Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks
- Autorzy:
- Craig Hunt, Roberta Bragg
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 698
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks
This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and configure the services based on these protocols. Any skilled network administrator knows that understanding how things work is as important as knowing how things are done. This book is the essential guide to both, containing everything a network administrator needs to exchange information via the Internet, and to build effective reliable networks.
This must-read guide is divided into three distinct sections: fundamental concepts, tutorial, and reference. The first three chapters are a basic discussion of the network protocols and services. This discussion provides the fundamental concepts necessary to understand the rest of the book. The remaining chapters provide a how-to tutorial for planning, installing and configuring various important network services. The book concludes with three appendixes that are technical references for various configuration options. Content specifics include how to:
- Install, configure, and manage a Microsoft DNS and Windows DHCP server
- Control remote communications with Microsoft RRAS software
- Protect hosts with Internet Connection Firewalls
- Configure Internet and Intranet Web services with IIS
- Design proper security into your network
- Troubleshoot the network when problems develop
After you've turned the final page of Windows Server 2003 Network Administration, you'll not only understand how to network, but also why it needs to be done.
Wybrane bestsellery
-
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data ...(126.65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or...
sendmail Cookbook. Administering, Securing & Spam-Fighting sendmail Cookbook. Administering, Securing & Spam-Fighting
(152.15 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%) -
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(24.90 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł(-50%) -
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
-
This practice book comes with a plethora of practice questions that are designed to condition and prepare you for each domain of the exam. The questions are distributed according to the weightage each domain holds in the exam.
CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt
Ebooka "Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5268-8, 9780596552688
- Data wydania ebooka:
- 2005-09-08 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 8.6MB
- Rozmiar pliku Mobi:
- 8.6MB
Spis treści ebooka
- Windows Server 2003 Network Administration
- Dedication
- Preface
- Who Should Read This Book
- Whats in This Book
- Conventions Used in This Book
- Using Code Examples
- Wed Like to Hear from You
- Safari Enabled
- Acknowledgments
- 1. Overview of TCP/IP
- 1.1. TCP/IP and the Internet
- 1.1.1. TCP/IP Features
- 1.1.2. Protocol Standards
- 1.1. TCP/IP and the Internet
- 1.2. A Data Communications Model
- 1.3. TCP/IP Protocol Architecture
- 1.4. Network Access Layer
- 1.5. Internet Layer
- 1.5.1. Internet Protocol
- 1.5.1.1. The datagram
- 1.5.1.2. Routing datagrams
- 1.5.1.3. Fragmenting datagrams
