1020

diegoapontes.files.wordpress.com · J.C. Mackin J.C. Mackin (MCSA, MCSE, MCT) is a writer , editor , consultant, and trainer whose books include the Internet Security and Acceleration

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

  • PUBLISHED BY

    Microsoft Press

    A Division of Microsoft Corporation

    One Microsoft Way

    Redmond, Washington 980526399

    Copyright © 2004 by Microsoft Corporation

    All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or

    by any means without the written permission of the publisher.

    Library of Congress CataloginginPublication Data Mackin, J. C. 

    MCSA/MCSE selfpaced training kit (exam 70291): implementing, managing, and maintaining a Microsoft Windows Server 2003 network infrastructure / J. C. Mackin, Ian McLean. 

    p.  cm. ISBN 0735614393 1.  Electronic  data  processing  personnelCertification. 

    study guides.  3.  Microsoft Windows server. A. II. Title. 

    QA76.3.M3225  2003 005.7'13769dc21 

    Printed and bound in the United States of America. 

    1  2  3  4 5 6 7 8 9  QWT  8  7  6  5  4  3 

    Distributed in Canada by H.B. Fenn and Company Ltd. 

    2.  Microsoft  softwareExaminations

    2003054026 

    A CIP catalogue record for this book is available from the British Library.

    Microsoft Press books are available through booksellers and distributors worldwide. For further informa

    tion about international editions, contact your local Microsoft Corporation office or contact Microsoft

    Press International directly at fax (425) 9367329. Visit our Web site at www.microsoft.com/mspress. Send

    comments  to  [email protected].

    Active Directory, Microsoft, Microsoft Press, the .NET logo, Visual Studio, Windows, the Windows logo,

    Windows Server, and Windows NT are either registered trademarks or trademarks of Microsoft Corpora

    tion in the United States and/or other countries. Other product and company names mentioned herein may

    be the trademarks of their respective owners.

    The example companies, organizations, products, domain names, email addresses, logos, people,

    places, and events depicted herein are fictitious. No association with any real company, organiza

    tion, product, domain name, email address, logo, person, place, or event is intended or should be

    inferred.

    Acquisitions Editor: Kathy Harding

    Project Editors: Valerie Woolley and Jean Trenary

    Technical Editor: Tony Northrup

    Body Part No. X0816603

  • J.C. Mackin J.C. Mackin (MCSA, MCSE, MCT) is a writer, editor, consultant, and trainer whose books include the Internet Security and Acceleration Server 2000 Training Kit. He holds a Master’s degree in Telecommunications and Network Management.

    Ian McLean Ian McLean (MCSE, MCDBA, MCT) has over 35 years experience in industry, commerce and education. He started his career as an electronics engineer before going into distance learning and then education as a university professor, and currently runs his own consultancy company. Ian has written 14 books plus many papers and technical articles. He has been working with networks since the early 1980s and with Microsoft net-work operating systems since 1997.

  • 1 12 23 34 45 56 67 78 89 9

    101112

    Contents at a Glance

    Part 1  Learn at Your Own Pace Understanding Windows Server 2003 Networks . . . . . . . . . . . . . . . . . . . -1 Understanding TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Monitoring and Troubleshooting TCP/IP Connections . . . . . . . . . . . . . . . -1 Configuring DNS Servers and Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Implementing a DNS Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Monitoring and Troubleshooting DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Configuring DHCP Servers and Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Monitoring and Troubleshooting DHCP. . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Routing with Windows Server 2003. . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1 Configuring and Managing Remote Access . . . . . . . . . . . . . . . . . . . . . .10-1 Managing Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-1 Maintaining a Network Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . .12-1

    Part 2 Prepare for the Exam 13 Implementing, Managing, and Maintaining IP Addressing (1.0) . . . . . .13-1 14 Implementing, Managing, and Maintaining Name Resolution (2.0) . . .14-1 15 Implementing, Managing, and Maintaining Network Security (3.0) . . .15-1 16 � Implementing, Managing, and Maintaining Routing

    And Remote Access (4.0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-1 17 Maintaining a Network Infrastructure (5.0) . . . . . . . . . . . . . . . . . . . . . .17-1

    v

  • vi Contents at a Glance

    Practices Working with Octet Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-18 Working with Subnet Masks and Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-37 Configuring TCP/IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-47 Using Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13 Running Network Diagnostics and Netdiag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-26 Capturing Name Resolution Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8 Installing a DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38 Configuring a Primary DNS Suffix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-55 Configuring a DNS Server to Perform Recursion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-56 Comparing NetBIOS and DNS Name Resolution Traffic . . . . . . . . . . . . . . . . . . . . . . . . .5-12 Verifying SRV Resource Records for Active Directory DNS . . . . . . . . . . . . . . . . . . . . . . .5-14 Deploying a Secondary DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-37 Creating a Zone Delegation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59 Deploying a Stub Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-71 Using DNS Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-12 Installing and Configuring a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15 Performing a Manual Backup of the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-37 Creating a New Superscope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-37 Analyzing DHCP Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14 Enabling and Configuring Routing And Remote Access . . . . . . . . . . . . . . . . . . . . . . . . .9-25 Configuring Demand-Dial Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-38 Installing and Configuring NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-48 Creating a Dial-Up Access Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-19 Deploying Remote Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43 Configuring a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-61 Deploying a RADIUS Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-78 Creating and Using the Security Configuration And Analysis Console . . . . . . . . . . . . 11-14 Using Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-51 Troubleshoot IPSec with IPSec Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-74 Troubleshoot Logon Issues with Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-77 Use Event Logs for Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-78 Sampling Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17 Verifying the Configuration of DNS Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28 Configuring Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-38

    Tables Table 1-1: Management and Monitoring Tools Subcomponents . . . . . . . . . . . . . . . . . .1-26 Table 1-2: Networking Service Subcomponents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-27 Table 1-3: Other Network File And Print Services Subcomponents . . . . . . . . . . . . . . . .1-28

