Sunteți pe pagina 1din 91

~1~

MCSE (Microsoft Certified System Eng.)


CCNA (Cisco Certified Network Associate)

NETWORKING

NETWORK INTRODUCTION:- Connectivity two or more P.C. with any transmitter


media is known as Network.

NETWORKING INTRODUCTION:- After conn


ection the sharing of data and resourcing is known as Networking.

TYPE OF NETWORK

According to distance cover:-


(1) LAN:- Local Area Networking (With in 1 Km)
(2) MAN:- Metropolitan Area N\W (With in 10 Km)
(3) CAN:- Campus Area N\W (Group Network) (Ex. Bank Network)
(4) WAN:- Wide Area N\W (Above 10 Km) (Multiple)

According to Work:-
Peer to Peer Networking (Working Model)
Client Server Networking (Domain Model)

Benefit Of Network
Exchange Server
Novel Network

Network Terms:-
(1) Server :- Who gives the services to client.
(2) Client:- who accept the services from sever.
(3) Workstation
(4) Host:- The terms IP Address Used.
(5) Node:- Any devices which can communicate each other in a network is known as
node.
(6) Segment :- A group of P.C. is known as Segment.
(7) Back Born:- That wire who connect the all P.C.
~2~

Requirement of Networking :-
(1) Two or more P.C. (LAN card/ Ethernet)
(2) Transmission media (Hub, Cable, Punching tools etc)
(3) Protocol:- TCP/IP Address.

(1) It is printed circuit board which used to connect P.C. with transmission media. It may
be 8 bit, 16 bit, 32 bit, 64 bit, each any (Media Access control)/ ether net Address/
Physical address. It is a 48 bit binary address which is represented by 12 digit Hexa
Decimal No. The first 6 digit re-present the many feature date and last 6 digits re-
present the model no.

Command :- IP Config/All
C:\> IP Config/All
Physical Address------------
---------------------------------
Ethernet Frame Size:- source MAC + diction MAC2 + CRC (Checking Error)
1512 Byte- Around 1500 Byte

Transmission Media:- There are two part of transmission media


Bounded Unbounded
Physical Cable Logical Connection
Wire Wireless
(1) Co Axial Blue tooth
(2) Twisted Pair Infrared
(3) Fibro Pair Radio Wave
Satellite

Selection of Cable Depend Upon:-


(1) Cost
(2) Speed
(3) EMI (Electro magnetic Interface)
(4) Avis Dropping (distance)
(5) Tapping
(6) Ease of Installation

Twist Pair Cable:- There are two part of twist pair cable
(1) STP (Shielded Twisted Pair)
(2) UTP(Unshielded Twist Pair)

(1) Twist Cable :- Twist can minimize the interface (Cross talk)
(2) Straight Cable:- Use to connect between two difference devises Ex.:- P.C. to Hub, P.C.
to Switch, Hub/Switch to Printer.
(3) Cross cable:- Use to connect Between Same devices Ex. P.C. to P.C., Hub to Hub,
Switch to Switch, Switch to Hub.
~3~

Use:- Uplink to Uplink :- Cross cable


Uplink to Normal:- Straight cable
Normal to Normal:- Cross cable

TOPOLOGY (Physical Layout of N/W)

Type Of Topology:-
(1) Star
(2) Bus
(3) Ring

(1) Star :- All system are connected together with a central connecting devices known as
hub or switch.
Connector:- RJ-45 (Register jack 45)
Cable:- Straight cable (UTP)

HUB Switch

(1) Single broad cast domain. (1) Single broad cast domain
(2) Single collision domain. (2) Multiple collision domain.
(3) Divide the frequency. (3) Can not divide the frequency.
(4) First layer devices(Physical layer devices) (4) Second layer devices (date link layer devices)

PROTOCOL

Sets of role and regulation for communicating between two or more devices. There are three
type of protocol.
(1) TCP/IP :- Transmission control Protocol / Internet Protocol.
(2) IPX / SPX :- Internetworking packet exchange / Sequent packet exchange (Novel)
(3) Net BEUT :- Network Bios Exchange User Interface. (IBM)

IP Address :- (1) 32 bit binary address, which is represented dotted decimal no.
(2) it is combination network & host address.

8 bit 8 bit 8 bit 8 bit

Class :- A Network address Host address Host address Host address

(1.126) A= Total No. of N/w = 2N (N = No. of network bit & n= No. of Host Bit)

Class :-B Network address Network address Host address Host address
~4~

(128-191) B= Total No. of N/w = 2N

Class :-C Network address Network address Network address Host address

(192-223) C= Total No. of N/w = 2N

Class :- D Multi cast

Class :- E R& D

Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop
back adaptor diagnostic purpose.

FILE SYSTEM

There are three type of file system.


(1) FAT 16 (File allocation table 16)
(2) FAT 32 (File allocation table 32)
(3) NTFS (New technology file system)

Difference between FAT 16, FAT 32, NTFS


FAT 16 FAT 32 NTFS
HDD Support 2 GB 2 TB 16 EB
Cluster Size 32 KB 4 KB 512 Kb
Security NO NO YES
Quota NO NO YES
Inscription NO NO YES
Operating System DOS/ Win 9x/ NT/ 2000/ Win98 /ME / 2000 / XP/ Win NT/ 2000/ XP/
XP/ 2003 2003 2003

PARTITION

Logical division of HDD is known as partition.

Types of partition
(1) Primary Dos Partition :- Active Partition
(2) Extended Partition :- Logical Drive

How to create the partition:-


~5~

(1) Fdisk
(2) Disk Manager (DM)
(3) Pro Magic (With out formatting)

Command :- System Transfer Command :- A:\ sys c:


~6~

MCSE FIRST PAPER


Code :- 70-270 Windows XP

Topic

(1) Installation of Windows XP.


(2) User & Group Management
(3) Local Security Policy
(a) Password Policy
(b) Account Policy
(c) Audit Policy
(d) User Right Policy
(e) Security Option
(4) User Profile & Hardware Profile
(5) TCP/IP Configuration
(a) IP configuration
(b) Ping
(6) Sharing / Mapping & Offline Folder
(7) NTFS Feature
(a) Disk Quota
(b) EFS:- (Encrypted File System)
(c) Compression
(d) File & Folder Level Security
(8) Dial up Connection & Internet Sharing
(9) NT Backup & Restore
(10) Trouble shooting
(a) System State Backup
(b) A.S.R. :- (Automatic System Recovery)
(c) Recovery Console

INSTALLATION XP

Minimum Requirement of Win XP.

(1) CPU P-1 (133 MHz), Recommended :- (233 MHz)


(2) REM – 64 MB, Recommended :- 128 MB
(3) HDD – 1500 MB, Recommended :- 1.5 GB
(4) CD :- Software XP
(5) CD ROM :- 12X (X= 150 Kbps)
~7~

Installation :-
(1) Boot the system with Win XP Bootable CD & then press any key to installation….

(2) Boot the system with Win 98 startup disk / CD.

CD ROM drive Suppose d:…………………


A:/> d:
Remove the Win98 CD & then Insert the Win XP CD which contain the file (I386)
D:/> CD I386
D:/I386/> WinNT.exe

(3) For duel Booting


Start :- Run :- Commend (CD Drive d:/I386/WinNT32.exe)

(4) Unattended Installation :- ( Through Answering File)

Requirement Win2000, Win XP, Win 2003


(A) Create Folder on Any drive {any name(deploy)}
(B) Insert Win2000, Win XP, Win 2003
(C) Open :- Support / Tools/ Deploy. cab
(a) Select all file.
(b) Right Click
(c) Extract
(d) Path Your Create Folder (Your Name)
(e) Open the Folder (Deploy {Your name})
(f) Run Setup Manager. Exe
(g) Welcome to the setup manager wizard
He ask me to choose the one topic
(a) Create a New answering File
(b) Modify Exacting file
We Choose the first topic. And than next and set the appropriate answer and than
save this file to floppy drive.

(5) Rom drive:/ I386/ WinNT32.exe. / Unattended C:\text\ unattended


(6) RIS Installation (Remote Installation Server)
~8~

User & Group Management

(1) My Computer :- First of all to right click the My computer and then select the
manage & see the table :-
Computer Management
Computer Management
(-) System Tools
(+) Event Viewer
(+) Shared folder
(+) Local User and Group (Click this)
(+) Performance Logs and Alerts
Device Manager
(-) Storage
(+) Removable Storage
Disk Defragmenter
Disk Management
(+) Services and Application

Click the Local User and Group and show the two icon (1) User (2) Group. Right click the
User and create the new user. And saw the table to create the new user.
New User

User Name :-

Full Name :-

Description :-

Password :-

Confirm Password :-

[] User Must Change Password at next logon


[] User cannot change password
[] Password never expires
[] Accounts is disabled
~9~

(2) Click the start menu and click the setting and then open the control panel. And choose the
Computer management or User Account to create the New User.

Command to User Create :- lusrmgr.msc

(3) Click the start menu and click the ran command :- MMC (Microsoft Management
Control).
Add:- Add/ Remove Snap.in :- Local User & Group :- Add :---------------Close
(All Time Save).

Local Security Policy

Policy implemented on machine net far User & Group.

Command :- secpol.mse
Command :- MMC
Start :- Ran :- secpol.mse
Start :- Program :- Administrative Tools :- Local Security Policy

Local Security Settings


Security Setting
[+] Account Policies (Click This) Password Policy (Click this) Enforce Password History
[+] Local Policies Account Lockout Policy Maximum Password Age
[+] Public Key Policies Minimum Password Age
[+] Software Restriction Policies Minimum Password Length
[+] IP security Policies on Local Comp. Password Must meet Com…
Store Password using revere..

Enforce Password History :- (Enable/ disable) 0 to 24


Maximum Password Age :- 42 days / (0-999)
Minimum Password Age :- (0+999)
Minimum Password Length :- 0 to 14 Character
Password Must meet Com… :- Enable
Store Password using revere... :- Enable Reversibility
~ 10 ~

Account Lockout Policy

There are three types of Account Lockout Policy.


(1) Account Lockout Duration :- XX Minute
(2) Account Lockout Threshold :-2 Invalid Logon (0 to 999)
(3) Reset Account Lockout Counter After :- XX minute

Group
Identity:-
(1) Collection Of User is known as Group
(2) If you have to set right & permission to more then one user, then set right /
permission on group & add user to this group.

There are two type of group


(1) Local Group
(2) Domain Group

Local Group Domain Group

(1) Creation local PC that is Win XP / Win 2003 (1)Creation on DC


member server.
(2)Right & Permission are set locally. (2)Right & Permission are set Globally (Entire
Network)
(3) Store the information in SAM (Security (3) Store the information in Active Directory
Account Manager) Database.

Local Group

There are two type of Local Group.


