Sunteți pe pagina 1din 239

p£¢ja

gl­jne fË¢nrZ fÜ¢a


¢pNeÉ¡mpÚ

f¡WÉ pq¡uL f¤¢Ù¹L¡


®S¢pJ He¢pJ L¢ÇfEV¡l ®eVJu¡LÑ ®L¡pÑ

p£¢ja
p£¢ja

p§Q£fœ

­Øfn¡¢mø/CE¢V¢m¢V fË¢nrZ
®S¢pJ He¢pJ L¢ÇfEV¡l ®eVJu¡LÑ ®L¡pÑ

fªù¡
pw¢rç f¡WÉœ²j 1
¢hÙ¹¡¢la f¡WÉœ²j 2
Basic Network:
1z Intro to com network, types of network, network related terms.
2z Network accessories and connectors (Switch, hub, router).
3z Transmission media.
4z Concept of IP Address (static & dynamic)
5। Establishing of LAN and WAN

6z Establishing a Peer-Peer Network.


7z Intro to Internet and types of internet connections.
Server Based Network:
1z Intro to Server Based Netwk
2z Server 2008-Installation and post installation config.
3z Server Config: Workgroup concept, Active Directory (AD)- AD Domain Con
(ADDC)
4z Server Config: Domain Name System (DNS) Server
5। Server Config: Dynamic Host Con Protocol (DHCP) Server

6z Server Config: Mail Server


7z Server Config: File Server
8z Server Config: Print Server
9z Server Config: Routing and Remote Access
10z Server Admin: Remote Desktop, Putty, Team Viewer.
11z Intro to Linux Server, CentOS/RedHat Enterprise Linux Installation and Basic
comd.
12। LVM concept and Installation various packages by using local repository.
Advence Network:
1z Intro to Army WAN
2z Intro to STC&S LAN and server room
3z Working wireless simple config of wireless access pt.
4z VOIP- Basic fun and emp of IP Phone and ATA, Installation of Elastix Server
5z Overview of Com sy, VPN, Digital Signature
6z Basic concepts on open BTS
HW/NW Trouble shouting
1z Com HW/OS maint and basic troubleshooting
2z Ident comm netwk prob, Netwk sy and troubleshooting

f¡WÉ pq¡uL f¤¢Ù¹L¡ fËZu­e ¢e­u¡¢Sa hÉ¢š²h­NÑl a¡¢mL¡

1
p£¢ja
p£¢ja

SCHOOL OF SIGS
JCO/OR ICT ADV COURSE (LEVEL-1 NETWK TECH)
DETAIL SYLLABUS

Subj :Basic Netwk Pds : 56

Ser Lesson Pds Lesson Rmk


Theo Prac Total ser s

1. Intro to com netwk, types of netwk, netwk related terms 3 - 3 1-3


2. Netwk accessories and connectors (Switch, hub, router), 2 7 9 4-12
Joining RJ-45 Connector with UTP Cable.
3. Tx media/Optical fiber and splicing 2 8 10 13-22
4. IP Adds (static, dynamic and IPV4/IPV6) 2 9 11 23-33
5. Estb of LAN and WAN 1 2 3 34-36
6. Estb a Peer to Peer Netwk 1 8 9 37-45
7. Internet Basics & Uses of internet 2 - 2 46-47
8. Final Exam (Basic Netwk) 2 7 9 48-56
Total Pds: 15 41 56

Subj : Server Based Netwk Pds : 80

Ser Lesson Pds Lesson Rmks


Theo Prac Total ser
1. Intro to Server Based Netwk 1 - 1 1
2. Server 2008-Installation and post installation config. - 6 6 2-7
3. Server Config: Workgroup concept, Active Directory 1 5 6 8-13
(AD)- AD Domain Con (ADDC)
4. Server Config: Domain Name System (DNS) Server 1 5 6 14-19
5. Server Config: Dynamic Host Con Protocol (DHCP) 1 7 8 20-27
Server
6. Server Config: Mail Server 1 4 5 28-32
7. Server Config: File Server 1 2 3 33-35
8. Server Config: Print Server 1 3 4 36-39
9. Server Config: Routing and Remote Access 2 7 9 40-48
10. Server Admin: Remote Desktop, Putty, Team Viewer. 1 4 5 49-53
11. Intro to Linux Server, CentOS/RedHat Enterprise Linux 2 7 9 54-62
Installation and Basic comd.
12. LVM concept and Installation various packages by using 1 8 9 63-71
local repository.
13. Final Exam (Server Based Netwk) 2 7 9 72-80
Total Pds: 15 65 80

2
p£¢ja
p£¢ja

SCHOOL OF SIGS
JCO/OR ICT ADV COURSE (LEVEL-1 NETWK TECH)
DETAIL SYLLABUS

Subj :Adv Netwk Pds : 46

Ser Lesson Pds Lesson Rmks


The Prac Total ser
o
1. Intro to Army WAN - 2 2 1-2
2. Intro to STC&S LAN and server room - 3 3 3-5
3. Working wireless simple config of wireless access pt. 1 7 8 6-13
4. VOIP- Basic fun and emp of IP Phone and ATA, 2 18 20 14-33
Installation of Elastix Server
5. Overview of Com sy, VPN, Digital Signature 2 3 5 34-38
6. Basic concepts on open BTS 2 - 2 39-40
7. Final Exam (Adv Netwk) 2 4 6 41-46
Total Pds: 09 37 46

Subj : HW/NW Trouble shouting Pds : 21

Ser Lesson Pds Lesson Rmks


Theo Prac Total ser

1. Com HW/OS maint and basic troubleshooting 1 5 6 1-6


2. Ident comm netwk prob, Netwk sy and 1 5 6 7-12
troubleshooting
3. Final Exam (HW/NW Trouble shouting) 2 7 9 13-21
Total Pds: 4 17 21

3
p£¢ja
p£¢ja

f¡W-1z Intro to com network, types of network, network related terms.

Computer Network ¢L ?

p¡d¡le A­bÑ ®eVJu¡LÑ hm­a A¡jl¡ S¡¢mL¡ pð¢ma HL¢V L¡W¡­j¡­L h¤­T b¡¢L z HC S¡¢mL¡ pð¢ma Hl Efl ¢i¢š L­lC °al£
Ll¡ q­u­R L¢ÇfEV¡l ®eVJu¡LÑ z c¤C h¡ a­a¡¢dL L¢ÇfEV¡l kMe HL¢V fÜ¢al j¡dÉ­j flØf­ll p¡­b k¤š² q­u H®L Af­ll p¡­b
¢h¢ieÀ abÉ A¡c¡e - fÊc¡e L­l b¡­L aMe a¡­L L¢ÇfEV¡l ®eVJu¡LÑ h­m z HC ®eVJu¡­LÑ pwk¤š² pLm L¢ÇfEV¡l H­L Af­ll
¢h¢ieÀ dl­el ¢Xi¡Cp h¡ k¿»¡wn hÉhq¡l Ll­a f¡­l z H…­m¡ q­a f¡­l ¢fʾV¡l , úÉ¡e¡l , j­Xjpq A¡lJ ¢h¢ieÀ dl­el ¢Xi¡Cp z
¢e­jÀ HL¢V ®eVJu¡­LÑl ¢Qœ ®cJu¡ qmx

Switch

¢h¢ieÀ fÊL¡­ll ®eVJu¡LÑ z NWe Hhw hÉhq¡­ll Efl ¢i¢š L­l ®eVJu¡LÑ­L ¢h¢ieÀ i¡­N i¡N Ll¡ ®k­a f¡­l z ¢e­jÀ ¢h¢ieÀ
dl­el ®eVJu¡LÑ pÇf­LÑ pw¢rç A¡­m¡Qe¡ Ll¡ q­m¡ x

L) LAN – Local Area Network


M) MAN – Metropolitan Area Network
N) WAN – Wide Area Network

LAN (Local Area Network) z HL¢V ¢e¢cÑø ihe h¡ LÉ¡Çf¡­p k¢c HLcm L¢ÇfEV¡l ®eVJu¡LÑi¤š² qu a¡q­m ®p¢V
LAN e¡­j f¢l¢Qa q­h z LAN Hl Ad£­e ®L¡e HL¢V ih­el HLC am¡u Ah¢ÙÛa p¡h…­m¡ L¢ÇfEV¡l b¡L­a f¡­l Abh¡ ®L¡e
HL¢V ®L¡Çf¡e£l HLC ih­el HL¡¢dL am¡u L¡R¡L¡¢R ®gÓ¡­ll L¢ÇfEV¡l…­m¡ mÉ¡ei§š² q­a f¡­l z a­h H­r­œ HL¢V ¢e¢cÑø
c§l¦­aÆl j­dÉ L¢ÇfEV¡l…­m¡­L b¡L­a q­hz ¢e­jÀ HL¢V p¡d¡le j¡­el ®m¡L¡m H¢lu¡ ®eVJu¡­LÑl ¢Qœ ®cJu¡ qm x

Switch

¢Qœ x ®m¡L¡m H¢lu¡ ®eVJu¡LÑ

4
p£¢ja
p£¢ja

MAN ( Metropoliton Area Network ) z jÉ¡e h¡ ®j­VÊ¡f¢mVe H¢lu¡ ®eVJu¡LÑ q­µR La…­m¡ L¢ÇfEV¡l Hl
®eVJu¡LÑ h¡ ®m¡L¡m H¢lu¡ ®eVJu¡­LÑl pj¢ø k¡ HL¢V f¤­l¡ nql h¡ hs A¡L¡­ll ®L¡e Hm¡L¡hÉ¡f£ ¢hÙ¹«a z jÉ¡­el A¡L¡l mÉ¡­el
Q¡C­a hs ¢L¿¹¤ Ju¡­el Q¡C­a ®R¡V zmÉ¡­el a¤me¡C jÉ¡e ¢XS¡Ce Ll¡ ¢LR¤V¡ S¢Vm Hhw H L¡­Sl SeÉ ¢h­no cra¡a¡l fÊ­u¡Se qu
z¢LR¤ ¢LR¤ fÊ¢aù¡e ¢h­no L­l hÉ¡w­Ll n¡M¡pj§q hs nq­ll ¢h¢ieÀ S¡uN¡hÉ¡f£ ¢hÙ¹ªa b¡­L z Hdl­el fÊ¢aù¡e jÉ¡­el p¡q¡­kÉ a¡­cl
n¡M¡ A¢gp…­m¡­L k¤š² Ll­a f¡­l z ¢e­jÀ HL¢V jÉ¡­el ¢Qœ ®cJu¡ qmx

MAN (Metropolitan Area Network)

Mirpur

Malibag

LAN
Uttara
LAN

MAN Backbone
Dhanmondi

LAN

¢Qœ x p¡d¡le jÉ¡e X¡u¡NÊ¡ j

WAN – Wide Area Network z Ju¡e h¡ Ju¡CX H¢lu¡ ®eVJu¡LÑ q­µR La…­m¡ mÉ¡­el h¡ jÉ¡­el hªqšj ®eVJu¡LÑ k¡l¡
¢h¢ieÀ ®i±N¢mL c§l¦­aÆ Ah¢ÙÛa z Ju¡­el A¡Ja¡u L¢ÇfEV¡l…­m¡ ¢h­nÄl ¢h¢ieÀ fÊ¡­¿¹ b¡L­a f¡­l z a­h Ju¡­el L¡kÑœ²j ¢eiÑl Ll­R
¢pNeÉ¡m p’¡me j¡dÉj h¡ m¡Ce ®kje g¡Ch¡l Af¢VL LÉ¡hm , pÉ¡­Vm¡CV VÊ¡¾p¢jne , j¡C­œ²¡J­ui VÊ¡¾p¢jne CaÉ¡¢cl Efl z
C¾V¡l­eV HL fÊL¡l Ju¡e z Ju¡e ¢XS¡Ce , ÙÛ¡fe Hhw hÉ¡hÙÛ¡fe¡ AeÉ¡eÉ ®k ®L¡e dl­el ®eVJu¡­LÑl a¤me¡C S¢Vm z Ju¡e
¢XS¡Ce¡l­L ®V¢m­k¡N¡­k¡N ¢p­øj pÇf­LÑ i¡m d¡le¡ b¡L­a q­h z

5
p£¢ja
p£¢ja

(WAN) Wide Area Network

M¤me¡ l¡Sn¡q£

Q–NÊ¡j Y¡L¡

¢Qœ x Ju¡e X¡u¡NÊ¡j

­eVJu¡­LÑl p¡­b pÇfªš² BeÉ¡eÉ ¢houpj¤q (Network related terms) ¢e­u ¢e­jÀ B­m¡Qe¡ Ll¡ q­m¡ x

