MCITP
TOPICS
OF MCITP
WORKGROUP TOPICS
S.R.NO
|
PRACTICALS
|
PAGE NO
|
STATUS
|
|
1)
|
IP CONFIGRATION
|
2-23
|
OK
|
|
2)
|
REMOTE DESKTOP
|
24-41
|
OK
|
|
3)
|
REMOTE ASSISTANCE
|
42-54
|
OK
|
|
4)
|
OUTLOOK CONFIGRATION
|
|||
5)
|
DHCP SERVER
|
55-125
|
OK
|
|
6)
|
DHCP RESERVATION
|
126-134
|
OK
|
|
7)
|
DHCP RELAY
|
|||
8)
|
DNS MASTER
|
135-178
|
OK
|
|
9)
|
DNS SLAVE
|
|||
10)
|
FILE SERVER
|
Ok
|
||
11)
|
FILE SHARING
|
Ok
|
||
12)
|
PASSWORD PROTECTING
SHARING
|
Ok
|
||
13)
|
DISK QUATA
|
Ok
|
||
14)
|
FOLDER QUATA
|
Ok
|
||
15)
|
FILE SCREANING
|
Ok
|
||
16)
|
DFS (DISTRIBUTED FILE
SYSTEM)
|
Ok
|
||
17)
|
PRINT SERVER
|
|||
18)
|
IIS SERVER WITH HTTP
|
179-
|
OK
|
|
19)
|
IIS SERVER WITH HTTPS
|
|||
20)
|
FTP (FILE TRANSFER
PROTOCOL)
|
205
|
OK
|
|
21)
|
FTP DOWNLOADING &
UPLOADING USING
THE CMD LINE INTERFACE
|
Ok
|
||
22)
|
TERMINAL SERVER
|
Ok
|
||
23)
|
TERMINAL SERVER GATEWAY
|
Ok
|
||
24)
|
REMOTE DESKTOPS
|
Ok
|
||
25)
|
RDP SHARING ON MULTIPLE
SHARING
|
Ok
|
||
26)
|
RRAS
|
Ok
|
||
27)
|
NAT
|
Ok
|
||
28)
|
NAT
|
Ok
|
||
29)
|
VPN (VIRTUAL PRIVATE
NETWORK)
|
Ok
|
||
30)
|
ROUTING
|
Ok
|
||
31)
|
IP SECURITY
|
Ok
|
||
32)
|
SIMPLE FIREWALL
CONFIGRATION
|
|||
33)
|
ADVANCE FIREWALL
CONFIGRATION
|
|||
34)
|
WINDOWS BACKUP SERVICE
|
|||
35)
|
WDS (WINDOWS DEPLOYEMENT
SERVICE)
|
|||
36)
|
INTERNET EXPLORER
SECURITY PASSWORD
|
|||
37)
|
HIDDEN SHARING
|
|||
38)
|
USER MANAGEMENT
|
|||
39)
|
GROUP MANAGEMENT
|
|||
40)
|
LOCAL SECURITY POLICIES
|
|||
41)
|
DRIVE MAPING
|
|||
42)
|
HOME FOLDER
|
|||
DOMAIN TOPICS
1)
|
ADDS TERMS +INTRO+USE
|
|||
2)
|
PDC
|
|||
3)
|
RODC
|
|||
4)
|
ADC
|
|||
5)
|
CDC
|
|||
6)
|
JOINING SYSTEM INTO
DOMAIN
|
|||
7)
|
REMOVING SYSTEM FROM
DOMAIN
|
|||
8)
|
DOMAIN O U MANAGEMENT
|
|||
9)
|
DOMAIN GROUP MANAGEMENT
|
|||
10)
|
DOMAIN USER MANAGMENT
|
|||
11)
|
DOMAIN LOCAL SECURTIES
POLICIES
|
|||
12)
|
GROUP SECURITY POLICIES
|
|||
13)
|
SOFTWARE INTALLING USING
GROUP
POLICIES
|
|||
14)
|
FILTERS IN THE GROUP
POLICIES
|
|||
15)
|
AD BACK UP IN GRAPHICAL
MODE
|
|||
16)
|
AD BACK UP IN CMD MODE
|
|||
17)
|
FSMO POLICIES
|
|||
18)
|
LOCAL PROFILIES
|
|||
19)
|
MADATORY PROFILIES
|
|||
workgroup
IP
CONFIGRATION
DEFFINATION
IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE
NETWORK, BECAUSE THE NETWORK IS ONLY POSSIBLE IN A CONDITION WHEN ALL THE
SYSTEM MUST BE CONNECTED WITH PHYSICAL CONNECTION (CABLES) AS WELL AS LOGICAL
CONNECTION (IP CONFIG).
NETWORK = PHYSICAL CONNECTION + LOGICAL CONNECTION
(CABLES) (IP)
TO CONFIG THE IP
WE WILL FOLLOW THIS SERVICES
1) IP
ADDRESS
2) FIREWALL
3) NETWORK DISCOVERY
IP ADDRESS:-
IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE NETWORK,
BECAUSE THE NETWORK IS ONLY POSSIBLE IN A
CONDITION WHEN ALL THE SYSTEM MUST BE CONNECTED WITH PHYSICAL CONNECTION
(CABLES) AS WELL AS LOGICAL CONNECTION (IP CONFIG).
PROPER STEPS OF CONFIG
THE IP ADDRESS
START >
NETWORK
PROPERTIES >
MANAGE NETWORK
CONNECTION
R.C ON LAN
CONNECTION & SELECT PROPERTIES:-
SELECT A IPV4
& GO TO PROPERTIES OF IPV 4:-
AFTER
THIS YOU FILL THE IP AND THAN PRESS OK .
FIREWALL:-
WHILE DOING THE IP
CONFIGRATION WE HAVE TO DISABLED THE FIREWLL BECAUSE WHILE USING LOCAL AREA
NETWORK END FIREWALL USUALLY BLOCK SOME NETWORK SERVICE AND UNABLE US TO USE
THE NETWORK , THAT’S WHY WE HAVE TO USE THE FIREWALL ( NOT RECOMMENDED B Y THE MICROSOFT AND FIREWALL IS ALWAYS ON WHILE
WORKING ON INTERNET ).
NOTE:-
FIREWALL STOPS MALWARE, SPYWARE, ADWARE, WORM. MALWARE AND
WORM DAMAGED OUR WINDOWS FILES.
PROPER STEPS OF FIREWALL:-
GO TO START AND SELECT CONTROL PANNEL
AFTER THIS
SELECT THE WINDOWS FIREWLL OPTION
AFTER SELECT THE
FIREWLL YOU MUST OF THE FIREWALL WHILE ACCESSING THE NETORK.
NETWORK
DISCOVERY:-
NETWORK DISCOVERY IS USED TO FIND OUT
AUTOMATICALLY SYSTEM CONNECTED IN YOUR NETORK.
NOTE:-
YOU CAN ONLY NETWORK DISCOVERY ON WHILE
USING THE NETWORK. WHEN ACCESS THE INTERNET YOU CAN OFF
THE NETWORK DISCOVERY.
GO TO START >
NETWORK ON PROPERTIES
NETWORK
DISCOVERY ON
NOTE:-
1)
MCITP IS TOTTALY LAN BASED
NOT WAN.
2)
FIREWALL STOPS MALWARE,
ADWARE, WORM, SPYWARE ETC.
3)
MALWARE OR ORM DAMAGED OUR
WINDOWS FILE.
4)
IN MCITP PRECTICAL ALWAYS
RESULT IN 0% OR 100%.
5)
MICROSOFT ALWAYS
LAUNCHED HIS OWN PRODUCT IN OCT. BECAUSE
THIS MONTH MICROSOFT CELEBREATE THE BILL GATES BIRHDAY.
