DAE 3rd Year Network Admin Guide
DAE 3rd Year Network Admin Guide
Page
1
NETWORK ADMINISTRATION CIT-324
NETWORK
ADMINISTRATION
CIT-324
PREFACE
The text book has been written to cover the syllabus of Network
Administration, 3rd year D.A.E (Computer Information Technology) according
to the new scheme of studies. The book has been written in order to cater the
needs of latest concepts and needs of the course i.e. Network Administration
and to be able to attempt D.A.E Examination of PBTE Lahore.
The aim of bringing out this book is to enable the students to have
sound knowledge of the subject. Every aspect has been discussed to present
the subject matter in the most concise, compact lucid & simple manner to help
the subject without any difficulty. Frequent use of illustrative figures has been
made for clarity. Short Questions and Self-tests have also been included at the
end of each chapter which will serve as a quick learning tool for students.
AUTHORS
Page
3
NETWORK ADMINISTRATION CIT-324
Page
4
NETWORK ADMINISTRATION CIT-324
Page
5
NETWORK ADMINISTRATION CIT-324
Table of Contents
PREFACE ....................................................................................................................... 3
MANUAL DEVELOPMENT COMMITTEE ........................................................................ 4
CHAPTER 01 INTRODUCTION ..................................................................................... 10
1. INTRODUCTION ...................................................................................................... 10
1.1. WHAT IS NETWORK? ...................................................................................... 11
1.2. CONCEPT OF NETWORK ................................................................................. 15
1.3. TYPES OF NETWORKS ..................................................................................... 16
1.4. MAJOR FUNCTIONS OF A NETWORK .............................................................. 26
1.5. USES OF NETWORKS ....................................................................................... 28
Multiple Choice Questions ......................................................................................... 30
Short Questions .......................................................................................................... 33
Long Questions ........................................................................................................... 34
CHAPTER 02 MICROSOFT WINDOWS CLIENT-END..................................................... 35
2.1. INTRODUCTION TO MICROSOFT WINDOWS .................................................. 35
2.2. INTRODUCTION TO NETWORK ENVIORNMENT ............................................. 37
2.3. INSTALLATION/DEPLOYMENT OF WINDOWS CLIENT END: ........................... 41
2.4. CLIENT ENDS BASIC SETTINGS: ....................................................................... 45
2.5. BASIC COMPUTER NETWORK COMPONENTS: ............................................... 45
2.6. HOW TO JOIN A COMPUTER TO A DOMAIN. ................................................. 47
2.7. CLIENT END TROUBLESHOOTING AND MAINTENANCE ................................. 48
Multiple Choice Questions ......................................................................................... 52
Short Questions .......................................................................................................... 55
Long Questions ........................................................................................................... 56
CHAPTER 03 INSTALLATION AND CONFIGURATION................................................... 57
3.1. HARDWARE REQUIREMENTS ......................................................................... 58
3.2. INSTALLATION OF WINDOWS SERVER 2008 R2: ............................................ 60
3.3. INSTALLATION AND DE-INSTALLATION PROCESS OF ACTIVE DIRECTORY...... 63
3.4. NAT (NETWORK ADDRESS TRANSLATION) ..................................................... 66
Page
6
NETWORK ADMINISTRATION CIT-324
Page
7
NETWORK ADMINISTRATION CIT-324
Page
8
NETWORK ADMINISTRATION CIT-324
TEXT/REFERENCE BOOKS
Page
9
NETWORK ADMINISTRATION CIT-324
CHAPTER 01 INTRODUCTION
Objectives
After completion of this chapter students will be able to:
1.1 What is a network
1.2 The concept of a network
1.3 Types of Networks
1.4 Major Functions of a Network
1.5 Uses of a Network
1. INTRODUCTION
What Is a Networking?
Page
10
NETWORK ADMINISTRATION CIT-324
High Security: Network is used for high security in different places e.g. banking
field, E-commerce and military purpose.
High Speed: Network provides high speed and accuracy, transfer of data is
with very high speed.
Reliability: Before the use of network the data was basically store in paper
form. So, there was huge problems of human errors and misplacement of data.
Now with the use of network data is stored on remote storage and backup
devices.
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications.
Page
11
NETWORK ADMINISTRATION CIT-324
Network topologies
The term network topology describes the relationship of connected devices in
terms of a geometric graph. Devices are represented as vertices, and their
connections are represented as edges on the graph. It describes how many
connections each device has, in what order, and it what sort of hierarchy.
Typical network configurations include the bus topology, mesh topology, ring
topology, star topology, tree topology and hybrid topology.
Page
13
NETWORK ADMINISTRATION CIT-324
based on purpose and/or size. We put together this handy reference guide to
explain the types of networks in use today, and what they’re used for.
Security:
Network provides very high security to company for database for company.
Nobody security of company and didn’t reach the company database.
Management:
Accuracy:
Control corruption:
Page
14
NETWORK ADMINISTRATION CIT-324
Online Meeting:
Business Promotion:
If Network is better network. So, company Promotion and share become high.
Advertisement:
E-Business:
The generic term network refers to a group of entities (i.e., objects, people,
etc.) that are connected to one another. A network, therefore, allows material
or immaterial elements to be circulated among all of these entities, based on
well-defined rules. A network, as far as this article is concerned, is a group of
computers and peripheral devices connected to one another. Note that the
smallest possible network is two computers connected together. Networking
refers to the implementation of tools and tasks for linking computers so that
they can share resources over the network.
Page
15
NETWORK ADMINISTRATION CIT-324
The first working network, called ARPANET, was created in the late 1960s and
was funded by the U.S. Department of Defense. Government researchers used
to share information at a time when computers were large and difficult to
move. We have come a long way today from that basic kind of network.
Today’s world revolves around the internet, which is a network of networks
that connects billions of devices across the world. Organizations of all sizes use
networks to connect their employees’ devices and shared resources such as
printers. From a broader lens, a computer network is built with two basic
blocks: nodes or network devices and links. The links connect two or more
nodes with each other. The way these links carry the information is defined by
communication protocols. The communication endpoints, i.e., the origin and
destination devices, are often called ports.
Page
16
NETWORK ADMINISTRATION CIT-324
Page
17
NETWORK ADMINISTRATION CIT-324
Advantages of LAN
• Speed
• Cost
• Security
• Resource Sharing
Disadvantages of LAN
• Expensive To Install
Page
18
NETWORK ADMINISTRATION CIT-324
Page
19
NETWORK ADMINISTRATION CIT-324
Page
20
NETWORK ADMINISTRATION CIT-324
Page
21
NETWORK ADMINISTRATION CIT-324
Last mile: A telecom company is used to provide the internet services to the
customers in hundreds of cities by connecting their home with fiber.
Page
22
NETWORK ADMINISTRATION CIT-324
Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in
turn increases the productivity of our company.
Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates
the security problem.
Page
23
NETWORK ADMINISTRATION CIT-324
Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
Campus Area Networks (CAN) provide more control over network resources
and typically relies on a centralized hub to which other locations connect,
when compared to public networks. This network design is also sometimes
referred to as a corporate area network, but it functions just the same.
Page
24
NETWORK ADMINISTRATION CIT-324
Wide Area Network: Covers large geographic regions connecting users and
businesses across the country or world typically through VPNs over fiber
connections.
Metropolitan Area Network: Provides coverage across towns and cities with
each town potentially having its own interconnected LAN that can share data
with other towns on the MAN.
Page
25
NETWORK ADMINISTRATION CIT-324
• Single bit error: The terms single bit error means that only one
bit of the data unit was changed from 1 to 0 and 0 to 1.
• Burst Error: The term burst error means that two or more bits
in the data unit were changed. A burst error is also called
Page
26
NETWORK ADMINISTRATION CIT-324
2. Flow control: When a packet (Layer-2 data) is sent from one host to
another over a single medium, it is required that the sender and
receiver should work at the same speed. That is, the sender sends at a
speed on which the receiver can process and accept the data. If the
sender is sending too fast the receiver may be overloaded, (swamped)
and data may be lost.
Page
27
NETWORK ADMINISTRATION CIT-324
Page
28
NETWORK ADMINISTRATION CIT-324
Resource Sharing
Computer networks allow users to share files and resources. They are
popularly used in organizations to cut costs and streamline resource sharing.
A single printer attached to a small local area network (LAN) can effectively
service the printing requests of all computer users on the same network. Users
can similarly share other network hardware devices, such as modems, fax
machines, hard drives and removable storage drives.
Networks allow users to share software applications, programs and files. They
can share documents (such as invoices, spreadsheets and memos), word
processing software, videos, photographs, audio files, project tracking
software and other similar programs. Users can also access, retrieve and save
data on the hard drive of the main network server.
Page
29
NETWORK ADMINISTRATION CIT-324
Q.6: Identify the type of topology from the following: "In this topology,
each node is connected with the help of a single coaxial cable."
Q.7: The maximum amount of data that can be transmitted over a network
in a given period of time.
(a) The time it takes for data to travel from one point to another over
a network
(d) None
Page
31
NETWORK ADMINISTRATION CIT-324
Page
32
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (b) Q.2 (d) Q.3 (a) Q.4 (b) Q.5 (b)
Q.6 (b) Q.7 (a) Q.8 (a) Q.9 (b) Q.10 (c)
Q.11 (b) Q.12 (a) Q.13 (c) Q.14 (d) Q.15 (b)
Short Questions
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
34
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
A window can usually be resized by the user. For example, it can be stretched
on any side, minimized, maximized, and closed. On today's multitasking
operating systems, you can have a number of windows on your screen at the
same time, interacting with each whenever you choose.
Page
35
NETWORK ADMINISTRATION CIT-324
The window first came into general use as part of the Apple Macintosh. Later,
Microsoft made the idea the foundation of its Windows operating system
(which was actually a graphical user interface for the Disk Operating System
( DOS ) operating system on IBM-compatible PCs). The X Window System was
developed as an open cross-platform windowing system for use in networks.
It allows a client application in one computer to request windowing services
at a user's workstation computer.
The first version of Windows, released in 1985, was simply a GUI offered as an
extension of Microsoft’s existing disk operating system, or MS-DOS. Based in
part on licensed concepts that Apple Inc. had used for its Macintosh System
Software, Windows for the first time allowed DOS users to visually navigate a
virtual desktop, opening graphical “windows” displaying the contents of
electronic folders and files with the click of a mouse button, rather than typing
commands and directory paths at a text prompt.
History
Page
36
NETWORK ADMINISTRATION CIT-324
1993: Windows NT
1995: Windows 95
1998: Windows 98
2000: Windows ME
2001: Windows XP
2009: Windows 7
2012: Windows 8
2015: Windows 10
1. Peer-to-Peer Network
2. Client-server Network
This model is broadly used network model. In Client-Server Network, Clients and
server are differentiated, Specific server and clients are present. In Client-Server
Network, Centralized server is used to store the data because its management is
centralized. In Client-Server Network, Server respond the services which is request by
Client.
Page
38
NETWORK ADMINISTRATION CIT-324
Page
39
NETWORK ADMINISTRATION CIT-324
• The client sends a request to the server using its IP address and
the port, which is reserved for a particular service running on the
server.
• The server receives the request and responds using the client IP
address and port
Page
40
NETWORK ADMINISTRATION CIT-324
2. You will see a prompt that says “press any key to continue” press enter.
Page
41
NETWORK ADMINISTRATION CIT-324
4. Language option, by default English will be set along will time and currency
format and keyboard or input method. Click Next.
Page
42
NETWORK ADMINISTRATION CIT-324
6. End user license agreement (E.U.L.A), check the box to accept and click
“Next”.
Page
43
NETWORK ADMINISTRATION CIT-324
Page
44
NETWORK ADMINISTRATION CIT-324
At Initial stage after the installation of Windows7 the following settings need to be
applied:
These above settings will be enough to make this PC a part of a network for sharing
purpose only.
Servers: Servers are computers that hold shared files, programs, and the
network operating system. Servers provide access to network resources to all
the users of the network. There are many different kinds of servers, and one
server can provide several functions. For example, there are file servers, print
servers, mail servers, communication servers, database servers, fax servers
and web servers, to name a few.
Clients: Clients are computers that access and use the network and shared
network resources. Clients are basically the customers (users) of the network,
as they request and receive services from the servers.
Page
45
NETWORK ADMINISTRATION CIT-324
Shared data: Shared data are data that file servers provide to clients such as
data files, printer access programs and e-mail.
Shared printers and other peripherals: Shared printers and peripherals are
hardware resources provided to the users of the network by servers.
Resources provided include data files, printers, software, or any other items
used by clients on the network.