†bUIqvK© Uª‡cvjRx z †bUIqv‡K©i wWRvBbMy‡jv‡K e‡j †bUIqvK© Uª‡cvjRx| HL¢V ®eVJu¡­LÑl ¢g¢SLÉ¡m ¢Xi¡Cp h¡
L­Çf¡­e¾V (component) ®kje- LÉ¡hm, ¢f¢p, l¡EV¡l CaÉ¡¢c ®eVJu¡­LÑ flØf­ll p¡­b pwk¤š² b¡­L a¡­L hm¡ qu V­f¡m¢S z
®eVJu¡LÑ V­f¡m¢S j¤ma ®eVJu¡­LÑl ¢g¢SLÉ¡m ®m-BEV (Layout) h¡ ®eVJu¡­LÑl ¢XS¡Ce­L heÑe¡ L­l z ¢g¢SLÉ¡m ®m-BEV
hm­a HM¡­e ®h¡T¡­e¡ q­u­R L¢ÇfX~V¡l h¡ ¢f˾V¡­ll AhÙÛ¡e Hhw LÉ¡hm h¡ a¡l…­m¡ H­cl­L pwk¤š² Ll­a ¢Li¡­h ¢heÉ¡Ù¹ q­u­R ®p
¢hou¢V z ®eVJu¡LÑ V­f¡m¢S­L Bh¡l ®LE ®LE ¢g¢SLÉ¡m V­f¡m¢S ¢q­p­h J BMÉ¡¢ua L­le z

­kpLm p¡d¡lZ ®eVJu¡LÑ L­Çf¡­e¾V ®kje ¢j¢Xu¡ h¡ LÉ¡hm, L¡­eƒl CaÉ¡¢c ®eVJu¡LÑ V­f¡m¢S pª¢ø L­l, ®p…­m¡ j¤max JHpBC
j­X­ml ¢g¢SLÉ¡m ­mu¡l ¢Xi¡CS ¢q­p­h ¢Q¢q²a z ®eVJu¡LÑ V­f¡m¢S p¡d¡lZa fy¡Q¢V z ®kje- h¡p V­f¡m¢S, ØV¡l V­f¡m¢S, ¢lw
V­f¡m¢S, ØV¡l h¡p V­f¡m¢S h¡ ®jp V­f¡m¢S Hhw ¢VÊ V­f¡m¢S z ¢e­jÀ ®eVJu¡LÑ V­f¡m¢S pÇf­LÑ ¢hÙ¹¡¢la B­m¡Qe¡ Ll¡ q­m¡x

h¡p V­f¡m¢S z h¡p V­f¡m¢S Hje HL¢V V­f¡m¢S ®kM¡­e HL¢V LÉ¡h­ml p¡­b A­eL…­m¡ L¢ÇfEV¡l pwk¤š² b¡­L Hhw
LÉ¡h­ml ®no j¡b¡u HL¢V V¡¢jÑ­eVl (Terminator) m¡N¡­e¡ b¡­L z Ec¡qlZpl©f HM¡­e hm¡ k¡u ¢be­eV ®L¡-H¢„­um (Thinnet
Co-axial) LÉ¡hm à¡l¡ pwk¤š² Cb¡l­eV ®eVJu¡LÑ h¡p V­f¡m¢S NWe L­l z h¡p V­f¡m¢S­a pªø pjpÉ¡ ¢eZÑu a¥me¡j¤mL ®hn
S¢Vmz LÉ¡h­ml HL¢V j¡œ ÙÛ¡­e pªø œ¦¢V h¡ ®hËL (Break) f¤­l¡ ®eVJu¡LÑ­L AQm L­l ¢c­a f¡­l z

¢Qœ x h¡p V­f¡m¢S

ØV¡l VÊ­f¡mS£ z A­eL ®q¡j ®eVJu¡LÑ CES¡l HC VÊ­f¡mS£ hÉhq¡l L­l b¡­L z HC VÊ­f¡mS£­a p¡d¡lea HL¢V ®p¾VÊ¡m
f­u¾V h¡ ®L¾cУu ¢Xi¡Cp Hl p¡­b pwk¤š² b¡­L z ®L¾cУu ¢Xi¡Cp¢V q­a f¡­l HL¢V q¡h, p¤CQ h¡ l¡EV¡l z HC ¢Xi¡CS q­a UTP
6
p£¢ja
p£¢ja

Cable Hl p¡q¡­kÉ Ethernet Port Hl p¡­b pwk¤š² Ll¡ qu z ­L¡e L¢ÇfEV¡l X¡V¡ VÊ¡¾p¢jV Ll­a Q¡C­m a¡ fËb­j q¡h h¡ p¤CQ H
f¡¢W­u ®cu Hhw flha£Ñ­a q¡h h¡ p¤CQ ®p ¢pNeÉ¡m­L mrÉÙÛ­m f¡W¡­e¡l SeÉ kb¡kb l¦­V f¡¢W­u ®cu z ®L¡e ®eVJu­LÑ HL¡¢dL q¡h
h¡ p¤CQ k¤š² q­m a¡­L hm¡ qu ¢VÊ (Tree) h¡ q¡ul¡l¢LLÉ¡m (Hierarchical) V­f¡m¢S z p¡d¡lea ØV¡l V­f¡m¢S­a h¡p
VÊ­f¡m¢Sl a¥me¡u ®hn£ LÉ¡hm fË­u¡Se qu ¢L¿º HC fËk¤¢š²­a ®eVJu¡­LÑl ®k­L¡e HL¢V m¡Ce ¢h¢µRæ q­m ­eVJu¡­LÑl AeÉ pw­k¡­Nl
­L¡e pjpÉ qu e¡ z

¢Qœ x ØV¡l VÊ­f¡mS£

¢lw V­f¡m¢S z HC V­f¡m¢S­a ®eVJu¡LÑi¨š² pLm L¢ÇfEV¡l pl¡p¢l H­L Af­ll p¡­b ¢lw h¡ j¡m¡ BL«¢a­a pwk¤š² b¡­L z ¢lw
Hl ®L¡e HL ÙÛ¡­e ®hËL (Break) q­m a¡ f¤­l¡ ®eVJu¡LÑ­L AQm L­l ®cu z H L¡l­Z ¢l V­f¡m¢Sl ®eVJu¡­LÑ ®XV¡ Vʾp¢jne
hÉhÙÛ¡ ¢e¢ÕQa Ll­a ¢àa£u HL¢V ¢lw ®k¡N Ll¡ qu z ¢àa£u ¢lw¢V­L hm¡ qu ®p­Lä¡l£ ¢lw (Secondary Ring) z

¢Qœ x ¢lw V­f¡m¢S

¢VÊ V­f¡m¢S z ¢ae¢V hÉfL hÉhq©a mÉ¡e A¡¢LÑ­VLQ¡l Hl j­dÉ HL¢V q­µR Cb¡l­eV/BC ¢VÊfm C 802.3 z Hl j¡dÉ­j h¡p
V­f¡m¢S h¡Ù¹h¡ue Ll¡ qu z ®V¡­Le ¢lw h¡ BC¢VÊfmC 802.3 Hhw Hg¢X¢XBC ®eVJu¡LÑ ¢lw V­fm¢S h¡Ù¹h¡ue L­l z m¢SLÉ¡m h¡p
Hhw ¢lw V­f¡m¢S HC V­f¡m¢S­a ®eVJu¡LÑi¨š² pLm L¢ÇfEV¡l pl¡p¢l H­L Af­ll p¡­b ¢lw h¡ j¡m¡ BL«¢a­a pwk¤š² b¡­L z
¢lw Hl ®L¡e V­f¡m¢S p¢Çj¢mai¡­h ¢g¢SLÉ¡m£ ØV¡l V­f¡m¢S NWe L­l z ¢VÊ V­f¡m¢S HL¢V mÉ¡e B¢LÑ­VLQ¡l k¡ h¡p V­f¡m¢Sl
Ae¤l©fz a­h H­a hÉ¢aœ²j q­µR ®eVJu¡­LÑ HL¡¢dL ®e¡Xpq n¡M¡ ®~al£ Ll¡ k¡u z

¢Qœ x ¢VÊ V­f¡m¢S

®jp V­f¡m¢S z ®jp V­fm¢S Hje HL¢V V­f¡m¢S ®kM¡­e fË¢a¢V L¢ÇfEV¡l fË¢a¢Vl p¡­b pwk¤š² b¡­L z k¢c ®L¡e L¡l­Z HL¢V
L¢ÇfEV¡l hå q­u k¡u a¡q­m I ®eVJu¡­LÑl ®L¡e pjpÉ¡ qu e¡ z Ju¡e p¡¢iÑp­L k¢c ®L¡e ®eVJu¡LÑ ¢XS¡Ce¡l f¤­l¡f¤¢l ¢eiÑl­k¡NÉ
Ll­a Q¡u a¡q­m a¡l SeÉ Ešj fR¾c q­µR f§eÑ ®jp V­f¡m¢S z H ®L±n­m fË¢a¢V ®eVJu¡LÑ ­e¡X (Network Node) Ju¡ei¨š²
AeÉ¡eÉ pLm ®e¡­Xl p¡­b pl¡p¢l k¤š² b¡­L z g­m H dl­el V­fmhS­l fk¡Ñç pwMÉL A¢a¢lš² l¦V f¡Ju¡ k¡u X¡V¡ fÉ¡­L­V
7
p£¢ja
p£¢ja

VÊ¡¾p¢jn­el SeÉ z l¦V pwMÉ¡ ®k­qa¥ HM¡­e A­eL ®h¢n a±q ØVÉ¡¢VL l¡E¢Vw fË­V¡Lm H­r­œ hÉhq¡l Ll¡ pñh eu z ®eVJu¡LÑ
¢XS¡Ce¡l a¡C h¡dÉ qe X¡u¡e¡¢jL l¡E¢Vw fË­V¡Lm hÉhq¡l Ll­a z ¢e­jÀ ®jp V­f¡m¢Sl L­uL¢V ¢Qœ fËcš q­m¡ x

¢Qœ x ®jp V­f¡m¢S

8
p£¢ja
p£¢ja

f¡W-2z Network accessories and connectors (Switch, hub, router).

CE ¢V ¢f LÉ¡hm (UTP Cable) z UTP AbÑ¡v Unshielded Twisted Pair Cable HC a¡l …­m¡ c¤C¢V L­l ®S¡s¡u
®S¡s¡u b¡­L HC SeÉ H®L Twisted pair Cable hm¡ qu z ¢e­jÀ UTP Cable Hhw ®eVJu¡¢LÑw pÇf¢LÑa ¢h¢ieÀ fÊ­u¡Se£u
q¡XÑJuÉ¡l pj§®ql ¢Qœ ¢e­j fËcš q®m¡ x

UTP Cable RJ45 Connector

Crimping tools Switch

Modem (External)

Modem (Internal)

p¤CQ Hl L¡S ¢L ? p¤CQ J q¡®hl L¡kÑfÊZ¡m£ fÊ¡u HLC dl­el z a­h p¤CQ ¢pNeÉ¡m NÊqe Ll¡l fl a¡ pl¡p¢l fÊ¡fL
L¢ÇfEV¡l h¡ L¢ÇfEV¡lpj§q­L ­fÊlZ L­l b¡­L z p¤CQ J q¡­hl j­dÉ f¡bÑLÉ q­m¡ kMe ®L¡e X¡V¡ ¢e¢cÑø ®L¡e fË¡f­Ll ¢eLV f¡W¡­e¡
qu p¤CQ öd§ ®k fË¡f­Ll L¡­RC a¡l ¢e¢cøÑ ®f¡VÑ ¢c­u f¡¢W­u ®cu, AeÉ p¤CQ ®f¡VÑ ®b­L pw­k¡NL«a L¢ÇfEV¡l…­m¡ ®p ®r­œ ®L¡e
¢LR¤ h§T­a f¡­l e¡ z ¢L¿º q¡h Hl ®r­œ X¡V¡ kMe f¡W¡­e¡ qu aMe ¢e¢cÑø NË¡qL R¡s¡J JC q¡­hl p¡­b pwk¤š² pLm L¢ÇfEV¡­ll
L¡­R X¡V¡ Q­m k¡u Hhw f¢l­n­o k¡l SeÉ X¡V¡¢V f¡W¡­e¡ qu Ab¡Ñv ®k BC¢fl SeÉ a¡l L¡­R f¡¢W­u ®cu z

¢Qœ x p¤CQ
9
p£¢ja
p£¢ja

q¡h ¢L ? q¡h q­µR ®eVJu¡¢LÑw Hl HL¢V ®L¾cУu hÉhÙÛ¡, L­uL¢V L¢ÇfEV¡l­L ®eVJu¡­LÑ k¤š² Ll¡l HL¢V AeÉaj j¡dÉj z k¡l
p¡q¡­kÉ CE¢V¢f LÉ¡h­ml j¡dÉ­j ®eVJu¡LÑ L¡­eLne ®cu¡ qu z q¡h ®cM­a HL¢V h¡­L¡Êl j­a¡ q­u b¡­L Hhw H­a ¢h¢iæ LÉ¡hm
L¡­eLne ®cu¡l SeÉ ®f¡VÑ b¡­L z HC ®f¡VÑ…¢m­a p¡d¡lZa RJ-45 L¡­eƒl hÉhq©a qu z q¡h­L Bjl¡ HL¡¢dL ®f¡ø ¢h¢nø HL¢V
¢l¢pi¡l ¢q­p­hJ ¢Q¿¹¡ Ll­a f¡¢l z LlZ H¢V HL¢V LÉ¡hm ®b­L C­mL¢VÊLÉ¡m ¢pNeÉ¡m ®f­m ®p¢V­L Hj¢fÔg¡C L­l AeÉph Ju¡LÑ
®pLn­e f¡W¡u z

¢Qœ x q¡h

l¡EV¡l Hl L¡S ¢L ? c¤¢V ¢ieÀ fÊL«¢al ®eVJu¡­LÑl f¡lØf¡¢lL pwk¤¢š²l SeÉ l¡EV¡l (Router) hÉhq©a qu z l¡EV¡l­L
A¡h¡l ®NVJ­uJ hm¡ qu z ­NVJ­u h¡ l¡EV¡l c¤¢V ¢p­ø­jl j­dÉ AhÙÛ¡e L­l Ae¤h¡c­Ll ja L¡S Ll¡l f¡n¡f¡¢n ®XV¡ ¢gÒV¡¢lw Hl
L¡S L­l z

¢Qœ x l¡EV¡l
­NVJ­u Hl L¡S ¢L ? ®m¡L¡m H¢lu¡ ®eVJu¡­LÑl p¡­b ®jCe­éj h¡ p¤f¡l L¢ÇfEV¡­ll ja Afl HL¢V n¢š²n¡m£ L¢ÇfEV¡l
pwk¤š² Ll­a ®NVJ­u hÉhq©a qu z ­NVJ­ul hs °h¢nøÉ q­m¡ H¢V ®eVJu¡­LÑ hÉhq©a ¢h¢ieÀ dl­el ®fÊ¡­V¡Lm Ae¤h¡c Hhw hÉ¡MÉ¡
Ll­a prj z

f¡W-3z VÊ¡¾p¢jne ¢j¢Xu¡ (Transmission media).