- 1.5.1.4. Passing datagrams to the Transport Layer
- 1.5.1. Internet Protocol
- 1.5.2. Internet Control Message Protocol
- 1.5.3. IP Security
- 1.6. Transport Layer
- 1.6.1. User Datagram Protocol
- 1.6.2. Transmission Control Protocol
- 1.6.3. Transport Layer Security
- 1.7. Application Layer
- 1.8. Summary
- 2. Delivering the Data
- 2.1. Addressing, Routing, and Multiplexing
- 2.2. The IP Address
- 2.2.1. Address Structure
- 2.2.2. Subnets
- 2.2.3. The Natural Mask
- 2.2.4. CIDR Blocks and Route Aggregation
- 2.2.5. Private Network Numbers
- 2.2.6. IPv6
- 2.2.6.1. The lack of demand for IPv6
- 2.3. Internet Routing Architecture
- 2.4. The Routing Table
- 2.5. Address Resolution
- 2.6. Protocols, Ports, and Sockets
- 2.6.1. Protocol Numbers
- 2.6.2. Port Numbers
- 2.6.3. Sockets
- 2.7. Summary
- 3. Network Services
- 3.1. Names and Addresses
- 3.2. The HOSTS File
- 3.3. LMHOSTS
- 3.4. Domain Name System
- 3.4.1. The Domain Hierarchy
- 3.4.2. Creating Domains and Subdomains
- 3.4.3. Domain Names
- 3.4.4. DNS Resolver and Server
- 3.5. Windows Internet Name Service
- 3.5.1. WINS Name Registration and Name Resolution
- 3.5.1.1. Registering, renewing, and releasing NetBIOS names
- 3.5.1.2. Resolving a NetBIOS name
- 3.5.1. WINS Name Registration and Name Resolution
- 3.6. SMB and CIFS
- 3.7. Mail Services
- 3.7.1. Simple Mail Transfer Protocol
- 3.7.2. Post Office Protocol
- 3.7.3. Internet Message Access Protocol
- 3.7.4. Multipurpose Internet Mail Extensions
- 3.8. Dynamic Host Configuration Protocol
- 3.8.1. How DHCP Works
- 3.9. Dynamic DNS
- 3.10. Active Directory Basics
- 3.10.1. Active Directory Replication Basics
- 3.10.2. Active Directory Database Basics
- 3.10.3. Domain Controllers
- 3.10.4. Authentication, Authorization, and Trusts
- 3.10.5. Group Policy Basics
- 3.11. Summary
- 4. Basic TCP/IP Configuration
- 4.1. Network Device Configuration
- 4.1.1. Adapter Configuration
- 4.1.2. Installing and Removing Network Components
- 4.1. Network Device Configuration
- 4.2. General TCP/IP Configuration
- 4.2.1. Manually Defining the IP Address
- 4.2.1.1. Selecting an IP address block
- 4.2.1. Manually Defining the IP Address
- 4.2.2. Basic DNS Configuration
- 4.3. Adding More Configuration Details
- 4.3.1. Adding IP Addresses
- 4.3.2. Adding Gateways
- 4.3.3. The DNS Tab
- 4.3.4. The WINS Tab
- 4.3.5. The Options Tab
- 4.4. Summary
- 5. Managing DHCP Services
- 5.1. Basic Microsoft DHCP Concepts
- 5.1.1. DHCP Options
- 5.1.2. DHCP Scopes
- 5.1. Basic Microsoft DHCP Concepts
- 5.2. Planning for DHCP
- 5.2.1. Redundancy Issues
- 5.3. Installing the DHCP Server
- 5.3.1. Configuring a DHCP Scope
- 5.4. Using the DHCP Console
- 5.4.1. Adding a Server
- 5.4.2. Adding a Scope or a Superscope
- 5.4.3. Configuring DHCP Options
- 5.4.4. Using Option Classes
- 5.4.4.1. Working with user classes
- 5.4.4.2. Working with vendor classes
- 5.4.4.3. Defining new options and setting defaults
- 5.4.5. Creating a Reservation
- 5.5. DHCP Server Administration
- 5.5.1. Authorizing
- 5.5.2. Activating
- 5.5.3. Detecting Conflicts
- 5.5.4. Selecting the Interface
- 5.5.5. Backup and Restore
- 5.5.6. Integrating with DNS
- 5.5.7. Logging
- 5.6. Creating a MADCAP Server
- 5.7. Summary
- 6. Creating a DNS Server
- 6.1. Domains Versus Zones
- 6.2. The Microsoft DNS Server