  • Contents at a Glance vii

    Table 1-4: Certificate Services Subcomponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28 Table 2-1: Private Address Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8 Table 2-2: Potential Values in a Binary Octet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 Table 2-3: IP Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15 Table 2-4: Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17 Table 2-5: Class C Subnet Mask Options (Static) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35 Table 2-6: VLSM Subnet IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36 Table 3-1: Network Monitor Versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Table 3-2: Network Monitor Capture Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 Table 3-3: Netdiag Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 Table 4-1: Computer Names and Name Suffixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Table 4-2: Comparisons of NetBIOS and DNS Names. . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Table 4-3: Typical Resource Record Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33 Table 4-4: FQDNs of a Multihomed Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-48 Table 5-1: Zone Replication Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24 Table 5-2: Default DNS Installation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-44 Table 5-3: Name Checking Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-50 Table 6-1: Command-Line Options Available with Set. . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6 Table 6-2: DNS Performance Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26 Table 8-1: DHCP Header Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6 Table 8-2: DHCP Server Log Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22 Table 8-3: Log Event Codes 50 and Above . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23 Table 8-4: DHCP Database Corruption Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37 Table 9-1: Comparing Static and Dynamic Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-18 Table 9-2: Comparison of Translated Connections Features . . . . . . . . . . . . . . . . . . . . . 9-47 Table 10-1: Authentication Protocol Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-11 Table 10-2: Authentication Protocol Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12 Table 10-3: Encryption Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-32 Table 11-1: Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Table 11-2: Security Template Sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6 Table 11-3: Security Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7 Table 11-4: Secedit Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10 Table 11-5: Security Options for Improving Network Security . . . . . . . . . . . . . . . . . . . 11-12 Table 11-6: Netsh IPSec (Dynamic|Static) Show Commands. . . . . . . . . . . . . . . . . . . 11-33 Table 11-7: IPSec Main Mode Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-35 Table 11-8: IPSec Quick Mode Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-36 Table 11-9: Netcap Syntax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38 Table 12-1: Helpful Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6 Table 12-2: Repair Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25

  • viii Contents at a Glance

    Troubleshooting Labs Chapter 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61 Chapter 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-76 Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-30 Chapter 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-48 Chapter 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-40 Chapter 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-76 Chapter 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-83 Chapter 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-82

    Case Scenarios Exercises Chapter 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-30 Chapter 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-51 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31 Chapter 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60 Chapter 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-74 Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-29 Chapter 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-46 Chapter 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38 Chapter 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-77 Chapter 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-82 Chapter 12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-40

  • Contents

    About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxi Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi About the CD-ROM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Features of This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii

    Informational Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Keyboard Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi

    Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Hardware Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii Setup Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

    The Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . . . . . . . xviii Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix Requirements for Becoming a Microsoft Certified Professional . . . . . . . . . . . xxx 

    Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx Evaluation Edition Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi

    Part 1 Learn at Your Own Pace 1 Understanding Windows Server 2003 Networks 1-1

    Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1 Lesson 1: Understanding Network Infrastructures . . . . . . . . . . . . . . . . . . . . . . .1-3 

    Defining a Network Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3 Analyzing Windows Server 2003 Networks . . . . . . . . . . . . . . . . . . . . . . . . .1-6 Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11 Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-12 

    Lesson 2: Networking with Default Components in Windows Server 2003 . . . . .1-13 Viewing Network Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-13 Default Networking and Workgroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-20 Routing and Windows Server 2003 Network Infrastructure . . . . . . . . . . . . .1-20 Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-21 Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-22 

    Lesson 3: Extending a Windows Server 2003 Network Infrastructure . . . . . . . .1-23 Adding Components to a Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-23 Installing Windows Networking Components . . . . . . . . . . . . . . . . . . . . . . .1-25 Adding Active Directory to a Windows Infrastructure . . . . . . . . . . . . . . . . . .1-28 Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-28 

    ix

  • x Table of Contents

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-29 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-30 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-31 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-31 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-32 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-35 

    2 Understanding TCP/IP 2-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1 

    Lesson 1: Understanding TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 

    Exploring the Layers of the TCP/IP Model . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-5 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6 

    Lesson 2: Understanding IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7 

    Using Public IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7 

    Using Private IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7 

    Examining IP Addressing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8 

    Understanding the Structure of IP Addresses . . . . . . . . . . . . . . . . . . . . . . .2-9 

    Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-16 

    Understanding Default Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-18 

    Practice: Working with Octet Notations . . . . . . . . . . . . . . . . . . . . . . . . . . .2-18 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-19 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-20 

    Lesson 3: Subnetting and Supernetting IP Networks . . . . . . . . . . . . . . . . . . . .2-22 

    Understanding Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-22 

    Estimating Subnet Address Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-32 

    Summarizing Routes Through Supernetting . . . . . . . . . . . . . . . . . . . . . . . .2-32 

    Using Classless Interdomain Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-33 

    Using Variable-Length Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-34 

    Practice: Working with Subnet Masks and Subnets . . . . . . . . . . . . . . . . . .2-37 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-40 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-41 

    Lesson 4: Installing and Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . .2-42 

    Installing TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-42 

    Examining TCP/IP Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . .2-43 

    Practice: Configuring TCP/IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . .2-47 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-50 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-50 

  • Table of Contents xi

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-51 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-54 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-54 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-55 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-56 

    3 Monitoring and Troubleshooting TCP/IP Connections 3-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2 

    Lesson 1: Analyzing Traffic Using Network Monitor . . . . . . . . . . . . . . . . . . . . . .3-3 

    Understanding Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3 

    Exploring Network Monitor Components . . . . . . . . . . . . . . . . . . . . . . . . . . .3-4 

    How Network Monitor Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-6 

    Adding Parsers to Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-12 

    Practice: Using Network Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-17 

    Lesson 2: Troubleshooting TCP/IP Connections . . . . . . . . . . . . . . . . . . . . . . .3-19 

    Faulty TCP/IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-19 

    Network Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-20 

    Troubleshooting Connections Using Ping and PathPing . . . . . . . . . . . . . . . .3-23 