VÊ¡¾p¢jne ¢j¢Xu¡ z VÊ¡¾p¢jV¡l Hhw ¢l¢pi¡­ll j­dÉ X¡V¡ VÊ¡¾p¢jn­el S­eÉ ®L¡e e¡ ®L¡e VÊ¡¾p¢jne ¢j¢Xu¡ h¡ j¡dÉj hÉhq©a
quz VÊ¡¾p¢jne j¡dÉj fËd¡ea c¤C dl­el z Hl HL¢V q­µR N¡C­XX (Guided) AeÉ¢V q­µR BeN¡C­XX (Unguided) z Eiu
®r­œC C­mƒÊ¢eL J­u­il BL¡­l VÊ¡¾p¢jV¡l Hhw ¢l¢pi¡­ll j­dÉ ®k¡N¡­k¡N pwN¢Wa qu z N¡C­XX j¡dÉ­jl ­r­œ J­uh HL¢V
¢g¢SLÉ¡m fb Ae¤ülZ L­l z ¢g¢SLÉ¡m fb q­a f¡­l, ®kje- V¥C­ØVX ®fu¡l, ®L¡-H¢„uÉ¡m LÉ¡hm ¢Lwh¡ g¡Ch¡l Af¢VLpÚ z
BeN¡C­XX j¡dÉj C­mƒÊjÉ¡N­e¢VL ¢pNeÉ¡m h¡ al‰­L N¡CX L­l e¡, öd¤ Hl jdÉ ¢c­u al‰ Hl HL fË¡¿¹ q­a AeÉ fË¡­¿¹ Qm¡Qm
L­l z Hdl­el BeN¡C­XX j¡dÉj q­µR h¡u¤, öeÉÙÛ¡e h¡ pj¤â f¡¢e z

¢X­lƒ ¢mwL hm­a Hje VÊ¡¾p¢jne f¡b­L ®h¡T¡­e¡ qu ®kM¡­e ¢pNeÉ¡m pl¡p¢l VÊ¡¾p¢jV¡l q­a ¢p¢li¡­l k¡u Hhw H­cl j¡­T ®L¡e
fËL¡l jdÉha£Ñ ¢Xi¡Cp b¡­L e¡ z a­h ¢pNeÉ¡­ml n¢š² h¡s¡­e¡l SeÉ Hj¢fÔg¡u¡l h¡ ¢l¢fV¡l hÉhq©a q®a f¡­l z ¢X­lƒ ¢mwL në¢V
N¡C­XX Hhw BeN¡C­XX Eiu fËL¡l ¢j¢Xu¡l ®r­œC fË­k¡SÉ q­a f¡­l z HL¢V N¡C­XX VÊ¡¾p¢jne j¡dÉj­L f­u¾V V¥ f­u¾V hm¡
qu, k¢c H¢V c¤¢V ¢Xi¡Cp Hl j­dÉ pl¡p¢l pw­k¡N ÙÛ¡fe L­l z j¡¢ÒVf­u¾V N¡C­XX Le¢gN¡­ln­el ­r­œ c¤­ul ®h¢n ¢Xi¡Cp HLC
j¡dÉj ®nu¡l L­l b¡­L z Bjl¡ ®eVJu¡LÑ hÉhq¡­ll ®r­œ ¢h¢iæ dl­el ¢Xi¡Cp hÉhq¡l L¢l z hÙºa ®k pLm ¢Xi¡Cp Hl j¡dÉ­j
®eVJu¡­LÑl X¡V¡ VÊ¡¾p¢jV h¡ Bc¡e fËc¡e qu ®p pLm ¢Xi¡Cp­LC VÊ¡¾p¢jne ¢j¢Xu¡ hm¡ k¡u z N¡C­XX VÊ¡¾p¢jne ¢j¢Xu¡ pÇf­LÑ
¢hÙ¹¡¢la B­m¡Qe¡ Ll¡ q­m¡ x

1z N¡C­XX (Guided) VÊ¡¾p¢jne ¢j¢Xu¡ z ¢e­jÀ N¡C­XX VÊ¡¾p¢jne ¢j¢Xu¡ pÇf­LÑ ¢hÙ¹¡¢la B­m¡Qe¡ Ll¡ q­m¡x

10
p£¢ja
p£¢ja

 V¥C­ØVX ®fuÉ¡l LÉ¡hm (Twisted Pair Cable)z c¡­j pÙ¹¡ AbQ AaÉ¿¹ L¡kÑLli¡­h hÉ¡fL ¢i¢š­a hÉhq²a q­µR
Hje HL¢V LÉ¡hm q­µR V¥C­ØVX ®fu¡l LÉ¡hmz V¥C­ØVX ®fuÉ¡l LÉ¡hm Bh¡l c¤C lLjz kb¡-(1) BhlZq£e V¥C­ØVX ®fuÉ¡l
h¡ CE¢V¢f (UTP-Unshielded Twisted Pair ) Hhw BhlZk¤š² V¥CeØVX ¢fu¡l h¡ Hp¢V¢f (Shielded Twisted
Pair) z ¢pNeÉ¡m VÊ¡¾p¢jV Ll¡l SeÉ V¥C­ØVX ®fuÉ¡l LÉ¡h­m HL¡¢dL V¥C­ØVX h¡ ®j¡s¡­e¡ ®S¡s¡ Lf¡l a¡l hÉhq¡l Ll¡
quz Lf¡l a¡l ®j¡s¡­e¡l SeÉ œ²pV­Ll (Crosstlak) f¢lj¡e L­j k¡uz L¡lZ H fÜ¢a­a a¡l ®b­L ¢h¢L¢la
(Radiated) ¢pNeÉ¡m H­L Afl­L ¢e¢ûu L­l ®g­mz L¢jE¢e­Lne LÉ¡hm ¢q­p­h V¥C­ØVX ®fuÉ¡l LÉ¡hm hÉ¡fLi¡­h
 hÉhq²a q­µRz ®cM¡ ®N­R mÉ¡­el SeÉ hÉhq²a Lf¡­ll LÉ¡hm ®eVJu¡LÑ ¢j¢Xu¡l j­dÉ AeÉaj Se¢fËu HL¢V ®XV¡
L¢j¢eE­Lne ¢j¢Xu¡z

(L) CE¢V¢f (UTP) LÉ¡hm z CE¢V¢f LÉ¡hm j¤ma HL¡¢dL ®S¡s¡ V¥C­ØVX ®fu¡l LÉ¡h­ml pj¢ØV k¡
Bh¡l fÔ¡¢ØVL Bhl­Z ®j¡s¡­e¡ b¡­Lz e¡j ®b­L h¥T¡ k¡­µR CE¢V¢f LÉ¡h­ml Ef­l ®L¡e ®jV¡m ¢ûe ®eCz öd¤ HL¢V
Cep¤­mV­ll j­dÉ LÉ¡hm ®fu¡l …­m¡ BµR¡¢ca b¡­Lz e£­Ql ¢Q­œ CE¢V¢f LÉ¡h­ml ej¤e¡ ®cM¡­e¡ q­m¡ k¡­a ®j¡V Q¡l
®S¡s¡ V¥C­ØVX a¡l l­u­Rz CE¢V¢f LÉ¡h­ml Bh¡l ¢h¢iæ ®NËX h¡ LÉ¡V¡N¢l B­Rz CE¢V¢f LÉ¡h­ml LÉ¡V¡N¢l hm­a h¤T¡u
H¢V ®eVJu¡­LÑ p­hÑ¡µQ La N¢al ®XV¡ VÊ¡¾p¢jne p¡­f¡VÑ Ll­a f¡­lz pw­r­f LÉ¡V¡N¢l­L CAT e¡­j A¢i¢qa Ll¡ quz
CE¢V¢f LÉ¡h­ml j­dÉ 6 Ru LÉÉV¡N¢ll a¡l h¡S¡­l f¡Ju¡ k¡uz kb¡ x Lz CAT 1, CAT 2, CAT 3, CAT 4, CAT
5 Hhw CAT 6 z haÑj¡e Lj¢fEV¡l ®eVJu¡­LÑ CAT 5 J CAT 6 LÉ¡hm ®hn£ hÉhq²a quz

UTP CAT 5 UTP CAT 6

(M) Hp¢V¢f (STP) LÉ¡hm z Hp¢V¢f Hhw CE¢V¢f LÉ¡h­ml j­dÉ HLj¡œ f¡bÑLÉ q­µR Hp¢V¢f LÉ¡h­ml h¡C­l
SÉ¡­LV h¡ a¡­ll j­dÉ HL¢V nš² BhlZ b¡­Lz H BhlZ¢V p¡d¡lea HÉ¡m¤¢j¢eu¡j h¡ f¢mØV¡l à¡l¡ ®~a¢l k¡ Hp¢V¢f
LÉ¡hm­L C­m­ƒÊ¡jÉ¡N­e¢VL C¾V¡l­g­l­¾pl q¡a ®b­L lr¡ L­lz a­h CE¢V¢f LÉ¡h­ml ®Q­u Hp¢V¢f LÉ¡hm ®k ¢pNeÉ¡m
H¢V¢eE­up­el ¢cL ®b­L A¢dL ¢el¡fc ­plLj ®L¡e NÉ¡l¡¢¾V ®eCz ®L¡e ®L¡e BC¢hHj ®eVJu¡¢LÑw Hl SeÉ f§hÑnaÑ b¡­L
H­a ¢j¢Xu¡ ¢q­p­h Hp¢V¢f LÉ¡hm hÉhq¡l Ll­a q­hz H¢V p¡d¡lea ®V¡­Le ¢lw V­f¡mS£l ®eVJu¡­LÑ hÉhq²a quz e£­Ql
¢Q­œ Hp¢V¢f LÉ¡h­ml ej¤e¡ ®cM¡­e¡ q­m¡ k¡­a ®j¡V Q¡l ®S¡s¡ V¥C­ØVX a¡l l­u­Rz

 ®L¡-H¢„u¡m (Co-axial ) LÉ¡hm z ®L¡-H¢„u¡m LÉ¡hm Hje HL dl­el LÉ¡h¢mw ¢p­ØVj k¡ H¢¾Ve¡ ®b­L ¢pNeÉ¡m
Bfe¡l ®V¢m¢ine, ®l¢XJ Hhw Lj¢fEV¡­l ¢e­u B­pz Cb¡l­eV ®eVJu¡¢Lw ØVÉ¡ä¡XÑ Q¡m¤ qh¡l fl 1973 p¡m ®b­LC ®L¡-
H¢„u¡m LÉ¡hm ®hn cra¡l p¡­bC hÉhq²a q­u Bp­Rz haÑj¡­e H Se¢fËu ®eVJu¡LÑ ¢j¢Xu¡¢V ¢h¢iæ gl­j ®eVJu¡LÑ
LÉ¡hm ¢q­p­h hÉhq²a q­µRz ®L¡-H¢„u¡m LÉ¡hm (Co-axial Cable) ®L¡-H„ (Coax) e¡­jJ f¢l¢Qaz ®L¡-H¢„u¡m
LÉ¡h­ml c¤¢V p¤f¢lh¡q£ h¡ L䡃l (Conductor) Ù¹l HL¢V A¢iæ H¢„p (Axis) ®nu¡l L­l b¡­Lz H SeÉ Hl e¡j LlZ
Ll¡ q­u­R ®L¡-H¢„u¡m LÉ¡hmz ®L¡-H„ LÉ¡h­ml ­L¾cÐ ¢c­u A¢aœ²j L­l HL¢V p¢mX (Solid) Lf¡l a¡lz H a¡l­L
¢O­l Ss¡­e¡ b¡­L fÔ¡¢ØVL ®g¡­jl Cep¤­mne (Insulation) z Cepp¤­mne Ù¹­ll Ef­l b¡­L HL¢V ®jV¡m ¢ûe h¡ ¢nô k¡
Lf¡l ®jp h¡ fÔ¡¢ØVL ¢c­u ®~a¢lz H ph …­m¡l Ef­l b¡­L SÉ¡­LV (Jacket) e¡­jl Ù¹l¢Vz SÉ¡­LV¢V f¤­l¡ LÉ¡h­ml SeÉ
Cep¤­mVl ¢q­p­h L¡S L­lz

