Z02I622884.fm Page 1 Friday, March 31, 2006 1:20 PM all zone transfer queries (AXFR) queries I-1 Index Symbols and Numbers ; (semicolon), 4-36 % Processor Time counter, 12-7 * (wildcard), 15-7 . (trailing dot), 4-13 @ (at symbol), 5-35 3DES (Triple Data Encryption Standard), 10-85 80/20 rule, 7-9 to 7-10 A A (host) resource records default client update behavior, 4-59 dynamic updates, 5-30 to 5-31 multihomed computers, 5-48 netmask ordering, 5-48 overview of, 4-37 zone delegations, 5-59, 5-60 AAAA (QuadA) records, IPv6, 14-1 ABRs (area border routers), 9-64 access control Allow Access setting, 10-24 to 10-25, 10-29 to 10-30, 10-35 Control Access Through Remote Access Policy setting, 10-24, 10-25, 10-32 Deny Access setting, 10-24, 10-25, 10-29, 10-36 account policies, 11-23 ACK (acknowledgement) messages, 8-4, 8-5, 8-11 to 8-12 Action tab, Performance Logs and Alerts, 12-12 Activate menu command, scopes, 7-14 Active Directory DHCP server authorization, 7-5 Load Zone Data On Startup option, 5-46, 5-52 to 5-53 RADIUS server configuration, 10-80 SRV (service) resource record verification, 5-15 to 5-18 Active Directory Client Extensions pack, 15-19 Active Directory–integrated zones defining, 4-33 to 4-34 dynamic updates, 5-27 to 5-31 overview of, 5-23 replication, 5-23, 5-24 to 5-25 Replication Monitor, 6-20 to 6-24 active leases, 7-32 Add Or Remove Programs tool, 4-26 address block size, 2-22 to 2-30 in /n terms, 2-22 lesson review, 2-30 to 2-31 lesson summary, 2-31 practice exercises, 2-23 to 2-30 w.x.y.z subnet mask, 2-23 address conflicts, 8-28 to 8-29 address pools defined, 7-9 static, 10-6 to 10-7 Address Resolution Protocol (ARP) defined, 2-57 overview of, 2-3 troubleshooting TCP/IP connections, 3-28 to 3-29 addressing. See IP addresses adjacency, OSPF, 9-63 administrators DHCP Administrators group, 7-26, 7-53 DHCP server installation, 7-4 Enterprise Admins group, 7-5, 7-53 network security. See security administration security alerts advertisements, 9-37 aging, zones, 5-31 to 5-32 alerts Network Monitor, 12-17 to 12-18 Performance console, 12-9 to 12-14, 12-19 to 12-20 See also Performance Logs and Alerts algorithms IKE security, 11-67, 11-95 RSA RC4 (Riveset-Shadmir Adleman), 10-30, 10-85 Shortest Path First (SPF) algorithm, 9-63 alias (CNAME) resource records, 4-15, 4-37 to 4-38 All Names name-checking method, 5-52 all zone transfer queries (AXFR) queries DNS performance counters for, 6-26 Z02I622884.fm Page 2 Friday, March 31, 2006 1:20 PM I-2 all zone transfer queries (AXFR) queries overview of, 5-39 to 5-39 Allow Access setting, remote access, 10-24 to 10-25, 10-29 to 10-30, 10-35 Always Use Message Authenticator, 10-77 American Registry for Internet Numbers (ARIN), 2-12 AND function, Calculator, 8-31 APIPA (Automatic Private IP Addressing), 1-22, 1-25 to 1-29 address ranges, 13-4, 13-6, 13-9 defined, 1-37 DCHP addresses, 8-29 DHCP client migration, 7-14 DHCP leases and, 8-3 overview of, 1-25 remote access through DHCP, 10-6 troubleshooting, 1-27 APNIC (Asia-Pacific Network Information Center), 2-12 AppleTalk routing, 9-4, 9-19 application directory partitions, 5-25 to 5-27 defined, 5-80 application layer, TCP/IP, 2-2, 2-4 Network Monitor and, 3-11, 3-12 overview of, 2-5 application startup, Computer Management console, 12-32 to 12-33 area border routers (ABRs), 9-64 areas, OSPF, 9-64 ARIN (American Registry for Internet Numbers), 2-12 ARP (Address Resolution Protocol) defined, 2-57 overview of, 2-3 troubleshooting TCP/IP connections, 3-28 to 3-29 ARP –a command, 2-3 ARP –d command, 2-3 Asia-Pacific Network Information Center (APNIC), 2-12 at symbol (@), 5-35 attributeSchema, 6-21, 6-33 audit logging, DHCP, 8-20 to 8-26 event codes, 8-23 lesson review, 8-25 to 8-26 log event codes 50 and above, 8-23 to 8-24 overview of, 8-20 to 8-22 server authorization events, 8-23 server logs, 8-22 to 8-25 auditing Internet Key Exchange (IKE), 11-80 IPSec, 11-82 to 11-83 authentication authorization vs., 10-7 defined, 10-7 demand-dial router-to-router, 9-38 mutual authentication, 16-36 network security and, 11-9 remote access, 10-7 to 10-18 RIP, 9-61 See also IAS (Internet Authentication Service) Authentication Header (AH), 11-42 Authentication Methods dialog box, 10-16 authentication protocols CHAP, 10-10 to 10-13 choosing, 10-9 to 10-10 configuring client side, 10-12 to 10-15 configuring server side, 10-16 to 10-18 EAP, 16-8, 16-16 to 16-17 EAP-MD5 CHAP, 10-10 to 10-13 EAP-TLS, 10-9 to 10-13, 10-16 to 10-17, 10-58, 10-87 features of, 10-11 to 10-12 MS-CHAP v1, 10-10 to 10-13, 10-15 MS-CHAP v2, 10-10 to 10-13, 10-15, 16-16 to 16-17, 16-39, 16-45 operating system support, 10-12 to 10-13 PAP, 10-10, 10-11 to 10-15 RADIUS, 10-8, 10-26 to 10-27, 10-32, 10-38, 10-67 to 10-81 SPAP, 10-10, 10-11 to 10-14 unauthenticated access, 10-10 Authentication tab, Edit Dial-In Profile dialog box, 10-17, 10-30 Authentication-Type dialog box, 10-28 authoritative answer, 4-21 authorization authentication vs., 10-7 demand-dial router-to-router, 9-38 DHCP servers, 7-5 Kerberos and, 11-53 to 11-54 Z02I622884.fm Page 3 Friday, March 31, 2006 1:20 PM Caller ID, remote access permissions network security, 11-4 troubleshooting DHCP, 13-31 automatic addressing, DHCP servers, 1-25, 1-28 Automatic Private IP Addressing (APIPA) address ranges, 13-4, 13-6, 13-9 defined, 1-37 DCHP addresses, 8-29 DHCP client migration, 7-14 DHCP leases and, 8-3 overview of, 1-25 remote access through DHCP, 10-6 troubleshooting, 1-27 Automatic Updates, 15-2, 15-18 autostatic routes, 9-36, 9-79 Autostatic Update, 16-33 AXFR (all zone transfer) queries DNS performance counters for, 6-26 overview of, 5-39 to 5-39 B Backup command, DHCP console, 7-32 to 7-34 backups DHCP server database, 7-32 to 7-34, 7-38 disabling NetBIOS, 4-8 BACP (Bandwidth Allocation Control Protocol), 9-11, 9-12, 9-79 bandwidth, 9-12, 17-1 Bandwidth Allocation Control Protocol (BACP), 9-11, 9-12, 9-79 BAP (Bandwidth Allocation Protocol) defined, 9-11 dynamic bandwidth control, 9-12 port and device properties, 9-34 remote access policies, 10-30 Basic Firewall/NAT, 9-7, 9-48 troubleshooting, 9-50 Batch mode, 7-25 binary notation, 2-7, 2-9 to 2-10, 2-16, 2-18 converting manually, 2-9 to 2-10 converting with calculator, 2-18 defined, 2-7 exercise converting, 2-18 to 2-19, 2-60 BIND Secondaries, Advanced tab of DNS server properties, 5-46, 5-47 to 5-48 Bindings dialog box, 8-30, 8-31 block size, 2-22 to 2-30 in /n terms, 2-22 lesson review, 2-30 to 2-31 lesson summary, 2-31 practice exercises, 2-23 to 2-30 w.x.y.z subnet mask, 2-23 blocking policies creating, 11-60 to 11-64 troubleshooting, 11-81, 11-103 BOOTP (Boot Protocol) forwarding defined, 9-79 DHCP Relay Agent, 9-65, 9-66, 9-84 bridges, routers compared with, 9-3 broadcasts limited broadcast addresses, 9-17, 9-18 RRAS name resolution, 9-10 to 9-11 subnetting and, 2-42 traffic, 2-35 browsing, 4-3, 4-7 to 4-8 without NetBIOS, 4-7 brute force attack, 11-6 C cables, crossover, 1-25 Cached Lookups folder, 4-41 Cache.dns file, 5-10, 5-11 caching-only servers, 4-34 to 4-35 DNS client cache, 4-22, 4-58 DNS resolver cache, 4-58 DNS server cache, 4-23, 4-40 to 4-41 forwarding and, 5-5 overview, 4-22 to 4-23 Secure Cache Against Pollution option, 5-51 Caching Memory counter, DNS, 6-26 Calculator AND function, 8-31 calculating host IDs per subnet, 2-42, 2-43 notation conversions and, 2-16 callbacks, 9-12, 9-33 defined, 9-79 remote access permissions and, 10-25 called router, 9-38 Called-Station-ID attribute, 9-34 Caller ID, remote access permissions, 10-25 I-3 Z02I622884.fm Page 4 Friday, March 31, 2006 1:20 PM I-4 calling router calling router, 9-38 canonical names (CNAME), 4-15, 4-22, 4-35, 4-37 to 4-38 Capture Trigger dialog box, 12-18 Capture window, Network Monitor, 3-7 CAs (certificate authorities), 10-58 case-sensitivity, DNS names, 4-49 certificate authorities (CAs), 10-58 Certificate Services component, 1-12 certificates L2TP/IPSec and, 10-58 to 10-59 overview of, 1-12 Cfg setting, Secedit, 11-34 Chaddr (Client Ethernet Address) field DHCP ACK, 8-11 to 8-12 DHCP Discover, 8-7 to 8-8 DHCP NACK, 8-12 to 8-13 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 Challenge Handshake Authentication Protocol (CHAP) defined, 10-10 features/exam tips, 10-11 to 10-12 operating system support, 10-12 to 10-15 Change Zone Replication Scope dialog box, 5-24, 5-26, 5-27 Change Zone Type dialog box, 5-22 to 5-23 CHAP (Challenge Handshake Authentication Protocol), 10-10 to 10-13 defined, 10-10 features/exam tips, 10-11 to 10-12 operating system support, 10-12 to 10-15 Ciaddr (Client IP Address) field, 8-7, 8-11 CIDR (classless interdomain routing), 2-9 CIFS (Common Internet File System) defined, 1-37 functions of, 1-9 Kerberos and, 11-46 NetBIOS and, 1-9 Class field, 4-36 classes IP address, 2-10 user, 7-35 to 7-37 classless interdomain routing (CIDR), 2-9 classSchema, 6-21, 6-33 clean install, 15-2, 15-7 client configuration, authentication protocols, 10-12 to 10-15 demand-dial router-to-router, 9-40 DHCP server, 7-13 to 7-14, 7-16 to 7-19 network, 1-22 PPTP on VPN, 10-56 to 10-57 RADIUS, 10-75, 10-77 RADIUS proxy, 10-73 to 10-75 remote access, 10-3 to 10-22 troubleshooting DHCP, 8-27 to 8-36 troubleshooting IP addressing, 13-31 Client Ethernet Address field (Chaddr) field DHCP ACK, 8-11 to 8-12 DHCP Discover, 8-7 to 8-8 DHCP NACK, 8-12 to 8-13 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 Client For Microsoft Networks, 1-19, 3-11 Client IP Address (Ciaddr) field, 8-7, 8-11 Client Service For Netware, 1-18 CNAME (alias) resource records, 4-15, 4-22, 4-35, 4-37 to 4-38 comments, resource records, 4-36 Common Internet File System protocol (CIFS) defined, 1-37 functions of, 1-9 Kerberos and, 11-46 NetBIOS and, 1-9 compatws security template, 11-23 Computer Browser service, 4-7 to 4-8 Computer Management console application startup and, 12-34 Services node, 12-32 to 12-33 computer names Disable Round Ordering option, 5-50 to 5-51 DNS clients, 4-48 Enable Netmask Ordering option, 5-46, 5-48 Enable Round Robin option, 5-50 overview of, 4-4 to 4-5 computers APIPA addresses and, 1-22, 1-25 to 1-29 multihomed, 1-34 conditional forwarding, 5-5 conditions, remote access policy, 10-27 to 10-28 Z02I622884.fm Page 5 Friday, March 31, 2006 1:20 PM Custom Templates confidentiality, network security, 11-26, 11-42 configuration, client authentication protocols, 10-12 to 10-15 demand-dial router-to-router, 9-40 DHCP server, 7-13 to 7-14, 7-16 to 7-19 network, 1-22 PPTP on VPN, 10-56 to 10-57 RADIUS, 10-75, 10-77 RADIUS proxy, 10-73 to 10-75 remote access, 10-3 to 10-22 troubleshooting DHCP, 8-27 to 8-36 troubleshooting IP addressing, 13-31 configuration, server, authentication protocols, 10-16 to 10-18 Configure A DNS Server Wizard, 4-27, 4-29 to 4-31 Configure Device dialog box configuring VPN types, 10-54 port and device properties, 9-34 Configure Option, DHCP servers, 7-12 conflict detection, DHCP servers, 7-32 connection endpoint addressing, 9-38 connection request policies, 10-73 to 10-74, 10-87 connection-specific DNS suffixes configuring DNS client, 4-48 overview of, 4-5 connectionless services, UDP, 2-5 connections New Connection wizard, 1-16, 10-60 to 10-61 remote access policies, 10-28 connections, network adding components to, 1-22 to 1-23 advanced settings, 1-19 to 1-21 APIPA, 1-25 to 1-29 automatically configured, 1-25 bridging, 1-30 to 1-32 configuring, 1-22, 1-23 to 1-32 default components, 1-17 overview of, 1-16 provider order, 