(1) Built in Local Group
(2) Built-in Special Group(System Group)

Built in Local Group Built-in Special Group (System Group)


(1) It reside in Local & Group Folder. (1) Can not reside in Group Folder.
(2) You have to add the User in this (2) Can not add.
Group.
(3) Ex.:- Administrator, Guest, Power (3) Everyone.
User, Backup Operator, Network
Configuration, User (Ordinary User)
~ 11 ~

To create the group there are two step of to create group.


(Step 1) Click the start menu and Ran command (lusrmgr.msc)

Local User & Group

Local user & Group

User
Group (Right Click) Group Name:- (255 character)
Description :- Optional
Member :- Optional

Add:- Select User:- Advanced :- Find Now

(Step 2) Click the start menu and Ran command (secpol.msc)


Security Settings Audit Policy Select Right(Log on
[+]Account Policies User Right Assignment (Click locally) :- Open :- Add :-
[+]Local Policies (Double Click) Open) Select User & Group:-
[+]Public Key Policies Security Option advanced :- Find Now :-
[+]Software Restriction Policies Ok
[+]IP Security Policies on Local
Computer.

Sharing, Mapping & Offline File

(1) Sharing :- it is used to show the file and folder and changing and saving to another
computers this is type of sharing,

C:$
D:$
E:$
These drive already share but hidden to (Administrator Control)

Step (1) :- Start menu :- Run :- Computer Name (IP Address) :- (192.168.0.2\c$)
Step (2) :- Computer management And Share folder
Step (2) :- Data :- Right Click:- Share & Security :-
~ 12 ~

Do not share this folder


Share this folder
Share name :-
Comment :-
User limit :- Maximum Allowed
Allow this number of user
Permissions
Caching
New share
Ok Cancel apply

Permissions :- Everyone :- Full Control


Change
Read ok

Mapping

It used to a share folder as a drive & Icon then you have to make network drive.

Step (1)Start :- Run :- IP address :-

Step (2)Data :- Right Click :- Map Network Drive

Step (3) My computer or Network :- Right Click :- Map Network Drive :- Path(//Computer
name{IP address}/share folder).
[] Reconnect at logon Ok.

Offline File

If you want to access the shared resources, when the network is break, then use offline
file(Folder).

Step (1) :- Start :- Setting :- Control Penal :- Folder Option :- Offline file.
[] Enable Offline
[] Synchronize offline files when logon
[]Synchronize offline file when log off
Apply ok

Step (2) :- Start :- Run :- (IP address[//192.168.0.2]) :- data :- right click:- make available
offline :- ok
~ 13 ~

NTFS FEATURE

It used to specify the disk space to a particular user.

Step (1) :- Logon as a administrator :-


Right click on any drive (c:, d:, e:,)
Properties
Quota tab
[] Enable Quota management
[] deny disk space to users exceeding quota limit

Click the Quota Entries And Click the Quota menu and create the new Quota entry and then
select the user and then limit the Quota.

Quota Entries :- Quota menu :- New Quota Entry :- Select User :- Limit Quota

E.F.S. (Encrypted File system)

(1) It is a feature of win XP/ Win 2000/ Win 2003.


(2) It is a user level security.
(3) It used to convert the plan text of data to encrypted from that is cipher text.

Step :- Logon as user (User name) and create a folder to any drive and right click the this
folder and click the properties and then click the advanced and we click the encrypt content
to secure data and click ok and click and then apply changes to this folder, subfolder and file
and apply.

Logon as a user:- create a folder :- right click :- properties :- advanced :- click the encrypt
content to secure data. :- apply :- apply changes to this folder and subfolder and file :- ok

(Compression)

It used to compress the file and folder and save the disk space.

Step :- Same step like that EFS.

Note :- Compress and Encrypt are usually apposite to each other.


~ 14 ~

File and Folder Level Security

Folder level security (Permission) :-


Data :- Sub folder :- file
Right click the data
Security
Advanced
Remove the click to Inherit from parent the permission
Click the remove
Apply ok
Add
Advanced
Find now
Select user
Select administrator
Ok
Set the permission

Permission Allow Deny

Full control [] []
Modify [] []
Read & Execute [] []
List Folder Contents [] []
Read [] []
Write [] []
Special Permission [] []
~ 15 ~

CLIENT – SERVER

Domain :- It is a logical grouping of Computer in a network.

Domain Controller :- The Machine which control the active directory services is known as
domain controller.

Active Directory :- It is a directory services in win2000/ win 2003 server operating system
which Constance the information of network servers in hole network. & easy to locket and
mileage this resource.

Requirement of Domain Controller:-


(1) Win 2000/ Win2003 server.
(2) At least one NTFS Vol.
(3) TCP/IP configuration
(4) Administrative privilege.

Command :- DCPROMO
(Domain Controller Promo)
Step to create the domain

Start :- Run :- Command (dcpromo) :- Next :- Next :- (choose the one topic)
(1) Create a new Domain tree (Click this )
(2) Additional Domain

And then

Create a new domain tree in a new forest (Choose the one topic)
(1) Child Domain Controller
(2) New Domain tree in exacting forest. (Click this)

And then

Enter the DNS Name (Domain Name Services) :- Vikrant.com

Enter Net bios Name :- Vikrant

Next :- Next :-
~ 16 ~

Install a configure DNS


Next :- Finish :- Restart

Command :- (1)dcpromo /forceremoval (To remove the domain)


(3) dsa.msc (To create the user)
(4) gpupdate /force
(5) Netdom /Query Fsmo (To check the server)

Client Server :- these step for create client server

Logon the administrator:-


My computer:- Right click:- Properties :- Computer Name :- Change:-
(1) Domain ( Click this)
(2) Workgroup

User name :- Administrator


Password :- -----------------
Next :- ok : Restart

User Profile
It is used to set the computing environment of each user that is it used to set the desktop
setting, start menu setting, favorites setting, cookies etc.

Type of User Profile

(1) Local User Profile (Default Profile) :- It automatic creative when user logon first
time. Its settings are save in document & setting folder.
(2) Roaming Profile :- It setting are environment of entire network, when user logon
from in any computer in a network or when user change its desktop setting it update
on server after logoff.

Step :-
(1) Logon as Administrator.
(2) Create a folder on any NTFS Vol. with full control sharing permission.
~ 17 ~

(3) Open User properties (start-run-dsa.msc-create user)


(4) Select Profile tab.

\\IPAddress\shared folder\user name


Local path

\\Computer name\shared folder\%username%


Apply ok & Log on as a User

(3) Mandatory Profile :- Implemental of entire network when user changes its setting
from network then it can not update on server after user logoff.

Step :-
(1) Logon as user
(2) Open shared folder
(3) Open user folder
(4) Show all hidden file with extension name.
(5) Rename NTUSER.DAT to NTUSER.MAN
(6) Right click to NTUSER.DAT
(7) Advanced
(8) Encrypt
(9) Every lots
(10) logoff & then logon

TCP/IP (Transmission Control Protocol/ Internet Protocol)

Number System:-
(1) Binary system :- Base-2 0,1
(2) Octal No. :- Base-8 0,1,2,3,4,5,6,7
(3) Decimal No. :- Base-10 0,1,2,3,4,5,6,7,8,9
(4) Hexa Decimal :- Base-16 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

It is a combination of two protocol TCP/IP. It develop by DOD (Department of defiance) in


U.S. Used by ARPA (Advanced Recharge Project Agency) and first time used by IANA
(Internet Assuaged Numbering Authority ).

TCP work on 4th layer (Transport layer)


IP work on 3ed layer (Network layer)

IP Address :-
(1) It is a numerical No of each machine in IP Address.
(2) It is a software Address
(3) It is a 32 bit binary Address which is represented on 3 dotted decimal No.
~ 18 ~

(4) It is combination of Network Address and Host Address.


(5) It is divide into classes.

The first Octed (Byte) of IP Address represent the classes

8 bit 8 bit 8 bit 8 bit

Class :- A Network address Host address Host address Host address

(1.127) A= Total No. of N/w = 2n (n = No. of network bit)

Class :-B Network address Network address Host address Host address

(128-191) B= Total No. of N/w = 2n -2

Class :-C Network address Network address Network address Host address

(192-223) C= Total No. of N/w = 2n -2

Class :- D Multi cast

Class :- E R& D

Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop
back adaptor diagnostic purpose.

Class A: - The deplorer of IP Address set that, first bit in first Byte is always off.
Class B:- The first bit is always on and second bit is always off.
Class C:- The first two bit is always on and the third bit is always off.

Note :- Reserved Address


(1) All network Address is set to 0.
(2) All network Address is set to 1 (subnet mask).
(3) Address 127.0.0.1, or 127.255.255.255 are not used (Loop Back)
(4) All Host Address is set to 0 Network address.
(5) All Host Address is set to 1.
(6) All bit is set to (32 bit) Default rout of router.
(7) All bit to 1 , 255.255.255.255 are not used.
~ 19 ~

Private IP Address

It is used for Private Network.

Class A:- 10.0.0.0 To 10.255.255.255


Class B:- 172.16.0.0 To 172.31.255.255
Class C:- 192.168.0.0 To 192.168.255.255

Total No. of Network = 2N (N:- No. of Network Address)

Host per Network = 2n -2 (n:- No of Host Address)

Class A:-

Total No of Network = 2N
= 27 = 128

Host per Network = 2n -2


= 224 -2 = 16777216

Class B:-

Total No of Network = 2N (N= 6+8)


= 26*28 = 16384

Host per Network = 2n -2 (n:- 16)


= 216 -2 = 65534

Class C:-

Total No of Network = 2N (N= 5+8+8)


= 25*28*28 = 2097152

Host per Network = 2n -2 (n:- 8)


= 28 -2 = 256-2 = 256

Subnet Mask
Subnet Mask represented the Computer in a Network default Subnet Mask.
~ 20 ~

(1) A:- 255.0.0.0


(2) B:- 255.255.0.0
(3) C:- 255.255.255.0

Dial Up – Connection

Modem {Modulation & Demodulation}

Step 1 :- Install Modem & Then Configuration

Step 2 :- Start :- Setting :- Network Connection :- New Connection Wizard :- Next :- Click
the Connect to the Internet :- Click the Connect using Dial up Mode :- ISP Name :- Airtel :-
Phone No :-
User Name(Phone No.) :- Password :- Add Shortcut :- Finish.

Backup & Restore

Backup Devices:-
(1) FDD
(2) HDD
(3) CD R/W
(4) DVD R/W
(5) Pen Drive
(6) Zip Drive (100 MB + 250 MB)
(7) LS 120
(8) Jizz Drive
(9) SAN

Types of Backup:- There are five type of Backup.

(1) Normal Backup


(2) Incremental Backup
(3) Differential Backup
(4) Copy Backup
(5) Daily Backup
~ 21 ~

(1) Normal Backup:- The Backup select all file and folders during Backup (First Time).
It clear the Archive Attribute.