¢Qœ x ®L¡-H¢„u¡m (Co-axial) LÉ¡hm


11
p£¢ja
p£¢ja

 g¡q~h¡l Af¢Y~L (Fiber Optic) LÉ¡hmz Af¢VLÉ¡m g¡Ch¡l q­m¡ p¤rÈ L¡y­Ql Bn à¡l¡ ®~al£ HL fËL¡l LÉ¡hmz
g¡Ch¡l Af¢VL LÉ¡h­ml ph­Q­u hs ®~h¢nø q­m¡ H¢V C­m¢ƒÊLÉ¡m ¢pNeÉ¡­ml f¢lh­aÑ B­m¡L h¡ m¡CV ¢pNeÉ¡m VÊ¡¾p¢jV
L­lz HL¢V Af¢VLÉ¡m g¡Ch¡l j¤max 03 ¢V Ef¡c¡e ¢e­u N¢Waz ­kjex (1) g¡Ch¡l (2) LÓÉ¡¢Xw Hhw (3) Cep¤É­m¢Vw
SÉ¡­LVz HR¡s¡J LÉ¡h­ml j¡­el Efl ¢i¢š L­l B­l¡ A­eL lLj fË­VL¢Vi Ef¡c¡e b¡L­a f¡­l z B­m¡L ¢pNeÉ¡m
p’¡m­el fËd¡e L¡S¢V L­l g¡Ch¡­ll AiÉ¿¹­l NÔ¡p h¡ fÔ¡¢øL ®L¡lz ®L¡­ll ¢WL h¡C­ll Ù¹l¢V q­µR L¡­Ql ®~al£, k¡ ®L¡l
®b­L ¢eNÑa B­m¡Ll¢nÈ fË¢ag¢ma L­l a¡ f¤e¤l¡u ®L¡­l ®gla f¡W¡uz H Ù¹l¢V LÓÉ¡¢Xw e¡­jJ f¢l¢Qaz fË¢a¢V üa¿» g¡Ch¡l
Bh¡l fÔ¡¢øL ¢c­u ®j¡s¡­e¡ b¡­L z H A¡hlZ¢V nš² h¡ q¡mL¡ ®k ®L¡e lL®jl q­a f¡­lz Af¢VLÉ¡m g¡Ch¡­ll j­dÉ ¢c­u
®XV¡ Ceé¡­lX h¡ m¡CV BL¡­l ®fËle Ll¡ quz Af¢VLÉ¡m g¡Ch¡­ll j­dÉ ¢c­u ®k ¢pNeÉ¡m k¡a¡u¡a L­l ­p ¢pNeÉ¡m
L¢ÇfEV¡l h¤T­a f¡­le¡z L¡lZ L¢ÇfEV¡l ¢X¢SV¡m ¢pNeÉ¡m R¡s¡ AeÉ ®L¡e ¢pNeÉ¡m h¤­Te¡ a¡C L¢ÇfEV¡­ll ®h¡dNjÉ
Ll¡l SeÉ Af¢VLÉ¡m g¡Ch¡­ll ¢pNeÉÉm­L ¢X¢SV¡m ¢pNeÉ¡­m l©f¡¿¹l Ll¡l SeÉ ¢j¢Xu¡ Lei¡V¡l hÉhq¡l Ll¡ quz ¢j¢Xu¡
Lei¡lV¡l c¤i¡¢o ¢q­p­h L¡S L­lz fËb­L L¢ÇfEV¡­ll ¢X¢SV¡m ¢pNeÉ¡m­L m¡CV ¢pNeÉ¡m L­l g¡Ch¡­l f¡W¡u Bh¡l
g¡Ch¡­ll m¡CV ¢pNeÉ¡m­L ¢X¢SV¡m L­l L¢ÇfEV¡­l ®fËlZ L­lz ¢Q­œ g¡Ch¡l Af¢VL ®cM¡­e¡ q­m¡z

2z BeN¡C­XX (Unguided) h¡ a¡l¢hq£e/Ju¡l­mp VÊ¡¾p¢jne ¢j¢Xu¡ z BeN¡C­XX VÊ¡¾p¢jne ¢j¢Xu¡ hm­a I pjÙ¹
¢j¢Xu¡­L h¤T¡­e¡ qu k¡l¡ h¡u§, n§eÉÙÛ¡e J pj¤­âl f¡¢el j­dÉ ¢c­u ¢pNeÉ¡m ®fËlZ J NËqe L­l b¡­Lz a¡l¢hq£e h¡ Ju¡l­mp j¡dÉj
C­m¢ƒÊLÉ¡m h¡ Af¢VLÉ¡m L䡃¡l h¡ a¡l hÉhq¡l L­l e¡ z pÉ¡­Vm¡CV ¢i¢šL ®V¢mL¢jE¢e­Ln­el ­r­œ fª¢bh£l h¡u¤jämC ®XV¡
p’¡m­el ¢g¢SLÉ¡m fb ¢q­p­h L¡S L­l z kMe ®XV¡ p’¡m­el f­b fË¢ahåLa¡ b¡­L Hhw a¡lk¤š² j¡dÉj ÙÛ¡f­e pjpÉ¡l pª¢ø qu
aMe JuÉ¡l­mp j¡dÉj Bh¢nÉLi¡­h ®h­R ¢e­a qu z JuÉ¡l­mp j¡dÉj Bh¡l ¢ae dl­el z ®kje x

Lz ­l¢XJ J­uh
Mz j¡C­œ²¡J­uh Hhw
Nz Ceé¡­lX

E­õM ®k¡NÉ L­uL¢V VÊ¡¾p¢jne ¢j¢Xu¡l ¢Qœ ¢e­jÀ ®cJu¡ q­m¡x

¢Qœ x ­l¢XJ J­uh

¢Qœ x j¡C­œ²¡J­uh

12
p£¢ja
p£¢ja

¢Qœ x Ceé¡­lX

Ef­l E­õ¢Ma VÊ¡¾p¢jne ¢j¢Xu¡ R¡s¡J ®eJu¡­LÑl p¡­b pÇfªš² B­l¡ ¢LR¤ ¢LR¤ ¢j¢Xu¡l ¢Qœ ¢e­jÀ fËcš q­m¡ x

13
p£¢ja
p£¢ja

Optical Fiber and Splicing.

Af¢VLÉ¡m g¡Ch¡l z Af¢VLÉ¡m g¡Ch¡l q­m¡ p¤rÈ L¡­Ql Bn à¡l¡ ®~al£ HL fËL¡l LÉ¡hmz g¡Ch¡l Af¢VL LÉ¡h­ml ph­Q­u
hs ®~h¢nø q­m¡ H¢V C­m¢ƒÊLÉ¡m ¢pNeÉ¡­ml f¢lh­aÑ B­m¡L h¡ m¡CV ¢pNeÉ¡m VÊ¡¾p¢jV L­lz HL¢V Af¢VLÉ¡m g¡Ch¡l j¤max 03 ¢V
Ef¡c¡e ¢e­u N¢Waz ­kjex (1) g¡Ch¡l (2) LÓÉ¡¢Xw Hhw (3) Cep¤É­m¢Vw SÉ¡­LVz HR¡s¡J LÉ¡h­ml j¡­el Efl ¢i¢š L­l B­l¡
A­eL lLj fË­VL¢Vi Ef¡c¡e b¡L­a f¡­l z B­m¡L ¢pNeÉ¡m p’¡m­el fËd¡e L¡S¢V L­l g¡Ch¡­ll AiÉ¿¹­l NÔ¡p h¡ fÔ¡¢øL ®L¡lz
®L¡­ll ¢WL h¡C­ll Ù¹l¢V q­µR L¡­Ql ®~al£, k¡ ®L¡l ®b­L ¢eNÑa B­m¡Ll¢nÈ fË¢ag¢ma L­l a¡ f¤e¤l¡u ®L¡­l ®gla f¡W¡uz H Ù¹l¢V
LÓÉ¡¢Xw e¡­jJ f¢l¢Qaz fË¢a¢V pa¿» g¡Ch¡l Bh¡l fÔ¡¢øL ¢c­u ®j¡s¡­e¡ b¡­L z H A¡hlZ¢V nš² h¡ q¡mL¡ ®k ®L¡e lL®jl q­a f¡­lz

Øfm¡C¢pw ­j¢ne z Øf¡m¡C¢pw ®j¢ne haÑj¡­e HL¢V AeÉ¡¿¹ Se¢fËu Hhw hÉuhým ¢Xi¡CS z k¡q¡l j¡dÉ­j Af¢VLÉ¡m
LÉ¡hm­L ®S¡s¡ m¡N¡­e¡ qu z HL¢V Øf¡m¡C¢pw ®j¢ne Hl j­dÉ A­eL …­m¡ CL¥Cf­j¾V b¡­L k¡q¡ LÉ¡hm S­u¾V Hl ®r­œ M¤hC
…l¦aÄf§eÑ L¡S L­l z Øf¡m¡C¢pw ®j¢n­el p¡­b ®kpLm CL¥Cf­j¾V b¡­L a¡q¡ ¢ejÀl¦f x

(1) ­jCe ®j¢ne


(2) g¡Ch¡l L¡V¡l h¡ ®hÔX/ ®L¢mi¡l
(3) Ju¡l ¢ØVÊf¡l
(4) pÈm L¡V¡l
(5) ¢pÔf¡l
(6) f¡Ju¡l ¢jV¡l
(7) J¢V¢XBl

g¡Ch¡l LÉ¡hm­L Øf¡m¡C¢pw Ll¡l ¢euj…­m¡ ¢e­jÀ fËcš q­m¡ x

 Øf¡m¡C¢pw ®j¢n®e f¡Ju¡l L¡­eLne ¢c­u ®j¢ne¢V Ae Ll¡a q­h z

14
p£¢ja
p£¢ja

Fiber Optic Machine

 Ju¡l ¢ØVÊf¡l Hl j¡dÉ­j g¡Ch¡l LÉ¡hm Hl Cep¤­mne ­L­V ®L¢mi¡l H h¢p­u ®L¡l¢V­L p¤rÈi¡­h L¡V­a q­h z

Fiber Optic Cleaver

 Hi¡­h c¤­V¡ LÉ¡hm Hl j¡b¡ p¤¾cl L­l ®L­V ®j¢n­e h¢p­u ¢c­u Hl Y¡Le¡ m¡¢N­u ¢c­a q­h z

15
p£¢ja
p£¢ja

 X¡Le¡ m¡¢N­u ®cu¡l fl start Button H ­fËp Ll­m LÉ¡hm c¤­V¡l ØVÉ¡V¡p ®cM¡­h Hhw k¢c p¢WLi¡­h L¡V¡ qu a¡q­m
LÉ¡hm¢V ®S¡s¡ ®m­N k¡­hz

 LÉ¡hm c¤­V¡ ®S¡s¡ m¡N¡l fl ®j¢n­e Hl status ®p¡ Ll­hz k¢c pÇf¤eÑ p¢WLi¡­h ®S¡s¡ m¡­N ®p­r­œ 0% Loss
­cM¡­hz a­h A­eL ®r­œ 0.1% ­b­L 0.3% fkÑ¿¹ Loss ®cM¡­m LÉ¡hm¢V L¡S Ll­h z Hi¡­h Øf¡m¡C¢pw Hl L¡S
pÇfæ Ll¡ k¡u z

16
p£¢ja
p£¢ja

f¡W-4z Concept of IP Address (static & dynamic)