1-20 to 1-21 TCP/IP settings, 1-32 to 1-34 viewing, 1-16 to 1-32 connections, TCP/IP, 3-22 to 3-34 ARP tool, 3-28 to 3-29 case scenario, 3-34 to 3-36 faulty configuration, 3-22 further reading, 13-8 lesson review, 3-32 to 3-33 lesson summary, 3-33 to 3-34 monitoring. See Network Monitor Network Diagnostics, 3-23 to 3-26 overview of, 13-31 PathPing, 3-26 to 3-27 Ping, 3-26 to 3-27 practice exercises, 3-29 to 3-34 Tracert, 3-27, 3-28 connectivity, Internet, 12-22 to 12-31 case scenario, 12-57 to 12-58 further reading, 17-5 identifying issues, 12-22 to 12-25 lesson review, 12-30 to 12-31 lesson summary, 12-31 name resolution issues, 12-22 to 12-25 network settings verification, 12-25 to 12-28 overview of, 12-22 practice exercise, 12-28 to 12-29 tested skills/suggested practices, 17-2 troubleshooting, 17-13 constraints, 10-86, 10-87 Control Access Through Remote Access Policy setting, 10-24, 10-25 counters, performance % Processor Time, 12-8 Average Disk Queue Length, 12-8 AXFR (all zone transfer) queries, 6-26 DNS (Domain Name Services), 6-26 to 6-27 IXFR (incremental zone transfer) queries, 6-26 list, 6-26 to 6-27 Total Query Received, 6-27 Total Response Sent, 6-27 Create IP Security Rule Wizard, 11-67 to 11-68 credentials remote access authentication, 10-7 to 10-8 Set Credentials command, 9-32 crossover cables, 1-25 cryptography. See encryption; public key cryptography Custom Templates applying, 11-34 to 11-35 creating, 11-32 to 11-35 modifying, 11-32 to 11-34 I-5 Z02I622884.fm Page 6 Friday, March 31, 2006 1:20 PM I-6 data capture D data capture, 3-6 Data Encryption Standard (DES) defined, 10-85 remote access and, 10-30 data integrity, 10-55 data stream, 3-6 data types, 6-7 database restore flag, 8-40 databases, DHCP backups, 7-31 to 7-33 reconciling, 8-33 to 8-34 troubleshooting, 13-39 DC security template, 11-23 Debug Logging tab, DNS server configuring log file, 6-11 to 6-12 overview of, 5-11 debugging DNS log, 6-3, 6-11 to 6-12, 6-16 to 6-18 Nslookup, 6-5 decimal notation converting manually, 2-10 to 2-13 converting with calculator, 2-13 defined, 2-9 exercise converting, 2-18 to 2-19 lesson review, 2-19 to 2-20 default gateways, 2-13, 2-34 default routes, 9-16 to 9-18, 9-21 default update behavior, 4-56 defltdc security template, 11-24 delegation, zone, 5-57 to 5-66 case scenario, 5-75 to 5-77 creating, 5-61 to 5-64 example of, 5-59 to 5-60 lesson review, 5-64 to 5-66 lesson summary, 5-66 New Delegation Wizard, 5-58, 5-61 overview of, 5-58 to 5-60 records, 5-59 when to use, 5-58 Demand-Dial Interface Wizard, 9-31 demand-dial interfaces, 9-30 to 9-37 defined, 9-6 Dial-Out Hours command, 9-32 extranet/router-to-router VPNs, 10-49 to 10-50 IP routing, 9-35 to 9-37 NAT, 9-49 to 9-51 network interface properties, 9-32 to 9-34 overview of, 9-30 to 9-31 port and device properties, 9-33 to 9-34 Routing and Remote Access, 9-7 Set Credentials command, 9-32 Set IP Demand-Dial Filters command, 9-32 shortcut menu commands, 9-31 to 9-32 Unreachability Reason command, 9-32 demand-dial routing, 9-30 to 9-46 case scenario, 9-75 to 9-77 defined, 9-30 exam highlights, 9-79 IIS installation and, 9-41 interfaces. See demand-dial interfaces lesson review, 9-45 router-to-router, 9-38 to 9-39 RRAS configuration, 9-41 to 9-43 testing configuration, 9-44 troubleshooting, 9-39 to 9-40 troubleshooting lab, 9-77 to 9-78 Deny Access setting, 10-24 to 10-25 Dependencies tab, Remote Access Connection Manager, 12-33 to 12-34 DES (Data Encryption Standard) defined, 10-85 remote access data encryption, 10-31 details pane, Frame Viewer window, 3-9 to 3-11 device configuration port and device properties, 9-35 virtual private networks (VPNs), 10-49 DFS (Distributed File System), 4-7 DHCP ACK (Acknowledgement) message DHCP leases and, 8-5 overview of, 8-11 to 8-12 DHCP Administration Tool, 13-42 to 13-43, 13-47 to 13-48 DHCP Client Identifier fields, 8-7 to 8-9 DHCP console creating DHCP scopes, 7-6 to 7-7 disabling audit logging, 8-21 migrating DHCP servers, 7-32 reconciling DHCP databases, 8-35 server status, 7-22 to 7-23 Z02I622884.fm Page 7 Friday, March 31, 2006 1:20 PM DHCP server logs verifying server installation, 7-4 DHCP databases backups, 7-31 to 7-33 reconciling, 8-33 to 8-34 troubleshooting, 13-39 DHCP Discover message defined, 8-42 DHCP leases and, 8-3 NACK messages and, 8-13 overview of, 8-7 to 8-8 DHCP Discover packets, 9-65, 9-66 DHCP leases analyzing DHCP messages, 8-5 to 8-7 exclusion ranges, 7-8 to 7-9 initial processes, 8-3 to 8-4 lesson review, 8-18 overview of, 7-6 to 7-7, 13-16 remote access and, 10-5 renewal, 8-4 to 8-5 reservations, 7-10 Shutdown /i command, 8-29 troubleshooting, 8-29 DHCP management, 7-22 to 7-40, 13-19 to 13-30 audit logging, 8-20 to 8-26, 8-45 to 8-46 case scenario, 7-46 to 7-47, 7-54 to 7-55 command-line, 7-24 to 7-25 connecting clients to remote servers, 7-26 database backups, 7-31 to 7-33 further reading, 13-7 host (A) resource records and, 4-34 lesson review, 7-39 to 7-40 manual compaction, 7-33 to 7-34 migrating, 7-32 to 7-33 options classes, 7-34 to 7-36 overview of, 13-19 to 13-20 servers, 7-22 to 7-24 subnet addresses, 7-30 to 7-31 superscopes, 7-26 to 7-30 tested skills/suggested practices, 13-4 troubleshooting lab, 7-48 DHCP messages analyzing, 8-5 to 8-7 DHCP ACK, 8-11 to 8-12 DHCP Discover, 8-7 to 8-8 DHCP NACK, 8-12 to 8-14 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 header fields, 8-6 to 8-7 lesson review, 8-18 DHCP NACK (Negative Acknowledgement) message defined, 8-42 initial lease process and, 8-5 overview of, 8-12 to 8-13 DHCP Offer messages, 8-3 to 8-4 DHCP Option field, 8-8 DHCP options assigning, 7-11 to 7-12 overview of, 13-15 troubleshooting, 13-35 user classes and, 7-34 to 7-36 DHCP Relay Agent configuring, 9-65 to 9-66, 13-15 to 13-16 lesson review, 9-67 overview of, 9-63 to 9-65 verifying functioning of, 9-66 DHCP Request messages, 8-9 to 8-10, 8-31 DHCP scopes, 80/20 rule, 7-9 to 7-10 Activate menu command, 7-14 activating, 7-13 configuring, 7-6 to 7-11 deactivating, 7-13 DHCP options, 7-12 exclusion ranges, 7-8 to 7-9 IP address range, 7-7 to 7-8 lesson review, 7-20 to 7-21 New Scope Wizard, 7-6 to 7-7 obtaining address from incorrect, 8-30 overview of, 7-6 to 7-7 reconciling, 8-35 redeployment, 8-29 reservations, 7-10 to 7-11 Scope Options dialog box, 7-12 subnet addresses and, 7-32 troubleshooting DHCP client, 8-29 to 8-30 verifying, 8-31 to 8-33 DHCP Server events, 8-22 DHCP server logs event codes, 8-23 lesson review, 8-25 to 8-26 I-7 Z02I622884.fm Page 8 Friday, March 31, 2006 1:20 PM I-8 DHCP server logs overview of, 8-22 to 8-23 sample excerpts from, 8-24 to 8-25 server authorization events, 8-23 to 8-24 DHCP Server Properties dialog box, 7-23 to 7-24, 7-31, 8-20 to 8-21 DHCP Server role, 7-4, 7-16 to 7-18 DHCP servers, 7-3 to 7-21 audit logs, 13-36 authorization, 7-5 automatic addressing, 1-20, 7-3 benefits of, 7-3 case scenario, 7-46 to 7-47, 7-54 to 7-55 clients and, 7-13 to 7-14 connectivity problems, 12-24 to 12-26 DNS updates, 7-41 to 7-47, 7-53 to 7-54 dynamic IP addressing, 2-8 to 2-9 dynamic updates, 5-28 finding location, address, or name of, 8-31 installing, 7-4 IP addressing problems, 13-27 lesson review, 7-20 to 7-21 Manage Your Server window, 7-4 options, 7-11 to 7-13 Relay Agent configuration, 9-66 remote access, 10-5 scopes, 7-6 to 7-11, 7-13 verifying configuration, 7-14 to 7-15, 8-32 to 8-34 DHCP traffic, 8-3 to 8-19 case scenario, 8-38 to 8-39, 8-46 to 8-47 DHCP ACK, 8-11 to 8-12 DHCP Discover, 8-7 to 8-8 DHCP header fields, 8-6 to 8-7 DHCP messages, 8-5 to 8-7 DHCP NACK, 8-12 to 8-14 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 exam highlights, 8-41 to 8-42 initial lease process, 8-3 to 8-4 lease renewal process, 8-4 to 8-5 lesson review, 8-18 DHCP, troubleshooting audit logging. See audit logging, DHCP case scenario, 8-38 to 8-39, 8-46 to 8-47 client configuration, 8-27 to 8-31 DHCP database, 8-34 to 8-35 Event Viewer and, 8-35 to 8-37 further reading, 13-5 lab, 8-40, 8-48 lesson review, 1-35 to 1-40, 8-37 to 8-38 overview of, 13-35 to 13-36 server configuration, 8-32 to 8-34 tested skills/suggested practices, 13-4 traffic analysis. See DHCP traffic Dhcploc.exe utility, 8-29, 8-30, 12-27 dial-back security, 13-30, 13-35 Dial-In Constraints tab, remote access policy, 10-29 dial-in properties, user accounts configuring, 10-23 to 10-26 remote access authorization, 10-32 to 10-37 remote access permissions, 10-24 to 10-26 Dial-Out Hours, demand-dial interface, 9-32 dial-up networking applying, 10-3 authentication, 10-13 to 10-17 client-side configuration, 10-13 to 10-17 practice exercises, 10-19 to 10-22 remote access authentication, 10-8 troubleshooting, 10-39 to 10-40 dialog boxes Add/Remove Snap-In, 11-30 Add Standalone Snap-Ins, 11-30, 11-60 Authentication Methods, 10-16 Authentication tab, Edit Dial-In Profile, 10-17, 10-30 Authentication-Type, 10-28 Bindings, 8-30, 8-31 Capture Trigger, 12-18 Change Zone Replication Scope, 5-24, 5-26, 5-27 Change Zone Type, 5-22 to 5-23 Configure Device, 9-34, 10-54 DHCP Server Properties, 7-23 to 7-24, 7-31, 8-20 to 8-21 DNS Events Properties, 6-9 to 6-10 DNS Suffix And NetBIOS Computer Name, 4-50 Edit Dial-In Profile, 10-17, 10-29 Filter tab, DNS Events Properties, 6-10 Local Area Connection Status, 8-33 Neighbors tab, RIP Properties, 9-63 Z02I622884.fm Page 9 Friday, March 31, 2006 1:20 PM DNS monitoring Network Connection Details, 8-33 New Reservation, 7-10 to 7-11 New Routing Protocol, 9-67 Port Status, 9-35 Reconcile All Scopes, 8-34 Reconcile, 8-34 Scope Options, 7-12 Select Attribute, 10-27 to 10-28 Select Network Component Type, 1-22 to 1-23 System Properties, 4-49 Zone Aging/Scavenging Properties, 5-31 to 5-32 Diffie-Hellman Group, 11-67 directory partitions, 6-21 to 6-22 Disable Recursion, Advanced tab of DNS server properties, 5-8 to 5-9 Disabled option, Services console, 7-24 Distributed File System (DFS), 4-7 DNS (Domain Name System) caching, 4-22 to 4-23 capturing name resolution traffic, 4-9 case scenario, 4-64 components, 4-14 to 4-15 DHCP client configuration, 7-14 to 7-15 DHCP server updates, 7-42 to 7-47 domain names, 4-12 to 4-13 lesson review, 4-10, 4-24 to 4-25 namespace, 4-12 NetBIOS and, 4-3 to 4-8 private domain namespace, 4-14 queries, 4-16 to 4-22 resolver cache, 4-17 to 4-18, 4-22 to 4-23, 4-58 to 4-59 roots, 4-13 troubleshooting, 4-65 to 4-66 DNS client cache overview of, 4-22 to 4-23 viewing/clearing, 4-58 to 4-59 DNS clients, 4-48 to 4-63 case scenario, 4-64 client settings, 4-48 to 4-55 computer names, 4-49 connection-specific suffixes, 4-50 to 4-51 default update behavior, 4-56 DHCP troubleshooting and, 13-31 dynamic updates, 4-55 to 4-56 exam highlights, 4-67 to 4-68 lesson review, 4-62 to 4-63 lesson summary, 4-63 name resolution, 4-3 to 4-4, 5-13 to 5-14 NetBIOS names, 4-49 overview of, 4-48 primary suffixes, 4-50 queries, 4-16 to 4-19 recursion, 4-60 to 4-62 servers list, 4-52 to 4-54 suffix searches, 4-54 to 4-55 TCP/IP settings, 4-57 to 4-58 troubleshooting lab, 4-65 to 4-66 viewing/clearing resolver cache, 4-58 to 4-59 DNS console defined, 4-23 general properties, 6-9 to 6-10 resource records, 4-35 to 4-40 server configuration, 4-29 zones, 4-29 to 4-31 DNS debug log, 6-11 to 6-12 DNS Events log accessing, 5-11 troubleshooting, 6-9 to 6-10 DNS Events Properties dialog box, 6-9 to 6-10 DNS forwarders, conditional, 5-7 to 5-8 disabling recursion, 5-8 to 5-9 interfaces, 5-4 overview of, 5-3 recursion and, 5-47 stub zones and, 