Hub: Hub is a device that splits a network connection into multiple computers.
It is like a distribution center. When a computer requests information from a
network or a specific computer, it sends the request to the hub through a
cable. The hub will receive the request and transmit it to the entire network.
Each computer in the network should then figure out whether the broadcast
data is for them or not.
Page
46
NETWORK ADMINISTRATION CIT-324
Like a hub, switch doesn't broadcast the received message to entire network,
rather before sending it checks to which system or port should the message
be sent. In other words, switch connects the source and destination directly
which increases the speed of the network. Both switch and hub have common
features: Multiple RJ-45 ports, power supply and connection lights.
Router When we talk about computer network components, the other device
that used to connect a LAN with an internet connection is called Router. When
you have two distinct networks (LANs) or want to share a single internet
connection to multiple computers, we use a Router. In most cases, recent
routers also include a switch which in other words can be used as a switch. You
don’t need to buy both switch and router, particularly if you are installing small
business and home networks. There are two types of Router: wired and
wireless. The choice depends on your physical office/home setting, speed and
cost.
LAN Cable A local area Network cable is also known as data cable or Ethernet
cable which is a wired cable used to connect a device to the internet or to
other devices like other computer, printers, etc.
There are some specific steps through those a user can make his computer a
part of a domain. A student
Client-side Settings:
Page
47
NETWORK ADMINISTRATION CIT-324
2. Properties
3. Change setting
4. Change
7. Under Member of, click Domain, type the name of the domain that this
computer will join, and then click OK.
Page
48
NETWORK ADMINISTRATION CIT-324
The following things need to be known by the students so that they can learn Client
Server environment in good manner.
IMPORTANT TERMINOLOGIES:
File System:
In computing, file system or filesystem (often abbreviated to fs) is a method
and data structure that the operating system uses to control how data is
stored and retrieved.
choose between FAT32, NTFS, and exFAT file systems. Formatting involves the
creation of various data structures and metadata used to manage files within
a partition.
NTFS Permissions
In any Windows network, you can set sharing permissions for drives and
folders. On that network, each user can choose to share entire drives or
individual folders with the network.
Task Scheduling:
The Task Scheduler enables you to automatically perform routine tasks on a
chosen computer. Task Scheduler does this by monitoring whatever criteria
you choose (referred to as triggers) and then executing the tasks when those
criteria are met.
Compressed Data:
Digital data are compressed by finding repeatable patterns of binary 0s and 1s.
Text can typically be compressed to approximately 40% of its original size, and
graphics files from 20% to 90%. Some files compress very little. When you
compress data on the computer you make the files take less space on your
hard drive and less bandwidth for transmission. It depends entirely on the type
of file and compression algorithm used.
Uncompressed Data
Uncompressing (or decompressing) is the act of expanding a compression file
back into its original form. Software that you download from the Internet
often comes in a compressed package that can uncompressed itself when you
click on it. You can also uncompressed files using popular tools such as PKZIP
in the DOS operating system, WinZip in Windows, and MacZip in Macintosh.
Page
50
NETWORK ADMINISTRATION CIT-324
Encrypt Data:
The process of transforming information (referred to as plaintext) using an
algorithm to make it unreadable by unauthorized people.
Decrypt Data:
Reconversion of encrypted data back into its original form.
Page
51
NETWORK ADMINISTRATION CIT-324
Q.3: Which file extension is used for executable files in Microsoft Windows
Page
52
NETWORK ADMINISTRATION CIT-324
(b) A device that converts digital signals to analog signals and vice versa
(b) A device that converts digital signals to analog signals and vice versa
Page
54
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (b) Q.2 (c) Q.3 (a) Q.4 (a) Q.5 (d)
Q.6 (d) Q.7 (a) Q.8 (b) Q.9 (b) Q.10 (d)
Q.11 (d) Q.12 (b) Q.13 (c) Q.14 (a) Q.15 (d)
Short Questions
Page
55
NETWORK ADMINISTRATION CIT-324
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
56
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Page
57
NETWORK ADMINISTRATION CIT-324
Architecture
All computer operating systems are designed for a particular computer
architecture. Most software applications are limited to particular operating
systems running on particular architectures. Although architecture-
independent operating systems and applications exist, most need to be
recompiled to run on a new architecture. See also a list of common operating
systems and their supporting architectures.
Processing power
The power of the central processing unit (CPU) is a fundamental system
requirement for any software. Most software running on x86
architecture define processing power as the model and the clock speed of the
Page
58
NETWORK ADMINISTRATION CIT-324
CPU. Many other features of a CPU that influence its speed and power, like bus
speed, cache, and MIPS are often ignored. This definition of power is often
erroneous, as AMD Athlon and Intel Pentium CPUs at similar clock speed
often have different throughput speeds. Intel Pentium CPUs have enjoyed a
considerable degree of popularity, and are often mentioned in this category.
Memory
All software, when run, resides in the random access memory (RAM) of a
computer. Memory requirements are defined after considering demands of
the application, operating system, supporting software and files, and other
running processes. Optimal performance of other unrelated software running
on a multi-tasking computer system is also considered when defining this
requirement.
Secondary storage
Hard-disk requirements vary, depending on the size of software installation,
temporary files created and maintained while installing or running the
software, and possible use of swap space (if RAM is insufficient).
Display adapter
Software requiring a better than average computer graphics display,
like graphics editors and high-end games, often define high-end display
adapters in the system requirements.
Peripherals
Some software applications need to make extensive and/or special use of
some peripherals, demanding the higher performance or functionality of such
peripherals. Such peripherals include CD-ROM drives, keyboards, pointing
devices, network devices, etc.
Page
59
NETWORK ADMINISTRATION CIT-324
Type of
hardware Hardware requirements
Windows Server 2008 R2, codenamed "Windows Server 7", is the fifth version
of the Windows Server operating system produced by Microsoft and released
as part of the Windows NT family of operating systems.
Page
60
NETWORK ADMINISTRATION CIT-324
If you do not have the Product ID available right now, you can leave the box
empty, and click Next. You will need to provide the Product ID later, after the
server installation is over. Press No.
6. 6. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own,
and therefore you will be prompted to select your correct version in
the next screen, assuming you are telling the truth and will provide the
correct ID to prove your selection later on.
Page
61
NETWORK ADMINISTRATION CIT-324
7. 7. If you did provide the right Product ID, select the Full version of the
right Windows version you’re prompted, and click Next.
8. 8. Read and accept the license terms by clicking to select the checkbox
and pressing Next.
9. 9. In the “Which type of installation do you want?” window, click the
only available option – Custom (Advanced).
10. 10. In the “Where do you want to install Windows?”, if you’re
installing the server on a regular IDE hard disk, click to select the first
disk, usually Disk 0, and click Next.
If you’re installing in a Virtual Machine environment, make sure you read the
“Installing the Virtual SCSI Controller Driver for Virtual Server 2005 on
Windows Server 2008”
If you must, you can also click Drive Options and manually create a partition
on the destination hard disk.
11. The installation now begins, and you can go and have lunch. Copying
the setup files from the DVD to the hard drive only takes about one
minute. However, extracting and uncompressing the files takes a good
deal longer. After 20 minutes, the operating system is installed. The
exact time it takes to install server core depends upon your hardware
specifications. Faster disks will perform much faster installs… Windows
Server 2008 takes up approximately 10 GB of hard drive space.
The installation process will reboot your computer, so, if in step #10 you
inserted a floppy disk (either real or virtual), make sure you remove it before
going to lunch, as you’ll find the server hanged without the ability to boot
(you can bypass this by configuring the server to boot from a CD/DVD and
then from the hard disk in the booting order on the server’s BIOS)
12. Then the server reboots you’ll be prompted with the new Windows
Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.
Page
62
NETWORK ADMINISTRATION CIT-324
Active Directory:
Windows Server 2008 can properly install and configure DNS during the AD
DS installation if it knows that the DNS is local. To accomplish this, assign the
Page
63
NETWORK ADMINISTRATION CIT-324
private network adapter to the preferred DNS server address of the same
private network adapter, as follows:
1. From the Windows Start menu, open Administrative Tools > Server
Manager.
2. In the Server Summary section of the Server Manager window, click
View Network Connections.
3. In the Network Connections window, right-click the private adapter
and select Properties.
4. From the list of connected items, select Internet Protocol Version 4,
and then click Properties.
5. Copy the IP address that is displayed in the IP address box and paste it
in the Preferred DNS server box. Then, click OK.
Adding the Active Directory Domain Services role installs the framework for
Windows Server 2008 to become a DC and run Actine Directory Domain
Page
64
NETWORK ADMINISTRATION CIT-324
13. On the Summary page, review your selections and then click Next. The
installation begins.
Note: If you want the server to restart automatically after the installation is
completed, select the Reboot on completion check box.
14. If you did not select the Reboot on completion, check box, click Finish
in the wizard. Then, restart the server.
The basic purpose of NAT is to multiplex traffic from the internal network and
present it to the Internet as if it was coming from a single computer having
only one IP address. The TCP/IP protocols include a multiplexing facility so that
any computer can maintain multiple simultaneous connections with a remote
computer. It is this multiplexing facility that is the key to single address NAT.
To multiplex several connections to a single destination, client computers label
all packets with unique "port numbers". Each IP packet starts with a header
containing the source and destination addresses and port numbers.
Network Address Translation (NAT) is the process where a network device,
usually a firewall, assigns a public address to a computer (or group of
computers) inside a private network. The main use of NAT is to limit the
number of public IP addresses an organization or company must use, for both
economy and security purposes.
The most common form of network translation involves a large private
network using addresses in a private range (10.0.0.0 to 10.255.255.255,
172.16.0.0 to 172.31.255.255, or 192.168.0 0 to 192.168.255.255). The private
addressing scheme works well for computers that only have to access
resources inside the network, like workstations needing access to file servers
and printers. Routers inside the private network can route traffic between
private addresses with no trouble. However, to access resources outside the
Page
67
NETWORK ADMINISTRATION CIT-324
network, like the Internet, these computers have to have a public address in
order for responses to their requests to return to them. This is where NAT
comes into play.
Definition
Print server management is the process of managing servers that were set up
to handle print jobs in a distributed network. It is used in a network that offers
remote printing options.
Print Server is a role service that installs the Print Management. Print
Management is used for managing multiple printers or print servers.
Page
68
NETWORK ADMINISTRATION CIT-324
There are two primary tools that you can use to administer a Windows print
server:
• Server Manager
• Print Management
On Windows Server 2008 R2, you can use Server Manager to install the Print
and Document Services server role. Server Manager also includes an instance
of the Print Management, which you can use to administer the local server.
Print Management provides current details about the status of printers and
print servers on the network. You can use Print Management to install printer
connections to a group of client computers simultaneously and to monitor
print queues remotely. Print Management can help you to find printers that
have an error condition by using filters. It can also send e-mail notifications or
run scripts when a printer or print server needs attention. On printers that
provide a Web-based management interface, Print Management can display
more data, such as toner and paper levels.
Group Policy
Offline files are copies of network files that are stored on your computer so that you
can work with them when you're not connected to the network or when the network
folder that the files are stored in is not available.
Page
70
NETWORK ADMINISTRATION CIT-324
Q.1: What is the minimum processor speed required for installing Windows
Server 2008 R2?
Q.2: What is the minimum amount of RAM required for installing Windows
Server 2008 R2?
(c) 2 GB (d) 4 GB
Q.3: What is the minimum amount of available hard disk space required for
installing Windows Server 2008 R2?
(a) 10 GB (b) 20 GB
(c) 30 GB (c) 40 GB
Q.4: What is the minimum processor speed required for running Active
Directory on a server?
Q.5: What is the minimum amount of RAM required for running Active
Directory on a server?
Q.6: What is the minimum amount of available hard disk space required for
running Active Directory on a server?
(a) 10 GB (b) 20 GB
Page
71
NETWORK ADMINISTRATION CIT-324
(c) 30 GB (c) 40 GB
Q.7: Which of the following is NOT a valid installation option for Windows
Server 2008 R2?
Q.8: Which of the following is a valid partition style for installing Windows
Server 2008 R2?
Q.9: What is the maximum partition size for an MBR partition when
installing Windows Server 2008 R2?
(a) 2 TB (b) 4 TB
(c) 8 TB (d) 16 TB
Q.10: Which of the following is NOT a valid file system for installing Windows
Server 2008 R2?
(c) Allow users to organize their file systems into a cohesive and high-
performance directory
Q.15: Which of the following options should you select in Server Manager to
remove Active Directory from a Windows Server?
