Tải bản đầy đủ (.pdf) (1,020 trang)

Tài liệu Window Server 2003 Network Infrastructure ppt

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (11 MB, 1,020 trang )

PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2004 by Microsoft Corporation
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or
by any means without the written permission of the publisher.
Library of Congress Cataloging-in-Publication Data
Mackin, J. C.
MCSA/MCSE self-paced training kit (exam 70-291): implementing, managing, and maintaining a
Microsoft Windows Server 2003 network infrastructure / J. C. Mackin, Ian McLean.
p. cm.
ISBN 0-7356-1439-3
1. Electronic data processing personnel Certification.
study guides. 3. Microsoft Windows server.
A. II. Title.
QA76.3.M3225 2003
005.7'13769 dc21
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9 QWT 8 7 6 5 4 3
Distributed in Canada by H.B. Fenn and Company Ltd.
2. Microsoft software Examinations
2003054026
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send
comments to
Active Directory, Microsoft, Microsoft Press, the .NET logo, Visual Studio, Windows, the Windows logo,


Windows Server, and Windows NT are either registered trademarks or trademarks of Microsoft Corpora-
tion in the United States and/or other countries. Other product and company names mentioned herein may
be the trademarks of their respective owners.
The example companies, organizations, products, domain names, e-mail addresses, logos, people,
places, and events depicted herein are fictitious. No association with any real company, organiza-
tion, product, domain name, e-mail address, logo, person, place, or event is intended or should be
inferred.
Acquisitions Editor: Kathy Harding
Project Editors: Valerie Woolley and Jean Trenary
Technical Editor: Tony Northrup
Body Part No. X08-16603
J.C. Mackin
J.C. Mackin (MCSA, MCSE, MCT) is a writer, editor, consultant, and trainer whose books
include the Internet Security and Acceleration Server 2000 Training Kit. He holds a
Master’s degree in Telecommunications and Network Management.
Ian McLean
Ian McLean (MCSE, MCDBA, MCT) has over 35 years experience in industry, commerce
and education. He started his career as an electronics engineer before going into dis-
tance learning and then education as a university professor, and currently runs his own
consultancy company. Ian has written 14 books plus many papers and technical arti-
cles. He has been working with networks since the early 1980s and with Microsoft net-
work operating systems since 1997.

1 1
2 2
3 3
4 4
5 5
6 6
7 7

8 8
9 9
10
11
12
Contents at a Glance
Part 1 Learn at Your Own Pace
Understanding Windows Server 2003 Networks . . . . . . . . . . . . . . . . . . . -1
Understanding TCP/IP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Monitoring and Troubleshooting TCP/IP Connections
. . . . . . . . . . . . . . . -1
Configuring DNS Servers and Clients
. . . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Implementing a DNS Infrastructure
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Monitoring and Troubleshooting DNS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Configuring DHCP Servers and Clients
. . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Monitoring and Troubleshooting DHCP
. . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Routing with Windows Server 2003
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . -1
Configuring and Managing Remote Access
. . . . . . . . . . . . . . . . . . . . . .10-1
Managing Network Security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-1
Maintaining a Network Infrastructure
. . . . . . . . . . . . . . . . . . . . . . . . . . .12-1

Part 2 Prepare for the Exam
13 Implementing, Managing, and Maintaining IP Addressing (1.0) . . . . . .13-1
14 Implementing, Managing, and Maintaining Name Resolution (2.0) . . .14-1
15 Implementing, Managing, and Maintaining Network Security (3.0) . . .15-1
16  Implementing, Managing, and Maintaining Routing
And Remote Access (4.0)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-1
17 Maintaining a Network Infrastructure (5.0) . . . . . . . . . . . . . . . . . . . . . .17-1
v
vi Contents at a Glance
Practices
Working with Octet Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-18
Working with Subnet Masks and Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-37
Configuring TCP/IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-47
Using Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13
Running Network Diagnostics and Netdiag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-26
Capturing Name Resolution Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
Installing a DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38
Configuring a Primary DNS Suffix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-55
Configuring a DNS Server to Perform Recursion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-56
Comparing NetBIOS and DNS Name Resolution Traffic . . . . . . . . . . . . . . . . . . . . . . . . .5-12
Verifying SRV Resource Records for Active Directory DNS . . . . . . . . . . . . . . . . . . . . . . .5-14
Deploying a Secondary DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-37
Creating a Zone Delegation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59
Deploying a Stub Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-71
Using DNS Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-12
Installing and Configuring a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15
Performing a Manual Backup of the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-37
Creating a New Superscope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-37
Analyzing DHCP Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14