5-70 when to use, 5-5 to 5-6 DNS management, 14-17 DNS monitoring, 6-20 to 6-29 case scenario, 6-29 to 6-31 further reading, 14-4 lesson review, 6-28 lesson summary, 6-28 to 6-29 overview of, 14-28 Replication Monitor, 6-20 to 6-24 System Monitor, 6-24 to 6-27 tested skills/suggested practices, 14-2 to 14-3 troubleshooting lab, 6-31 to 6-32 I-9 Z02I622884.fm Page 10 Friday, March 31, 2006 1:20 PM I-10 DNS naming system, NetBIOS compared to DNS naming system, NetBIOS compared to, 4-3 to 4-7 DNS Namespace, 4-12 DNS performance counters, 6-26 to 6-27 DNS queries, 4-16 to 4-22 example, 4-20 to 4-21 local resolver, 4-17 to 4-18 overview of, 4-16 querying DNS server, 4-18 to 4-19 recursion, 4-19 resolution methods, 4-16 response types, 4-22 root hints, 4-19 to 4-20 DNS Server log, 6-9 to 6-10 DNS server properties, 5-3 to 5-20 Advanced, 5-9 case scenario, 5-75 to 5-77 Debug Logging, 5-11 Event Logging, 5-11 exam highlights, 5-80 Forwarders, 5-4 to 5-9 Interfaces, 5-4 lesson review, 5-18 to 5-19 lesson summary, 5-19 to 5-20 Monitoring, 5-12 to 5-13 practice exercises, 5-13 to 5-18 properties tabs, 5-3 to 5-13 Root Hints, 5-10 Security, 5-13 troubleshooting, 5-78 DNS server properties, advanced BIND Secondaries, 5-47 to 5-48 case scenario, 5-75 to 5-77 default settings, 5-46 Disable Recursion, 5-46 to 5-47 Enable Automatic Scavenging Of Stale Records, 5-53 Enable Netmask Ordering, 5-48 to 5-50 Enable Round Robin, 5-50 Fail On Load If Bad Zone data, 5-48 lesson review, 5-53 to 5-55 lesson summary, 5-56 Load Zone Data On Startup, 5-52 to 5-53 Name Checking, 5-51 to 5-52 overview of, 5-45 performing scavenging, 5-33 recursion and, 5-7 to 5-8 Secure Cache Against Pollution, 5-51 DNS servers, properties tabs, 4-26 to 4-47 cache, viewing and clearing, 4-40 to 4-41 caching-only, 4-34 to 4-35 case scenario, 4-64 configuring, 4-29 to 4-31 DNS client, 4-48 to 4-52 installing, 4-26 to 4-29 lesson review, 4-46 lesson summary, 4-47 practice exercises, 4-42 to 4-46 querying, 4-16 to 4-22 recursion, 4-16, 4-19, 4-60 to 4-62 resource records, 4-15, 4-35 to 4-40 tested skills/suggested practices, 14-2 troubleshooting, 4-65 to 4-66 zones, 4-31 to 34 DNS servers, troubleshooting, 4-65 to 4-66, 5-78, 6-3 to 6-19 DNS Suffix And NetBIOS Computer Name dialog box, 4-50 DNS suffixes connection-specific, 4-50 to 4-52 search lists, 4-54 to 4-55 DNS troubleshooting, 6-3 to 6-19 case scenario, 6-29 to 6-31 DNS Debug log, 6-11 to 6-12 DNS Events log, 6-9 to 6-10 DNS infrastructure, 5-78 Internet connectivity, 12-22 to 12-24 lesson review, 6-18 to 6-19 Nslookup, 6-3 to 6-8 DNS updates, 7-42 to 7-47 DnsUpdateProxy security group, 7-43 to 7-44 lesson review, 7-45 DNS zones. See zone transfers Dnscmd utility, 5-26, 5-40 Dns.log file, 6-11, 6-17 to 6-18 DnsUpdateProxy security group, 13-39 DHCP server and, 7-43 to 7-44 secure dynamic updates and, 5-30 to 5-31 Z02I622884.fm Page 11 Friday, March 31, 2006 1:20 PM encryption I-11 Domain Controller Security Policy setting, 12-36 domain controllers adding to Replication Monitor console, 6-22 DHCP server installation and, 7-5 Domain Name System. See DNS (Domain Name System) domain names fully qualified, 4-4 Name Checking option, 5-51 to 5-52 overview of, 4-12 to 4-13 DomainDnsZones, 5-25 to 5-26, 6-22 domains geographical, 4-13 Internet, 4-13 to 4-14 logging onto with VPN connection, 10-62 to 10-63 names, 4-12 to 4-13 organizational, 4-13 private, 4-14 reverse, 4-13 dotted-decimal notation analyzing, 2-16 to 2-17 converting, 2-10 to 2-13, 2-19 defined, 2-9 lesson review, 2-30 to 2-31 drivers, Network Monitor, 3-5 Dynamic Bandwidth Control Using BAP Or BACP, 9-12 dynamic IP internetwork, 9-60 dynamic routing, vs. static routing, 9-18 to 9-19 dynamic updates DNS clients, 4-55 to 4-56 Kerberos and, 5-30 nonsecure dynamic updates, 5-79 performance counters and, 6-26 secure, 5-30 to 5-31 triggers, 5-30 zone configuration, 5-27 to 5-28 E EAP (Extensible Authentication Protocol) Protected EAP (PEAP), 10-72 EAP-MD5 CHAP (Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol), 10-10 to 10-13 EAP-RADIUS, 16-8 EAP-TLS (Extensible Authentication ProtocolTransport Level Security) defined, 10-9 encryption, 10-30 features/exam tips, 10-11 to 10-12 operating system support, 10-14 to 10-15 PPTP used with, 10-55 to 10-57 smart card authentication, 10-15 Edit Dial-In Profile dialog box, 10-17, 10-29 EKU (enhanced key usage) extensions, 10-58 Enable Automatic Scavenging Of Stale Records, DNS, 5-33, 5-53 Enable Broadcast Name Resolution, RRAS, 9-10 Enable Fragmentation Checking check box, RRAS, 9-36 Enable IP Router Manager check box, RRAS, 9-37 Enable Netmask Ordering, DNS, 5-46, 5-48 Enable Round Robin, DNS, 5-48, 5-50 Enable Router Discovery Advertisements check box, 9-37 encapsulation, 16-36 encryption 3DES, 10-31, 10-85 authentication protocols and, 10-9 to 10-10, 10-11, 10-13 Basic Encryption setting, 10-31 CHAP, 10-10 DES, 10-30, 10-85 EAP-MD5 CHAP, 10-10 EAP-TLS, 10-9, 10-72 MPPE, 10-31 MPPE 56-Bit, 10-31 MPPE 128-Bit, 10-31 MS-CHAP v1, 10-10 MS-CHAP v2, 10-10 No Encryption setting, 10-31 PAP, 10-10 PPP, 10-14 PPTP connections, 10-55 to 10-56 SPAP, 10-10 remote access policy profiles, 10-14 to 10-15, 10-30 types, 10-31 VPN, 10-47 Z02I622884.fm Page 12 Friday, March 31, 2006 1:20 PM I-12 Encryption tab, remote access policies Encryption tab, remote access policies, 10-14 to 10-15, 10-30 endpoint addressing, 9-38 Enforce Logon Restrictions setting, 16-16 enhanced key usage (EKU) extensions, 10-58 Enterprise Admins group, DHCP, 7-5, 7-52 event ID codes, DHCP server logs, 8-22 to 8-23 Event log, DNS accessing, 5-11 troubleshooting, 6-9 to 6-10 Event Logging tab, DNS server properties, 5-11 event logs DNS, 5-11, 6-9 to 6-10 IKE, 11-80 Kerberos at computer boot, 11-50 to 11-51 Kerberos at user logon, 11-48, 11-51 to 11-53 Kerberos monitoring, 11-58, 11-82 troubleshooting IPSec policies, 11-87 troubleshooting with, 11-79 to 11-80 Event Viewer address conflict warning, 8-28 to 8-29 DNS event logging, 5-11 troubleshooting DHCP, 8-34 to 8-35 exclusion ranges, DHCP leases, 7-8 to 7-9 Expires After text box, SOA tab, 5-34 Extensible Authentication Protocol. See EAP Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol. See EAP-MD5 CHAP Extensible Authentication Protocol-RADIUS, 16-8 Extensible Authentication Protocol-Transport Level Security. See EAP-TLS extranets, 16-2 F Fail On Load If Bad Zone data, DNS, 5-48 failover protection, DHCP, 13-20 fast transfer format, 5-47 fault tolerance, 9-26, 9-66 File and Printer Sharing For Microsoft Networks, 1-18 file names, zones, 5-27 File or Folder Access, auditing, 11-7 file system, security templates, 11-9 filter actions blocking, 11-71 overview of, 11-41 security associations, 11-42 filter lists blocking, 11-64 creating, 11-62, 11-67 Filter tab, DNS Events Properties dialog box, 6-10 filtered synchronization, 12-48 filters IP Filter Wizard, 11-68 IPSec policies, 11-41 to 11-42 peer filtering, RIP, 9-61 to 9-62, 16-35 Set IP Demand-Dial Filters command, 9-32 Task Manager, 12-5 See also packet filters firewalls Basic Firewall, 9-48, 9-50, 16-6 ICMP, 2-4 VPNs and, 16-50 Flags tab, Kerbtray, 11-55, 11-57 ForestDnsZones, 5-25 to 5-26 forwarders, DNS conditional, 5-7 to 5-8 disabling recursion, 5-8 to 5-9 interfaces, 5-4 overview of, 5-3 recursion and, 5-47 stub zones and, 5-70 when to use, 5-5 to 5-6 Forwarders tab, DNS server properties, 5-4 to 5-9 FQDNs (fully qualified domain names) defined, 4-68 Disable Recursion server option and, 5-46 to 5-47 multihomed host, 4-51 to 4-52 overview of, 4-16 to 4-17 partitions and, 5-25 to 5-26 fragmentation checking, RRAS, 9-37 Frame Viewer window, Network Monitor details pane, 3-10 hexadecimal pane, 3-10 overview of, 3-9 summary pane, 3-9 frames data capture, 3-8 defined, 3-3 IPX (NWLink) protocol, 1-17 full computer name, 4-5, 4-48 fully qualified domain names. See FQDNs Z02I622884.fm Page 13 Friday, March 31, 2006 1:20 PM infrastructure I-13 G I Gateway column, IP routing tables, 9-17 to 9-18 gateways comparing gateway addresses, 9-17 defaults, 2-13 IP addresses and, 2-33 IP routing tables and, 9-18 Generic Routing Encapsulation (GRE) header, 10-56 geographical domains, 4-13 Getmac utility, 8-33 Giaddr field, 8-30, 8-40 Globally Unique Identifier (GUID), 3-8, 3-37 glue chasing, 5-60 glue records, 5-60 Gpedit.msc, 12-37 Gpupdate command-line utility, 15-15, 15-16 Grant Remote Access Permission, 10-29 graphs, System Monitor, 6-25, 6-26 GRE (Generic Routing Encapsulation) header, 10-56 GUID (Globally Unique Identifier), 3-8, 3-37 IANA (Internet Assigned Numbers Authority), 2-12 IAS (Internet Authentication Service), 10-67 to 10-82 deploying as RADIUS server, 10-75 to 10-78 lesson review, 10-81 lesson summary, 10-81 to 10-82 overview of, 10-67 practice exercises, 10-78 to 10-81 RADIUS proxy scenarios, 10-73 to 10-75 RADIUS server scenarios, 10-67 to 10-70 troubleshooting lab, 10-83 ICANN (Internet Corporation for Assigned Names and Numbers), 4-13 to 4-14 ICMP (Internet Control Message Protocol) defined, 2-57 firewalls and, 2-4 overview of, 2-4 ICS (Internet Connection Sharing) dynamic DNS updates, 4-56 migrating clients for DHCP server, 7-14 to 7-16 NAT and, 9-48 private IP addresses and, 2-12 ID strings, 7-36 IDs, network, CIDR and, 2-9 host IDs and, 2-8 to 2-9 IP addresses and, 2-7, 2-9 subnet mask notations compared, 2-11 subnet masks and, 2-9 to 2-10 iesacls security template, 11-23 IIS (Internet Information Services), 9-41 securing intranet traffic with, 11-46 to 11-47 IKE (Internet Key Exchange) auditing, 11-80 IPSec connections, 11-42, 11-69 main mode, 11-42 quick mode, 11-42 security algorithms, 11-67 importing security templates, 11-27, 11-35 incremental zone transfer (IXFR) queries overview of, 5-38 to 5-39 performance counters, 6-26 infrastructure logical, 1-6 to 1-7 physical, 1-5 to 1-6 H header fields, DHCP, 8-6 to 8-7 Help And Support Center, 3-23 hexadecimal pane, Frame Viewer window, 3-10 hisecdc security template, 11-23 hisecws security template, 11-23 hops, routing, 9-18, 9-60 host (A) resource records default client update behavior, 4-59 dynamic updates, 5-30 to 5-31 multihomed computers, 5-48 netmask ordering, 5-48 overview of, 4-37 zone delegations, 5-59, 5-60 host capacity, network, 2-19 to 2-21 host IDs IP addresses and, 2-7 to 2-9 per subnet, 2-20 subnetting and, 2-34, 2-36 host names, 4-4, 14-1 host route, 9-15 Z02I622884.fm Page 14 Friday, March 31, 2006 1:20 PM I-14 infrastructure security, 1-11 to 1-13 update, 1-13 to 1-14 See also network infrastructure input filters, packet filtering advanced, 9-73 to 9-74 basic, 9-73 creating, 9-71 to 9-72 defined, 9-70 overview of, 9-70 Integrated Services Digital Network. See ISDN demand-dial links integrity, network security, 11-26, 11-40 interactive mode, Nslookup command-line options, 6-5 to 6-6 data types, 6-7 overview of, 6-3 to 6-5 practice exercise, 6-13 to 6-16 querying other name servers, 6-8 interfaces, demand-dial, 9-30 to 9-37 defined, 9-6 Dial-Out Hours command, 9-32 extranet/router-to-router VPNs, 10-49 to 10-50 IP routing, 9-35 to 9-37 NAT, 9-49 to 9-51 network interface properties, 9-32 to 9-34 overview of, 9-30 to 9-31 port and device properties, 9-33 to 9-34 Routing and Remote Access, 9-7 Set Credentials command, 9-32 Set IP Demand-Dial Filters command, 9-32 shortcut menu commands, 9-31 to 9-32 Unreachability Reason command, 9-32 interfaces, DNS server, 5-4 interfaces, network, 9-6 interfaces, router adding in RRAS console, 9-6 to 9-7 