Page
73
NETWORK ADMINISTRATION CIT-324
Q.18: Which of the following types of NAT maps multiple private IP addresses
to a single public IP address?
Q.19: Which of the following is a valid method for adding a printer to a print
server?
(a) Physically connecting the printer to the server via USB cable
(b) Installing the printer driver on the client computer and sharing it
with the network
(d) Installing the printer driver on the server and creating a printer
share
Q.20: Which of the following is a valid method for managing print jobs on a
print server?
(c) Stopping and starting the print spooler service on the server
Page
74
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (a) Q.2 (b) Q.3 (a) Q.4 (b) Q.5 (b)
Q.6 (a) Q.7 (d) Q.8 (d) Q.9 (a) Q.10 (d)
Q.11 (c) Q.12 (b) Q.13 (a) Q.14 (d) Q.15 (d)
Q.16 (c) Q.17(a) Q.18 (c) Q.19 (d) Q.20 (d)
Short Questions
1. Define server?
2. Describe hardware requirement for a Server?
3. What is an active directory?
4. Describe hardware requirement for an Active directory?
5. Describe active directory domain services roles?
6. Define network address translation (NAT)?
7. Describe virtual machine environment?
8. Define DNS server?
9. Describe print server management?
10. What is offline file management?
Long Questions
Page
75
NETWORK ADMINISTRATION CIT-324
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
76
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Page
78
NETWORK ADMINISTRATION CIT-324
example, the name of a user might include the name string, along with information
associated with the user, such as passwords and Secure Shell keys.
The main service in Active Directory is Domain Services (AD DS), which stores
directory information and handles the interaction of the user with the domain. AD DS
verifies access when a user signs into a device or attempts to connect to a server over
a network. AD DS controls which users have access to each resource, as well as group
policies. For example, an administrator typically has a different level of access to data
than an end user.
The following are the new features in Windows Server 2008 R2.
• Read Only Domain Controller
• Re-startable AD DS
• Auditing Enhancement
within the domain. For another, the resource limitation often meant that the
number of domains in an organization would grow into an unmanageable
network over time. Active Directory domains are hierarchical and virtually
without limitation. This means that administrators can delegate authority
within a smaller number of more manageable domains.
Transitive trusts
Group policies
Using new group policies, you can specify roles complete with configuration
information within the domain hierarchy. This means that you can define
things so that, whenever you add a new user to a group, you can trigger
automatic configuration and software installation for that user.
Multi-master replication
Standards compliance
Page
80
NETWORK ADMINISTRATION CIT-324
with other directory services and for third-party vendors to integrate their
components with Active Directory.
Feature Description
Location Able to find user, group, networked service, or
transparency resource, data without the object address
Object data Able to store user, group, organization, and service
data in a hierarchical tree
Rich query Able to locate an object by querying for object
properties
High availability Able to locate a replica of the directory at a location
that is efficient for read/write operations
Page
81
NETWORK ADMINISTRATION CIT-324
Requirement:
Minimum: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Minimum: 32 GB or greater
Installation
Step 1 - Open Server Manager → Roles, this will bring up the Roles Summary
on the right hand side where you can click on the Add Roles link.
Page
82
NETWORK ADMINISTRATION CIT-324
Step 2 -Select Active Directory Domain Services from the list, you will be told
that you need to add some features, click on the Add Required Features button
and click next to move on.
Page
83
NETWORK ADMINISTRATION CIT-324
Page
84
NETWORK ADMINISTRATION CIT-324
After reboot, please open up the "server Manager" again. And then click on
"Roles" there you will see the "Active Directory Domain Services" is
successfully installed in there. click on it then you will get a window like below.
So please click on that link and it will start the DCPROMO wizard.
Page
85
NETWORK ADMINISTRATION CIT-324
Step 2 -The message that is shown now relates to older clients that do not
support the new cryptographic algorithms supported by Server 2008 R2. Click
Next to move on.
Step 3 -If this is the first forest in your Active Directory environment, select
the option "Create a new domain in a new forest".
Step 4 -Pick a name for your forest and root domain. In this window it will ask
to select forest function level. If you going to add server 2003 domain
controller to your forest later don't select the function level as server 2008. If
you going to use full features of 2008 Ad you must select forest function level
as server 2008. In my case I used server 2008. Click on "Next" after the select.
Page
87
NETWORK ADMINISTRATION CIT-324
Step 5 -Since this is the first DC in our domain, we can change our forest
functional level to Server 2008 R2.
Page
88
NETWORK ADMINISTRATION CIT-324
Step 6 -Include DNS in this installation as this will allow you to have an AD
Integrated DNS Zone. When you click Next, you will see a message asking you
to confirm your selections. Click yes to continue.
Step 7 -Select the folder where your database, log files and SYSVOL will be
stored. It is recommended to stick to the default settings.
Page
89
NETWORK ADMINISTRATION CIT-324
Step 8 - Enter a unique Active Directory Restore Mode password that will be
used during recovery.
Step 9 - Next window is giving you a brief of the installation. Click on "Next"
Page
90
NETWORK ADMINISTRATION CIT-324
Then it will start the installation of the AD. It will take some time to complete.
After complete of the installation perform a server reboot.
After the reboot now you can login to the domain. Please use the login as
following example
Page
91
NETWORK ADMINISTRATION CIT-324
Now it’s done and you can view the active directory options on
administrative tools menu
Advantages
• Enables users to sign in using usernames and passwords that are used
elsewhere.
• Creating and maintaining user accounts is no longer needed.
• Computer policies can be created to automatically update and secure
workstations.
• Sharing resources such as files and printers is easier all users have
access to set permissions.
• No longer need to provide a username and password for Outlook
emails.
• It is more secure than other directory services (Logon Authentication).
• It is easy to manage, administrate and control.
• Increased scalability.
• The speed of which it is able to provide domain names.
• Simple identity management as you can view all user information.
• Let’s you manage your network from one point.
Page
92
NETWORK ADMINISTRATION CIT-324
Disadvantages
• It can be expensive as you will need Windows Server 2000 licences and
you may need to upgrade the hardware on the server so it can run
Windows Server 2000.
• Active directory is OS dependent meaning that it will only work with
Windows server software.
• High maintenance costs.
• If the Active Directory goes down so does your network.
• If it is set up wrong it can take time and money to remove it and set it
up again.
• It is prone to being hacked.
• Cost of the infrastructure can be high.
• You need to have good planning to set it u properly.
• It also has a complex infrastructure for the user.
Improvements
You could improve Active Directory by:
• Making it more secure from hackers.
• Making it compatible with other operating systems other than
Windows.
• Making the installation and setup process simpler.
Page
93
NETWORK ADMINISTRATION CIT-324
Page
94
NETWORK ADMINISTRATION CIT-324
Page
95
NETWORK ADMINISTRATION CIT-324
3. Review your selections- After completing all the steps, confirm all the
selections you have made and click Next. This wizard is configuring
Active Directory Domain Services. This process can take from a few
minutes to several hours, depending on your environment and the
options that you selected.
Figure 20 Summary
Page
96
NETWORK ADMINISTRATION CIT-324
Schema master (one per forest): Maintains the master copy of the schema.
PDC emulator (one per domain): Emulates a primary domain controller for
backward compatibility with Windows NT.
Domain naming master (one per forest): Tracks object names throughout a
forest to ensure that they’re unique. Also tracks cross-references to objects in
other directories.
Relative identifier (RID) master (one per domain): Tracks the assignment of
SIDs (security identifiers) throughout the domain. Usually, the first domain
controller that you create in the first domain assumes the operations master
roles. You can assign these roles to other domain controllers in the domain or
forest, but only one domain controller at a time can hold each operation’s
master role.
Page
98
NETWORK ADMINISTRATION CIT-324
2. Server Manager appears. Select Roles on the left and click Add Roles.
5. Select Active Directory Domain Services and click Next. If .NET 3.5.1 is not
installed, the wizard prompts you to install it.
Note: Installing .NET 3.5.1 will require access to the Internet or access to a
copy of the .NET 3.5.1 installer executable. Click Add Required Features to
install .NET 3.5.1 from the wizard.
Page
100
NETWORK ADMINISTRATION CIT-324
Note: The wizard reminds you to run dcpromo.exe after installing Active
Directory Domain Services. Those steps are detailed in Run dcpromo.exe.
Page
101
NETWORK ADMINISTRATION CIT-324
10. Click Close to complete the wizard. You return to Server Manager.
Page
102
NETWORK ADMINISTRATION CIT-324
Active Directory stores users and groups in a folder called Users within
Active Directory Users and Computers. Each of the items in the left pane is a
container. Active Directory is logically set out so that thousands of objects can
be organized and found. Each object must be in a container. Containers may
themselves contain containers! Users and groups can be created in any
container. They can be subsequently moved into other containers in a
separate operation. This is different from adding users (or groups) to a group
which can be done without reference to the other containers of Active
Directory.
Page
103
NETWORK ADMINISTRATION CIT-324
Users:
Profile COM+
Member of General
Dial in Account
Environment Address
Session Telephones
Groups:
Computers:
The users and computers have somehow the same behavior with
different scope and potential. If one user has some policies applied on, he/ she
may be login anywhere within the domain will be facing same type of
privileges and at the same time if the same person logins on some computer
where some other policies have been implemented about domain computers
will be applied on that user. So the policies for a user are applied on a user and
policies on a computer applied both the computer and the user who logs in
that computer
DNS
Page
104
NETWORK ADMINISTRATION CIT-324
DHCP Server
2. Next expand the Active Directory Domain Services section and click
on Active Directory Users and Computers.
Page
105
NETWORK ADMINISTRATION CIT-324
3. At this point you should be able to see your domain. In our example we
are using the domain. Go ahead and expand your domain.
Page
106
NETWORK ADMINISTRATION CIT-324
5. 5. Type in the name of your OU and make sure that the box is checked
next to Protect container from accidental deletion. When done, click OK.
Page
107
NETWORK ADMINISTRATION CIT-324
Page
108
NETWORK ADMINISTRATION CIT-324
3. The next step is to name your Group, select the scope and then select
the type.
In this example we are going to name our group OpsUSers. We are also going
to leave the default selections for group scope, which is Global, and group
type, which is Security. When you are ready, click OK.
Page
109
NETWORK ADMINISTRATION CIT-324
Page
110
NETWORK ADMINISTRATION CIT-324
2. Then you need to right-click on any one of those accounts and select Add
to a group.
3. Next, you need to type in the group name and let the machine find it.
In our example, I will type in OpsUsers and then click on the Check
names button. Once the name is verified and group name is found, the text
will become underlined and you can click the OK button. Since we know our
group exists, we are going to click OK without verification.
Page
112
NETWORK ADMINISTRATION CIT-324
Q.3: Which of the following is a valid method for creating a user account in
Active Directory?
(a) Using the "Add User" wizard in the Active Directory Administrative
Center
(b) Creating a new folder on the server and assigning user permissions
(c) Editing the registry on the client computer to add the user account
information
Q.6: Active Directory and a Windows-based file server are not required to
implement ________ on client Windows computers?
Page
114
NETWORK ADMINISTRATION CIT-324
(c) To provide a list of all the objects in the Active Directory Forest
Q.13: What is the purpose of the Active Directory Sites and Services tool?
Page
115
NETWORK ADMINISTRATION CIT-324
Q.15: What is the purpose of a Group Policy Object (GPO) in Active Directory?
ANSWER KEY
Q.1 (a) Q.2 (c) Q.3 (a) Q.4 (b) Q.5 (c)
Q.6 (a) Q.7 (a) Q.8 (d) Q.9 (a) Q.10 (a)
Q.11 (c) Q.12 (b) Q.13 (a) Q.14 (a) Q.15 (a)
Page
116
NETWORK ADMINISTRATION CIT-324
Short Questions
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
117
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Page
118
NETWORK ADMINISTRATION CIT-324
Network Infrastructure
Network infrastructure is typically part of the IT infrastructure found in
most enterprise IT environments. The entire network infrastructure is
interconnected, and can be used for internal communications, external
communications or both. A typical network infrastructure includes:
1. Networking Hardware:
• Routers
• Switches
• LAN cards
• Wireless routers
• Cables
2. Networking Software:
• Network operations and management
• Operating systems
• Firewall
• Network security applications
3. Network Services:
• T-1 Line
• DSL
• Satellite
• Wireless protocols
• IP addressing
Page
119
NETWORK ADMINISTRATION CIT-324
number of servers located around the world. The files, data and functionality
of a given website is based on servers.
Servers have more processing power, memory and storage than their client
computers. The client is the computer that is not acting as the server and is
requesting information from the server. When computers are connected in
some physical or wireless way and sharing services or information, this is
referred to as a computer network. A computer network requires at least two
participants, with at least one of them acting as a client and at least one acting
as a server.