    Troubleshooting with Tracert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-25 

    Troubleshooting Using the ARP Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-26 

    Practice: Running Network Diagnostics and Netdiag. . . . . . . . . . . . . . . . . .3-26 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-30 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-35 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-36 

    4 Configuring DNS Servers and Clients 4-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2 

    Lesson 1: Understanding Name Resolution in Windows Server 2003 . . . . . . . . .4-3 

    Comparing DNS and NetBIOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3 

    Disabling NetBIOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7 

    Practice: Capturing Name Resolution Traffic . . . . . . . . . . . . . . . . . . . . . . . .4-8 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10 

  • xii Table of Contents

    Lesson 2: Understanding DNS in Windows Server 2003 Networks . . . . . . . . . .4-12 

    Exploring DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12 

    DNS Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14 

    Understanding How a DNS Query Works . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 

    Understanding How Caching Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25 

    Lesson 3: Deploying DNS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26 

    Installing the DNS Server Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26 

    Configuring a DNS Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27 

    Understanding Server Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29 

    Creating Resource Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31 

    Viewing and Clearing the DNS Server Cache . . . . . . . . . . . . . . . . . . . . . . .4-37 

    Practice: Installing a DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-42 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-43 

    Lesson 4: Configuring DNS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44 

    Configuring Client Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44 

    Configuring Dynamic Update Options . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-51 

    Default Client Update Behavior. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-52 

    Configuring TCP/IP Settings for DNS Clients . . . . . . . . . . . . . . . . . . . . . . .4-53 

    Viewing and Clearing the DNS Resolver Cache. . . . . . . . . . . . . . . . . . . . . .4-54 

    Practice 1: Configuring a Primary DNS Suffix . . . . . . . . . . . . . . . . . . . . . . .4-55 

    Practice 2: Configuring a DNS Server to Perform Recursion . . . . . . . . . . . .4-56 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-63 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-63 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-64 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-65 

    5 Implementing a DNS Infrastructure 5-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2 

    Lesson 1: Configuring DNS Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . .5-3 

    Exploring DNS Server Properties Tabs. . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3 

    Practice 1: Comparing NetBIOS and DNS Name Resolution Traffic. . . . . . . .5-12 

    Practice 2: Verifying SRV Resource Records for Active Directory in DNS. . . .5-14 

  • Table of Contents xiii

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-18 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-19 

    Lesson 2: Configuring Zone Properties and Transfers . . . . . . . . . . . . . . . . . . .5-20 

    Exploring DNS Zone Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-20 

    Practice: Deploying a Secondary DNS Server . . . . . . . . . . . . . . . . . . . . . . .5-37 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-40 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-42 

    Lesson 3: Configuring Advanced DNS Server Properties . . . . . . . . . . . . . . . . .5-43 

    Tuning Advanced Server Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-52 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-55 

    Lesson 4: Creating Zone Delegations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-56 

    Delegating Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-56 

    Creating a Zone Delegation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59 

    Practice: Creating a Zone Delegation . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-62 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-64 

    Lesson 5: Deploying Stub Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-65 

    Understanding Stub Zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-65 

    Benefits of Stub Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-66 

    When to Use Stub Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-66 

    Stub Zone Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-70 

    Practice: Deploying a Stub Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-71 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-72 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-73 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-74 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-76 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-78 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-78 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-79 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-80 

    6 Monitoring and Troubleshooting DNS 6-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1 

    Lesson 1: Using DNS Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3 

    Querying DNS with Nslookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3 

    Viewing the DNS Events Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9 

    DNS Debug Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-11 

    Practice: Using DNS Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . .6-12 

  • xiv Table of Contents

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-18 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19 

    Lesson 2: Using DNS Monitoring Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-20 

    Using Replication Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-20 

    Monitoring DNS Performance with System Monitor. . . . . . . . . . . . . . . . . . .6-24 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-27 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-28 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-29 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-30 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-32 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-32 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-33 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-34 

    7 Configuring DHCP Servers and Clients 7-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2 

    Lesson 1: Configuring the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-3 

    Benefits of DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-3 

    Installing the DHCP Server Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-4 

    Authorizing the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-5 

    Configuring Scopes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-6 

    Assigning DHCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11 

    Activating a Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-13 

    Configuring the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-13 

    Verifying the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15 

    Practice: Installing and Configuring a DHCP Server. . . . . . . . . . . . . . . . . . .7-15 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-20 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-21 

    Lesson 2: Managing DHCP in Windows Networks . . . . . . . . . . . . . . . . . . . . . .7-22 

    Changing DCHP Server Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-22 

    Managing DHCP from a Command Line. . . . . . . . . . . . . . . . . . . . . . . . . . .7-24 

    Connecting Clients to Remote DHCP Servers. . . . . . . . . . . . . . . . . . . . . . .7-26 

    Using Superscopes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-26 

    Changing the Addressing of a Subnet . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-30 

    Backing Up the DHCP Server Database. . . . . . . . . . . . . . . . . . . . . . . . . . .7-31 

    Manually Compacting a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-33 

    Using Options Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-34 

    Practice 1: Performing a Manual Backup of the DHCP Server . . . . . . . . . . .7-37 

    Practice 2: Creating a New Superscope. . . . . . . . . . . . . . . . . . . . . . . . . . .7-37 

  • Table of Contents xv

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-39 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-40 

    Lesson 3: Configuring DHCP Servers to Perform DNS Updates. . . . . . . . . . . . .7-41 

    Configuring Dynamic Updates with DHCP. . . . . . . . . . . . . . . . . . . . . . . . . .7-41 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-45 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-46 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-46 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-48 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-50 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-50 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-50 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-51 

    8 Monitoring and Troubleshooting DHCP 8-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2 

    Lesson 1: Analyzing DHCP Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-3 

    Understanding How Clients Obtain Configuration . . . . . . . . . . . . . . . . . . . . .8-3 

    Practice: Analyzing DHCP Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-18 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19 

