Tải bản đầy đủ (.pdf) (700 trang)

microsoft windows xp networking and security inside out

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (19.35 MB, 700 trang )

www.it-ebooks.info
www.it-ebooks.info
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2003 by Curt Simmons
Portions copyright © 2003 by James Causey
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or
by any means without the written permission of the publisher.
Library of Congress Cataloging-in-Publication Data
Simmons, Curt, 1968-
Microsoft Windows XP Networking Inside Out / Curt Simmons.
p. cm.
Includes index.
ISBN 07356-1652-3
1. Microsoft Windows (Computer file) 2. Operating systems (Computers) 3. Computer
networks. I. Title.
QA76.76.O63 S558553 2002
005.4'4769-dc21 2002075345
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9 QWT 7 6 5 4 3 2
Distributed in Canada by H.B. Fenn and Company Ltd.
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send
comments to
Active Directory, ActiveX, FrontPage, Microsoft, the Microsoft Internet Explorer logo, Microsoft
Press, MS-DOS, MSN, NetMeeting, the Office logo, Outlook, the Passport logo, PowerPoint,


Visual Studio, WebTV, Win32, Windows, Windows Media, Windows NT, and Xbox are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other
countries. Other product and company names mentioned herein may be the trademarks of their
respective owners.
The example companies, organizations, products, domain names, e-mail addresses, logos, people,
places, and events depicted herein are fictitious. No association with any real company, organiza-
tion, product, domain name, e-mail address, logo, person, place, or event is intended or should be
inferred.
Acquisitions Editor: Alex Blanton
Project Editor: Aileen Wrothwell
Technical Editor: Curtis Philips
Series Editor: Sandra Haynes
Body Part No. X08-82180
www.it-ebooks.info
iii
Contents at a Glance
Part 1
Windows XP . . . . . . . .1
Networking
Chapter 1
Introduction to . . . . . . . . . . . . . . . . . . . . 3
Windows XP Networking
Chapter 2
Configuring TCP/IP . . . . . . . . . . . . . . . .15
and Other Protocols
Chapter 3
Creating Network Connections . . . . . . .47
Part 2
Internet . . . . . . . . . . 79
Networking

Chapter 4
Configuring Internet Connections . . . . .81
Chapter 5
Using Internet . . . . . . . . . . . . . . . . . . .117
Connection Firewall
Chapter 6
Using Internet Explorer . . . . . . . . . . . .137
Advanced Features
Chapter 7
Using Outlook Express . . . . . . . . . . . .181
Advanced Features
Chapter 8
Using Windows Messenger . . . . . . . .219
Chapter 9
Using Internet . . . . . . . . . . . . . . . . . . .249
Information Services
Part 3
Network . . . . . . . . 281
Connectivity
Chapter 10
Managing Workgroup Connections . . . 283
Chapter 11
Understanding . . . . . . . . . . . . . . . . . . . 311
Domain Connectivity
Chapter 12
Solving Connectivity Problems . . . . . .345
Part 4
Network . . . . . . . . 371
Resources
Chapter 13

Selecting a File System . . . . . . . . . . .373
Chapter 14
Understanding Resource . . . . . . . . . . .397
Sharing and NTFS Security
Chapter 15
Making Files Available Offline . . . . .449
Part 5
Advanced . . . . . . . 471
Networking
Chapter 16
Remote Desktop and . . . . . . . . . . . . . .473
Remote Assistance
Chapter 17
Remote Access and . . . . . . . . . . . . . . .503
Virtual Private Networking
Contents at a Glance
www.it-ebooks.info
iv
Contents at a Glance
Chapter 18
Interconnectivity . . . . . . . . . . . . . . . . .519
with Other Systems
Chapter 19
Wireless Networking . . . . . . . . . . . . . .531
Chapter 20
Maintaining Network Security . . . . . .557
Chapter 21
Monitoring Windows XP . . . . . . . . . . . 597
Network Performance
Part 6