Major features and functions of Microsoft Windows Server 2008 R-2 as given
as.
Page
120
NETWORK ADMINISTRATION CIT-324
Windows Media Server, Internet Information Services 7 web server and Hyper-
V virtual server roles. Server Core can also be used to create a cluster with high
availability using failover clustering or network load balancing.
Active Directory: The Active Directory domain functionality that was retained
from Windows Server 2003 was renamed to Active Directory Domain Services
(ADDS)
Disk management and file storage: The ability to resize hard disk partitions
without stopping the server, even the system partition.
Page
121
NETWORK ADMINISTRATION CIT-324
The first part of the address is the devices network location and the last part
is known as its host address. Typically, the network location is the first 3 sets
of numbers and the host address is the last number.
A network address is divided according to the subnet mask. The most common
subnet is 255.255.255.0 which divides the network address as show in the
image above. The host number can be anything from 001 to 255 and should
be unique for every device. This allows up to 255 devices to communicate
within the same part of the network. Although the number of devices can be
extended beyond 255 by using a different subnet this is more advanced and is
typically only found in very large commercial networks.
1. Go to control Pannel
Page
122
NETWORK ADMINISTRATION CIT-324
3. Go to 'Setting Adapter'
Page
123
NETWORK ADMINISTRATION CIT-324
5. Go to TCP/IP settings
Page
124
NETWORK ADMINISTRATION CIT-324
7. Done
Page
125
NETWORK ADMINISTRATION CIT-324
The Internet is divided into domains, each of which serves a different group of
users. These domains include .com, .edu, .gov, and .mil. A top-level Internet
server, called a root name server (a name that makes sense if you think of the
Internet as an inverted tree structure), manages each of these domains.
Requirement
Domain
There are various kinds of DOMAIN:
1. Generic domain: com(commercial) .edu (educational) .mil (military)
.org (non profit organization) .net (similar to commercial) all these are
generic domain.
Page
126
NETWORK ADMINISTRATION CIT-324
1. Click on the Start Menu, Administrative Tools and Launch Server Manager.
Page
127
NETWORK ADMINISTRATION CIT-324
2. Select the Roles node and click the Add Roles link.
3. Select the DNS Server role check box and click Next.
Whenever configuring your DNS server, you must be known about following
concepts:
Forward Lookup Zones allow the DNS Server to resolve queries where
the client sends a name to the DNS Server to request the IP address of
the requested host.
Reverse Lookup Zones Reverse DNS zones perform the opposite task as
Forward Lookup Zones. They return the fully qualified domain name
(FQDN) of a given IP address.
Page
128
NETWORK ADMINISTRATION CIT-324
• Zone types
Primary zone (standard): Standard Primary zones are stored in a flat file on
the DNS Server. The Primary zone is considered the master copy of the zone
database file. All updates to the zone must be performed on the Primary zone
server.
Secondary zone: Secondary zones are read-only copies of the Primary zones.
Secondary zones replicate a copy of the zone from the Primary zone server to
provide redundancy. Any updates to the zone must be performed on the
Primary zone server.
Stub zone: Stub zones are similar to Secondary zones in that they are read-
only copies of the zone database file. Stub zones, however, contain only the
Name Server (NS), Start of Authority (SOA), and host (A) records for the Name
Servers.
Page
129
NETWORK ADMINISTRATION CIT-324
In short, we can say that the domain name server stores information about
part of the domain name space called a zone. The name server is authoritative
for a particular zone. A single name server can be authoritative for many
zones.
8. Click Next to open the Zone file dialog box. This allows you to select the
name of the zone file, or to load an existing zone file. Zone files are
stored in %winroot%\system32\dns.
9. If this is a new server, select Create New File. If you have a zone file
already, select Use This Existing File.
10. Click Next to open the Completing the New Zone Wizard dialog box,
which will give you a summary of the information you have input.
11. Check the information you have input, as you can still go back and
change it.
12. Click Finish to complete the zone creation.
Page
131
NETWORK ADMINISTRATION CIT-324
There are many enterprise companies who are still using DHCP for IPv4 on
their routers/switches. This is typically done by the network administrator
who needs to get a DHCP capability up and running quickly but does not have
access to a DHCP server. Most routers/switches have the ability to provide the
following DHCP server support:
• A DHCP relay and forward UDP DHCP messages from clients on a LAN
to and from a DHCP server
Page
132
NETWORK ADMINISTRATION CIT-324
Windows has always stored a great deal of important information in the event
logs. Unfortunately, with versions of Windows released prior to Windows
Vista, that information could be very hard to access. Event logs were always
stored on the local computer, and finding important events among the vast
quantity of informational events could be very difficult. With Windows Vista,
Windows Server 2008, and Windows Server 2003 R2, you can collect events
from remote computers (including computers running Windows XP) and
detect problems, such as low disk space, before they become more serious.
Additionally, Windows now includes many more event logs to make it easier
to troubleshoot problems with a specific Windows component or application.
Page
133
NETWORK ADMINISTRATION CIT-324
This lesson will describe how to manage events in Windows Server 2008 and
Windows Vista.
You can use quotas to ensure that no single user consumes more than his or
her share of disk space (which might prevent other users from saving files).
Shadow copies and backups allow you to quickly recover from data corruption
and hardware failures. This chapter describes how to use each of these
technologies and explains the new Windows Server 2008 File Services server
role. The following are the parts of file management.
This chapter describes how to install, share, and manage printers. Installing
the Print Services Server Role Windows Server 2008 can share printers without
adding any server roles. However, adding the Print Services server role adds
the Print Management snap-in, which simplifies printer configuration. To
install the Print Services server role, follow these steps:
1. In Server Manager, right-click Roles, and then choose Add Roles. The
Add Roles Wizard appears.
2. On the Before You Begin page, click Next.
3. On the Server Roles page, select the Print Services check box. Click
Next.
4. On the Print Services page, click Next.
5. On the Select Role Services page, select the appropriate check boxes
for the following roles, and then click Next:
o Print Server Installs the Print Management snap-in, described
later in this lesson. This is sufficient for allowing Windows and
many non-Windows clients to print.
o LPD Service Allows clients to print using the Line Printer
Daemon (LPD) protocol, which is commonly used by UNIX
clients.
o Internet Printing Allows clients to print using Internet Printing
Protocol (IPP) and creates a Web site where users can manage
print jobs using their Web browser. This role service requires
Internet Information Services (IIS).
6. If you are prompted to install the Web Server (IIS) role service, click
Add Required Role Services, and then click Next.
7. If the Web Server (IIS) page appears because you selected the Internet
Printing role service, click Next. Then, on the Select Role Services page,
configure the required IIS role services and click Next again.
8. On the Confirm Installation Selections page, click Install.
Page
135
NETWORK ADMINISTRATION CIT-324
Before attempting to use the Print Services management tools, close and
reopen Server Manager. You can access the Print Services tools using the
Roles\Print Services node in Server Manager. Installing Printers To allow
printers to be physically accessible to users while keeping print servers
secured, most modern printers are connected to the network.
Although users can print directly to network printers, using a print server gives
you stronger management capabilities. The following sections describe how to
install printers using either the Control Panel or the Print Management snap-
in. Installing a Printer Using Control Panel After connecting a printer either to
the network or to a server, follow these steps to install it using Control Panel
(the exact steps vary depending on the type of printer you install):
updated drivers from the Microsoft Web site, click Windows Update.
To use a driver included with the printer or downloaded from the
manufacturer’s web site, click Have Disk, select the driver, and then
click OK. Click Next.
9. On the Type a Printer Name page, type a name for the printer, and then
click Next.
10. On the Printer Sharing page, choose whether to share the printer. If
you do share the printer, type a location that will allow users to
physically find the printer. Click Next.
11. Click Finish. The printer is immediately available for use from the
server. If you chose to share the printer, it is also accessible to
authorized users.
Page
137
NETWORK ADMINISTRATION CIT-324
(c) While booting drive Selection (d) While choosing BIOS option
Page
139
NETWORK ADMINISTRATION CIT-324
Q.13: ____ DNS servers contain zone file copies that are read-only, meaning
they cannot be modified
Q.15: A computer system that act as relay between Client and server is
_________?
Page
140
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (c) Q.2 (a) Q.3 (b) Q.4 (b) Q.5 (c)
Q.6 (d) Q.7 (c) Q.8 (a) Q.9 (a) Q.10 (d)
Q.11 (a) Q.12 (c) Q.13 (b) Q.14 (b) Q.15 (a)
Short Questions
Long Questions
Page
141
NETWORK ADMINISTRATION CIT-324
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing.
2. Computer networks by Behrouz A. Forouzan.pdf.
3. Supporting Microsoft Windows Server 2008, Microsoft Press.
4. Administering Microsoft Windows VISTA, Microsoft Press.
5. TCP/IP Training, Microsoft Press.
6. Networking Essentials, Microsoft Press.
7. Microsoft Windows Exchange Server, Microsoft Press.
8. Microsoft TMG Server, Microsoft Press.
Page
142
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Page
143
NETWORK ADMINISTRATION CIT-324
The Client Access server role is the server that clients (eg Outlook, Outlook
Web App, ActiveSync) connect to for mailbox access. The Client Access server
authenticates, and redirects or proxies those requests to the appropriate
Mailbox server.
Mailbox servers host the databases that contain mailbox and public folder data. As
with Exchange 2010 the Exchange 2013 Mailbox server role can be made highly
available by configuring a Database Availability Group.
The Edge Transport role can be used to satisfy the requirement that some
organizations have to not permit any direct communications from the internet
to internal networks.
• 64Bit CPU.
• 8GB RAM for MBX, 4GB for CAS, or 8GB for Multi-Role.
• Page File = RAM + 10MB.
• 30GB Free on install drive plus 500MB for each language pack.
• 200MB free on system drive.
• 500MB free on queue drive.
• Disks formatted as NTFS.
Page
144
NETWORK ADMINISTRATION CIT-324
Page
145
NETWORK ADMINISTRATION CIT-324
Exchange Server 2013 will update Active Directory schema. Make sure the
user you are going to login with is a domain user that has the following
privileges: Domain Admin, Enterprise Admin and Schema Admin.
Page
146
NETWORK ADMINISTRATION CIT-324
Page
147
NETWORK ADMINISTRATION CIT-324
Page
148
NETWORK ADMINISTRATION CIT-324
Page
149
NETWORK ADMINISTRATION CIT-324
Browse to the Exchange Setup files, in my case, the DVD drive letter is E: , then type
the below command and hit Enter
Page
150
NETWORK ADMINISTRATION CIT-324
Page
151
NETWORK ADMINISTRATION CIT-324
Page
152
NETWORK ADMINISTRATION CIT-324
Once download is completed, run the Filter Pack setup, and then click Next
on the Welcome to the Microsoft Filter Pack 2.0 Setup Wizard page
Page
153
NETWORK ADMINISTRATION CIT-324
8. Download and Install Microsoft Office 2010 Filter Packs SP1 64 bit.
Page
154
NETWORK ADMINISTRATION CIT-324
After we installed Microsoft Filter Packs 2.0 64bit, we need to update it to SP1. Run
the setup, accept the license terms and click Continue.
With the installation of Service Pack 1 for Microsoft Filter Pack 2010 64bit,
our Server is up and ready for Exchange Server 2013 installation.
In Microsoft Exchange Server 2010, the Mailbox server role hosted both
mailbox and public folder databases and also provided email message storage.
Page
155
NETWORK ADMINISTRATION CIT-324
Now, in Exchange Server 2013, the Mailbox server role also includes the Client
Access protocols, Transport service, mailbox databases, and Unified
Messaging components.
In Exchange 2013, the Mailbox server role interacts directly with Active
Directory, the Client Access server, and Microsoft Outlook clients in the
following process:
Page
156
NETWORK ADMINISTRATION CIT-324
Deploying the mailbox role requires the careful planning of mailbox role
components. Despite advancements in storage technologies and improved I/O
characteristics, it’s detrimental to deploy mailbox storage without considering
storage characteristics, such as disk latency. Capacity planning is also just as
important. With 16 terabytes as the supported maximum database size, it
could be tempting to maximize database size with larger Serial ATA (SATA)
disks. When considering such extremes, it’s important to consider other
dependencies, such as time to reseed after a disk failure, time to restore from
backups when multiple copies of the database are neither deployed nor
available, the ability to meet recovery time objectives in case of an outage or
a disaster, and so on.