- 6.3. Planning a DNS Server Installation
- 6.4. Installing the DNS Server
- 6.5. Initial Configuration
- 6.6. The DNS Files
- 6.6.1. The cache.dns File
- 6.6.2. The Forward Lookup Zone File
- 6.6.2.1. Customizing SOA parameters
- 6.6.2.2. Defining a list of name servers
- 6.6.3. The Reverse Lookup File
- 6.7. The DNS Console
- 6.7.1. Defining Records for a Forward Lookup Zone
- 6.7.2. Working with Subdomains
- 6.7.2.1. Delegating a domain
- 6.7.3. Managing a Reverse Lookup Zone
- 6.7.3.1. Delegating a reverse zone
- 6.7.4. Understanding Stub Zones
- 6.7.5. Other Zone Management Features
- 6.7.5.1. Managing zone transfers
- 6.7.5.2. Configuring DNS Notify
- 6.7.5.3. Integrating a zone and WINS
- 6.7.6. Server Properties
- 6.7.6.1. Advanced tab
- 6.7.6.2. Scavenging
- 6.7.6.3. Forwarders
- 6.7.6.4. Logging and monitoring
- 6.8. Using nslookup
- 6.9. Summary
- 7. Using AD to Support Network Administration
- 7.1. Moving from Workgroups to Domain Environments
- 7.1.1. Using dcpromo
- 7.1.1.1. Creating a forest
- 7.1.1.2. Creating a new tree
- 7.1.1.3. Adding a child domain
- 7.1.1.4. Creating an additional DC
- 7.1.1. Using dcpromo
- 7.1.2. Confirming DNS Registration of DC Information
- 7.1.3. Configuring Sites
- 7.1.3.1. Creating, configuring, and modifying sites
- 7.1. Moving from Workgroups to Domain Environments
- 7.1.4. Moving Operations Master Roles
- 7.1.5. Back Up AD
- 7.2. TCP/IP for AD Transport, Access, and Support
- 7.2.1. AD/DNS Dependencies
- 7.2.2. How AD Uses DNS
- 7.2.2.1. How DCs are located
- 7.2.2.2. How site information is used during logon
- 7.2.2.3. How DNS is used for AD replication
- 7.2.3. Configuring DNS for AD
- 7.2.3.1. Configuring the server
- 7.2.3.2. Configuring domain records
- 7.2.3.3. Configuring DNS delegation
- 7.2.3.4. Configuring AD-integrated DNS zones
- 7.2.3.5. Configuring and using secure dynamic DNS
- 7.2.4. Using Windows Server 2003 AD Application Partitions for DNS Zone Information
- 7.2.4.1. Using application partitions
- 7.2.4.2. Migrating from Windows 2000 to Windows Server 2003
- 7.2.5. Configuring the Windows Time Service
- 7.2.5.1. Synchronizing with an external time source
- 7.2.5.2. Synchronize with a hardware clock
- 7.2.6. Integrating DHCP with AD
- 7.2.7. NetBIOS and WINS in an AD Domain
- 7.2.7.1. Integrating WINS in a DNS environment
- 7.3. Using Group Policy to Manage Network Protocols
- 7.3.1. Dependency of Group Policy on DNS
- 7.3.2. Managing TCP/IP Configuration Using Group Policy
- 7.3.3. Managing DNS Client Configuration Using Group Policy
- 7.3.4. Managing the Windows Time Service Using Group Policy
- 7.3.5. Managing SNMP Using Group Policy
- 7.3.6. Managing WINS, RRAS, and IAS Servers Using Group Policy
- 7.4. Summary
- 8. Controlling Remote Communications with Microsoft Routing and Remote Access Service
- 8.1. Routing Services
- 8.1.1. IP Multicast Support
- 8.1.1.1. Understanding multicast components
- 8.1.1.2. Adding the IGMP services to RRAS
- 8.1.1.3. Configuring multicast boundaries
- 8.1.1.4. Configuring multicast heartbeats
- 8.1.1.5. Querying multicast router information
- 8.1.1. IP Multicast Support
- 8.1.2. Configuring the DHCP Relay Agent
- 8.1.3. Configuring RIP Version 2 for IP
- 8.1.3.1. Configuring general RIP properties
- 8.1.3.2. Configuring Silent RIP mode