BC¢f H­XÊp pÇf­LÑ d¡lZ¡ (Concept of IP Address) z BC ¢f Hl f¤eÑ AbÑ q­m¡ C¾V¡l­eV ®fË¡­V¡Lm Bl fË­V¡Lm
q­m¡ l¦mp h¡ BCe k¡l Efl ¢i¢š L­l L¢ÇfEV¡l a¡l X¡V¡ AeÉ L¢ÇfEV¡­l ®fËlZ L­l z BC¢f j¤ma X¡V¡NË¡j ¢ed¡ÑlZ J l¡E¢Vw Hl
L¡S L­l b¡­L z HC HÉ¡­XÊ­pl j¡dÉ­j HL¢V L¢ÇfEV¡l B­lL¢V L¢ÇfEV¡­ll p¡­b ®k¡N¡­k¡N ÙÛ¡fe Ll­a f¡­l z L¡kÑ­r­œ j¤ma
Bjl¡ c¤C fÜ¢a­a BC¢f HÉ¡­XÊp hÉhq¡l L¢lz HL¢V q­m¡ ØVÉ¡¢VL Hhw AeÉ¢V q­m¡ X¡u¡e¡¢jL z kMe ®L¡e p¡i¡Ñl a¡l LÓ¡­u¾V­L
¢e­S ¢e­SC BC¢f hl¡Ÿ Ll­a f¡­l aMe ®p¢V­L hm¡ qu X¡u¡e¡¢jL BC¢f z Bl kMe HC HÉ¡­XÊp fË¢a¢V L¢ÇfEV¡­l
hÉhq¡lL¡l£®L V¡Cf L­l h¢p­u ¢e­a qu aMe hm¡ ØVÉ¡¢VL z ØVÉ¡¢VL BC¢fl ®r­œ CES¡l f¢lhaÑe e¡ Ll­m ®L¡eœ²­jC BC¢fl
f¢lhaÑe q­h e¡ ¢L¿º X¡u¡e¡¢j­Ll ®r­œ L¢ÇfEV¡l ¢lØV¡VÑ Ll­m A­eL ®r­œ BC¢f f¢lhaÑe q­u ®k­a f¡­l z BC¢f HÉ¡­XÊp ¢e­u
L¡S Ll­a ®N­m fËb­j ®k ¢hou¢V ¢Q¢q²a Ll¡l fË­u¡Se qu a¡q­m¡ H¢V ®L¡e ®nËe£i¥š² z f¤­l¡ BC¢f HÉ¡­XÊp­L fy¡Q¢V i¡­N/LÓ¡­p
¢hiš² Ll¡ q­u­R z ®kje x
 LÓ¡p H (Class-A) - 0.0.0.0 q­a 126.0.0.0 ­no q­h 0.255.255.254
 LÓ¡p ¢h (Class-B) - 128.0.0.0 q­a 191.0.0.0 ­no q­h 191.255.255.254
 LÓ¡p ¢p (Class-C) - 192.0.0.0 q­a 223.0.0.0 ­no q­h 223.255.255.254
 LÓ¡p ¢X (Class-D) - 224.0.0.0 q­a 239.0.0.0 ­no q­h 239.255.255.254
 LÓ¡p C (Class-E) - 240.0.0.0 q­a 255.0.0.0 ­no q­h 255.255.255.254
k¢cJ öd¤ fËbj ¢ae ®nËe£l AbÑ¡v LÓ¡p H, LÓ¡p ¢h Hhw LÓ¡p ¢p - H ¢ae dl­el BC¢f HÉ¡­XÊp f¡h¢mL h¡ h¡¢e¢SÉL ®eVJu¡­LÑ hÉhq©a
qu z
LÓ¡p H (Class-A)z BC¢f HÉ¡­XÊp Q¡l¢V BL­V­Vl j­dÉ fËbj BL­VV LÓ¡p ¢ed¡ÑlZ L­l b¡­L z k¢c fËbj AL­V­Vl phÑ
h¡­jl ¢hV Ab¡Ñv ®j¡ØV ¢pN¢e¢g­L¾V ¢hV (MSB- Most Significant Bit) öeÉ (0) qu, a¡q­m h¤T­a q­h H¢V LÓ¡p-H ®nËe£i¨š²,
H­r­œ AeÉ¡eÉ ¢h­Vl AhÙÛ¡ h¡ j¡e k¡C ®q¡L e¡ ®Le, LÓ¡p H BC¢f HÉ¡­XÊ­pl fËbj AL­V­Vl phÑ¢ejÀ j¡e 0 Hhw p­h¡ÑµQ j¡e 127
q­h z

0 0 0 0 0 0 0 0 > fËbj AL­V­Vl phÑ¢ejÀ j¡e =0


0 1 1 1 1 1 1 1 > fËbj AL­V­Vl p­h¡ÑµQ j¡e =127
17
p£¢ja
p£¢ja

128 64 32 16 8 4 2 1

> fËbj AL­V­Vl ­j¡V ¢pN¢e¢g­L¾V ¢hV


dl¦e Bfe¡­L HL¢V BC¢f HÉ¡­XÊp ®cJu¡ q­m¡ 10.34.27.65 z ®k­qa¥ fËbj AL­VV Hl j¡e 128 Hl Lj a¡C H¢V AhnÉC LÓ¡p-
H ¢p¢l­Sl BC¢f z H­r­œ Bf¢e k¢c LÓ¡p-H BC¢f HÉ¡­XÊ­pl SeÉ ¢XgÒV p¡h­eV j¡ú (Subnet mask) 255.0.0.0 hÉhq¡l
L­le, a¡q­m HC BC¢f HÉ¡­XÊ­pl öd¤ ®eVJu¡LÑ Aw­nl HÉ¡­XÊp q­h 10.0.0.0 Hhw ®q¡ØV Aw­nl HÉ¡­XÊp q­h 0.34.27.65 z
AaHh, Eš² B­m¡Qe¡ q­a fËa£uj¡e qu ®k, ®eVJu¡¢LÑw Hl SeÉ LÓ¡p-H V¡C­fl HÉ¡­XÊp phÑ­j¡V pwMÉ¡ 128 ¢V (0 q­a 127 fkÑ¿¹)z
a­h fË¢a LÓ¡p BC¢f HÉ¡­XÊ­pl SeÉ CE¢eV ®q¡ØV HÉ¡­XÊ­pl pwMÉ¡ q­m¡ 224-2 Ab¡Ñv 16,777,214 ¢V z

LÓ¡p ¢h (Class-B)z k¢c BC¢f HÉ¡­XÊ­pl fËbj BL­V­Vl fËbj c¤¢V ¢hV HjHp¢h (MSB- Most Significant Bit) 1 J
0 qu a¡q­m h¤T­a q­h ®plV LÓ¡p ¢h dl­el BC¢f HÉ¡­XÊp z LÓ¡p ¢h BC¢f HÉ¡­XÊp fËbj c¤¢V BL­VV hÉhq¡l L­l b¡­L ®eVJu¡LÑ
Aw­n Hhw ®no c¤¢V AL­VV hÉhq¡l L­l b¡­L ®q¡ØV Aw­nl HÉ¡­XÊ­pl SeÉ z LÓ¡p-¢h BC¢f HÉ¡­XÊ­pl p£j¡ 128.0.0.0 ®b­L
191.255.0.0 fkÑ¿¹ z fËbj AL­V­Vl j¡e ¢eZÑu Ll¡ qu Hi¡­h -

1 0 0 0 0 0 0 0 > fËbj AL­V­Vl phÑ¢ejÀ j¡e =128


1 0 1 1 1 1 1 1 > fËbj AL­V­Vl p­h¡ÑµQ j¡e =191

¢edÑ¡¢la
­kje dl¦e, 130.34.27.66 HL¢V LÓ¡p-¢h BC¢fHÉ¡­XÊp z Hja¡hÙÛ¡u LÓ¡p-¢h Hl ¢XgÒV p¡h­eV j¡ú q­h 255.255.0.0 z
H­r­œ ®eVJu¡LÑ Aw­nl SeÉ HÉ¡­XÊp q­h 130.34.0.0 Hhw ®q¡ØV Aw­nl HÉ¡­XÊp q­h 0.0.27.66 z LÓ¡p-H Hl ®hm¡u ®kl©f
¢q­ph Ll¡ q­u­R ®pi¡­h ¢q­ph Ll­m ®cM¡ k¡­h LÓ¡p -¢h'l SeÉ ®eVJu¡LÑ HÉ¡­XÊ­pl pwMÉ¡ q­µR 16384 ¢V Hhw fË¢a¢V ®eVJu¡­LÑ
®q¡ØV pwMÉ¡ q­µR 216-2 Ab¡Ñv 65634 ¢V z

LÓ¡p ¢p (Class-C)z k¢c BC¢f HÉ¡­XÊ­pl fËbj BL­V­Vl fËbj ¢ae¢V ¢hV HjHp¢h (MSB- Most Significant Bit)
kb¡œ²­j 1.1 J 0 qu a¡q­m h¤T­a q­h ®p¢V LÓ¡p ¢p dl­el BC¢f HÉ¡­XÊp z LÓ¡p ¢p BC¢f HÉ¡­XÊp fËbj ¢ae¢V BL­VV hÉhq¡l
L­l b¡­L ®eVJu¡LÑ Aw­n Hhw ®no HL¢V AL­VV hÉhq¡l L­l b¡­L ®q¡ØV Aw­nl HÉ¡­XÊ­pl SeÉ z LÓ¡p-¢h BC¢f HÉ¡­XÊp öl¦ qu
192.0.0.0 ®b­L Hhw ®no qu 223.255.255.255 fkÑ¿¹ z fËbj AL­V­Vl phÑ¢ejÀ j¡e 192 J p­h¡ÑµQ j¡e 223 z Hl ¢q­ph¢V
Ll­a q­h ¢ejÀl¦fi¡­h-

1 1 0 0 0 0 0 0 > fËbj AL­V­Vl phÑ¢ejÀ j¡e =192


1 1 0 1 1 1 1 1 > fËbj AL­V­Vl p­h¡ÑµQ j¡e =223

¢edÑ¡¢la

­kje dl¦e, 200.34.27.66 HL¢V LÓ¡p-¢h BC¢fHÉ¡­XÊp z Hja¡hÙÛ¡u LÓ¡p-¢h Hl ¢XgÒV p¡h­eV j¡ú q­h 255.255.255.0 z
H­r­œ ®eVJu¡LÑ Aw­nl SeÉ HÉ¡­XÊp q­h 200.34.0.0 Hhw ®q¡ØV Aw­nl HÉ¡­XÊp q­h 0.0.0.66 z ¢q­ph Ll­m ®cM¡ k¡u LÓ¡ p-¢p
Hl ®eVJu¡LÑ HÉ¡­XÊp q­µR 2097125 ¢V Hhw fË¢a¢V ®eVJu¡­LÑZ ®r­œ ®q¡ØV pwMÉ¡ 2-8-2 Ab¡Ñv 254 ¢V z

LÓ¡p H, ¢h Hhw ¢p HÉ¡­XÊp Hl HL¢V pw¢rç RL BL¡­l ¢e­jÀ fËcšJ q­m¡ x


BC¢f ­eVJu¡LÑ HÉ¡­XÊp Aw­n ¢hV LÓ¡­p p­h¡ÑµQ ®eVJu¡LÑ ­q¡ØV HÉ¡­XÊp Aw­n LÓ¡­p p­h¡ÑµQ ®q¡ØV
LÓ¡p/®nËe£ pwMÉ¡ (fË¢a AL­VV ¢hV pwMÉ¡ 8) HÉ¡­XÊp pwMÉ¡ ¢hV pwMÉ¡ HÉ¡­XÊp pwMÉ¡
H 8 28-2=254 24 224-2=1,67,77,214
16
¢h 16 2 -2=65,534 16 216-2=65,534
¢p 24 224-2=1,67,77,214 8 28-2=254

BC¢f HÉ¡­XÊ­pl i¡N z BC¢f HÉ¡­XÊ­pl ®j¡V c¤C¢V Awn l­u­R z HL¢V q­m¡ ®eVJu¡LÑ Awn Afl¢V q­m¡ ®q¡ØV Awn z ¢e­jÀ
¢Q­œ hs, jdÉj J ­R¡V ®eVJu¡­LÑl SeÉ ®eVJu¡LÑ Hhw ®q¡ØV Awn­L pe¡š² Ll¡ q­m¡ x

18
p£¢ja
p£¢ja

LÓ¡p ¢X (Class-D)z ­eVJu¡­LÑl ®r­œ LÓ¡p-¢X J LÓ¡p-C Hl …l¦aÄ M¤hC Lj z LÓ¡p ¢X Hl ®hm¡u fËbj AL­V­Vl fËbj Q¡l¢V
HjHp¢h'l ®p¢Vw kb¡œ²­j 1.1.1 J 0 z LÓ¡p-¢X HÉ¡­XÊp öl¦ qu 224.0.0.0 q­a Hhw ®no qu 239.255.255.254 H ¢N­u zLÓ¡p-
¢X BC¢f HÉ¡­XÊp j¡¢ÒVL¡ØV N˦­fl (Multicust Group) SeÉ pwl¢ra z j¡¢ÒVL¡ØV Af¡­ln­e ®L¡e ®q¡ØV h¡ ®eVJu¡LÑ HÉ¡­XÊ­pl
h¡m¡C ®eC z HM¡­e öd¤j¡œ HL¢V N˦f Ef¢ÙÛa z Bf¢e kMe ®L¡e j¡¢ÒVL¡ØV N˦­fl pcpÉ q­he aMe N˦­fl AeÉ¡eÉ pcpÉl¡ ®k ab¡
h¡ ®XV¡ f¡­h, Bf¢eJ ýhý I X¡V¡ a¡ a­bÉl e¡N¡m ®f­u k¡­he z ¢i¢XJ Leg¡­l¢¾pw Hl j­a¡ H¢fÔ­Ln­e H dl­el HÉ¡­XÊp
hÉhq¡l Ll¡ qu z

LÓ¡p C (Class-E)z LÓ¡p-C BC¢f HÉ¡­XÊ­pl fËbj AL­V­Vl fËbj Q¡l¢V HjHp¢h 1 à¡l¡ f§eÑ b¡­L z LÓ¡p-C Hl HÉ¡­XÊp öl¦
qu 240.0.0.0 à¡l¡ Hhw ®no qu 255.255.255.254 H ¢N­u z i¢hoÉ­a hÉhq¡­ll SeÉ LÓ¡p-C HÉ¡­XÊp pwl¢ra L­l l¡M¡ q­u­R z

19
p£¢ja
p£¢ja

f¡W-5z Creating a local area network, GPRS/dialup connections.

