List of Tables


Chapter 1: Designing a TCP/IP Network

Table 1.1: Supernetted Block of Addresses
Table 1.2: CIDR Routing Table Entry
Table 1.3: IPv6 Features Supported by Windows Server 2003 IPv6
Table 1.4: Server Applications Supported by Windows Server 2003 IPv6
Table 1.5: IPv4 and IPv6 Node Types
Table 1.6: Leading Zero Suppression and All-Zero Contiguous Block Compression
Table 1.7: Fields in a Unicast Global Address
Table 1.8: Examples of ISATAP addresses
Table 1.9: Fields in a Multicast Address
Table 1.10: Differences Between IPv4 Addressing and IPv6 Addressing

Chapter 2: Deploying DHCP

Table 2.1: Address Range and Clients per Subnet
Table 2.2: DHCP Address Pools per Subnet
Table 2.3: Example Address Reservations
Table 2.4: Scope Configurations on the DHCP Server at the Main Office
Table 2.5: Scope Configurations on the DHCP Server at the Branch Office
Table 2.6: Example DHCP Options

Chapter 3: Deploying DNS

Table 3.1: DNS Roles
Table 3.2: DNS Namespace Design Requirements
Table 3.3: Mixed Internal and External DNS Namespace Design Options
Table 3.4: Client Proxy Capabilities
Table 3.5: Feature Support in Different Implementations of DNS
Table 3.6: Internet DNS Domain Name Registration
Table 3.7: Character Set Restrictions
Table 3.8: Replication Options for Active Directory-Integrated Zone Data

Chapter 4: Deploying WINS

Table 4.1: NetBIOS Node Types

Chapter 5: Deploying ISA Server

Table 5.1: Determining the ISA Server Installation Mode
Table 5.2: Determining Which Clients to Deploy
Table 5.3: Hardware Requirements for Different Network Loads
Table 5.4: Hardware Requirements for Firewall
Table 5.5: Hardware Requirements for Forward Caching
Table 5.6: Hardware Requirements for Reverse Caching
Table 5.7: Comparing Features of ISA Server as a Stand-Alone Server or as an Array

Chapter 6: Deploying IPSec

Table 6.1: IPSec Security Solutions
Table 6.2: IPSec Transport Mode Uses
Table 6.3: IPSec Tunnel Mode Usage
Table 6.4: General IPSec Policy Settings
Table 6.5: Settings of IPSec Rules
Table 6.6: Equivalent Filters for NoDefaultExempt=0
Table 6.7: Choosing IPSec Protocol Types
Table 6.8: Choosing Authentication Methods

Chapter 7: Deploying IAS

Table 7.1: Comparison of Voluntary and Compulsory Tunneling
Table 7.2: Authentication Protocols That IAS Supports
Table 7.3: Selecting a Certificate Installation Method

Chapter 8: Deploying Dial-up and VPN Remote Access Servers

Table 8.1: Advantages and Constraints of the PPTP and L2TP/IPSec VPN Protocols
Table 8.2: Encryption Support Provided Under CHAP, MS-CHAP, and EAP-TLS
Table 8.3: Encryption Required at Each Encryption Level for PPTP and L2TP/IPSec Connections
Table 8.4: Certificate Infrastructures Required for Remote Access Client Authentication
Table 8.5: VPN Server Behind a Firewall: PPTP Filters on the Firewall's Internet Interface
Table 8.6: VPN Server Behind a Firewall: PPTP Filters on the Perimeter Network Interface
Table 8.7: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall's Internet Interface
Table 8.8: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall's Perimeter Network Interface
Table 8.9: VPN Server in Front of a Firewall: Packet Filters for PPTP
Table 8.10: VPN Server in Front of a Firewall: Packet Filters for L2TP/IPSec

Chapter 10: Connecting Remote Sites

Table 10.1: Comparing a PPTP Solution with an L2TP/IPSec Solution
Table 10.2: Using PPTP and L2TP/IPSec for Different VPN Connections on the Same Network
Table 10.3: Comparing On-Demand and Persistent Connections
Table 10.4: Comparing One-Way and Two-Way Initiated Connections
Table 10.5: Requirements for Using a Third-Party CA
Table 10.6: Choosing a Data Encryption Method
Table 10.7: Encryption Strength by Connection Type
Table 10.8: Example Configuration of Demand-Dial Interfaces and User Accounts for a Two-Way Initiated VPN Connection
Table 10.9: Example Configuration for a Dial-up One-Way Initiated Connection
Table 10.10: New Features for Dial-up or VPN Site-to-Site Connections Since Windows NT Server 4.0 RRAS
Table 10.11: Capacity Planning
Table 10.12: Hardware and Software Requirements for a Demand-Dial Router
Table 10.13: Enabling the Routing and Remote Access Service
Table 10.14: Configuring the Demand-Dial Interface for a Remote Site Connection
Table 10.15: Configuring an Additional Demand-Dial Interface for a Temporary Link to the ISP
Table 10.16: Creating a Common Remote Access Policy by Using the New Remote Access Policy Wizard
Table 10.17: Creating a Custom Remote Access Policy by Using the New Remote Access Policy Wizard
Table 10.18: Configuring the Static Route Dialog Box for a Site-to-Site Connection
Table 10.19: Using the Configure Device Dialog Box to Configure Ports

Chapter 11: Deploying a Wireless LAN

Table 11.1: Example IP Address Allocation for IP Subnet 172.16.50.0/24
Table 11.2: Support for Autoenrollment of Certificates Provided in Windows
Table 11.3: Adding a Remote Access Policy for Wireless Users




Microsoft Corporation Microsoft Windows Server 2003 Deployment Kit(c) Deploying Network Services 2003
Microsoft Corporation Microsoft Windows Server 2003 Deployment Kit(c) Deploying Network Services 2003
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net