- 8.1.3.3. Configuring RIP security properties
- 8.1.3.4. Configuring RIP neighbors routing properties
- 8.1.3.5. Configuring advanced RIP routing properties
- 8.1. Routing Services
- 8.1.4. Configuring Open Shortest Path First (OSPF)
- 8.1.4.1. Subdividing the network into OSPF areas
- 8.1.4.2. Identifying ASBRs
- 8.1.4.3. Configuring network type
- 8.1.4.4. Identifying virtual links and backbone areas
- 8.1.4.5. Configuring security for OSPF
- 8.1.5. Network Address Translation (NAT)
- 8.1.5.1. Enabling and configuring NAT
- 8.1.5.2. Creating and configuring NAT interfaces
- 8.1.5.3. Creating a Demand Dial interface for dial-up connections
- 8.1.5.4. Adding a default static route
- 8.1.5.5. Enabling routing on ports
- 8.1.5.6. Securing a NAT server
- 8.1.5.7. Allowing inbound connections
- 8.1.6. Logging RRAS Routing Events
- 8.2. Protocol Filtering (Basic Firewall Services)
- 8.3. Remote Access Planning and Deployment
- 8.3.1. Hardware Provisioning
- 8.3.2. Authentication Choices
- 8.3.3. Reversible Encryption
- 8.3.4. Data Encryption
- 8.3.4.1. Encryption types
- 8.3.4.2. Choosing MPPE or IPSec encryption
- 8.3.4.3. Encryption strength selection for VPNs
- 8.3.5. Choosing a VPN Protocol
- 8.3.5.1. PPTP considerations
- 8.3.5.2. L2TP/IPSec considerations
- 8.3.5.3. IPSec in tunnel mode considerations
- 8.3.6. PPP Extensions
- 8.3.7. IP Addressing and DHCP Integration
- 8.3.8. Domain Functional Level Issues
- 8.3.9. The Remote Access Connection Process
- 8.3.10. Dial-in User Constraints
- 8.3.11. Remote Access Policies
- 8.3.11.1. Remote access policy restrictions
- 8.3.11.2. Profile constraints
- 8.3.11.3. Configuring remote access policies
- 8.4. Configuring Dial-up or VPN Access
- 8.5. Advanced Virtual Private Network (VPN) Process and Configuration
- 8.5.1. Using L2TP/IPSec VPNs with NAT and NAT-T
- 8.5.2. Configuring and Using RRAS Demand-Dial VPN
- 8.5.3. Configuring Dial-in Properties
- 8.5.4. Using a Shared Key for a L2TP/IPSec VPN
- 8.5.5. Configuring Firewalls for VPN
- 8.6. Configuring Clients to Use Remote Access
- 8.7. Configuring Logging and Accounting (Auditing) for Remote Access
- 8.8. Summary
- 9. Protecting Hosts with Windows Host Firewalls
- 9.1. Firewall Basics
- 9.2. Internet Connection Sharing
- 9.2.1. Enabling ICS
- 9.2.2. Enabling Internet Access to Local Services
- 9.2.3. Using a Network Bridge with ICS
- 9.2.4. Securing ICS
- 9.2.5. Managing ICS via Group Policy
- 9.3. Windows Firewall
- 9.3.1. Internet Connection Firewall (ICF)
- 9.3.2. Service Pack Firewall Modifications
- 9.3.2.1. Modifications
- 9.3.2.1.1. Security Center
- 9.3.2.1.2. Startup Security
- 9.3.2.1. Modifications
- 9.3.2.2. Modifying firewall behavior using the Windows Firewall INF file and unattend.txt
- 9.3.2.2.1. Modifying firewall settings using the Control Panel
- 9.3.2.2.2. Modifying alerting and notification using the registry
- 9.3.2.2.3. Modifying firewall behavior using Group Policy
- 9.3.2.2.4. Modifying firewall behavior using Netsh
- 9.3.2.2.5. More modifications
- 9.3.2.3. Windows Server 2003 SP1
- 9.4. Routing and Remote Access Basic Firewall
- 9.5. Protocol Filters
- 9.5.1. TCP/IP Filters
- 9.5.2. Routing and Remote Access Protocol Filters
- 9.5.3. Filtering Using IPSec
- 9.6. Which Firewall Services Should You Use?