®m¡L¡m H¢lu¡ ®eVJu¡LÑ °al£ z ®m¡L¡m H¢lu¡ ®eVJu¡LÑ °al£ Ll¡l SeÉ L¢ÇfEV¡­l ¢LR¤ Le¢gN¡l f¢lhaÑe Ll­a qu z
A¡jl¡ HMe ®pC ®p¢Vw…­m¡ d¡l¡h¡¢qLi¡­h S¡ehx

 fÊb­j Computer Name Hhw Workgroup f¢lhaÑe Ll­a q­h z

L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf f¢lhaÑe Ll¡l ¢euj d¡l¡h¡¢qL i¡­h ¢e­jÀ ®cJu¡ q­m¡ x

 My Computer > Right Click


 Properties > Click
 Computer Name Tab > Click

 Change > Click

Type Computer Name

Type Workgroup Name

 L¢ÇfEV¡l ®ej ®mM¡l pju AhnÉC j­e l¡M­a q­h ( z ; : x / - + Space \ ) ¢Qq² ­cJu¡ k¡­h e¡ a­h ®R¡V q¡­al Hhw hs
q¡­al ®mM¡ V¡Cf Ll¡ k¡­h z
 Ju¡LÑNʦf ®mM¡l pju ph…­m¡ ®mM¡ hs q¡­al q­h z
 L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf ®mM¡l fl OK – OK – OK Ll­a q­h Hhw ph­n­o L¢ÇfEV¡l­L ¢lø¡VÑ Ll­a q­h AeÉb¡u
®k E­ŸnÉ ¢e­u L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf f¢lhaÑe Ll¡ q­u­R a¡q¡ p¢WL i¡­h L¡S Ll­h e¡z ( ®e¡V x ®eVJu¡­LÑ AeÉ¡eÉ
L¢ÇfEV¡l ®ej HLC lLj ®mM¡ k¡­h e¡ ¢L¿º Workgroup HLC q­m ®L¡e pjpÉ¡ q­h e¡ z )

20
p£¢ja
p£¢ja

A¡C ¢f HÉ¡­XÊp ®p¢Vw Hl ¢euj¡hm£ z

A¡C ¢f HÉ¡­XÊp ®p¢Vw Hl SeÉ (Start > Setting > Control Panel > Network Connection > Open) Abh¡
 fÊb­j Desktop H My Network Place > Right Click
 Properties > Click

 LAN or High Speed Internet : Local Area Connection Icon > Right Click
 Properties > Click

Step-1 Click

Step -2 Click-1

 Internet Protocol ( TCP/IP) > Click


 Properties > Click
 Use the following IP address > Radio h¡V­e > Click
 ¢e­jÀ ¢Q­œ ¢Li¡­h A¡C ¢f ¢mM­a q­h ®pV¡ ®cM¡­e¡ q­m¡

21
p£¢ja
p£¢ja

öd¤ HC Aw­n ¢LÓL Ll­a q­h

 A¡C ¢f H­XÊp Hhw Subnet mask ®cJu¡l fl OK Ll­a q­h z

X¡u¡mBf/¢S¢fBlHp Le¢gN¡­lne z HC f¡W¢V L¢ÇfEV¡l ®eVJu¡¢LÑw X¡V¡ L¢jE¢e­Lne J C¾V¡l­eV (EC­ä¡S J


¢me¡„), ®mML- ®L Hj Bm£ ®lS¡ z HC hC¢Vl fªù¡ eðl 300 H ­cJu¡ B­R z

pl¡p¢l k¤š² eu Hje c¤lha£Ñ AhÙÛ¡­el p¡i¡Ñl h¡ ®eVJu¡­LÑl p­‰ ®k¡N¡­k¡N ÙÛ¡f­el SeÉ HMe fkÑ¿¹ pl¡p¢l X¡u¡m Bf fÜ¢aC
ph­Q­u ®h¢n hÉhq©a q­µR Hhw H¢V HL¢V Se¢fËu fÜ¢aJ h­V z X¡u¡m Bf pw­k¡N fË¢œ²u¡¢Vl p§Qe¡ qu NË¡qL h¡ LÓ¡­u¾V L¢ÇfEV¡l
®b­L z H­r­œ LÓ¡­u¾V L¢ÇfEV¡l ®L¡e X¡u¡m Bf ¢Xi¡C­pl pq¡ua¡ ¢e­u b¡­L z H X¡u¡m Bf ¢Xi¡Cp¢V q­µR HL¢V j­Xj z
j­Xj Bh¡l c¤C lL­jl z ®kje - HÉ¡e¡mN j­Xm Hhw ¢X¢SV¡m j­Xj z ®kpLm j­Xj Hl p¡­b ®V¢m­g¡e m¡C­el pw­k¡­Nl j¡dÉ­j
X¡V¡ L¢jE¢e­Lne Ll¡ qu h¡ C¾V¡l­eV hÉhq¡l Ll¡ qu a¡q¡ p¡d¡lZa HÉ¡e¡mN j­X­j­l BJa¡i¨š² Hhw haÑj¡e pj­u Bjl¡
®j¡h¡Cm ®g¡e, C¢X¢SC j­Xj, ¢S¢fBlHp General packet radio service (GPRS) j­Xj CaÉ¡¢c hÉhq¡®ll j¡dÉ­j ®k
C¾V¡l­eV hÉhq¡l L¢l a¡q¡ ¢X¢SV¡m j­X­jl BJa¡i¥š² z ¢e­jÀ L­uL¢V j­X­jl ¢Qœ a¥­m dl¡ q­m¡ x

22
p£¢ja
p£¢ja

Modems can be of following types :

A. Landline Modems
B. Wireless Modems
c. LAN Modems

A. Landline Modems:landline modems are modems which connect to the public switched telephone
network (PSTN). To connect to PSTN, these modems have a jack known as RJ-11, or regular phone
jack. A telephone cable with a RJ-11 plug connects the modem to the nearest phone jack, which also
conforms to the RH-11standard.
Landline modems can be further classified into the followings types

1.Internal modems
2.External modems
3.PCMCIA modems
4. Voice/data/fax modems

B. Wireless Modems: Wireless modems are radio transmitters/receivers installed into mobile
computing devices(i.e devices that are used while you are moving such as mobile phones, laptops etc.)
Using wireless modems, one can connect to a network while being mobile. Unlike landline modems,
wireless modems do not plug into an RJ-11 jack.

C. LAN Modems: LAN modems allow shared remote access to LAN (Local Area
Network)resources. LAN modem comes fully p reconfigured for a single particular network architecture
such as Ethernet or Token RIng and/or a particular network software such as IPX, NetBIOS, NetBEUI
etc. LAN modems are of various types depending upon the number of ports, network architecture(s)
supported, network protocols supported, client platforms supported, memory requirements, security etc.

How to Create a Dial-Up Connection in Windows XP

1. From the Start menu, choose Control Panel.

1. Click the Network and Internet Connections icon.

23
p£¢ja
p£¢ja

2. Click the Set up or change your Internet connection icon.

3. Click the Setup button.

4. Click the Next button.

5. Select Connect to the Internet.


6. Click the Next button.

24
p£¢ja
p£¢ja

7. Select Set up my connection manually.


8. Click the Next button.

9. Select Connect using a dial-up modem.


10. Click the Next button.

25
p£¢ja
p£¢ja

Important Note

If you get to this poing and the screen will not allow you to choose "Connect using a dial-up modem"
Then hit the Cancel button.

Go to the start Menu


Go to Settings
Go to Control Panel
Select Network
Select the option of "Set up or Change a dial up Account"
At that point it will take you to step 4 and you continue down the list.

11. In the ISP Name field, type a name to identify your connection (ie. AztecaNet).
12. Click the Next button.

26
p£¢ja
p£¢ja

13. In the Phone number field, type your local access number exactly as it needs to be dialed.

Note: If you require 10-digit dialing in order to access a local number, make sure to include
your area code.

14. Click the Next button.

15. In the User name field, type your email address.


16. In the Password field, type your password.
17. In the Confirm password field, type your password.
18. Uncheck the box next to Use this account name and password when anyone connects to the
Internet from this computer.
19. Uncheck the box next to Make this the default Internet connection.
20. Uncheck the box next to Turn on Internet Connection Firewall for this connection.
21. Click the Next button.

27
p£¢ja
p£¢ja

22. Check the box next to Add a shortcut to this connection to my desktop if you wish to have a
shortcut to the connection on your desktop.
23. Click the Finish button.

You have successfully created a Dial-up Connection in Windows XP.

http://www.azteca.net/support/windowsxp.html

28
p£¢ja
p£¢ja

Create a Dial-Up Networking connection on Windows 7.

1. Click on Start
2. Than click on Computer

3. Click on Network and Internet

4. and then click on Network and Sharing Center

5. Once you are in the Network and Sharing Center, click on the Set up a new connection or
network option.

6. Click on Connect to the Internet.


29
p£¢ja
p£¢ja

7. Click on the Dial-up option

30
p£¢ja
p£¢ja

8. Enter the EarthLink Dial-up (POP) phone number you were given by EarthLink to dial for your
Dial-up connection in the Dial-up phone number field.

 For User name, enter in your full EarthLink email address including the @earthlink.net,
mindspring.com, or other @domain-name.com part of your address.
 For Password, enter in your full EarthLink email address password.
 Check the option for Remember this password if you want the password automatically saved
when you connect. If you do not check this option, you will have to manually enter your
password every time you connect to EarthLink.
 For Connection name, name your connection EarthLink Dial Connection or something similar
you will recognize as your EarthLink Dial-up connection.
 Click the Connect option to dial your new Dial-up Connection. This will also save this
connection for future use.

(Note: You can check the Allow other people to use this connection option if you have more than one
user account on your computer and you want that person to be able to use this dial connection as well.
There is no harm in leaving this option unchecked.)

9. After clicking Connect, Windows 7 will attempt to connect to the EarthLink network over a
Dial-up connection. You will need to have a Dial-up modem installed in the computer with an available
phone line plugged into the modem port on the computer to connect to EarthLink.

31
p£¢ja
p£¢ja

10. Once connected, you will see a The connection to the Internet is ready to use window. Click
Close. You have now successfully connected to EarthLink via Dial-up and Windows 7 will save this
connection for future use.

To Disconnect from EarthLink

11. If you are already connected you will see a button to Disconnect from EarthLink button when
you click on the connection name. Just click the Disconnect button to disconnect from EarthLink.

32
p£¢ja
p£¢ja

http://support.earthlink.net/articles/dialup/create-a-dial-up-networking-connection-on-windows-7.php

33
p£¢ja
p£¢ja

পাঠঃ ৬ Establishing a Peer-Peer Network.

¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑ x ¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑ fËaÉL CES¡l AeÉ CES¡ll p¡b abÉ ®nu¡l Ll z H dlZl ®eVJu¡LÑ Q¡m¤
qu 1984 p¡m ®bL, kMe Hfm L¢ÇfEV¡l a¡cl jÉ¡¢L¾Vn fÔ¡p Eá¡he Llm z j¡Cœ²¡pgV 1992 p¡m a¡cl Eá¡¢ha ECä¡S 3|11
®L ¢fu¡l-V¤-¢fu¡l ®eVJu¡LÑl Efk¡N£ Ll a¥m z ¢fu¡l-V¤-¢fu¡l ®eVJu¡LÑl j¡dÉj CES¡l a¡cl ¢f˾V¡l, ®g¡ô¡l, ¢p¢Xlj XÊ¡Ci, gÓ¢f
¢Xú CaÉ¡¢c AeÉl p¡b ®nu¡l Lla f¡l z

¢g¢SLÉ¡m L¡eLn¡e ( Physical Connections)

LÉ¡hm ®eVJu¡¢LÑw ( Wired Networking)

After installing the operating systems on the computers that will primarily participate in the network,
you can "physically" connect the computers and the router.