TO VERIFY THE NETWORK CONNECTION AFTER THIS AAL STEPS:-
GO TO START AND SELECT CMD <- span="">->
PING IS ONLY SUCCESSFUL WHEN TTL=128 OR ANY NUMBER
IN LAST .
(TTL = TIME TO LIVE)
LOOP BACK IP TO CHECK YOUR ETHERNET IS WORKING OR NOT
127.0.0.1
TO 127.255.255.255
TO KNOW ABOUT NAME OF THE COMPUTERS IN YOUR NETORK.
TO KNOW HONY MANY PC IS ON IN UR NETWORK & WHAT’S THE IP OR MAC
ADDRESS OF EVERY SYSTEM.
START > RUN > CMD > (TYPE) arp -a
2ND TOPIC
REMOTE DESKTOP
TO ACCESS FROM ANY LOCATION DISPLAY
Remote
Desktop:-
Remote desktop is the
windows base terminal emulation services with the help of remote desktop. We
can share the resources and the desktop over the network. Remote desktop is
known as RDP (remote desktop protocol or publisher).
Advantages of
RDP:-
1) A desktop can be shared and
accessed from any location in the network.
2) We can use the physical
resources from the remote pc.
3) We can access the data on
remote pc.
4) We can read document, play
game, listen music etc.
Version of remote
desktop:-
We
are currently use rdp version 6.1(windows server 2008)
Other
version of 6.2(windows 7)
6.0(windows vista)
5.6 (windows XP)
4.5 (windows NT)
Note:-
Remote desktop using CMD line type mstsc (Microsoft terminal
service counsoul)
To configure the remote desktop:-
Requirements:-
1) Ip Configration
2) The remote desktop service
must be enabled.
IP CONFIGRATION:-
IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE NETWORK,
BECAUSE THE NETWORK IS ONLY POSSIBLE IN A CONDITION WHEN ALL THE SYSTEM MUST BE
CONNECTED WITH PHYSICAL CONNECTION (CABLES) AS WELL AS LOGICAL CONNECTION (IP
CONFIG).
PROPER STEPS
OF CONFIG THE IP ADDRESS
START >
NETWORK
PROPERTIES >
MANAGE NETWORK
CONNECTION
R.C ON LAN
CONNECTION &SELECT PROPERTIES:-
SELECT A IPV4
& GO TO PROPERTIES OF IPV 4:-
AFTER
THIS YOU FILL THE IP AND THAN PRESS OK.
NOTE:-
We must disabled the
firewall and enable the network discovery.
How to enable the remote desktop:-
My computer > PROPERTIES
SELECT REMOTE DESKTOP
AFTER THIS SELECT THE SECOND OPTION THAN
APPLY AND OK
AFTER THIS ALL THE STEPS WILL BE COM PLETED
WE WILL DOING NEXT SOME STEPS
START >
(TYPE IN THE SEARCH BOX) REMOTE DESKTOP CONNECTION.
AND WHICH PC YOU WILL CON NECT, YOU FILL THE IP ON
THIS BOX.
AFTER THIS SELECT THE OPTION BUTTON.
GERNAL TAB:-
DISPLAY:-
LOW
DISPLAY QUALITY HIGH DTR(DATA TRANSFER RATE) AND HIGH DISPLAY QUALITY LOW DTR.
LOCAL RESOUCE TAB:-
IN
THIS TAB YOU CUTOMIZED THE SERVICES ACC.
TO OUR REQIRMENTS.
TICK ON EVERY BOX AND THAN OK
AND AS YOU WISH WANT CUSTOMIZED THE OTHER TAB ……AFTER
THIS WILL COME THE FIRST TAB AND YOU WANT TO SAVE THE SETINGS OR WIL YOU LOGIN
AGAIN AND AGAIN IN THAT PC THROUH RDP YOU HAVE A BETTER OPTION TO SAVE AS THE
SETINGS ON YOUR DESKTOP TO LOGIN AGAIN AND AGAIN.
AFTER THIS ALL STEP YOU SLECT THE CONNECT OPTION TO
START THE RDP.
NOTE;-
WINDOWS
IS A SINGLE MODE OPERATING SYSTEM THAT THE MAIN CAUSE OF WHEN YOU CONNECT THE
RDP AND OTHER PC IS LOG OFF.
REMOTE DESKTOP FOR INTERNET SOFTWARE:-
1) TEAM VIEWER
2) LOGMEIN
3RD
TOPIC
REMOTE
ASSISTIANCE
ON ANY OTHER LOCATION HELP
REMOTE
ASSISTANCE:-.
Remote
assistance is the feaure which is used to assist to any techniqly problem to
our friend to any system connected in the network.
FEATURE OF REMOTE
ASSISTANCE:-
1.
Using the remote assistance we get help or
we can using network chat services for help.
2.
We can also access the full desktop of any remote system.
3.
while accessing the remote the display of the remote pc will be
accessable on both ends.
4.
The last prime power will be always to the user who is getting the
help.
Pc1(Need Help)
|
Pc2(Ok, I Will Help)
|
·
Ip
configuration
|
·
Ip configration
|
·
Firewall off
|
·
Firewall off
|
·
Network discovery on
|
·
Network discovery on
|
·
Install remote assistance feature
|
·
Install remote assistance
feature
|
·
Create
a remote assistance help file & share it with full
permission for network user
|
·
Access the share
invitation file
|
·
DON’T
CLOSE REMOTRE ASSISTANCE WINDOW
|
|
·
Share the invitation file
|
HOW
TO INSTALL THE REMOTE ASSISTANCE FEATURE:-
START >
SERVER MANAGER
SELECT THE FEATURE AND R.C ON
THE FEATURE AND ADD FEATURE:-
AFTER THIS NEXT > FINISH
TO CREATE A HELP FILE
BY NEEDER PC1:-
START > (TYPE IN SEARCH
BOX) REMOTE ASSISTANCE
OR
START >RUN > msra
(MICROSOFT REMOTE ASSISTANCE)
AND AFTER
AFTER THIUS OPEN A NEW
COUNSOL WINDOM U DON’T CLOSE THIS WINDOW. IF YOU CLOSE THE WINDOW OPERATION IS
UNSUCCESSFULL AND YOU REPEAT AAL THE UPPER STEPS AGAIN.
YOU SHARE THE INVITATION
FILE
PC2
WE WILL GO TO USER > ADMINISTRATOR
> DESKTOP (WHERE SAVE THE INVITATION FILE)
AFTER THIS OPEN A NEW WINDOW BOX IN
THIS BOX FILL A INVITATION PASSWORD CRAETE BY NEEDER.
INTHIS WAY WE HELP A NEEDER……..
IF PROBLEM IS A BIG OR VERY SRIOUS WE
TAKE A FULL CONTROL BY PRESSIN G A REQUST CONTROL ACCEPT BY THE NEEDER….
IF PC2 IS MISUSE OUR REQUEST CONTROL LIKE HE FORMAT A WINDOW DRIVE OR
COPY A NECERRY DATA WE IMMEDIATELY CANCEL A REQUST BY PRESSING ESC..
5th
TOPIC
DHCP
SERVER
DYNAMIC HOST CONFIGRATION PROTOCOL
AUTOMATICALLY ON PC TO
CONFIGURE IP ADDRESS RULE
PORT NO DHCP SERVER:-
DHCP PORT NO------ FOR CLIENT
REQUST--------------67
DHCP PORT NO------FOR SERVER RESPONSE
----------68
DHCP:-
A
DHCP SERVER is used to assign the automatic logical unique, temporary, ip
address in the network. A DHCP SERVER is centralized management service for ip
configure in the network. responsibility is the DHCP SERVER is to assign the
unique ip address to each and every client. In the network, when ever a client
boot up (restart or start the pc) and sends a broadcast ip configuration
request to the network DHCP SERVER and whenever a DHCP client or a network
client broadcast a request in the network but the client does not have any ip
address. By default at that time ip address is used
for the broadcasting is 0.0.0.0 and the request will be processed and returned to the
client as a DHCP offer packet on the basis of mac address of the client pc.
