting IPsec 451
12.3.1 Monitoring IPsec 451
12.3.2 Troubleshooting IPsec 458
Self-Check 460
Summary 460
Key Terms 462
Summary Questions 463
Applying This Chapter 465
You Try It 466
Glossary 467
Index 487