Practical Learning: Wiring the Network

১। L¢ÇfEV¡l Hhw l¡EV¡l Hl f¡Ju¡l hå Lla qh (k¢c fËu¡Se qu) z Shut down all computers and the router (if
necessary)

২। l¡EV¡l ®pVBf Ll¡l SeÉ HL¢V L¢ÇfEV¡l Ae Lla qh z Turn on one computer you will use to setup
the router

৩। l¡EV¡l Le¢gN¡l Ll¡l fl L¢ÇfEV¡l Hhw l¡EV¡l hå Ll ¢ea qh Hhw ®kM¡e hÉhq¡l Ll¡ qh ®p ÙÛ¡e ¢eu ®pV Ll ¢ea qh
z
After setting up and configuring the router, turn it off and turn off the computer you used to set
it up (this step is optional)

৪। BlS-45 LÉ¡hm ¢cu ph…m¡ L¢ÇfEV¡lL l¡EV¡ll p¡b pwk¡N fËc¡e Lla qh z
Connect each of the other computers to the router using an RJ-45 cable for each connection:

k¢c ph ¢LR¤ hå AhÙÛ¡u b¡L ®prœ fËbj l¡EV¡lL Ae Lla qh Hhw ¢LR¤rZ fl L¢ÇfEV¡l…m¡ Ae Lla qh z k¢c ®eVJu¡LÑ ¢XV¡ƒ
LlR H dlel ®L¡e jÉ¡pS Bp a¡qm i¡m ¢L¿º k¢c e¡ Bp a¡qm qa¡n e¡ qu flha£Ña ®QL Ll ¢ea qhz ( If you had turned
off (some of) the machines, first turn on the router. Then, after a few seconds, turn on the
computers. If you receive some messages indicating that a network was detected, fine. If not,
don't worry, we will check the network later.)

Ju¡lmp ®eVJu¡¢LÑw (Wireless Networking)

k¢c Ju¡lmp l¡EV¡l ®pVBf Lla qu ®prœ HL¢V L¢ÇfEV¡l l¡EV¡l¢V ®pVBf Ll ¢ea qh z ( If you plan to setup a
wireless network using a wireless router, you will need to use one computer to set it up).

Practical Learning: Wirelessly Connecting a Network

১। fËbjC L¢ÇfEV¡l Hhw l¡EV¡l¢V Ae Lla qh Hhw AeÉ ph…m¡ L¢ÇfEV¡l hå Lla qh z (Start the computer you will
use to setup the router (you should turn the others off):

34
p£¢ja
p£¢ja

২। ®h¢nl i¡¡N l¡EV¡llC pqS ®pV¡f Ll¡l SeÉ p¡b HL¢V ¢p¢X ®cu¡ b¡L z p¡d¡lZa AeL l¡EV¡l Hl ®rœ L¢ÇfEV¡ll p¡b
m¡N¡e¡l fl Hl pgVJu¡l ¢cu ®pV¡f Lla qu z ¢p¢Xl jdÉ CES¡l ®je¤u¡m gm¡ Ll l¡EV¡l ®pV¡fl L¡S pÇfæ Ll¡ ®ua f¡l z ¢e-
jÀ HL¢V l¡EV¡lL L¢ÇfEV¡ll p¡b pwk¡N ¢cu ®cM¡e¡ qm¡ x (Most, if not all, wireless routers come with very
easy to follow instructions. Most of them usually ask you to first insert the CD that
accompanies the router, that is, before physically installing the router. Consult the
documentation (usually just one or a few pieces of paper or a small brochure) and faithfully
follow its CD's instructions. At one time, the instructions would indicate to you when to connect
the computer and the wireless router. To do this, you will use a cable (usually supplied to you)
to connect one end to the computer and another end to the router):

• 3 Because the steps to perform depend on the router (or the manufacturer), we will
let you perform as described by their documentation
• 4 After installing and setting up the wireless router, turn it off and turn the computer
off
5 If you didn't yet, install the wireless network card(s) on the other computer(s).
For any computer that doesn't have a wireless network card but has a wired network card,
connect it to a port of the wireless router using an RJ-45 cable. The computers that have a
network card will not need a physical connection to the wireless router

6 Turn on the router. After a few seconds, turn on the computers one by one.
You may not need to check whether they work at this time or not. We will check this later

35
p£¢ja
p£¢ja

Network Connections

Network Setup on First Computer. After establishing the physical or wireless


connections of the computers, you can electronically connect them, test or check that they can
"see" each other. Microsoft Windows XP makes networking ridiculously easy. In fact, when
writing these lessons, after physically connecting the computers to the router and turning
everything on, the whole network had been built and there was no particularly necessary
configuration to perform: everything was ready. Still, in the next few sections, we will pretend
that the network is not (yet) working.

To "virtually" connect the network, Microsoft Windows XP provides the Network Setup Wizard,
which is a series of dialog boxes that can guide you in this process. To start this wizard:

Practical Learning: Wirelessly Connecting a Network

1. On one of the computers that runs either Microsoft Windows XP (HE or Pro), click Start >
(All) Programs > Accessories > Communications > Network Setup Wizard
2. The first page of the wizard will present a message and a bulleted list but nothing to
choose:

Read the text and click Next


3. The second page of the wizard also displays a message:

Viewing Network Connections


My Network Places

Once you have built a computer network, from time to time, you will need to check what computers are
available and/or what files or folders have been shared. To assist you with this, Microsoft Windows XP
provides a window named My Network Places.

36
p£¢ja
p£¢ja

To view the available connected computers:

Practical Learning: Viewing the Connected Computers

1. On one of the computers, click Start>My Network Places.

If you don't see that option in the right column of the Start menu, depending of your
configuration, click Start > Settings > Network Connections. Then, under Other Places, click
My Network Places. As an alternative, you can click Start > Control Panel or Start >
Settings > Control Panel. Under Other Places, click My Network Places.

1. Under Network Tasks, click View Workgroup Computers

37
p£¢ja
p£¢ja

f¡W-7z Intro to Internet and types of internet connections.

C¾V¡l­eV ¢L?
C¾V¡l­eV në¢Vl pÇf§eÑ AbÑ q­µR C¾V¡lL¡­eL­VX ®eVJu¡LÑ ( Interconnected Network ) z C¾V¡l­eV Hje HL¢V ¢p­øj h¡
hÉhÙÛ¡ k¡ p¡l¡ ¢hnÄhÉ¡f£ ¢hÙ¹ªa z C¾V¡l­e­Vl Ef¡c¡e q­µR Hl CES¡l, abÉ, ­V¢m­k¡N¡­k¡N hÉhÙÛ¡ Hhw L¢ÇfEV¡l z Hph Ef¡c¡­el
j¡dÉ­j HL ÙÛ¡e ®b­L AeÉ ÙÛ¡­e H­L Af­ll p¡­b abÉ A¡c¡e-fÊc¡e L­l b¡­L z H¢V A¡p­m j§ma HL¢V ®eVJu¡LÑ k¡ öd¤
fÊ­u¡Se­LC ®jV¡ue¡, a¡l p¡­b L¢j­u A¡­e pj­ul c£OÑa¡ z fÊ¢a¢ce A¡jl¡ C-­jCm Ll¢R, ¢h¢ieÀ abÉ pwNÊq Ll¢R C¾V¡l­e­Vl
j¡dÉ­j z ¢eaÉ ea¤e Eá¡h­el g­m ¢ce ¢ce C¾V¡l­e­Vl p¤­k¡N-p¤¢hd¡ Hhw a­bÉl pj¡­l¡q ®h­s Q­m­R z pª¢ø q­µR ea¤e ea¤e në J
¢hou z p¡Ch¡l LÉ¡g, p¡Ch¡l L­ue, C¾V¡l­eV Lj¡pÑ, C¾V¡l­eV ®g¡e, C­mLVÊ¢eL ®jCm, C­mLVÊ¢eL h¤L, C­mLVÊ¢eL m¡C­hÊl£,
C­mLVÊ¢eL LÉ¡Çf¡p H dl­el L­uL¢V ¢hou z

ADSL and cable are types of broadband connection, the term "broadband" only refers to the
performance of an internet connection, not to any particular type of connection.

The connection types in this section include:

 Dial-up Connections
 ADSL Connections
 Cable Connections

Dial-up connections: Dial-up connections are one type of internet connection available from ISPs,
they are the slowest and (usually) the most inexpensive.

A dial-up connection allows you to connect to the internet via a local server using a standard 56k
modem. Your PC literally dials (hence the name) a phone number (provided by your ISP) and connects
to the server and therefore the internet

ADSL connections. ADSL (Asymmetric Digital Subscribers Line) connections are becoming more
and more widely available and can provide an excellent internet connection.

The connections work by splitting your phone line into two separate channels, one for data (internet)
and one for voice (phone calls), which means you can talk on the phone and be connected to the internet
at the same time.

You will often see ADSL connection services advertised as having different speed specifications, below
are some common configurations:

 256Kbps/128Kbps
 512Kbps/128Kbps
 1Mbps/256Kbps
 2Mbps/512Kbps
 8Mbps/1024Kbps

Notice there are two values to each configuration, the first figure states the download speed and the
second figure is the maximum upload speed.

Cable connections

Cable connections are considered one of the best types of internet connection available to the home
user, they offer very fast and reliable connections with a fixed monthly fee.

38
p£¢ja
p£¢ja

Cable companies usually offer different packages to suit different internet subscribers, your choice of
package, as with all internet connections, will depend on how you intend to use the internet.

The different packages will offer different speed specifications and bandwidth limits. Because a cable
connection uses a totally separate medium to transfer data it doesn't affect your ability to make/receive
phone calls.
http://www.computertooslow.com/internet-connections.asp
http://www.helpwithpcs.com/internet/internet-connections.htm

39
p£¢ja
p£¢ja

Server Based Network

f¡W-1z Intro to Server Based Network.

What is Server

1. A server is a system (software and suitable computer hardware) that responds to


requests across a computer network to provide, or help to provide, a network service.
Servers can be run on a dedicated computer, which is also often referred to as "the
server", but many networked computers are capable of hosting servers. In many cases, a
computer can provide several services and have several servers running.

2. Servers often provide essential services across a network, either to private users
inside a large organization or to public users via the Internet. Typical computing servers
are database server, file server, mail server, print server, web server, gaming server,
application server, or some other kind of server.

Types of servers:

1. In a general network environment the following types of servers may be found.

a. Application server, a server dedicated to running certain software


applications.

b. Catalog server, a central search point for information across a distributed


network.

c. Communications server, carrier-grade computing platform for


communications networks

d. Compute server, a server intended for intensive (esp. scientific)


computations

e. Database server, provides database services to other computer programs or


computers

f. Fax server, provides fax services for clients

g. File server, provides remote access to files

h. Game server, a server that video game clients connect to in order to play
online together

j. Home server, a server for the home

40
p£¢ja
p£¢ja

k. Mail server, handles transport of and access to email

l. Mobile Server, or Server on the Go is an Intel Xeon processor based server


class laptop form factor computer.

m. Name server or DNS

n. Print server, provides printer services

p. Proxy server, acts as an intermediary for requests from clients seeking


resources from other servers

q. Web server, a server that HTTP clients connect to in order to send


commands and receive responses along with data contents

DEMO

Install windows server 2008

41
p£¢ja
p£¢ja

f¡W-2z Installing Win 2008 Server, Adding client to active directory, domain controller, DNS.

Follow this procedure to install Windows Server 2008:

1. Insert the appropriate Windows Server 2008 installation media into your DVD drive.
2. Reboot the computer.

3. When prompted for an installation language and other regional options, make your selection
and press Next.

4. Next, press Install Now to begin the installation process.

42
p£¢ja
p£¢ja

5. Product activation is now also identical with that found in Windows Vista. Enter your Product
ID in the next window, and if you want to automatically activate Windows the moment the installation
finishes, click Next.

If you do not have the Product ID available right now, you can leave the box empty, and click Next.
You will need to provide the Product ID later, after the server installation is over. Press No.

43
p£¢ja
p£¢ja

6. Because you did not provide the correct ID, the installation process cannot determine what kind
of Windows Server 2008 license you own, and therefore you will be prompted to select your correct
version in the next screen, assuming you are telling the truth and will provide the correct ID to prove
your selection later on.

7. If you did provide the right Product ID, select the Full version and click Next.

44
p£¢ja
p£¢ja

8. Read and accept the license terms by clicking to select the checkbox and pressing Next.

9. In the "Which type of installation do you want?" window, click the only available option–
Custom (Advanced).

45
p£¢ja
p£¢ja

10. In the "Where do you want to install Windows?", if you're installing the server on a regular
IDE hard disk, click to select the first disk, usually Disk 0, and click Next.

Click Drive Options and manually create a partition on the destination hard disk.

46
p£¢ja
p£¢ja

11. The installation now begins, and you can go and have lunch. Copying the setup files from the
DVD to the hard drive only takes about one minute. After 20 minutes, the operating system is installed.
The exact time it takes to install server core depends upon your hardware specifications.

The installation process will reboot your computer.

12. Then the server reboots you'll be prompted with the new Windows Server 2008 type of login
screen. Press CTRL+ALT+DEL to log in.