Working
of DHCP SERVER:-
When
a client discover a ip address called Dhcp discover packet. When a server
provide a service called Dhcp offer packet.
Working of
two DHCP SERVER at a time with one client:-
DHCP SERVER
192.168.0.1
|
DHDJH
DHCP DISCOVER PACKET
|
CLIENT
|
PACK (POSSITIVE ACKNOWLEDGEMENT
|
PACK (POSSITIVE ACKNOWLEDGEMENT)
|
DHCP OFFER
|
PACK (POSSITIVE ACKNOWLEDGEMENT)
|
DHCP DISCOVER PACKET
|
PACK (POSSITIVE ACKNOWLEDGEMENT
|
NACK (NAGITIVE ACKNOWLEDGEMENT
|
DHCP SERVER
172.16.0.1
|
DHCP DISCOVER PACKET:-
This
packet is used by the network client to find out the Dhcp server. Dhcp using
broadcasting to find out Dhcp server.
DHCP DISCOVER PACKET FOLLOWING CONTENTS
IP (INTERNET PROTOCOL)
|
0.0.0.0
|
SUBNET MASK
|
255.255.255.255
|
MAC ADDRESS OF CLIENT
|
__-__-__-__-__-__
|
DHCP OFFER PACKET:-
A
dhcp offer packet is the response packet which is given by a DHCP SERVER to a
DHCP CLIENT on the basis of client MAC address.
DHCP OFFER PACKET
FOLLOWING CONTENTS
IP (INTERNET PROTOCOL)
|
192.168.0.2
|
SUBNET MASK
|
255.255.255.0
|
GATEWAY
|
192.168.100.254
|
PREFERRED DNS
|
192.168.100.253
|
ATTERNATIVE DNS
|
192.168.100.252
|
WIN SERVER
|
192.168.100.251
|
DHCP
|
192.168.100.1
|
LEASE PERIOD
|
6 DAYS (DEAFAULT)
|
DHCP
SERVER
|
CLIENT
|
ROSA PROCESS BY DHCP SERVER
AND ONE CLIENT:-
S
|
O
|
REQUST
|
OFFER
|
SELECTION
|
ACKNOWLEDGEMENT
|
A
|
R
|
REQUIRMENTS TO INSTALL A
DHCP SERVER:-
DHCP
|
CLIENT
|
IP CONFIGURED
|
FIREWALL OFF
|
FIREWALL OFF
|
-------
|
DISCOVER ON
|
-------
|
STEPS
TO INSTALL A DHCP SERVER:-
START >
SERVER MANAGER
CLICK ON
ROLLS > ADD ROLES
NEXT(ADD
ROLES WIZARD)
SELECT DHCP
SERVER (SELECT SERVER ROLES) > NEXT
DHCP SERVER
(INTRODUCING) > NEXT
SELECT
NETWORK CONNECTION BINDINGS > NEXT
SPECIFY
IPV4 DNS SERVER SETTINGS >NEXT
IF U HAVE ANY DOMAIN LIKE
YAHOO.COM. ENTER YOUR DOMAIN NAME AND FILL YOUR DOMAIN IPV4.
SPECIFY
IPV4 WINS SERVER SETTINGS > NEXT
ADD OR EDIT
DHCP SCOPE > ADD
A SCOPE IS THE RANGE OF POSSIBLE IP ADDRESS FOR A
NETWORK.THE DHCP CANNOT DISTRIBUTED IP ADDRESS TO CLIENT UNTILL A SCOPE IS
CREATED.
FILL YOUR
SCOPE REQUIRMENTS THAN OK. AFTER THIS SELECT THIS SCOPE MADE BY YOU THAN NEXT.
CONFIGURE
DHCPV6 STATELESS MODE > DISABLED THE DHCPV6 > NEXT
CONFIRM
INSTALLATION SECTION > IF YOU SATISFY PRESS INSTALL
PERFORM THIS
UPPER STEP TO CREATE A DHCP SERVER SUCCESSFULLY.
CHECK
YOU DHCP SERVER:-
GO TO START >
ADMINISTRRATOR TOOLS > DHCP SERVER
AFTER THIS OPEN A DHCP DIALOUGE BOX
> SELECT A COMPUTER NAME > SELECT IPV4 (IF SIGN IS GREEN THE DHCP IS
WORKING) > CLICK ON IPV4 THAN SELECT SCOPE
IN THIS ALL ABOVE STEPS TO CHECK YOUR IP
RANAGE & YOUR DHCP SERVER.
UNINSTALL
A DHCP SERVER:-
GO TO START
> SEREVER MANAGER >SELECT ROLES > REMOVE ROLLES > next > REMOVE
TICK ON DHCP SERVER > NEXT > REMOVE.
AFTER
RESTART YOUR PS IF THIS MESSAGE DISPLAYED ON YOUR MECHINE YOUR UNINSTALLING SUCCESSFULLY.
DHCP
CONFIGURED THROUGH ADMIN ISTRATOR TOOLS:-
NOTE:-
NOTHING CONFIGURE WHILE INSTALLING
A DHCP SERVER.
START >
SERVER MANAGER
CLICK ON ROLLS
> ADD ROLES
NEXT(ADD
ROLES WIZARD)
SELECT DHCP
SERVER (SELECT SERVER ROLES) > NEXT
DHCP SERVER
(INTRODUCING) > NEXT
SELECT
NETWORK CONNECTION BINDINGS > NEXT
SPECIFY
IPV4 DNS SERVER SETTINGS >NEXT
IF U HAVE ANY DOMAIN LIKE
YAHOO.COM. ENTER YOUR DOMAIN NAME AND FILL YOUR DOMAIN IPV4.
SPECIFY
IPV4 WINS SERVER SETTINGS > NEXT
ONLY WE
DISABLED THE DHCPV6
START >
ADMINISTRATIVE TOOLS >DHCP SERVER
SELECT IPV4 AND R.C ON IPV4 > SELECT NEW SCOPE
STEPS
OF CREATING A NEW SCOPE:-
FILL YOUR
SCOPE NAME > NEXT
FILL YOUR
IP RANGE > NEXT
Exclusion
IP:-
Eclusion are a addresses or
a range of addresses are not distributed by the server.
IF
YOU EXCLUDE A RANGE
OR
IF YOU WANT TO REMOVE A PARTICULER IP ADDRESSES:-
LEASE
DURATION:-
THE LEASE DURATION HOW LONG A CLIENT CAN USE AN IP ADDRESS
FROM THIS SCOPE.
DEFAULT
LEASE DURATION FOR WIRED 8DAYS
DEFAULT
LEASE DURATION FOR WIRELESS
8HOURS
MINIMUM
LEASE DURATION IS 0DAYS
MAXIMUM
LEASE DURATION IS 999DAYS-23 HOURS-59 MINUTES
CONFIGURED
DHCP SCOPE (ADVANCE OPTOPN):-
ROUTER(IF
YOU HAVE A FILL OTHERWISE LEAVE IT):-
DOMAIN NAME
& DNS SERVER (IF YOU HAVE ANY DOMAIL LIKE A YAHOO.COM FILL ITS NAME IP
ADDRESSES OR IF YOU HAVE A NOT DOIMAIN LEAVE IT)
WINS SERVER
(LEVE IT NOT USE NOW)
ACTIVATE
SCOPE:-
IF YOU ACTIVATE A SCOPE CLICK
ACYIVATE NOW, OTHERWISE CLICK LATER.
