Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Designing a TCP/IP Network
Table 1.1: Supernetted Block of Addresses
Table 1.2: CIDR Routing Table Entry
Table 1.3: IPv6 Features Supported by Windows Server 2003 IPv6
Table 1.4: Server Applications Supported by Windows Server 2003 IPv6
Table 1.5: IPv4 and IPv6 Node Types
Table 1.6: Leading Zero Suppression and All-Zero Contiguous Block Compression
Table 1.7: Fields in a Unicast Global Address
Table 1.8: Examples of ISATAP addresses
Table 1.9: Fields in a Multicast Address
Table 1.10: Differences Between IPv4 Addressing and IPv6 Addressing
Chapter 2: Deploying DHCP
Table 2.1: Address Range and Clients per Subnet
Table 2.2: DHCP Address Pools per Subnet
Table 2.3: Example Address Reservations
Table 2.4: Scope Configurations on the DHCP Server at the Main Office
Table 2.5: Scope Configurations on the DHCP Server at the Branch Office
Table 2.6: Example DHCP Options
Chapter 3: Deploying DNS
Table 3.1: DNS Roles
Table 3.2: DNS Namespace Design Requirements
Table 3.3: Mixed Internal and External DNS Namespace Design Options
Table 3.4: Client Proxy Capabilities
Table 3.5: Feature Support in Different Implementations of DNS
Table 3.6: Internet DNS Domain Name Registration
Table 3.7: Character Set Restrictions
Table 3.8: Replication Options for Active Directory-Integrated Zone Data
Chapter 4: Deploying WINS
Table 4.1: NetBIOS Node Types
Chapter 5: Deploying ISA Server
Table 5.1: Determining the ISA Server Installation Mode
Table 5.2: Determining Which Clients to Deploy
Table 5.3: Hardware Requirements for Different Network Loads
Table 5.4: Hardware Requirements for Firewall
Table 5.5: Hardware Requirements for Forward Caching
Table 5.6: Hardware Requirements for Reverse Caching
Table 5.7: Comparing Features of ISA Server as a Stand-Alone Server or as an Array
Chapter 6: Deploying IPSec
Table 6.1: IPSec Security Solutions
Table 6.2: IPSec Transport Mode Uses
Table 6.3: IPSec Tunnel Mode Usage
Table 6.4: General IPSec Policy Settings
Table 6.5: Settings of IPSec Rules
Table 6.6: Equivalent Filters for NoDefaultExempt=0
Table 6.7: Choosing IPSec Protocol Types
Table 6.8: Choosing Authentication Methods
Chapter 7: Deploying IAS
Table 7.1: Comparison of Voluntary and Compulsory Tunneling
Table 7.2: Authentication Protocols That IAS Supports
Table 7.3: Selecting a Certificate Installation Method
Chapter 8: Deploying Dial-up and VPN Remote Access Servers
Table 8.1: Advantages and Constraints of the PPTP and L2TP/IPSec VPN Protocols
Table 8.2: Encryption Support Provided Under CHAP, MS-CHAP, and EAP-TLS
Table 8.3: Encryption Required at Each Encryption Level for PPTP and L2TP/IPSec Connections
Table 8.4: Certificate Infrastructures Required for Remote Access Client Authentication
Table 8.5: VPN Server Behind a Firewall: PPTP Filters on the Firewall's Internet Interface
Table 8.6: VPN Server Behind a Firewall: PPTP Filters on the Perimeter Network Interface
Table 8.7: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall's Internet Interface
Table 8.8: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall's Perimeter Network Interface
Table 8.9: VPN Server in Front of a Firewall: Packet Filters for PPTP
Table 8.10: VPN Server in Front of a Firewall: Packet Filters for L2TP/IPSec
Chapter 10: Connecting Remote Sites
Table 10.1: Comparing a PPTP Solution with an L2TP/IPSec Solution
Table 10.2: Using PPTP and L2TP/IPSec for Different VPN Connections on the Same Network
Table 10.3: Comparing On-Demand and Persistent Connections
Table 10.4: Comparing One-Way and Two-Way Initiated Connections
Table 10.5: Requirements for Using a Third-Party CA
Table 10.6: Choosing a Data Encryption Method
Table 10.7: Encryption Strength by Connection Type
Table 10.8: Example Configuration of Demand-Dial Interfaces and User Accounts for a Two-Way Initiated VPN Connection
Table 10.9: Example Configuration for a Dial-up One-Way Initiated Connection
Table 10.10: New Features for Dial-up or VPN Site-to-Site Connections Since Windows NT Server 4.0 RRAS
Table 10.11: Capacity Planning
Table 10.12: Hardware and Software Requirements for a Demand-Dial Router
Table 10.13: Enabling the Routing and Remote Access Service
Table 10.14: Configuring the Demand-Dial Interface for a Remote Site Connection
Table 10.15: Configuring an Additional Demand-Dial Interface for a Temporary Link to the ISP
Table 10.16: Creating a Common Remote Access Policy by Using the New Remote Access Policy Wizard
Table 10.17: Creating a Custom Remote Access Policy by Using the New Remote Access Policy Wizard
Table 10.18: Configuring the Static Route Dialog Box for a Site-to-Site Connection
Table 10.19: Using the Configure Device Dialog Box to Configure Ports
Chapter 11: Deploying a Wireless LAN
Table 11.1: Example IP Address Allocation for IP Subnet 172.16.50.0/24
Table 11.2: Support for Autoenrollment of Certificates Provided in Windows
Table 11.3: Adding a Remote Access Policy for Wireless Users
Previous page
Table of content
Next page
Microsoft Corporation Microsoft Windows Server 2003 Deployment Kit(c) Deploying Network Services 2003
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 146
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Distributed Data Warehouse for Geo-spatial Services
Development of Interactive Web Sites to Enhance Police/Community Relations
Metrics and Models in Software Quality Engineering (2nd Edition)
Total Quality Management
Relations Diagram
Implementation
Syntactic Constructs
Dos and Donts of Software Process Improvement
Java for RPG Programmers, 2nd Edition
The Java Onion
String Manipulation
An Object Orientation
User Interface
Appendix C Obtaining The Code Samples
Cisco CallManager Fundamentals (2nd Edition)
Summary
Media Processing Overview
Manageability Tools
Client Solutions
QSIG
Twisted Network Programming Essentials
Using Authentication with Perspective Broker
Downloading Messages from an IMAP Mailbox
Running a Basic NNTP Server
Using Public Keys for Authentication
Running a Twisted Application as a Daemon
Java Concurrency in Practice
Introduction
A (Very) Brief History of Concurrency
Designing a Thread-safe Class
Delegating Thread Safety
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies