O BJECTIVES Microsoft has defined the Routing and Remote Access portion of the "Planning, Implementing, and Maintaining Routing and Remote Access" objectives as follows : Plan a routing strategy. -
Routing is the process of moving packets from one network to another. To do this efficiently , you must know how to plan a strategy that works for your business needs and ensure that it is implemented properly. You need to identify which routing strategy you may need (static versus dynamic routing) and what protocols you want to use. You also need to understand what multicast traffic is and how to plan routing for it. Plan security for remote access users. -
Plan remote access policies. -
Analyze protocol security requirements. -
Plan authentication methods for remote access clients . -
Remote access can be a great thing for your users ”if planned and implemented properly, including security. To fully secure your remote access solution, you need to understand the authentication methods available as well as how to configure and implement remote access policies. Troubleshoot TCP / IP routing. Tools might include the route , tracert , ping , pathping , and netsh commands and Network Monitor. -
After your network infrastructure has been designed, planned, and implemented, you need to know how to troubleshoot it. Windows Server 2003 provides quite a few tools to help you troubleshoot, so you need to know how to use them not only to solve problems, but also to take the 70-293 exam. Here, you learn how to use route , tracert , ping , pathping , netsh , and Network Monitor. O UTLINE Introduction Planning a Routing Strategy What Is Routing? Static Versus Dynamic Routing Distance Vector Versus Link State Link State Distance Vector Planning the Correct Routing Protocol to Use RIP RIPv2 OSPF Planning a Routing Environment Windows Server 2003 Routing Solutions Using the route Command to Configure Static Routes Implementing RIP Routing Implementing OSPF Routing Routing Hierarchies Other Problems with Routing Planning Routing for IP Multicast Traffic Windows Server 2003 Multicast Specifics Planning and Implementing Remote Access Security Planning Authentication Methods Extensible Authentication Protocol Challenge Handshake Authentication Protocol Microsoft Challenge Handshake Authentication Protocol MS-CHAP Version 2 Shiva Password Authentication Protocol Password Authentication Protocol Using Unauthenticated Access Using Dial-in Properties for Access Control Planning and Creating Remote Access Policies Remote Access Profiles Dial-in Constraints IP Multilink Authentication Encryption Advanced Troubleshooting TCP / IP Routing The route Command The tracert Command The ping Command The pathping Command The netsh Command The Network Monitor Utility Troubleshooting RIP Environments Troubleshooting OSPF Environments Chapter Summary Apply Your Knowledge Exercises Review Questions Exam Questions Answers to Review Questions Answers to Exam Questions Suggested Readings and Resources S TUDY S TRATEGIES -
Focus on understanding what protocols are used for what solution. In other words, if you are asked to create a hub and spoke network with static routes on the spokes and a routing protocol in the core , which would you use? What routing protocol? If you are asked to make it secure, what would you use? These are the questions you need to know how to answer from a design and planning standpoint. -
Take some time to review network security planning. This exam focuses on security as well, so make sure you study not only how to plan a network infrastructure, but also how to secure your network infrastructure. -
Get your hands dirty. The Step by Steps throughout this book provide plenty of directions and exercises, but you should go beyond these examples and create some of your own. If you can, experiment with each of the objectives to see how they work and why you would use each one. |