Monday, May 12, 2014

MCITP COMPLETE BY GORVAM SADDAR

                                          
MCITP



TOPICS OF MCITP     
WORKGROUP TOPICS

S.R.NO
PRACTICALS
PAGE NO
STATUS
1)     
IP CONFIGRATION
2-23
OK
2)     
REMOTE DESKTOP
24-41
OK
3)     
REMOTE ASSISTANCE
42-54
OK
4)     
OUTLOOK CONFIGRATION


5)     
DHCP SERVER
55-125
OK
6)     
DHCP RESERVATION
126-134
OK
7)     
DHCP RELAY


8)     
DNS MASTER
135-178
OK
9)     
DNS SLAVE


10)                        
FILE SERVER

Ok
11)                        
FILE SHARING

Ok
12)                        
PASSWORD PROTECTING SHARING

Ok
13)                        
DISK QUATA

Ok
14)                        
FOLDER QUATA

Ok
15)                        
FILE SCREANING

Ok
16)                        
DFS (DISTRIBUTED FILE SYSTEM)

Ok
17)                        
PRINT SERVER


18)                        
IIS SERVER WITH HTTP   
179-
OK
19)                        
IIS SERVER WITH HTTPS


20)                        
FTP (FILE TRANSFER PROTOCOL)
205
OK
21)  
FTP DOWNLOADING & UPLOADING USING
THE CMD LINE INTERFACE


Ok
22)                        
TERMINAL SERVER

Ok
23)                        
TERMINAL SERVER GATEWAY

Ok
24)                        
REMOTE DESKTOPS

Ok
25)                        
RDP SHARING ON MULTIPLE SHARING

Ok
26)                        
RRAS

Ok
27)                        
NAT

Ok
28)                        
NAT

Ok
29)                        
VPN (VIRTUAL PRIVATE NETWORK)

Ok
30)                        
ROUTING

Ok
31)                        
IP SECURITY

Ok
32)                        
SIMPLE FIREWALL CONFIGRATION


33)                        
ADVANCE FIREWALL CONFIGRATION


34)                        
WINDOWS BACKUP SERVICE


35)                        
WDS (WINDOWS DEPLOYEMENT SERVICE)


36)                        
INTERNET EXPLORER SECURITY PASSWORD


37)                        
HIDDEN SHARING


38)                        
USER MANAGEMENT


39)                        
GROUP MANAGEMENT


40)                        
LOCAL SECURITY POLICIES


41)                        
DRIVE MAPING


42)                        
HOME FOLDER








DOMAIN  TOPICS

      1)
ADDS TERMS +INTRO+USE


      2)
PDC


      3)
RODC


      4)
ADC


      5)
CDC


      6)
JOINING SYSTEM INTO DOMAIN


      7)
REMOVING SYSTEM FROM DOMAIN


      8)
DOMAIN O U MANAGEMENT


      9)
DOMAIN GROUP MANAGEMENT


   10)
DOMAIN USER MANAGMENT


   11)
DOMAIN LOCAL SECURTIES POLICIES


   12)
GROUP SECURITY POLICIES


   13)
SOFTWARE INTALLING USING GROUP
POLICIES



   14)
FILTERS IN THE GROUP POLICIES


   15)
AD BACK UP IN GRAPHICAL MODE


   16)
AD BACK UP IN CMD MODE


   17)
FSMO POLICIES


   18)
LOCAL PROFILIES


   19)
MADATORY PROFILIES








         













workgroup





IP CONFIGRATION

DEFFINATION
                IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE NETWORK, BECAUSE THE NETWORK IS ONLY POSSIBLE IN A CONDITION WHEN ALL THE SYSTEM MUST BE CONNECTED WITH PHYSICAL CONNECTION (CABLES) AS WELL AS LOGICAL CONNECTION (IP CONFIG).
                NETWORK =   PHYSICAL CONNECTION + LOGICAL CONNECTION
                                                                       (CABLES)                                                       (IP)

TO CONFIG THE IP WE WILL FOLLOW THIS SERVICES

1)      IP ADDRESS
2)     FIREWALL
3)     NETWORK DISCOVERY


IP ADDRESS:-
                  
                IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE NETWORK, BECAUSE THE NETWORK IS ONLY POSSIBLE IN  A CONDITION WHEN ALL THE SYSTEM MUST BE CONNECTED WITH PHYSICAL CONNECTION (CABLES) AS WELL AS LOGICAL CONNECTION (IP CONFIG).
                  





PROPER STEPS OF CONFIG THE IP ADDRESS

START >




NETWORK PROPERTIES >




MANAGE NETWORK CONNECTION




R.C ON LAN CONNECTION & SELECT PROPERTIES:-

 





SELECT A IPV4 & GO TO PROPERTIES OF IPV 4:-





AFTER THIS YOU FILL THE IP AND THAN PRESS OK .


FIREWALL:-
                   WHILE DOING THE IP CONFIGRATION WE HAVE TO DISABLED THE FIREWLL BECAUSE WHILE USING LOCAL AREA NETWORK END FIREWALL USUALLY BLOCK SOME NETWORK SERVICE AND UNABLE US TO USE THE NETWORK , THAT’S WHY WE HAVE TO USE THE FIREWALL ( NOT RECOMMENDED B Y THE MICROSOFT AND FIREWALL IS ALWAYS ON WHILE WORKING ON INTERNET ).

NOTE:-
       FIREWALL STOPS MALWARE, SPYWARE, ADWARE, WORM. MALWARE AND WORM DAMAGED OUR WINDOWS FILES.




PROPER STEPS OF FIREWALL:-

GO TO START AND SELECT CONTROL PANNEL





AFTER THIS SELECT THE WINDOWS FIREWLL OPTION




 AFTER SELECT THE FIREWLL YOU MUST OF THE FIREWALL WHILE ACCESSING THE NETORK.



NETWORK DISCOVERY:-
                     NETWORK DISCOVERY IS USED TO FIND OUT AUTOMATICALLY SYSTEM CONNECTED IN YOUR NETORK.


NOTE:-
       YOU CAN ONLY NETWORK DISCOVERY ON WHILE USING THE NETWORK. WHEN ACCESS THE INTERNET YOU CAN OFF THE NETWORK DISCOVERY.





GO TO START > NETWORK ON PROPERTIES








NETWORK DISCOVERY ON








NOTE:-
1)  MCITP IS TOTTALY LAN BASED NOT WAN.
2)  FIREWALL STOPS MALWARE, ADWARE, WORM, SPYWARE ETC.
3)  MALWARE OR ORM DAMAGED OUR WINDOWS FILE.
4)  IN MCITP PRECTICAL ALWAYS RESULT IN 0% OR 100%.
5)  MICROSOFT ALWAYS LAUNCHED  HIS OWN PRODUCT IN OCT. BECAUSE THIS MONTH MICROSOFT CELEBREATE THE BILL GATES BIRHDAY.





TO VERIFY THE NETWORK CONNECTION AFTER THIS AAL STEPS:-


GO TO START AND SELECT CMD <- span="">




PING IS ONLY SUCCESSFUL WHEN TTL=128 OR ANY NUMBER IN LAST .
(TTL = TIME TO LIVE)




LOOP BACK IP TO CHECK YOUR ETHERNET IS WORKING OR NOT

127.0.0.1       TO         127.255.255.255

TO KNOW ABOUT NAME OF THE COMPUTERS IN YOUR NETORK.







TO KNOW HONY MANY PC IS ON IN UR NETWORK & WHAT’S THE IP OR MAC ADDRESS OF EVERY SYSTEM.