- 9.7. Summary
- 10. Centralizing Authentication and Authorization with Internet Authentication Server
- 10.1. The RADIUS Protocol
- 10.1.1. Authentication, Authorization, and Accounting RADIUS Processes
- 10.1.1.1. Authentication
- 10.1.1.2. Authorization
- 10.1.1.3. Accounting
- 10.1.1. Authentication, Authorization, and Accounting RADIUS Processes
- 10.1.2. RADIUS Messages
- 10.1. The RADIUS Protocol
- 10.2. Installing and Configuring IAS
- 10.2.1. Installing IAS
- 10.2.2. Configuring IAS for Remote Access
- 10.2.2.1. Configuring a connection request policy
- 10.2.2.2. Configuring RADIUS clients for the IAS server
- 10.2.2.3. Configuring RRAS servers as RADIUS clients
- 10.2.2.4. Configuring auditing and logging
- 10.2.2.4.1. Log format and creation
- 10.2.2.4.2. Log contents
- 10.2.2.4.3. SQL server logging
- 10.2.2.5. Configuring Remote Access policies
- 10.2.2.6. Configuring additional ports
- 10.2.2.7. Configuring account lockout
- 10.3. Configuring IAS as a RADIUS Proxy
- 10.3.1. Configuring a RADIUS Server Group
- 10.3.2. Configuring a Connection Request Policy
- 10.4. Securing Communications Between RRAS and IAS
- 10.4.1. Shared Secret
- 10.4.2. Message-Authenticator Attribute
- 10.4.3. IPSec
- 10.5. Configuring IAS for Use with VLANs
- 10.5.1. Creating a Remote Access Policy for VLANs
- 10.6. Securing Wireless Access with IAS
- 10.6.1. Understanding EAP and PEAP
- 10.6.2. Understanding the 802.1x Authentication Process
- 10.6.3. Implementing 802.1x Authentication
- 10.6.3.1. Configuring IAS to support 802.1x authentication for wireless clients
- 10.6.3.1.1. Configuring a Remote Access policy for wireless
- 10.6.3.1. Configuring IAS to support 802.1x authentication for wireless clients
- 10.6.3.2. Understanding and fulfilling certificate requirements for EAP and PEAP
- 10.6.3.3. Using a Windows CA server certificate
- 10.6.3.4. Using a third-party certificate
- 10.6.3.4.1. Obtaining and installing a Verisign certificate
- 10.6.3.4.2. Manually installing the WLAN certificate
- 10.6.3.4.3. Verifying the certificate is installed
- 10.6.3.4.4. Configuring proxy settings
- 10.6.3.5. Configuring the Windows XP wireless client to use 802.1x authentication
- 10.6.4. Understanding and Using WPA
- 10.7. Using Backup and Restore (Importing IAS Configuration)
- 10.8. Providing Load Balancing for Multiple RAS Servers
- 10.9. Using IAS to Protect the Network from Bad Computers
- 10.9.1. Network Access Quarantine Control
- 10.9.1.1. Understanding network access quarantine control
- 10.9.1.2. Implementing network access quarantine control
- 10.9.1. Network Access Quarantine Control
- 10.9.2. Network Access Protection
- 10.10. Summary
- 11. Protecting Network Communications with Internet Protocol Security
- 11.1. IPSec Basics
- 11.1.1. Security Advantages of IPSec
- 11.1.1.1. Blocking, permitting, and securing communications
- 11.1.1.2. Defense in depth
- 11.1.1.3. IPSec tunnels
- 11.1.1.4. Flexibility
- 11.1.1. Security Advantages of IPSec
- 11.1.2. Differences Between AH and ESP
- 11.1.3. Process and Procedure
- 11.1.3.1. Defining the type of communication
- 11.1.3.2. Blocking and permitting
- 11.1.3.3. Securing or negotiating
- 11.1.3.3.1. Phase I: IKE Mode, or Main Mode
- 11.1.3.3.2. Phase II, or Quick Mode