(2) Incremental Backup:- The Backup select all file and folder after Normal Backup or
Incremental Backup, that is creative or modified. It also clear the Archive Attribute.

(3) Differential Backup :- The Backup select all file and folder which is creative or
modified after each normal or Incremental Backup. It set the Archive Attribute.

(4) Copy Backup :- The Backup select all file and folder during consecutive to
Incremental Backup it also set the Archive Attribute.

(5) Daily Backup :- The backup select all file and folder which is creative or modified
per day. It also set the Archive Attribute.

COMMEND :- NTBACKUP (TO BACKUP & RESTORE)

Step1:- Start :- Run :- NTBACKUP

Step2:- Start :- Program :- Accessories :- System Tools :- Backup :- Advanced:-


(1) Backup (Click this)
(2) Restore
(3) A.S.R. :-

(1) Backup every thing on my computer


(2) Backup selected File , Drive or Network data (Click this)
(3) Only Backup the System state backup.

:-Item to Backup
+ My Computer Select file and folder which is used to Backup
+ My Documents
+ Network Places

Next :-

Choose a place to save your Backup


Type a name for the backup

Next:-
~ 22 ~

Advanced :-

Select the type of Backup


Normal Backup (Select this)
Incremental Backup
Differential Backup
Copy Backup
Daily Backup

Select the option you want to user (Next)

Append this backup to the exacting Backup

(1) Low
(2) Letter (Click this)

Schedule Backup
Finish

Note:-
(1) Boot Drive :- Contains Windows (System Root)
(2) System Drive :- Contain Booting file always C: (Primary Partition)
(3) Booting File :- NTLDR, Boot.INI, NTdetect.com, Bootsect.doc, NT boot dd.sys,
NToskrnl.exe

Recover Console
It is a command pro console through which you have repair operating System, like create a
format partition, start and step services, repair MBR (Master Boot Record).

Command :- I386\WinNT32.exe\ Cmdcons

Disable Mouclass (device)


Enable Mouclass (Device) Service_System_Start

Dcgpofix (Domain Controller Group Policy Disable)


MMC:- RSOP:- Right Click:- Garnet Policy:- Normal:- Fix MBR
(Master Boot Record)
~ 23 ~
~ 24 ~

Second Paper

Code :- 70-290

(1) Over View Of DC / ADC / CDC


(2) Terminal Service
(3) I I S ( Internet Information service)
(4) Disk Management
(5) Print Management
(6) MBSA / SUS

I I S( Internet Information Service)

It is used to create the Website in Local Area Network Or Entire Network.


(1) HTTP:- (Hyper Text Transfer Protocol)
(2) FTP :- (File Transfer Protocol)
(3) NNTP :- (Network Newed Transfer Protocol)
(4) SMTP :- (Simple Mail Transfer Protocol)
(5) SNMP :- (Simple Network Management Protocol)
(6) POP :- (Post Office Protocol)

Step 1 :- Start :- Setting :- Control Panel :- Add \ Remove Program :- Add \ Remove
Window Components :- Application Server :- Details :- Select the I I S :- Details :- Select the
FTP :- Next :- Ok :- Finish.

Step 2 :- Open TCP / IP Properties :- Advanced :- IP Address :- Add IP Address


(192.168.0.22, 192.168.0. 23……………..etc)

Step 3 :- Create a Folder :- Text (Share this folder) :- Notepad (Massage) :- Save :- File
Name (Vikrant.html).

Step 4 :- Start :- Program :- Administrator Tools :- I I S


~ 25 ~

Start :- Run :- Command intermgr.msc

Command :- Intermgr.msc

+Com
+
+
+
+ Website (Right Click)

New Site :- Description :- XYZ :- Assigned IP Address (192.168.0.20 ……….)


Port :- 80 ……..
:- Path (Vikrant.html) File :- Permission (Read Write Brows etc) :- Next :- Finish

Terminal Server
There are two part of Terminal Server

(1) Remote Administrator Mode


(2) Application Mode

Requirement of Terminal Server

(1) Window 2000 or Window 2003 server.

Step 1 :- Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window


Component :- To select the Terminal Server :- Yes :- Next :- To select the Full Security :-
Next :- Finish :- Restart.

Step 2 :- Start :- Run :- TSCC.MSC


Start :- Program :- Administrator tools :- T.S. Configuration.

T.S. configuration
+ Connection R.D.P(Remote Desktop Protocol) - TCP
:-Right Click
:- Properties
:- Add User
:- Set Permission
:- [] Full control
~ 26 ~

[] User Access
[] Guest Access
[] Special Permission
:- Apply :- ok

On Clint
Window XP / Window 2003

In Built :- Remote Desktop Connection (R.D.C.)


Start :- Program :- Accessories :- Communication R.D.C.
:- Brows
Connect
User Name:- Administrator
Password :--------------------

On Clint (Win95/98/NT/2000)
T.C. Clint :- Share
Windows \ system 32 \ Clint
Run: - \\192.168.0.100 :- T.C. Clint: - Win32 Setup.exe

(2) Application Mode:-

Step 1 :- As a TIS IST


Step 2 :- Start :- Run :- DSA.MSC
Add User Component
+ Built in
+ Computer
+
+
+ User (Vikrant Kumar) Select

Select User (Vikrant Kumar):-


Properties:-
Environment:-
[] Start the following Program at log on
%system%system32/msword.exe

OK

Disk Management

There are two type of disk management


~ 27 ~

(1) Basic Disk


(2) Dynamic Disk

Basic Disk Dynamic Disk


(1) Dos/win95/98/NT/2000/XP/2003 (1) Win2000/XP/2003
(2) Partition (2) Volume
(3) Boot Partition (3) Boot Volume
(4) System Partition (4) System Volume
(a) Simple Volume
(b) Spanned Volume
(c) Stripe Volume
(d) Mirror Volume
(e) RAID-5 Volume

Basic to Dynamic Disk Convert

Minimum 1MB of free space


Start :- Run :- Compmgmt.msc :-
Computer Management

[-] System Tools


[+]Event Viewer
[+]Shared Folder
[+]Local User And Group
[+]Performance Logs and Alerts
Device Manager
[-] Storage
[+]Removable Storage
Disk Defragmenter
Disk Management
[+] Service and Application

Command :- Compmgmt.msc

Basic Disk C: D: Unattended


(Right Click)
~ 28 ~

Right Click:-
Convert Dynamic Disk :-
Disk Drive:-
Convert :-
Restart

Simple Volume :- Used to Create a Simple Volume a single Dynamic Disk. It can be
extended.

Spanned Volume: - Used to Create a Spanned Volume on 2 to 32 Hard disk (Dynamic Disk)
data store frequently on a disk. It cannot support fault tolerance it increase the disk space but
not this performance. It can be also extended.

Stripe Volume: - Minimum 2 to 32 Hard disk. Data stores sequence on a stripe. It increase
the disk performance but cannot support fault tolerance. It can not be extended. It is also
known as RAID-0 (Redundant Array Inexpensive Disk-0).

Mirror Volume :- Minimum 2 to 32 Hard disk. It automatically copy the data from one
Hard disk to another Hard disk (Image). It support full fault tolerance with operating system.
It can not improve the disk performance 50% is off disk space useless unless fault access.

RAID-5 :- Minimum 3 to 32 Hard disk. Data store sequence on a stripe set with parity. It
support fault tolerance and improve the disk performance. 33% of disk space is useless.

Printer Manage
There are two type of Printer.
(1) Local Printer
(2) Network Printer

(1) Local Printer :- Directly Connected on P.C.


(2) Network Printer:- Connected through other P.C. directly connected on hub/switch.

Printer Device :- It is a physical component which is used to print the hard copy of data.

Printer :- It is a software drive of print device, which is used to communicate between P.C.
(Operating system) and print device. It is different for different print device.

Print Pooling:- It is a one or more INF File, which is used to convert the print command
into a proper format that accept the print device.

P.C. P.C. P.C. P.C. P.C.


~ 29 ~

HP DeskJet Driver :-

Properties :- Port :- [] Enable Pooling.


Printer

Hub/ Switch

Printer

Printer

Manufacture & Model

Print Queue :- It Temporary Storage location on print sever that store the all printing
document on Entire Network.

Print Server:- The P.C. (Machine) which contain the printer driver.

Step 1 :- Start :- Setting :- Printer :- Add Printer :- Next :- [] Local Print attach the
computer :- Select One type:-
[] Select port (LPT) line printer terminal
[]Create a new port (Hub/Switch)
:- Standard TCP/IP address :- IP address:- 192.168.0.10:-
Standard Jet Direct :-
Manufacture :- ---------HP
Model No.:- DeskJet 465:-
Printer Name :-DeskJet465:- Shared As (HP DeskJet) :- Next :- Text Page:- Finish

Start :- Run :- [\\192.168.0.10]

Printer Security :-
[HP DeskJet645] :- Right Click :- Properties:- Security :- Add User & Group :- Set
Permission:-
~ 30 ~

Allow Deny

Print [yes] []

Print Document [] []

Manage Printer [] []

MBSA (Microsoft Base Line Security Analyses)

It is used to analyses the correct security patches of system tool in a Network. It is


downloaded by Microsoft Website.

SUS (Software Update Services)


It is used to update the P.C. in Intra net threw SUS server.

Requirement :- window 2000 server with service pack 2 / window 2003 server
(1) IE [Internet Explorer]
(2) IIS
(3) RAM :- 1 GB
(4) HDD :- 2 GB (100 MB for SUS Server)
(5) Internet Connection
(6) SUS :- It is download by Microsoft website (33MB) :- Install:- client :- window
2000SP-2 / XP-SP1, Window 2003
~ 31 ~

Third Paper

Code :- 70-291 (Network Infrastructure)


70-293 (Network Infrastructure Design)

N.I (Network Infrastructure)

(1) O.S.I (Open System Interconnection)


(2) Sub Netting
(3) DHCP
(4) DNS
(5) WINS
(6) RAS & VPN
(7) Radius
(8) IP Security
(9) Network Monitoring Tools
(10)Certificate Server
(11)NAT
~ 32 ~

Host Subnet Mask No. Of Sub Block Size 2n Host Per Network
network 2N 2n-2
10000000 192.168.0.128 2 (21) 27 27-2 = 126
11000000 192.168.0.194 4 (22) 26 26-2 = 62
11100000 192.168.0.224 8 (23) 25 25-2 = 30
11110000 192.168.0.240 16 (24) 24 24-2 = 14
11111000 192.168.0.248 32 (25) 23 23-2 = 6
11111100 192.168.0.252 64 (26) 22 22-2 = 2
11111110 192.168.0.254 X 21 21-2 = 0
11111111 192.168.0.255 X 20 20-2 = 0

Sub Netting

The division of a large Network into a small Network is known as sub netting. It redoes the
collision. It saves the IP Address.