Appendix . . . . . . . 611
Appendix A
Windows XP Service Pack 1 . . . . . . . .613
Glossary . . . . . . . . . . . . . . . . . . . . . . .617
Index to Troubleshooting Topics . . . . . 629
Index . . . . . . . . . . . . . . . . . . . . . . . . . .631
www.it-ebooks.info
v
Table of Contents
Table of Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
We’d Like to Hear from You! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Conventions and Features Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . xxi
Part 1
Windows XP Networking 1
Chapter 1
Introduction to Windows XP Networking 3
Windows Networking Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
What Is a Network? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Why Is a Network Necessary? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
What Is Needed for a Network? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Understanding Home Networks and Workgroups . . . . . . . . . . . . . . . . 6
Understanding Domain Environments . . . . . . . . . . . . . . . . . . . . . . . . 7
Windows XP Networking Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
TCP/IP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
NTFS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Remote Control and Remote Troubleshooting . . . . . . . . . . . . . . . . . 11
Virtual Private Networks and Remote Networking . . . . . . . . . . . . . . 13
Support for Internet Information Services . . . . . . . . . . . . . . . . . . . . . 13

Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Universal Plug and Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 2
Configuring TCP/IP and Other Protocols 15
OSI Reference Model Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Using Layers in the OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
The Seven Layers of the OSI Model . . . . . . . . . . . . . . . . . . . . . . . . 17
Understanding TCP/IP in Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Application Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Transport Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Network Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Internet Protocol Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Classifying IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Applying the Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Using Default Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Understanding Public and Private IP Addresses . . . . . . . . . . . . . . . . 35
www.it-ebooks.info
vi
Table of Contents
Configuring IP Settings in Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configuring Advanced TCP/IP Options . . . . . . . . . . . . . . . . . . . . . . 37
Understanding Internet Protocol Version 6 (IPv6) . . . . . . . . . . . . . . . . . . . 41
Using IPv6 with Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Other Networking Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Internetwork Packet Exchange (IPX) . . . . . . . . . . . . . . . . . . . . . . . . 42
AppleTalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Chapter 3
Creating Network Connections 47
Understanding Network Hardware Components . . . . . . . . . . . . . . . . . . . . 47
Installing a Network Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Connecting with Hubs and Switches . . . . . . . . . . . . . . . . . . . . . . . . 49
Wiring the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Adding Routers and Residential Gateways . . . . . . . . . . . . . . . . . . . . 51
Choosing a Network Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Direct Cable Connection (DCC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Ethernet Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
HomePNA Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Powerline Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Other Types of LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Installing NICs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Managing Network Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Checking the Status of the Connection . . . . . . . . . . . . . . . . . . . . . . 70
Understanding Connection Protocols and Services . . . . . . . . . . . . . . 71
Network Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Bindings and Provider Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Bridging Network Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Part 2
Internet Networking 79
Chapter 4
Configuring Internet Connections 81
Internet Connections 101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
The Role of an Internet Service Provider (ISP) . . . . . . . . . . . . . . . . . 82
What an ISP Provides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Types of Internet Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Dial-up Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Digital Subscriber Line (DSL) Connections . . . . . . . . . . . . . . . . . . . . 89
Satellite Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Cable Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
www.it-ebooks.info

vii
Table of Contents
Corporate Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Fixed Wireless Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuring Modems and Broadband Hardware . . . . . . . . . . . . . . . . . . . . 96
General Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Modem Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Diagnostics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Driver Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Resources Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Creating New Internet Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Managing Dial-up Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Connection Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Configuring Dialing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Managing Broadband Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Chapter 5
Using Internet Connection Firewall 117
Introducing Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
What Is a Firewall? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Understanding Internet Connection Firewall . . . . . . . . . . . . . . . . . . . . . . 118
How ICF Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
How to Use ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
When You Should Use ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
When You Should Not Use ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
What ICF Does Not Do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Activating and Configuring ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Enabling ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Using the ICF Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Enabling Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Allowing ICMP Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Using ICF with E-mail Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Testing ICF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Chapter 6
Using Internet Explorer Advanced Features 137
Managing Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Dial-up and Virtual Private Network Connections . . . . . . . . . . . . . 139
Local Area Network (LAN) Settings . . . . . . . . . . . . . . . . . . . . . . . . 142
Setting Internet Explorer Security Levels . . . . . . . . . . . . . . . . . . . . . . . . 143
Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Understanding Privacy and Content Settings . . . . . . . . . . . . . . . . . . . . . 148
Privacy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Content Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
www.it-ebooks.info
viii
Table of Contents
Setting Additional Internet Explorer Features and Settings . . . . . . . . . . . 159
Choosing a Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Customizing the Appearance of Internet Explorer . . . . . . . . . . . . . 160
Managing AutoComplete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Setting Default Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Choosing Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Customizing the Internet Explorer Interface . . . . . . . . . . . . . . . . . . . . . . 164
Configuring the Internet Explorer Toolbar . . . . . . . . . . . . . . . . . . . 164
Managing Internet Explorer History . . . . . . . . . . . . . . . . . . . . . . . . 166
Managing Favorites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Customizing Search Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Importing and Exporting Favorites and Cookies . . . . . . . . . . . . . . . 172
Choosing Language Encoding Features . . . . . . . . . . . . . . . . . . . . . 173
Using Keyboard Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Managing Internet Explorer with Local Group Policy . . . . . . . . . . . . . . . 174
Understanding Local Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . 175
Using Local Group Policy to Invoke Internet Explorer Settings . . . . 176
Chapter 7
Using Outlook Express Advanced Features 181
Managing Connectivity and Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Configuring Connectivity and Accounts . . . . . . . . . . . . . . . . . . . . . 182
Using Multiple Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Using Identities in Outlook Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Configuring Outlook Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
General Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Read Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Receipts Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Send Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Compose Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Signatures Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Security Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Connection Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Maintenance Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Managing E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Sending Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Using Mail Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Managing Attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Managing Received Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Creating Message Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Managing Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Importing and Exporting Messages . . . . . . . . . . . . . . . . . . . . . . . . 212
Finding Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Managing the Appearance of Outlook Express . . . . . . . . . . . . . . . 214
www.it-ebooks.info