enabling DHCP Relay Agent on, 9-65 to 9-68 overview of, 9-6 Route command, 9-22 interfaces, RRAS adding, 9-6 to 9-7 configuring, 9-30 to 9-37 defined, 9-6 enabling routing protocols, 9-5 New Interface command, 9-60 shortcut menus, 9-31 to 9-32 intermittent problems, 12-3 Internet Assigned Numbers Authority (IANA), 2-12 Internet Authentication Service. See IAS (Internet Authentication Services) Internet Connection Sharing. See ICS (Internet Connection Sharing) Internet connectivity, 12-22 to 12-31 case scenario, 12-57 to 12-58 further reading, 17-5 identifying issues, 12-22 to 12-25 lesson review, 12-30 to 12-31 lesson summary, 12-31 name resolution issues, 12-22 to 12-25 network settings verification, 12-25 to 12-28 overview of, 12-22 practice exercise, 12-28 to 12-29 tested skills/suggested practices, 17-2 troubleshooting, 17-13 Internet Control Message Protocol (ICMP) defined, 2-57 firewalls and, 2-4 overview of, 2-4 Internet Corporation for Assigned Names and Numbers (ICANN), 4-13 to 4-14 Internet domain namespace, 4-13 to 4-14 Internet Information Services (IIS), 9-41 securing intranet traffic with, 11-46 to 11-47 Internet Key Exchange (IKE). See IKE (Internet Key Exchange) Internet layer, TCP/IP Network Monitor and, 3-12 overview of, 2-3 to 2-4 Internet Protocol (TCP/IP) Properties. See TCP/IP properties Internet Protocol Security (IPSec). See IPSec (Internet Protocol Security) Internet Service Providers (ISPs), 10-26 Intranets, 4-6 IP addresses APIPA and, 1-25 to 1-27 blocks, 2-7 to 2-31 decimal/binary notation, 2-7, 2-9 to 2-10, 2-16, 2-18 DHCP advantages, 7-3 Z02I622884.fm Page 15 Friday, March 31, 2006 1:20 PM IPSec, Quick Mode I-15 further reading, 13-8 gateways, 2-13 lesson review, 2-5, 2-30 overview of, 13-1 private, 2-12 public, 2-12 remote access, 9-10, 10-4, 10-6 to 10-7 resolving to host names, 6-3 to 6-4 scope configuration for, 7-7 to 7-8 structure, 2-7 to 2-11 subnets, 2-15 to 2-16 tested skills/suggested practices, 13-4 to 13-5 IP addresses, configuring, 2-32 to 2-53 automatically, 2-42 case scenario, 2-53 to 2-55 lesson review, 2-30 to 2-31 practice exercises, 2-59 to 2-60 IP addresses, troubleshooting, 13-31 to 13-38 answers, 13-35 to 13-38 further reading, 13-8 overview of, 13-31 tested skills/suggested practices, 13-5 to 13-6 IP Filter Wizard, 11-68 IP (Internet Protocol), RRAS and, 9-9 to 9-10 IP Router Manager, 9-37 IP routing general properties, 9-13 to 9-14 interface, 9-36 to 9-37 overview, 9-3 RRAS and, 9-13 to 9-14 IP Routing node, RRAS console, 9-6 to 9-7 general properties, 9-35 packet filters, 9-72 routing tables and, 9-16 using, 9-7 IP Routing Tables default route, 9-16 host route, 9-15 network route, 9-15 reading, 9-16 to 9-18 static and dynamic routing, 9-18 to 9-19 viewing, 9-16 IP Security Monitor (Ipsecmon) IPSec connections and, 11-42 monitoring IPSec with, 11-44, 11-73 Network Monitor and, 15-25 overview of, 15-25 practice exercises, 11-59 to 11-76 statistics, 11-43 to 11-44 troubleshooting IPSec policies, 11-80 to 11-81 Ipconfig, 1-21, 3-22 Ipconfig /all APIPA and, 1-25, 1-26 ARP and, 3-29 case scenario, 1-36 example, 3-22 DHCP server configuration, 7-14 to 7-15, 7-19 to 7-20 DHCP troubleshooting, 8-29, 8-30 overview of, 3-19 to 3-20 Ping and PathPing, 3-26 Ipconfig /displaydns, 4-58 Ipconfig /flushdns flushing DNS client cache, 4-58, 4-59 practice exercise, 4-9 Ipconfig /registerdns default client update behavior, 4-56 host (A) resource records and, 4-37 Ipconfig /release, 7-32, 8-14 Ipconfig /renew APIPA client migration, 7-14, 7-15 APIPA troubleshooting, 1-27 DHCP addresses, 8-29 DHCP leases, 8-4 subnet address changes, 7-32 Ipconfig /setclassid, 7-35 to 7-37 IPSec (Internet Protocol Security), 11-40 to 11-78 default policies, 11-43 establishing connections, 11-42 overview of, 11-41 to 11-42 security associations, 11-42 Security Monitor and, 11-43 to 11-44 See also L2TP/IPSec (Layer2 Tunneling Protocol/IP Security) IPSec policies, default, 11-43 IPSec, Quick Mode defined, 11-95 overview of, 11-42, 15-25 viewing IP statistics, 11-73 Z02I622884.fm Page 16 Friday, March 31, 2006 1:20 PM I-16 Ipsecmon Ipsecmon. See IP Security Monitor (Ipsecmon) IPX (NWLink) protocol, 1-17 IPX/SPX protocol, 1-9 to 1-10 ISDN (Integrated Services Digital Network) demanddial links overview of, 10-4 Q & A, 16-48, 16-50 ISPs (Internet Service Providers), 10-26 iteration (iterative queries), 4-16, 4-19, 5-47 secure, 5-7 IXFR (incremental zone transfer) queries overview of, 5-38 to 5-39 performance counters, 6-25 to 6-27 J Jetpack utility, 13-20 K KDC (Kerberos Key Distribution Center), 11-50 to 11-51, 11-53 Kerberos authorization and, 11-53 to 11-54, 15-1 boot up and, 11-48 to 11-50 dynamic updates and, 5-30 further reading, 15-5, 15-6 Kerbtray, 11-54 to 11-57 Klist, 11-57 to 11-58 monitoring network security, 15-25 Netdiag and, 11-58 to 11-59 NTLM and, 11-47, 11-50, 11-81 to 11-82 overview of, 11-47 to 11-48 practice exercises, 11-75 to 11-76 security paradigms, 11-6 tracking logon, 11-48 user logon and, 11-51 to 11-53 Kerberos Key Distribution Center (KDC), 11-50 to 11-51, 11-53 Kerbtray.exe, 11-47 to 11-50 Kerberos at user logon, 11-51 to 11-53 Kerberos authentication role, 11-47 overview of, 11-47 to 11-48 practice exercise, 11-75 to 11-76 tracking logon, 11-48 key exchange security methods, 11-42, 11-66 settings, 11-65 to 11-66 See also IKE (Internet Key Exchange) keys master key, 11-65, 11-67 preshared keys, 10-59, 10-64 Klist.exe Kerberos’ role in authentication, 11-54 overview of, 11-57 to 11-58 practice exercise, 11-76 tracking logon, 11-48 L L2TP/IPSec (Layer2 Tunneling Protocol/IP Security) applying, 10-57 to 10-58 computer certificates, 10-58 to 10-59 disabling connections, 10-59 encryption and, 10-31 lesson review, 9-66 lesson summary, 9-66 packet filtering, 9-74 PPTP vs., 10-56, 10-57 practice exercises, 10-63 to 10-66 preshared keys and, 10-59 VPN connections, 10-54 to 10-55 LAN routing, 9-3 to 9-29 case scenario, 9-75 to 9-77 lesson review, 9-28 lesson summary, 9-29 overview, 9-3 to 9-4 practice exercise, 9-27 routing tables, 9-15 to 9-19 RRAS. See RRAS scenarios, 9-19 to 9-20 static routes, 9-20 to 9-26 “layer 2” devices, 9-3 “layer 3” devices, 9-3 Layer2 Tunneling Protocol/IP Security. See L2TP/ IPSec layers, TCP/IP, 1-12, 2-3 to 2-5 application layer, 2-5 internet layer, 2-3 to 2-4 network interface layer, 2-3 transport layer, 2-4 to 2-5 LCP (Link Control Protocol) Extensions defined, 9-12 enabling, 10-25 LDAP (Lightweight Directory Access Protocol) Z02I622884.fm Page 17 Friday, March 31, 2006 1:20 PM Microsoft Web site information I-17 Kerberos at computer boot and, 11-48 to 11-49 SRV resource records and, 4-39 leases. See DHCP leases least privilege principle, 11-12 to 11-14 legacy programs, running, 15-19 Lightweight Directory Access Protocol. See LDAP limited broadcast addresses, 9-17, 9-18 Link Control Protocol. See LCP (Link Control Protocol) Extensions link state database, 9-63 loading, DNS zones Fail On Load If Bad Zone data, 5-46, 5-48 Load Zone Data On Startup, 5-46, 5-52 to 5-53 Local Area Connection Status dialog box, 8-33 local policies, security templates, 11-32 Local Security Policy, 11-8, 15-7 Local System account, 12-34 LocalNetPriority setting, 5-48 logging auditing. See audit logging, DHCP DNS servers, 5-11, 6-11 to 6-12 event logs, 12-12, 12-35 to 12-36 RRAS (Routing and Remote Access), 9-7 to 9-8, 9-13 logical infrastructure, 1-6 to 1-7 logon alerts, 12-9 auditing, 11-6 to 11-7, 11-80 rights, 12-35 to 12-36 to Windows, 10-7 tracking with Kerberos, 11-6, 11-48 to 11-49, 11-51 to 11-52 troubleshooting with Network Monitor, 11-79 to 11-80 unauthorized access, 11-6 VPN connections and, 10-62 to 10-63 Logon Events, auditing, 11-6 logs, performance actions, 12-12 to 12-14 alerts, 12-10 to 12-11 general properties, 12-11 to 12-12 lesson review, 12-20 schedules, 12-14 loopback addresses, 9-17 Ls command, Nslookup, 6-8, 6-9 Lserver command, Nslookup, 6-8 M MAC (Media Access Control) addresses overview of, 13-19 verifying for reservations, 8-33 mail exchanger (MX) resource records, 4-15, 4-35, 4-38 Main Mode node, IPSec defined, 11-95 IKE and, 11-42 practice exercises, 11-72, 11-73 management DHCP. See DHCP management DNS. See DNS management IP Router Manager, 9-37 IP routing, 16-29 to 16-35 IP security policies, 11-59 to 11-64 Netsh and, 10-78, 11-59, 11-69 to 11-72 remote access, 16-20 to 16-28 remote access clients, 10-40 to 10-41 master key, 11-65, 11-67 masters, defined, 4-32 Maximum Ports setting, 10-54, 10-59 Media Access Control. See MAC addresses Metric column, IP routing tables, 9-18 Microsoft Calculator. See Calculator Point-to-Point Encryption. See MPPE SMS (Systems Management Server), 12-17 Terminal Services, 1-13, 1-20 Web site information. See Web site information, Microsoft Windows Explorer, 4-7, 4-8 Microsoft Encyclopedia of Networking, Second Edition IP addressing, 13-7 name resolution, 14-4 Microsoft Network Monitor online help, 17-4 Microsoft Web site information IP addressing, 13-7 IPSec features for 2003, 11-41 Kerberos, 11-48 network infrastructure, 17-4 Registry settings, adding to security templates, 11-9 RRAS, 16-5 to 16-6 security templates, 11-5 to 11-6 Z02I622884.fm Page 18 Friday, March 31, 2006 1:20 PM I-18 Microsoft Windows 2000 Microsoft Windows 2000 DHCP leases, 8-3 DNS and, 4-6 replication, 5-26 to 5-27 zone transfers, 5-37 Microsoft Windows Components Wizard DHCP server installation, 7-4 DNS server installation, 4-26 Microsoft Windows NT 4 domains, 15-9, 15-11 to 15-14 Microsoft Windows Server 2003 Resource Kit, 17-5 security white paper, 11-23 Web Edition, 1-5 Microsoft Windows Server 2003, Online Help network infrastructure, 17-4 network security, 15-5 Routing and Remote Access, 16-5 to 16-6 Microsoft Windows Update accessing Catalog, 15-18 overview of, 15-18 Microsoft Windows XP, 15-2, 15-18 to 15-19 modems, 9-12, 9-16, 9-32, 9-34 monitoring, DNS server properties, 5-12 to 5-13 monitoring, network traffic case scenario, 12-57 to 12-58 counters, 12-6 DNS. See DNS monitoring further reading, 17-4 to 17-5 lesson review, 12-20 to 12-21 lesson summary, 12-21 Netstat, 12-14 to 12-16 Network Monitor. See Network Monitor Networking tab of Task Manager, 12-3 to 12-6 overview of, 17-6 to 17-7 Performance Console, 12-6 to 12-14 practice exercises, 12-18 to 12-20 tested skills/suggested practices, 17-2 to 17-4 MPPE (Microsoft Point-to-Point Encryption) defined, 10-85 encryption settings, 10-30 to 10-31 PPP connections, 10-14 PPTP connections, 10-55 MS-CHAP v1 authentication protocol defined, 10-10 encryption, 10-13 to 10-14 features/exam tips, 10-11 to 10-12 operating system support, 10-12 MS-CHAP v2 authentication protocol defined, 10-10 encryption, 10-13 to 10-14 features/exam tips, 10-11 to 10-12 operating system support, 10-12 Msconfig.exe (System Configuration utility), 17-24 multihomed computers, 1-34 Multibyte (UTF-8), 5-51 to 5-52 Multilink connections defined, 9-12 overview of, 9-11 remote access policies, 10-30 multinets defined, 7-51 overview of, 7-28 superscope supporting, 7-28 to 7-32 multipath IP internetwork, 9-60 mutual authentication, 16-36 MX (mail exchanger) resource records, 4-15, 4-35, 4-38 My Network Places, 4-3, 4-7 N NACK (negative acknowledgement) messages DHCP leases, 8-5 overview of, 8-12 to 8-14 superscopes, 7-31 Name Checking, DNS server properties, 5-51 to 5-52 name resolution computer names and, 4-4 to 4-5 disabling NetBIOS, 4-7 to 4-8 DNS vs. NetBIOS, 4-3 to 4-7 further reading, 