Class C:- Table (192 to 223)


N:- No of Network (1 form)
n :- No of Host (0 form)

For Ex:- I have to use 62-62 P.C. In 4 Sub Network.


Subnet Mask Valid IP Address Broadcast Address
192.168.10.0 192.168.10.1 To 192.168.10.62 192.168.10.63
192.168.10.64 192.168.10.65 To 192.168.10.126 192.168.10.127
192.168.10.128 192.168.10.129 To 192.168.10.190 192.168.10.191
192.168.10.192 192.168.10.192 To 192.168.10.254 192.168.10.255
~ 33 ~

Class B :- Table (128 to 191)


N:- No of Network (1 form)
~ 34 ~

n :- No of Host (0 form)

Host Subnet Mask No. of Sub network 2N Block Size 2n Host Per Network 2n-2
10000000,00000000 255.255.128.0 2 (21) 215 215-2 = 32766
11000000,00000000 255.255.192.0 4 (22) 214 214-2 = 16382
11100000,00000000 255.255.224.0 8 (23) 213 213-2 = 8190
11110000,00000000 255.255.240.0 16 (24) 212 212-2 = 4094
11111000,00000000 255.255.248.0 32 (25) 211 211-2 = 2046
11111100,00000000 255.255.252.0 64 (26) 210 210-2 = 1022
11111110,00000000 255.255.254.0 128 (27) 29 29-2 = 510
11111111,00000000 255.255.255.0 256 (28) 28 28-2 = 254
11111111,10000000 255.255.255.128 512 (29) 27 27-2 = 126
11111111,11000000 255.255.255.192 1024 (210) 26 26-2 = 62
11111111,11100000 255.255.255.224 2048 (211) 25 25-2 = 30
11111111,11110000 255.255.255.240 4096 (212) 24 24-2 = 14
11111111,11111000 255.255.255.248 8192 (213) 23 23-2 = 6
14
11111111,11111100
Host 255.255.255.252
Subnet Mask 16384
No. of Sub(2network
) 22Block Size 2n 22Host
-2 = Per 2 Network 2n-2
15
11111111,11111110 255.255.255.254 32768
2 N (2 ) 21 1
2 -2 = 0
16 1
11111111,11111111
10000000,00000000,00000000 255.255.255.255
255.128.0.0 65536
2 (2 (2) ) 20223 202-223-2= =0 8388606
11000000,00000000,00000000 255.192.0.0 4 (22) 222 222-2 = 4194302
11100000,00000000,00000000 255.224.0.0 8 (23) 221 221-2 = 2097150
11110000,00000000,00000000 255.240.0.0 16 (24) 220 220-2 = 1048574
11111000,00000000,00000000 255.248.0.0 32 (25) 219 219-2 = 524286
11111100,00000000,00000000 255.252.0.0 64 (26) 218 218-2 = 262142
11111110,00000000,00000000 255.254.0.0 128 (27) 217 217-2 = 131070
11111111,00000000,00000000 255.255.0.0 256 (28) 216 216-2 = 65534
11111111,10000000,00000000 255.255.128.0 512 (29) 215 215-2 = 32766
11111111,11000000,00000000 255.255.192.0 1024 (210) 214 214-2 = 16382
11111111,11100000,00000000 255.255.224.0 2048 (211) 213 213-2 = 8190
11111111,11110000,00000000 255.255.240.0 4096 (212) 212 212-2 = 4094
11111111,11111000,00000000 255.255.248.0 8192 (213) 211 211-2 = 2046
11111111,11111100,00000000 255.255.252.0 16384 (214) 210 210-2 = 1022
11111111,11111110,00000000 255.255.254.0 32768 (215) 29 29-2 = 510
11111111,11111111,00000000 255.255.255.0 65536 (216) 28 28-2 = 254
11111111,11111111,10000000 255.255.255.128 131072 (217) 27 27-2 = 126
11111111,11111111,11000000 255.255.255.192 262144 (218) 26 26-2 = 62
11111111,11111111,11100000 255.255.255.224 524288 (219) 25 25-2 = 30
11111111,11111111,11110000 255.255.255.240 1048576 (220) 24 24-2 = 14
11111111,11111111,11111000 255.255.255.248 2097152 (221) 23 23-2 = 6
11111111,11111111,11111100 255.255.255.252 4194304 (222) 22 22-2 = 2
11111111,11111111,11111110 255.255.255.254 8388608 (223) 21 21-2 = 0
11111111,11111111,11111111 255.255.255.255 16777216 (224) 20 20-2 = 0
~ 35 ~

Class :- A :- Table (1 to 126)


N:- No of Network (1 form)
n :- No of Host (0 form)

DHCP (Dynamic Host Configuration Protocol)


It automatically provide the IP address to the client computer for a leave period.

IP Address Configuration

Static Dynamic

(1) Manually configure (1) Automatically configure from DHCP


Server.
(2) May be IP Conflict or Bed configuration. (2) No IP Conflict.
(3) Administrative overload, when P.C. are (3) No Administrative overload.
frequently moved
~ 36 ~

(IP Lease Process)

(1) IP leaves request. (DHCP Discover Massage) :- The client machine send the
broadcast massage to a network (Where is DHCP).
(2) IP leaves Offer :- DHCP Server send the offer massage to client machine (Threw
Mack Address) with own Identifier
DHCP Client
IP leaves Request

IP leaves Offer

Selection

IP leaves Acknowledgement

(3) IP leaves selection :- Client machine send the IP leaves selection to DHCP Server.
(4) IP leaves Acknowledgement:- DHCP Server send the acknowledgement massage to
client machine for a leaves period.

IP Leave Renewal Process

Manually Automatic

C:\> IP Config /Release Just after 50% of the leaves period client machine send the
C:\> IP Config /Renew leaves renewal process to DHCP Server, Next 87.5% of the
leaves period client machine send the leaves renewal process to
DHCP Server is not renewal the client machine of then client
release the IP address and send the Broadcast Massage.

If DHCP Server is not available, then client :-

Win95/98/NT Win XP/2000/2003


IP:-0.0.0.0 IP :- 169.254.X.X

APIPA (Automatic private IP Address)

DHCP Server :-

Requirement :- Win 2000/2003 server O.S. (Static IP Address)

Step 1 :- Start :- Setting :- Control Panel :- Add/Remove Program :- Add/Remove Window


Component :- Network Services :- Details :- DHCP :- Next :- Finish
~ 37 ~

Step 2 :- Start :- Run :- DHCPMGMT.MSC

Command :- DHCPMGMT.MSC
Start IP Address :----------------------------------------
End IP Address :------------------------------------------

Length :------
Subnet Mask:-------

Step 3 :- Start :- Program :- Administrative Tools :- DHCP

Right Click :- New Scope :- Next :-


Scope Name :-XYZ
Description :- Optional
Next :-
IP Address Range

DHCP
+ Computer Name (Right Click)
+
Start End IP Address
Add +

IP Exclusions :----Optional

Next :-
Lease Duration :- 8 Days (Default) :-
Yes, I want to configure these option now.:-
Yes, I want to configure this scope:-
Default Router (Default Gateway):-
IP Address :---
Router Port :----
~ 38 ~

DNS Server (Computer Name Or IP Address):-


Regional :- Win Server or IP Address:-
Computer Name or IP Address:-
Yes, I want to active this scope :- Finish
DHCP

Computer Name Right click:- Authorize

On Client :-
TCP/IP Properties :-
[Click this] Obtain the IP Address automatically

+Computer name
+ Address lease
+Address Pool
+Reservation (Right Click)
+Scope Option

Right click :- New reservation


:- Reservation name (XYZ)
IP Address 192.168.0.45
Mac address:- Client PC
OK

DHCP Relay Agent


Router :- It is a multiple broadcast domain device, which is used to connect two or more
different network, it filter the BAD Broadcast (Unknown IP Address) of data or Broadcasting
packet.

HUB / Switch Router Hub / Switch

192.168.0.5 192.168.0.7
192.168.0.8 10.0.0.5 10.0.0.6 10.0.0.7 10.0.0.8
192.168.0.6

192.168.0.4 10.0.0.4
~ 39 ~

DHCP Relay Agent :-


It is routing & Remote Access protocol which is used to Relay the DHCP Client
Broadcasting massage to the DHCP Server.

As a Router (Multiple NIC / Static IP Address)

Start :- Program :- Administrator Tools :- Routing & Remote Access


Start :- Run :- RRASMGMT.MSC

Command :- RRASmgmt.msc
Computer name (Right Click)
+
+

Right click:- Configure Routing & Remote Access services :- Next:-


[] VPN
[] RAS
[] NAT
[] Custom (Click this)

:-
[] RAS
[] VPN
[]
[]
[] LAN Routing :- finish :- Yes

DHCP Server

=Static IP Address
Scope 1 :- 192.168.0.200 to 220
Gateway :- 192.168.0.4
Scope 2 :- 10.0.0.200 to 220
Gateway :- 10.0.0.4

These Scope are in the Super Scope


~ 40 ~

System Router :- DHCP Relay Agent


Start :- Run :- RRASmgmt.msc :-

+Computer Name
+
+ IP Routing
+
+ General :- Right click :-New routing
Protocol :- DHCP Relay Agent :- OK

+ DHCP Agent (Right Click) :- New


Interface

:- Local Area Connection :- 1


:- Local Area Connection :- 2 ADD

OK

To right click the DHCP Agent :- Properties :- DHCP Address Server :-


192.168.0.5
ADD

OK

DHCP Database

% System Root % :- System 32 :- DHCP :- DHCP.MDB (Actual Database)

J 50. Log (Jetpack. Log file)


J 50XXX .Log (Renamed Log file – 1 MB of each)

Res 1 . Log Reserve File (1MB of each for emergency purpose)


Res 2 . Log

Temp . EDB - Temporary File


J 50 . CHK - Check Point

Initially data is written on Jet pack . Log file & after committed the data is written on actual
data base (DHCP.MLB) when log file full then it renamed as J 50XXX. Log.

Check Point File :- Used to keep the track of committed database.


~ 41 ~

DHCP Server automatically take backup after each 60 Mints.

Backup Data Base :-

Start :- Run :- DHCPmgmt.msc

Comp. (192.168.0.4) (Right Click)


+ Add Pool
+ Add Loss
+ Reserve
+
+

Right Click :- Backup /Restore :-Windows :- System 32 :- DHCP :- Backup.

WINS [Window Internet Name Services]


It is also a naming convention, which is used to resolve Net Bios Name to IP Add.