FINISH
IF
U WANT TO CHECK THE DHCP SERVER
CHECK
YOU DHCP SERVER:-
GO TO START >
ADMINISTRRATOR TOOLS > DHCP SERVER
AFTER THIS OPEN A DHCP DIALOUGE BOX
> SELECT A COMPUTER NAME > SELECT IPV4 (IF SIGN IS GREEN THE DHCP IS
WORKING) > CLICK ON IPV4 THAN SELECT SCOPE
CHECK YOUR
EXCLUDE IP’S
6th
TOPIC
DHCP
RESERVATION
RESERVATION
IP’S:-
To reserve any ip for
specific system, we must have perform dhcp reservation.
REQUIRMENTS
OF RESERVATION:-
We must have a MAC ADDRESS
of the PC for when the ip reserved.
STEPS
TO RESERVE THE IP:-
START > ADMINSTRATOR TOOLS
> IPV4 >RESERVATION > R.C ON RESERCATION
NOTES:-
1) Maximum assigned automatically ip’s on
clients through dhcp server is 16,777,214 (1.6 crores ).
2) Default ip add of client is 0.0.0.0 for
broadcasting.
3) Dhcp server gives ip clients through its
mac address.
4) Dhcp server must have a static ip address.
5) 169.254.1.0 To 169.254.254.255 is used to
dhcp server backup called APIPA.
6) Lease duration of any ip given by dhcp
server is default 8 days for wired & 8hours for wireless…. Minimum lease
duration is 0 day….
Maximum duration is 999
days, 23 hours, 59 minutes.
7) Dhcp is the one and only server at a time
that will be install and configured same time.
8) BOOT P used before dhcp to distribute the
ip’s.
9) BOOT P (boot protocol) in Windows NT
(first server).
10) Dhcp always give unique & temporarily
ip for every client.
|
7th
& 8th TOPIC
DNS
MASTER & DNS SLAVE
DOMAIN
NAME SYSTEM
PORT NO DNS SERVER:-
DNS PORT NO------ 53
DNS SERVER:-
A DNS server is LAN enterprise network base + internet base NAME RESULATION
SERVICE (DNS server is not
converts it resolve the RFC). Used to resolve the ip address of any system in
the network with its DOMAIN NAME SYSTEM (DNS) address. A DNS server is
mostly used only in a lan network environment.
Zone’s of DNS server:-
Two types
of DNS server zones.
1) Forward
look up zone
2) Reverse
look up zone
1)
FORWARD
LOOK UP ZONES:-
A forward look up zone is used to
resolve any request from any client from
any domain name, with the ip add of the domain server.
2)
REVERSE
LOOK UP ZONE:-
A reverse look up zone is used to
resolve any request of any client for any ip address with its domain name.
FORWARD LOOK UP ZONE |
REVERSE LOOK UP ZONE |
v
IP TO NAME
|
v
NAME TO IP
|
v
A RECORDS
|
v
PTR (POINTER) RECORDS
|
TYPES OF DNS SERVER:-
1)
PRIMARY DNS
(MASTER DNS)
2)
SECONDRY
DNS (SLAVE DNS)
3)
STUB
PRIMARY DNS (MASTER DNS) |
SECONDRY DNS (SLAVE DNS) |
STUB |
A primary DNS is a master copy of all the domain name
records in the DNS network. All the DNS records are first updated or entered
only a DNS master service, means a master DNS is independents of its records.
|
A secondry or slave DNS
is the make read/write back up copy of all the records of a primary DNS
server.
It also can be used for load balancing for a large domain
base network.
|
STUB is also known as chancing memory. A stub zone is used
to maintain special web records, MX (mail exchange) records, SRB records, SOA
(system of authentication) records.
|
INSTALLATION REQUIRED OF DNS SERVER:-
DNS SERVER
SERVER
|
IP 50.0.0.5
SUB- 255.0.0.0
DNS-
50.0.0.5
|
CLIENT
IP- 50.0.0.8
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
CLIENT
IP- 50.0.0.9
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
CLIENT
IP- 50.0.0.7
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
CLIENT
IP- 50.0.0.6
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
CLIENT
IP- 50.0.0.10
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
CLIENT
IP- 50.0.0.11
SUB- 255.0.0.0
DNS-50.0.0.5
SERVER
|
DNS address
is must for every domain client in a DNS network as well as for the DNS is self
also. DNS address or gateway address always same in the network . ( server or
client)
STEPS TO INSTALLATION:-
1)
IP
CONFIGRATION.
IP |
50.0.0.1 |
SUBNET MASK |
255.0.0.0 |
DNS |
50.0.0.6 |
2)
DNS MUST BE
FILLED FOR MAKE A DNS SERVER.
START >
SERVER MANAGER
CLICK ON
ROLLS > ADD ROLES
NEXT(ADD
ROLES WIZARD)
TICK ON DNS
SERVER & NEXT
NEXT
INSTALL
PROGRESS
CLOSE
(FINISH)
CONFIGURE
THE DNS SERVER:-
START >
ADMINISTRATOR TOOLS >DNS
FORWARD
LOOK UP ZONE:-
select the
forward look up zone & R.C on forward
look up zone:-
Welcome to
the new zone wizard:-
Zone type:-
Zone name:-
Zone file
location & if u have a zone name slect second option:-
NOTE:-
If you
existing old file... Your file name or your zone name must be same. If your
zone name is google.com or your file name is yahoo.com your DNS is nor working
because file name is difference.
Dynamic
updates:-
Completing
the new zone wizard(finish):-
Your
forward look up zone entries:-
REVERSE
LOOK UP ZONE:-
START >
ADMINISTRATOR TOOLS >DNS
Select
reverse look up zone & R.C on the reverse lookup zone:-
Welcome to
the new zone wizard:-
Zone type:-
Select the ipv4:-
Select your
network ID ( first the word of your IP’S)
Location of
reverse look zone:-
Dynamic
updates (tick on second option)
Complete
your reverse lookup zone:-
Your
reverse look up zone entries:-
ENTRIES
IN FORWARD ZONE:-
Select the
forward zone > R.C on the name of your forward look up zone
Select new
host A or AAAA
NOTE:-
A presents the 32 bits of the ipv4.
AAAA presents the 128 bits of the ipv6
Fill the
name of the new host (any) ,,, fill you ip ,,, after tick on the PTR RECORDS.
When you
tick on the create associated pointer (PTR) records… when automatically entries
on the reverse zone. When you don’t tick on the this option that mean time you
will create entries in reverse zone.
Example:-
When you
Don’t tick this you can create reverse zone entries automatically.
After this
you can select reverse zone >new pointer (PTR)
Same
entries of forward zone:-
After this
all the steps your DNS SERVER is complete.
TO
CHECK YOUR DNS SERVER:-
Go to CMD
> type nslookup
When it
shows your domain name with your ip itmeans your DNS SERVER is successful made.
NOTES:-
1) RFC stands for request for comments.
2) DNS SERVER RFC no is 1912.
3) Server’s particular service called RFC.
4) World’s most used DNS SERVER server is
BIND (BEAKELY INTERNET NAME DOMAIN).
5) Always backend works on numbers (ip).
6) DNS SERVER is known as in microsoft.
7) Other os called DNS SERVER as a BIND.
8) DNS SERVER hendels all world’s internet.
9) DOMAIN NAME registered on ROOT DOMAIN on
use world wide.
10) DNS
SERVER not costly on internet its annual rent is only 1500/-.
11) All
over world use 13 DNS SERVER.
12) DNS SERVER name is A to M.
13) INDIA’S DNS SERVER in BANGLORE.
14) DNS SERVER is a open protocol.
15) If you can see any website ip address go
to cmd > type ping
www.facebook.com
16) In forward look up zone A=32 bits (ipv4) ,
AAAA= 128 (ipv6).
17) FQDN stands for FULLY QUALIFIED DOMAIN
NAME.
18) FQDN= host name (pc name) + domain
name (DNs name)
NETBIOS
19)
. always presents a
root domain.