START > RUN > CMD > (TYPE) arp -a



















2ND TOPIC
REMOTE DESKTOP


                     TO ACCESS FROM ANY LOCATION                               DISPLAY

Remote Desktop:-
                                Remote desktop is the windows base terminal emulation services with the help of remote desktop. We can share the resources and the desktop over the network. Remote desktop is known as RDP (remote desktop protocol or publisher).

Advantages of RDP:-

1)    A desktop can be shared and accessed from any location in the network.
2)    We can use the physical resources from the remote pc.
3)    We can access the data on remote pc.
4)    We can read document, play game, listen music etc.

Version of remote desktop:-

We are currently use rdp version 6.1(windows server 2008)
Other version of 6.2(windows 7)
       6.0(windows vista)
                              5.6 (windows XP)
                              4.5 (windows NT)
Note:-
            Remote desktop using CMD line type mstsc (Microsoft terminal service counsoul)


To configure the remote desktop:-

Requirements:-

1)    Ip Configration
2)    The remote desktop service must be enabled.

IP CONFIGRATION:-

                IP CONFIGRATION IS REQUIRED ON VERY SYSTEN TO BE A PART OF THE NETWORK, BECAUSE THE NETWORK IS ONLY POSSIBLE IN A CONDITION WHEN ALL THE SYSTEM MUST BE CONNECTED WITH PHYSICAL CONNECTION (CABLES) AS WELL AS LOGICAL CONNECTION (IP CONFIG).




PROPER STEPS OF CONFIG THE IP ADDRESS

START >

NETWORK PROPERTIES >




MANAGE NETWORK CONNECTION




R.C ON LAN CONNECTION &SELECT  PROPERTIES:-

 





SELECT A IPV4 & GO TO PROPERTIES OF IPV 4:-


AFTER THIS YOU FILL THE IP AND THAN PRESS OK.

NOTE:-

We must disabled the firewall and enable the network discovery.




How to enable the remote desktop:-

My computer > PROPERTIES






SELECT REMOTE DESKTOP





AFTER THIS SELECT THE SECOND OPTION THAN APPLY AND OK







AFTER THIS ALL THE STEPS WILL BE COM PLETED WE WILL DOING NEXT SOME STEPS


START >  (TYPE IN THE SEARCH BOX) REMOTE DESKTOP CONNECTION.




AND WHICH PC YOU WILL CON NECT, YOU FILL THE IP ON THIS BOX.






AFTER THIS SELECT THE OPTION BUTTON.





GERNAL TAB:-




DISPLAY:-
                        LOW DISPLAY QUALITY HIGH DTR(DATA TRANSFER RATE) AND HIGH DISPLAY QUALITY LOW DTR.






LOCAL RESOUCE TAB:-
                       
                        IN THIS TAB  YOU CUTOMIZED THE SERVICES ACC. TO OUR REQIRMENTS.






TICK ON EVERY BOX AND THAN OK


AND AS YOU WISH WANT CUSTOMIZED THE OTHER TAB ……AFTER THIS WILL COME THE FIRST TAB AND YOU WANT TO SAVE THE SETINGS OR WIL YOU LOGIN AGAIN AND AGAIN IN THAT PC THROUH RDP YOU HAVE A BETTER OPTION TO SAVE AS THE SETINGS ON YOUR DESKTOP TO LOGIN AGAIN AND AGAIN.

AFTER THIS ALL STEP YOU SLECT THE CONNECT OPTION TO START THE RDP.


NOTE;-
            WINDOWS IS A SINGLE MODE OPERATING SYSTEM THAT THE MAIN CAUSE OF WHEN YOU CONNECT THE RDP AND OTHER PC IS LOG OFF.

REMOTE DESKTOP FOR INTERNET SOFTWARE:-

1)    TEAM VIEWER
2)    LOGMEIN





3RD TOPIC
REMOTE ASSISTIANCE




ON ANY OTHER LOCATION                                             HELP

REMOTE ASSISTANCE:-.

                                    Remote assistance is the feaure which is used to assist to any techniqly problem to our friend to any system connected in the network.

FEATURE OF REMOTE ASSISTANCE:-

1.     Using the remote assistance we get help or we can using network chat services for help.
2.     We can also access the full desktop of any remote system.
3.     while accessing the remote the display of the remote pc will be accessable on both ends.
4.     The last prime power will be always to the user who is getting the help.

Pc1(Need Help)
Pc2(Ok, I Will Help)

·          Ip configuration
·        Ip configration
·          Firewall off
·        Firewall off
·          Network discovery on
·        Network discovery on
·          Install remote assistance      feature
·        Install remote assistance feature

·        Create  a remote assistance help  file & share it with full permission for network user
·        Access the share invitation file
·        DON’T CLOSE REMOTRE ASSISTANCE WINDOW

·        Share the invitation file



HOW TO INSTALL THE REMOTE ASSISTANCE FEATURE:-

START > SERVER MANAGER





SELECT THE FEATURE AND R.C  ON THE FEATURE AND ADD FEATURE:-



 AFTER THIS NEXT > FINISH








TO CREATE A HELP FILE BY NEEDER PC1:-

START > (TYPE IN SEARCH BOX) REMOTE ASSISTANCE

                                                            OR
START >RUN > msra (MICROSOFT REMOTE ASSISTANCE)

AND AFTER







AFTER THIUS OPEN A NEW COUNSOL WINDOM U DON’T CLOSE THIS WINDOW. IF YOU CLOSE THE WINDOW OPERATION IS UNSUCCESSFULL AND YOU REPEAT AAL THE UPPER STEPS AGAIN.

YOU SHARE THE INVITATION FILE






PC2

PC2 WILL OPEN A WIN KEY+R TO OPEN A RUN DIALOUGE AFTER OPEN A DIALOUGE  FILL \\IP ADDRESS
WE WILL GO TO USER > ADMINISTRATOR > DESKTOP (WHERE SAVE THE INVITATION FILE)
AFTER THIS OPEN A NEW WINDOW BOX IN THIS BOX FILL A INVITATION PASSWORD CRAETE BY NEEDER.
INTHIS WAY WE HELP A NEEDER……..
IF PROBLEM IS A BIG OR VERY SRIOUS WE TAKE A FULL CONTROL BY PRESSIN G A REQUST CONTROL ACCEPT BY THE NEEDER….

IF PC2 IS MISUSE OUR REQUEST CONTROL LIKE HE FORMAT A WINDOW DRIVE OR COPY A NECERRY DATA WE IMMEDIATELY CANCEL A REQUST BY PRESSING ESC..



5th TOPIC
DHCP SERVER
DYNAMIC HOST CONFIGRATION PROTOCOL



AUTOMATICALLY               ON PC          TO CONFIGURE IP ADDRESS          RULE


PORT NO DHCP SERVER:-          
DHCP PORT NO------ FOR CLIENT REQUST--------------67
DHCP PORT NO------FOR SERVER RESPONSE ----------68

DHCP:-
            A DHCP SERVER is used to assign the automatic logical unique, temporary, ip address in the network. A DHCP SERVER is centralized management service for ip configure in the network. responsibility is the DHCP SERVER is to assign the unique ip address to each and every client. In the network, when ever a client boot up (restart or start the pc) and sends a broadcast ip configuration request to the network DHCP SERVER and whenever a DHCP client or a network client broadcast a request in the network but the client does not have any ip address. By default at that time ip address is used for the broadcasting is 0.0.0.0 and the request will be processed and returned to the client as a DHCP offer packet on the basis of mac address of the client pc.

Working of DHCP SERVER:-
                                    When a client discover a ip address called Dhcp discover packet. When a server provide a service called Dhcp offer packet.