While creating new mailbox for the existing active directory user, various mail
attributes are added to user’s object in Active Directory. The diagram below
shows components of Mailbox. If you delete a mailbox from Exchange server,
Page
157
NETWORK ADMINISTRATION CIT-324
the user associated with the mailbox is also deleted from active directory. To
delete only the mailbox and retain user account, just disable the particular
mailbox in Exchange server.
Image Source: Microsoft Enough with the information. Let’s create some
mailboxes now. Open the Exchange Admin center.
Select recipient in features pane. Click mailboxes tab. Click add and select
user mailbox option.
Page
158
NETWORK ADMINISTRATION CIT-324
Choose Existing user option and click browse. This means, mailbox will be
created for user account which is already in active directory. If you want to
create mailbox for user account that is not in active directory then, choose
new user and start filling all the boxes. This process will create user account in
active directory. So it’s the same thing either way.
Page
159
NETWORK ADMINISTRATION CIT-324
Select the user for whom you want to create mailbox. Click OK. As you can
see above, the organization unit is also shown where this user reside. It is
under Management OU> Users OU.
If you want different alias or different SMTP name for this mailbox, then you
can configure it here on alias section. If left blank, the SMTP name will be the
user logon name as explained in my earlier article. Click save to create the
mailbox.
You can now see the mailbox. The SMTP name is DShields@mustbegeek.com
which is also the user logon name. In this way you can create mailbox for active
Page
160
NETWORK ADMINISTRATION CIT-324
Mailboxes are the most common recipient type used by information workers
in an Exchange organization. Each mailbox is associated with an Active
Directory user account. The user can use the mailbox to send and receive
messages, and to store messages, appointments, tasks, notes, and documents.
Use the EAC or the Shell to create user mailboxes. You can also create user
mailboxes for existing users that have an Active Directory user account but
don’t have a corresponding mailbox.
The people and resources that send and receive messages are the core of any
messaging and collaboration system. In an Exchange organization, these
people and resources are referred to as recipients. A recipient is any mail-
enabled object in Active Directory to which Microsoft Exchange can deliver or
route messages.
The following table lists the available recipient types. All these recipient types
are discussed in more detail later in this topic.
Page
162
NETWORK ADMINISTRATION CIT-324
Page
163
NETWORK ADMINISTRATION CIT-324
Mailboxes
Mailboxes are the most common recipient type used by information workers
in an Exchange organization. Each mailbox is associated with an Active
Directory user account. The user can use the mailbox to send and receive
messages, and to store messages, appointments, tasks, notes, and documents.
Mailboxes are the primary messaging and collaboration tool for the users in
your Exchange organization.
Mailbox components
Each mailbox consists of an Active Directory user and the mailbox data that's
stored in the Exchange mailbox database (as shown in the following figure). All
configuration data for the mailbox is stored in the Exchange attributes of the
Active Directory user object. The mailbox database contains the actual data
that's in the mailbox associated with the user account.
After installing and configuring Exchange 2013 you have to create recipients
to be able to send and receive emails. There are different types of recipients
in Exchange 2013. Different type of recipients is created and used for different
purpose. A recipient is any mail-enabled object in Active Directory. It is
important to understand different types of recipients before you configure
user mailbox in Exchange Server 2013. In this post, I will create user mailbox
of existing user account of active directory.
Page
164
NETWORK ADMINISTRATION CIT-324
Contacts: Contact recipients can be mailing contact or mail user. Mail contact
is an active directory contact that is mail enabled. Mail user is an active
directory user that can log into active directory domain but has an external
email address.
Shared: With shared recipient, single mailbox can be used by multiple users.
Page
165
NETWORK ADMINISTRATION CIT-324
Public folder content can include email messages, posts, documents, and
eForms. The content is stored in the public folder mailbox but isn't replicated
across multiple public folders mailboxes. All users access the same public
folder mailbox for the same set of content.
Page
166
NETWORK ADMINISTRATION CIT-324
Q.2: Which version of the .NET Framework is required for Exchange Server
2013?
(a) 1 (b) 2
(c) 5 (d) 10
Q.5: abc.com have two Exchange 2013 multirole servers, all users using
outlook 2013 as mail client. If a user, sending a mail to another user
within organization, which transport service, will come first for
inbound mails?
Page
167
NETWORK ADMINISTRATION CIT-324
Q.7: Which Exchange Server 2013 role is responsible for routing email
within the organization?
Q.8: Which Exchange Server 2013 role is responsible for hosting user
mailboxes?
Q.10: Which administration tool is used for managing Exchange Server 2013
from a remote computer?
Q.11: Which role in Exchange Server 2013 is responsible for securing email
communication between the organization and external entities?
Page
168
NETWORK ADMINISTRATION CIT-324
Q.12: What is the primary function of the Mailbox server role in Exchange
Server?
Q.16: Which protocol is commonly used for client access to Exchange Server
mailboxes?
Page
169
NETWORK ADMINISTRATION CIT-324
Q.17: What is the purpose of the Exchange Information Store service on the
Mailbox server?
Q.20: This server role host both mailbox and public folder databases and also
provides email message storage?
ANSWER KEY
Page
170
NETWORK ADMINISTRATION CIT-324
Q.1 (a) Q.2 (c) Q.3 (c) Q.4 (c) Q.5 (d)
Q.6 (b) Q.7 (d) Q.8 (a) Q.9 (c) Q.10 (d)
Q.11 (c) Q.12 (b) Q.13 (a) Q.14 (c) Q.15 (c)
Q.16 (d) Q.17(c) Q.18 (b) Q.19 (b) Q.20 (b)
Short Questions
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
172
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
• Outlook Web App: Helps users access voicemail, email, SMS texts,
instant messaging (IM) and more via standard browsers
• Exchange ActiveSync: Allows mobile users to access a universal inbox
with voicemail, email, IM and smartphone messages
• Retention, Discovery and Email Archiving: Help reduce expenditures
and simplify the maintenance of business communication processes
• Backup and Disaster Recovery: Features a unified solution for disaster
recovery and backup by offering an automatic, quick, database-level
recovery from server, database and network failures.
Page
173
NETWORK ADMINISTRATION CIT-324
Page
174
NETWORK ADMINISTRATION CIT-324
PowerShell has become the preferred tool for managing Microsoft server
products. Sysadmins can take full advantage of PowerShell to manage roles
and perform routine management tasks. By using the command line,
sysadmins are able to:
• Create a mailbox
• Configure a receive connector
• Generate a custom report
• Manage Distribution Group members, permissions, and group types
• Manage Exchange Services.
Let’s take a look at a couple of ways that you can use the EMS in a scripting
environment. When you install an Exchange Server, you get the Exchange tools
installed along with it which give you the EMS.
All access is controlled through roles that people are given, which is a set of
permissions. An employee's role determines what permissions he or she is
granted. For example, a CEO will be given the role of CEO and have any
permissions associated with that role, while network administrators will be
given the role of network administrator and will have all the permissions
associated with that role.
Page
176
NETWORK ADMINISTRATION CIT-324
What if an end-user's job changes? You may need to manually assign their role
to another user, or you can also assign roles to a role group or use a role
assignment policy to add or remove members of a role group.
By adding a user to a role group, the user has access to all the roles in that
group. If they are removed, access becomes restricted. Users may also be
assigned to multiple groups in the event they need temporary access to certain
data or programs and then removed once the project is complete.
Page
177
NETWORK ADMINISTRATION CIT-324
Benefits of RBAC
Reducing administrative work and IT support. With RBAC, you can reduce the
need for paperwork and password changes when an employee is hired or
changes their role. Instead, you can use RBAC to add and switch roles quickly
and implement them globally across operating systems, platforms and
applications. It also reduces the potential for error when assigning user
permissions. This reduction in time spent on administrative tasks is just one of
several economic benefits of RBAC. RBAC also helps to more easily integrate
third-party users into your network by giving them pre-defined roles.
Improving compliance. All organizations are subject to federal, state and local
regulations. With an RBAC system in place, companies can more easily meet
statutory and regulatory requirements for privacy and confidentiality as IT
departments and executives have the ability to manage how data is being
accessed and used. This is especially significant for health care and financial
institutions, which manage lots of sensitive data such as PHI and PCI data.
• Current Status: Create a list of every software, hardware and app that
has some sort of security. For most of these things, it will be a
Page
178
NETWORK ADMINISTRATION CIT-324
password. However, you may also want to list server rooms that are
under lock and key. Physical security can be a vital part of data
protection. Also, list the status of who has access to all of these
programs and areas. This will give you a snapshot of your current data
scenario.
• Current Roles: Even if you do not have a formal roster and list of roles,
determining what each individual team member does may only take a
little discussion. Try to organize the team in such a way that it doesn’t
stifle creativity and the current culture (if enjoyed).
• Write a Policy: Any changes made need to be written for all current and
future employees to see. Even with the use of a RBAC tool, a document
clearly articulating your new system will help avoid potential issues.
• Make Changes: Once the current security status and roles are
understood (not to mention a policy is written), it’s time to make the
changes.
• Continually Adapt: It’s likely that the first iteration of RBAC will require
some tweaking. Early on, you should evaluate your roles and security
status frequently. Assess first, how well the creative/production
process is working and secondly, how secure your process happens to
be.
A Microsoft Exchange 2013 site mailbox is an Exchange 2013 feature that helps
facilitate collaboration between SharePoint 2013 users. Introduced in the
Exchange Server 2013 release, site mailboxes give users access to both
Exchange email and SharePoint documents through Microsoft Outlook 2013.
Page
179
NETWORK ADMINISTRATION CIT-324
Mailboxes are the most common recipient type used by information workers
in an Exchange organization. Each mailbox is associated with an Active
Directory user account. The user can use the mailbox to send and receive
messages, and to store messages, appointments, tasks, notes, and documents.
Use the EAC or the Shell to create user mailboxes. You can also create user
mailboxes for existing users that have an Active Directory user account but
don’t have a corresponding mailbox. This is known as mailbox-enabling
existing users.
When you create a new user mailbox, you can’t use an apostrophe (') or a
quotation mark (") in the alias or the user logon name because these
characters aren’t supported. Although you might not receive an error if you
create a new mailbox using unsupported characters, these characters can
cause problems later. For example, users that have been assigned access
permissions to a mailbox that was created using an unsupported character
may experience problems or unexpected behavior.
• General
• Mailbox Usage
• Contact Information
• Organization
• Email Address
• Mailbox Features
• Member Of
• MailTip
• Mailbox Delegation
Page
180
NETWORK ADMINISTRATION CIT-324
Recipients (which include users, resources, contacts, and groups) are any mail-
enabled object in Active Directory to which Microsoft Exchange can deliver or
route messages. For a recipient to send or receive email messages, the
recipient must have an email address. Email address policies generate the
primary and secondary email addresses for your recipients so they can receive
and send email.
Page
181
NETWORK ADMINISTRATION CIT-324
Q.2: Which tool is commonly used for managing Exchange Server through a
command-line interface?
Q.10: What is the default mailbox size limit for a user mailbox in Exchange
Server?
(a) 1 GB (b) 2 GB
(c) 5 GB (d) 10 GB
Page
183
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (a) Q.2 (d) Q.3 (a) Q.4 (b) Q.5 (a)
Q.6 (d) Q.7 (d) Q.8 (c) Q.9 (c) Q.10 (c)
Page
184
NETWORK ADMINISTRATION CIT-324
Q.11 (c) Q.12 (b) Q.13 (a) Q.14 (a) Q.15 (b)
Short Questions
Long Questions
Page
185
NETWORK ADMINISTRATION CIT-324
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
186
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Forefront TMG 2010 has been built on top of the core capabilities delivered in
Microsoft Internet Security and Acceleration (ISA) Server 2004/2006 in order
to deliver a comprehensive, enhanced and integrated network security
gateway. Forefront TMG provide additional protection capabilities to help
secure the corporate network from external/Internet-based threats. Forefront
TMG 2010 prevent abuse of networks from internal and external entity.
Forefront provide more management capabilities in terms security and
protection. Forefront TMG 2010 is available in Standard Edition and Enterprise
Edition. Standard version does not support Array/NLB/CARP support and
Enterprise Management. For E-mail Protection each version requires Exchange
license.
Page
187
NETWORK ADMINISTRATION CIT-324
1. Routing and remote access features: Microsoft Forefront TMG can act
as a router, an Internet gateway, a virtual private network(VPN) server,
a network address translation (NAT) server and a proxy server.
2. Security features: Microsoft Forefront TMG is a firewall which can
inspect network traffic (including web contents, secure web
contents and emails) and filter out malware, attempts to exploit
security vulnerabilities and content that does not match a predefined
security policy. In technical sense, Microsoft Forefront TMG
offers application layer protection, stateful filtering, content
filtering and anti-malware protection.
