List of Figures


Chapter 1: Using Windows Server 2003 Planning Tools and Documentation

Figure 1.1: Selecting the RSoP Report Mode
Figure 1.2: Specifying the User and Computer Information
Figure 1.3: Advanced Simulation Options
Figure 1.4: Simulating User Security Group Membership
Figure 1.5: Selecting WMI Filters
Figure 1.6: RSoP Summary Screen
Figure 1.7: A Completed RSoP Simulation
Figure 1.8: A Departmental Organizational Chart
Figure 1.9: A Centralized Organizational Structure
Figure 1.10: A Combination of Centralization and Decentralization
Figure 1.11: Assigning Tasks in Microsoft Outlook 2002
Figure 1.12: A Microsoft SharePoint Project Collaboration Web Page
Figure 1.13: Printer Pools and Prioritized Queues
Figure 1.14: Organizational Structure
Figure 1.15: Network Portion

Chapter 2: Planning Server Roles and Server Security

Figure 2.1: The Main Manage Your Server Window
Figure 2.2: Preliminary Steps of the Configure Your Server Wizard
Figure 2.3: Configuring Server Roles
Figure 2.4: Name Resolution Using DNS
Figure 2.5: Installing IIS through the Application Server Dialog Box in the Windows Components Wizard
Figure 2.6: How E-mail Is Transmitted and Retrieved
Figure 2.7: Choosing a CA Type in the Windows Components Wizard
Figure 2.8: Entering CA Identifying Information in the Windows Components Wizard
Figure 2.9: Choosing Certificate Database Settings in the Windows Components Wizard
Figure 2.10: Choose the Application Server Role
Figure 2.11: Select Application Server Options
Figure 2.12: Review the Summary of Selections
Figure 2.13: Raising the Domain Functional Level
Figure 2.14: Attempting to Change a Domain Functional Level After Raising the Functional Level
Figure 2.15: Using Active Directory Domains and Trusts
Figure 2.16: Initial Information Provided by the Security Configuration and Analysis Tool
Figure 2.17: Configured Policies in the Group Policy Object Editor
Figure 2.18: Opening an Existing Database or Creating a New One
Figure 2.19: Importing a Template
Figure 2.20: Entering the Analysis Log File Path
Figure 2.21: Viewing the Results of a Security Analysis
Figure 2.22: Exporting a Template
Figure 2.23: Viewing Group Policy Properties of a Domain
Figure 2.24: Selecting a Group Policy
Figure 2.25: Group Policy Object Editor
Figure 2.26: Viewing Minimum Password Length Properties
Figure 2.27: Choosing Automatic Updates Options
Figure 2.28: Setting Permissions for a Printer
Figure 2.29: The Security Templates console
Figure 2.30: Setting Maximum Password Age Properties
Figure 2.31: Adding a New Security Template

Chapter 3: Planning, Implementing, and Maintaining the TCP/IP Infrastructure

Figure 3.1: Local Area Connection Status
Figure 3.2: Local Area Connection Properties
Figure 3.3: Internet Protocol (TCP/IP) Properties
Figure 3.4: Internet Protocol (TCP/IP) Properties after Manual Configuration
Figure 3.5: Advanced TCP/IP Settings
Figure 3.6: OSI Model versus TCP/IP model
Figure 3.7: TCP/IP Protocol Suite and the TCP/IP Network Model
Figure 3.8: Results of the route print Command
Figure 3.9: IP City
Figure 3.10: Network ID and Host ID
Figure 3.11: Local Area Connection Status
Figure 3.12: Local Area Connection Properties
Figure 3.13: Select Network Component Type
Figure 3.14: Select Network Protocol
Figure 3.15: Local Area Connection Properties with TCP/IP Version 6 Installed
Figure 3.16: Test the IPv6 Configuration
Figure 3.17: IPv6 Pilot Page at Microsoft Research
Figure 3.18: ipconfig Results after Installing IPv6
Figure 3.19: Network Monitor
Figure 3.20: System Monitor