ix
Table of Contents
Using the Address Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Using Keyboard Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Chapter 8
Using Windows Messenger 219
Setting Up and Connecting with Windows Messenger . . . . . . . . . . . . . . 219
Creating a .NET Passport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Connecting Through a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Windows Messenger and Virtual
Private Network (VPN) Connections . . . . . . . . . . . . . . . . . . . . . . . . 224
Using Windows Messenger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Managing Sign-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Creating Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Using Instant Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Using File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Making Voice Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Using Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Whiteboard and Application Sharing . . . . . . . . . . . . . . . . . . . . . . . 240
Requesting Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Online Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Chapter 9
Using Internet Information Services 249
Running IIS on Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . 250
Getting to Know IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
History of IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Features Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Preview of IIS Version 6.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Installing IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

Configuring IIS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Configuring Global Web Site Properties . . . . . . . . . . . . . . . . . . . . . 260
Configuring Individual (Default) Web Site Properties . . . . . . . . . . . 269
Configuring FTP Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Configuring SMTP Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Part 3
Network Connectivity 281
Chapter 10
Managing Workgroup Connections 283
Planning a Workgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Choosing a Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Gathering the Network Hardware . . . . . . . . . . . . . . . . . . . . . . . . . 291
www.it-ebooks.info
x
Table of Contents
Planning for the Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Installing the Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Setting Up the Workgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Configuring Other Windows XP Computers . . . . . . . . . . . . . . . . . . 298
Configuring Computers Running Earlier Windows Versions . . . . . . 298
Configuring Network Clients Manually . . . . . . . . . . . . . . . . . . . . . 299
Changing the IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Using Internet Connection Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
How ICS Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Managing ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Changing ICS Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Common Workgroup Problems and Solutions . . . . . . . . . . . . . . . . . . . . . 308
Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Windows 95 Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . . . 309
Manually Assigned Static IP

Addresses Cause Conflicts or Access Problems . . . . . . . . . . . . . . . 309
The ICS Host Does Not Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Internet Usage with ICS Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
A Client Can Connect to Other Network
Clients, But None Can Connect to Him . . . . . . . . . . . . . . . . . . . . . 310
ICS Clients Cannot Autodial an AOL Connection . . . . . . . . . . . . . 310
Chapter 11
Understanding Domain Connectivity 311
Understanding Active Directory Domains . . . . . . . . . . . . . . . . . . . . . . . . 311
Running Windows XP Professional in a Domain Environment . . . . . . . . . 321
Joining a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Joining a Domain with Wizard Help . . . . . . . . . . . . . . . . . . . . . . . . 323
Joining a Domain Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Logging On to a Windows Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Ensuring That You Have Logged On to the Domain . . . . . . . . . . . . . . . . 330
Surveying Windows XP Changes in a Domain Setting . . . . . . . . . . . . . . 330
Start Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Ctrl+Alt+Delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Internet Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Finding Domain Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Browsing for Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Searching Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Creating a Network Place or Mapping a Network Drive . . . . . . . . 339
Using the UNC Path or HTTP Address . . . . . . . . . . . . . . . . . . . . . . 343
Leaving a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Accessing Domain Resources from Windows XP Home Edition . . . . . . . 344
www.it-ebooks.info
xi