Computer Name
Wins DNS
Net Bios name (Flat name) Fully Qualify Domain Name (FQDN)
15 Character (No Special Character is used) 255 Character (India.Pak.Com)
(India)
LM Host file Host file

(1)Net Bios Broad Casting :-


C:\> NBTSTST – C (To see the Cache Table)
C:\> NBTSTST – R (To Delete Cache Table)
~ 42 ~

(2)LM Host File :- It is a simple text editor which used to keep the track of computer name
& its IP Address :-
% System Root % :- System 32 :- Drivers :- Etc :- LM Host.Txt

Win Setup
Step (1) :- Start :- Setting :- Control Penal :- Add/Remove Program:- Add/Remove
Window Component :- Network Services :- Details :- Wins :- Next :- Finish
Step (2) :- ON Client
TCP/IP Properties :- Advanced :- Wins :- Add IP Address of Wins Server :- OK

On Server :-
Start :- Run :- Winsmgmt.msc
Computer
+Active Registration (Right Click :- Find By Owner)
+ Replication Partner

Command :- Winsmgmt.Msc

Replication Partner :-

+Active Registration (Right Click :- Find By Owner)


+ Replication Partner
Start :- Run :- Winsmgmt.msc
Computer
+Active Registration
+ Replication Partner (Right Click :- New
Replication Partner)

:- IP Add (IP Add & Another Wins Server) 192.168.0.4


:- Add

Data Path :- % System Root % :- System32 :- Wins.MDB (Actual Data base)

J 50. Log (Jetpack. Log file)


~ 43 ~

J 50XXX .Log (Renamed Log file – 1 MB of each)

Res 1 . Log Reserve File (1MB of each for emergency purpose)


Res 2 . Log

Temp . EDB - Temporary File


J 50 . CHK - Check Point

DNS (Domain Name Services)


It is also a Naming Connection, Which is used to resolve the Host Name to IP Address & IP
Address to Host Name.
Top-Level Domain [∙] Root Domain

.UK
.MII .US
.Edu . .Nic .IN
Com .Gor

3-Character (Organization Wise) 2- Character (Country Wise)

.Com
Sub Domain
~ 44 ~

Gmail.Co
Yahoo.Co m
m Rediff.Co
m

DNS Query

There are two part of DNS Query.


(1) Recursive Query :- (DNS Client to DNS Server)
(2) Iterative Query :- (One DNS Server to Another DNS Server)

(2) Iterative Query


ROOT
(3) .Com- IP Address
DOMAIN
DNS (4) Iterative Query
TOP
(5) Intel IP Address
LEVEL
SERVER (6) Iterative Query
SUB DOMAIN
Local DNS
INTEL.COM
~ 45 ~

(7) Resolve

R
E INTEL.COM
C IP Address
U
R
S
I
V
E

ON
CLIENT
XP

C:\>IP Config /DisplyDNS (To saw the Resolver cache table Entry)
C:\>IP Config /FlushDNS (To Delete cache table on Client)
C:\>DNSCMD /clearcache (To delete the cache table on Server)
Note :- Must be install the Support Tool

Zone

It is Logical Hierarchical contiguous Domain Single Name Space.

DOMAIN FOREST

DOMAIN TREE DOMAIN TREE

IT.Com ITI.Com D.C.


D.C.

MCSE.IT GNIIT.ITI.CO IIT.ITI.CO


.COM CCNA.IT. M M
COM
~ 46 ~

ZONE
Forward Lookup Reverse Lookup

(1)Contain the Information of Host Name to IP (1)Contain the Information of IP Address to Host Name.
Address. (2) IP Address ---to------Host Name
(2) Host Name ----to-------IP Address

Zone Type:-

On window NT:- (1) Primary Zone


(2)Secondary Zone

On Window 2000:-
(1)Standard Primary Zone
(2)Standard Secondary Zone
(3)Active Directory Integration

On Window 2003 :-
(1)Standard Primary Zone:- (Contain the Read/Write copy of Zone Database)
(2)standard Secondary Zone:- (Contain the Read only copy Primary Zone Database)
(3)Stub Zone :- (Start of Authority Name Server)
(4)Active Directory Integration :- (For Active Directory)
~ 47 ~

DNS Installation & Configuration


Step 1 :- Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window
Component :- Network Services :- Details :- DNS :- Next :- Finish.

Step 2 :- Start :- Run :- DNSmgmt.msc Or


Start :- Program :- administrator Tools :- DNS :-

Computer Name
+Forward Lookup Zone (Right Click)
+Reverse Lookup Zone

Right Click :- New Zone :- Zone Type :-


[] Standard Primary (Click this)
[] Standard Secondary
[] Stub
[] ADI (Active Directory Integration) (Click This)

: - Zone Name Vikrant.com : - Zone File Name Vikrant.com.DNS

:-Allow Dynamic Update [] Secure (Click this) & [] Non Secure :- Next :- Finish

Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone (Right Click)

Right click :- New Zone :- Zone Type


[] Standard Primary (Click this)
[] Standard Secondary
[] Stub
[] ADI (Active Directory Integration) (Click This)

: - Zone Name 192.168.0 Network Address :- Zone File 0.168.192


~ 48 ~

Address in DNS :- Allow Dynamic Update [] Secure (Click this) & Non Secure :- Next :-
finish.

Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone
+ 192.168.0.X

Zone Transfer

The Process of replicating one DNS to another DNS is Called Zone Transfer.

Computer Name
+Forward Lookup Zone
+ Vikrant.com (Right Click)
+Reverse Lookup Zone
+ 192.168.0.X

Right click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Following DNS

Server IP Address 192.168.0.6 Secondary IP Address :- Add :- Ok

Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone
+ 192.168.0.X (Right Click)

Right Click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Follow DNS
Server
192.168.0.6
IP Address Secondary Server DNS :- Add :- OK
~ 49 ~

Secondary Zone

Step 1 :- Install the DNS


Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window
Component :- Network Services :- Details :- DNS :- Next :- Finish.

Step 2 :- Start :- Run :- DNSmgmt.msc

Computer Name
+Forward Lookup Zone (Right Click)

+Reverse Lookup Zone

Right Click :- New Zone :- Zone Type:-


[] Standard Primary
[] Standard Secondary (Click This)
[] Stub
[] ADI (Active Directory Integration)

:- Zone Name Vikrant.com :-

192.168.0.5
:- Master DNS Primary IP address :- Next :- Ok

Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone (Right Click)

Same Processes

DNS Forwarder
It is process the which DNS client Query can forward from one DNS Server to another DNS
Server.
~ 50 ~

Step 1 :- Start :- Run :- DNSmgmt.msc

Computer name (Right Click)


+ Forward Lookup
+ vikrant.com
+Reverse Lookup
+ 192.168.0.6

Right click :- Properties :- Forward :- Add public IP Address


202.56.215.6
Add

202.56.230.6 Add

:- Apply :- ok

Resource Record
Host Record :- Contain the Host Name & its IP address Forward Lookup.

PTR (Pointer Record) :- Contain the IP Address & its Host name in Reverse Lookup.

SON (Start of Authority) :- Points the 1st Authorize DNS Server.

NS (Name Server) :--------------------------------------------------------

MX (Mail Exchange) :- Point the mail Server.

Alias (C Name) :- Conical Name

SRV (Server Record) :- Contain the Site, Domain & Protocol. Information.

(1) Site
(2) TCP
(3) UDP
(4) Domain
(5) Forest

GUI :- Globule Unique Identifier


IP :- Service Record is not created then :-
Step 1 :- % System Root % :- System 32 :- Config :-
Net logon.DNS
Net logon.DNS
Delete both file:- Then Stop & Start the DNS Server & Net Logon services.
~ 51 ~

DNS Database
Primary.DNS Secondry.DNS Active Direction Integration

Read / write only Read only copy DC ADC

%System root% %System Root% :- NTDS :-


System32 :- DNS:- NTDS.DIT :-
DNS.MDB It contain 4 logical partition.
(1) Scheme Partition
(2) Configuration Partition
(3) Domain Partition
(4) Application Partition :- It
contain DNS Database.

[Both Domain Controller


(DC&ADC) contain Read/ write
copy of DNS database which is
replicated threw AD replication
process.

Trouble Shooting Of DNS


(1) C:\> NS Lookup
(2) IP Config / Flush DNS
(3) IP Config / Registeredes
(4) IP Config / Display DNS
(5) IP Config / Clear Cache

Start :- Run :- DNSmgmt.msc

File Edit View Insert Tool Table Window Help

Computer name
+ Forward Lookup
+ Vikrant. Com
+ Reverse Lookup
+ 192.168.0.6

View :- Advanced

RAS (Remote Access Services)


~ 52 ~

Used to Connect two more P.C. through Dial-up Connection (Telephone Line).

Telephone Line

PSTN (Public Switch Telephone Network) ISDN (Integrated Service Digital Network

PSTN ISDN
(1)Carry Analog signal (1) Carry Digital Signal
(2) Cannot Carry Voice/Data Simultaneously. (2) Can carry Voice/Data Simultaneously.
(3) Slow (64 KBPS)
(3)Fast:-
BSI (Basic Rate Interface) :- 128 KBPS
PRI (Primary Rate Interface) :- 1.544 KBPS

Step 1 :- Install & Configure modem on both side.


Step 2 :- On Server
Step 3 :- Start :- Run :- RRASmgmt.msc :-
Step 4 :- Start :- Program :- Administrative Tools :- RRAS

Command :- RRASmgmt.msc

Computer name (Right click)


+----
+----
+----

Right click :- Configure & enabling :- RRAS :- Next :- select the Dial Up/ VPN

If you select the Dial up then next process Click the Dial up :- Next :- IP Address (To click
the [*]Automatically Assign IP Address) :- if you are not click the automatically Assign ip
Address then you are give the static IP Address:- next :- Finish

Step 5 :- Start :- Run :- RRASmgmt.msc

Right Click :- Properties :- Security :- Authentication


Computer name (Right click) Provider.
+----
+----
+----
~ 53 ~

Window Authentication

Radius Authentication

Authentication Method
(1) PAP (Password Authentication Protocol)
(2) SPAP (Shiva Password Authentication Protocol) Encrypted.
(3) CHAP (Challenge Hand Shaking Authentication Protocol) Non Microsoft.
(4) MSCHAP (Microsoft Challenge Hand Shaking Authentication Protocol) 95/98.NT.
(5) MSCHAP-2 (----------------------------Version 2) 2000/XP/2003.
(6) EAP (Extelcible Authentication Protocol) :- For Smart Card Authentication.

Step 6 :- Start :- Run dsa.msc :-


Open User Properties :- Dial Up :- Click The Allow Access& Click the Always Call
Back Telephone No.------------. :- Apply :- OK

ON Client
Step 7 :- Start :- Setting :- Network Connection :- Create New Connection :- Click the
Connect to MY Workplace :- Dial Up :- Connection Name XYZ :- Phone No. (Give the RAS
Server Telephone No.) :- Next :- Next :- Finish

VPN (Virtual Private Network)


It is used to Connect the two remote network through Public Network (Internet) in a secure
manner.