14-3 to 14-4 Internet connection, 12-22 to 12-25 lesson review, 4-10 lesson summary, 4-10 to 4-11 name suffixes and, 4-4 to 4-5 overview of, 1-11 practice exercises, 4-9 procedures, 4-6 tested skills/suggested practices, 14-2 to 14-3 traffic, capturing with Nbstat, 4-9 Z02I622884.fm Page 19 Friday, March 31, 2006 1:20 PM network connections I-19 troubleshooting Internet connectivity, 12-22 to 12-25 troubleshooting lab, 4-65 to 4-66 See also DNS (Domain Name System) name resolution, NetBIOS capturing traffic, 4-9 defined, 1-11 disabling, 4-7 to 4-8 DNS vs. NetBIOS, 4-3 to 4-8 lesson review, 4-10 lesson summary, 4-10 to 4-11 Name Server resource records. See NS (Name Server) resource records name suffixes, 4-4 to 4-5 names, computer Disable Round Ordering option, 5-50 to 5-51 DNS clients, 4-48 Enable Netmask Ordering option, 5-46, 5-48 Enable Round Robin option, 5-50 overview of, 4-4 to 4-5 namespace DNS, 4-12 Internet domains, 4-13 to 4-14 private domains, 4-14 NAT (Network Address Translation) advantages, 13-6 case scenario, 9-75 to 9-77 configuring, 9-47 to 9-58 DHCP Relay Agent and, 9-67 ICS compared with, 9-48 incoming calls and, 9-49 to 9-50 lesson review, 9-57 to 9-58 lesson summary, 9-58 overview of, 1-11, 9-47 to 9-48 packet filters and, 9-71 practice exercises, 9-51 to 9-57 troubleshooting, 9-50 to 9-51 troubleshooting lab, 9-77 to 9-78 NBT Connection performance object, 12-8 negative acknowledgement messages. See NACK messages Neighbors tab, RIP Properties dialog box, 9-63 NetBIOS defined, 4-68 disabling, 4-7 to 4-8 DNS name resolution compared with, 4-3 to 4-7 NetBT (NetBIOS over TCP/IP), 1-9, 1-37 Netcap, 11-44 to 11-46 syntax, 11-45 Netdiag utility defined, 3-25 displaying IPSec information, 11-41 overview of, 3-25 practice exercise, 3-29 reloading SRV records, 4-39 to 4-40 tests, 3-26 verifying Kerberos with, 11-58 to 11-59 Netlogon.dns, 4-39, 4-40 Netmask column, IP routing tables, 9-17 netmask ordering, DNS, 5-9, 5-48 to 5-50 Netsh utility dynamic mode, 11-72 managing IPSec, 11-69 to 11-72 monitoring IPSec, 11-72 to 11-73 overview of, 7-25 to 7-27 practice exercises, 11-59 to 11-64 Show All command, 11-81 Show Gpoassignedpolicy command, 11-80 Show Mmsas All command, 11-72 Show Qmsas All command, 11-72 Netstat utility lesson review, 12-20 to 12-21 monitoring network traffic, 12-14 to 12-16 NetWare Network, 1-10, 1-17, 1-20 Network Address Translation. See NAT (Network Address Translation) network bridging, 12-57 network clients, 1-18 to 1-19 Network Connection Details dialog box, 8-33 network connections adding components to, 1-22 to 1-23 advanced settings, 1-19 to 1-21 APIPA, 1-25 to 1-29 automatically configured, 1-25 bridging, 1-30 to 1-32 configuring, 1-22, 1-23 to 1-32 default components, 1-17 overview of, 1-16 provider order, 1-20 to 1-21 TCP/IP settings, 1-32 to 1-34 viewing, 1-16 to 1-32 Z02I622884.fm Page 20 Friday, March 31, 2006 1:20 PM I-20 network counters network counters adding, 12-8 to 12-9 Performance console, 12-9 to 12-10 Task Manager, 12-8 to 12-9 Network Destination column, IP routing tables comparing gateway address with, 9-17 overview of, 9-17 Network Diagnostics defined, 3-23 Netdiag utility, 3-25 Netdiag tests, 3-25 to 3-26 overview of, 3-23 to 3-24 practice exercise, 3-29 to 3-30 network IDs CIDR and, 2-9 host IDs and, 2-8 to 2-9 IP addresses and, 2-7, 2-9 subnet mask notations compared, 2-11 subnet masks and, 2-9 to 2-10 network infrastructure, 1-5 to 1-14 Active Directory, 1-11 addressing, 1-10 case scenario, 1-35 to 1-36 certificates, 1-12 defining, 1-8 to 1-14 group policy, 1-12 to 1-13 lesson review, 1-14 to 1-15 lesson summary, 1-14 to 1-15 logical, 1-6 to 1-7 name resolution, 1-10 to 1-11 network clients, 1-18 network computer groups, 1-12 to 1-13 network connections, 1-16 to 1-23 network protocols, 1-17 network services, 1-18 to 1-19 physical, 1-5 to 1-6 public key and certificates, 1-12 remote access, 1-11 repair actions, 12-26 routing and Network Address Translation, 1-11 security, 1-11 to 1-13 update, 1-13 to 1-14 network infrastructure, maintaining case scenario, 12-57 to 12-58 configuring update infrastructure, 12-32 to 12-57 further reading, 17-4 to 17-5 monitoring network performance, 12-3 to 12-21 overview of, 17-1 to 17-2 tested skills/suggested practices, 17-2 to 17-4 troubleshooting Internet connectivity, 12-22 to 12-31 troubleshooting server services, 12-32 to 12-41 network interface layer, TCP/IP bridges, 9-3 Network Monitor and, 3-3 overview of, 2-3 to 2-4 network interfaces, RRAS adding, 9-6 to 9-7 configuring, 9-30 to 9-37 defined, 9-6 enabling routing protocols, 9-5 New Interface command, 9-60 shortcut menus, 9-31 to 9-32 Network Monitor, 3-3 to 3-21 administrative tool, 3-4 to 3-5 advanced features, 3-15 to 3-16 analyzing captured data, 3-8 to 3-10 analyzing DHCP messages, 8-5 to 8-6 capture window, 3-7 case scenario, 3-34 to 3-36 components, 3-4 to 3-5 data capture, 3-8, 3-16 DHCP Discover, 8-7 to 8-8 DHCP header fields, 8-6 to 8-7 DHCP messages, 8-5 to 8-7 DHCP NACK, 8-12 to 8-14 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 driver installation, 3-5 filters, 3-12 to 3-13 frames, 3-10 to 3-11, 3-16 installing, 3-4 to 3-5 interface, 3-6 to 3-7 lease renewal, 8-4 to 8-5 lesson review, 3-20 lesson summary, 3-20 to 3-21 “lite” and “full”, 12-17 to 12-18 Netcap and, 11-44 to 11-46 Z02I622884.fm Page 21 Friday, March 31, 2006 1:20 PM notation, dotted-decimal I-21 Online Help, 17-3 OSI (Open Systems Interconnection) model, 3-11 to 3-12 Overview of, 3-3 parsers, adding, 3-15 practice exercises, 3-16 to 3-19 Select A Network window, 3-6 to 3-7 troubleshooting IPSec policies, 11-80 to 11-81 troubleshooting logon, 11-81 to 11-82 usage scenarios, 3-14 to 3-15 versions of, 3-4 network performance. See monitoring, network traffic network prefix subnet masks converting between dotted-decimal and, 2-17 to 2-19 overview of, 2-17 network protocols IPSec. See IPSec (Internet Protocol Security) Kerberos. See Kerberos lesson review, 1-14 lesson summary, 1-15 monitoring with Network Monitor, 3-11 to 3-12 overview of, 1-8 to 1-10 security, 11-3 to 11-4 traffic capture, 11-41 to 11-42 viewing connection components, 1-17 to 1-20 network providers, Provider Order tab, 1-20 to 1-22 network route, 9-15 network security. See security network services, 1-8, 1-18 Network Shell utility (Netsh.exe). See Netsh utility Network Solutions, 4-14 networking components addressing, 1-10 case scenario, 1-35 to 1-36 connections, 1-16 to 1-32 lesson review, 1-14 lesson summary, 1-15 logical infrastructure, 1-6 to 1-7 name resolution, 1-10 to 1-11 network protocols, 1-8 to 1-10 physical infrastructure, 1-5 to 1-6 remote access, 1-11 routing, 1-11 security infrastructure, 1-11 to 1-13 update infrastructure, 1-13 to 1-14 networking, dial-up applying, 10-3 authentication, 10-13 to 10-17 client-side configuration, 10-13 to 10-17 practice exercises, 10-19 to 10-22 remote access authentication, 10-8 troubleshooting, 10-39 to 10-40 networking performance objects NBT Connection, 12-8 Network Interface, 12-8 RAS Port, 12-8 RAS Total, 12-9 Server, 12-9 TCPv4, 12-8 TCPv6, 12-8 Networking Services component, 1-12 New Technology Local Area Network Manager (NTLM) Kerberos and, 11-47, 11-50, 11-81 to 11-82 protocol, 16-8 no-refresh intervals, 5-32 Nodebug option, Nslookup, 6-5 Nominet, 4-14 Non RFC name-checking method, 5-52 None dynamic updates, 5-27 noninteractive mode, Nslookup, 6-3 to 6-4 nonsecure dynamic updates, 5-27 notation, binary, 2-7, 2-9 to 2-10, 2-16, 2-18 converting manually, 2-9 to 2-10 converting with calculator, 2-18 defined, 2-7 exercise converting, 2-18 to 2-19, 2-60 notation, decimal converting manually, 2-10 to 2-13 converting with calculator, 2-13 defined, 2-9 exercise converting, 2-18 to 2-19 lesson review, 2-19 to 2-20 notation, dotted-decimal analyzing, 2-16 to 2-17 converting, 2-10 to 2-13, 2-19 defined, 2-9 lesson review, 2-30 to 2-31 Z02I622884.fm Page 22 Friday, March 31, 2006 1:20 PM I-22 notification settings, zone transfers notification settings, zone transfers overview of, 5-36 to 5-37 performance counters, 6-29 to 6-30 practice exercise, 5-38 to 5-39 NS (Name Server) resource records configuring, 5-35 to 5-36 zone delegations and, 5-58 Nslookup utility, 6-3 to 6-8 data types, 6-7 defined, 6-3 interactive mode, 6-4 to 6-5 noninteractive mode, 6-3 to 6-4 options, 6-5 to 6-6 overview of, 6-3 practice exercises, 6-12 to 6-16, 6-34 querying other name server, 6-8 Set All command, 6-5 to 6-6 Set Querytype (set q) command, 6-7 Set Type command, 6-7 troubleshooting Internet connectivity, 12-23 viewing zone data, 6-8 NTLM (New Technology Local Area Network Manager) Kerberos and, 11-47, 11-50, 11-81 to 11-82 protocol, 16-8 NWLink protocol. See IPX (NWLink) protocol O Online Help network infrastructure, 17-3 Network Monitor, 17-3 network security, 15-4 Routing and Remote Access, 16-8 to 16-9 Open Shortest Path First. See OSPF (Open Shortest Path First) routers Open Systems Interconnection (OSI) model, 3-11 to 3-12 options classes, 7-35 to 7-37 organizational domains, 4-13 OSI (Open Systems Interconnection) model, 3-11 to 3-12 OSPF (Open Shortest Path First) routers areas, 9-64 lesson review, 9-68 to 9-69 overview of, 9-63 to 9-64 RIP and, 9-63 to 9-64 routing, 9-18 to 9-20, 9-26, 9-59, 16-1, 16-29 output filters, packet filtering, 9-37 basic, 9-73 creating, 9-71 to 9-72 defined, 9-70 Owner field, resource records, 4-36 P packet filters, 9-37, 9-71 to 9-77, 10-52 advanced, 9-73 to 9-74 basic, 9-73 to 9-74 case scenario, 9-75 to 9-77, 9-84 to 9-85 creating, 9-71 to 9-72 defined, 9-70 IP Routing properties, 9-37 lesson review, 9-76 to 9-77 mixed VPNs with firewall and, 10-52 overview of, 9-70 remote access policies and, 9-72 review of, 16-20 Routing and Remote Access console and, 9-72 Pages/Sec counter, Performance console, 12-7 PAP (Password Authentication Protocol) defined, 10-10 exam highlights, 10-11 to 10-12 operating systems supported, 10-12 to 10-13 security and, 10-14 to 10-15 parsers adding to Network Monitor, 3-15 defined, 3-35 partitions, Active Directory–integrated zones, 6-21 to 6-22 Password Authentication Protocol. See PAP (Password Authentication Protocol) PathPing utility, 3-26 to 3-27 defined, 3-37 overview of, 3-26 to 3-27 troubleshooting Internet connectivity, 12-23 Tracert compared to, 3-28 Pause button, zone status, 5-22 PEAP (Protected EAP), 16-10, 16-12, 16-17 peer filtering, RIP, 9-61 perfmon.exe command, 12-8 Performance console, 12-7 to 12-14 alerts, 12-10 to 12-14, 12-19 to 12-20 general properties, 12-11 to 12-12 Z02I622884.fm Page 23 Friday, March 31, 2006 1:20 PM PPP (Point-to-Point Protocol) I-23 lesson review, 12-20 NBT Connection object, 12-9 network counters, 6-26, 12-9 Network Interface object, 12-9 Pages/Sec counter, 12-8 RAS Port performance object, 12-9 to 12-10 starting, 12-8 System Monitor in, 6-25 Task Manager and, 12-8, 12-10 See also monitoring, network traffic performance counters % Processor Time, 12-8 Average Disk Queue Length, 12-8 AXFR (all zone transfer) queries, 6-26 DNS, 6-26 to 6-27 IXFR (incremental zone transfer) queries, 6-26 list, 6-26 to 6-27 Total Query Received, 6-27 Total Response Sent, 6-27 Performance Logs and Alerts actions, 12-12 to 12-14 alerts, 12-10 to 12-11 general properties, 12-11 to 12-12 lesson review, 12-20 schedules, 12-14 performance objects, networking NBT Connection, 12-8 Network Interface, 12-8 RAS Port, 12-8 RAS Total, 12-9 Server, 12-9 TCPv4, 12-8 TCPv6, 12-8 