Dot
20) To chesk the DNS SERVER go to cmd >
type nslookup.
|
9th
& 10th TOPIC
IIS SERVER WITH HTTP & IIS SERVER WITH HTTPS
OR
WEB SERVER
INTERNET INFORMATION SERVICE HYPER
TEXT TRANSFER PROTOCOL SECURE
WEB SERVER WITH HTTP
PORT NO IIS SERVER:-
IIS SERVER WITH HTTPS--------------- 443
IIS SERVER WITH HTTP ----------------
80
FTP SERVER( CLIENT
REQUST )---------- 21
FTP SERVER( SERVER
RESPONSE)--- 21
IIS version 7.0 in
w2k8. In this only inbuilt web server,http,https not ftp service.
IIS version 6.0 in
w2k3. In this inbuilt both service like web server, ftp,http.
WEB SERVER:-
IIS (web server) is used
to launch the web sites based on the web languages like HTM, HTML , DHTML ,
MHTML , XML (XTENDED MARK UP) , ASP.NET , PHP , ASP ( ACTIVE SERVE PAGES) , VB
SCRIPT. Over the local network or internet using the http or https protocol.
Using the web server we can transport any data base on the web page site
anywhere in the world over the internet.
HOW A WEB SERVER WORK:-
CLIENT |
|
REQUIRMENTS:-
IP CONFIGRATION +WEB
PAGE +DNS (OPTIONAL)
HOW TO CREATE A WEB PAGE:-
File make in
.txt > save as > desktop >name without space.html >
STEPS TO INSTALL THE WEB SERVER:-
Start >
server manager > roles >add roles
Add roles
Tick on web
server
After tick
on web service > add roles wizard open > click on add feature
next
next
Tick on all management
center
next
install
Installing
start
After this
all above steps automatically creates in windows drive
Wwwroot
folder > every thing inside in which items delete.
Which page
you made a save this drive
CONFIGURE THE WEB SERVER:-
START >
ADMIN TOOLS > IIAS MANGER
open IIS Web Server:-
Open Sites and Delete Default sites after this R.C on sites
and web sites:-
Sites name any
Path of your
we sites C:/ inetpub>wwwroot>
Host name if
u have a DNS server
Refersh your
sites name
Double click
on name and default documents
Go to add
Tab and fill your site name (SAME)
After this
go to Directory Browsing
After this
double click on your site name > refresh
TO CHECK
YOUR WEB SITES:-
Open your web browser & fill your ip address
1) SSL(SCURE SOCKET LAYER) or KARBROS
ONLY SUPPORT HTTPS MOST POWERFUL SECUITIES.
2) IIS VERSION 7.0 IN W2K8. (ONLY
INBUILT WEB SERVER NOT FTP SERVER BUT IN THIS VERSION HAVE A HTTPS SECURITY).
3) IIS VERSION 6.0 IN W2K3. (WEB
SERVER OR HTTP OR FILE SERVER IN BUILT)
4) IIS IS ALSO KNOWN AS WEB SERVER.
5) INETPUB IS THE DEFAULT DIRECTORY OF
IIS.
6) FTP PUB IS THE DEFAULT DIRECTORY OF
FTP.
7) HOST NAME WHEN FILL WHEN YOU HAVE A
DNS.
8)
|
11th
TOPIC
FTP (FILE
TRANSFER PROTOCOL)
PORT NO IIS SERVER:-
FTP SERVER( CLIENT
REQUST )---------- 20
FTP SERVER( SERVER
RESPONSE)--- 21
FTP:-
FTP stands for
file transfer protocol. This is mostly used direct downloading and from any
network or internetwork location by browsing (FTP browsing). FTP browsing is
the process of accessing the data, ftp server directly with the help of
internet explorer.
ADVANTAGES
OF FTP SERVER:-
1) Direct
access to online storage.
2) DTR faster
than HTTP.
3) Higher rate
of downloading and uploading.
4) User
authentication mean we can assign the user access rights for downloading and
uploading over the FTP server and the user must have to prov ide its
credentials for the transection over the FTP server.
TYPES OF USER AUTHENTICATIONS:-
1) ANONYMOUS
2) BASIC
ANONYMOUS:-
Anonymous
access is the default user name and password use to access the FTP sites.
Username |
FTP |
Password |
FTP |
BASIC USER
AUTHENTICATIONS:-
A basic user
authentication is customized user authentications use to access to FTP server
and also by using the basic user authentication. We can implement FTP access
securities sepreatly for each user.
REQUIRMENTS
TO INSTALL A FTP SERVER:-
1) IP CONFIGRATION
2) FIREWALL
OFF
3) NETWORK
DISCOVER OFF
STEPS TO
INSTALL THE WEB SERVER WITHOUT REMOVING A WEB SERVER:-
Start > server manager > roles > r.c on web server
(IIS) and add roles services
Select FTP service > add feature
NOTE:-
DELETE DEFAULT
FTP SERVER.
Start > Adminstrator tools > iis 6.0
(delete
default ftp site) ftp Sites > R.C on Ftp Sites > New Ftp Sites
Any name in this box
Give the path directory
Which you want to share the data on this ftp sites
Choose the data and copy paste on this folder
If you want give the permission to all downloading(read) and
uploading(write) tick on both
Finish
After this
Start the ftp service
TO CHECK
YOUR FTP SERVER:-
NOTES:-
1)
NFS protocols used for sharing.
2)
Read For downloading and write for downloading.
3)
Any installlaion use TFTP server.
4)
SFTP used for solaris , unix and linux.
5)
When we download and upload any object file no space
name.
|
12th
TOPIC
FTP (FILE
TRANSFER PROTOCOL)
UPLOADING
& DOWNLOADING
PUT
GET
UPLOADING:-
Before using uploading open your ftp sites
Goto run > cmd
ftp 50.0.0.1 (space with ftp server ip address)
user name-ftp
password-ftp
get cd.txt
FURTHER SETTINGS OF FTP SERVER:-
START > ADMIN TOOLS > IIS 6.0
FTP SITE > PROERTIES
NOTES:-
1)
Isolate means securities or policies.
2)
When we upload the defalt time is 120sec.
|
13th
TOPIC
FILE
SERVER
FILE SERVER:-
A file server is a centralized storage
server use to store and maintained the database on a centralized location in a
network using the file server. We can share, storage, manage the securities on
the user, security on the file access policies on the shared objects just from
a single console.
Parts
of File Server:-
1) Sharing
2) Password protecting sharing
3) Uses of share and storage
management console
4) Folder quota
5) File screening
6) DFS (Distributed File
System)
1) Sharing:-
Sharing is the process of enabling a data resource
to be accessible from any network location.
2) Password protecting
sharing:-
It is the process of sharing some resource with
access limitations to limit the access the default password for the use, ho enable
the sharing is used. The advantage of the password protecting sharing is that
we can provide the share resource only to the user we want.
3) Uses of share and storage
management console:-
The share and storage management console (SSMC) used
to provide a centralized console to handle and manage all the shared object
using the share and storage management console. We can also configured the disk
management service and also we can check the running session with our file
server the user who access the file server.
Advantages:-
1)
Security
2)
Permission changes
3)
Sharing
4)
Share but no show
5)
Show can who can access the file
6)
How many files open
4) FOLDER QUOTA:-
As we know, the disk quota is used to limit the
space limitation, on a folder we have to choose the use the folder quota because
on the network location only the folders are allocated for the network users
access and we have to implement the limitation on the folder.
5) FILE SCREENING:-
The file screening is the process of enabling the
file extension based security on network share. means we can only copy or store
the file on network folders which are allowed in the file screening list.
6) DFS (distributed file system):-
A DFS (distribute file system) is used to provide a
centralized share access for the share objects on the different locations in
the network. It is used to provide access to all the shared objects just from a
single IP address and removes the burden from the users to resemble multiple IP
address.