Chapter 4: Planning, Implementing, and Maintaining a Routing Strategy

Figure 4.1: Viewing the Routing Table from the Command Prompt
Figure 4.2: IP Routing Table
Figure 4.3: Simple Network Using Static Routing
Figure 4.4: A More Complex Network Using Dynamic Routing
Figure 4.5: Internet Protocol (TCP/IP) Properties
Figure 4.6: The IP Settings Tab of the Advanced TCP/IP Settings
Figure 4.7: Enter the Gateway Address
Figure 4.8: RIP Version 1 Message Format
Figure 4.9: RIP Version 2 Message Format
Figure 4.10: Typical Network Using Convergence
Figure 4.11: The OSPF Packet Header Structure
Figure 4.12: An Internal Router
Figure 4.13: An Area Border Router
Figure 4.14: Type ? at the netsh Command Prompt to View Available Commands
Figure 4.15: Type netsh show helper at the Command Prompt to View Available DLLs
Figure 4.16: The Physical and Data Link Layers
Figure 4.17: This Network Requires Network Layer Addressing
Figure 4.18: Transparent Bridge
Figure 4.19: Translating Bridge
Figure 4.20: Speed-buffering Bridge
Figure 4.21: Segment Switching
Figure 4.22: A Port-switched LAN
Figure 4.23: Routing and Remote Access Welcome
Figure 4.24: Add a Server
Figure 4.25: Click Configure and Enable Routing and Remote Access
Figure 4.26: The RRAS Setup Wizard
Figure 4.27: Choose Custom Configuration
Figure 4.28: Choose the LAN Routing Option
Figure 4.29: Finish the RRAS Setup Wizard
Figure 4.30: Start the Routing and Remote Access Service
Figure 4.31: Routing and Remote Access Window after RRAS Installation
Figure 4.32: Choose Your Interface
Figure 4.33: Add a New Routing Protocol
Figure 4.34: Choose RIP Version 2 for Internet Protocol
Figure 4.35: Choose RIP Properties
Figure 4.36: The General Tab of the RIP Properties
Figure 4.37: The Security Tab of the RIP Properties
Figure 4.38: Add a New Routing Protocol
Figure 4.39: Choose Open Shortest Path First (OSPF)
Figure 4.40: A Perimeter Network or DMZ
Figure 4.41: Choose New Demand-dial Interface
Figure 4.42: Choose an Appropriate Interface Name
Figure 4.43: RRAS Has Already Been Turned On
Figure 4.44: Choose Remote Access
Figure 4.45: Choose the Interface Connected to the Internet
Figure 4.46: Choose Secure Connection between Two Private Networks
Figure 4.47: Set the Logging Level

Chapter 5: Planning, Implementing, and Maintaining an Internet Connectivity Strategy

Figure 5.1: Select NAT from the RRAS Wizard
Figure 5.2: The IP Properties for an RRAS Server
Figure 5.3: NAT Properties
Figure 5.4: The Advanced Internet Provider Properties
Figure 5.5: The Network Services That Internet Users Can Access
Figure 5.6: Service Settings
Figure 5.7: Communications in an Internet-based VPN
Figure 5.8: Completing the Routing and Remote Access Server Setup Wizard
Figure 5.9: Enter a Name for the Demand-Dial Interface
Figure 5.10: Choose Protocols and Security Options
Figure 5.11: Security Properties
Figure 5.12: Add a RADIUS Server
Figure 5.13: The IAS Management Console
Figure 5.14: Authentication Methods
Figure 5.15: Installing CMAK
Figure 5.16: Specify a Service Name and Filename
Figure 5.17: Specify VPN Support
Figure 5.18: Ready to Build the Service Profile