peripheral routers, 9-26 permissions DHCP server authorization, 7-5 least privilege principle, 11-12 to 11-14 remote access, 10-24 to 10-25 persistent connections, NAT configuration, 9-48 physical infrastructure, 1-5 to 1-6 physical topology, 2-34 to 2-35 PIDs (Process Identifiers), 12-15 to 12-16 Ping Capture, 3-18 to 3-19 Ping utility output, 3-18 overview of, 3-26 to 3-27 troubleshooting Internet connectivity, 12-22 to 12-23 PKI (Public Key Infrastructure), 1-12, 1-13 Point-to-Point Protocol (PPP) dial-up networking and, 10-4 encryption, 10-14 PPP tab, RRAS, 9-12 to 9-14 See also MPPE (Microsoft Point-to-Point Encryption) Point-to-Point Tunneling Protocol. See PPTP (Pointto-Point Tunneling Protocol) pointer (PTR) resource records configuring Dynamic DNS updates, 4-55 to 4-56 default client update behavior, 4-56 defined, 4-30 FQDNs and, 4-52 overview of, 4-39 policies account policies, 11-23 authorization scenarios, 10-32 to 10-37 blocking policies, 11-60 to 11-64 connection request policies, 10-73 to 10-75, 10-87 local policies, 11-32 See also IPSec policies; remote access policies ports configuring PPTP on VPN server, 10-56 to 10-57 configuring VPNs, 10-54 to 10-65 demand-dial, 9-34 to 9-35 L2TP/IPSec connections and, 10-57 to 10-59 Maximum Ports setting, 10-54, 10-59 packet filtering, 9-73 to 9-75 Port Status dialog box, 9-35 RADIUS servers, 10-76 RAS Port performance object, 12-8 TCP, 2-4 UDP, 2-5 positive answer, 4-21 Post-Setup Security Updates (PSSU), 11-28 Power Users group, 15-19 Powers of 2, 2-14 to 2-15 PPP (Point-to-Point Protocol). See also MPPE (Microsoft Point-to-Point Encryption) dial-up networking and, 10-4 encryption, 10-14 PPP tab, RRAS, 9-12 to 9-14 Z02I622884.fm Page 24 Friday, March 31, 2006 1:20 PM I-24 PPTP (Point-to-Point Tunneling Protocol) PPTP (Point-to-Point Tunneling Protocol) overview of, 10-56 to 10-56 packet filtering and, 9-74 to 9-75 PPTP-type VPN connections, 10-57, 10-64 VPN clients, 10-56 to 10-57 VPN servers, 10-56 predefined security templates, 15-7 preferences, IP Routing, 9-15 to 9-16 preshared keys, 10-59, 10-64 primary DNS suffix configuring, 4-56 DNS clients, 4-54 overview of, 4-5 search lists, 4-54 to 4-55 setting, 4-50 primary domain name, 4-5 primary servers migrating, 5-23 notification, 5-38 to 5-39 Primary Server text box, SOA tab, 5-34 secondary zones and, 4-32 zone transfer initiation, 5-38 to 5-39 primary zones overview, 4-31 reconfiguring zones as, 5-22 standard, 4-33 zone transfers and, 5-37, 5-38 principle of least privilege, 11-12 to 11-14 printer sharing, 1-9, 1-14 private domain namespace, 4-14 private IP addresses configuring TCP/IP addressing, 13-6 local names resolved to, 14-1 overview of, 2-12, 16-20 private networks ICS. See ICS (Internet Connection Sharing) NAT. See NAT (Network Address Translation) overview of, 16-36 Process Identifiers (PIDs), 12-15 to 12-16 Processes tab, Task Manager, 12-15 to 12-16 profiles, remote access policies, 10-29 to 10-30 properties demand-dial, 9-31 devices, 9-34 to 9-35 DHCP Relay Agent, 9-68 IP addresses. See IP addresses, configuring IP routing, 9-14 to 9-16 network interfaces, 9-32 to 9-34 ports, 9-34 to 9-35 user account dial-in, 10-23 to 10-26 zone. See zone properties properties tabs, DNS server, 5-3 to 5-13 advanced, 5-9 debug logging, 5-11 event logging, 5-11 forwarders, 5-4 to 5-9 interfaces, 5-4 monitoring, 5-12 root hints, 5-10 to 5-11 security, 5-13 Protected EAP (PEAP), 16-10, 16-12, 16-17 protocols, authentication CHAP, 10-10 to 10-13 choosing, 10-9 to 10-10 configuring client side, 10-12 to 10-15 configuring server side, 10-16 to 10-18 EAP, 16-8, 16-16 to 16-17 EAP-MD5 CHAP, 10-10 to 10-13 EAP-TLS, 10-9 to 10-13, 10-16 to 10-17, 10-58, 10-87 features of, 10-11 to 10-12 MS-CHAP v1, 10-10 to 10-13, 10-15 MS-CHAP v2, 10-10 to 10-13, 10-15, 16-16 to 16-17, 16-39, 16-45 operating system support, 10-12 to 10-13 PAP, 10-10, 10-11 to 10-15 RADIUS, 10-8, 10-26 to 10-27, 10-32, 10-38, 10-67 to 10-81 SPAP, 10-10, 10-11 to 10-14 unauthenticated access, 10-10 protocols, network IPSec. See IPSec (Internet Protocol Security) Kerberos. See Kerberos lesson review, 1-14 monitoring with Network Monitor, 3-11 to 3-12 overview of, 1-8 to 1-10 security, 11-3 to 11-4 traffic capture, 11-41 to 11-42 viewing connection components, 1-17 to 1-20 protocols, routing, 9-59 to 9-69 Z02I622884.fm Page 25 Friday, March 31, 2006 1:20 PM remote access, authentication I-25 adding and configuring, 9-59 to 9-60 defined, 9-59 deploying over VPNs, 10-51 DHCP Relay Agent, 9-65 to 9-68 exam highlights, 9-80 to 9-81 lesson review, 9-69 multiple-routers and, 9-21 New Routing Protocol command, 9-59 New Routing Protocol dialog box, 9-67 OSPF overview, 9-63 to 9-64 RIP, 9-60 to 9-63 provider order, network connections, 1-20 PSSU (Post-Setup Security Updates), 11-28 PSTN (Public Switched Telephone Network), 10-4 PTR resource records. See pointer (PTR) resource records public IP addresses, 2-12 public key cryptography, certificates and, 1-12 Public Key Infrastructure (PKI), 1-12, 1-13 Public Switched Telephone Network (PSTN), 10-4 Q QuadA (AAAA) IPv6 records, 14-1 queries, IXFR (incremental zone transfer) overview of, 5-38 to 5-39 performance counters, 6-25 to 6-27 query, recursive, 4-68, 6-33 query response types authoritative answer, 4-21 negative answer, 4-22 positive answer, 4-21 referral answer, 4-21 to 4-22 Quick Mode, IPSec defined, 11-95 overview of, 11-42, 15-25 viewing IP statistics, 11-73 R RADIUS (Remote Authentication Dial-In User Service) configuring, 10-75, 10-77 to 10-78 defined, 10-85 deploying, 10-78 to 10-79 IAS, 10-75 to 10-78 lesson summary, 10-81 to 10-82 practice exercises, 10-78 to 10-81 proxies, 10-73 to 10-75 remote access authentication, 10-8 to 10-10 remote access policies, 10-26 to 10-27 scenarios, 10-67 to 10-72 Send RADIUS Accounting On and Accounting Off Messages, 10-77 server groups, 10-73 servers, 10-76, 10-77 settings, 10-32 specifying clients, 10-76 to 10-78 support for WPS, 10-72 RAS Port performance object, 12-8 RAS (remote access servers) access beyond, 10-38 to 10-40 authentication. See remote access, authentication configuring Windows Server 2003 as, 16-1 RAS Total performance object, 12-9 RDATA field, 4-36 rebinding state, DHCP lease renewal, 8-5 Reconcile All Scopes dialog box, 8-34 Reconcile dialog box, 8-34 recovery options, 12-34 to 12-38, 12-39 to 12-40 recursion configuring DNS server, 4-60 to 4-62 defined, 4-68, 5-80 disabling, 5-8 to 5-9 overview of, 4-19 recursive query, 4-68 redirection, 14-22, 14-27 referral answer, 4-21 referrals, 5-47 refresh intervals modifying, 5-32 no-refresh, 5-32 Refresh Interval box, SOA tab, 5-34 registered IP addresses, 14-1 Registry APIPA and, 1-25 security templates, 11-7, 11-9 Registry Key Access, auditing, 11-7 Relay Agent. See DHCP Relay Agent remote access, authentication, 10-7 to 10-18 case scenario, 10-82 to 10-83, 10-88 client-side protocols, 10-13 to 10-17 Z02I622884.fm Page 26 Friday, March 31, 2006 1:20 PM I-26 remote access, authentication lesson review, 10-22, 16-7 to 16-8 overview of, 10-7 to 10-8 practice exercises, 10-19 to 10-22 protocols, 10-10 to 10-13 server-side protocols, 10-17 to 10-19 through RADIUS, 10-8 to 10-9 remote access, authorization, 10-23 to 10-46 access beyond remote access server, 10-38 to 10-40 Allow Access setting, 10-24 to 10-25, 10-29 case scenario, 10-82 to 10-83 lesson review, 10-45 to 10-46 lesson summary, 10-46 managing clients, 10-40 to 10-41 practice exercises, 10-41 to 10-45 remote access policies, 10-26 to 10-32 scenarios, 10-32 to 10-37 troubleshooting, 10-37 to 10-38 user dial-in properties, 10-23 to 10-26 remote access, configuring dial-up networking, 10-3 to 10-4 IP address assignments, 10-4 to 10-5 private networks, 16-36 to 16-40 remote client addressing, 10-4 to 10-7 troubleshooting client access to, 16-41 to 16-51 troubleshooting RRAS routing, 16-47 to 16-51 Remote Access Connection Manager, 12-33 to 12-34 remote access, connections, 1-11 remote access policies authorization scenarios, 10-32 to 10-37 client management, 10-40 to 10-41 conditions, 10-27 to 10-28 configuring, 16-1 creating, 10-42 to 10-44 defined at server, 10-32 extranet/router-to-router VPNs, 10-49 to 10-50 overview of, 10-26 to 10-27 permissions, 10-29 PPTP configuration on VPN server, 10-56 to 10-57 profiles, 10-29 to 10-32 Remote Access Policies node, RRAS, 10-17 removing, 10-26 Select Attribute dialog box, 10-27 to 10-28 remote access servers (RAS) access beyond, 10-38 to 10-40 authentication. See remote access, authentication configuring Windows Server 2003 as, 16-1 Remote Authentication Dial-In User Service. See RADIUS (Remote Authentication Dial-In User Service) renewal process, DHCP leases, 8-4 to 8-5 Repair button, 8-29 Repair feature, DHCP servers, 12-25 to 12-27 replica, defined, 6-33 replication directory partitions and, 5-25 to 5-26 overview of, 5-23 to 5-26 zone, 5-24 to 5-25 Replication Monitor (replmon.exe) Active Directory–integrated zones, 6-21 to 6-24 lesson review, 6-28 overview, 6-20 to 6-21 Request for Comments. See RFCs (Request for Comments) Request Security, IPSec, 11-43 Require Security, IPSec, 11-43 Réseaux IP Européens (RIPE NCC), 2-12 reservations, DHCP creating, 7-10 to 7-11 New Reservation dialog box, 7-10 to 7-11 options for, 7-12 to 7-13 verifying, 8-33 resolver, DNS, 4-15 Resource Kit, Microsoft Windows Server 2003, 17-3 resource records alias (CNAME), 4-15, 4-22, 4-35, 4-37 to 4-38 CNAME (alias), 4-15, 4-22, 4-35, 4-37 to 4-38 creating, 4-35 to 4-40 defined, 4-15 DNS console, 4-35 to 4-40 formats, 4-36 host (A), 4-37, 4-59, 5-30 to 5-31, 5-48, 5-59, 5-60 mail exchanger (MX), 4-15, 4-35, 4-38 name server (NS), 5-35 to 5-36, 5-38 netmask ordering, enabling, 5-48 to 5-50 Owner field, 4-36 pointer (PTR), 4-30, 4-32, 4-52, 4-55 to 4-56 root hints, 4-19 scavenging stale, 5-32 to 5-33 service location (SRV), 5-15 to 5-18 Z02I622884.fm Page 27 Friday, March 31, 2006 1:20 PM routing protocols I-27 start-of-authority (SOA), 4-35, 5-33 TTLs for, 5-34 to 5-35 types, 4-36 to 4-40 verification, 5-15 to 5-18 restricted groups, security templates, 11-9 Resultant Set of Policy (RSoP), 11-4, 11-5, 11-44, 11-80 retry intervals, SOA, 5-32 reverse domains, 4-13 reverse lookups, Nslookup, 6-4 RFCs (Requests for Comments) DNS names (RFC 1123), 4-49 IPSec, 11-41 Kerberos, 11-47 Non RFC name-checking method, 5-52 router compliance (RFC 1542), 7-27, 9-65 RIP (Routing Information Protocol), 9-58 to 9-71 advantages/disadvantages, 9-60 authentication, 9-61 configuring neighbors, 9-63 configuring routing tables, 16-1 deploying over VPNs, 10-51 environment, 9-60 lesson review, 9-68 to 9-69 lesson summary, 9-69 metric for, 9-19 neighbors, 9-63 OSPF vs., 9-64 to 9-65 peer filtering, 9-61 route filtering in, 9-62 security and, 9-61 static routing and, 9-27 RIPE NCC (Réseaux IP Européens), 2-12 Riveset-Shadmir Adleman (RSA RC4), 10-30 rogue servers defined, 7-50 detection, 3-15 troubleshooting Internet connectivity, 12-27 root domains, 4-23, 4-70 root hints DNS server properties, 5-10 overview of, 4-19 rootsec security template, 11-23 round robin, DNS, 5-50 Route command, 9-25 route filtering, RIP, 9-62 router discovery, 9-37 router-to-router VPNs overview of, 10-49 to 10-51 troubleshooting, 10-52 to 10-54 routers called, 9-38 calling, 9-38 default gateways, 2-13 overview of, 16-20 peripheral, 9-26 solicitations, 9-37 routing demand-dial. See demand-dial routing LAN. See LAN routing loops NAT. See NAT (Network Address