    Lesson 2: Monitoring DHCP Through Audit Logging . . . . . . . . . . . . . . . . . . . . .8-20 

    Exploring DHCP Audit Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-20 

    Understanding DHCP Server Log File Format . . . . . . . . . . . . . . . . . . . . . . .8-22 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-25 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-26 

    Lesson 3: Troubleshooting DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27 

    Verifying the Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27 

    Verifying the Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-32 

    Reconciling the DHCP Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-34 

    Checking Event Viewer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-37 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-40 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-42 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-43 

  • xvi Table of Contents

    9 Routing with Windows Server 2003 9-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2 

    Lesson 1: Configuring Windows Server 2003 for LAN Routing . . . . . . . . . . . . . .9-3 

    Understanding Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3 

    Using Routing And Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4 

    Using the Routing And Remote Access Console. . . . . . . . . . . . . . . . . . . . . .9-5 

    Configuring Routing And Remote Access Service Properties . . . . . . . . . . . . .9-7 

    Managing General IP Routing Properties . . . . . . . . . . . . . . . . . . . . . . . . . .9-12 

    Working with Routing Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-14 

    Exploring LAN Routing Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-18 

    Understanding Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-20 

    Static Routing Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25 

    Practice: Enabling and Configuring Routing And Remote Access . . . . . . . . .9-25 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-26 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-27 

    Lesson 2: Configuring Demand-Dial Routing . . . . . . . . . . . . . . . . . . . . . . . . . .9-28 

    Configuring Demand-Dial Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-28 

    Deploying a Demand-Dial Router-to-Router Configuration . . . . . . . . . . . . . .9-36 

    Troubleshooting Demand-Dial Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-37 

    Practice: Configuring Demand-Dial Routing . . . . . . . . . . . . . . . . . . . . . . . .9-38 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-43 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-44 

    Lesson 3: Configuring NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-45 

    Understanding NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-45 

    Troubleshooting NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-48 

    Practice: Installing and Configuring NAT. . . . . . . . . . . . . . . . . . . . . . . . . . .9-48 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-54 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-56 

    Lesson 4: Configuring and Managing Routing Protocols . . . . . . . . . . . . . . . . . .9-57 

    Understanding Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-57 

    Configuring RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-58 

    OSPF Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-61 

    Understanding DHCP Relay Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-63 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-67 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-67 

    Lesson 5: Configuring Packet Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-68 

    Understanding Packet Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-68 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-73 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-74 

  • Table of Contents xvii

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-78 

    Key Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-78 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-79 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-80 

    10 Configuring and Managing Remote Access 10-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-2 

    Lesson 1: Configuring Remote Access Connections . . . . . . . . . . . . . . . . . . . .10-3 

    Using Dial-Up Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-3 

    Using Remote Access Client Addressing . . . . . . . . . . . . . . . . . . . . . . . . . .10-4 

    Configuring Remote Access Authentication . . . . . . . . . . . . . . . . . . . . . . . .10-7 

    Practice: Creating a Dial-Up Access Server . . . . . . . . . . . . . . . . . . . . . . .10-19 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-22 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-23 

    Lesson 2: Authorizing Remote Access Connections. . . . . . . . . . . . . . . . . . . .10-24 

    Configuring Dial-In Properties of the User Account . . . . . . . . . . . . . . . . . .10-24 

    Understanding Remote Access Policies. . . . . . . . . . . . . . . . . . . . . . . . . .10-27 

    Exploring Remote Access Authorization Scenarios . . . . . . . . . . . . . . . . . .10-34 

    Troubleshooting Dial-Up Remote Access Connections. . . . . . . . . . . . . . . .10-39 

    Configuring Access Beyond the Remote Access Server. . . . . . . . . . . . . . .10-40 

    Managing Remote Access Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-42 

    Practice: Deploying Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-43 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-47 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-48 

    Lesson 3: Implementing VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-49 

    Understanding Virtual Private Networks . . . . . . . . . . . . . . . . . . . . . . . . .10-49 

    Troubleshooting Remote Access VPNs . . . . . . . . . . . . . . . . . . . . . . . . . .10-55 

    Troubleshooting Router-to-Router VPNs . . . . . . . . . . . . . . . . . . . . . . . . . .10-55 

    Configuring VPN Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-56 

    Practice: Configuring a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-61 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-67 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-68 

    Lesson 4: Deploying the Internet Authentication Service . . . . . . . . . . . . . . . .10-69 

    Exploring RADIUS Server Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-69 

    Exploring RADIUS Proxy Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-72 

    Deploying IAS as a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-74 

    Practice: Deploying a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . .10-78 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-81 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-81 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-82 

  • xviii Table of Contents

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-83 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-84 

    Key Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-85 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-85 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-86 

    11 Managing Network Security 11-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2 

    Lesson 1: Implementing Secure Network Administration Procedures . . . . . . . .11-3 

    Introducing Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . .11-3 

    Using Security Templates to Administer Network Security . . . . . . . . . . . . . .11-4 

    Understanding Security Template Settings That

    Affect Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-12 

    Applying the Principle of Least Privilege. . . . . . . . . . . . . . . . . . . . . . . . . .11-13 

    Practice: Creating and Using the Security Configuration

    And Analysis Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-14 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-22 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-23 

    Lesson 2: Monitoring Network Protocol Security . . . . . . . . . . . . . . . . . . . . . .11-24 

    Understanding IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-24 

    Negotiation Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27 

    Negotiation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-28 

    Understanding Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-39 

    Practice: Using Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . .11-51 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-69 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-70 

    Lesson 3: Troubleshooting Network Protocol Security . . . . . . . . . . . . . . . . . .11-71 

    Problem 1: Making Your IPSec Policy Work . . . . . . . . . . . . . . . . . . . . . . .11-72 

    Problem 2: Determining Whether Your IPSec

    Blocking Rules Are Working . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-73 

    Problem 3: Determining Whether Kerberos Is Being

    Used for Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-74 

    Practice 1: Troubleshoot IPSec with IPSec Monitor . . . . . . . . . . . . . . . . . .11-74 