Enabling and Configuring Routing And Remote Access . . . . . . . . . . . . . . . . . . . . . . . . .9-25
Configuring Demand-Dial Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-38
Installing and Configuring NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-48
Creating a Dial-Up Access Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-19
Deploying Remote Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43
Configuring a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-61
Deploying a RADIUS Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-78
Creating and Using the Security Configuration And Analysis Console . . . . . . . . . . . . 11-14
Using Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-51
Troubleshoot IPSec with IPSec Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-74
Troubleshoot Logon Issues with Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-77
Use Event Logs for Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-78
Sampling Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17
Verifying the Configuration of DNS Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28
Configuring Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-38
Tables
Table 1-1: Management and Monitoring Tools Subcomponents . . . . . . . . . . . . . . . . . .1-26
Table 1-2: Networking Service Subcomponents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-27
Table 1-3: Other Network File And Print Services Subcomponents. . . . . . . . . . . . . . . .1-28
Contents at a Glance vii
Table 1-4: Certificate Services Subcomponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Table 2-1: Private Address Ranges
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Table 2-2: Potential Values in a Binary Octet
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Table 2-3: IP Address Classes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Table 2-4: Subnet Masks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
Table 2-5: Class C Subnet Mask Options (Static)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35
Table 2-6: VLSM Subnet IDs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
Table 3-1: Network Monitor Versions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Table 3-2: Network Monitor Capture Window
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Table 3-3: Netdiag Tests
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Table 4-1: Computer Names and Name Suffixes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Table 4-2: Comparisons of NetBIOS and DNS Names
. . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Table 4-3: Typical Resource Record Fields
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Table 4-4: FQDNs of a Multihomed Host
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-48
Table 5-1: Zone Replication Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24
Table 5-2: Default DNS Installation Settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-44
Table 5-3: Name Checking Methods
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-50
Table 6-1: Command-Line Options Available with Set
. . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Table 6-2: DNS Performance Counters
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Table 8-1: DHCP Header Fields
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
Table 8-2: DHCP Server Log Fields

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22
Table 8-3: Log Event Codes 50 and Above
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Table 8-4: DHCP Database Corruption Errors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
Table 9-1: Comparing Static and Dynamic Routing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-18
Table 9-2: Comparison of Translated Connections Features
. . . . . . . . . . . . . . . . . . . . . 9-47
Table 10-1: Authentication Protocol Features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-11
Table 10-2: Authentication Protocol Support
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
Table 10-3: Encryption Types
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-32
Table 11-1: Network Security Protocols
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Table 11-2: Security Template Sections
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
Table 11-3: Security Templates
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7
Table 11-4: Secedit Syntax
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10
Table 11-5: Security Options for Improving Network Security
. . . . . . . . . . . . . . . . . . . 11-12
Table 11-6: Netsh IPSec (Dynamic|Static) Show Commands
. . . . . . . . . . . . . . . . . . . 11-33
Table 11-7: IPSec Main Mode Statistics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-35
Table 11-8: IPSec Quick Mode Statistics

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-36
Table 11-9: Netcap Syntax
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38
Table 12-1: Helpful Counters
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Table 12-2: Repair Actions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25
viii Contents at a Glance
Troubleshooting Labs
Chapter 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61
Chapter 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-76
Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-30
Chapter 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-48
Chapter 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-40
Chapter 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-76
Chapter 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-83
Chapter 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-82
Case Scenarios Exercises
Chapter 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-30
Chapter 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-51
Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31
Chapter 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60
Chapter 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-74
Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-29
Chapter 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-46
Chapter 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38
Chapter 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-77
Chapter 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-82
Chapter 12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-40
Contents

About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxi
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Prerequisites
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
About the CD-ROM
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Features of This Book
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Informational Notes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv
Notational Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Keyboard Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
Hardware Requirements
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
Software Requirements
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
Setup Instructions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
The Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Certifications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix
Requirements for Becoming a Microsoft Certified Professional
. . . . . . . . . . . xxx
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx
Evaluation Edition Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi
Part 1
Learn at Your Own Pace