FILE SERVER NETWORK
CLINT NETWORK
To do step wise step:-
i)
Storage management
ii)
Shearing on storage space
iii)
Folder quota on share folder
iv)
File screening on quota folder
v)
DFS for all network shares
Steps to install the file server:-
Start > server manager >roles > tick on
file server
Tick all the services without windows search
services
Tick on all the drives
Pre configuration requirements of file server:-
We
must have unallocated space in the hard disk space in the hard disk drives, if
we don’t have any extra drive except.
NOTE:-
WHICH LOCATION YOU WANT TO SHARE
THE FORDER YOU MUST CRATE A FOLDER ON THAT LOCATION. BUT YOU DON’T SHARE THAT
FOLDER MANUALLY.
1) Configure the share &
storage management:-
Start > admin tools > share & management
console
PROVISION
STORAGE:-
In this only that drive show which have a
unpartition.
Size of volume
PROVISION
SHARE:-
Browse the folder which you want to share.(but don’t
share manually)
NTFS
PERMISSION:-
You must
customized the ntfs settings acc. to our requirements.
SHARE
PROTOCOL:-
Tick
on both protocols.
SMB
SETTINGS:-
Goto
> advance
LIMIT USERS:-
In
this option you will customized the user acc. to your req.
CACHING:-
Click
on second option.
SMB
PERMISSION:-
In
this you customized the smb settings like read only, read-write etc.
NFS PERMISSION:-
Click
on ANSI and edit.
Next
Next
Next
Create
Close
FOLDER
QUOTA:-
Start > admin tools > file share resource
manager
Quota > create quota
Quota on which location or folder where you create a
smb of ntfs permission or share the folder.
In this must customized the folder quota limit >
define quota permission
Hard Quota:-
In
this type of quota a user is not allowed to use the space exceeded
thanallocated to him.
DO NO CROSS
THE LIMIT
Soft Quota:-
In
this type of quota, auser can exceed the space than assign to him but a limited
size, means it can cross limit by in limit.
Add:-
Warning
on 85%
Save the quota or not
File
screening:--
File
screening are two types:
1)
Active screening:-
A user cannot copy the file
types in listed in screening on the file server.
2)
Passive screening:-
User can copy file type but
the file server will monitor those files for inappropriate data type.
Start > admin tools > file share resource
manager
File screening management > create file screening
Browse
the folder which you create a file screening.
Define
custom file screening
To
include the files with *.mp3 or *.
Select
the file screening create by you…..
DFS MANAGEMENT:-
·
Network discovery must be enabled.
Start > admin tools > dfs server.
·
Left pane select namespace & delete by default
·
Left pane > r.c. > select new name space
Give the ip of file server ip address.
Name(any)
How to admin
tools > dfs management:-
Rc namespace (made by you) > new folder
Show shared folder of second pc.
Select the ip than ok
Goto > cmd >type fileserver ip \\10.0.0.1
In this location no of pc connected with file server
and the data of all pc on just single location called file server.
NOTES:-
· file screening or folder
quota is the part of the file server resource manger (FSRM).
· file screening is the base
of the extension based.
· In file screening
extension are used in *.
· Dfs is a single location
where every pc share data avail in single location.
· To create a file server ip
& n/w discover must be on
· IPC is default share serv
ice.
· Index is the process of
manage the data.
· Search or index are not
running at a time.
· In single namespace we
share appox. 50,000 folder.
· Namespace is the group of
share policies in dfs.
· Dfs is the group of shared
folder.
· Provision storage option
working when you have a unallocated space.
· Your hard disk default
name is disk0.
· Default allocation size is
4096.
· Allocation unit means
cluster size.
· Only 512 allocation size
is the best when we select that option we don’t need to defrag the hdd.
· By default read option on
every shared folder.
· File server used two
protocol smb 139 & nfs 2049.
· Smb is higher than nfs.
· Root access = admin
access.
· Templetes are default
mode.
· Folder quota are two types
1) hard 2 soft quota.
· File screening are two
types 1) active 2 passive.
· Name space required IP
address.
|
14th
TOPIC
TERMINAL
SERVICES (T.S.)
It
includes
1) Remote assistance management
2) Terminal server gateway
3) Creating rdp file
4) Remote desktops
5) Multiple user logon
6) Messaging between the
networks
Processing:-
The phenomena
of providing the raw input data to any process and getting the output in an
understandable format is known as processing
Types of processing:-
1) Centralized
processing
2) Distributed
processing
1) Centralized
processing:-
In this
type of processing the whole process is performed by the network clients and
after processing the data is submitted to a centralized server.
NOTE:-
Also in this
case the processing power is provided by the centralized server as well as raw
data.
2) Distributed
processing:-
In this
type of processing everything is performed on the distributed network clients.
They can also generate their raw data itself and use their processors to
process the raw data. Generate the result and after all that they submitted the
result on centralized server.
Terminal server:-
It is
used to provide centralized
application access for all the network clients just by the installing
application on a single server.
Advantages:-
·
A single application licence can be used for the
multiple network clients.
·
Financial saving for company.
Terminal server gateway:-
When we use a
TS beyond the network or over the internetwork using the gateway services is
known as TS gateway.
Multiple user logon:-
This is a
service offered by the terminal server to logon and work for the multiple users
any system at a time.
Creating a RDP file:-
It is a
service used to access any remote desktop service end from a RDP icon.
Remote desktops:-
This service
offered the remote desktops access for thr remote multiple systems at a time.
Messaging between the network clients:-
It is used to
send text message to the network clients from a terminal services.
Before configuration of TS we must:-
·
Install TS server.
·
Install application.
·
Configuration of TS at last.
Requirments:-
·
Ip configuration.
·
Firewall disabled.
·
n/w discovery must be enabled.
·
local user must be create on the server.
Start > server manager > roles > add roles
Tick on terminal services and terminal web access
In this option you add a your users on this
2nd step:-
Install
application which is necessary for you and your clients ….
After this configuration the TS:-
Start > admin tools > terminal services > TS remote
app manager
Action > add remote program
Tick on services which you want
http:// TSIP /ts
Type ts user name & password
If your active x control is not enabled > r.c on the
yellow block > run active x control
All the ts services are shown
Select any services
Type TS user name & password
To create a RDP file:-
Start > admin tools > terminal services > TS remote
app manager
Scroll down
r.c on the
application which you want to create a RDP
Which loc ation you want to save the file
Remotedesktops:-
Remote
desktop is the service use to access the remote desktop of multiple n/w clients
from a single TS server at a time.
To do remote desktops:-
Start :admintools > ts > remote
desktops
Remote desktop > r.c > add new connection
Give the remote ip
How to configure multimode remote desktops using T.S:-
Start > adminitools > t.s configuration
Remove tick on restrict single session
In this way you can use 2 remote desktops.
Terminal service manager:-
Start > admin tools
> TS > TS manager
My group > add computer
Send message
NOTE:-
·
RDP remote desktop protocol or publishier
·
Application first must install on ts server
·
NLA network level authentication
·
7.0 version for IIS web server
·
RDP helps us to make a shortcut in this way we don’t
go to bowser
·
TS is a tottaly remote desktop.
·
ADDS if install your pc please remove this before
using TS
·
TS always works with IIS when TS install, IIS
install automatic.
|
15th
TOPIC
IP
SECURITY
You can allow or deny any user on the basis of
ip addresses higher level security then the firewall, firewall port based ,
user lavel permission.
Security
level implemation:-
1) Ip security
2) Firewall rule
3) Firewall inbound/outbond
port rule
4) Group permission
5) User permission
6) Ntfs permission (
allo/deney)
IP
sec has three level:-
1) Block
2) Permit
3) Negotiate policies (permit
with condition)
PATH:-
Start
> admin tools > local securities & policies
Or
Goto
run > secpol.msc
My pc other pc math
policies ok
Not
math policies cancel
Ip sec policies on local computer > create ip sec policies
Name (any)
Remove tick on edit properties
Double click on Ip sec
policies on local computer
Double click on ip policies
add
select which port you want to block & if
your port name or not given this list select other and fill the next balnk port
no
ok
click on the hole and next
Click on hole & next
Use the sting option & give password
After this assign the policies
In this all settings same to same second pc
if this setting will same ip sec will working, if any step will be mismatch the
policy will not working.