Table of Contents
Chapter 12
Solving Connectivity Problems 345
Using Command-line Tools Included in Windows XP . . . . . . . . . . . . . . . 345
Using Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Using Tracert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Using PathPing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Using Ipconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Using Netstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Using Nbtstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Running Additional Network Support Tools . . . . . . . . . . . . . . . . . . . . . . . 356
Running Network Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Using Windows Support Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Finding Helpful Utilities on the Internet . . . . . . . . . . . . . . . . . . . . . . . . . 363
Ping Plotter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
VisualRoute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
NetPerSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Troubleshooting Network Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 366
A Philosophy of Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Solving Common Network Connection Problems . . . . . . . . . . . . . . 367
Part 4
Network Resources 371
Chapter 13
Selecting a File System 373
Understanding FAT32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Understanding NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
newfeature!
New NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Exploring NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . . . . 380
Dynamic Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

Change Journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
NTFS Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
File and Folder Access Control List . . . . . . . . . . . . . . . . . . . . . . . . 385
Indexing Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Sparse File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Volume Mount Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Distributed Link Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Multiple Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Selecting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Configuring NTFS Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Converting a Disk to NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
www.it-ebooks.info
xii
Table of Contents
Enabling Disk Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Enabling Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Enabling Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Mounting a Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Chapter 14
Understanding Resource
Sharing and NTFS Security 397
Understanding Network Resource Access . . . . . . . . . . . . . . . . . . . . . . . . 398
Sharing Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Sharing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Sharing the Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Assigning Printer Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Connecting to a Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Managing the Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407

Sharing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Sharing Resources with Simple File Sharing Enabled . . . . . . . . . . . 419
Managing Permissions with Simple File Sharing Disabled . . . . . . . 426
Removing Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Assigning Share and NTFS Permissions . . . . . . . . . . . . . . . . . . . . . 427
Managing Shares with Network Tools . . . . . . . . . . . . . . . . . . . . . . 429
Solving Common Problems with Network Shares . . . . . . . . . . . . . . 433
Configuring NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Setting Advanced NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . 437
Checking an Account’s Effective Permissions . . . . . . . . . . . . . . . . . 438
Exploring Scenarios to Troubleshoot NTFS Permissions . . . . . . . . . . 441
Chapter 15
Making Files Available Offline 449
Enabling the Offline Files Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Configuring Offline Files Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Making a File or Folder Available Offline . . . . . . . . . . . . . . . . . . . . . . . . 453
Using Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Synchronizing Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . 457
Setting Synchronization Options . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Stop Using an Offline File or Folder . . . . . . . . . . . . . . . . . . . . . . . . 463
Managing Caching Options on the Server . . . . . . . . . . . . . . . . . . . . . . . 463
Handling Network Disconnections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Troubleshooting Offline Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Using Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Creating a Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Synchronizing Files with Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . 469
Choosing Between Briefcase and Offline Files . . . . . . . . . . . . . . . . . . . . 469
www.it-ebooks.info
xiii
Table of Contents

Part 5
Advanced Networking 471
Chapter 16
Remote Desktop and Remote Assistance 473
newfeature!
Exploring Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Enabling Remote Desktop on the Host Computer . . . . . . . . . . . . . 475
Using Remote Desktop over a Dial-up Connection . . . . . . . . . . . . 477
Using Remote Desktop over the Internet/Firewall . . . . . . . . . . . . . 477
Using Remote Desktop Through a Remote Access Server . . . . . . . 479
Configuring the Client Computer . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Logging On Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Generating a Remote Desktop
Session with Microsoft Internet Explorer . . . . . . . . . . . . . . . . . . . . 487
Choosing Remote Desktop Options . . . . . . . . . . . . . . . . . . . . . . . . 490
Remote Desktop and Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . 494
newfeature!
Exploring Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Using Remote Assistance Through Firewalls . . . . . . . . . . . . . . . . . . 496
Enabling Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Requesting Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Using Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Chapter 17
Remote Access and
Virtual Private Networking 503
Using Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Configuring Remote Access Connections . . . . . . . . . . . . . . . . . . . . 504
Configuring Remote Access Security . . . . . . . . . . . . . . . . . . . . . . . 506
Allowing Clients to Dial in to Your Computer . . . . . . . . . . . . . . . . . 510
Understanding Virtual Private Networking . . . . . . . . . . . . . . . . . . . . . . . 513