Chapter 6: Planning, Implementing, and Maintaining a Name Resolution Strategy

Figure 6.1: Output of the ipconfig /displaydns Command Showing the Contents of the DNS Cache
Figure 6.2: Hierarchical DNS Namespace
Figure 6.3: Zones versus Domains
Figure 6.4: DNS Server Issuing Iterative Queries to Resolve an IP Address on Behalf of a DNS Client
Figure 6.5: An Active Directory Forest with Two Domain Trees
Figure 6.6: Deployment of a Private Root Zone
Figure 6.7: Configuring a Notify List for Zone Transfers
Figure 6.8: Changing Replication Scope for Windows Server 2003 Active Directory-integrated Zones
Figure 6.9: Creating the application directory partition using the DNS console
Figure 6.10: Conditional Forwarding Configured to Send Queries Directly to an Authoritative Server
Figure 6.11: Conditional Forwarding for the corp.tacteam.net Domain
Figure 6.12: Default DHCP Configuration for Dynamic DNS Updates
Figure 6.13: Configuring Credentials for DHCP Updates to Dynamic Zones
Figure 6.14: Aging and Scavenging Settings for a DNS Server
Figure 6.15: Enabling Fast Zone Transfers for BIND Secondaries
Figure 6.16: Split DNS Configuration to Allow Internal Clients to Connect to the Web Server in the DMZ
Figure 6.17: WINS tab for a DNS Forward Zone Showing Advanced Configuration Options
Figure 6.18: The WINS-R Tab for a DNS Reverse Lookup Zone Showing Advanced Configuration Options
Figure 6.19: DNS Client Suffix Search List Configured to Support WINS Referral Zones
Figure 6.20: Configuring a Primary Zone with a List of Secondaries Authorized to Do Zone Transfers
Figure 6.21: Performing Simple and Recursive Queries Using the Monitoring Tab of the DNS Server Properties
Figure 6.22: Debug Logging Properties
Figure 6.23: DNS Performance Counters
Figure 6.24: Enabling Automatic Partner Configuration
Figure 6.25: Push Replication Settings
Figure 6.26: Manually Starting Push Notification
Figure 6.27: Choosing Replication Partnership Type and Push/Pull Settings
Figure 6.28: Ring Replication Model for WINS Servers
Figure 6.29: Hub-and-Spoke Replication Model for WINS Servers
Figure 6.30: Hybrid Replication Model
Figure 6.31: Configuring Static Entries to Be Overwritten
Figure 6.32: Advanced TCP/IP Settings for WINS Client Configuration
Figure 6.33: DHCP Options for WINS Client Configurations
Figure 6.34: Configuring Burst Handling
Figure 6.35: Interval Settings for Registration Renewal, Removal, and Verification
Figure 6.36: Enabling and Scheduling Consistency Checking
Figure 6.37: WINS Backup Configuration

Chapter 7: Planning, Implementing, and Maintaining a Remote Access Strategy

Figure 7.1: Multilink Options
Figure 7.2: Listing the Domain’s Users and Groups
Figure 7.3: Dial-in Properties
Figure 7.4: Certificates MMC Snap-In
Figure 7.5: Certificate Friendly Name and Description
Figure 7.6: Firewall Configurations
Figure 7.7: Access Method
Figure 7.8: Domain Properties
Figure 7.9: Raising the Functional Level
Figure 7.10: Security Properties
Figure 7.11: Authentication Methods
Figure 7.12: Remote Access Policies
Figure 7.13: Policy Configuration Method
Figure 7.14: User or Group Access
Figure 7.15: Access Method
Figure 7.16: Select Groups
Figure 7.17: Policy Properties
Figure 7.18: Select Attribute
Figure 7.19: Time of Day Constraints
Figure 7.20: Restricting by Authentication Method
Figure 7.21: Edit Dial-in Profile
Figure 7.22: Encryption Properties
Figure 7.23: IP Settings
Figure 7.24: Summary of Remote Assistance Invitations
Figure 7.25: The Remote Assistance Settings Dialog Box
Figure 7.26: The “Pick how you want to contact your assistant” Screen in Remote Assistance
Figure 7.27: The Remote Assistance Utility on the Expert’s Computer
Figure 7.28: The Remote Assistance Utility on the Novice’s Computer
Figure 7.29: The “View or change your invitation settings” Screen in Remote Assistance
Figure 7.30: The System Properties Window