1 Understanding Windows Server 2003 Networks 1-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Lesson 1: Understanding Network Infrastructures . . . . . . . . . . . . . . . . . . . . . . .1-3
Defining a Network Infrastructure
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Analyzing Windows Server 2003 Networks
. . . . . . . . . . . . . . . . . . . . . . . . .1-6
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Lesson 2: Networking with Default Components in Windows Server 2003 . . . . . 1-13
Viewing Network Connections
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-13
Default Networking and Workgroups
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-20
Routing and Windows Server 2003 Network Infrastructure
. . . . . . . . . . . . .1-20
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-21
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Lesson 3: Extending a Windows Server 2003 Network Infrastructure . . . . . . . .1-23
Adding Components to a Connection
. . . . . . . . . . . . . . . . . . . . . . . . . . . .1-23
Installing Windows Networking Components
. . . . . . . . . . . . . . . . . . . . . . . 1-25
Adding Active Directory to a Windows Infrastructure
. . . . . . . . . . . . . . . . . .1-28
Lesson Review

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
ix
x Table of Contents
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-29
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-31
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-32
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
2 Understanding TCP/IP 2-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Lesson 1: Understanding TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Exploring the Layers of the TCP/IP Model
. . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-5
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6
Lesson 2: Understanding IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Using Public IP Addresses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Using Private IP Addresses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Examining IP Addressing Methods
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8
Understanding the Structure of IP Addresses
. . . . . . . . . . . . . . . . . . . . . . .2-9

Subnet Masks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-16
Understanding Default Gateways
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Practice: Working with Octet Notations
. . . . . . . . . . . . . . . . . . . . . . . . . . .2-18
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-19
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-20
Lesson 3: Subnetting and Supernetting IP Networks . . . . . . . . . . . . . . . . . . . . 2-22
Understanding Subnetting
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-22
Estimating Subnet Address Ranges
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-32
Summarizing Routes Through Supernetting
. . . . . . . . . . . . . . . . . . . . . . . .2-32
Using Classless Interdomain Routing
. . . . . . . . . . . . . . . . . . . . . . . . . . . .2-33
Using Variable-Length Subnet Masks
. . . . . . . . . . . . . . . . . . . . . . . . . . . .2-34
Practice: Working with Subnet Masks and Subnets
. . . . . . . . . . . . . . . . . .2-37
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-40
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-41
Lesson 4: Installing and Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . .2-42
Installing TCP/IP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-42

Examining TCP/IP Configuration Methods
. . . . . . . . . . . . . . . . . . . . . . . . .2-43
Practice: Configuring TCP/IP Addresses
. . . . . . . . . . . . . . . . . . . . . . . . . .2-47
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-50
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-50
Table of Contents xi
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-51
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-54
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-55
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-56
3 Monitoring and Troubleshooting TCP/IP Connections 3-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Lesson 1: Analyzing Traffic Using Network Monitor . . . . . . . . . . . . . . . . . . . . . .3-3
Understanding Network Monitor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
Exploring Network Monitor Components
. . . . . . . . . . . . . . . . . . . . . . . . . . .3-4
How Network Monitor Works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-6
Adding Parsers to Network Monitor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Practice: Using Network Monitor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13
Lesson Review

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Lesson 2: Troubleshooting TCP/IP Connections . . . . . . . . . . . . . . . . . . . . . . . 3-19
Faulty TCP/IP Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-19
Network Diagnostics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-20
Troubleshooting Connections Using Ping and PathPing
. . . . . . . . . . . . . . . .3-23
Troubleshooting with Tracert
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-25
Troubleshooting Using the ARP Tool
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Practice: Running Network Diagnostics and Netdiag
. . . . . . . . . . . . . . . . . .3-26
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-35
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-36
4 Configuring DNS Servers and Clients 4-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Lesson 1: Understanding Name Resolution in Windows Server 2003 . . . . . . . . .4-3

Comparing DNS and NetBIOS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Disabling NetBIOS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Practice: Capturing Name Resolution Traffic
. . . . . . . . . . . . . . . . . . . . . . . .4-8
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
xii Table of Contents
Lesson 2: Understanding DNS in Windows Server 2003 Networks . . . . . . . . . . 4-12
Exploring DNS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
DNS Components
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Understanding How a DNS Query Works
. . . . . . . . . . . . . . . . . . . . . . . . . .4-16
Understanding How Caching Works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Lesson 3: Deploying DNS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26
Installing the DNS Server Service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26
Configuring a DNS Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Understanding Server Types