    Practice 2: Troubleshoot Logon Issues with Network Monitor . . . . . . . . . .11-77 

    Practice 3: Use Event Logs for Troubleshooting . . . . . . . . . . . . . . . . . . . .11-78 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-79 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-81 

    Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-82 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-87 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-87 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-88 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-89 

  • Table of Contents xix

    12 Maintaining a Network Infrastructure 12-1 Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-2 

    Lesson 1: Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . .12-3 

    Using the Networking Tab in Task Manager . . . . . . . . . . . . . . . . . . . . . . . .12-3 

    Performance Console Differences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-7 

    Monitoring Network Traffic with Netstat . . . . . . . . . . . . . . . . . . . . . . . . . .12-13 

    Windows Server 2003 “Lite” and “Full” Network Monitor Tools. . . . . . . . .12-16 

    Practice: Sampling Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-17 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-20 

    Lesson 2: Troubleshooting Internet Connectivity . . . . . . . . . . . . . . . . . . . . . .12-21 

    Identifying the Specific Networking Issue . . . . . . . . . . . . . . . . . . . . . . . .12-21 

    Verifying the Computer’s Network Settings . . . . . . . . . . . . . . . . . . . . . . .12-24 

    Bridging Multiple Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-26 

    Practice: Verifying the Configuration of DNS Forwarding . . . . . . . . . . . . . .12-28 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-28 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-30 

    Lesson 3: Troubleshooting Server Services . . . . . . . . . . . . . . . . . . . . . . . . .12-31 

    Diagnosing and Resolving Issues Related to Service Dependency. . . . . . .12-31 

    Using Service Recovery Options to Diagnose and

    Resolve Service-Related Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-33 

    Practice: Configuring Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-38 

    Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-39 

    Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-40 

    Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-40 

    Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-42 

    Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-42 

    Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-43 

    Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-44 

    Part 2 Prepare for the Exam 13 Implementing, Managing, and Maintaining IP Addressing (1.0) 13-1

    Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-2 

    Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-4 

    Objective 1.1: Configure TCP/IP Addressing on a Server Computer . . . . . . . . . .13-6 

    Objective 1.2: Manage DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-15 

    Objective 1.3: Troubleshoot TCP/IP Addressing . . . . . . . . . . . . . . . . . . . . . . .13-27 

    Objective 1.4: Troubleshoot DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-35 

  • xx Table of Contents

    14 Implementing, Managing, and Maintaining Name Resolution (2.0) 14-1 Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-2 

    Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-3 

    Objective 2.1: Install and Configure the DNS Server Service. . . . . . . . . . . . . . .14-5 

    Objective 2.2: Manage DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-17 

    Objective 2.3: Monitor DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-28 

    15 Implementing, Managing, and Maintaining Network Security (3.0) 15-1 Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-2 

    Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-4 

    Objective 3.1: Implement Secure Network Administration Procedures . . . . . . . .15-5 

    Objective 3.2: Install and Configure Software Update Infrastructure . . . . . . . .15-16 

    Objective 3.3: Monitor Network Protocol Security . . . . . . . . . . . . . . . . . . . . . .15-20 

    Objective 3.4: Troubleshoot Network Protocol Security . . . . . . . . . . . . . . . . . .15-29 

    16 Implementing, Managing, and Maintaining Routing And Remote Access (4.0) 16-1

    Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-2 

    Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-4 

    Objective 4.1: Configure Routing And Remote Access User Authentication. . . . .16-7 

    Objective 4.2: Manage Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-19 

    Objective 4.3: Manage TCP/IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-26 

    Objective 4.4: Provide Secure Access Between Private Networks . . . . . . . . . .16-33 

    Objective 4.5: Troubleshoot Client Access to Remote Access Services . . . . . .16-38 

    Objective 4.6: Troubleshoot Routing and Remote Access Routing . . . . . . . . . .16-44 

    17 Maintaining a Network Infrastructure (5.0) 17-1 Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-1 

    Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-3 

    Objective 5.1: Monitor Network Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-4 

    Objective 5.2: Troubleshoot Connectivity to the Internet . . . . . . . . . . . . . . . . .17-11 

    Objective 5.3: Troubleshoot Server Services . . . . . . . . . . . . . . . . . . . . . . . . .17-16 

    Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .G-1

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1

  • About This Book

    Welcome to MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Man-aging, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. This book prepares you for the 70-291 exam by teaching you how to configure, manage, and troubleshoot various aspects of a Microsoft Windows Server 2003 network infrastructure. Each chapter walks you through the hands-on deployment and management of these various aspects, including the network addressing, name resolution, routing, remote access, and security. After you read this book, answer the associated questions, and perform all of the exercises included, you will have gained a thorough understanding of the essential components supporting Windows Server 2003 networks.

    See Also For more information about becoming a Microsoft Certified Professional (MCM), see the section entitled “The Microsoft Certified Professional Program” later in this introduction.

    Intended Audience This book was developed for information technology (IT) professionals who plan to take the related Microsoft Certified Professional exam 70-291, as well as IT professionals who implement, administer, and support Windows Server 2003 networks.

    Note Exam skills are subject to change without prior notice and at the sole discretion of Microsoft.

    Prerequisites This training kit requires that students meet the following prerequisites:

    ■ 18 months professional experience working with Windows networks

    ■ Familiarity with networking concepts equivalent to that of a CompTIA Network+ certification

    About the CD-ROM This book includes a Supplemental CD-ROM. This CD-ROM contains a variety of informational aids to complement the book content:

    ■ An electronic version of this book (eBook). For information about using the eBook, see the section “The eBooks” later in this introduction.

    xxi

  • xxii About This Book

    ■ The Microsoft Press Readiness Review Suite, powered by Measure Up. This suite of practice tests and objective reviews contains questions of varying degrees of complexity and offers multiple testing modes. You can assess your understanging of the concepts presented in this book and use the results to develop a learning plan that meets your needs.