Chapter 8: Planning, Implementing, and Maintaining a High-Availability Strategy

Figure 8.1: Starting Disk Defragmenter
Figure 8.2: Starting the Performance Administrative Tool
Figure 8.3: System Monitor, Graphical View with Default Counters
Figure 8.4: System Monitor, Report View with Default Counters
Figure 8.5: Performance Logs and Alerts, Accessed from Computer Management
Figure 8.6: The Sample System Overview Counter Log
Figure 8.7: Properties of the System Overview Sample Log
Figure 8.8: Properties of the System Overview Sample Log, Log Files Tab
Figure 8.9: Configuring Log Files
Figure 8.10: Properties of the System Overview Sample Log, Schedule Tab
Figure 8.11: Selecting the View Log Data Button
Figure 8.12: System Monitor Properties, Source Tab
Figure 8.13: System Monitor, Viewing Log File Data
Figure 8.14: Selecting Counters from Another Computer
Figure 8.15: Viewing a Counter Explanation
Figure 8.16: Empty System Monitor
Figure 8.17: Add Counters
Figure 8.18: Percentage-based Counters in System Monitor
Figure 8.19: All Common Counters in System Monitor
Figure 8.20: Common Nonpercentage Counters
Figure 8.21: The Event Viewer Window
Figure 8.22: Event Viewer, as Viewed from Computer Management
Figure 8.23: Viewing Event Properties
Figure 8.24: Accessing the Properties of an Event Log
Figure 8.25: Filtering Event Log Data
Figure 8.26: Using Find in an Event Log
Figure 8.27: Finding Event Log Data
Figure 8.28: Event Log General Properties
Figure 8.29: Saving a Log File, Selection Menu
Figure 8.30: Saving a Log File
Figure 8.31: Opening an Archived Log File
Figure 8.32: Selecting an Archived Event Log
Figure 8.33: Detailed User Rights, Accessed from Local Security Policy
Figure 8.34: Full (Normal) Backup Pattern
Figure 8.35: Full (Normal) Backup/Incremental Backup Pattern
Figure 8.36: Full (Normal) Backup/Differential Backup Pattern
Figure 8.37: Disabling Volume Shadow Copy for a Backup
Figure 8.38: Configuring the WINS Backup Path
Figure 8.39: The Backup or Restore Wizard
Figure 8.40: The Windows Backup Utility, Advanced Mode
Figure 8.41: Scheduling Backups with the Backup Utility
Figure 8.42: Choosing the Restore Source Media
Figure 8.43: The Restore Options
Figure 8.44: Select Backup Files and Settings
Figure 8.45: Select to Choose What to Back Up
Figure 8.46: Choose Items to Back Up
Figure 8.47: Selecting a Destination for the Backup
Figure 8.48: Choose Advanced to Specify Backup Options
Figure 8.49: Select the Backup Type
Figure 8.50: How to Back Up Options
Figure 8.51: Select Backup Options
Figure 8.52: Specify When to Back Up
Figure 8.53: Schedule a Weekly Backup Job
Figure 8.54: Set Account Information.
Figure 8.55: View Scheduled Backups in Advanced Mode
Figure 8.56: Starting the ASR Wizard
Figure 8.57: The ASR Preparation Wizard, Choose a Destination
Figure 8.58: Creating the ASR Diskette
Figure 8.59: No Floppy Drive Warning
Figure 8.60: ASR Diskette Warning Message
Figure 8.61: Text-Mode ASR Prompt
Figure 8.62: Insert the ASR Diskette Prompt
Figure 8.63: RAID 0
Figure 8.64: RAID 1
Figure 8.65: RAID 1 Duplexing Variation
Figure 8.66: RAID 5
Figure 8.67: RAID 0+1