Ping is working because both the systemm
create a same policies.
If ip policies mismatch
NOTE:-
· Ip sec
high priority.
· Ntfs
check two permission 1) group 2) user
· Deny’s
priority higher than allow
· PRESHARED
KEY is populated amongs the network.
|
Domain
1st TOPIC
DOMAIN
Domain is a network environment
which is used to setup the enterprised base large network. Domain is the
architecture in which centerlized computer generally or normally known as a
domain controller is used to handle all the network services and the resources
from a centerlized location.
NOTE:-
Domain network is the base of internet
architecture.
ADC
|
RODC
|
CDC
|
PDC
GD
|
PDC
= PARENT DOMAIN CONTROLLER
ADC= ADDITIONAL DOMAIN CONTROLLER
RODC=
READONLY DOMAIN CONTROLLER
CDC= CHILD DOMAIN CONTROLLER
CENTERLIZED
SERVICES:-
1) PDC
2) ADC
3) RODC
4) CDC
5) TREE
6) FOREST
7) SITE
8) REPLICATION
9) GROUPMANAGMENT
10)
USERMANAGMENT
11)
OU (ORGANIZATIONAL UNIT)
·
PDC:-
PDC stands for parent domain controller. PDC is
known as master domain controller or simple DC (domain controller). It is used
to origin or start a domain network without PDC. We can never imagine a domain
network. Pdc is the control point to handle all the network resources in the
domain network.
·
ADC:-
ADC stands for additional domain controller. Adc is
used as the read/write backup copy of PD. In c ase PDC is failed to start to
provide the services means a ADC is simply read/write copy of pdc.
·
RODC:-
RODC stands for read only domain controller. This is
the new type of dc in windows server 2008 and normally used as the read only
copy of PDC and it is used on the location where
We need a very high security, without any network
administrator or without any management.
·
CDC:-
CDC stands for child domain controller. This is used
as the branch server for the pdc and commonly used to divide the load different
domain services by setup of multiple cdc like cricket.yahoo.com ,
mail.yahoo.com etc.
·
Tree:-
Tree is the architure which consist of all the
components of domain and domain client.
·
Forest:-
Forest is collection of multiple domain trees in
this which these trees can interconnect with each other and forms and internet.
·
Site:-
Site is the area or collection of the domain
controller which can replication with each other.
·
Replication:-
Replication is a process of exchange the information
b/w two domains controller.
·
Group Management:-
It is used to organize particular type
of users in diff-diff content.
·
User Management:-
It is used to crate and manage just the user.
·
OU:-
It is stands for organizational unit. It is also
known as special groups or non-removable groups and ou normally used when we
need to implements securities and policies on domain controller user.
Note:-
1)
Domain is tottaly based on internet.
2)
Domain is a centerlized service.
3)
Replication is a process of exchange the information b/w two domains
controller.
4)
In Microsoft server 2003 adds
and dns in seprated and we have to install this both services on pc.
|
PDC
Requirement:-
1)
If you make a pdc your c drive is minimum 40gb.
2)
Pdc is main server in the network
3)
Pdc consists od ADS & DNS.
4)
Ip configuration
5)
Dns add must be filled
6)
Firewall off
7)
Discover on
Steps
of installing the PDC:-
ADDS:-
Start
> server manager >
roles
> add roles
Tick
on active directory domain service
Next
Install
After
this
Start
> run OR win key + r
And
type dcpromo (domain controller promotional)
Tick
on advance installation
Next
Create
a new forest and next
Fill
the FQDN domain name ( .com,.org,.net etc) and next
Next
Select
server 2008 and next
next
Click
on YES
this
is our file path where all the log file save, if you want to change your path
you can chage your path acc. To your requirements. In future you will restore
your data on this path.
next
Fill
your password and next
Next
Tick
on reboot complitation
How
to check your pc in domain
Select my computer icon > r.c > properties
Than
show your domain name
Join
another pc into domain
Note:-
Before
adding in domain enter domain ip in your dns.
Before
adding a domain your pc add in workgroup
Select my computer icon > r.c > properties
Go
to change setting
Change
Click
on domain
Fill
domain name
Type
domain name and fill domain password
How
to create user in PDC or ADDS:-
Start
> admin tools > active directory user
and computer
Select domain > users > r.c > new > users
When
you create a user with same permission than you copy the user and make it.
How
to remove ADDS or PDC:-
Cmd
: dcpromo
Or
Cmd
: dcpromo /force removal
Or
Fill the password of when you create a domain
Note:-
1)
In M2K8 adds and dns will available.
2)
FQDN= fully qualified domain
name.
3)
Net bios name always automatic convert in capital latters.
4)
Net bios = network basic input output system.
5)
Database means which location where we save all user and clients data
and information.
6)
Sysvol = system volume.
|
ADC
Additional domain controller
ADC
= read/write copy of PDC without FSMO power.
Description:-
ADC is used as a read/write
copy of PDC, which enable us to setup a domain network on different- different
location with the same network functionality. ADC contents the same database as
of the PDC but without the FSMO power because it’s a read write copy of PDC, we
can edit and modify the database in ADC also. After modification it will be
automatically replicate the data to PDC.
Advantages of pdc:-
1) Read/write backup.
2) Network load balancing.
Requirmrnts to setup the ADC:-
1) PDC must be configured.
2) ADC must be in the network
of PDC.
3) DNS address is must be same
for the all clients as well as domain.
Configuration of ADC:-
1) IP configuration
2) DNS IP for PDC
3) n/w discovery must be on.
Start
> run > dcpromo
Click
on existing forest > add a domain
In you have a more than one domain than select on the
following dialogue box.
OU:-
OU stands for
organizational unit. Ou is the container for te user like a group to implement
the special type of policies.
OU=special
Group
How to crate a OU:-
Start > admin tools > active directory users &
computers
Make a user:-
We make a user for two ways
1) domain
2) OU
Select domain > users > r.c > new > users
When
you create a user with same permission than you copy the user and make it.
Make a Group:-
Start > admin tools > active directory user & group
Domain > name > r.c > group
Note:-
1)
PDC have five power called FSMO power who will make
a PDC.
2)
FSMO power is a copy right.
3)
FSMO power not copy but we can move.
4)
FSMO = flexible single master operations.
5)
Domain name automatically host name or pc name.
6)
TLD = top level domain ,example .com , .net , .org
etc.
7)
Netbios is the name of host name.
8)
FFL = forest function level.
9)
DFL = domain function level.
10)
If have any error or problem user run as
administrator.
11)
When your system in DC then you don’t create a user.
12)
If your domain is not working, in case DNS is
problem.
|
BACKUP & RESTORE
GUI CLI
Windows server 2008 bakcup:-
Backup is
the copy of the data in case if it is deleted or lost. Windows server 2008 have
the only facility to keep a copy backup (normal backup).
Windows server 2003 backup:-
In
windows server 2003 we create a backup for five types.
1) Copy backup
-- copy paste in another media.
2) Daily
backup – sechdule while whole data copy on the server.
3) Normal
backup – copy backup but only when we need.
4) Incremental
backup – back up only increase files.
5) Deffriental
backup – backup the every modification on the data.
Requirement for the backup in 2008:-
Windows backup
features must be installed and we have a sufficient free space on our hard disk
to store the backup.
Start > server manager
Features > add features > windows server backup
features
To configured the backup:-
Start > admin tools
> windows server backup
Schedule backup:-
If you want to
sechdule backup your system must have two or more hard disk drive.
Backup once use:-
Create
a onetime of your backup data that you can use to supplement tour automatic
backup data.