    ■ A Macromedia Flash introduction to Software Update Services (SUS).

    ■ An eBook of the Microsoft Encyclopedia of Networking, Second Edition, and of the Microsoft Encyclopedia of Security provide complete and up-to-date reference materials for networking and security.

    ■ Sample chapters from the following book titles give you additional information and introduce you to other resources that are available from Microsoft Press:

    ❑ Microsoft Windows Server 2003 Administrator’s Companion by Charlie Russel, Sharon Crawford, and Jason Gerend

    ❑ Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit

    ❑ Microsoft Windows Security Resource Kit

    ■ A 22-page white paper published June 2002, entitled “Software Update Services Overview.” This paper provides a good introduction to SUS but does not cover issues specific to Windows Server 2003.

    ■ A 95-page white paper published January 2003, entitled “Deploying Microsoft Software Update Services.” This paper provides in-depth information about implementing SUS on both Windows 2000 and Windows Server 2003 networks.

    Important Although deploying SUS is not listed among the objectives for exam 70-291, you may nevertheless see questions related to this topic on MCSE exams. It is therefore highly recommended that you review these papers and practice deploying SUS on a test net-work before taking exam 70-291.

    ■ SUS Server 1.0 with Service Pack 1 (SP1). 

    ■ Automatic Updates client (SUS Server 1.0 with Service Pack 1 (SP1).) 

    ■ SUS Server with SP1 Release Notes and Installation Instructions. 

    A second CD-ROM contains a 180-day evaluation edition of Microsoft Windows Server 2003, Enterprise Edition.

    Important The 180-day evaluation edition provided with this training kit is not the full retail product and is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support this evaluation edition.

  • About This Book xxiii

    For additional support information regarding this book and the supplemental CD-ROM (including answers to commonly asked questions about installation and use), visit the Microsoft Press Technical Support Web site at http://www.microsoft.com/mspress/support/. You can also e-mail [email protected] or send a letter to Microsoft Press, Attn: Microsoft Press Technical Support, One Microsoft Way, Redmond, WA 98052-6399.

    Features of This Book This book is divided into two parts. Use Part 1 to learn at your own pace and practice what you’ve learned with practical exercises. Part 2 contains questions and answers that you can use to test yourself on what you’ve learned.

    Part 1: Learn at Your Own Pace

    Each chapter in Part 1 identifies the exam objectives that are covered within the chapter, provides an overview of why the topics matter by identifying how the information applies in the real world, and lists any prerequisites that must be met to complete the lessons presented in the chapter.

    The chapters are divided into lessons. Lessons contain practices made up of one or more hands-on exercises. These exercises give you an opportunity to use the skills being presented or explore the part of the application being described. Each lesson also has a set of review questions to test your knowledge of the material covered in the lesson. The answers to the questions are found in the Questions and Answers section at the end of each chapter.

    After the lessons, you are given an opportunity to apply what you’ve learned in a case scenario exercise. In this exercise, you work through a multistep solution for a realistic case scenario. You are also given an opportunity to work through a troubleshooting lab that explores difficulties you might encounter when applying what you’ve learned in this book on the job.

    Each chapter ends with a summary of key concepts, as well as a short section listing key topics and terms you need to know before taking the exam, summarizing the key learnings with a focus on the exam.

    Real World: Helpful Information You will find sidebars like this one that contain related information you might find helpful. “Real World” sidebars contain specific information gained through the experience of IT professionals like you.

  • 1-xxiv Chapter # Chapter Title

    Part 2: Prepare for the Exam

    Part 2 helps to familiarize you with the types of questions that you will encounter onthe MCP exam. By reviewing the objectives and the sample questions you can focus onthe specific skills that you need to improve before taking the exam.

    See Also For a complete list of MCP exams and their related objectives, go to http://www.microsoft.com/traincert/mcp.

    Part 2 is organized by the exam’s objectives. Each chapter covers one of the primarygroups of objectives, called Objective Domains. Each chapter lists the tested skills youneed to master to answer the exam questions and includes a list of further readings tohelp you improve your ability to perform the tasks or skills specified by the objectives.

    Within each Objective Domain, you will find the related objectives that are covered onthe exam. Each objective provides you with several practice exam questions. Theanswers are accompanied by explanations of each correct and incorrect answer.

    Note These questions are also available on the companion CD-ROM as a practice test.

    Informational Notes

    The following types of reader aids appear throughout the training kit:

    Tip Contains methods of performing a task more quickly or in a not-so-obvious way.

    Important Contains information that is essential to completing a task.

    Note Contains supplemental information.

    Caution Contains valuable information about possible loss of data; be sure to read this information carefully.

    Warning Contains critical information about possible physical injury; be sure to read this information carefully.

    xxiv About This Book

  • About This Book xxv

    Planning Contains hints and useful information that should help you plan an implementation.

    Security Alert Highlights information you need to know to maximize security in your work environment.

    Exam Tip Flags information you should know before taking the certification exam. !

    Off the Record Contains practical advice about the real-world implications of information presented in the lesson.

    Notational Conventions

    The following conventions are used throughout this book.

    ■ Characters or commands that you type appear in bold type.

    ■ Italic in syntax statements indicates placeholders for variable information. Italic is also used for book titles, URLs, and key words and terms when they are first introduced.

    ■ Names of files and folders appear in Title caps, except when you are to type them directly. Unless otherwise indicated, you can use all lowercase letters when you type a filename in a dialog box or at a command prompt.

    ■ Filename extensions appear in all lowercase.

    ■ Acronyms appear in all uppercase.

    ■ Monospace type represents code samples, examples of screen text, or entries that you might type at a command prompt or in initialization files.

    ■ Square brackets [ ] are used in syntax statements to enclose optional items. For example, [filename] in command syntax indicates that you can choose to type a filename with the command. Type only the information within the brackets, not the brackets themselves.

    ■ Braces { } are used in syntax statements to enclose required items. Type only the information within the braces, not the braces themselves.