Chapter 9: Implementing Windows Cluster Services and Network Load Balancing

Figure 9.1: Single Node Server Cluster
Figure 9.2: Single Quorum Device Server Cluster
Figure 9.3: A Majority Node Set Server Cluster
Figure 9.4: Setting the Possible Owners Property
Figure 9.5: N-Node Failover, Initial State
Figure 9.6: N-Node Failover, Failed State
Figure 9.7: Setting the Preferred Owners Property
Figure 9.8: Hot-Standby/N+I Configuration, Initial State
Figure 9.9: Hot Standby/N+I Configuration, Failed State
Figure 9.10: Failover Ring Configuration, Initial State
Figure 9.11: Failover Ring Configuration, Failed State
Figure 9.12: Random Configuration, Initial State
Figure 9.13: Random Configuration, Failed State
Figure 9.14: The Cluster Administrator Window
Figure 9.15: The Open Connection Dialog Box
Figure 9.16: Cluster.exe Command Options
Figure 9.17: Accessing Disk Drive Properties in Device Manager
Figure 9.18: Disabling Write Caching on a Drive through Device Manager
Figure 9.19: Configuring Clustered Disks in Disk Management
Figure 9.20: Enabling the Always On Power Scheme
Figure 9.21: Configuring Interconnect Networks
Figure 9.22: Configuring Public Networks
Figure 9.23: Configuring an Interconnect Interface
Figure 9.24: Setting the Network Priority Property of the Cluster
Figure 9.25: Setting the Proper Binding Order of Interfaces
Figure 9.26: Create a New Cluster Service User Account
Figure 9.27: Assign a Password and Properties to New Cluster Service User Account
Figure 9.28: Open Connection to Cluster
Figure 9.29: The New Server Cluster Wizard’s Welcome Window
Figure 9.30: Specify the Cluster Name and Domain
Figure 9.31: Select the Computer Name
Figure 9.32: Analyzing the Configuration of the Cluster Node
Figure 9.33: Finished Analyzing the Configuration of the Cluster Node
Figure 9.34: Enter the Cluster IP Address
Figure 9.35: Enter the Cluster Service Account Information
Figure 9.36: Review the Proposed Cluster Configuration
Figure 9.37: Select the Quorum Disk
Figure 9.38: Creating the Cluster
Figure 9.39: Completed Cluster Creation
Figure 9.40: The Wizard’s Final Window
Figure 9.41: The Newly Created Cluster
Figure 9.42: Change Network Priorities
Figure 9.43: Combining Network Load Balancing and Server Clustering into a Front-end/Back-end Architecture
Figure 9.44: Starting NLB Manager for the First Time
Figure 9.45: Output of the NLB.exe/? Command
Figure 9.46: Starting an NLB Manager Log
Figure 9.47: Enabling the NLB Manager Log
Figure 9.48: Configuring a Network Adapter with Multiple IP Addresses
Figure 9.49: NLB Dedicated IP Address Configuration
Figure 9.50: Create a New NLB Cluster
Figure 9.51: Configure Cluster Parameters
Figure 9.52: Select Multicast Cluster Operation Mode
Figure 9.53: Select IGMP Multicast with the Cluster Operation Mode
Figure 9.54: IGMP Warning Message
Figure 9.55: Cluster IP Addresses Window
Figure 9.56: The Port Rules Window
Figure 9.57: The Add/Edit Port Rule Dialog Box
Figure 9.58: Connect to an NLB Node
Figure 9.59: DHCP Warning Message
Figure 9.60: Configure Host Parameters
Figure 9.61: The Configured NLB Cluster
Figure 9.62: View NLB Manager Log Entry Details
Figure 9.63: Configured NLB Cluster Details
Figure 9.64: Configured Port Rules on Cluster Node

Chapter 10: Planning, Implementing, and Maintaining Internet Protocol Security

Figure 10.1: How the SA Process Functions
Figure 10.2: The IPSec Tunnel Mode
Figure 10.3: The Effects of the ESP Header in Tunnel Mode
Figure 10.4: AH Using Transport Mode
Figure 10.5: ESP Used with AH Transport Mode
Figure 10.6: Add the IP Security Policy Management Console to the MMC
Figure 10.7: Select the Computer or Domain to Manage
Figure 10.8: The Newly Created IP Security Policy Management Console
Figure 10.9: The Three Standard IPSec Policies in the IP Security Policy Management Console
Figure 10.10: Creating a Custom IPSec Policy
Figure 10.11: The IP Security Policy Wizard.
Figure 10.12: Enter a IP Security Policy Name
Figure 10.13: Specify How the Policy Will Respond to Secure Communication Requests
Figure 10.14: Select the Default Rule Authentication Method
Figure 10.15: Completing the IP Security Policy Wizard
Figure 10.16: IP Security Policy Properties
Figure 10.17: Edit the IP Security Policy Security Methods
Figure 10.18: Edit the IP Security Policy Authentication Methods
Figure 10.19: Assign the Newly Created IP Security Policy