Translation) network infrastructure and, 1-11 overview of, 9-4 packet filters. See packet filters preferences, 16-29 to 16-35 protocols. See protocols, routing remote access, 9-4 to 9-13 remote DHCP servers and, 7-27 TCP/IP, 16-29 to 16-35 troubleshooting RRAS, 16-47 to 16-51 Routing and Remote Access. See RRAS (Routing and Remote Access) Routing Information Protocol. See RIP (Routing Information Protocol) routing, LAN, 9-3 to 9-29 case scenario, 9-75 to 9-77 lesson review, 9-28 lesson summary, 9-29 overview of, 9-3 to 9-4 practice exercise, 9-27 routing tables, 9-15 to 9-19 RRAS. See RRAS scenarios, 9-19 to 9-20 static routes, 9-20 to 9-26 routing protocols, 9-59 to 9-69 adding and configuring, 9-59 to 9-60 defined, 9-59 deploying over VPNs, 10-51 DHCP Relay Agent, 9-65 to 9-68 exam highlights, 9-80 to 9-81 Z02I622884.fm Page 28 Friday, March 31, 2006 1:20 PM I-28 routing protocols lesson review, 9-69 multiple-routers and, 9-21 New Routing Protocol command, 9-59 New Routing Protocol dialog box, 9-67 OSPF overview, 9-63 to 9-64 RIP, 9-60 to 9-63 routing tables default route, 9-16 host route, 9-15 network route, 9-15 reading, 9-16 to 9-18 static and dynamic routing, 9-18 to 9-19 viewing, 9-16 routing tables, columns gateway, 9-17 to 9-18 interface, 9-18 metric, 9-18 netmask, 9-17 network destination, 9-17 RRAS (Routing and Remote Access) authentication. See remote access, authentication authorization. See remote access, authorization broadcast name resolution, 9-9 to 9-10 clients vs. routers, 9-37 configuring. See remote access, configuring defined, 9-3 demand-dial interfaces, 9-30 to 9-37 demand-dial routing and, 9-41 to 9-44 enabling, 9-5 further reading, 16-5 to 16-7 IAS deployment. See IAS (Internet Authentication Service) IP addresses, 9-9, 10-4 to 10-5 IP (Internet Protocol) and, 9-9 to 9-10 IP Routing, 9-13 to 9-14 IP routing properties, 9-13 to 9-15 lesson review, 16-1 to 16-2 logging, 9-12 managing, 16-20 to 16-28 Microsoft Windows Server 2003, 16-8 to 16-9 overview of, 9-4 to 9-5 PPP and, 9-10 to 9-12 practice exercise, 9-27 to 9-28 private networks and, 16-36 to 16-40 properties, 9-7 to 9-12 routing tables, 9-16 to 9-20 Static Address Pool option, 9-9 static routing, 9-24 TCP/IP routing, 16-29 to 16-35 tested skills/suggested practices, 16-2 to 16-4 troubleshooting, 16-41 to 16-51 VPNs. See VPNs (virtual private networks) RRAS (Routing and Remote Access), console adding network interfaces, 9-6 to 9-7 configuring access beyond remote access server, 10-38 to 10-40 demand-dial properties, 9-31 DHCP Relay Agents, 9-67 to 9-68 IP Routing interface properties, 9-37 IP Routing node, 9-71 to 9-72 Network Interfaces node, 9-32 overview of, 9-7 to 9-10 packet filters, 9-71 to 9-72 RADIUS authentication, 10-8 to 10-10 RADIUS clients, 10-75 RADIUS servers, 10-76 to 10-77 remote access clients, 10-40 to 10-41 remote access policies, 10-26 to 10-32 routing protocols, 9-59 to 9-60 routing protocols over VPNs, 10-51 to 10-52 server side authentication, 10-16 to 10-18 RSA RC4 (Riveset-Shadmir Adleman), 10-30 RSoP (Resultant Set of Policy), 11-4, 11-5, 11-44, 11-80 Run As shortcut menu, 1-4 Runas command, 1-4 S Safe Mode With Command Prompt, 17-21, 17-23 SAM (Security Accounts Manager), 10-8 Save To File feature, Network Diagnostics, 3-25 scavenging overview of, 5-31 to 5-32 performing, 5-33 stale records, 5-32 Sc.exe (Service Controller utility), 17-22, 17-24 schedules, Performance Logs and Alerts, 12-15 schema, defined, 6-33 scopes, 7-6 to 7-11 80/20 rule, 7-9 to 7-10 Activate menu command, 7-14 Z02I622884.fm Page 29 Friday, March 31, 2006 1:20 PM security, RRAS I-29 activating, 7-13 configuring, 7-6 to 7-11 deactivating, 7-13 DHCP options, 7-12 exclusion ranges, 7-8 to 7-9 IP address range, 7-7 to 7-8 lesson review, 7-20 to 7-21 New Scope Wizard, 7-6 to 7-7 obtaining address from incorrect, 8-30 overview of, 7-6 to 7-7 reconciling, 8-35 redeployment, 8-29 reservations, 7-10 to 7-11 Scope Options dialog box, 7-12 subnet addresses and, 7-32 troubleshooting DHCP client, 8-29 to 8-30 verifying, 8-31 to 8-33 Secedit, 15-7 secondary servers notification/zone transfer initiation, 5-38 to 5-39 secondary zones defined, 5-23 zone transfers and, 5-37 Secret field, RADIUS servers, 10-76 Secure Cache Against Pollution, DNS server properties, 5-51 secure dynamic updates, overview of, 5-30 to 5-31 Secure Sockets Layer. See SSL (Secure Sockets Layer) securedc, security templates, 11-23 security advanced settings, 10-13 to 10-17 DHCP servers, 7-4, 7-5 dial-back security, 13-32, 13-35 disabling NetBIOS and, 4-7 to 4-8 further reading, 15-5 Group Policy settings, 15-7 group policy and, 11-3 to 11-12 IKE algorithms, 11-67 infrastructure, 1-11 to 1-13 key exchange, 11-42, 11-65 to 11-66 locked-down packet filtering, 9-73 to 9-74 Microsoft Windows Server 2003, 15-5 Microsoft Windows Server 2003 white paper, 11-23 network interfaces, 9-33 network protocol. See network protocols overview of, 15-1 to 15-2 RAS servers and, 16-1 RIP properties, 9-60 to 9-62 software updates, 15-18 to 15-21 tested skills/suggested practices, 15-3 to 15-5 Security Accounts Manager (SAM), 10-8 security administration group policy and, 11-3 to 11-12 lesson review, 11-37 to 11-38 lesson summary, 11-38 to 11-39 network security protocols, 11-3 to 11-4 overview of, 15-7 to 15-8 practice exercises, 11-29 to 11-37 principle of least privilege, 11-12 to 11-14 security templates, 11-21 to 11-29 Security Configuration and Analysis snap-in monitoring compliance with, 11-24 to 11-25 overview of, 11-3 practice exercises, 11-29 to 11-37 secure networks, 15-7 Security Configuration Wizard, 11-26 to 11-27 security event logs Kerberos at computer boot, 11-48 to 11-50 Kerberos at user logon, 11-51 to 11-53 Kerberos in use, 11-48 troubleshooting IPSec policies, 11-43 to 11-44 security, network group policy and, 11-3 to 11-12 least privilege, 11-12 to 11-14 lesson review, 11-37 to 11-38 lesson summary, 11-38 to 11-39 practice lessons, 11-29 to 11-37 protocol, 11-40 to 11-76 PSSU, 11-28 Security Configuration Wizard, 11-26 to 11-27 templates and, 11-21 to 11-26 Windows Firewall, 11-27 security, RRAS client side authentication protocols, 10-12 to 10-15 DNS servers, 5-13 overview of, 9-8 to 9-10 RADIUS clients, 10-67 to 10-72 server side authentication protocols, 10-16 to 10-18 Z02I622884.fm Page 30 Friday, March 31, 2006 1:20 PM I-30 Security Settings node Security Settings node Account Lockout Policy, 11-6 Audit Policy, 11-6 Kerberos Policy, 11-6 Password Policy, 11-6 security templates, 11-21 to 11-29 baselines, 11-22 to 11-23 list of, 11-23 to 11-24 monitoring compliance, 11-24 to 11-25 network security and, 11-25 to 11-26 snap-in and, 11-22 Select Network Component Type dialog box, 1-22 to 1-23 semicolon (;), 4-36 Serial Line Internet Protocol (SLIP), 16-42, 16-45 Serial Number text box, SOA tab, 5-33 to 5-35 Server command, Nslookup, 6-8 Server Message Block (SMB). See SMB (Server Message Block) protocol server services, 12-32 to 12-41 dependency options, 12-32 to 12-34 further reading, 17-3 lesson review, 12-40 to 12-41 overview of, 17-20 practice exercises, 12-39 to 12-40 recovery options, 12-34 to 12-38 tested skills/suggested practices, 17-2 servers DHCP. See DHCP servers DNS. See DNS servers primary, 4-32, 5-34, 5-38, 5-86 RADIUS, 10-73, 10-76, 10-77 RAS, 10-38 to 10-40, 16-1 rogue, 3-15, 7-50, 12-27 secondary, 5-23, 5-33, 5-38 to 5-39 slave, 5-9 Service Controller utility (Sc.exe), 17-22, 17-24 service dependencies configuring, 12-38 to 12-39 overview of, 12-32 to 12-33 service location (SRV) resource records overview of, 4-39 to 4-40 verifying for Active Directory in DNS, 5-15 to 5-18 services. See network services Services console DHCP server status, 7-24 to 7-25 migrating DHCP server, 7-34 Services node, Computer Management console, 12-32 to 12-33 session ticket, 11-88 Set All command, Nslookup, 6-5 to 6-6 Set command, options available with, 6-6 Set Credentials command, demand-dial interface, 9-32 Set IP Demand-Dial Filters command, demand-dial interface, 9-32 Set Querytype (set q) command, Nslookup, 6-7 Set Type command, Nslookup, 6-7 Shared Secret authentication, 11-104 Shiva Password Authentication Protocol (SPAP) defined, 10-10 operating system support, 10-12 shortcut menu commands, demand-dial interfaces, 9-31 to 9-32 Shortest Path First (SPF) algorithm, 9-63 Show All command, Netsh utility, 11-81 Show Gpoassignedpolicy command, Netsh utility, 11-80 Show Mmsas All command, Netsh utility, 11-72 Show Qmsas All command, Netsh utility, 11-72 Shutdown /i command, DHCP leases, 8-29, 8-37 slave servers, 5-9 slave zones, 5-9 SLIP (Serial Line Internet Protocol), 16-42, 16-45 smart cards EAP-TLS authentication protocol and, 10-15 to 10-16 Use Smart Card setting, 10-15 to 10-16 SMB (Server Message Block) protocol CIFS as extension of, 1-9, 1-37 Network Monitor and, 3-12 SMS (Systems Management Server), 12-17 snap-ins Add/Remove Snap-In dialog box, 11-30 Add Standalone Snap-Ins dialog box, 11-30, 11-60 IP security, 11-43 to 11-44, 11-60 to 11-64 RSoP, 11-4 Security Configuration And Analysis, 11-25 Security Templates, 11-22, 11-24, 11-29 SOA (start-of-authority) record Z02I622884.fm Page 31 Friday, March 31, 2006 1:20 PM supernetting I-31 configuring, 5-33 to 5-35 new zones and, 4-35 Software Update Services (SUS), 15-18 to 15-19 software updates, 15-18 to 15-21 solicitations, router, 9-37 SPAP (Shiva Password Authentication Protocol) defined, 10-10 operating system support, 10-12 SPF (Shortest Path First) algorithm, 9-63 split horizon, 16-30, 16-33 SRV (service location) resource records overview of, 4-39 to 4-40 verifying for Active Directory in DNS, 5-15 to 5-18 SSL (Secure Sockets Layer), 1-12 stack, TCP/IP, 1-17 standard primary zones, 4-32 to 4-33 start-of-authority (SOA) record configuring, 5-33 to 5-35 new zones and, 4-35 static IP addresses applyng, 10-25 creating reservations, 7-11 dial-up remote access connections, 10-37 to 10-38 pools, 9-7, 10-6 to 10-7 RRAS, 9-7 Static mode, Netsh utility, 11-70, 11-72 static routes adding, 9-23 to 9-25 advantages, 9-25 designing, 9-26 disadvantages, 9-25 to 9-26 dynamic routes compared with, 9-18 guidelines, 9-20 to 9-22 linking to dial-on-demand connections, 9-39 multiple-routers using, 9-20 overview, 9-20 to 9-22 RIP vs., 9-26 Update Routes command, 9-36 statistics IKE, 11-72 IP Security Monitor, 11-88 to 11-89 Quick Mode, 11-44, 11-73 Strict RFC name-checking method, 5-52 Strongest Encryption (MPPE 128-Bit), 10-31 stub areas, 9-64 stub zones, 5-67 to 5-75 benefits of, 5-68 case scenario, 5-75 to 5-77 defined, 4-68 DNS servers hosting, 4-32 lesson review, 5-74 to 5-75 lesson summary, 5-75 overview of, 5-67 to 5-68 practice exercise, 5-73 to 5-74 reconfiguring zone as, 5-22 updating, 5-72 when to use, 5-68 to 5-72 subnet ID, 2-36 variable length, 2-47 subnet masks address location, 2-45 address ranges, 2-40 to 2-45 address space, 2-48 advantages of, 2-34 to 2-35 case scenario, 2-53 to 2-55 CIDR, 2-9 converting, 2-17 to 2-19 defining, 2-23 determining number, 2-37, 2-38 to 2-40 host capacity, 2-38 host IDs, 2-8 ID, 2-36 lesson review, 2-51 to 2-52 lesson summary, 2-52 to 2-53 list of common, 2-17 network prefixes and, 2-9 notations, 2-9 to 2-10 octet values, 2-15 to 2-16 overview of, 2-9 to 2-11 powers of 2, 2-14 to 2-15 practice exercises, 2-49 to 2-51 remote access authorization and, 10-7, 10-39 TCP/IP addressing, 13-3 to 13-7 variable-length, 2-46 to 2-48 suite, TCP/IP, 1-8 summary pane, Frame