Showing posts with label Windows Server 2008 Network Infrastructure Configuring. Show all posts
Showing posts with label Windows Server 2008 Network Infrastructure Configuring. Show all posts

Sunday, October 14, 2012

Windows Server 2008 Network Infrastructure Configuring


IPSec Security Policies

IPSec Security Policies are rules and filters that provide a specified level of security. You can create your own policies, but Windows provides three built-in ones: Client (Respond Only). The client will use IPSec if requested but won’t initiate an … Continue reading 

Overview of IPSec

Security is a key part of any network. Companies need to protect their network from eavesdropping and tampering. Windows provides ACLs (Access Control Lists) which can be used to prevent access to data over the network. However, ACLs don’t protect … Continue reading 

DHCP on a Routed Network

Since DHCP uses broadcasts, and routers block broadcasts, clients on remote subnets may be unable to receive TCP/IP information from a DHCP Server. Clients will use Automatic Private IP Addressing (APIPA) if they are unable to locate a DHCP server. … Continue reading 

Configuring a DHCP Server

To access the DHCP server click Administrative Tools> DHCP.  To view DHCP server statistics, right-click on the server. Then select Display Statistics. The Server Statistics box shows general information about the DHCP server such as the number of Acknowledgements and … Continue reading 

Setting up a DHCP Scope

Access DHCP server click Start>Administrative Tools>DHCP. The green arrow next to the server indicates that the DHCP service is running. To create a new scope right-click on the server. Select New Scope. Click Next. Fill in Scope name and description, Click Next to continue. Next, specify … Continue reading 

Installing DHCP

To install DHCP using the Server Manager click on Start.  Select Server Manager. Or from the Quick Launch Taskbar. Select Roles.  Then Add Roles. Click Next to continue.  Select DHCP Server.  Click Next to continue. Then Click Next.   Select Network … Continue reading 

Introduction to DHCP

In large networks the task of assigning TCP/IP addresses can be troublesome. The administrator will have to manually give every machine an IP address and subnet mask, as well as additional information such as DNS and WINS server addresses. A … Continue reading 

Troubleshooting DNS

NSLOOKUP is an important utility that performs query testing and troubleshooting of DNS servers at the command prompt window. NSLOOKUP can be accessed by going to the command prompt window and typing in NSLOOKUP and pressing Enter. Use the buttons … Continue reading 

Configuring DNS Clients

Before the DNS server will be of any use, the clients on the network will need to be configured to use the server. To do this bring up the TCP/IP properties of your network adapter. In the Preferred DNS server … Continue reading 

Install and Configure DNS Server Core

To install DNS on 2008 Server Core. Type start /w ocsetup DNS-Server-Core-Role. Note the syntax of the command and the capitalisation as server roles must be in this format.Once the installation has completed, you need to attach to the server … Continue reading 

Windows Server 2008 Network Infrastructure Configuring


Windows Server 2008 Network Infrastructure, Configuring

Creating Inbound Filters

By default, Windows Firewall (as well as most other firewalls) blocks any inbound traffic that hasn’t been specifically allowed. By default, the Public profile allows absolutely no incoming connections—this provides excellent security when connecting to public hotspots or other non … Continue reading 

Windows Firewall

Windows Firewall filters incoming traffic to help block unwanted network traffic. Optionally, Windows Firewall can also filter outgoing traffic to help limit the risk of malware. Although Windows Firewall’s default settings will work well with components built into Windows, they … Continue reading 

Introduction to SUS

In order to maintain a secure network, it is critical to keep systems up to date with security patches. Since 1998, Microsoft has provided Windows Update as a Web-based source of information and downloads. With Windows XP and Windows 2000 … Continue reading 

Connect To Wireless Network

Users can manually connect to a wireless network, or you can use Group Policy settings to configure client computers to automatically connect to your wireless networks. Use the buttons below to navigate through the lesson Manual Connections To create a … Continue reading 

RADIUS Server

You can use a Windows Server 2008 computer to authenticate wireless users by configuring the Windows Server 2008 computer as a RADIUS server and configuring your wireless access points to send authentication requests to the RADIUS server. Use the buttons … Continue reading 

Authentication Protocols

A first step in establishing a remote access connection is authenticating the user to the server. An authentication protocol is used here. Windows Server 2008 ships with five different authentication protocols all with varying compatibility and security levels. Use the … Continue reading 

Remote Access Overview

Many people work away from their offices, so Windows Server 2008 provides the Routing and Remote Access Service, which lets users connect to their office machines.  The Routing and Remote Access Service (RRAS) allows a client to connect to the … Continue reading 

Wireless Networks

Wireless Networking Concepts Wireless networks have changed the way people use their computers. Organizations can instantly network an entire building—including meeting rooms, common areas, and courtyards. This can increase productivity and provide more flexible work spaces. For some buildings, including … Continue reading 

Network Address Translation

Before a Windows Server 2008 computer can function as a router, the Routing and Remote Access service must be enabled. This is done through the Server Manager console. Use the buttons below to navigate through the lesson Select Roles, then … Continue reading 

IPSec and Remote Access

Security is a major concern when using Remote Access since company data has be transferred over the internet. Using the tunnelling protocol L2TP (Layer 2 tunnelling protocol) a tunnel can be created through another network. Any data inside the tunnel … Continue reading