Full back up means all pc back up.
Custom backup means what you want ?
Local drive means your hard disk.
Remote shared folder means another hdd use for backup by
network.
OR
Through
network
Backup once use:-
Create
a onetime of your backup data that you can use to supplement tour automatic
backup data.
Full back up means all pc back up.
Custom backup means what you want ?
Local drive means your hard disk.
Remote shared folder means another hdd use for backup by
network.
\\remotepc ip\shared drive
Give a administrator user name &
password
RESTORE:-
i)
Restart your pc
ii)
Boot from DVD
iii)
Select repair your system option
iv)
Complete pc restore
v)
Select the restore backup file
vi)
Restore it.
CLI
backup:-
Note
Cmd > r.c > run as administrator
WBADMIN START SYSTEMSTATEBACKUP –BACKUPTARGET:d:
Driveletter if u want
Enter y
This is a file name means time&date.
Get all the backup details
Start > cmd > wbadmin get versions
To restore CLI:-
i)
Restart your system
ii)
Press F8
iii)
Select directory services restore mode
This is the file name where we use
to recover the data.
Note:-
1)
CLI backup not in windows server 2003.
2)
In company server 2008 not use in backup.
3)
2008 for normal backup.
4)
Windows server 2003 backup use now a days in
company.
5)
Differential back use in company
6)
Back up service is the basic need of corporate.
7)
NAS (network attached storage) to share the data via
network in another storage.
8)
Only drives backup but c drive backup automatically.
9)
Which drive has a boot file on this drive backup
automatically.
10) Speed of
backup is appox. 5mbps.
11) CLI
backup file name consist of combine the date and time.
|
RODC
READ ONLY DOMAIN CONTROLLER
PDC
|
RODC
|
No credentials
|
No credentials
|
Modification
|
No modification
|
Offer full service
|
|
Temporary service admin
|
|
Wan link connected (both)
|
|
Read only copy
|
|
Proper service give by clients
|
Descriptions:-
RODC
is read only domain controller use to implement
a domain network on any other site with the different user with
security, using the RODC we can implement the same domain network on any
another side with the need of extra network administrator.
Advantages of RODC
|
Disadvantages of RODC
|
While using the RODC any
server admin at the RODC site.
|
RODC can never store user credentials of
the RODC site on RODC server.
|
The clients on RODC site
can work properly even in the absence of PDC n/w but we have to configured
the password caching.
|
Both the PDC & RODC
are connected with the each other using the wan link and use to wan link to
replicate the data b/w them. So whenever the wan link goes down both are
enabled to communicate.
|
Setup a RODC:-
1) A PDC must
have configured.
2) The user
for PDC & rodc N/w must be created on the pdc.
3) We must
have to choose a responsible user for a rodc site in the RODC n/w.
4) DNS of PDC.
5) We
implement or setup only RODC server for any domain .
6) ADDS
install (server manager)
Start
> run > dcpromo
Click
on existing forest > add a domain
Type the user who will make on the
PDC.
Tick on RODC
PASSWORD CACHING IN RODC
1) PDC
2) RODC
3) ADD TRUSTED
USER WITH LIMITED SERVICES
How to create password caching:-
There should
be connection b\w while doing caching.
In RODC server Login through PDC user(administrator).
Select read only server > r.c > properties
Select password replication poliocies
Add
Select allow password for the account to replicate the rodc.
Ok.
Select user by advance option then must click apply to save
changes.
Then go to advance
Apply & ok
And after this
Select read only server > r.c > properties
Select password replication poliocies
Select rodc computer
Please make sure data is replicate to rodc . must use command
Rub > cmd > repadmin
CDC
Child
domain controller
PDC------- www.yahoo.com
CDC can work even if PDC main www.yahoo.com is not working than CDC can also
create its own CDC , RODC and ADC.
http://mail.yahoo.com.%username%=UID(12a920048n)
protocol cdc domain Top root user name unique identity
name
level domain
domain
(TLD)
Requirments:-
1) PDC
2) IP config
3) Firewall off
4) N/w discovery on
5) before installation of CDC
dns add must be of PDC.
6) After installation of cdc
add must be cdc.
Cmd > dcpromo
When you click this potion CDC is independent.
PDC name
CDC
name if want to create
How to check domain:-
Note:-
1)
G.C means global catalog.
2)
CDC is also its own PDC.
3)
CDC has OWN database.
4)
Unique id means alphabaticls+numeric.
|
FSMO POWER
Flexible
Single Master operations
PDC
have a FSMO power.
ADC
, CDC , RODC have no FSMO power.
Description:-
FSMO roles are primary power of the
parent domain controller. And also these power are copy protected. we can only
transfer these FSMO power PDC to ADC. After transfer this roles ADC act as a
PDC and PDC act as a ADC.
These all are copy protected and can
also transfer. FSMO reles enables a DC to act as a PDC.
FSMO
has five power:-
1)
Schema
master
2) Naming master forest level roles
3) RID master
4)
PDC emulator
5) Infrastructure master domain level roles
1) Schema
master:-
This
role are used to handle or manage the logical scheme of the network including
the forest functions as well as sight linking policies with the other domain,
and only communicate to the logical expect related with domain.
2) Naming
master:-
Naming
master is used to manage unique conventions (unique name for everyone) for
insight or out sight the domain.
3) RID
master:-
RID
stands for relative identification. RID is used to assign unique numeric id
every logical or physical object added in the domain. The UID assigned by RID
master to every object is unique.
4) PDC
Emulator:-
It stands for Parent Domain
Controller Emulator. This role is used by domain controller for its own
management. It responsible of domain internal management.
5) Infrastructure
master:-
This role is used to manage all the
physical
expects related with the domain like topologies.
Disaster
recovery:-
Disaster recovery is process
of PDC disaster recovery is performed in a domain network whenever a PDC going
to crash at that time to continue to operations of the PDC we use FSMO roles
transfer process from PDC to ADC.
1) We have FSMO power or roles.
2) FSMO roles are copy
protected.
3) We can’t copy but we can
transfer from PDC to ADC.
4) Any FSMO roles can just
contain by single system at a time.
How to check your system is a PDC or ADC:-
Start > admin tools > active directory user
& computer
Click on your
PDC domain name > r.c > operation master
This windows shows FSMO power
Roles of transfer are two types:-
1) GUI
transfer
2) CLI
transfer
GUI
is not transfer the forest level domain.
CLI
is not transfer the both roles.
CLI roles transfer:-
When we CLI transfer we go to
ADC server.
Cmd
> NTDSUTIL
Roles
Connections
Connect
to server life.com
quit
To stop the services:-
To transfer the roles we must have to
seize (stop) the role services.
1) Seize schema master
Yes
Transfer schema master
quit
GROUP POLICY
DISCRIPTION:-
Group policies are
securities restrictions implement in the domain user ny domain controller with
the help of group policies. a domain controller admin can manage and control
the access rights of domain user from a client location means it allows us to
configure the securities policies from the centralized locations. Using a group
policy we can implement login access implement data access restriction, account
access restriction and application restriction on client end.
Types
of group policies:-
1) Computer policies
2) User policies
1) Computer policies:-
Related with the computer physically& does not
move as user make to any other end means fix with hardware.
2) User policies:-
Related with the user access logically end moves as
user moves from one client location to another locations.
Requirments:-
·
Pdc
·
User must be configured
·
Computer must be added to domain as domain client on pdc
First
you crate a user on pdc.
Make a user:-
We make a user for two ways
1) domain
2) OU
Select domain > users > r.c > new > users
When
you create a user with same permission than you copy the user and make it.
Start
> admin tools > group policies
Domain
name select > domain > expand > facebook.com (select your domain) >
r.c > create a group policies in this domain
Not
complete
PROFILIES
NOT COMPLETE
WDS
WINDOWS DEPLOYEMENY
SERVICES
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.