Microsoft Windows 2000网络基础结构管理:英文

Microsoft Windows 2000网络基础结构管理:英文
作 者: Microsoft公司著
出版社: 北京大学出版社
丛编项: 微软指定MCSE教材
版权说明: 本书为出版图书,暂不支持在线阅读,请支持正版图书
标 签: 操作系统
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《Microsoft Windows 2000网络基础结构管理:英文》作者简介

内容简介

本书是《微软指定MCSE教材》丛书中的一本,介绍Microsoft Windows 2000的网络基础结构管理技术,内容涉及网络基础结构规划、TCP/IP协议安装与配置、WINS和DNS、DHCP、RAS、网络地址转换、网络安全等。本书讲解全面而细致,实例丰富而生动,适合相关的中、高级专业人员阅读。本书讲述如何为企业提供安全而可靠的网络技术服务,以及如何准备MCP考试。书中既有详细的讲解,又有生动的实例,让您能够自己安排学习进度,从而掌握Windows 2000中的网络协议和服务的安装、管理和故障排除等技能。

图书目录

About This Book

Intended Audience

Prerequisites

Reference Materials

About the CD-ROM

Features of This Book

Notes

Conventions

Chapter and Appendix Overview

Finding the Best Starting Point for You

Where to Find Specific Skills in This Book

Getting Started

Hardware Requirements

Software Requirements

Setup Instructions

The Microsoft Certified Professional Program

Microsoft Certification Benefits

Requirements for Becoming a Microsoft Certified Professional

Technical Training for Computer PrOfessionals

Technical Support

Chapter 1 Designing a Windows 2000 NetWork

About This Chapter

Before You Begin

Lesson 1:Network Services Overview

TCP/IP

Domain Name System

Dynamic Host Configuration Protocol

Windows Internet Name Service

Remote Access Overview

Network Address Translator

Certificate Services

Lesson Summary

Lesson 2:Developing a Network Implementation Plan

Operating System Considerations

Phases of Deployment

Hardware Considerations

Interaction with Legacy Systems

Network Protocol Considerations

Lesson Summary

Lesson 3:Common Protocols Supported by Windows 2000

Transmission Control Protocol/Internet Protocol

NWLink

NetBEUI

AppleTalk

Data Link Control

Infrard Data Association

Lesson Summary

Review

Chapter 2 Implementing TCP/IP

About This Chapter

Before You Begin

Lesson 1:TCP/IP Overview

Benefits of TCP/IP

Architectural Overview of the TCP/IP Protocol Suite

Transmission Control Protocol

Intemet Protocol(IP)

User Datagram Protocol

Lesson Summary

Lesson 2:Intemet Protocol Addressing

The IP Address

Dotted-Decimal Notation

IP Address Conversion from Binary to Decimal

Address Classes

IP Address Guidelines

Lesson Summary

Lesson 3:Microsoft TCP/IP Installation and Configuration

Installing TCP/IP

Practice:Installing the TCP/IP Protocol

Configuring TCP/IP

Testing TCP/IP with IPConfig and PING

Configuring Packet Filters

Practice:Implementing IP Packet Filters

Lesson Summary

Lesson 4:Basic Concepts of IP Routing

Overview of Routing

Static and Dynamic IP Routing

Practice:Updating a Windows 2000-Based Routing Table

Lesson Summary

Review

Chapter 3 Implementing NWLlnk

About This Chapter

Before You Begin

Lesson 1:Introducing NWLink

Interoperability with NetWare

NWLink and Windows 2000

Wink Architecture

Lesson Summary

Lesson 2:Using Gateway Service for NetWare

Gateway Service for NetWare Overview

Understanding Gateway Service for NetWare and Gateways

Installing Gateway Service for NetWare

CreatingaGateway

Connecting Directly to NetWare Resources

LessonSummmp

Lesson 3:Using Client Service for NetWare

NetWare Connechvity

Choosing Between Client Service for

NetWare and Gateway Service for NetWare

Configuring Client Service fOr NetWare

Lesson Summary

Lesson 4:Installing and Configuring NWLink

Windows 2000 Professional and NetWare Connectivity

Intemal Network Number

Fram Type and Network Number

Configuring NWLink

Practice:Installing and Configuring NWLink

Lesson Summary

Review

Chapter 4 Monitoring Network Activity

About This Chapter

Before You Begin

Lesson 1:Introducing Network Monitor

Understanding Network Monitor

Practice:Installing Network Monitor

Lesson Summary

Lesson 2:Using Network Monitor

Examining Frames

Viewing Data

Using Display Filters

Reviewing Captured Data

Prachce:Capturing Frames with Network Monitor

Network Monitor Peiformance Issues

Detecting Network Monitor

Lesson Summary

Lesson 3:Windows 2000 Administration Tools

Windows 2000 Administration Capabilities

Terminal Services

Simple Network Management Protocol (SNMP)