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
Creating Resource Records
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Viewing and Clearing the DNS Server Cache
. . . . . . . . . . . . . . . . . . . . . . .4-37
Practice: Installing a DNS Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-42
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-43
Lesson 4: Configuring DNS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44
Configuring Client Settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44
Configuring Dynamic Update Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-51
Default Client Update Behavior
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-52
Configuring TCP/IP Settings for DNS Clients
. . . . . . . . . . . . . . . . . . . . . . .4-53
Viewing and Clearing the DNS Resolver Cache
. . . . . . . . . . . . . . . . . . . . . . 4-54
Practice 1: Configuring a Primary DNS Suffix
. . . . . . . . . . . . . . . . . . . . . . .4-55
Practice 2: Configuring a DNS Server to Perform Recursion
. . . . . . . . . . . .4-56
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59

Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-60
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-61
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-63
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-63
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-64
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-65
5 Implementing a DNS Infrastructure 5-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Lesson 1: Configuring DNS Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Exploring DNS Server Properties Tabs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Practice 1: Comparing NetBIOS and DNS Name Resolution Traffic
. . . . . . . .5-12
Practice 2: Verifying SRV Resource Records for Active Directory in DNS
. . . .5-14
Table of Contents xiii
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19
Lesson 2: Configuring Zone Properties and Transfers . . . . . . . . . . . . . . . . . . . 5-20
Exploring DNS Zone Properties
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-20
Practice: Deploying a Secondary DNS Server
. . . . . . . . . . . . . . . . . . . . . . .5-37
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-40
Lesson Summary

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-42
Lesson 3: Configuring Advanced DNS Server Properties . . . . . . . . . . . . . . . . .5-43
Tuning Advanced Server Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-43
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-52
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-55
Lesson 4: Creating Zone Delegations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Delegating Zones
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Creating a Zone Delegation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59
Practice: Creating a Zone Delegation
. . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-62
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-64
Lesson 5: Deploying Stub Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-65
Understanding Stub Zones
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-65
Benefits of Stub Zones
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-66
When to Use Stub Zones
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-66
Stub Zone Updates
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-70
Practice: Deploying a Stub Zone
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-71

Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-72
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-73
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-74
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-76
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-78
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-78
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-79
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-80
6 Monitoring and Troubleshooting DNS 6-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Lesson 1: Using DNS Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Querying DNS with Nslookup
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
Viewing the DNS Events Log
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
DNS Debug Log
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Practice: Using DNS Troubleshooting Tools
. . . . . . . . . . . . . . . . . . . . . . . .6-12
xiv Table of Contents
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-18
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
Lesson 2: Using DNS Monitoring Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-20
Using Replication Monitor

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-20
Monitoring DNS Performance with System Monitor
. . . . . . . . . . . . . . . . . . .6-24
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-27
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-28
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-32
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-33
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-34
7 Configuring DHCP Servers and Clients 7-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2
Lesson 1: Configuring the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Benefits of DHCP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Installing the DHCP Server Service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Authorizing the Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-5
Configuring Scopes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Assigning DHCP Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11
Activating a Scope

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13
Configuring the Client
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-13
Verifying the Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15
Practice: Installing and Configuring a DHCP Server
. . . . . . . . . . . . . . . . . . .7-15
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-20
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-21
Lesson 2: Managing DHCP in Windows Networks . . . . . . . . . . . . . . . . . . . . . . 7-22
Changing DCHP Server Status
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-22
Managing DHCP from a Command Line
. . . . . . . . . . . . . . . . . . . . . . . . . . .7-24
Connecting Clients to Remote DHCP Servers
. . . . . . . . . . . . . . . . . . . . . . .7-26
Using Superscopes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-26
Changing the Addressing of a Subnet
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30
Backing Up the DHCP Server Database
. . . . . . . . . . . . . . . . . . . . . . . . . . .7-31
Manually Compacting a DHCP Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . .7-33
Using Options Classes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-34
Practice 1: Performing a Manual Backup of the DHCP Server
. . . . . . . . . . .7-37

Practice 2: Creating a New Superscope
. . . . . . . . . . . . . . . . . . . . . . . . . . .7-37
Table of Contents xv
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-39
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40
Lesson 3: Configuring DHCP Servers to Perform DNS Updates. . . . . . . . . . . . . 7-41
Configuring Dynamic Updates with DHCP
. . . . . . . . . . . . . . . . . . . . . . . . . .7-41
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-45
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-46
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-48
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-50
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-50
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-50
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-51
8 Monitoring and Troubleshooting DHCP 8-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Lesson 1: Analyzing DHCP Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Understanding How Clients Obtain Configuration
. . . . . . . . . . . . . . . . . . . . .8-3
Practice: Analyzing DHCP Messages
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14
Lesson Review