Working of two DHCP SERVER at a time with one client:-
DHCP SERVER
192.168.0.1
 
DHDJH
                                               
DHCP DISCOVER PACKET
UTHYT
CLIENT
PACK (POSSITIVE ACKNOWLEDGEMENT
PACK (POSSITIVE ACKNOWLEDGEMENT)

DHCP OFFER
PACK (POSSITIVE ACKNOWLEDGEMENT)

 







           





DHCP DISCOVER PACKET
PACK (POSSITIVE ACKNOWLEDGEMENT
NACK (NAGITIVE ACKNOWLEDGEMENT
 










DHCP SERVER
172.16.0.1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   





DHCP DISCOVER PACKET:-
                                    This packet is used by the network client to find out the Dhcp server. Dhcp using broadcasting  to find out Dhcp server.
                                    DHCP DISCOVER PACKET FOLLOWING CONTENTS
IP (INTERNET PROTOCOL)
0.0.0.0
SUBNET MASK
255.255.255.255
MAC ADDRESS OF CLIENT
__-__-__-__-__-__

DHCP OFFER PACKET:-
                                    A dhcp offer packet is the response packet which is given by a DHCP SERVER to a DHCP CLIENT on the basis of client MAC address.

                           DHCP OFFER PACKET FOLLOWING CONTENTS
IP (INTERNET PROTOCOL)
192.168.0.2
SUBNET MASK
255.255.255.0
GATEWAY
192.168.100.254
PREFERRED DNS
192.168.100.253
ATTERNATIVE DNS
192.168.100.252
WIN SERVER
192.168.100.251
DHCP
192.168.100.1
LEASE PERIOD
6 DAYS (DEAFAULT)





   DHCP
 SERVER


  CLIENT
ROSA PROCESS BY DHCP SERVER AND ONE CLIENT:-
S
O
REQUST
OFFER
SELECTION
ACKNOWLEDGEMENT
A
R
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       


REQUIRMENTS TO INSTALL A DHCP SERVER:-

                        DHCP
                      CLIENT
IP CONFIGURED
FIREWALL OFF
FIREWALL OFF
-------
DISCOVER ON
-------






STEPS TO INSTALL A DHCP SERVER:-
START > SERVER MANAGER
 



CLICK ON ROLLS > ADD ROLES



NEXT(ADD ROLES WIZARD)




SELECT DHCP SERVER (SELECT SERVER ROLES) > NEXT




DHCP SERVER (INTRODUCING) > NEXT




SELECT NETWORK CONNECTION BINDINGS > NEXT




SPECIFY IPV4 DNS SERVER SETTINGS >NEXT
                   IF U HAVE ANY DOMAIN LIKE YAHOO.COM. ENTER YOUR DOMAIN NAME AND FILL YOUR DOMAIN IPV4.




SPECIFY IPV4 WINS SERVER SETTINGS > NEXT




ADD OR EDIT DHCP SCOPE > ADD
                   A SCOPE IS THE RANGE OF POSSIBLE IP ADDRESS FOR A NETWORK.THE DHCP CANNOT DISTRIBUTED IP ADDRESS TO CLIENT UNTILL A SCOPE IS CREATED.




FILL YOUR SCOPE REQUIRMENTS THAN OK. AFTER THIS SELECT THIS SCOPE MADE BY YOU THAN NEXT.




CONFIGURE DHCPV6 STATELESS MODE > DISABLED THE DHCPV6 > NEXT




CONFIRM INSTALLATION SECTION > IF YOU SATISFY PRESS INSTALL
PERFORM THIS UPPER STEP TO CREATE A DHCP SERVER SUCCESSFULLY.



CHECK YOU DHCP SERVER:-
GO TO START > ADMINISTRRATOR TOOLS > DHCP SERVER




AFTER THIS OPEN A DHCP DIALOUGE BOX > SELECT A COMPUTER NAME > SELECT IPV4 (IF SIGN IS GREEN THE DHCP IS WORKING) > CLICK ON IPV4 THAN SELECT SCOPE
 IN THIS ALL ABOVE STEPS TO CHECK YOUR IP RANAGE & YOUR DHCP SERVER.



UNINSTALL A DHCP SERVER:-
GO TO START > SEREVER MANAGER >SELECT ROLES > REMOVE ROLLES > next > REMOVE TICK ON DHCP SERVER > NEXT > REMOVE.




AFTER RESTART YOUR PS IF THIS MESSAGE DISPLAYED ON YOUR MECHINE YOUR UNINSTALLING SUCCESSFULLY.




DHCP CONFIGURED THROUGH ADMIN ISTRATOR TOOLS:-
NOTE:-
          NOTHING CONFIGURE WHILE INSTALLING A DHCP SERVER.

START > SERVER MANAGER
 



CLICK ON ROLLS > ADD ROLES



NEXT(ADD ROLES WIZARD)




SELECT DHCP SERVER (SELECT SERVER ROLES) > NEXT




DHCP SERVER (INTRODUCING) > NEXT




SELECT NETWORK CONNECTION BINDINGS > NEXT





SPECIFY IPV4 DNS SERVER SETTINGS >NEXT
                   IF U HAVE ANY DOMAIN LIKE YAHOO.COM. ENTER YOUR DOMAIN NAME AND FILL YOUR DOMAIN IPV4.




SPECIFY IPV4 WINS SERVER SETTINGS > NEXT




ONLY WE DISABLED THE DHCPV6




START > ADMINISTRATIVE TOOLS >DHCP SERVER




SELECT IPV4 AND R.C ON IPV4 > SELECT NEW SCOPE



STEPS OF CREATING A NEW SCOPE:-



FILL YOUR SCOPE NAME > NEXT



FILL YOUR IP RANGE > NEXT



Exclusion IP:-
                                Eclusion are a addresses or a range of addresses are not distributed by the server.




IF YOU EXCLUDE A RANGE





OR IF YOU WANT TO REMOVE A PARTICULER IP ADDRESSES:-





LEASE DURATION:-
                   THE LEASE DURATION HOW LONG A CLIENT CAN USE AN IP ADDRESS FROM THIS SCOPE.
DEFAULT LEASE             DURATION FOR     WIRED               8DAYS
DEFAULT LEASE             DURATION FOR     WIRELESS      8HOURS
MINIMUM LEASE          DURATION IS          0DAYS
MAXIMUM LEASE         DURATION IS  999DAYS-23 HOURS-59 MINUTES


CONFIGURED DHCP SCOPE (ADVANCE OPTOPN):-





ROUTER(IF YOU HAVE A FILL OTHERWISE LEAVE IT):-





DOMAIN NAME & DNS SERVER (IF YOU HAVE ANY DOMAIL LIKE A YAHOO.COM FILL ITS NAME IP ADDRESSES OR IF YOU HAVE A NOT DOIMAIN LEAVE IT)




WINS SERVER (LEVE IT NOT USE NOW)




ACTIVATE SCOPE:-
                   IF YOU ACTIVATE A SCOPE CLICK ACYIVATE NOW, OTHERWISE CLICK LATER.





FINISH





IF U WANT TO CHECK THE DHCP SERVER

CHECK YOU DHCP SERVER:-
GO TO START > ADMINISTRRATOR TOOLS > DHCP SERVER




AFTER THIS OPEN A DHCP DIALOUGE BOX > SELECT A COMPUTER NAME > SELECT IPV4 (IF SIGN IS GREEN THE DHCP IS WORKING) > CLICK ON IPV4 THAN SELECT SCOPE




CHECK YOUR EXCLUDE IP’S










6th TOPIC
DHCP RESERVATION


RESERVATION IP’S:-
                                To reserve any ip for specific system, we must have perform dhcp reservation.


REQUIRMENTS OF RESERVATION:-
                   We must have a MAC ADDRESS of the PC for when the ip reserved.