  • xxvi About This Book

    Keyboard Conventions

    ■ A plus sign (+) between two key names means that you must press those keys at the same time. For example, “Press Alt+Tab” means that you hold down Alt while you press Tab.

    ■ A comma (,) between two or more key names means that you must press each of the keys consecutively, not together. For example, “Press Alt, F, X” means that you press and release each key in sequence. “Press Alt+W, L” means that you first press Alt and W at the same time, and then release them and press L.

    Getting Started This training kit contains hands-on exercises to help you learn about deploying, man-aging, and troubleshooting a network infrastructure. Use this section to prepare your self-paced training environment.

    To complete some of these procedures, you must have two networked computers and a means of connecting both computers to the Internet. Both computers must also be capable of running Windows Server 2003.

    Caution Many of these exercises require you to configure settings that will affect addressing and other features your network. For this reason, it is not recommended that you perform these exercises on computers that are connected to a larger network.

    Hardware Requirements

    Each computer must have the following minimum configuration. All hardware should be on the Microsoft Windows Server 2003 Hardware Compatibility List.

    ■ Minimum 133 MHz in the Intel Pentium/Celeron family or the AMD K6/Athlon/ Duron family

    ■ 128 MB memory

    ■ 2 GB available hard disk space

    ■ Display monitor capable of 800 x 600 resolution or higher.

    ■ CD-ROM drive or DVD drive

    ■ Microsoft Mouse or compatible pointing device

  • About This Book xxvii

    Software Requirements

    The following software is required to complete the procedures in this training kit.

    ■ Windows Server 2003, Enterprise Edition (A 180-day evaluation edition of Windows Server 2003, Enterprise Edition is included on the CD-ROM.)

    Caution The 180-day evaluation edition provided with this training kit is not the full retail product and is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support this evaluation edition. For additional support information regarding this book and the CD-ROMs (including answers to commonly asked questions about installation and use), visit the Microsoft Press Technical Support Web site at http://mspress.microsoft.com /mspress/support/. You can also e-mail [email protected] or send a letter to Microsoft Press, Attn: Microsoft Press Technical Support, One Microsoft Way, Redmond, WA 98052-6399.

    Setup Instructions

    Set up your computer according to the manufacturer’s instructions.

    For the exercises that require networked computers, you need to make sure the computers can communicate with each other. Once the computers are physically net-worked, install Windows Server 2003 on each computer. Use the following table during installation to help you configure each computer when the Windows Setup Wizard is run:

    Setting for First Setting for Second Windows Setup Wizard Page Computer Computer

    Regional And Language Options

    Personalize Your Software

    Your Product Key

    Licensing Modes

    Computer Name And Administrator Password

    Default (English). 

    Type your name and

    organization. 

    Type the product key pro

    vided with the Windows

    Server 2003 CD-ROM. 

    Default. 

    Computer Name: 

    Computer1 

    Administrator Password:

    [Type a strong password of

    your choice.] 

    Default (English). 

    Type your name and

    organization. 

    Type the product key pro

    vided with the Windows

    Server 2003 CD-ROM. 

    Default. 

    Computer Name: 

    Computer2 

    Administrator Password:

    [Type a strong password of

    your choice, preferably dis

    tinct from that of the first

    computer.] 

  • xxviii About This Book

    Setting for First Windows Setup Wizard Page Computer Computer

    Setting for Second

    Modem Dialing Information Default. Default.

    Date And Time Settings Your date, time, and time Your date, time, and time zone. zone.

    Networking Settings Default (Typical Settings). Default (Typical Settings).

    Workgroup Or Computer Default (workgroup named Default (workgroup named Domain WORKGROUP). WORKGROUP).

    Caution In general, you should not perform these configurations on computers that are part of a larger network. However, if you do, you must verify with your network administrator that the addresses, computer names, domain name, and other settings used do not conflict with network operations.

    The Microsoft Press Readiness Review Suite, Powered by Measure Up

    The CD-ROM includes a practice test made up of 300 sample exam questions. Use the practice test to reinforce your learning and identify areas in which you need to gain more experience before taking the exam.

    � To install the practice test and object review, complete the following steps:

    1. Insert the Supplemental CD-ROM into your CD-ROM drive.

    Note If AutoRun is disabled on your machine, refer to the Readme.txt file on the CD-ROM.

    2. Click Readiness Review Suite on the User Interface menu and follow the prompts.

    The eBooks

    The CD-ROM includes an electronic version of this book that you can view on screen using Adobe Acrobat Reader. For more information, see the Readme.txt file included in the root folder of the Supplemental CD-ROM.

    The Microsoft Certified Professional Program The Microsoft Certified Professional (MCP) program provides the best method to prove your command of current Microsoft products and technologies. The exams and corresponding certifications are developed to validate your mastery of critical competencies as you design and develop, or implement and support, solutions with Microsoft products and technologies. Computer professionals who become Microsoft certified are rec-

  • About This Book xxix

    ognized as experts and are sought after industrywide. Certification brings a variety of benefits to the individual and to employers and organizations.

    See Also For a full list of MCP benefits, go to http://www.Microsoft.com/traincert/start /itpro.asp.

    Certifications

    The Microsoft Certified Professional program offers multiple certifications based on specific areas of technical expertise:

    ■ Microsoft Certified Professional (MCP). Individuals with demonstrated in-depth knowledge of at least one Microsoft Windows operating system or architecturally significant platform. An MCP is qualified to implement a Microsoft product or technology as part of a business solution for an organization.

    ■ Microsoft Certified Solution Developer (MCSD). Professional developers qualified to analyze, design, and develop enterprise business solutions with Microsoft development tools and technologies, including the Microsoft .NET Framework.

    ■ Microsoft Certified Application Developer (MCAD). Professional developers qualified to develop, test, deploy, and maintain powerful applications using Microsoft tools and technologies, including Microsoft Visual Studio .NET and XML Web services.