3. Network performance features: Microsoft Forefront TMG can also
improve network performance: It can compress web traffic to improve
communication speed. It also offers web caching: It can cache
frequently-accessed web contents so that users can access them faster
from the local network cache. Microsoft Forefront TMG 2010 can also
cache data received through Background Intelligent Transfer Service, such
as updates of software published on Microsoft Update website.
The TMG is one of the several pieces of software that comprise the Forefront
Stirling collection of products. You can download all of the them, or just the
Page
188
NETWORK ADMINISTRATION CIT-324
TMG. The TMG will work fine without Stirling, but Stirling is something that
you definitely want to get to know about in the future.
Double click the file you downloaded. You’ll see the Welcome to the Welcome
to the Install Shield Wizard for the Forefront Threat Management
Gateway page. Click Next.
Install the files to the default location, which is C:\Program Files (x86)\
Microsoft ISA Server. Click Next
Page
189
NETWORK ADMINISTRATION CIT-324
The files will be extracting in Figure 2. The files will be extracted to that
location.
Page
190
NETWORK ADMINISTRATION CIT-324
Go to the C:\Program Files (x86)\Microsoft ISA Server folder and double click
the ISA Auto run .exe file.
This opens up the Microsoft Forefront TMG 270-Day Evaluation Setup dialog
box. Click the Install Forefront TMG link.
Page
191
NETWORK ADMINISTRATION CIT-324
This bring up the Welcome to the Installation Wizard for Microsoft Forefront
Threat Management Gateway page. Click Next.
Page
192
NETWORK ADMINISTRATION CIT-324
On the License Agreement page, select the I accept the terms in the license
agreement option and click next. Notice that license agreement still contains
the old code name of the product, which was Nitrogen.
On the Customer Information page, enter your User Name and Organization.
The Product Serial Number will be filled in for you. Click Next.
Page
193
NETWORK ADMINISTRATION CIT-324
Here we see a new setup option that wasn’t available in previous version of
the product. On the Setup Scenarios page, you have the option to install the
Forefront TMG or install only the TMG Management console. In this example
we’re installing the entire product, so we’ll select Install Forefront Threat
Management Gateway and click next.
On the Component Selection page, you have the options to install the TMG
firewall software, the TMG management console, and the CSS. Yes, you guess
it. There are no more Standard and Enterprise editions of the ISA firewall. The
TMG will be sold as a single edition and this single edition uses the CSS, even
if you have only a single member TMG array. However, you will be able to
create arrays using the TMG. However, that functionality is not available with
this version of the TMG and will be available in later betas.
In this example we’ll install all of these options in the default folder (we need
to install in the default folder for this version of the TMG). Click Next.
Page
194
NETWORK ADMINISTRATION CIT-324
It looks like I have a problem here. While the machine is a member of the
domain, I forgot to log on with a user account that is a domain member. In
order to install the TMG, you must be logged on as a domain user that has local
administrator privileges on the TMG machine.
Looks like I’m going to have to restart the installation. We’ll pick up where we
left off after I log off and log on again and restart the installation.
Page
195
NETWORK ADMINISTRATION CIT-324
Now that I’m logged on as a domain user with local admin privileges, we pick
up the installation process on the Internal Network page. If you’re installed
the ISA Firewall, you’ll recognize this page from previous version of the ISA
Firewall. This is where you define the default internal network. In almost all
cases you should select the Add Adapter option, since this will define your
default internal network based on the routing table configured on the ISA
Firewall. However, one thing I don’t know is if I change the configuration of
the routing table on the ISA Firewall if the definition of the default Internal
Network will automatically change. I’ll bet a quarter that it doesn’t, but it’s
something we’ll have to check into in the future.
Page
196
NETWORK ADMINISTRATION CIT-324
The Internal Network page now shows the definition of the default Internal
Network. Click Next.
Page
197
NETWORK ADMINISTRATION CIT-324
The Services Warning page informs you that the SNMP Service, the IIS Admin
Service, the World Wide Web Publishing Service and the Microsoft
Operations Manager Service will all be restarted during the installation. It’s
unlikely that you’ll have already installed the Web server role on this machine,
so you don’t need to worry about the IIS Admin Service or the World Wide
Web Publishing Service, but you should be aware of the SNMP and Microsoft
Operation Manager Service restart. Remember, TMG will install and configure
IIS 7 for you.
Page
198
NETWORK ADMINISTRATION CIT-324
The progress bar shows you the installation progress. Here you can see the CSS
being installed.
Page
199
NETWORK ADMINISTRATION CIT-324
It worked! The Installation Wizard Completed page shows the installation has
completed successfully. Put a checkmark in the Invoke Forefront TMG
Management when the wizard closes checkbox. Click Finish.
At this point you’ll see the Protect the Forefront TMG Server Web page. Here
you’re provided information on turning on Microsoft Update, running the ISA
BPA, and reading the Security and Protection Section in the Help file. One
thing I can tell you about the Help File so far is that they’ve done a fantastic
job at upgrading its content. There is much more information, and much more
real world deployment information included with the new and improved Help
File. I recommend that you spend some time reading the Help file. I guarantee
that even if you’re a seasoned ISA Firewall admin, the TMG Help File is going
to provide you some new insights.
Page
200
NETWORK ADMINISTRATION CIT-324
After the initial installation is complete, you’ll see the new Getting Started
Wizard. The Getting Started Wizard is new with the TMG and wasn’t available
in the previous versions of the ISA Firewall. There are three basic wizards
included in the Getting Started Wizard, and an optional fourth one that we’ll
see when we finish the first three.
The first wizard is the Configure network settings wizard. Click the Configure
network settings link on the Getting Started Wizard page.
Page
201
NETWORK ADMINISTRATION CIT-324
On the Network Template Selection page, select the network template that
you want to apply to the TMG. These are the same network templates that
Page
202
NETWORK ADMINISTRATION CIT-324
were available with previous versions of the ISA Firewall. Click on each of the
options and read the information provided on the lower part of the page.
In this example, we’ll use the preferred template, which is the Edge
firewall template. Click Next.
On the Local Area Network (LAN) Settings page, you are given the opportunity
to configure IP addressing information on the LAN interface. First, you select
the NIC that you want to be the LAN interface on the ISA Firewall by clicking
the drop-down menu for Network adapter connect to the LAN. The IP
addressing information for this NIC will appear automatically. You can make
changes to the IP addressing information here. Also, you can create additional
static routes by clicking the Add button.
One thing I don’t know is what changes on this page will do to the definition
of the default Internal Network. Suppose I configured the default Internal
Network to be 10.0.0.0-10.0.0.255 but then decided to change the IP address
on the internal interface on this page so that the was on a different network
ID. Will the definition of the default Internal Network change? What if I add a
static route on the internal interface of the TMG? Will this change be reflected
in the definition of the default Internal Network? I don’t know, but it’s
something to investigate in the future.
Page
203
NETWORK ADMINISTRATION CIT-324
I won’t make any changes on this page as I had already set up the internal
interface with the IP addressing information I required. Click Next.
Page
204
NETWORK ADMINISTRATION CIT-324
The Completing the Network Setup wizard page shows you the results of your
changes. Click Finish.
This takes you back to the Getting Started Wizard page. The next wizard is
the Configure system settings wizard. Click the Configure system
settings link.
Page
205
NETWORK ADMINISTRATION CIT-324
The Host Identification page asks you about the host name and domain
membership of the TMG firewall. In this example, it has automatically
detected the host name of the machine, which is TMG2009. The wizard has
also identified the domain membership of the machine. I suspect that this
wizard will allow you to join a domain if you haven’t yet done so, and to leave
the domain if you want to. Also, if the machine is a workgroup member, you
have the opportunity to enter a primary DNS suffix that the ISA Firewall can
use to register in your domain DNS, if you have DDNS enabled and you don’t
require secure DDNS updates.
Since I have already configured this machine as a domain member, I don’t
need to make any changes on this page. Click Next.
Page
206
NETWORK ADMINISTRATION CIT-324
That’s it for the System Configuration Wizard. Click Finish on the Completing
the System Configuration Wizard page.
One more wizard on the Getting Started Wizard page. Click the Define
deployment options link.
Page
207
NETWORK ADMINISTRATION CIT-324
On the Microsoft Update Setup page, you have to the options Use the
Microsoft Update service to check for updates and I do not want to use
Microsoft Update Service. Note that not only does the TMG use the Microsoft
Update service to update the OS and the TMG firewall software, it also uses it
to check for malware definitions, which is does several times a day (by default,
Page
208
NETWORK ADMINISTRATION CIT-324
On the Definition Update Settings page, you select whether you want the
TMG firewall to check and install, check only or do nothing with malware
inspection updates. You can also set the polling frequency, which is set at
every 15 minutes by default. However, you can set the updates to be
downloaded once a day, and then configure the time of day when you want
those updates installed. Click Next.
Page
209
NETWORK ADMINISTRATION CIT-324
On the Customer Feedback page, choose whether or not you want to provide
anonymous information to Microsoft on your hardware configuration and how
the product is used. No information shared with Microsoft can be used to
identify you, and no private information is released to Microsoft. I figure I
share my name, birth date, social security number, drivers license number and
address with my bank, and I trust Microsoft a lot more than I trust my bank,
given the bank’s requirements to share information with the Federal
Government. So sharing this technical information with Microsoft is a no-
brainer, and it helps make the product more stable and secure. Select Yes, I
am willing to participate anonymously in the Customer Experience
Improvement Program (recommended) option.
Page
210
NETWORK ADMINISTRATION CIT-324
On the Microsoft Telemetry Service page, you can configure your level of
membership in the Microsoft Telemetry service. The Microsoft Telemetry
Service helps protect against malware and intrusion by reporting information
to Microsoft about potential attacks, which Microsoft uses to help identify
attack patterns and improve precision and efficiency of threat mitigations. In
some instances, personal information might be inadvertently sent to
Microsoft, but Microsoft will not use this information to identify or contact
you. It’s hard to determine what kind of personal information might be sent,
but since I’m in the habit of trusting Microsoft, I’ll select the Join with an
advanced membership option. Click Next.
Page
211
NETWORK ADMINISTRATION CIT-324
The Completing the Deployment Wizard page shows the choices you made.
Click Finish.
That’s it! You’re done with the Getting Started Wizard. But that doesn’t mean
that you’re done. If you put a checkmark in the Run the Web Access
wizard checkbox, the Web Access Wizard will start. Let’s put a checkmark
there and see what happens.
Page
212
NETWORK ADMINISTRATION CIT-324
This starts the Welcome to the Web Access Policy Wizard. Since this is a new
way of creating TMG firewall policies, I think we’ll wait until the next article to
get into the details of this wizard. It seems that the TMG will allow you to
configure Web Access Policy in a way that’s a bit different than how we did it
with previous versions of the ISA Firewall, so I want to make sure we have an
article dedicated to this feature.
Page
213
NETWORK ADMINISTRATION CIT-324
Now that installation is complete, we can see the new console. If you look at
the left pane of the console, you’ll see that there aren’t any nested nodes,
which makes navigation a bit easier. Also, we see a new node,
the Update Center node. This is where you can get information about updates
to the anti-malware feature of the TMG, and also find out when the malware
updates where installed.
Page
214
NETWORK ADMINISTRATION CIT-324
After installation completed, I found that there were some errors. But this
might be related to the fact that the TMG didn’t work at all after the
installation was complete. I was able to solve this problem by restarting the
computer. I’m not sure if there is related to running the TMG firewall on
VMware Virtual Server, or if this is a beta bug.
Taking a look at the Initial Configuration Tasks you can see that a number of
roles and services were installed on this computer as part of the TMG
installation. These include:
• Active Directory Lightweight Directory Services (ADAM)
• Network Policy and Access Services (required for RRAS and VPN)
Page
215
NETWORK ADMINISTRATION CIT-324
• Web Server (IIS) (required for SQL reporting services and TMG reporting)
• Network Load Balancing Services (required for NLB support)
• Remote Server Administration Tools (don’t know why these were installed)
• Windows Process Activation Service (most likely secondary to the Web
server role requirements)
Page
216
NETWORK ADMINISTRATION CIT-324
For the Internet to grow and be sustainable, network operators need the
technical capacity necessary to build, maintain, and protect networks, as well
as make informed choices about new infrastructure implementations and
methodologies. With Internet technology changing rapidly, capacity building
needs to be an ongoing process and local information-sharing mechanisms
must be in place to sustain knowledge transfer beyond classroom trainings.