STEPS TO RESERVE THE IP:-
                   START > ADMINSTRATOR TOOLS > IPV4 >RESERVATION > R.C ON RESERCATION







     NOTES:-
1)   Maximum assigned automatically ip’s on clients through dhcp server is 16,777,214 (1.6 crores ).
2)   Default ip add of client is 0.0.0.0 for broadcasting.
3)   Dhcp server gives ip clients through its mac address.
4)   Dhcp server must have a static ip address.
5)   169.254.1.0 To 169.254.254.255 is used to dhcp server backup called APIPA.
6)   Lease duration of any ip given by dhcp server is default 8 days for wired & 8hours for wireless…. Minimum lease duration is 0 day….
Maximum duration is 999 days, 23 hours, 59 minutes.
7)   Dhcp is the one and only server at a time that will be install and configured same time.
8)   BOOT P used before dhcp to distribute the ip’s.
9)   BOOT P (boot protocol) in Windows NT (first server).
10)     Dhcp always give unique & temporarily ip for every client.




         





7th & 8th  TOPIC
DNS MASTER & DNS SLAVE





DOMAIN             NAME          SYSTEM


PORT NO DNS SERVER:- 
DNS PORT NO------ 53

DNS SERVER:-        
                        A DNS server is LAN enterprise network base + internet base NAME RESULATION SERVICE (DNS server is not converts it resolve the RFC). Used to resolve the ip address of any system in the network with its DOMAIN NAME SYSTEM (DNS) address. A DNS server is mostly used only in a lan network environment.

Zone’s  of  DNS server:-

                                Two types of DNS server zones.
1)    Forward look up zone
2)    Reverse look up zone



1)    FORWARD LOOK UP ZONES:-
A forward look up zone is used to resolve any request from  any client from any domain name, with the ip add of the domain server.
2)    REVERSE LOOK UP ZONE:-
A reverse look up zone is used to resolve any request of any client for any ip address with its domain name.

FORWARD LOOK UP ZONE

REVERSE LOOK UP ZONE


v  IP TO NAME

v NAME TO IP
v  A RECORDS
v PTR (POINTER) RECORDS





TYPES OF DNS SERVER:-
1)    PRIMARY DNS (MASTER DNS)
2)    SECONDRY DNS (SLAVE DNS)
3)    STUB

PRIMARY DNS (MASTER DNS)

SECONDRY DNS (SLAVE DNS)

STUB


A primary DNS is a master copy of all the domain name records in the DNS network. All the DNS records are first updated or entered only a DNS master service, means a master DNS is independents of its records.

A secondry or slave DNS is the make read/write back up copy of all the records of a primary DNS server.
It also can be used for load balancing for a large domain base network.

STUB is also known as chancing memory. A stub zone is used to maintain special web records, MX (mail exchange) records, SRB records, SOA (system of authentication) records.





INSTALLATION REQUIRED OF DNS SERVER:-
DNS SERVER

SERVER
 
IP 50.0.0.5
SUB- 255.0.0.0

DNS- 50.0.0.5
         CLIENT
IP- 50.0.0.8
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
         CLIENT
IP- 50.0.0.9
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
         CLIENT
IP- 50.0.0.7
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
         CLIENT
IP- 50.0.0.6
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
         CLIENT
IP- 50.0.0.10
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
         CLIENT
IP- 50.0.0.11
SUB- 255.0.0.0
DNS-50.0.0.5

SERVER
                                                                                                           


















            DNS address is must for every domain client in a DNS network as well as for the DNS is self also. DNS address or gateway address always same in the network . ( server or client)

 STEPS TO INSTALLATION:-
1)    IP CONFIGRATION.

IP

50.0.0.1

SUBNET MASK


255.0.0.0



DNS

 

50.0.0.6




2)    DNS MUST BE FILLED FOR MAKE A DNS SERVER.




START > SERVER MANAGER
 



CLICK ON ROLLS > ADD ROLES



NEXT(ADD ROLES WIZARD)



TICK ON DNS SERVER & NEXT




NEXT




INSTALL




PROGRESS




CLOSE (FINISH)





CONFIGURE THE DNS SERVER:-

START > ADMINISTRATOR TOOLS >DNS





FORWARD LOOK UP ZONE:-
select the forward look up zone  & R.C on forward look up zone:-




Welcome to the new zone wizard:-




Zone type:-




Zone name:-




Zone file location & if u have a zone name slect second option:-
NOTE:-
          If you existing old file... Your file name or your zone name must be same. If your zone name is google.com or your file name is yahoo.com your DNS is nor working because file name is difference.




Dynamic updates:-




Completing the new zone wizard(finish):-





Your forward look up zone entries:-



REVERSE LOOK UP ZONE:-
START > ADMINISTRATOR TOOLS >DNS





Select reverse look up zone & R.C on the reverse lookup zone:-



Welcome to the new zone wizard:-



Zone type:-




Select the ipv4:-





Select your network ID ( first the word of your IP’S)





Location of reverse look zone:-





Dynamic updates (tick on second option)




Complete your reverse lookup zone:-





Your reverse look up zone entries:-





ENTRIES IN FORWARD ZONE:-

Select the forward zone > R.C on the name of your forward look up zone

Select new host A or AAAA
NOTE:-      
          A presents the 32 bits of the ipv4.
          AAAA presents the 128 bits of the ipv6

Fill the name of the new host (any) ,,, fill you ip ,,, after tick on the PTR RECORDS.

When you tick on the create associated pointer (PTR) records… when automatically entries on the reverse zone. When you don’t tick on the this option that mean time you will create entries in reverse zone.
Example:-

When you Don’t tick this you can create reverse zone entries automatically.




After this you can select reverse zone >new pointer (PTR)





Same entries of forward zone:-


After this all the steps your DNS SERVER is complete.




TO CHECK YOUR DNS SERVER:-

Go to CMD > type nslookup




When it shows your domain name with your ip itmeans your DNS SERVER is successful made.

NOTES:-

1)   RFC stands for request for comments.
2)   DNS SERVER RFC no is 1912.
3)   Server’s particular service called RFC.
4)   World’s most used DNS SERVER server is BIND (BEAKELY INTERNET NAME DOMAIN).
5)   Always backend works on numbers (ip).
6)   DNS SERVER is known as in microsoft.
7)   Other os called DNS SERVER  as a BIND.
8)   DNS SERVER hendels all world’s internet.
9)   DOMAIN NAME registered on ROOT DOMAIN on use world wide.
10)  DNS SERVER not costly on internet its annual rent is only 1500/-.
11)  All over world use 13 DNS SERVER.
12) DNS SERVER name is A to M.
13) INDIA’S DNS SERVER in BANGLORE.
14) DNS SERVER is a open protocol.
15) If you can see any website ip address go to cmd > type                                           ping www.facebook.com
16) In forward look up zone A=32 bits (ipv4) , AAAA= 128 (ipv6).
17) FQDN stands for FULLY QUALIFIED DOMAIN NAME.
18) FQDN= host name (pc name) + domain name (DNs name)
                          NETBIOS
19) . always presents a root domain.

         Dot
20)    To chesk the DNS SERVER go to cmd > type nslookup.


9th & 10th  TOPIC
IIS SERVER WITH HTTP & IIS SERVER WITH HTTPS
OR
WEB SERVER


INTERNET INFORMATION SERVICE      HYPER TEXT TRANSFER PROTOCOL SECURE

WEB SERVER WITH HTTP

PORT NO IIS SERVER:-    
IIS SERVER WITH HTTPS---------------    443
IIS SERVER WITH HTTP ----------------      80
FTP SERVER( CLIENT REQUST )---------- 21
FTP SERVER( SERVER RESPONSE)---      21

IIS version 7.0 in w2k8. In this only inbuilt web server,http,https not ftp service.
IIS version 6.0 in w2k3. In this inbuilt both service like web server, ftp,http.
WEB SERVER:-
                        IIS (web server) is used to launch the web sites based on the web languages like HTM, HTML , DHTML , MHTML , XML (XTENDED MARK UP) , ASP.NET , PHP , ASP ( ACTIVE SERVE PAGES) , VB SCRIPT. Over the local network or internet using the http or https protocol. Using the web server we can transport any data base on the web page site anywhere in the world over the internet.