Creating a Connection to a VPN Server . . . . . . . . . . . . . . . . . . . . . 515
Configuring Windows XP to Act as a VPN Server . . . . . . . . . . . . . 516
Chapter 18
Interconnectivity with Other Systems 519
Connecting with Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Supported Networking Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Supported Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Connecting Windows XP and Novell NetWare . . . . . . . . . . . . . . . . . . . . 523
Configuring Client Service for NetWare . . . . . . . . . . . . . . . . . . . . . 525
Interconnecting Windows XP and UNIX/Linux . . . . . . . . . . . . . . . . . . . . 526
www.it-ebooks.info
xiv
Table of Contents
Installing Print Services for UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Microsoft Windows Services for UNIX . . . . . . . . . . . . . . . . . . . . . . 527
Connecting Windows XP to Apple Macintosh Systems . . . . . . . . . . . . . . 529
Connecting Windows and Mac OS X Using Samba . . . . . . . . . . . . 529
Macintosh File Services for Windows 2000 Server . . . . . . . . . . . . . 530
Chapter 19
Wireless Networking 531
Getting to Know Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Why Wireless Networks Are Important . . . . . . . . . . . . . . . . . . . . . 532
Types of Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Wireless Networks Supported by Windows XP . . . . . . . . . . . . . . . . 535
How Infrared and Wi-Fi Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Wireless Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Selecting a Wireless Network Topology . . . . . . . . . . . . . . . . . . . . . 540
Understanding Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Setting Up Your Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Setting Up an Infrared Wireless Network . . . . . . . . . . . . . . . . . . . . 544

Setting Up a Wi-Fi Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Chapter 20
Maintaining Network Security 557
Examining Windows Security History . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
Understanding Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
Understanding Network-initiated Threats . . . . . . . . . . . . . . . . . . . . 560
Understanding Local Security Threats . . . . . . . . . . . . . . . . . . . . . . 564
Protecting Windows XP from Security Threats . . . . . . . . . . . . . . . . . . . . 566
Using a Firewall for Protection from Network-initiated Threats . . . 566
Inbound vs. Outbound Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . 568
TCP/IP Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Detecting Windows XP Security Issues . . . . . . . . . . . . . . . . . . . . . . 572
Keeping Software Up to Date . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Removing Unneeded Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Securing IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Using Netstat to Observe IP Connections . . . . . . . . . . . . . . . . . . . 584
Configuring Network Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Securing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Securing Remote Access Connections . . . . . . . . . . . . . . . . . . . . . . 586
Securing Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Protecting Windows XP from Viruses . . . . . . . . . . . . . . . . . . . . . . . 590
Coping with E-mail Security Threats . . . . . . . . . . . . . . . . . . . . . . . 591
Detecting Trojan Horse Applications . . . . . . . . . . . . . . . . . . . . . . . . 591
Using Internet Explorer Safely . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
www.it-ebooks.info
xv
Table of Contents
Using Administrative Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Protecting Files Using NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Auditing Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593

Auditing File System Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Managing EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Chapter 21
Monitoring Windows XP
Network Performance 597
Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Understanding Bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Detecting Bottlenecks with Windows XP Command-line Tools . . . . 599
Using Windows Task Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Using the Performance Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Part 6
Appendix 611
Appendix A
Windows XP Service Pack 1 613
Default Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Glossary 617
Index to Troubleshooting Topics 629
Index 631
www.it-ebooks.info
This page intentionally left blank
www.it-ebooks.info
xvii
Acknowledgments
I would like to thank Alex Blanton for giving me the opportunity to write this book,
and a big thanks also goes to Aileen Wrothwell for her guidance. A special thanks goes
to David Dalan for his extra help and Jim Causey for bringing it all together. Thanks
to Curtis Philips for a great technical review. Also, thanks to my agent, Margot Maley
Hutchison, for her work on my behalf. Lastly and as always, thanks to my wife and
children for their support.
— Curt Simmons