- 11.1. IPSec Basics
- 11.2. Specifics of the Windows Implementation
- 11.2.1. The IPSec Policy Agent Service
- 11.2.2. The IPSec Driver
- 11.2.3. New in Windows Server 2003
- 11.2.3.1. Disable default exemptions
- 11.2.3.2. IPSec NAT traversal
- 11.2.4. Default IPSec Policies
- 11.3. Configuring a Windows IPSec Policy
- 11.3.1. Reviewing Configuration Requirements
- 11.3.2. Using the IPSec Policy Wizard to Create a Policy
- 11.3.2.1. Creating an MMC console
- 11.3.2.2. Create a blocking rule
- 11.3.3. Assigning the Policy
- 11.3.4. Testing the Policy
- 11.3.5. Creating Additional Rules
- 11.3.5.1. Create a permit rule
- 11.3.5.2. Changing the permit rule to secure
- 11.3.5.3. Creating an IPSec policy on ComputerB
- 11.3.6. Setting Up the IPSec Monitor and Testing the Policy
- 11.3.7. Writing Policies Using netsh
- 11.3.8. Using Group Policy to Implement IPSec
- 11.3.9. Monitoring and Troubleshooting IPSec
- 11.3.9.1. Using netsh to monitor IPSec
- 11.3.9.2. Using the IP Security Monitor to monitor IPSec
- 11.4. Extending IPSec Operations
- 11.4.1. Use Persistent Policies
- 11.4.2. Configure IPSec Driver Modes
- 11.4.2.1. Startup mode
- 11.4.2.2. Operational mode
- 11.4.2.3. Diagnostic mode
- 11.5. Designing IPSec Policies to Meet Secure Communications Needs
- 11.6. Hardening IPSecurity Policies
- 11.6.1. Hardening Authentication
- 11.6.2. Hardening Security Methods
- 11.7. Summary
- 12. Configuring Internet and Intranet Web Services with IIS
- 12.1. Server Preparation and IIS Installation
- 12.1.1. Install and Prepare Windows Server 2003
- 12.1.1.1. Documenting the server configuration
- 12.1.1.2. Hardening of dedicated web server services
- 12.1.1. Install and Prepare Windows Server 2003
- 12.1.2. Installing IIS
- 12.1. Server Preparation and IIS Installation
- 12.2. Installing and Configuring Web Servers and Sites
- 12.2.1. Creating a Web Site
- 12.2.2. Managing IIS Permissions
- 12.2.3. Configuring User Authentication
- 12.2.4. Configuring Web Site Properties
- 12.2.4.1. Configuring the IP address used for the server
- 12.2.4.2. Configuring access
- 12.2.4.3. Setting MIME
- 12.2.4.4. Configuring NTFS permissions
- 12.2.4.5. Configuring logging
- 12.2.4.6. Adding IIS components and services
- 12.2.4.7. Enabling and configuring extensions
- 12.2.5. Reviewing Web Server Security
- 12.2.6. Editing the Metabase
- 12.2.7. Using IIS Backup and Recovery
- 12.2.8. Configuring SSL
- 12.2.8.1. Requesting a certificate
- 12.2.8.2. Installing the certificate
- 12.2.8.3. Configuring the web site to require SSL
- 12.2.8.4. Backing up and restoring certificates
- 12.2.9. Configuring FTP
- 12.2.9.1. Creating an FTP site
- 12.2.9.2. Configuring FTP authentication
- 12.3. IIS Mail Services
- 12.3.1. Configuring Email Services
- 12.3.2. Using a Mail Gateway with the SMTP Virtual Server
- 12.3.3. Monitoring SMTP
- 12.4. Installing and Running IIS Applications
- 12.4.1. Determining Session State Requirements
- 12.4.2. Using Web Site and Application Isolation
- 12.4.2.1. Isolation by disk and/or subdirectory
- 12.4.2.2. Isolation via unique worker processes
- 12.4.2.3. Security context and impersonation
- 12.4.3. Choosing a Process Isolation Mode
- 12.4.4. Managing Application Pools and Worker Processes