ISI Internet

VPN Server

Client XP
User Name :- Administrator
Password :- ----------
IP Address :- (Public IP Address) Internet ISI

Tunnel Protocol :- (To Secure Data Connection)

There are two part of Tunnel Protocol


(1) PPTP :- (Point to Point Tunnel Protocol)
~ 54 ~

(2) L2TP :- (Layer-2 Tunnel Protocol)

PPTP L2TP

Provide Authentication Provide Authentication & IP Security

Support Inter networking IP based IP Based / Frame Relay / X.25 etc.

128 Client From VPN Client 128 Client from VPN Client

RADIUS
Remote Authentication Dial in User Services.
Also Known As IAS (Internet Authentication Services)
Sometimes it is also known as – AAA
A:- Authentication
A:- Authorization
A:- Accounting

RADIUS Server

RAS VPN
RAS RAS VPN VPN

Authorization

Authentication
Accounting
RAS RAS RAS VPN VPN VPN
CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT
~ 55 ~

User Name: - ---------


Password :------------
Confirm Password:----------

Radius Feature
(1) Support Remote Access Policy
(2) Win 2003 Standard Edition support 50 Radius client
(3) Win 2003 Enterprise Edition, Then Unlimited Client

Note :- If more then one RAS/VPN Sever then, use Radius Server for Authentication.
IAS Server & RAS/VPN both are same (Domain/Workgroup).

Step 1 :- Configuration of IAS:-


Step 2 :- Start :- Setting :- Control Penal :- Add/ Remove Program :- Add Remove Window
Component :- Network Services :- Detail :- IAS :- Next :- Finish

Step 3 :- Start :- program :- administrator tool :- IAS

IAS
+ Radius Client (Right Click)

Right Click :- New Radius Client :- Friendly Name (XYZ) :- Client IP Address (RAS/VPN
IP Address) Add:- Next :- Secret Key :- 12345, Confirm Key :- 12345 :- Next :- Finish.

On RAS /VPN Server Client

Start :- Run :- RRASmgmt.msc :-

Computer Name (Right Click)


+
+
+

Properties :- Security :-Authentication Provider Radius Authentication Or


(Accounting Provider) :-------- Configure :---

Server Name IP Address of Radius Server :-

Secret Key (Click Change) :- Secret Key 12345, Confirm Key 12345 :- OK
~ 56 ~

NAT (Network Address Translation)

(Routing Protocol)

It is used to convert private IP Address to Public IP Address & Public To Private.

IETF :- Internet Engineer Task Force.

IP Address

Private Public

Use in private Network Use in Public (Internet Network)

=>10.X.X.X
=>172.16.X.X
=>192.168.X.X

Step 1 :- Start :- Run :- RRASmgmt.msc

Computer Name (Right Click)

Right Click :- Confirm & Enable RRAS :- Next :- Click to Remote Access & NAT :- Create
a New Domain :- Dial up Connection :- Next :- Interface Name (XYZ) by Default (Remote
Router) :- Click to Connect Only Dial up / ISD Line. :- Select Modem :- Phone No. :- Airtel
(172315) :- Router Proceed :- User Name :- Airtel (Register) :- Domain & Password is
Optional :- Finish

Start :- Run :- RRASmgmt.msc

+Computer Name Right Click :- Remote Router :- Right Click :- Connect


+ Network Interface
(Right Click)
~ 57 ~

[IP Secourity]

To Block Access
IP Security
Run :- Secpol.msc :- IP Security Policy :- Create Policy :- Name (XYZ) :- Next :- Next :-
Next :- Local N/W :- O.A. Active Directory default :- Next :- Yes :- Finish :- Add :- Next

This shared role does not Specify :- 2 :- Internet does not access any body in my computer :-
next :- Local N/W :- O.A. Active Directory default (keyboard O.S. Protocol) :- Next :- Yes
(Click) All Icm Traffic (Only one IP)
:- Edit :- Add :- Next :- Next :- Next :- Next :- Finish
This in [XXX name]
In IP New Security Policy :- Right :- [click] Un Assign

IN IP Client
Run :- //192.168.0.32
Run :- Secpol.msc :- IP Security :- Right click :- All Task :- Export :- File Name (Vikrant).

In Next PC
Run :-//192.168.0.1 (Server)
OK :- (Vikrant) :- Copy :- Desktop :- Paste :- Next,
Run :- Secpol.msc :- IP Security :- All Task :-Import :- Desktop :- (Vikrant) :- New IP
Security :- Right Click :- Assign & Un Assignly.
~ 58 ~
~ 59 ~

Code: - 70-294 5th & 6th PAPER


70-297

{Active Directory}

(1) It is a centralized database in Win 2000 / 2003 Server Operating System. That
contains Network Object & Resources
EX :- User
Organization Unit
Group
Contacts
Computer
Shared Folder
Printer Etc.

(2) It automatically created, during the promotion of Server to D.C. by using


DCPromo.exe Command .

Active Directory :-
%System Root% :- NTDS :- NTDS.DIT (Actual Database File) :
Edb.log :- Current log file :- 10 MB
~ 60 ~

Edb.001.log
Edb002.log Renamed Log File :- 10 MB
Res 1 .log
Res 2 .log Reserve Log File :- 10 MB
Edb.Chk :- Check Point file
Temp.Cdb :- Temporary File

 Initially information is written into current log file (Edb.log) &


after connected it is written it actual database (NTDS.DIT)
when current log file is full, then it rename as Edbxxx.log file.
 Reserve file is used for emergency purpose, when disk space is
full.
 Check point file keeps the record of committed database.

{Benefit of Active Directory}


=>Centralized Database
=> Sociability
=> Extensible
(Parent Root Domain) (Global Catalog Server) Parnell Domain
=> Easley Manageable
DOMAIN TREE DOMAIN TREE
=> Recoverable (System State Data Backup)
=> DNS Integration
It.com ADC

IT.COM
D.C. NETTECH
.COM

CCNA.
MCSE. IT. Forest
IT, A.NET
COM TECH. B.NET
COM
COM TECH.
COM
~ 61 ~

Forest :- Logical Grouping of Domain tree.

Domain Tree :- It is a logical Hierarchical Cententiguous domain name space.

Domain :- It is a logical Grouping of in a network (Forest) well at list one domain controllers
are present.

Domain Controller :- Window 2000/2003 Server machine which contains the active
directory database. It is a physical component.

Additional Domain Controller (ADC) :- Window 2000/2003 Server machine which


contains the read write copy of database of main D.C. (Root Domain). It support whole
tolerance.

Member Server :- Win 2000/2003 Server machine which is a part of domain controller but
does not contain active directory database.

Parent Root Domain :- The First Domain Controller is known as Parent Root Domain.
Which contains all 5 FSMO Roles (Flexible Single Master Operation).

Global Catalog Server :- It contains the complete information of own domain and personal
information of other Domain. By default the first domain controller Parent Root Domain is
known as Global Catalog Server. But we are to create more then one Global Catalog Server.

Schema :- The structure of Active Directory contains object classes and attribute classes.
Schema of A.D. can be modified by user account which is a member of Domain Admin,
Enterprise Admin, Schema Admin.
By default Administrator of Parent Root Domain (GC Catalog Server) Can be
modified the schema of active directory.
~ 62 ~

D.C. A.D.C.

Start :- Program :- Administrative Tools :- A.D. Site & Services.

Run :- Dcsite.msc

A.D. Site & Server


+Site
+Default Site
+ Server
+Comp1
+ NTDS Setting (Properties)
+Comp2
:--- [Click This] Global Catalog
+ NTDS
:--- [Click This] Setting
Global (Properties)
Catalog

{Active Directory}
Requirement of Active Directory
=> Window 2000/ 2003 Server
=>At least One NTFS VOL.
=>TCP/IP Configure
=>Administrative Control

{Active Directory Object}


Organization Unit (O.U.):- It is a logical component of Active Directory Basically it is
container object, which contains
Group
User
O.U.
Contact
Computer
Printer
Shared Folder
Etc
~ 63 ~

Benefit Of O.U. :- => Group Policy


=>Delegating Control
=>Administrator & Management

Right :- Assigned Directory to User and Group.


Permission :- Assigned for local machine (Entire Network) or Domain.
{Note :- Policy cannot Directory linked with user & Group}

{Group}
Creating Group :- Start :- Run :- Dsa.msc
A.D. user & Group

+India.com
+ Built-in
+ Computer
+
+
+
+ User (Right Click)

Right Click :- New :- Group :- Group Name :- XXX

Group Scope Group Type


[] Domain Local [] Security
[] Global [] Distribute Bution
[] Universal

Group Type:-
Security :- Right can be assign to this group.
Distribution :- Right can not be Assign to this group. It is used for mailing purpose .

Group Scope:-
{1}Domain Local :- Open group membership
Ex:- User of any domain in a forest can be member of this group.
Limited resources access permission
Ex:- Member of this group can assess the resources locally.
{2}Global :- Limited group membership
Ex. User of local Domain Controller can be member of this group.
~ 64 ~

Open Resources Access Permission


Ex. Member of this group can access the resources is all domain controller in
a forest.
{3} Universal:- Open group member ship & Open resource Access Permission.
Ex. Member of this group can access the resources in Entire forest &
User of any domain controller can be member of this group.

Printer
Domain Local (XYZ)
N1 N1
N2
It.com A1
N2 A2
B1

A.it.com
B.it.com

Global

A1 , A2 B1 , B2

Note :- Universal Security Group can not be created when domain function level raise to
mixed mode it only create, when it is in native mode & Win 2003 mode.

Domain Functional level :-


Mixed Mode :- Win NT / Win 2000 / Win 2003
Native Mode :- Win 2000 / Win 2003
Win 2003 Mode :- Win 2003

Start :- Run :- Dsa.msc

+India.com (Right Click)


+
+
+
~ 65 ~

Right click :- Raise Domain :- Funchal Level :- Current Mixed (Change the Native) :- Raise

Group (Built-in)

Local Group (Built-in) Domain Group (User


Container)
Ex.:- Administrator Ex. :- Domain Admin
Guest Enterprise Admin Main

Backup Operator Schema Admin


Replicator Domain User
User Domain Computer
N/W Configuration Certificate Admin Etc

Note :- Built-in Local Group is automatically created when O.S. is installed & after DC
Promo, some extra group are also created known domain group (User Container).

Contacts (Object) :-
E-Mail Address & User, which is on other Domain controller.
Ex. :- Yahoo.com / Rediff mail.com etc.
Use in exchange server (Mailing Purpose)

Computer (Object) :- It automatically created on domain controller, when we join the client
machine to Domain.

Printer (Object) :- It automatically published in active directory, when printer is installed .


Share Folder (Object):- It can not be published in Active Directory. It can be manually
configure in Active Directory.