HOW A WEB SERVER WORK:-

 

        CLIENT


HTTP REQUST
 

HTTPS RSPONSE
      50.0.0.1

                          

REQUIRMENTS:-
                        IP CONFIGRATION +WEB PAGE +DNS (OPTIONAL)

HOW TO CREATE A WEB PAGE:-
jetking.com web server welcomes you>
hello hows you all……
File make in .txt > save as > desktop >name without space.html >

STEPS TO INSTALL THE WEB SERVER:-

Start > server manager > roles >add roles




Add roles




Tick on web server




After tick on web service > add roles wizard open > click on add feature




next




next




Tick on all management center




next




install




Installing start




After this all above steps automatically creates in windows drive

Wwwroot folder > every thing inside in which items delete.

Which page you made a save this drive

CONFIGURE THE WEB SERVER:-
START > ADMIN TOOLS > IIAS MANGER

open IIS Web Server:-

Open Sites and Delete Default sites after this R.C on sites and web sites:-


Sites name any
Path of your we sites C:/ inetpub>wwwroot>
Host name if u have a DNS server


Refersh your sites name

Double click on name and default documents

Go to add Tab and fill your site name (SAME)

After this go to Directory Browsing


After this double click on your site name > refresh
TO CHECK YOUR WEB SITES:-
Open your web browser & fill your ip address


1)    SSL(SCURE SOCKET LAYER) or KARBROS ONLY SUPPORT HTTPS MOST POWERFUL SECUITIES.
2)    IIS VERSION 7.0 IN W2K8. (ONLY INBUILT WEB SERVER NOT FTP SERVER BUT IN THIS VERSION HAVE A HTTPS SECURITY).
3)    IIS VERSION 6.0 IN W2K3. (WEB SERVER OR HTTP OR FILE SERVER IN BUILT)
4)    IIS IS ALSO KNOWN AS WEB SERVER.
5)    INETPUB IS THE DEFAULT DIRECTORY OF IIS.
6)    FTP PUB IS THE DEFAULT DIRECTORY OF FTP.
7)    HOST NAME WHEN FILL WHEN YOU HAVE A DNS.
8)     

11th  TOPIC
FTP (FILE TRANSFER PROTOCOL)


PORT NO IIS SERVER:-    
FTP SERVER( CLIENT REQUST )---------- 20
FTP SERVER( SERVER RESPONSE)---      21

FTP:-
          FTP stands for file transfer protocol. This is mostly used direct downloading and from any network or internetwork location by browsing (FTP browsing). FTP browsing is the process of accessing the data, ftp server directly with the help of internet explorer.
ADVANTAGES OF FTP SERVER:-
1)    Direct access to online storage.
2)    DTR faster than HTTP.
3)    Higher rate of downloading and uploading.
4)    User authentication mean we can assign the user access rights for downloading and uploading over the FTP server and the user must have to prov ide its credentials for the transection over the FTP server.
TYPES OF USER AUTHENTICATIONS:-
1)    ANONYMOUS
2)    BASIC

ANONYMOUS:-
          Anonymous access is the default user name and password use to access the FTP sites.

Username

FTP

Password

FTP



BASIC USER AUTHENTICATIONS:-
          A basic user authentication is customized user authentications use to access to FTP server and also by using the basic user authentication. We can implement FTP access securities sepreatly for each user.


REQUIRMENTS TO INSTALL A FTP SERVER:-
1)    IP CONFIGRATION
2)    FIREWALL OFF
3)    NETWORK DISCOVER OFF

STEPS TO INSTALL THE WEB SERVER WITHOUT REMOVING A WEB SERVER:-

Start > server manager > roles > r.c on web server (IIS) and add roles services


Select FTP service > add feature




NOTE:-
          DELETE DEFAULT FTP SERVER.
Start > Adminstrator tools > iis 6.0



(delete default ftp site) ftp Sites > R.C on Ftp Sites > New Ftp Sites

Any name in this box

Give the path directory
Which you want to share the data on this ftp sites
Choose the data and copy paste on this folder

If you want give the permission to all downloading(read) and uploading(write) tick on both
Finish

After this

Start the ftp service


TO CHECK YOUR FTP SERVER:-
Got your browser > fill your ftp ip address (example:- ftp://50.0.0.1)

NOTES:-
1)    NFS protocols used for sharing.
2)    Read For downloading and write for downloading.
3)    Any installlaion use TFTP server.
4)    SFTP used for solaris , unix and linux.
5)    When we download and upload any object file no space name.




12th  TOPIC
FTP (FILE TRANSFER PROTOCOL)
UPLOADING & DOWNLOADING



                 PUT                                                                        GET


UPLOADING:-
Before using uploading open your ftp sites
Goto run > cmd
ftp 50.0.0.1         (space with ftp server ip address)
user name-ftp
password-ftp
get cd.txt


FURTHER SETTINGS OF FTP SERVER:-

START > ADMIN TOOLS > IIS 6.0

FTP SITE > PROERTIES


NOTES:-
1)    Isolate means securities or policies.
2)    When we upload the defalt time is 120sec.






13th  TOPIC
FILE SERVER

FILE SERVER:-
          A file server is a centralized storage server use to store and maintained the database on a centralized location in a network using the file server. We can share, storage, manage the securities on the user, security on the file access policies on the shared objects just from a single console.

Parts of File Server:-

1)    Sharing
2)    Password protecting sharing
3)    Uses of share and storage management console
4)    Folder quota
5)     File screening
6)    DFS (Distributed File System)

1)     Sharing:-
Sharing is the process of enabling a data resource to be accessible from any network location.

2)    Password protecting sharing:-
It is the process of sharing some resource with access limitations to limit the access the default password for the use, ho enable the sharing is used. The advantage of the password protecting sharing is that we can provide the share resource only to the user we want.

3)    Uses of share and storage management console:-
The share and storage management console (SSMC) used to provide a centralized console to handle and manage all the shared object using the share and storage management console. We can also configured the disk management service and also we can check the running session with our file server the user who access the file server.
Advantages:-
1)    Security
2)    Permission changes
3)    Sharing
4)    Share but no show
5)    Show can who can access the file
6)     How many files open

4)    FOLDER QUOTA:-
As we know, the disk quota is used to limit the space limitation, on a folder we have to choose the use the folder quota because on the network location only the folders are allocated for the network users access and we have to implement the limitation on the folder.
5)    FILE SCREENING:-
The file screening is the process of enabling the file extension based security on network share. means we can only copy or store the file on network folders which are allowed in the file screening list.
6)    DFS (distributed file system):-
A DFS (distribute file system) is used to provide a centralized share access for the share objects on the different locations in the network. It is used to provide access to all the shared objects just from a single IP address and removes the burden from the users to resemble multiple IP address.

                         FILE SERVER NETWORK






CLINT NETWORK







To do step wise step:-
i)                   Storage management
ii)                Shearing on storage space
iii)              Folder quota on share folder
iv)              File screening on quota folder
v)                DFS for all network shares

Steps to install the file server:-

Start > server manager >roles > tick on file server


Tick all the services without windows search services
 


Tick on all the drives


Pre configuration requirements of file server:-

              We must have unallocated space in the hard disk space in the hard disk drives, if we don’t have any extra drive except.