Internet Society’s technical capacity building programmed goals are to:
Page
217
NETWORK ADMINISTRATION CIT-324
Page
218
NETWORK ADMINISTRATION CIT-324
ROUTE Connection:
▪ A route relationship is bidirectional
▪ If a routed relationship is defined from Branch to Internal network,
a routed relationship also exits from Internal to Branch Network.
▪ In route relationship, client requests from the source network are
directly routed to the destination network. The Source IP address is
always preserved.
NAT Connections:
▪ When the source and destination Network use Private addresses, then
we can use a route relationship.
▪ When the source Network use Private address and destination
Network use public address, then we can use a NAT relationship.
Note: In the real scenario, sometimes we have to go beyond this Guru
Mantra. But most of the cases this Guru Mantra will work.
Page
219
NETWORK ADMINISTRATION CIT-324
Here, TMG 2010 Server has 5 NICs. They are named as Internal, Branch, LAN,
DMZ and External. Branch offices use Cisco routers and are connected with
head office using Cisco router with static routing and IPsec Site-to-Site VPN.
Here we will focus on configuring TMG Firewall so that Head Office and branch
offices can communicate with each other over Intranet and the Internet. In
this scenario, we have to add all branch office internal network addresses in
the TMG Server on the Branch Network (NIC Card). Then we have to add static
route (all branch offices Internal Network) in TMG 2010 to reach branch offices
network because TMG 2010 will not support dynamic routing.
When we install TMG 2010 Firewall, by default TMG 2010 will only detect two
networks, Internal and External. TMG 2010 will not detect more than two NICs
even if the Windows Server 2008 R2 recognizes more than two.
1. First create new network for branch and give the name as your design. Here
we will name it as Branch.
2. Second, configure network rule; Branch Network TO Internal, LAN, DMZ as
Route relationship Branch Network TO External as NAT relationship.
3. At last, create Access rule to control traffic.
Page
220
NETWORK ADMINISTRATION CIT-324
2. On the Welcome to the New Network Wizard page, type Branch in the
Network Name box and click next.
Page
221
NETWORK ADMINISTRATION CIT-324
Page
222
NETWORK ADMINISTRATION CIT-324
Page
223
NETWORK ADMINISTRATION CIT-324
Page
224
NETWORK ADMINISTRATION CIT-324
Page
225
NETWORK ADMINISTRATION CIT-324
2. On the Welcome to the New Network Rule Wizard page, type Branch
to Internal, LAN & DMZ in the Network Rule name box and click Next.
Page
226
NETWORK ADMINISTRATION CIT-324
Page
227
NETWORK ADMINISTRATION CIT-324
Page
228
NETWORK ADMINISTRATION CIT-324
Page
229
NETWORK ADMINISTRATION CIT-324
8. On the Completing the New Network Rule Wizard page, click Finish.
Click Apply to save changes and update the configuration. Then again
click Apply and click OK to Saving Configuration Changes.
Page
230
NETWORK ADMINISTRATION CIT-324
9. Apart from this, create a Network Rule for Branch to External as NAT
Network Relationship to access the Internet.
Page
231
NETWORK ADMINISTRATION CIT-324
After us Create Network and Network Rule for Branch Network, then we have
to Create Access Rule to control traffic. For this please look into my previous
article on Configuring Access Rules for Internet Access in TMG 2010.
According to our network diagram, we have to work on some more steps to
access branch offices to head office server zone, LAN and DMZ. And from Head
office to branch offices. In our scenario, TMG 2010 Firewall is configured with
5 NICs and only Branch NIC is connecting to the branch offices network. So we
must add all the branch offices internal network addresses in the branch
network in the TMG. Lastly, we must add static route in the TMG Firewall to
reach each branch offices from the TMG Firewall.
Perform the following steps to add branch offices internal networks in TMG
Firewall Branch Network:
Page
232
NETWORK ADMINISTRATION CIT-324
2. In the Branch Properties dialog box, click Addresses, click Add Range…
3. In the IP Address Range Properties dialog box, type the branch offices
Internal Address ranges. Here address ranges are:
192.168.202.0, 192.168.202.255, 192.168.203.0, 192.168.203.255
192.168.204.0, 192.168.204.255
Page
233
NETWORK ADMINISTRATION CIT-324
Then click OK to close Branch Properties. Click Apply to save changes and
update the configuration. Then again click Apply and click OK to Saving
Configuration Changes.
Page
234
NETWORK ADMINISTRATION CIT-324
Perform the following steps to add static route in TMG 2010 Firewall:
1. Open the command prompt at the TMG 2010, type the following commands
to add static route to reach branch offices.
Page
235
NETWORK ADMINISTRATION CIT-324
=============================================================
Page
236
NETWORK ADMINISTRATION CIT-324
On each Branch Office Router, add the default route to Head Office:
Ip route 0.0.0.0 0.0.0.0 172.16.240.1
Page
237
NETWORK ADMINISTRATION CIT-324
9. Click File –> add remove Snap-in –> Certificates –> ADD –> Computer
account-> Next –> finish-> ok
10. Click Personal –> Right Click certificates –> all task –> import –> next –
> select file –> next –> next finish
Page
238
NETWORK ADMINISTRATION CIT-324
Page
239
NETWORK ADMINISTRATION CIT-324
7. The external name is what you use to access OWA (Also needs to be on
the cert)
10. Select one of the External IPs listed (not all IP addresses or you can’t do
multiple auth methods)
Page
241
NETWORK ADMINISTRATION CIT-324
13. You can configure SSO if you have other sites that will use this listener
Page
242
NETWORK ADMINISTRATION CIT-324
14. Click –> Next –> Finish –> Select the Listener.
Page
243
NETWORK ADMINISTRATION CIT-324
You CANNOT use “all users” here you need to have authenticated users or
another group that requires authentication or your will not get prompted for
auth. and get a 500.24 in browser
15. Finish
16. Now OWA is published!
17. Now on to EWS\Outlook Anywhere
Page
244
NETWORK ADMINISTRATION CIT-324
Q.4: Which deployment scenario would typically involve using TMG server?
Page
245
NETWORK ADMINISTRATION CIT-324
Q.7: Which feature of TMG server allows secure access to internal web
applications for external users?
ANSWER KEY
Q.1 (b) Q.2 (c) Q.3 (b) Q.4 (c) Q.5 (a)
Q.6 (a) Q.7 (d) Q.8 (b) Q.9 (c) Q.10 (c)
Page
246
NETWORK ADMINISTRATION CIT-324
Short Questions
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
247
NETWORK ADMINISTRATION CIT-324
Objectives
After completion of this chapter students will be able to:
Define whether traffic from the source network is allowed to pass to the
destination network. The TOE (Target of Evaluation) includes a list of
preconfigured, well-known protocol definitions, including the Internet
protocols which are most widely used. It is possible to add or modify additional
protocols. When a client requests an object using a specific protocol, the TOE
checks the access rules. A request is processed only if an access rule specifically
allows the client to communicate using the specific protocol and also allows
access to the requested object.
The management console will connect to the remote TMG server, and now
you can start working on the console as if you were sitting in front of the TMG
Page
248
NETWORK ADMINISTRATION CIT-324
server itself. Once you are done with remotely managing a TMG server, click
on Disconnect from Forefront TMG Management located at the right pane
under the Tasks tab.
The security issue with PPTP isn’t with the protocol itself. Rather, the problem
lies with the MS-CHAPv2 authentication protocol, which is the default
authentication method used when PPTP VPN is enabled on the TMG firewall.
Earlier this year, security researches demonstrated a method to crack the MS-
CHAPv2 authentication protocol with a 100% success rate. With the public
availability of tools to automate the process of cracking MS-CHAPv2, PPTP
communication using MS-CHAPv2 should be considered unencrypted. If PPTP
is deployed for remote access VPN connectivity, security administrators
should take steps to better secure their environment.
Page
250
NETWORK ADMINISTRATION CIT-324
Page
251
NETWORK ADMINISTRATION CIT-324
Note: If you have enabled NAP integration with TMG for VPN clients, EAP must
be configured on the Network Policy Server (NPS). Click the configuring
EAP link on the dialog box for more information. When you select the option
to enable EAP you are presented with an information dialog box indicating that
EAP authenticated users belong to the RADIUS namespace and are not part of
the Windows namespace. To apply user-based access rule to these users you
can either define a RADIUS user set for them or you can use user mapping to
map these users to the Windows namespace (this requires the TMG firewall
be joined to a domain). If user mapping is enabled, access rules applied to the
Windows users and groups will be applicable to EAP authenticated users.
Page
252
NETWORK ADMINISTRATION CIT-324
On the client side, open the Network and Sharing Center and click Change
adapter settings. Right-click the existing PPTP VPN connection and
choose Properties. Click the Security tab, then select the option to Use
Extensible Authentication Protocol (EAP). From the drop-down box
choose Smart card or another certificate (encryption enabled).
Click the Properties button and, if you are using client certificates installed on
the local machine and not smart cards, select the option to Use a certificate
on this computer. Next, enter the internal hostname of the TMG firewall in
the Connect to these server’s text box. This name must match the name on
the computer certificate issued to the TMG firewall. For TMG enterprise
arrays, enter the name of each firewall in the array, separated by semicolons.
Lastly, select the Trusted Root Certification Authorities that issued the
certificate to the TMG firewall and click Ok. Once complete you should be able
to establish a secure VPN session using PPTP authenticated with the client
certificate or smart card issued to the user.
Page
253
NETWORK ADMINISTRATION CIT-324
Page
254
NETWORK ADMINISTRATION CIT-324
Forefront TMG can distribute Web traffic to identical configured web servers that are
normally a special function of a Hardware load balancer. Web server load balancing
distributes network traffic to different hosts in the internal network without using
classic NLB functions of the Windows operating system.
Network Load Balancing integration is one of the features that existed in the
previous version of Forefront Threat Management Gateway (TMG), Internet
Security and Acceleration (ISA) Server 2006. The concept of this functionality
is described in Network Load Balancing Integration Concepts for Microsoft
Internet Security and Acceleration (ISA) Server 2006. The main idea is that
instead of defining NLB settings on each cluster node, cluster settings can be
configured on the Forefront TMG Enterprise Manager Server (EMS) or on
the array manager, and the EMS or array manager distributes the settings to
all array members.
After that, the system enters an NLB integrated state, where Forefront TMG
detects and overrides any external changes made to the NLB configuration on
all array members. For example, if Forefront TMG is in an NLB integrated state
and someone changes a virtual IP on any array member, the Firewall Service
will change it back to the IP that is defined in the array configuration.
However, in ISA Server, after the NLB integration is disabled, the NLB cluster
remains configured with the ISA Server settings with corresponding virtual IPs
and NLB protocol bindings. This may interfere with future NLB clusters defined
not via ISA Server.
Page
255
NETWORK ADMINISTRATION CIT-324
NLB Clear
In order to allow the Forefront TMG administrator to have more control over
the NLB state, the "NLB Clear" functionality was introduced in Forefront TMG.
NLB Integration state machine in ISA Server:
Page
256
NETWORK ADMINISTRATION CIT-324
When disabling NLB integration via the API, the settings are not cleared by
default; this is done for backward compatibility with scripts written for ISA
Server. To have the settings removed, you should set the NLB Integration
Clear upon Disable member of the interface IFPCNLBConfiguration2 to TRUE,
prior to setting NLB Integration Enabled to FALSE.
Each time an NLB Clear is successfully performed, the alert above appears in
the Alerts pane of the Monitoring node. There is a corresponding alert for a
failure to clear the settings. By the way, such an alert is purely informative
since the failure doesn't block any other Forefront TMG functionality, but may
indicate some NLB-related issues. Each time that NLB integration is enabled,
NLB Clear is automatically called by the Firewall Service and the alert appears.
Page
257
NETWORK ADMINISTRATION CIT-324
Troubleshooting task:
• If NLB Integration is enabled, the task clears the settings, which are
immediately overridden by Forefront TMG according to the stored
configuration. This can be used to refresh NLB settings that got
corrupted.
• If NLB Integration is disabled, the task just clears all NLB settings.
The task cannot run from a remote management console and operates only
on the local array member.
NLBClear.exe
This utility clears NLB settings on the local array member. Note that the
Firewall Service has to be stopped before the utility is run.
Page
259
NETWORK ADMINISTRATION CIT-324
Next, associate the custom protocol with a standard protocol definition, in this
case HTTP Proxy.
Once complete, Forefront TMG NIS inspection will be applied to the custom
protocol and policy will be enforced according to the current NIS
configuration.