Start :- Run :- Dsa.msc


A.D. User & Group
+ India.com
+Built-in
+Computer
+ User (Right Click)
+
~ 66 ~

Right click:- New :- Shared Folder :- Name:- XXX


Path :- \\192.168.0.0\\XXX
:- Apply Ok

{FSMO ROLES}
FSMO (Flexible Single Master Operation)

There are five FSMO Roles


(1) Schema Master
(2) Domain Naming Master Forest Wide Roles
(3) PDC Emulator
(4) RID Domain Wide Roles
(5) Infrastructure Master

 By Default first Domain Controller in a forest contains all five


roles, known as Global Catalog Server / Parent Root Domain.
 A.D.C. have No Roles
 C.D.C. contains Domain Wide Roles that is two roles.

Schema Master :- It D.C. holding this role can music that schema of Active Directory be
modified

It.Com No Roles
It.com
D.C. 5 Roles
A.D.C.

A.It.com B.It.com
C.D.C. C.D.C. 3 Roles
~ 67 ~

=>D.C. holding these Roles becomes unavailable then A.D. Schema cannot be modified.

=> Domain Naming Master :- D.C. Holding this Roles can ensure that addition of other
D.C. in forest.

=> D.C. holding this Roles become unavailable then we cannot promote / D.C. mort other
D.C. in forest.

=> PDC :- It act as a PDC for Win NT B.D.C. that is backward compatible.

2000
NT XP A.D.C. D.C.

 Use to perfected password update that is user logon


Authentication due to bad password.
 Time Sanative
 It over write the G.P.O
 It is use to prevent the over write the G.P.O.
 RID (Relative Identifier )
 Use to Address Role of user RID
 Use to prevent the duplication of user, when User move for one
D.C. to another D.C.

S.I.D.:- Domain ID + RID


Some For All User in a Forest Unique to Each User

S.I.D. => C:/> whomi / user


Global Unique of each user RID

Infrastructure Master :- Use to provide the consistency of User – Group membership

=> Use to up to date group membership information.

=> Global Catalog Server must not hold this Roles. Infrastructure Master can up to date User
& Group membership from G.C. Server on same Domain Controller then it cannot work
properly.
~ 68 ~

Viewing FSMO Roles

Roles When

Schema Master Com.It.com


Domain Naming Master Com.It.com
PDC Emulator Com.It.com
RID Com.It.com
Infrastructure Com.It.com

{Transferring FSMO Roles}


C:\> NTDSUTIL
NTDSUTIL : Roles
: Connection
: Connect to Server
Com.It.com
:Quit
: Transfer Schema Master
: Transfer Domain Naming Master
: Transfer PDC
: Transfer RID
: Transfer Infrastructure Master

Seizing FSMO Roles


(If D.C. is permanently not Active able )

NTDSUTIL : Roles
: Connections
: Connect to Server Comp.It.Com
: Quit
: Seafaring Schema Master
: Seize Domain Naming Master
: Seize PDC
: Seize RID
: Seize Infrastructure Master

Ping Packet Internet Grapier

{Group Policy & Software Deployment Policy}


~ 69 ~

(1) Polices:- Set of rules based which can be linked or associated with [Domain, Site &
O.U. (Computer User)].
(2) Rights :- Assigned to user & Group e.g. Allow logon locally.
(3) Permission :- Object e.g. file & Folder, printer etc
- Sharing Permission
- NTFS Permission

{Policies}

Local Policy Active Directory Based Policy


%System Root% %System Root%
System 32 Sys Vol
(Group Policy) Sys Vol
Local Security Policy vikrant.com
Policies:- Domain Security Policy
Scripts:- Domain Controller Security Policy

Command :- C:/> DCGPOFIX (Crack the Policy)

Software Deployment

Assigning Publishing

=>Assigned Software Software automatically =>Published packages are appeared in


install. Add/Remove Program.
=>Software are can be assigned for both user =>Software can be published only for user not
& Computer. computer
=>MSI:- Microsoft Installer Package can be
Published & Assigned both.
=>.ZAP:- ZAW Down level application
package can be only published (User Only)
=>.ZAP file is to be created

Step1 :- Create a folder & Share with full control


~ 70 ~

e.g. C:- SFT (folder name)


Step2 :- Copy all installation file from CD is C:\SFT. Folder
Step3:- Open “Ad Users & Computers”
Run :- Dsa.Msc

AD User & Computers


+Vikrant.com
+
+
+
+ Text + O.U. (Right Click)

Right click :- Properties :- group Policy :- New :- Edit :-

+Computer Configuration
+ Software Setting
+Software Installation :- New Policy //SRV1/SFT (Network Path)
.MSI :- (Click This) Assigned :- Ok
+Windows Setting
+Administrative Template
+User Configuration
+ Software Setting
+Software Installation :- New Package :-//SRV1/SFT/ (Network Path)
.MSI ;- (Click This) Published :- Ok
+ Window Setting
+ Administrative Template

Step 4 :- run :- GPUPDATE /FORCE (Refreshing Policy)

Note :- For Computer Based Policy, client machine must be restarted to affect the change
(Policy)

Published Non .MSI Package


C :- SFT
:- Setup.exe
Open the Notepad and write this
~ 71 ~

[Application]
Setup Command = \\SRV1\SFT\Setup.exe
Display Version = 5.0
Friendly Name = “Acrobat Reader”
Path: C:\ SFT (Save this file )
Fill Name :- ABC.ZAP
File Type :- All File :- Ok
[Active Directory Sites & Services]

Site :- Logical Grouping of Domain Controller on the behalf of Physical or Network


Connectivity well Connected Server are to be Physical in same site.
“A Site may contain more then on Domain”
“A Domain can have more then on Site”

Replication (Synchronous of Data Base)

Intra Site Inter Site


Replication Replication
Replication ON window in Site Replication between deferent Site

Inter Site (Replication)


Server 1 Site Link Server 4

Server Server
Server 2 Server 3 5 6

Intra Site
Local Bridge Head Server Intra site

(Intra Site Replication)


~ 72 ~

 Active Directory Configuration is automatically created


between different Server of the same site which is used for
Replication.

 RPC (Remote Precede Call) is used as transportation protocol.

 Replication Timing
() None
() One per Hour (1 Hour)
() Twice Per Hour (30Minite)
() Four time Per Hour (15Minite)

=>KCC (Knowledge Consistency Character) is used to create Replication Topology

(Inter Site Replication)


Benefits of Inter Site Replication

(1) Database is automatically compressed is larger then 50KB in Inter site Replication.
(2) Each Site must have at least on local Bridge server which reduces WAN Traffic.

Site Link :- A logical connection between different site which is to be created manually.

(1) IP Link :- IP Link is preferred is WAN connection is fast Reliable & Permanent.
(2) SMTP Link :- SMTP Link can be used in if WAN connection is slow, Tempory &
Non-Reliable.

[Logical Partition Of Active Directory]


NTDS.DIT is Logically divided into four partition
(1) Schema :- Forest Wide Replication
(2) Configuration :- Domain Wide Replication
(3) Domain Partition :- Forest / Domain Wide Replication
(4) Application :- e.g. :- DNS Database

Created Site & Site Link

Run :- DSsite.Msc
AD Site & Site Link
~ 73 ~

+ Site (Right Click :- Create New Site :- Bombay :- Ok)


+Default First Site
+ Server
+ Comp 1
+ Comp 2
+ Bombay (Right Click & Move to Bombay)
+ Server
+ Comp 2
+ Transports
+ IP (Right Click :- Create New IP Link :- Link Name :- ABC :- OK)
+SMTP
+Subnet :- Right Click :- Create New Subnet :-
Site :- Bombay
Subnet 10.0.0.0
Address 255.0.0.0 ok
C:/> Repadmin / Synoll
Manual Replication
Monitoring replication Traffic
Run :- Replmon
~ 74 ~

Paper
Exchange Server 2003
Topic

(1) Installation Of Exchange Server 2003

(2) Creating Mail Box Of A User


a. Configuring Clients
b. Outlook Express
c. Microsoft Outlook 2003
d. Outlook Web Access

(3) Folders
a. Public Folder
b. Personal Folder (PST)
c. Private Folder
d. Delegation
e. Mail Box Rights

(4) Microsoft Exchange Information Store


a. Exchange Database
b. Storage Group & Store

(5) Internet Mailing & SMTP Connection

(6) Routing Group & Connector


a. Administrative Group

(7) Secure Massaging & Certificate Services

(8) Front End / Back End Server

(9) Disaster Recovery


~ 75 ~

a. Backup / Restore
b. Recovery Of Deleted Mail Box
c. Recovery Of Deleted Items

Benefits Of Exchange Server

(1) Security
(2) Customized Mail Box Setting
(3) Monitoring
(4) Massage Tracking
(5) Group Ware
Etc

Mail Box
:- Consists of
Inbox
Outbox
Sent Item
Deleted Item
Drafts Etc

Exchange server

Slandered Edition Enterprise Edition


:- Database Up To 16 GB Only :- Unlimited Database
:- Single Storage Group :- Multiple Storage Group & Stores
:- No Clustering :- Clustering Services

Installation Of Exchange Server


Requirement
(1) Window 2000 Server + Service Pack 3.0 or Higher
~ 76 ~

Window 2003 Server

(2) Active Directory & DNS (Domain Controller)

(3) IIS &


ASP.NET

Add / Remove Program :- Window Component :- Application Server :- Details :-


() ASP.NET (Click This)
()IIS :- Details:- (Click This)
(Click This)
(Click This)
(Click This)
(Click This) Click All

Exchange Client
MAPI Client (Massaging Application POP3 Client (Post Office Protocol Version
Programming Interface) 3.0)
Massages are not downloaded to the local disk of Massages are downloaded to the local disk (By
machine. Default)
e.g. Microsoft Outlook 2003 e.g. Outlook Express
Microsoft Outlook
Third Party Software Etc.