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-18
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19
Lesson 2: Monitoring DHCP Through Audit Logging . . . . . . . . . . . . . . . . . . . . . 8-20
Exploring DHCP Audit Logging
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-20
Understanding DHCP Server Log File Format
. . . . . . . . . . . . . . . . . . . . . . .8-22
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26
Lesson 3: Troubleshooting DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27
Verifying the Client Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27
Verifying the Server Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-32
Reconciling the DHCP Database
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34
Checking Event Viewer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-37
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-38
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-41
Key Points
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41

Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-42
Questions and Answers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-43
xvi Table of Contents
9 Routing with Windows Server 2003 9-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2
Lesson 1: Configuring Windows Server 2003 for LAN Routing . . . . . . . . . . . . . . 9-3
Understanding Routing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Using Routing And Remote Access
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4
Using the Routing And Remote Access Console
. . . . . . . . . . . . . . . . . . . . . .9-5
Configuring Routing And Remote Access Service Properties
. . . . . . . . . . . . .9-7
Managing General IP Routing Properties
. . . . . . . . . . . . . . . . . . . . . . . . . .9-12
Working with Routing Tables
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-14
Exploring LAN Routing Scenarios
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-18
Understanding Static Routes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-20
Static Routing Design Considerations
. . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25
Practice: Enabling and Configuring Routing And Remote Access
. . . . . . . . .9-25
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-26

Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-27
Lesson 2: Configuring Demand-Dial Routing . . . . . . . . . . . . . . . . . . . . . . . . . .9-28
Configuring Demand-Dial Interfaces
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-28
Deploying a Demand-Dial Router-to-Router Configuration
. . . . . . . . . . . . . .9-36
Troubleshooting Demand-Dial Routing
. . . . . . . . . . . . . . . . . . . . . . . . . . . .9-37
Practice: Configuring Demand-Dial Routing
. . . . . . . . . . . . . . . . . . . . . . . .9-38
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-43
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-44
Lesson 3: Configuring NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-45
Understanding NAT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-45
Troubleshooting NAT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-48
Practice: Installing and Configuring NAT
. . . . . . . . . . . . . . . . . . . . . . . . . . .9-48
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-54
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-56
Lesson 4: Configuring and Managing Routing Protocols . . . . . . . . . . . . . . . . . .9-57
Understanding Routing Protocols
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-57
Configuring RIP

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-58
OSPF Overview
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-61
Understanding DHCP Relay Agent
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-63
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-67
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-67
Lesson 5: Configuring Packet Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-68
Understanding Packet Filters
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-68
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-73
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-74
Table of Contents xvii
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-78
Key Topics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-78
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-79
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-80
10 Configuring and Managing Remote Access 10-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Lesson 1: Configuring Remote Access Connections . . . . . . . . . . . . . . . . . . . . 10-3
Using Dial-Up Networking
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Using Remote Access Client Addressing
. . . . . . . . . . . . . . . . . . . . . . . . . . 10-4

Configuring Remote Access Authentication
. . . . . . . . . . . . . . . . . . . . . . . .10-7
Practice: Creating a Dial-Up Access Server
. . . . . . . . . . . . . . . . . . . . . . . 10-19
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-22
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-23
Lesson 2: Authorizing Remote Access Connections. . . . . . . . . . . . . . . . . . . .10-24
Configuring Dial-In Properties of the User Account
. . . . . . . . . . . . . . . . . .10-24
Understanding Remote Access Policies
. . . . . . . . . . . . . . . . . . . . . . . . . .10-27
Exploring Remote Access Authorization Scenarios
. . . . . . . . . . . . . . . . . .10-34
Troubleshooting Dial-Up Remote Access Connections
. . . . . . . . . . . . . . . .10-39
Configuring Access Beyond the Remote Access Server
. . . . . . . . . . . . . . .10-40
Managing Remote Access Clients
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-42
Practice: Deploying Remote Access
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-47
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
Lesson 3: Implementing VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-49
Understanding Virtual Private Networks
. . . . . . . . . . . . . . . . . . . . . . . . .10-49