- 12.4.4.1. Creating and configuring application pools
- 12.4.4.2. Monitoring the health of application pools
- 12.4.4.3. Recycling worker processes
- 12.5. Summary
- 13. Network Security Administration
- 13.1. Security Administration Framework
- 13.2. Windows Security Posture
- 13.2.1. Permissions and Privileges
- 13.2.1.1. Privileges and permissions not explicitly granted are denied
- 13.2.1.2. Deny permissions may or may not override allow
- 13.2.1. Permissions and Privileges
- 13.2.2. Anonymous Access and Null Sessions Are Possible
- 13.2.3. Administrators Are All-Powerful
- 13.2.4. Delegation of Authority
- 13.2.4.1. Multiple administrative groups
- 13.2.4.2. Granular permissions and rights assignment
- 13.2.4.3. Delegation of control
- 13.2.5. Role Separation
- 13.2.6. Centralized Administration with Group Policy
- 13.2.7. Security Templates for Security Configuration
- 13.2.8. Domains Are Not Security Boundaries
- 13.3. Configuring Advanced Network Security Features
- 13.3.1. Storage and Use of EFS-Encrypted Files on Network Servers Using WebDAV
- 13.3.2. Integration of Certificate Services into Windows Networking
- 13.3.2.1. Configuring domains to use certificate services
- 13.3.2.2. Obtaining certificates for DCs and servers
- 13.3.2.3. Configuring SMTP transport for AD replication
- 13.3.2.4. Securing LDAP communications
- 13.3.3. SMB Signing
- 13.4. Summary
- 14. Troubleshooting TCP/IP
- 14.1. Approaching a Problem
- 14.1.1. Troubleshooting Hints
- 14.1. Approaching a Problem
- 14.2. Diagnostic Tools
- 14.3. Testing Basic Connectivity
- 14.3.1. The ping Command
- 14.3.2. Using portqry
- 14.4. Troubleshooting Network Access
- 14.4.1. Troubleshooting with the ipconfig Command
- 14.4.2. Troubleshooting with the arp Command
- 14.4.2.1. ARP problem case study
- 14.4.3. Checking the Interface with netstat
- 14.4.3.1. Network hardware problems
- 14.5. Checking Routing
- 14.5.1. Tracing Routes
- 14.6. Checking Name Service
- 14.6.1. Some Systems Work, Others Dont
- 14.6.1.1. The data is here and the server cant find it
- 14.6.1. Some Systems Work, Others Dont
- 14.7. Analyzing Protocol Problems
- 14.7.1. Network Monitor
- 14.8. Protocol Case Study
- 14.9. Summary
- A. DHCP Options
- B. DHCP Audit Log Identifiers
- C. DNS Resource Records
- C.1. Basic Resource Records
- C.1.1. Start of Authority Record
- C.1.2. Name Server Record
- C.1.3. Address Record
- C.1.4. Mail Exchanger Record
- C.1.5. Canonical Name Record
- C.1.6. Domain Name Pointer Record
- C.1.7. Service Location (SRV)
- C.1. Basic Resource Records
- C.2. Less Commonly Used Resource Records
- C.2.1. AFS Database (AFSDB)
- C.2.2. ATM Address (ATMA)
- C.2.3. Host Information (HINFO)
- C.2.4. IPV6 Host (AAAA)
- C.2.5. ISDN
- C.2.6. Mail Group (MG)
- C.2.7. Mailbox (MB)
- C.2.8. Mailbox Information (MINFO)
- C.2.9. Next Domain (NXT)
- C.2.10. Public Key (KEY)
- C.2.11. Rename Mailbox (MR)
- C.2.12. Responsible Person (RP)
- C.2.13. Route Through (RT)
- C.2.14. Signature (SIG)
- C.2.15. Text (TXT)
- C.2.16. Well Known Services (WKS)
- C.2.17. X.25
- C.3. The Boot File
- Index
- About the Authors
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks Craig Hunt, Roberta Bragg (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.