NOTE:-
              WHICH LOCATION YOU WANT TO SHARE THE FORDER YOU MUST CRATE A FOLDER ON THAT LOCATION. BUT YOU DON’T SHARE THAT FOLDER MANUALLY.


1)    Configure the share & storage management:-

Start > admin tools > share & management console


PROVISION STORAGE:-




In this only that drive show which have a unpartition.



Size of volume




PROVISION SHARE:-



Browse the folder which you want to share.(but don’t share manually)


NTFS PERMISSION:-

You must customized the ntfs settings acc. to our requirements.

SHARE PROTOCOL:-
                             Tick on both protocols.

SMB SETTINGS:-
          Goto > advance


LIMIT USERS:-
                   In this option you will customized the user acc. to your req.

CACHING:-
          Click on second option.



SMB PERMISSION:-
                   In this you customized the smb settings like read only, read-write etc.

NFS PERMISSION:-
                   Click on ANSI and edit.
 

Next
Next
Next
Create
Close


FOLDER QUOTA:-

Start > admin tools > file share resource manager


Quota > create quota

Quota on which location or folder where you create a smb of ntfs permission or share the folder.

 

In this must customized the folder quota limit > define quota permission



Hard Quota:-
          In this type of quota a user is not allowed to use the space exceeded thanallocated to him.
DO NO CROSS THE LIMIT

Soft Quota:-
          In this type of quota, auser can exceed the space than assign to him but a limited size, means it can cross limit by in limit.

Add:-
          Warning on 85%


Save the quota or not



File screening:--
          File screening are two types:
1)    Active screening:-
A user cannot copy the file types in listed in screening on the file server.
2)    Passive screening:-
User can copy file type but the file server will monitor those files for inappropriate data type.

Start > admin tools > file share resource manager


File screening management > create file screening

Browse the folder which you create a file screening.

Define custom file screening



To include the files with *.mp3 or *.


Select the file screening create by you…..
 



DFS MANAGEMENT:-
         
·       Network discovery must be enabled.

Start > admin tools > dfs server.

·       Left pane select namespace & delete by default
·       Left pane > r.c. > select new name space


Give the ip of file server ip address.


Name(any)




How to admin tools > dfs management:-

Rc namespace (made by you) > new folder



Show shared folder of second pc.

Select the ip than ok

Goto > cmd >type fileserver ip \\10.0.0.1
In this location no of pc connected with file server and the data of all pc on just single location called file server.

NOTES:-
·       file screening or folder quota is the part of the file server resource manger (FSRM).
·       file screening is the base of the extension based.
·       In file screening extension are used in *.
·       Dfs is a single location where every pc share data avail in single location.
·       To create a file server ip & n/w discover must be on
·       IPC is default share serv ice.
·       Index is the process of manage the data.
·       Search or index are not running at a time.
·       In single namespace we share appox. 50,000 folder.
·       Namespace is the group of share policies in dfs.
·       Dfs is the group of shared folder.
·       Provision storage option working when you have a unallocated space.
·       Your hard disk default name is disk0.
·       Default allocation size is 4096.
·       Allocation unit means cluster size.
·       Only 512 allocation size is the best when we select that option we don’t need to defrag the hdd.
·       By default read option on every shared folder.
·       File server used two protocol smb 139 & nfs 2049.
·       Smb is higher than nfs.
·       Root access = admin access.
·       Templetes are default mode.
·       Folder quota are two types 1) hard 2 soft quota.
·       File screening are two types 1) active 2 passive.
·       Name space required IP address.








14th TOPIC
TERMINAL SERVICES (T.S.)

It includes
1)    Remote assistance management
2)    Terminal server gateway
3)    Creating rdp file
4)    Remote desktops
5)    Multiple user logon
6)    Messaging between the networks


Processing:-
          The phenomena of providing the raw input data to any process and getting the output in an understandable format is known as processing
Types of processing:-
1)    Centralized processing
2)    Distributed processing

1)    Centralized processing:-
In this type of processing the whole process is performed by the network clients and after processing the data is submitted to a centralized server.
NOTE:-
          Also in this case the processing power is provided by the centralized server as well as raw data.
2)    Distributed processing:-
In this type of processing everything is performed on the distributed network clients. They can also generate their raw data itself and use their processors to process the raw data. Generate the result and after all that they submitted the result on centralized server.

Terminal server:-
                   It is used to provide centralized application access for all the network clients just by the installing application on a single server.
Advantages:-
·       A single application licence can be used for the multiple network clients.
·       Financial saving for company.

Terminal server gateway:-
          When we use a TS beyond the network or over the internetwork using the gateway services is known as TS gateway.

Multiple user logon:-
          This is a service offered by the terminal server to logon and work for the multiple users any system at a time.

Creating a RDP file:-
          It is a service used to access any remote desktop service end from a RDP icon.

Remote desktops:-
          This service offered the remote desktops access for thr remote multiple systems at a time.

Messaging between the network clients:-
          It is used to send text message to the network clients from a terminal services.

Before configuration of TS we must:-
·       Install TS server.
·       Install application.
·       Configuration of TS at last.

Requirments:-
·       Ip configuration.
·       Firewall disabled.
·       n/w discovery must be enabled.
·       local user must be create on the server.

Start > server manager > roles > add roles


Tick on terminal services and terminal web access


In this option you add a your users on this

2nd step:-
          Install application which is necessary for you and your clients ….

After this configuration the TS:-
Start > admin tools > terminal services > TS remote app manager

Action > add remote program

Tick on services which you want


http:// TSIP /ts

Type ts user name & password
 

If your active x control is not enabled > r.c on the yellow block > run active x control

All the ts services are shown

Select any services

Type TS user name & password


To create a RDP file:-
Start > admin tools > terminal services > TS remote app manager
Scroll down

r.c on the  application which you want to create a RDP

Which loc ation you want to save the file

Goto run > type \\TS IP


Remotedesktops:-

          Remote desktop is the service use to access the remote desktop of multiple n/w clients from a single TS server at a time.
To do remote desktops:-

Start :admintools > ts > remote desktops

Remote desktop > r.c > add new connection
Give the remote ip

How to configure multimode remote desktops using T.S:-
Start > adminitools > t.s configuration

Remove tick on restrict single session

In this way you can use 2 remote desktops.

Terminal service manager:-
Start > admin tools  > TS >  TS manager

My group > add computer      

Send message

NOTE:-
·       RDP remote desktop protocol or publishier
·       Application first must install on ts server
·       NLA network level authentication
·       7.0 version for IIS web server
·       RDP helps us to make a shortcut in this way we don’t go to bowser
·       TS is a tottaly remote desktop.
·       ADDS if install your pc please remove this before using TS
·       TS always works with IIS when TS install, IIS install automatic.

15th TOPIC
IP SECURITY

           You can allow or deny any user on the basis of ip addresses higher level security then the firewall, firewall port based , user lavel permission.


Security level implemation:-
1)    Ip security
2)    Firewall rule
3)    Firewall inbound/outbond port rule
4)    Group permission
5)    User permission
6)    Ntfs permission ( allo/deney)


IP sec has three level:-
1)    Block
2)    Permit
3)    Negotiate policies (permit with condition)

PATH:-

Start > admin tools > local securities & policies
Or
Goto run > secpol.msc


                  
                   My pc                                                                         other pc                                                                 math policies ok
                                                Not math policies cancel                                                                                                                                                                                                                                                                                                                                                                                  

Ip sec policies on local computer > create ip sec policies


Name (any)

Remove tick on edit properties

Double click on Ip sec policies on local computer

Double click on ip policies        

add            


select which port you want to block & if your port name or not given this list select other and fill the next balnk port no
 

ok

click on the hole and next
 

Click on hole & next  

Use the sting option & give password
 

After this assign the policies  

In this all settings same to same second pc if this setting will same ip sec will working, if any step will be mismatch the policy will not working.
Ping is working because both the systemm create a same policies.
If ip policies mismatch
NOTE:-
·       Ip sec high priority.
·       Ntfs check two permission 1) group 2) user
·       Deny’s priority higher than allow
·       PRESHARED KEY is populated amongs the network.