Troubleshooting Remote Access VPNs
. . . . . . . . . . . . . . . . . . . . . . . . . .10-55
Troubleshooting Router-to-Router VPNs
. . . . . . . . . . . . . . . . . . . . . . . . . .10-55
Configuring VPN Types
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-56
Practice: Configuring a VPN
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-61
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-67
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-68
Lesson 4: Deploying the Internet Authentication Service . . . . . . . . . . . . . . . .10-69
Exploring RADIUS Server Scenarios
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-69
Exploring RADIUS Proxy Scenarios
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-72
Deploying IAS as a RADIUS Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-74
Practice: Deploying a RADIUS Server
. . . . . . . . . . . . . . . . . . . . . . . . . . .10-78
Lesson Review
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-81
Lesson Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-81
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-82
xviii Table of Contents
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-83
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-84
Key Topics

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-85
Key Terms
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-85
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-86
11 Managing Network Security 11-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2
Lesson 1: Implementing Secure Network Administration Procedures . . . . . . . .11-3
Introducing Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . .11-3
Using Security Templates to Administer Network Security . . . . . . . . . . . . . . 11-4
Understanding Security Template Settings That
Affect Network Security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-12
Applying the Principle of Least Privilege. . . . . . . . . . . . . . . . . . . . . . . . . .11-13
Practice: Creating and Using the Security Configuration
And Analysis Console
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-14
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-22
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-23
Lesson 2: Monitoring Network Protocol Security . . . . . . . . . . . . . . . . . . . . . . 11-24
Understanding IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24
Negotiation Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27
Negotiation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-28
Understanding Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-39
Practice: Using Network Security Protocols . . . . . . . . . . . . . . . . . . . . . . .11-51
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-69
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-70
Lesson 3: Troubleshooting Network Protocol Security . . . . . . . . . . . . . . . . . .11-71
Problem 1: Making Your IPSec Policy Work . . . . . . . . . . . . . . . . . . . . . . .11-72
Problem 2: Determining Whether Your IPSec
Blocking Rules Are Working

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-73
Problem 3: Determining Whether Kerberos Is Being
Used for Authentication
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-74
Practice 1: Troubleshoot IPSec with IPSec Monitor . . . . . . . . . . . . . . . . . . 11-74
Practice 2: Troubleshoot Logon Issues with Network Monitor . . . . . . . . . . 11-77
Practice 3: Use Event Logs for Troubleshooting . . . . . . . . . . . . . . . . . . . .11-78
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-79
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-81
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-82
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-87
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-87
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-88
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-89
Table of Contents xix
12 Maintaining a Network Infrastructure 12-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Lesson 1: Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Using the Networking Tab in Task Manager . . . . . . . . . . . . . . . . . . . . . . . .12-3
Performance Console Differences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7
Monitoring Network Traffic with Netstat . . . . . . . . . . . . . . . . . . . . . . . . . . 12-13
Windows Server 2003 “Lite” and “Full” Network Monitor Tools . . . . . . . . .12-16
Practice: Sampling Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-20
Lesson 2: Troubleshooting Internet Connectivity . . . . . . . . . . . . . . . . . . . . . .12-21
Identifying the Specific Networking Issue . . . . . . . . . . . . . . . . . . . . . . . . 12-21
Verifying the Computer’s Network Settings . . . . . . . . . . . . . . . . . . . . . . .12-24
Bridging Multiple Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-26
Practice: Verifying the Configuration of DNS Forwarding . . . . . . . . . . . . . . 12-28

Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-28
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-30
Lesson 3: Troubleshooting Server Services . . . . . . . . . . . . . . . . . . . . . . . . .12-31
Diagnosing and Resolving Issues Related to Service Dependency. . . . . . . 12-31
Using Service Recovery Options to Diagnose and
Resolve Service-Related Issues
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-33
Practice: Configuring Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-38
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-39
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-40
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-40
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-42
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-42
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-43
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-44
Part 2
Prepare for the Exam
13 Implementing, Managing, and Maintaining IP Addressing (1.0) 13-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-4
Objective 1.1: Configure TCP/IP Addressing on a Server Computer . . . . . . . . . .13-6
Objective 1.2: Manage DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15
Objective 1.3: Troubleshoot TCP/IP Addressing . . . . . . . . . . . . . . . . . . . . . . . 13-27
Objective 1.4: Troubleshoot DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-35
xx Table of Contents
14 Implementing, Managing, and Maintaining Name Resolution (2.0) 14-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-3
Objective 2.1: Install and Configure the DNS Server Service. . . . . . . . . . . . . . .14-5
Objective 2.2: Manage DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-17