Chapter 11: Planning, Implementing, and Maintaining a Security Framework

Figure 11.1: Process between LAN Port Roles
Figure 11.2: Enabling Object Access Auditing
Figure 11.3: Turning on Auditing for Object Access Using the Local Security Settings Console
Figure 11.4: The Secedit Command Syntax
Figure 11.5: Starting MBSA
Figure 11.6: Select a Computer to Scan Using MBSA
Figure 11.7: The MBSA Output Report on a Local Computer
Figure 11.8: A Portion of an MBSA Report Showing the Password Expiration Result
Figure 11.9: Security Issues and How to Correct Vulnerabilities
Figure 11.10: The MBSA Step-by-Step Solution
Figure 11.11: The SUS Welcome Window
Figure 11.12: The Options for Synchronizing the SUS Server
Figure 11.13: Schedule Synchronization for the SUS Server
Figure 11.14: Catalog Download Progress Bar
Figure 11.15: The Synchronization Log
Figure 11.16: Approving SUS Available Updates
Figure 11.17: SUS Approval Confirmation
Figure 11.18: SUS License Agreement
Figure 11.19: Successful Updates Ready for Client Distribution
Figure 11.20: Viewing the SUS Approval Log
Figure 11.21: Setting SUS Options
Figure 11.22: Monitoring Server Updates

Chapter 12: Planning, Implementing, and Maintaining a Public Key Infrastructure

Figure 12.1: Public/Private Key Data Exchange
Figure 12.2: Digital Signatures
Figure 12.3: A Windows Server 2003 Certificate
Figure 12.4: Choosing the CA Type
Figure 12.5: Naming the CA
Figure 12.6: Selecting the Certificate Database Location
Figure 12.7: The Certification Authority Snap-In
Figure 12.8: General Tab of the CA Property Sheet
Figure 12.9: Policy Module Tab of the CA Property Sheet
Figure 12.10: Request Handling Tab of the Default Policy Module
Figure 12.11: Exit Module Tab of the CA Property Sheet
Figure 12.12: Publication Settings Tab of the Default Exit Module
Figure 12.13: Auditing Tab of the CA Property Sheet
Figure 12.14: Security Tab of the CA Property Sheet
Figure 12.15: Recovery Agents Tab of the CA Property Sheet
Figure 12.16: Extensions Tab of the CA Property Sheet
Figure 12.17: Certificate Templates Snap-In
Figure 12.18: General Tab of the New Template Property Sheet
Figure 12.19: Request Handling Tab of the New Template Property Sheet
Figure 12.20: Subject Name Tab of the New Template Property Sheet
Figure 12.21: Issuance Requirements Tab of the New Template Property Sheet
Figure 12.22: Superseded Templates Tab of the New Template Property Sheet
Figure 12.23: Extensions Tab of the New Template Property Sheet
Figure 12.24: Security Tab of the New Template Property Sheet
Figure 12.25: Certificates Snap-In
Figure 12.26: Certificate Type Screen of the Certificate Request Wizard
Figure 12.27: Cryptographic Service Provider Screen of the Certificate Request Wizard
Figure 12.28: Certification Authority Screen of the Certificate Request Wizard
Figure 12.29: Welcome Screen of the CA’s Web Site
Figure 12.30: Enable Certificate Templates Window
Figure 12.31: Certificate Templates Snap-In
Figure 12.32: Certificates Snap-In
Figure 12.33: Certificate Request Wizard’s Certificate Types Screen
Figure 12.34: Advanced Certificate Request Screen
Figure 12.35: Smart Card Certificate Enrollment Station Screen
Figure 12.36: Security Tab of the VPN Client’s Properties Sheet
Figure 12.37: Smart Card or Other Certificate Properties Sheet

Appendix A: Self Test Questions, Answers, and Explanations

Figure 1.14: Organizational Structure
Figure 1.15: Network Portion




MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure. Exam 70-293 Study Guide and DVD Training System
MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure: Exam 70-293 Study Guide and DVD Training System
ISBN: 1931836930
EAN: 2147483647
Year: 2003
Pages: 173

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net