    ■ Microsoft Certified Systems Engineer (MCSE). Individuals qualified to analyze business requirements and design and implement the infrastructure for business solutions based on the Microsoft Windows and Microsoft Windows Server 2003 operating systems.

    ■ Microsoft Certified Systems Administrator (MCSA). Individuals with the skills to manage and troubleshoot existing network and system environments based on the Microsoft Windows and Microsoft Windows Server 2003 operating systems.

    ■ Microsoft Certified Database Administrator (MCDBA). Individuals qualified to design, implement, and administer Microsoft SQL Server databases.

    ■ Microsoft Certified Trainer (MCT). Individuals who are instructionally and technically qualified to deliver Microsoft Official Curriculum through a Microsoft Certified Technical Education Center (CTEC).

  • xxx About This Book

    Requirements for Becoming a Microsoft Certified Professional

    The certification requirements differ for each certification and are specific to the products and job functions addressed by the certification.

    To become a Microsoft Certified Professional, you must pass rigorous certification exams that provide a valid and reliable measure of technical proficiency and expertise. These exams are designed to test your expertise and ability to perform a role or task with a product, and are developed with the input of professionals in the industry. Questions on the exams reflect how Microsoft products are used in actual organizations, giving them real-world relevance.

    ■ Microsoft Certified Product (MCP) candidates are required to pass one current Microsoft certification exam. Candidates can pass additional Microsoft certification exams to further qualify their skills with other Microsoft products, development tools, or desktop applications.

    ■ Microsoft Certified Solution Developers (MCSDs) are required to pass three core exams and one elective exam. (MCSDs for Microsoft .NET candidates are required to pass four core exams and one elective.)

    ■ Microsoft Certified Application Developers (MCADs) are required to pass two core exams and one elective exam in an area of specialization.

    ■ Microsoft Certified Systems Engineers (MCSEs) are required to pass five core exams and two elective exams.

    ■ Microsoft Certified Systems Administrators (MCSAs) are required to pass three core exams and one elective exam that provide a valid and reliable measure of technical proficiency and expertise.

    ■ Microsoft Certified Database Administrators (MCDBAs) are required to pass three core exams and one elective exam that provide a valid and reliable measure of technical proficiency and expertise.

    ■ Microsoft Certified Trainers (MCTs) are required to meet instructional and technical requirements specific to each Microsoft Official Curriculum course they are certified to deliver. The MCT program requires ongoing training to meet the requirements for the annual renewal of certification. For more information about becoming a Microsoft Certified Trainer, visit http://www.microsoft.com/traincert /mcp/mct or contact a regional service center near you.

  • About This Book xxxi

    Technical Support Every effort has been made to ensure the accuracy of this book and the contents of the companion CD-ROM. If you have comments, questions, or ideas regarding this book or the companion CD-ROM, please send them to Microsoft Press using either of the following methods:

    E-mail: [email protected]

    Postal mail: Microsoft Press Attn: MCSE Self-Paced Training Kit (Exam 70-291): Series Editor One Microsoft Way Redmond, WA 98052-6399

    For additional support information regarding this book and the CD-ROM (including answers to commonly asked questions about installation and use), visit the Microsoft Press Technical Support Web site at http://www.microsoft.com/mspress/support/. To connect directly to the Microsoft Press Knowledge Base and enter a query, visit http:// www.microsoft.com/mspress/support/search.asp. For support information regarding Microsoft software, please connect to http://support.microsoft.com.

    Evaluation Edition Software Support The 180-day evaluation edition provided with this training kit is not the full retail product and is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support this evaluation edition.

    Caution The evaluation edition of Microsoft Windows Server 2003, Enterprise Edition included with this book should not be used on a primary work computer. The evaluation edi tion is unsupported. For online support information relating to the full version of Microsoft Windows Server 2003, Enterprise Edition that might also apply to the evaluation edition, you can connect to http://support.microsoft.com.

    Information about any issues relating to the use of this evaluation edition with this training kit is posted to the Support section of the Microsoft Press Web site (http: //www.microsoft.com/mspress/support/). For information about ordering the full version of any Microsoft software, please call Microsoft Sales at (800) 426-9400 or visit http://www.microsoft.com.

  • Part 1 Learn at Your Own Pace �

  • 1  Understanding Windows Server 2003 Networks

    Exam Objectives in this Chapter:

    ■ Diagnose and resolve issues related to Automatic Private IP Addressing (APIPA)

    Why This Chapter Matters Familiarity with the components of a network infrastructure is an essential prerequisite for working as a system administrator. Because the network infrastructure elements presented in this chapter are likely to mirror those in any office net-work; it is therefore imperative that you understand these components, how they interoperate, and the contexts in which they are used.

    Examples abound. First, without properly understanding the name resolution differences between Windows NT and Windows Server 2003 domains, you won’t be able to troubleshoot related problems efficiently in a mixed network environment. You also need to understand how addressing relates to network infrastructure; for example, if you notice an APIPA address on a computer, you need to understand the implications of this address for your physical topology and then be able to troubleshoot accordingly. Finally, this chapter matters because, as a network administrator, you need to know how to add services, protocols, and clients to network connections; to change the binding order of connections, protocols, and network providers; and to recognize low-level differences between workgroups and domains.

    Lessons in this Chapter:

    ■ Lesson 1: Understanding Network Infrastructures . . . . . . . . . . . . . . . . . . . . . .1-3

    ■ Lesson 2: Networking with Default Components in Windows Server 2003 . . .1-13

    ■ Lesson 3: Extending a Windows Server 2003 Network Infrastructure . . . . . . .1-23

    Before You Begin

    To complete this chapter, you must have

    ■ Physically networked two computers.

    ■} Performed a Windows Server 2003 installation with default settings on both computers. The computers should be named Computer1 and Computer2. (See the

    1-1

  • 1-2 Chapter 1 Understanding Windows Server 2003 Networks

    About This Book section f