Objective 2.3: Monitor DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-28
15 Implementing, Managing, and Maintaining Network Security (3.0) 15-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-4
Objective 3.1: Implement Secure Network Administration Procedures . . . . . . . .15-5
Objective 3.2: Install and Configure Software Update Infrastructure . . . . . . . .15-16
Objective 3.3: Monitor Network Protocol Security . . . . . . . . . . . . . . . . . . . . . .15-20
Objective 3.4: Troubleshoot Network Protocol Security . . . . . . . . . . . . . . . . . .15-29
16 Implementing, Managing, and Maintaining Routing
And Remote Access (4.0) 16-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-4
Objective 4.1: Configure Routing And Remote Access User Authentication. . . . . 16-7
Objective 4.2: Manage Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-19
Objective 4.3: Manage TCP/IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-26
Objective 4.4: Provide Secure Access Between Private Networks . . . . . . . . . .16-33
Objective 4.5: Troubleshoot Client Access to Remote Access Services . . . . . . 16-38
Objective 4.6: Troubleshoot Routing and Remote Access Routing . . . . . . . . . .16-44
17 Maintaining a Network Infrastructure (5.0) 17-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-3
Objective 5.1: Monitor Network Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-4
Objective 5.2: Troubleshoot Connectivity to the Internet . . . . . . . . . . . . . . . . . 17-11
Objective 5.3: Troubleshoot Server Services . . . . . . . . . . . . . . . . . . . . . . . . . 17-16
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .G-1
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1
About This Book
Welcome to MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Man-
aging, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. This
book prepares you for the 70-291 exam by teaching you how to configure, manage,

and troubleshoot various aspects of a Microsoft Windows Server 2003 network infra-
structure. Each chapter walks you through the hands-on deployment and management
of these various aspects, including the network addressing, name resolution, routing,
remote access, and security. After you read this book, answer the associated questions,
and perform all of the exercises included, you will have gained a thorough understand-
ing of the essential components supporting Windows Server 2003 networks.
See Also For more information about becoming a Microsoft Certified Professional (MCM),
see the section entitled “The Microsoft Certified Professional Program” later in this introduction.
Intended Audience
This book was developed for information technology (IT) professionals who plan to
take the related Microsoft Certified Professional exam 70-291, as well as IT profession-
als who implement, administer, and support Windows Server 2003 networks.
Note Exam skills are subject to change without prior notice and at the sole discretion of
Microsoft.
Prerequisites
This training kit requires that students meet the following prerequisites:
■ 18 months professional experience working with Windows networks
■ Familiarity with networking concepts equivalent to that of a CompTIA Network+
certification
About the CD-ROM
This book includes a Supplemental CD-ROM. This CD-ROM contains a variety of infor-
mational aids to complement the book content:
■ An electronic version of this book (eBook). For information about using the
eBook, see the section “The eBooks” later in this introduction.
xxi
xxii About This Book
■ The Microsoft Press Readiness Review Suite, powered by Measure Up. This suite
of practice tests and objective reviews contains questions of varying degrees of
complexity and offers multiple testing modes. You can assess your understanging
of the concepts presented in this book and use the results to develop a learning

plan that meets your needs.
■ A Macromedia Flash introduction to Software Update Services (SUS).
■ An eBook of the Microsoft Encyclopedia of Networking, Second Edition, and of the
Microsoft Encyclopedia of Security provide complete and up-to-date reference
materials for networking and security.
■ Sample chapters from the following book titles give you additional information
and introduce you to other resources that are available from Microsoft Press:
❑ Microsoft Windows Server 2003 Administrator’s Companion by Charlie Russel,
Sharon Crawford, and Jason Gerend
❑ Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit
❑ Microsoft Windows Security Resource Kit
■ A 22-page white paper published June 2002, entitled “Software Update Services
Overview.” This paper provides a good introduction to SUS but does not cover
issues specific to Windows Server 2003.
■ A 95-page white paper published January 2003, entitled “Deploying Microsoft
Software Update Services.” This paper provides in-depth information about imple-
menting SUS on both Windows 2000 and Windows Server 2003 networks.
Important Although deploying SUS is not listed among the objectives for exam 70-291,
you may nevertheless see questions related to this topic on MCSE exams. It is therefore
highly recommended that you review these papers and practice deploying SUS on a test net-
work before taking exam 70-291.
■ SUS Server 1.0 with Service Pack 1 (SP1).
■ Automatic Updates client (SUS Server 1.0 with Service Pack 1 (SP1).)
■ SUS Server with SP1 Release Notes and Installation Instructions.
A second CD-ROM contains a 180-day evaluation edition of Microsoft Windows Server
2003, Enterprise Edition.
Important The 180-day evaluation edition provided with this training kit is not the full retail
product and is provided only for the purposes of training and evaluation. Microsoft Technical
Support does not support this evaluation edition.
About This Book xxiii