OWA (Outlook Web Access)


:-HTTP Client
e.g. Internet Explorer

Different between Microsoft Outlook & Outlook Express

Microsoft Outlook Outlook Express


:- Can be configured as MAPI or POP 3 Client :- Can’t be Configured as MAPI Client
:- Massage Recalling :- Built In Operating System
:- Global Address List
:- Delegation
:- On Line Voting
:- Recovery of Deleted Mail Item
:- Personal Folder
:- Public Folder
Additional Package Etc

Creating Mail Box of a User


Start :- Run :- Dsa.msc
~ 77 ~

Administrator Tools :- A.D. User & Computer

A.D. User & Computer


+Built In
+Domain Controller
+Computers
+User (Right Click)

Right Click :- Create New User :- User Name :---------- :- Password


------------------------- :---------Confirm
pass:-----

:- next :- Click This ()Create Exchange Mail Box :- Ok

(Existing User) :- Select User Account :- Right Click :- Create Mail Box :- Next :- Ok

(1)OWA (Outlook web Access)


=> Outlook Web Access (HTTP Client)
=> Open Internet Explorer
=>Http:\\192.168.0.0\Exchange :-

User: -------------
Password: ---------

Ok

(2)Configuring Outlook Express (POP3 Client)


Step 1 :- Open Outlook Express
Step 2 :- Tools :- Account :- Mail :- Display :- abc
Name :-

:- Email Address :- abc@vikrant.com


:- Protocol :- POP3
Incoming Mail Server :- 192.168.0.1
Outgoing Mail Server :- 192.168.0.1

:-
:- OK
Password :----
~ 78 ~

(3) Configuring Microsoft Outlook (MAPI Client)

Start :- Program :- Microsoft Office :- Microsoft Outlook :- Click This () Create New Mail
Account :-

() Microsoft Exchange server (MAPI)


() POP3
()IMAP 4
()HTTP
()Additional Server

:- :- Next :- OK
Exchange Server :- 192.168.0.1
Mail Box :- Administrator

Net Meting Command :- CONF

{Folder}
Personal Folder :-
PST :- Personal Storage Type
:- PST Folder can be Password Protected
:- It is Created from MS-Outlook
:- Default Size :- 2GB
Creating .PST Folder
:- Open Ms-Outlook
~ 79 ~

:- New :- Outlook Data.file :- PST :- Folder Name :- My Folder


Location :- ---------------------------------
Password :- -------------------------------
:- OK

Public Folder :-
:- Public Folder is access to every on (By Default)
:- Can be created from Ms-Outlook also Creating Public Folder.
:- Open Ms-Outlook

+Inbox
+Outbox
+Sent Item
+Deleted Item
+Public Folder (Right Click)

:- Right Click :- New Folder :- e.g. Sales Report :- Ok

Private Folder (Mail Box) :-


:- Mail Box of a User is called Private Folder

Delegation Mail Box Right


:- Log on as User :- Log on as Administrator
e.g. Abc Onto to Server Machine
:- Open Ms-Outlook :- Run :- Dsa.msc
:- Tools :- Option :-
A.D. User & Computer
Delegation :- Add User :-
View :- -----(Advanced Feature)
:- Inbox :- Read :- Ok
+Vikrant.com
+ Built In
+ Computers
+ Domain Controller
+ User
+ Abc (Right Click) :-
~ 80 ~

Right Click :- Properties :-


Exchange Advanced
:-

Mail Box Right


Add User :- XYZ
[] Full Mail Box Access
:- Ok

Installed Exchange Command

C:\Exchange2003\Setup+I386\Setup.exe” /Disasterrecovery

{Microsoft Exchange Database}

.edb .stm

=> Rich Text massage => Streaming Media(Multimedia Massage)

C:- Program file :- Exchange Server (Exchsrver) :- MDB Data :-


Priv1.edb Private Folder Database
Priv1.stm
Pub1.edb Public Folder Database
Pub1.stm
E00.log Current Transaction log (5MB)
E000001.log
E000002.log Renamed Transaction log file (5MB)
Res.log
Res.log Reserved log file (5MB Each)

=> Initially massage are written into Transaction log file (e00.log) which of 5MB and later
on committed to actual database. When this log file full then renamed as exxxxxx.log
=> There are two Reserved log file of 5MB.

ESE :- Extensible Storage Engines

{Microsoft Exchange Information Store}


~ 81 ~

=> Is one of the Core Component of Exchange Server.


=> Basically this is a service which must be always running because this service manage
Exchange Database.

Storage Group :-
=> Is a logical container which consists of Mail Box & Public Folder.
=>By default first storage is created during installation which contains only two stores ie on
mail Box store & One Public store. But maximum we can have four storage Group & each
store group can have max. five stores :- (Enterprise Edition Only)

{Creating Storage Group & Stores}


Start :- Program :- Microsoft Exchange :- System Manager

+First Organization
+ Server
+Com1
+ Protocol
+ Storage Group :- - - - Right Click :- Create New Storage Group :- Second
+ First Storage Group Storage Group :- Ok
+ Mail Box Store
+ Public Store
+
+
+
+
+ Second Storage Group : - - - Right Click :- Create New Mail Box Store :- First
+ First Storage Group Store :- Do You Went to Mount this Store :- Yes :- Ok

+First Organization
+ Server
{Internet Mailing & SMTP Connector}
+ Comp 1
+ Connector :- Right Click :- Create SMTP Connector :-
Connector Name :- Vikrant Kumar
Start :- Program :- Exchange Server :- System Manager
Local :--- :- Comp 1 :- Server :-
Bridgehead
Address Scope :- Domain :-*
[] Click This Allow massage to be Replayed
to these Domain :- Ok
~ 82 ~

+ Protocol
+ POP 3
+ HTTP
+ SMTP
+SMTP Virtual Server :- Delivery :- Advanced : External DNS
Add :- 202.56.215.6
202.56.230.6 :- Ok

{Routing Group & Connectors}


~ 83 ~

Routing Group :- Logical of group of well connected server (Exchange)


 By Default, First Routing group is created which contains the
entire server irrespective of their physically connectivity &
Location.

Server
1

Server2

Server3
Connector

Routing Group 1# Routing Group 2#

Local Bridgehead server Local Bridgehead Server

# Each Routing Group must have at least one local bridgehead Server.

{Connector}
Logical Link or Connection between different routing groups.

Types of Connector :-

(1) RGC (Routing Group Connector) :- RGC is preferred if WAN connection is fast
reliable & Permanent
(a) Can not be used for Internet Mailing
(b) Not Configurable
(c) Uses either SMTP or RPC as Transportation Protocol

(2) SMTP (Simple Mail Transfer Protocol) :-


~ 84 ~

(a) Can be used even if WAN connection is slow, Temporary & Non-
Reliable.
(b) Can be used for Internet Mailing also
(c) Configurable
(d) Uses SMTP as Transportation Protocol.

(3) X.400 Connector :-


(a) Used for X.400 Based massaging Server.
(b) Bandwidth less then 10kbps.

{Administrative Group}
Is a logical container which can contain.
 System Polices
 Routing Group
 Public Folder

Benefits :-
(1) Management & Administration
(2) Delegate Control

{Creating Routing Group & Connector}


Start :- program :- Microsoft Exchange :- System Manager:-

+First Organization :- Properties :-


() Display Routing Group (click this)
() Display Administration group (Click this)

+ Routing Group :- Right Click :- Create New Routing Group :- Second Routing
Group:- Ok

+ First Routing Group


+ Connector
+ Members :- Server 1 Drag & Drop
Server 2

+ Second Routing Group


+ Connector :- Right Click :- Create RGC or SMTP Connector
+ Member :- Server 2 Connector Name :- Vikrant
Local Bridgehead Server :- Server 2
~ 85 ~

{Server Massaging & Certificate Services}


Step 1 :- Installing Certificate Service
Start :- Setting :- Control Panel :- Add Remove Program :- Window Component :- ()
Certificate Service (Click This). :-
() Enterprise Root CA (Click this)
() Enterprise Subordinate CA
() Standalone Root CA
() Standalone Subordinate CA

:- CA Name :- Vikrant
:- Next :- Ok

Step 2 :-
Start :- Program :- Administrative Tools :- IIS

+Comp1
+ Website
+ Default Web Site :- Properties :-
+
+
+

Properties :- Directory Security :-

Server Certificate :- () Create New Certificate (Click This) :- () Send Request to on line
Certificate Authority (Click This) :- Next :- Next :- Next :- Ok
~ 86 ~

View Certificate :- Edit :-


() Use 128 Bit Encryption
() Require SSC
() Accept Client Requests
:- OK

+
+
+
+ Default Website :- Right Click :- STOP & START :- Service :- OK
+
+

{Front End / Back End Server}


Benefits :-
(1) Security
(2) Single Uniform IP Address
(3) Only Frontend Server will handle yhe request.
(4) Frontend server can not have mail box.

Start :- Program :- Microsoft Exchange :- System Manager

+First Organization
+ Server
+ Comp 1 :- Properties :- () Click this This is My Front end
Server :- Ok
+ Comp 2
~ 87 ~

{Trouble Shooting}
Backup:-
(1) System State Data Backup :-

Start :- NT Backup :- Advanced :- Backup


Restore
ASR

()
()
() Backup System State Data :- Next :- Ok (Click this)

(2) IIS :-

Start :- Program :- Administrative tools :- Internet Information Server :-

+Comp 1 :- Right Click :- All+Ask :- Backup / Restore :- File Name :- Vikrant :- Ok


+
+
+ %System Root% :- System 32 :- InetSRV meta Back:- Vikrant
~ 88 ~

(3) Exchange Data Backup :-

Offline Backup Online Backup

=> Database is not checked for errors => Error checking is performed during
during Backup. Backup

=> Renamed Transaction file are not => Renamed transaction log file are
automatically deleted even after the automatically or incremental backup.
Backup.
Run :- NT Backup
Backup Software
Backup :- ()
() Backup Selected File & Folder.
Third Party Software Built in () :-
e.g. VERITAS NTBackup +Microsoft Exchange server
ARC Serue etc + Comp 1
+ Ms-Information Store
() First Storage Group (Click this)
() Second Storage Group (Click This)

:- Next :- OK

{Recovery}
~ 89 ~

Step 1 :- Install win 2003 Server with same computer Name & IP Address & component.
Step 2 :- Install IIS & ASP.NET
Step 3 :- Restore IIS
Step 4 :- Restore System State Data Backup.
Step 5 :- Insert Exchanged data base.
Run :- E:\setup\I386\Setup.exe/Disasterrecovery

Step 6 :- Restore Exchanged Database.

{Recovery of Deleted Mail Box}


=> By default Mail Box of a user is retained by Server for 30 Days (Box this could be 99999
days)

Step 1 :- Create a User account with same name or different name :- But do not create Mail
Box.

Run :- DSA.MSC

Create New User :- :-


User Name :- Vikrant Password :----------
Logon Name :- Vikrant ----------------------- :-

() Create Exchange Mail Box (Un Check this Option) :- OK

Step 2 :-
Start :- Program :- Microsoft Exchange :- System Manager

+First Organization
+ Server
+ Comp 1
+ Protocol
+ storage Group
+ Mail Box Store
+ Mail Box :- (Deleted Mail Box) (X.Abc) :- Right
Click :- Reconnect :- Vikrant :- Ok
~ 90 ~

{Recovery of Deleted Mail Items}


=> By default deleted mail items are retained by SRV. For 7 Days (MAPI Client)

Tools

+ Inbox
+ Outbox
+ Drafts
+ Deleted :- Select this Folder
+
+

Recover deleted Mail Items :- select :- Deleted Mails :- Restore :- Ok


~ 91 ~

On Server Machine

System Manager

+ Mail Box Store :- Properties :- Limit :-

Keep Deleted Items :- 7 Days


Keep Deleted Mail Box :- 30 Days

S-ar putea să vă placă și