Lesson Summary

Review

Chapter 5 Implementing IPsec

About This Chapter

Before You Begin

Lesson 1:Introducing and Enabling IPSec

Intemet Protocol Security

In-Depth Defense

Benefits of IPSec

IP Security Process

IPSec Architecture

Considerations for IPSec

Lesson Summary

Lesson 2:Configuring IPSec

Prerequisites for Implementing IPSec

How to Implement IPSec

Configuring IPSec Policies

Connection Types

Authentication Method

IP Packet Filtering

Filter Actions

Additional IPSec Tasks

Practice:Testing IPSec

Lesson Summary

Lesson 3:Customizing IPSec Policies and Rules

Policy-Based Security

IP Filters and Filter Specifications

Security Methods and Negotiation Policies

IPSec Through Firewalls

IPSec Through NAT and Proxies

Other IPSec Considerations

TCP/IP Properties

Practice:Building a Custom IPSec Policy

Lesson Summary

Lesson 4:Monitoring IPSec

IPSec Management and Troubleshooting Tools

Using Network Monitor

Practice:Using Network Monitor to View Clear Text Traffic

Practice:Using Network Monitor to View Encrypted Traffic

Practice:Using Diagnostic Aids

Lesson Summary

Review

Chapter 6 Resolving Network Host Names

About This Chapter

Before You Begin

Lesson 1:TCP/IP Naming Schemes

Windows 2000 Naming Schemes

Lesson Summary

Lesson 2:Host Names

Understanding Host Names

Purpose of HostNames

Host Name Resolution

Lesson Summary

Lesson 3:The HOSTS File

Understanding the HOSTS File

Advantage of Using a HOSTS File

Practice:Working with the HOSTS File and DNS

Lesson Summary

Review

Chapter 7 Implementing Domain Name System (DNS)

About This Chapter

Before You Begin

Lesson 1:Introducing DNS

DNS Origins

DNS and Windows 2000

How DNS Workst

The Structure of DNS

Zones

Name Server Roles

Lesson Summary

Lesson 2:Name Resolution and DNS Files

Recursive Queries

Iterative Queries

Inverse Queries

Caching and Time to Live

DNS Configuration Files

The Reverse Lookup File

The Cache File

The Boot File

Lesson Summary

Lesson 3:Planning a DNS Implementation

DNS Considerations

Registering with the Parent Domain

Practice:Implementing DNS

Lesson Summary

Lesson 4:Installing DNS

Practice:Installing the DNS Server Service

Troubleshooting DNS with NSLOOKUP

Lesson Summary

Lesson 5:Configuring DNS

Configuring DNS Server Properties

Adding DNS Domains and Zones

Practice:Configuring a DNS Server

Adding Resource Records

Configuring Reverse Lookup

Lesson Summary

Review

chapter 8 Using Windows 2000 Domain Name Service

About This Chapter

Before You Begin

Lesson 1:Working with Zones

Delegating Zones

Configuring Zones for Dynamic Update

Practice:Enabling Dynamic Updates

Lesson Summary

Lesson 2:Working with Servers

Overview of DNS Servers and Caching

Implementing a Caching-Only Server

Monitoring DNS Server Performance

Practice:Testing a Simple Query on a DNS Server

Lesson Summary

Review

Chapter 9 Implementing Windows Internat Name Servlce (WINS)

About This Chapter

Before You Begin

Lesson 1:Introduction to WINS

Name Resolution with NetBIOS

WINS Overview

WINS and Windows 2000

Lesson Summary

Lesson 2:The WINS Resolution Process

Resolving NetBIOS Names with WINS

Name Registration

Name Renewal

Name Release

Name Query and Name Response

Lesson Summary

Lesson 3:Implementing WINS

When to Use WINS

Considerations for WINS Servers

WINS Requirements

Using Static Mappings

Practice:Configuring a WINS Client

Troubleshooting WINS

Managing and Monitoring WINS

Lesson Summary

Lesson 4:Configuring WINS Replication

Replication Overview

Configuring a WINS Server as a Push or Pull Partner

Configuring Database Replication

Practice:Performing WINS Database Replication

Backing Up the WINS Database

Lesson Summary

Review

Chapter 10 Implementing Dynamic Host Configuration PfOtocol (DHCP)