For additional support information regarding this book and the supplemental CD-ROM
(including answers to commonly asked questions about installation and use), visit the
Microsoft Press Technical Support Web site at
You can also e-mail or send a letter to Microsoft Press, Attn:
Microsoft Press Technical Support, One Microsoft Way, Redmond, WA 98052-6399.
Features of This Book
This book is divided into two parts. Use Part 1 to learn at your own pace and practice
what you’ve learned with practical exercises. Part 2 contains questions and answers
that you can use to test yourself on what you’ve learned.
Part 1: Learn at Your Own Pace
Each chapter in Part 1 identifies the exam objectives that are covered within the chap-
ter, provides an overview of why the topics matter by identifying how the information
applies in the real world, and lists any prerequisites that must be met to complete the
lessons presented in the chapter.
The chapters are divided into lessons. Lessons contain practices made up of one or
more hands-on exercises. These exercises give you an opportunity to use the skills
being presented or explore the part of the application being described. Each lesson
also has a set of review questions to test your knowledge of the material covered in the
lesson. The answers to the questions are found in the Questions and Answers section
at the end of each chapter.
After the lessons, you are given an opportunity to apply what you’ve learned in a case
scenario exercise. In this exercise, you work through a multistep solution for a realistic
case scenario. You are also given an opportunity to work through a troubleshooting lab
that explores difficulties you might encounter when applying what you’ve learned in
this book on the job.
Each chapter ends with a summary of key concepts, as well as a short section listing
key topics and terms you need to know before taking the exam, summarizing the key
learnings with a focus on the exam.
Real World: Helpful Information
You will find sidebars like this one that contain related information you might

find helpful. “Real World” sidebars contain specific information gained through
the experience of IT professionals like you.
1-xxiv Chapter # Chapter Title
Part 2: Prepare for the Exam
Part 2 helps to familiarize you with the types of questions that you will encounter on
the MCP exam. By reviewing the objectives and the sample questions you can focus on
the specific skills that you need to improve before taking the exam.
See Also For a complete list of MCP exams and their related objectives, go to
/>Part 2 is organized by the exam’s objectives. Each chapter covers one of the primary
groups of objectives, called Objective Domains. Each chapter lists the tested skills you
need to master to answer the exam questions and includes a list of further readings to
help you improve your ability to perform the tasks or skills specified by the objectives.
Within each Objective Domain, you will find the related objectives that are covered on
the exam. Each objective provides you with several practice exam questions. The
answers are accompanied by explanations of each correct and incorrect answer.
Note These questions are also available on the companion CD-ROM as a practice test.
Informational Notes
The following types of reader aids appear throughout the training kit:
Tip Contains methods of performing a task more quickly or in a not-so-obvious way.
Important Contains information that is essential to completing a task.
Note Contains supplemental information.
Caution Contains valuable information about possible loss of data; be sure to read this
information carefully.
Warning Contains critical information about possible physical injury; be sure to read this
information carefully.
xxiv About This Book
About This Book xxv
Planning Contains hints and useful information that should help you plan an implementa-
tion.
Security Alert Highlights information you need to know to maximize security in your work

environment.
Exam Tip Flags information you should know before taking the certification exam.
!
Off the Record Contains practical advice about the real-world implications of information
presented in the lesson.
Notational Conventions
The following conventions are used throughout this book.
■ Characters or commands that you type appear in bold type.
■ Italic in syntax statements indicates placeholders for variable information. Italic
is also used for book titles, URLs, and key words and terms when they are first
introduced.
■ Names of files and folders appear in Title caps, except when you are to type them
directly. Unless otherwise indicated, you can use all lowercase letters when you
type a filename in a dialog box or at a command prompt.
■ Filename extensions appear in all lowercase.
■ Acronyms appear in all uppercase.
■ Monospace type represents code samples, examples of screen text, or entries that
you might type at a command prompt or in initialization files.
■ Square brackets [ ] are used in syntax statements to enclose optional items. For
example, [filename] in command syntax indicates that you can choose to type a
filename with the command. Type only the information within the brackets, not
the brackets themselves.
■ Braces { } are used in syntax statements to enclose required items. Type only the
information within the braces, not the braces themselves.

×