Viewer window, 3-9 supernetting advantages, 2-34 to 2-35 overview of, 2-32 to 2-34 TCP/IP addressing, 13-9 to 13-10 Z02I622884.fm Page 32 Friday, March 31, 2006 1:20 PM I-32 superscopes superscopes, 7-28 to 7-32 creating, 7-28 to 7-29 for two local DHCP servers, 7-30 to 7-32 local multinets and, 7-29 to 7-30 New Superscope menu command, 7-29 overview of, 7-28 practice exercise, 7-39 to 7-41 remote multinets, 7-30 SUS (Software Update Services), 15-18 to 15-19 System Configuration utility (Msconfig.exe), 17-24 system error log, DHCP, 8-35 to 8-37 System log, Event Viewer Network Monitor and, 15-31 troubleshooting server services, 12-35 to 12-36 System Monitor, DNS performance monitoring, 6-24 to 6-27 System Properties dialog box, 4-49 system services, security templates, 11-6 System Shutdown event, 11-6 Systems Management Server (SMS), 12-17 T Task Manager networking options, 12-3 to 12-6 overview of, 12-3 to 12-6 Performance console and, 12-9 PIDs and, 12-15 to 12-16 practice exercise, 12-18 to 12-19 TCP/IP (Transmission Control Protocol/Internet Protocol) case scenario, 2-53 to 2-55 configuring, 2-46, 2-50 configuring for DNS clients, 4-48 to 4-55 exam highlights, 2-56 layers, 2-2 to 2-5 monitoring network traffic. See Network Monitor overview of, 1-8, 1-18, 2-2 to 2-5 routing, 16-29 to 16-35 subnetting. See subnet masks supernetting, 2-32 to 2-35 variable-length subnet masks, 2-46 to 2-48 viewing advanced connection settings, 1-19 to 1-21 viewing default settings, 1-17 to 1-19 viewing network connection components, 1-16 to 1-32 TCP/IP, addressing APIPA and, 1-25 to 1-27 blocks, 2-7 to 2-31 decimal/binary notation, 2-7, 2-9 to 2-10, 2-16, 2-18 DHCP advantages, 7-3 further reading, 13-8 gateways, 2-13 lesson review, 2-5, 2-30 overview of, 13-1 private, 2-12 public, 2-12 remote access, 9-10, 10-4, 10-6 to 10-7 resolving to host names, 6-3 to 6-4 scope configuration for, 7-7 to 7-8 structure, 2-7 to 2-11 subnets, 2-15 to 2-16 tested skills/suggested practices, 13-4 to 13-5 TCP/IP connections, 3-22 to 3-34 ARP tool, 3-28 to 3-29 case scenario, 3-34 to 3-36 faulty configuration, 3-22 further reading, 13-8 lesson review, 3-32 to 3-33 lesson summary, 3-33 to 3-34 monitoring. See Network Monitor Network Diagnostics, 3-23 to 3-26 overview of, 13-31 PathPing, 3-26 to 3-27 Ping, 3-26 to 3-27 practice exercises, 3-29 to 3-34 Tracert, 3-27, 3-28 TCP/IP properties alternate configuration options, 2-46 connection-specific DNS suffixes, 4-50 to 4-51 custom DNS suffix search lists, 4-54 to 4-55 default client update behavior, 4-54 DHCP clients, 7-12 to 7-13 DNS servers, 4-48 to 4-49 IP addressing, 2-7 to 2-12 TCP/IP Statistics command, 9-36 Z02I622884.fm Page 33 Friday, March 31, 2006 1:20 PM troubleshooting I-33 TCP (Transmission Control Protocol), fast zone transfer and, 4-34 TCPv4 performance object, 12-8 TCPv6 performance object, 12-8 telephone lines, PSTN, 10-4 templates, 11-5 to 11-6, 11-21 to 11-26. See also security templates Terminal Services, 1-13, 1-20 test skills and suggested practices DHCP management, 13-5 DHCP troubleshooting, 13-6 to 13-7 DNS management, 14-2 to 14-3 DNS monitoring, 14-3 DNS server installation, 14-2 Internet connectivity, 17-3 network protocol security, 15-4 to 15-5 network security, 15-3 network traffic, 17-2 Remote Access management, 16-3 to 16-4 Remote Access routing, 16-5 Remote Access user authentication, 16-2 to 16-3 secure access, 16-4 server services, 17-3 to 17-4 software update installation, 15-3 to 15-4 TCP/IP configuration, 13-4 to 13-5 TCP/IP routing, 16-4 TCP/IP troubleshooting, 13-5 to 13-6 user access to remote access services, 16-5 TGT (Ticket Granting Ticket) defined, 11-95 Kerberos at computer boot, 11-50 to 11-51 Kerberos at user logon, 11-51 to 11-53 Kerberos authentication, 11-53 to 11-54 Time-Out (Second) field, RADIUS servers, 10-76 time skew, 11-53 Time to Live (TTL) values Minimum (Default) TTL box, 5-34 overview of, 4-23 resource record formats, 4-36 resource records and, 5-34 SOA resource record and, 5-34 stub zones and, 5-72 troubleshooting with Tracert, 3-28Times options, Kerbtray, 11-53 topology defined, 1-5 physical, 2-34 to 2-35 Total Query Received, DNS performance counter, 6-27 Total Query Received/Sec, DNS performance counter, 6-27 Total Response Sent, DNS performance counter, 6-27 Total Response Sent/Sec, DNS performance counter, 6-27 Tracert utility overview of, 3-27, 3-28 troubleshooting TCP/IP addressing, 13-31 traffic, broadcast, 2-35 traffic, DHCP, 8-3 to 8-19 case scenario, 8-38 to 8-39, 8-46 to 8-47 DHCP ACK, 8-11 to 8-12 DHCP Discover, 8-7 to 8-8 DHCP header fields, 8-6 to 8-7 DHCP messages, 8-5 to 8-7 DHCP NACK, 8-12 to 8-14 DHCP Offer, 8-8 to 8-9 DHCP Request, 8-9 to 8-11 exam highlights, 8-41 to 8-42 initial lease process, 8-3 to 8-4 lease renewal process, 8-4 to 8-5 lesson review, 8-18 trailing dot (.), 4-13 transfer format, fast, 5-47 transient problems, 12-3 Transmission Control Protocol/Internet Protocol (TCP/IP). See TCP/IP (Transmission Control Protocol/Internet Protocol) transport layer, TCP/IP Network Monitor and, 3-11 to 3-12 overview of, 2-4 triggers dynamic update, 5-30 Network Monitor, 12-17 to 12-18 Performance console alerts, 12-9 to 12-13 Triple Data Encryption Standard (3DES), 10-85 troubleshooting APIPA, 1-27 ARP, 3-28 to 3-29 Z02I622884.fm Page 34 Friday, March 31, 2006 1:20 PM I-34 troubleshooting Basic Firewall/NAT, 9-50 blocking policies, 11-81, 11-103 client configuration, 8-27 to 8-36, 13-31 DHCP. See DHCP, troubleshooting DHCP authorization, 13-31 DCHP databases, 13-39 DHCP leases, 8-29 DHCP options, 13-35 demand-dial routing, 9-39 to 9-40 dial-up connections, 10-37 to 10-38 dial-up networking, 10-39 to 10-40 DNS. See DNS troubleshooting event logs and, 11-86 to 11-87 intermittent problems, 12-3 Internet connectivity. See Internet connectivity IP addresses, IP addressing, troubleshooting IPSec, 11-44, 11-82 to 11-83 Kerberos, 11-75 logon issues, 11-85 to 11-86 NAT, 9-50 to 9-51 network protocols. See network protocols, troubleshooting network traffic. See Network Monitor RAS clients, 16-41 server services. See server services TCP/IP connections. See TCP/IP connections VPNs, 10-52 to 10- 10-54 troubleshooting labs demand-dial routing, 9-39 to 9-40 DHCP, 7-49, 8-38 to 8-39 DNS, 6-31 to 6-32 IAS, 10-83 IPSec, 11-90 to 11-93 name resolution, 4-65 to 4-66 NAT configuration, 9-77 to 9-78 TTL (Time to Live) values Minimum (Default) TTL box, 5-34 overview of, 4-23 resource record formats, 4-36 resource records and, 5-34 SOA resource record and, 5-34 stub zones and, 5-72 troubleshooting with Tracert, 3-28 tunneling, VPN, 16-36 Type field, resource records, 4-36 U UDP (User Datagram Protocol) ports, 2-5 Unauthenticated Access option, PAP, 10-10, 10-11 unicast messages, RIP, 9-63 Unicode, 5-51 unnumbered connections, 9-25 Unreachability Reason command, demand-dial interface, 9-32 update infrastructure, 1-13 to 1-14 Update Routes command, IP routing, 9-36 updates default client, 4-56 DNS. See DNS updates Dynamic DNS, 4-55 to 4-56 software, 15-18 to 15-19 updates, dynamic DNS clients, 4-55 to 4-56 Kerberos and, 5-30 nonsecure dynamic updates, 5-79 performance counters and, 6-26 secure, 5-30 to 5-31 triggers, 5-30 zone configuration, 5-27 to 5-28 upgrades, predefined security templates, 15-7 user accounts, dial-in properties authorization, 10-32 to 10-37 practice exercises, 10-41 to 10-45 remote access permissions, 10-24 to 10-25 user classes, 7-35 to 7-37 User Datagram Protocol (UDP) ports, 2-5 UTF-8 (Multibyte), 5-52 V variable-length subnet masks (VLSMs) lesson review, 2-51 to 2-52 lesson summary, 2-52 to 2-53 overview of, 2-46 to 2-48 practice exercises, 2-49 to 2-51 vendor classes, 7-35 virtual private networks (VPNs), 10-47 to 10-66 case scenario, 10-82 to 10-83 configuring, 10-54 to 10-59 deploying routing protocols over, 10-51 deployment scenarios, 10-48 extranet/router-to-router, 10-49 to 10-51 Z02I622884.fm Page 35 Friday, March 31, 2006 1:20 PM zone properties I-35 lesson review, 10-66 lesson summary, 10-66 mixed, 10-52 overview of, 10-47 to 10-50 remote access, 10-49 troubleshooting, 10-52 to 10-54 VLSMs (variable-length subnet masks) lesson review, 2-51 to 2-52 lesson summary, 2-52 to 2-53 overview of, 2-46 to 2-48 practice exercises, 2-49 to 2-51 VPNs, 10-47 to 10-66 case scenario, 10-82 to 10-83 configuring, 10-54 to 10-59 deploying routing protocols over, 10-51 deployment scenarios, 10-48 extranet/router-to-router, 10-49 to 10-51 lesson review, 10-66 lesson summary, 10-66 mixed, 10-52 overview of, 10-47 to 10-50 remote access, 10-49 troubleshooting, 10-52 to 10-54 VPNs (virtual private networks), practice exercises adding VPN access as remote policy condition, 10-59 to 10-60 creating connection through L2TP/IPSec, 10-63 to 10-64 creating PPTP-type VPN connection, 10-60 to 10-62 logging onto domain through, 10-62 to 10-63 testing L2TP/IPSec configuration, 10-65 W WANs (wide area networks) managing DHCP with Netsh, 7-25 security, 16-2 static routing and, 9-19 WAP (Wireless Access Point), 10-69 to 10-70 Web Edition, Microsoft Windows Server 2003, 1-5 Web site information, Microsoft IP addressing, 13-7 IPSec features for 2003, 11-41 Kerberos, 11-48 network infrastructure, 17-4 Registry settings, adding to security templates, 11-9 RRAS, 16-5 to 16-6 security templates, 11-5 to 11-6 wide area networks (WANs) managing DHCP with Netsh, 7-25 security, 16-2 static routing and, 9-19 wildcard (*), 15-7 Windows Explorer, 4-7 to 4-8 Windows Update catalog, 15-18 overview of, 15-18 WINS tab, zone properties, 5-36 WINS (Windows Internet Name Service) configuring with WINS tab, 5-36 lookup counters, 6-26 Wireless Access Point (WAP), 1-69 to 10-70 Windows Firewall, 11-27 wireless networks authentication, 10-70 to 10-72 ISP, 10-72 to 10-73 policies, 11-9 workgroups, 4-7 Y Yiaddr (Your IP Address) field, 8-7, 8-8 to 8-9 Z Zone Aging/Scavenging Properties dialog box, 5-31 to 5-32 zone delegation, 5-57 to 5-66 case scenario, 5-75 to 5-77 creating, 5-61 to 5-64 example of, 5-59 to 5-60 lesson review, 5-64 to 5-66 lesson summary, 5-66 New Delegation Wizard, 5-58, 5-61 overview of, 5-58 to 5-60 records, 5-59 when to use, 5-58 zone properties, 5-21 to 5-44 aging, 5-31 to 5-32 case scenario, 5-75 to 5-77 dynamic updates, 5-27 to 5-31 Z02I622884.fm Page 36 Friday, March 31, 2006 1:20 PM I-36 zone properties exam highlights, 5-80 file names, 5-27 lesson review, 5-43 to 5-44 lesson summary, 5-44 name server (NS) options, 5-35 to 5-36 no-refresh intervals, 5-32 opening dialog box, 5-22 to 5-23 practice exercises, 5-39 to 5-42 refresh intervals, 5-32 replication, 5-25 to 5-27 scavenging, 5-33 start-of-authority (SOA) tab, 5-33 to 5-35 transfer options, 5-36 to 5-39 WINS options, 5-36 zone status, 5-22 zone type, 5-22 to 5-23 zone transfers BIND compatibility and, 5-47 to 5-48 configuring, 5-39 to 5-41 DNS performance counters for, 6-25 to 6-27 Fail On Load If Bad Zone data, 5-46 Microsoft Windows 2000, 5-37 notification settings, 5-36 to 5-39, 6-29 to 6-30 Nslookup and, 6-8 zones Active Directory–integrated, 4-33, 5-23 to 5-25, 5-27, 5-38, 5-39 creating, 4-30 to 4-31 DomainDnsZones, 5-25 to 5-26, 6-22, 6-30 file names, 5-27 ForestDnsZones, 5-25 to 5-26 forward lookup, 4-29 to 4-30 loading on startup, 5-46 New Zone Wizard, 4-31 primary, 4-31, 5-22 to 5-23, 5-36 to 5-37 reverse lookup, 4-29 to 4-30 secondary, 4-32, 5-7, 5-9, 5-22 to 5-23, 5-33 to 5-34 slave, 5-9 standard, 4-32 to 4-33 status of, 5-22 stub, 4-32, 5-67 to 5-75