First and foremost, I’d like to thank Aileen Wrothwell and Curtis Philips for being such a
fantastic team to work with. With a flair for both technical issues and the written word,
Curt is the most amazing technical editor I’ve ever had the pleasure of working with.
Aileen is a complete joy to work for — fun, intelligent, and supportive. I’ve never had so
much fun while writing. Thanks also to Alex Blanton and to Danielle Bird for giving me
the opportunity to work on this project.
I’d also like to make a special mention of my friend and boss, Mark Lynch. If he hadn’t
given me a shot all those years ago, my life and career would be nothing like they are
today. Thanks for the continued support, and for everything.
Thanks also to my good friends Steve Hood, Ken Rawlings, Daniel Orrego, Ryan
Hartman, Tina Golini, and especially Jennifer Dover for being there for me always,
through thick and thin. Thanks to my mom, dad, and brother David for always being
there too, and for everything else. My cat Miranda has also been supportive, understand-
ing, and loving throughout this period, knowing when I needed a lap cat and when I just
needed to be left to my thoughts. Meow. A final thanks to Stew, Chad, Joe (and Joe),
Mary, Fitz, Brent, Kenny, P. Kevin, Matt, Art, Erica, Julie, Tom, Greg, Stacey, and everyone
else who makes my life so pleasant.
— James F. Causey
The following members of the Microsoft community contributed their knowledge and
expertise to reviewing the book’s content:
Tom Fout, Joseph Davies, Dennis Morgan, Ethan Zoller, Igor Kostic, Kenny Richards,
Anton Krantz, Rob Trace, Ricardo Stern, Matt Powell, Jason Garms, Josh Rice, Ross
Carter, Greg Gille, Sanjay Anand, Stewart Tansley, Avronil Bhattacharjee, Mihai Costea,
Brian Aust, Brian Dewey, Jeffrey Saathoff, and Leon Braginski.
www.it-ebooks.info
This page intentionally left blank
www.it-ebooks.info
xix
We’d Like to Hear from You!
Our goal at Microsoft Press is to create books that help you find the information you

need to get the most out of your software.
The INSIDE OUT series was created with you in mind. As part of an effort to ensure that
we’re creating the best, most useful books we can, we talked to our customers and asked
them to tell us what they need from a Microsoft Press series. Help us continue to help
you. Let us know what you like about this book and what we can do to make it better.
When you write, please include the title and author of this book in your e-mail, as well as
your name and contact information. We look forward to hearing from you.
How to Reach Us
E-mail:
Mail: Inside Out Series Editor
Microsoft Press
One Microsoft Way
Redmond, WA 98052
Note: Unfortunately, we can’t provide support for any software problems you might
experience. Please go to for help with any software issues.
www.it-ebooks.info
This page intentionally left blank
www.it-ebooks.info
xxi
Conventions and
Features Used in This Book
This book uses special text and design conventions to make it easier for you to find the
information you need.
Text Conventions
Convention Meaning
Abbreviated menu commands For your convenience, this book
uses abbreviated menu commands.
For example, “Choose Tools, Track
Changes, Highlight Changes” means
that you should click the Tools menu,

point to Track Changes, and select the
Highlight Changes command.
Boldface type Boldface type is used to indicate text
that you enter or type.
Initial Capital Letters The first letters of the names of menus,
dialog boxes, dialog box elements, and
commands are capitalized. Example: the
Save As dialog box.
Italicized type Italicized type is used to indicate
new terms.
Plus sign (+) in text Keyboard shortcuts are indicated by a
plus sign (+) separating two key names.
For example, Ctrl+Alt+Delete means
that you press the Ctrl, Alt, and Delete
keys at the same time.
Design Conventions
newfeature!
This text identifies a new or significantly updated feature in this version of the
software.
www.it-ebooks.info
xxii
Conventions and Features Used in This Book
These are the book’s signature tips. In these tips, you’ll get the straight scoop on
what’s going on with the software—inside information on why a feature works the
way it does. You’ll also find handy workarounds to different software problems.
tip Tips provide helpful hints, timesaving tricks, or alternative procedures related to the
task being discussed.
Look for these sidebars to find solutions to common problems you might encounter.
Troubleshooting sidebars appear next to related information in the chapters. You can
also use the Troubleshooting Topics index at the back of the book to look up problems

by topic.
Cross-references point you to other locations in the book that offer additional information on
the topic being discussed.
This icon indicates sample files or text found on the companion CD.
caution Cautions identify potential problems that you should look out for when you’re
completing a task or problems that you must address before you can complete a task.
note Notes offer additional information related to the task being discussed.
Sidebar
The sidebars sprinkled throughout these chapters provide ancillary information on the
topic being discussed. Go to sidebars to learn more about the technology or a feature.
www.it-ebooks.info
1
1 Introduction to
Windows XP Networking 3
2 Configuring TCP/IP
and Other Protocols 15
3 Creating Network
Connections 47
Part 1
Windows XP Networking
www.it-ebooks.info
This page intentionally left blank
www.it-ebooks.info

×