Page
260
NETWORK ADMINISTRATION CIT-324
• If you are using TMG server as a web proxy, configure web proxy
settings on client devices to point to the TMG server.
Page
261
NETWORK ADMINISTRATION CIT-324
• Ensure that domain users' browsers are configured to use the TMG
server as their web proxy.
• Test the access for domain users by attempting to browse the web,
connect via VPN, or access other permitted services.
• Monitor TMG server logs and reports to verify that domain users'
access is logged correctly and matches the defined access rules.
Page
262
NETWORK ADMINISTRATION CIT-324
Q.5: Which feature of TMG server allows for secure remote access to the
internal network?
Q.8: What should be considered when managing TMG server for high
availability?
Page
264
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (c) Q.2 (c) Q.3 (b) Q.4 (d) Q.5 (b)
Q.6 (d) Q.7 (a) Q.8 (d) Q.9 (d) Q.10 (c)
Short Questions
Page
265
NETWORK ADMINISTRATION CIT-324
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
266
NETWORK ADMINISTRATION CIT-324
CHAPTER 10 TROUBLESHOOTING
Objectives
After completion of this chapter students will be able to:
Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed
products or processes on a machine or a system. It is a logical, systematic
search for the source of a problem in order to solve it, and make the product
or process operational again. Troubleshooting is needed to identify the
symptoms. Determining the most likely cause is a process of elimination—
eliminating potential causes of a problem. Finally, troubleshooting requires
confirmation that the solution restores the product or process to its working
state.
In general, troubleshooting is the identification or diagnosis of "trouble" in the
management flow of a corporation or a system caused by a failure of some
kind. The problem is initially described as symptoms of malfunction, and
troubleshooting is the process of determining and remedying the causes of
these symptoms.
A system can be described in terms of its expected, desired or intended
behavior (usually, for artificial systems, its purpose). Events or inputs to the
system are expected to generate specific results or outputs. (For example,
Page
267
NETWORK ADMINISTRATION CIT-324
Windows Server 2012 has been one of the most widely deployed servers
around the globe for supporting collaborative work environments. Because of
the intrinsic nature of these kinds of environments, where multiple users have
access to the same resources, fixing responsibility for user actions becomes
very important.
Thus, it is important to audit all user actions concerning files and folders
access. In this article, the process of enabling files and folders auditing on
Windows Server 2012 has been explained. On Windows Server 2012, auditing
file and folder accesses consists of two parts:
1. Enable File and Folder auditing which can be done in two ways:
• Through Group Policy (for Domains, Sites and Organizational Units)
• Local Security policy (for single Servers)
2. Configure audit settings for File and Folders
Page
268
NETWORK ADMINISTRATION CIT-324
The process of enabling auditing for object access on a Windows Server 2012
through Group Policy. Enable Auditing through Group Policy. To enable
auditing through GPO, follow these steps:
3. Right-click “Group Policy Objects, and click “New”. Figure 2: Select New
from the context menu. In “New GPO” dialog box, enter the name of
new GPO and click “OK”.
Page
269
NETWORK ADMINISTRATION CIT-324
5. Right-click the newly created GPO and click “Edit” to open “Group Policy
Management Editor” window. Figure 4: GPO management editor
6. In “Group Policy Management Editor”, go to “Computer Configuration”
➔ “Policies” ➔ “Windows Settings” ➔ “Local Policies”.
7. Select “Audit Policies” to view all of its policies in the right panel. Figure
5: Audit policies.
8. Double-click “Audit Object Access” to access its properties.
Page
270
NETWORK ADMINISTRATION CIT-324
9. Click “Define these Policy Settings” to check its box. Check both
“Success” and “Failure” boxes.
Gpupdate /force
After the policy has been applied, you can configure audit settings for File and
Folders. Enable Auditing of Specific Folder. To select specific folders and define
users, follow these steps.
Page
272
NETWORK ADMINISTRATION CIT-324
7. Type the name of that user, of which access you want to monitor. Click
“Check Names” button to validate its entry. You can repeat this step to
provide the names of all users, whose access to the selected folder have
to monitored. Alternatively, you can type “Everyone” to monitor every
user’s accesses to this folder.
Page
273
NETWORK ADMINISTRATION CIT-324
9. Click “OK” once you have made your selection of users. It takes you back
to “Auditing Entry” window. Figure 11: Auditing Entry for Documents
settings
11. In “Applies to” drop-down menu, select “This folder, subfolders, and
files”.
Page
274
NETWORK ADMINISTRATION CIT-324
13. You can use “Add a condition” link at the bottom to limit the scope of
this auditing entry. You can add multiple conditions, if required. This
way the auditing will generate limited logs.
14. Click “OK” to save the settings and close “Auditing Entry for …”
window.
15. Click “Apply” and “OK” to close “Advanced Security Settings for”
window.
After auditing has been enabled, the logged events can be viewed in Event
Viewer. The following image shows the logged event for a file access.
Due to the Event Viewer's routine reporting of minor start-up and processing
errors (which do not in fact harm or damage the computer), the software is
frequently used by technical support scammers to convince users unfamiliar
with Event Viewer that their computer contains critical errors requiring
immediate technical support. An example is the "Administrative Events" field
under "Custom Views" which can have over a thousand errors or warnings
logged over a month's time.
Overview
Windows NT has featured event logs since its release in 1993. Applications and
operating-system components can use this centralized log service to report
events that have taken place, such as a failure to start a component or to
complete an action.
The Event Viewer uses event IDs to define the uniquely identifiable events that
a Windows computer can encounter. For example, when a
user's authentication fails, the system may generate Event ID 672.
Windows NT 4.0 added support for defining "event sources" (i.e. the
application which created the event) and performing backups of logs.
Windows 2000 added the capability for applications to create their own log
sources in addition to the three system-defined "System", "Application", and
"Security" log-files. Windows 2000 also replaced NT4's Event Viewer with
a Microsoft Management Console (MMC) snap-in.
Command-line interface
Windows Vista
Page
277
NETWORK ADMINISTRATION CIT-324
2. Select the log file that is of interest to you (In the example below, we use
the Security event log)
3. Right-click on the Event Log and select Filter Current Log...
4. Change the selected tab from Filter to XML
5. Check the box to Edit query manually'
6. Paste your query into the text box. You will find sample queries below.
Event subscribers
Major event subscribers include the Event Collector service and Task
Scheduler 2.0. The Event Collector service can automatically forward event
logs to other remote systems, running Windows Vista, Windows Server
2008 or Windows Server 2003 R2 on a configurable schedule. Event logs can
also be remotely viewed from other computers or multiple event logs can be
centrally logged and monitored agentless and managed from a single
computer. Events can also be directly associated with tasks, which run in the
redesigned Task Scheduler and trigger automated actions when particular
events take place.
Page
278
NETWORK ADMINISTRATION CIT-324
Cause: If you have a disk that doesn't appear in File Explorer and is listed in
Disk Management as Not Initialized, it could be because the disk doesn't have
a valid disk signature. Basically, this means that the disk has never been
initialized and formatted, or the drive formatting has become corrupted
somehow. It's also possible that the disk is having hardware problems or issues
plugging in, but we'll get to that in a few paragraphs.
Page
279
NETWORK ADMINISTRATION CIT-324
Solution: If the drive is brand new and just needs to be initialized, erasing any
data on it, the solution is easy - see Initialize New Disks. However, there's a
good chance you've already tried this, and it didn't work. Or maybe you have
a disk full of important files, and you don't want to erase the disk by initializing
it. There are a bunch of reasons a disk might be missing or fail to initialize, with
a common reason being because the disk is failing. There's only so much you
can do to fix a failing disk, but here are some steps to try to see if we can get
it working again. If the disk works after one of these steps, don't bother with
the next steps, just kick back, celebrate, and maybe update your backups.
• If the partition has a file system, but no drive letter (for example,
E:), see Change a drive letter to add a drive letter manually.
• If it doesn't have a file system (NTFS, ReFS, FAT32, or exFAT) and
you know the disk is empty, right-click the partition and
select Format. Formatting a disk erases all data on it, so don't do
this if you're trying to recover files from the disk - instead, skip
ahead to the next step.
Page
280
NETWORK ADMINISTRATION CIT-324
3. If you have an external disk, unplug the disk, plug it back in, and then
select Action > Rescan Disks.
4. Shut down your PC, turn off your external hard disk (if it's an external
disk with a power cord), and then turn your PC and the disk back on.
To turn off your PC in Windows 10, select the Start button, select the
Power button, and then select Shut down.
5. Plug the disk into a different USB port that's directly on your PC (not on
a hub). Sometimes USB disks don't get enough power from some ports,
or have other issues with particular ports. This is especially common
with USB hubs, but sometimes there are differences between ports on
a PC, so try a few different ports if you have them.
6. Try a different cable. It might sound crazy, but cables fail a lot, so try
using a different cable to plug the disk in. If you have an internal disk
in a desktop PC, you'll probably need to shut your PC down before
switching cables - see your PC's manual for details.
7. Check Device Manager for issues. Press and hold (or right-click) the
Start button, then select Device Manager from the context menu. Look
for any devices with an exclamation point next to it or other issues,
double-click the device and then read its status.
Here's a list of Error codes in Device Manager, but one approach that
sometimes works is to right-click the problematic device,
select Uninstall device, and then Action > Scan for hardware changes.
8. Plug the disk into a different PC. If the disk doesn't work on another PC,
it's a good sign that there's something bad going on with the disk, and
not your PC. No fun, we know. There are some more steps you can try
Page
281
NETWORK ADMINISTRATION CIT-324
in External USB drive error "You must initialize the disk before Logical
Disk Manager can access it", but it might be time to search for and ask
for help at the Microsoft community site, or contact your disk
manufacturer.
There are many different network topologies including hub, linear, tree and
star designs, each of which is set up in its own way to facilitate connectivity
between computers or devices. Each has its own pros and cons in terms of
network connectivity.
Ad hoc networks and vehicular networks are just two examples of new kinds
of networks that work on different connectivity models. Along with network
connectivity, network administrators and maintenance workers also have to
focus on security as a major concern, where the reliability of networking
systems is closely related to protecting the data that is kept within them.
Page
282
NETWORK ADMINISTRATION CIT-324
Page
283
NETWORK ADMINISTRATION CIT-324
Q.1: What is the purpose of auditing user access to files, folders, and
printers?
Q.2: What is the first step in troubleshooting auditing for file and folder
access?
Q.3: Which Windows feature is commonly used to enable auditing for file
and folder access?
Q.4: What should you check if auditing is not working for file and folder
access?
Page
284
NETWORK ADMINISTRATION CIT-324
Q.6: What can you do if auditing is not functioning correctly for printer
access?
Q.8: Which tool can help analyze event logs and filter audit-related events?
Page
285
NETWORK ADMINISTRATION CIT-324
(c) Running a disk cleanup utility (d) Checking ink or toner levels
(a) Increasing the CPU clock speed (b) Adding more RAM
Page
286
NETWORK ADMINISTRATION CIT-324
ANSWER KEY
Q.1 (b) Q.2 (b) Q.3 (a) Q.4 (c) Q.5 (d)
Q.6 (a) Q.7 (d) Q.8 (b) Q.9 (c) Q.10 (b)
Q.11 (c) Q.12 (d) Q.13 (c) Q.14 (c) Q.15 (b)
Short Questions
1. Define Troubleshooting.?
2. What are the 7 troubleshooting steps?
3. Define common access user issue in troubleshooting?
4. How to open disk management?
5. Enlist the types of Window events.?
6. Describe the types of Window events.?
7. What is Window event in Troubleshooting?
8. What is Window Event log?
9. What is windows event Viewer?
10. How to open event viewer?
11. Why a disk’s status is offline or missing?
12. Describe hardware Trouble Shooting.
13. What is the purpose of Hardware troubleshooting?
14. What is connectivity troubleshooting?
15. How would you troubleshoot network connectivity?
16. Describe how to troubleshooting of disk management?
17. What is computer communication and connectivity?
18. What is troubleshooting in communication?
19. What is the cause of network connection failure?
20. What is Print management
Page
287
NETWORK ADMINISTRATION CIT-324
Long Questions
Bibliography
1. MSCE Study Guide, Alan R. Carter, Comdex Computer Publishing
2. Computer networks by Behrouz A. Forouzan.pdf
3. Supporting Microsoft Windows Server 2008, Microsoft Press
4. Administering Microsoft Windows VISTA, Microsoft Press
5. TCP/IP Training, Microsoft Press
6. Networking Essentials, Microsoft Press
7. Microsoft Windows Exchange Server, Microsoft Press
8. Microsoft TMG Server, Microsoft Press
Page
288