Domain







1st TOPIC
DOMAIN
     
Domain is a network environment which is used to setup the enterprised base large network. Domain is the architecture in which centerlized computer generally or normally known as a domain controller is used to handle all the network services and the resources from a centerlized location.

NOTE:-
          Domain network is the base of internet architecture.


ADC
RODC
CDC
PDC
GD
 












PDC =  PARENT DOMAIN CONTROLLER
ADC=   ADDITIONAL DOMAIN CONTROLLER
RODC= READONLY DOMAIN CONTROLLER
CDC=   CHILD DOMAIN CONTROLLER



CENTERLIZED SERVICES:-

1)           PDC
2)           ADC
3)           RODC
4)           CDC
5)            TREE
6)             FOREST
7)             SITE
8)             REPLICATION
9)             GROUPMANAGMENT
10)                      USERMANAGMENT
11)                      OU (ORGANIZATIONAL UNIT)

·       PDC:-
PDC stands for parent domain controller. PDC is known as master domain controller or simple DC (domain controller). It is used to origin or start a domain network without PDC. We can never imagine a domain network. Pdc is the control point to handle all the network resources in the domain network.

·       ADC:-
ADC stands for additional domain controller. Adc is used as the read/write backup copy of PD. In c ase PDC is failed to start to provide the services means a ADC is simply read/write copy of pdc.

·       RODC:-
RODC stands for read only domain controller. This is the new type of dc in windows server 2008 and normally used as the read only copy of PDC and it is used on the location where
We need a very high security, without any network administrator or without any management.

·       CDC:-
CDC stands for child domain controller. This is used as the branch server for the pdc and commonly used to divide the load different domain services by setup of multiple cdc like cricket.yahoo.com , mail.yahoo.com etc.

·       Tree:-
Tree is the architure which consist of all the components of domain and domain client.

·       Forest:-
Forest is collection of multiple domain trees in this which these trees can interconnect with each other and forms and internet.

·       Site:-
Site is the area or collection of the domain controller which can replication with each other.
·       Replication:-
Replication is a process of exchange the information b/w two domains controller.

·       Group Management:-
          It is used to organize particular type of users in diff-diff content.

·       User Management:-
It is used to crate and manage just the user.

·       OU:-
It is stands for organizational unit. It is also known as special groups or non-removable groups and ou normally used when we need to implements securities and policies on domain controller user.
Note:-
1)    Domain is tottaly based on internet.
2)    Domain is a centerlized service.
3)    Replication is a process of exchange the information b/w two domains controller.
4)     In Microsoft server 2003 adds and dns in seprated and we have to install this both services on pc.





PDC

Requirement:-
1)    If you make a pdc your c drive is minimum 40gb.
2)    Pdc is main server in the network
3)    Pdc consists od ADS & DNS.
4)    Ip configuration
5)    Dns add must be filled
6)    Firewall off
7)    Discover on

Steps of installing the PDC:-

ADDS:-

Start > server manager >

roles > add roles

Tick on active directory domain service

Next

Install



After this

Start > run OR win key + r
And type dcpromo (domain controller promotional)



Tick on advance installation

Next

Create a new forest and next

Fill the FQDN domain name ( .com,.org,.net etc) and next



Next

Select server 2008 and next




next

Click on YES


this is our file path where all the log file save, if you want to change your path you can chage your path acc. To your requirements. In future you will restore your data on this path.

next

Fill your password and next

Next


Tick on reboot complitation


How to check your pc in domain
Select  my computer icon > r.c > properties

Than show your domain name


Join another pc into domain

Note:-
Before adding in domain enter domain ip in your dns.



Before adding a domain your pc add in workgroup


Select  my computer icon > r.c > properties


Go to change setting


Change

Click on domain

Fill domain name

Type domain name and  fill domain password










How to create user in PDC or ADDS:-

Start > admin tools > active directory user  and computer






Select domain > users > r.c > new > users














When you create a user with same permission than you copy the user and make it.






How to remove ADDS or PDC:-

Cmd : dcpromo

Or

Cmd : dcpromo /force removal




Or






































 Fill the password of when you create a domain







Note:-
1)    In M2K8 adds and dns will available.
2)    FQDN=  fully qualified domain name.
3)    Net bios name always automatic convert in capital latters.
4)    Net bios = network basic input output system.
5)    Database means which location where we save all user and clients data and information.
6)     Sysvol = system volume.



ADC



                             Additional           domain      controller

ADC = read/write copy of PDC without FSMO power.

Description:-
                   ADC is used as a read/write copy of PDC, which enable us to setup a domain network on different- different location with the same network functionality. ADC contents the same database as of the PDC but without the FSMO power because it’s a read write copy of PDC, we can edit and modify the database in ADC also. After modification it will be automatically replicate the data to PDC.

Advantages of pdc:-
                                     
1)    Read/write backup.
2)    Network load balancing.

Requirmrnts to setup the ADC:-

1)    PDC must be configured.
2)    ADC must be in the network of PDC.
3)    DNS address is must be same for the all clients as well as domain.

Configuration of ADC:-

1)    IP configuration
2)    DNS  IP for PDC
3)    n/w discovery must be on.

Start > run > dcpromo














Click on existing forest > add a domain

















In you have a more than one domain than select on the following dialogue box.





























OU:-
          OU stands for organizational unit. Ou is the container for te user like a group to implement the special type of policies.
          OU=special Group
How to crate a OU:-
Start > admin tools > active directory users & computers












Make a user:-
We make a user for two ways
1)    domain
2)    OU
Select domain > users > r.c > new > users














When you create a user with same permission than you copy the user and make it.



Make a Group:-
Start > admin tools > active directory user & group



Domain > name > r.c > group








Note:-
1)    PDC have five power called FSMO power who will make a PDC.
2)    FSMO power is a copy right.
3)    FSMO power not copy but we can move.
4)    FSMO = flexible single master operations.
5)    Domain name automatically host name or pc name.
6)    TLD = top level domain ,example .com , .net , .org etc.
7)    Netbios is the name of host name.
8)    FFL = forest function level.
9)    DFL = domain function level.
10)                      If have any error or problem user run as administrator.
11)                      When your system in DC then you don’t create a user.
12)                      If your domain is not working, in case DNS is problem.





BACKUP & RESTORE


                   GUI                         CLI

Windows server 2008 bakcup:-
Backup is the copy of the data in case if it is deleted or lost. Windows server 2008 have the only facility to keep a copy backup (normal backup).
Windows server 2003 backup:-
                   In windows server 2003 we create a backup for five types.
1)    Copy backup -- copy paste in another media.
2)    Daily backup – sechdule while whole data copy on the server.
3)    Normal backup – copy backup but only when we need.
4)    Incremental backup – back up only increase files.
5)    Deffriental backup – backup the every modification on the data.

Requirement for the backup in 2008:-
          Windows backup features must be installed and we have a sufficient free space on our hard disk to store the backup.




Start > server manager



Features > add features > windows server backup features















To configured the backup:-
Start  > admin tools > windows server backup







Schedule backup:-
          If you want to sechdule backup your system must have two or more hard disk drive.




Backup once use:-
                   Create a onetime of your backup data that you can use to supplement tour automatic backup data.



Full back up means all pc back up.
Custom backup means what you want ?






Local drive means your hard disk.
Remote shared folder means another hdd use for backup by network.






