About This Chapter

Before You Begin

Lesson 1:Introducing and Installing DHCP

DHCP Overview

How DHCP Works

Installing aDHCP Server

Ipconfig

DHCP Relay Agent

Lesson Summary

Lesson2:Configuring DHCP

Using DHCP on a Network

Installing and Configuring a DHCP Server

Implementing Multiple DHCP Servers

Lesson Summary

Lesson 3:Integrating DHCP with Naming Services

DNS and DHCP

Lesson Summary

Lesson 4:Using DHCP with Active Directory

Windows 2000 Integrated IP Management

Rogue DHCP Server Detection Feature

Lesson Summary

Lesson 5:Troubleshooting DHCP

Preventing DHCP Problems

Troubleshooting DHCP Clients

Troubleshooting DHCP Servers

Moving the DHCP Server Database

Lesson Summary

Review

Chapter 11 Providing Your Clients Remote Access Service (RAS)

About This Chapter

Before You Begin

Lesson 1:Introducing Remote Access Service

Overview of Remote Access Service

Routing and Remote Access Features

Enabling Routing and Remote Access

Practice:Installing a Routing and Remote Access Server

Remote Access Versus Remote Control

Lesson Summary

Lesson 2:Configuring a Routing and Remote Access Server

Allowing Inbound Connections

Creating a Remote Access Policy (RAP)

Practice:Creating a New Remote Access Policy

Configuring a Remote Access Profile

Pratice:Creating a Policy Filter

Configuring Bandwidth Allocation Protocol (BAP)

Lesson Summary

Lesson 3:Implementing IP Routing on a Remote Access Server

Installing IP Routing

Practice:Enabling and Configuring a

Routing and Remote Access Server

Updating the Routing Tables

Implementing DemandDial Routing

Lesson Summary

Lesson 4:Supporting Virtual Private Networks

Implementing a VPN

Integrating VPN in a Routed Environment

Integrating VPN Servers with the Internet

Practice:Creating VPN Interfaces

Lesson Summary

Lesson 5:Supporting Multilink Connections

Point-to-Point Protocol

Multilink PPP

Lesson Summary

Lesson 6:Using Routing and Remote Access with DHCP

Routing and Remote Access and DHCP

DHCP Relay Agent

Practice:Configuring the DHCP Relay Agent

to Work over Routing and Remote Access

Lesson Summary

Lesson 7:Managing and Monitoring Remote Access

Logging User Authentication and Accounting Requests

Accounting

Netsh Conunand-Line Tool

Network Monitor

Resource Kit Utilities

Lesson Summary

Review

Chapter 12 Supporting Network Address Translation (NAT)

About This Chapter

Before You Begin

Lesson 1:Introducing NAT

Network Address Translation

Public and Private Addresses

How NAT Works

NAT Processes in Windows 2000 Routing and Remote Access

Additional NAT Routing Protocol Components

Lesson Summary

Lesson 2:Installing Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing and NAT

Troubleshooting Connection Sharing (NAT)

Lesson Summary

Lesson 3:Installing and Configuring NAT

Network Address Translation Design Considerations

Virtual Private Networks and NATs

Lesson Summary

Review

Chapter 13 Implementing Certificate Services

About This Chapter

Before You Begin

Lesson 1:Introducing Certificates

Overview of Cenificates

Enterprise and Stand-Alone CAs

Types of CAs

Lesson Summary

Lesson 2:Installing and Configuring Certificate Authority

Deploying a CA

Protecting a CA

Certificate Enrollment

Pratice:Installing a Stand-Alone Subordinate CA

Certificate Renewal

Cenificate and Key Recovery

Lesson Summary

Lesson 3:Managing Certificates

Revoked Certificates

Issued Certificates

Pending Requests

Failed Requests

How a Certificate Is Issued

Certificate Revocation

Practice:Revoking a Certificate

EFS Recovery Policy

Practice:Changing a Recovery Policy

Lesson Summary

Review

Chapter 14 Implementing Enterprise-Wide Network Security

About This Chapter

Before You Begin

Lesson 1:Implementing Network Security

Planning for Network Security

Planning Distributed Network Security

Intemet Connection Issues

Microsoft Proxy Server

Lesson Summary

Lesson 2:Configuring Routing and Remote Access Security

Overview of Remote Access

Configuring Protocols for Security

Practice:Using Security Protocols

for a Virtual Private Network Connection

Creating Remote Access Policies

Using Encryption Protocols

Lesson Summary

Lesson 3:Monitoring Security Events

Monitoring Your Network Security

Using Event Viewer to Monitor Security

Practice:Recording Failed Logon Attempts

Practice:Viewing the Security Log

System Monitor

The IPSec Monitor Utility

Monitoring Security Overhead

Lesson Summary

Review

Appendix A Questions and Answers

Glossary

Index