                                                          OR
Through network
Backup once use:-
                   Create a onetime of your backup data that you can use to supplement tour automatic backup data.



Full back up means all pc back up.
Custom backup means what you want ?






Local drive means your hard disk.
Remote shared folder means another hdd use for backup by network.





\\remotepc ip\shared drive





Give a administrator user name & password










RESTORE:-
i)                   Restart your pc
ii)                Boot from DVD
iii)              Select repair your system option
iv)              Complete pc restore
v)                Select the restore backup file
vi)              Restore it.





CLI backup:-
Note



Cmd > r.c > run as administrator





WBADMIN START SYSTEMSTATEBACKUP –BACKUPTARGET:d:
                                                                      
Driveletter if u want




Enter y




This is a file name means time&date.














Get all the backup details
Start > cmd > wbadmin get versions





To restore CLI:-
i)                   Restart your system
ii)                Press F8
iii)              Select directory services restore mode























This is the file name where we use to recover the data.













Note:-
1)    CLI backup not in windows server 2003.
2)    In company server 2008 not use in backup.
3)    2008 for normal backup.
4)    Windows server 2003 backup use now a days in company.
5)    Differential back use in company
6)    Back up service is the  basic need of corporate.
7)    NAS (network attached storage) to share the data via network in another storage.
8)    Only drives backup but c drive backup automatically.
9)    Which drive has a boot file on this drive backup automatically.
10) Speed of backup is appox. 5mbps.
11) CLI backup file name consist of combine the date and time.



                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        




RODC


                        READ          ONLY          DOMAIN             CONTROLLER

                 PDC
                     RODC
No credentials
No  credentials
Modification
No modification

Offer full service

Temporary service admin

Wan link connected (both)

Read only copy

Proper service give by clients

Descriptions:-
                   RODC is read only domain controller use to implement  a domain network on any other site with the different user with security, using the RODC we can implement the same domain network on any another side with the need of extra network administrator.






Advantages of RODC
Disadvantages of RODC
While using the RODC any server admin at the RODC site.
RODC can never store user credentials of the RODC site on RODC server.
The clients on RODC site can work properly even in the absence of PDC n/w but we have to configured the password caching.
Both the PDC & RODC are connected with the each other using the wan link and use to wan link to replicate the data b/w them. So whenever the wan link goes down both are enabled to communicate.


Setup a RODC:-
1)    A PDC must have configured.
2)    The user for PDC & rodc N/w must be created on the pdc.
3)    We must have to choose a responsible user for a rodc site in the RODC n/w.
4)    DNS of PDC.
5)    We implement or setup only RODC server for any domain .
6)    ADDS install (server manager)



Start > run > dcpromo














Click on existing forest > add a domain







Type the user who will make on the PDC.
 










Tick on RODC















































PASSWORD CACHING IN RODC

1)    PDC
2)    RODC
3)    ADD TRUSTED USER WITH LIMITED SERVICES
How to create password caching:-
          There should be connection b\w while doing caching.
In RODC server Login through PDC user(administrator).






Select read only server > r.c > properties





Select password replication poliocies





Add





Select allow password for the account to replicate the rodc.

Ok.





Select user by advance option then must click apply to save changes.













Then go to advance





































Apply & ok




And after this






Select read only server > r.c > properties





Select password replication poliocies















Select rodc computer
















Please make sure data is replicate to rodc . must use command

Rub > cmd > repadmin





CDC

                  
                                      Child           domain      controller

PDC-------    www.yahoo.com

CDC can work even if PDC main www.yahoo.com is not working than CDC can also create its own CDC , RODC and ADC.
http://mail.yahoo.com.%username%=UID(12a920048n)

protocol               cdc         domain       Top           root        user name                 unique identity
   name        level      domain
                                                               domain
                                                                        (TLD)





Requirments:-

1)    PDC
2)    IP config
3)    Firewall off
4)    N/w discovery on
5)    before installation of CDC dns add must be of PDC.
6)    After installation of cdc add must be cdc.

Cmd > dcpromo









When you click this potion CDC is independent.










   PDC name
                                                                   CDC name if want to create































How to check domain:-







Note:-
1)    G.C means global catalog.
2)    CDC is also its own PDC.
3)    CDC has OWN database.
4)    Unique id means alphabaticls+numeric.
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            




FSMO POWER



                   Flexible      Single         Master       operations

PDC have a FSMO power.
ADC , CDC , RODC have no FSMO power.

Description:-
          FSMO roles are primary power of the parent domain controller. And also these power are copy protected. we can only transfer these FSMO power PDC to ADC. After transfer this roles ADC act as a PDC and PDC act as a ADC.
          These all are copy protected and can also transfer. FSMO reles enables a DC to act as a PDC.
  
FSMO has five power:-

1)    Schema master
2)    Naming master            forest level roles
3)    RID master
4)    PDC emulator
5)    Infrastructure master            domain level roles


1)    Schema master:-
This role are used to handle or manage the logical scheme of the network including the forest functions as well as sight linking policies with the other domain, and only communicate to the logical expect related with domain.
2)    Naming master:-
Naming master is used to manage unique conventions (unique name for everyone) for insight or out sight the domain.
3)    RID master:-
RID stands for relative identification. RID is used to assign unique numeric id every logical or physical object added in the domain. The UID assigned by RID master to every object is unique.
4)    PDC Emulator:-
It stands for Parent Domain Controller Emulator. This role is used by domain controller for its own management. It responsible of domain internal management.
5)    Infrastructure master:-
This role is used to manage all the physical expects related with the domain like topologies.





Disaster recovery:-
                   Disaster recovery is process of PDC disaster recovery is performed in a domain network whenever a PDC going to crash at that time to continue to operations of the PDC we use FSMO roles transfer process from PDC to ADC.

1)    We have FSMO power or roles.
2)    FSMO roles are copy protected.
3)    We can’t copy but we can transfer from PDC to ADC.
4)    Any FSMO roles can just contain by single system at a time.





How to check your system is a PDC or ADC:-

Start > admin tools > active directory user & computer




          Click on your PDC domain name > r.c > operation master




This windows shows FSMO power




Roles of transfer are two types:-
1)    GUI transfer
2)    CLI transfer

GUI is not transfer the forest level domain.
CLI is not transfer the both roles.

CLI roles transfer:-
                   When we CLI transfer we go to ADC server.
Cmd > NTDSUTIL


Roles
Connections
Connect to server life.com
quit




To stop the services:-
          To transfer the roles we must have to seize (stop) the role services.

1)    Seize schema master
Yes
Transfer schema master











































quit











GROUP POLICY
DISCRIPTION:-
                Group policies are securities restrictions implement in the domain user ny domain controller with the help of group policies. a domain controller admin can manage and control the access rights of domain user from a client location means it allows us to configure the securities policies from the centralized locations. Using a group policy we can implement login access implement data access restriction, account access restriction and application restriction on client end.

Types of group policies:-

1)    Computer policies
2)    User policies

1)    Computer policies:-
Related with the computer physically& does not move as user make to any other end means fix with hardware.
2)    User policies:-
Related with the user access logically end moves as user moves from one client location to another locations.

Requirments:-

·       Pdc
·       User must be configured
·       Computer must be added to domain as domain client on pdc

First you crate a user on pdc.


Make a user:-
We make a user for two ways
1)    domain
2)    OU
Select domain > users > r.c > new > users














When you create a user with same permission than you copy the user and make it.





Start > admin tools > group policies





Domain name select > domain > expand > facebook.com (select your domain) > r.c > create a group policies in this domain

















Not complete





PROFILIES


NOT COMPLETE







WDS




WINDOWS          DEPLOYEMENY             SERVICES

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.