13. Click on Other User.

47
p£¢ja
p£¢ja

14. The default Administrator is blank, so just type Administrator and press Enter.

15. You will be prompted to change the user's password. You have no choice but to press Ok.

48
p£¢ja
p£¢ja

16. In the password changing dialog box, leave the default password blank (duh, read step #15…),
and enter a new, complex, at-least-7-characters-long new password twice. A password like "topsecret"
is not valid (it's not complex), but one like "T0pSecreT!" sure is. Make sure you remember it.

17. Someone thought it would be cool to nag you once more, so now you'll be prompted to accept the
fact that the password had been changed. Press Ok.

49
p£¢ja
p£¢ja

18. Finally, the desktop appears and that's it, you're logged on and can begin working. You will be
greeted by an assistant for the initial server configuration, and after performing some initial
configuration tasks, you will be able to start working.

50
p£¢ja
p£¢ja

পাঠঃ-৩। Configure Active Directory users and computers.

Install Windows Server 2008 64-bit version.

Exchange 2007 is a 64-bit application and requires 64-bit versions of Windows Server 2003 or
Windows Server 2008. You should select a computer that is capable of running the 64-bit version of
Windows Server 2003 or 2008. For this example we will start with a clean installation of Windows
Server 2008 64-bit version that has not had any roles installed.

After installing Windows Server 2008, we set the clock and the name of the server to be "EX2007". At
this point this server is configured to be a stand-alone computer with default settings.

Configure Your Static IP Address.

The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP. Since we
will be configuring this computer to be a domain controller, you must change the IP address of the
computer to be a static IP address.

 To change your IP address, click on "View Network Connections" in the Server Manager
screen.
This will display the list of active network interfaces.

51
p£¢ja
p£¢ja

 Double-click on your network adaptor to display the adaptors status.

 Press the Properties button.

 Highlight "Internet Protocol Version 4 (TCP/IPv4)" and press the Properties button.

52
p£¢ja
p£¢ja

 Change the radio button to "Use the following IP address" and enter an IP address you want to
use for this server. In our example, we chose to assign this server the internal IP address
"192.168.1.25". We also have a firewall appliance that operates as a gateway at the IP address
"192.168.1.1".

NOTE: It is important to include this computer in the DNS list. You should list the IP address of this
computer as the first entry in the list of DNS servers. In the "Alternate DNS server" field, enter the IP
address of a DNS server provided by your ISP.

Press OK to save your changes.

Add role - Active Directory Services.

The process of installing Active Directory consists of two steps, the first step is to install Active
Directory and then you will need to configure your Active Directory. Once this is complete your
Windows Server will now be a domain controller.

Step 1 - Install Active Directory.

 At the Computer Management Screen press the "Add Roles" link. At the Select Server Roles dialog
check/tick the option "Active Directory Domain Services" and press Next.

53
p£¢ja
p£¢ja

 Active Directory Domain Services will present information about the changes it will make to your
server. Review this information and press Next.

54
p£¢ja
p£¢ja

 Now the installation will scan your configuration and inform you if there are any pre-requisites that
you have not fulfilled. If the Active Directory Installation presents an errors, correct these at this
time and then repeat the installation. Once the Setup program indicates that you have met all pre-
requisite, then press the Install button to start the installation process.

 The setup program will now install Active Directory on your Server.

55
p£¢ja
p£¢ja

 When the installation is complete you should see a message indicate "Installation Succeeded", press
Close to return to the Server Management Screen.

Step 2 - Configure Active Directory.

 At the Server Management screen you should now see that you have 1 role installed. The Active
Directory Domain Services may indicate that it is installed but there are errors. This is because the
software is installed but not configured.

 To configure Active Directory click on the line under Roles labeled "Active Directory Domain
Services". The Server Manage will show you a page about the status of the Active Directory Role.
56
p£¢ja
p£¢ja

 Click on the link "Run the Active Directory Services Installation Wizard (dcpromo.exe)" and the
Active Directory Domain Services Installation Wizard will appear, press Next.

 The Installation Wizard will present information about the version of Active directory, press Next.

57
p£¢ja
p£¢ja

 Since we are assuming this Exchange Server will be the first Domain Controller, we chose to create
a new domain in a new forest. Press Next.

58
p£¢ja
p£¢ja

 Enter the name of your domain. The domain name you enter here is the domain name that
Exchange will associate with all of your email. If you use a hosting company to host your Internet
Domain, then you may want to enter the name of your Internet domain with ".local". If you host
your own Internet Domain then you would enter your domain name here.

NOTE: Once you enter your domain name it is very hard to change it in the future, so you should take
great care when enter this name.

 Press Next once you have decided on the name of your internal domain, that will be your Active
Directory Domain and the domain serviced by Exchange.

 Next the Installation Wizard will ask you about compatibility. If you plan to have domain
controllers running various versions of Active Directory then you will want to chose a function level
to include the lowest version of Windows that you are using for domain controllers. Press Next.

59
p£¢ja
p£¢ja

 Next you will be asked a similar question which is at the domain level instead of the forest level on
the previous screen. You should follow the same approach and include the function level to include
the lowest version of Windows you plan to use for domain controllers. Press Next.

60
p£¢ja
p£¢ja

 The first Domain Controller needs to have a DNS server running locally. The optimal location is to
start out with having the installation wizard install the DNS server locally. Also it will
automatically make this computer a global catalog server. Press Next.

 You can specify where you want Active Directory to store its data. If you only have one drive in
your Server then use the defaults. If you have multiple drives, you can select which drive to use.
Press Next.

61
p£¢ja
p£¢ja

 Should you need to restore Active Directory in the event of a hard drive failure you will need to
boot your Server into a special mode called "Directory Restoration Mode". Should you need to boot
your computer into this special mode, you will need to use a special password just for this
restoration. You can define this password at this time. NOTE: This password is different than the
administrator account and if you change the administrator password this password will not change.
So you will need to store this password forever in a safe place. Press Next.

 Now the Installation Wizard will summarize the configuration that it is about to create. Press Next
to start the process of configuring your new Domain Controller.

62
p£¢ja
p£¢ja

 The Installation Wizard will show its progress as it configures your Server. This will take a long
time.

 When the installation is complete, you will be shown a final screen. Press Finish.

 Then restart your computer.

63
p£¢ja
p£¢ja

 After restarting your computer Windows should show you the Server Manager. You should see on
the Server Manager screen that you have Active Directory and DNS Server roles installed. Also the
process of installing Active Directory will add the features "Group Policy Management" and
"Remote Server Administration Tools".

http://www.igetmail.com/how-to-setup-exchange-2007/how-to-setup-exchange-2007.html

64
p£¢ja
p£¢ja

পাঠঃ-৪ Server Config: Domain Name System (DNS) Server.

Expand and click Roles


Figure C

DNS role
Figure D

65
p£¢ja
p£¢ja

Install DNS
DNS console and configuration

After installing DNS, you can find the DNS console from Start | All Programs | Administrative Tools |
DNS. Windows 2008 provides a wizard to help configure DNS.

When configuring your DNS server, you must be familiar with the following concepts:

a. Forward lookup zone


b. Reverse lookup zone
c. Zone types

A forward lookup zone is simply a way to resolve host names to IP addresses. A reverse lookup zone
allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a
forward lookup zone. A reverse lookup zone is not required, but it is easy to configure and will allow
for your Windows Server 2008 Server to have full DNS functionality.

When selecting a DNS zone type, you have the following options: Active Directory (AD) Integrated,
Standard Primary, and Standard Secondary. AD Integrated stores the database information in AD and
allows for secure updates to the database file. This option will appear only if AD is configured. If it is
configured and you select this option, AD will store and replicate your zone files.

A Standard Primary zone stores the database in a text file. This text file can be shared with other DNS
servers that store their information in a text file. Finally, a Standard Secondary zone simply creates a
copy of the existing database from another DNS server. This is primarily used for load balancing.
To open the DNS server configuration tool:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Highlight your computer name and choose Action | Configure a DNS Server… to launch the
Configure DNS Server Wizard.
3. Click Next and choose to configure the following: forward lookup zone, forward and reverse
lookup zone, root hints only (Figure E).
4. Click Next and then click Yes to create a forward lookup zone (Figure F).
5. Select the appropriate radio button to install the desired Zone Type (Figure G).

66
p£¢ja
p£¢ja

6. Click Next and type the name of the zone you are creating.
7. Click Next and then click Yes to create a reverse lookup zone.
8. Repeat Step 5.
9. Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone (Figure H).
10. Click Next and enter the information to identify the reverse lookup zone (Figure I).
11. You can choose to create a new file or use an existing DNS file (Figure J).
12. On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic
updates.
13. If you need to apply a DNS forwarder, you can apply it on the Forwarders window. (Figure K).
14. Click Finish (Figure L).

Figure E

Configure
Figure F

67
p£¢ja
p£¢ja

Forward lookup zone


Figure G

Desired zone
Figure H

68
p£¢ja
p£¢ja

IPv4 or IPv6
Figure I

Reverse lookup zone

Figure J

69
p£¢ja
p£¢ja

Choose new or existing DNS file


Figure K

Forwarders window
Figure L

70
p£¢ja
p£¢ja

Finish

Managing DNS records


You have now installed and configured your first DNS server, and you’re ready to add records to the
zone(s) you created. There are various types of DNS records available. Many of them you will never
use. We’ll be looking at these commonly used DNS records:
 Start of Authority (SOA)
 Name Servers
 Host (A)
 Pointer (PTR)
 Canonical Name (CNAME) or Alias
 Mail Exchange (MX)

Start of Authority (SOA) record

The Start of Authority (SOA) resource record is always first in any standard zone. The Start of
Authority (SOA) tab allows you to make any adjustments necessary. You can change the primary server
that holds the SOA record, and you can change the person responsible for managing the SOA. Finally,
one of the most important features of Windows 2000 is that you can change your DNS server
configuration without deleting your zones and having to re-create the wheel (Figure M).

Figure M

71
p£¢ja
p£¢ja

Change configuration

Name Servers

Name Servers specify all name servers for a particular domain. You set up all primary and secondary
name servers through this record. To create a Name Server, follow these steps:

1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone.
3. Right-click on the appropriate domain and choose Properties (Figure N).
4. Select the Name Servers tab and click Add.
5. Enter the appropriate FQDN Server name and IP address of the DNS server you want to add.
Figure N

72
p£¢ja
p£¢ja

Name Server

Host (A) records

A Host (A) record maps a host name to an IP address. These records help you easily identify another
server in a forward lookup zone. Host records improve query performance in multiple-zone
environments, and you can also create a Pointer (PTR) record at the same time. A PTR record resolves
an IP address to a host name. To create a Host record:

1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and click on the folder representing your domain.
3. From the Action menu, select New Host.
4. Enter the Name and IP Address of the host you are creating (Figure O).
5. Select the Create Associated Pointer (PTR) Record check box if you want to create the PTR
record at the same time. Otherwise, you can create it later.
6. Click the Add Host button.
Figure O

73
p£¢ja
p£¢ja

A Host (A) record

Pointer (PTR) records

A Pointer (PTR) record creates the appropriate entry in the reverse lookup zone for reverse queries. As
you saw in Figure H, you have the option of creating a PTR record when creating a Host record. If you
did not choose to create your PTR record at that time, you can do it at any point.To create a PTR record:

1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Choose the reverse lookup zone where you want your PTR record created.
3. From the Action menu, select New Pointer (Figure P).
4. Enter the Host IP Number and Host Name.
5. Click OK.

Figure P

74
p£¢ja
p£¢ja

New Pointer
Canonical Name (CNAME) or Alias records

A Canonical Name (CNAME) or Alias record allows a DNS server to have multiple names for a single
host. For example, an Alias record can have several records that point to a single server in your
environment. This is a common approach if you have both your Web server and your mail server
running on the same machine. To create a DNS Alias:

1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and highlight the folder representing your domain.
3. From the Action menu, select New Alias.
4. Enter your Alias Name (Figure Q).
5. Enter the fully qualified domain name (FQDN).
6. Click OK.

Figure Q

Alias Name

Mail Exchange (MX) records

Mail Exchange records help you identify mail servers within a zone in your DNS database. With this
feature, you can prioritize which mail servers will receive the highest priority. Creating MX records will
help you keep track of the location of all of your mail servers. To create a Mail Exchange (MX) record:

1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and highlight the folder representing your domain.
3. From the Action menu, select New Mail Exchanger.
4. Enter the Host Or Domain (Figure R).
5. Enter the Mail Server and Mail Server Priority.
1. Click OK.

75
p£¢ja
p£¢ja

Figure R

Host or Domain

Other new records


You can create many other types of records. For a complete description, choose Action | Other New
Records from the DNS console (Figure S). Select the record of your choice and view the description.

Figure S

Create records from the DNS console


76
p£¢ja
p£¢ja

Troubleshooting DNS servers

When troubleshooting DNS servers, the nslookup utility will become your best friend. This utility is
easy to use and very versatile. It’s a command-line utility that is included within Windows 2008. With
nslookup, you can perform query testing of your DNS servers. This information is useful in
troubleshooting name resolution problems and debugging other server-related problems. You can access
nslookup (Figure T) right from the DNS console.

Figure T

Nslookup utility
Get IT Tips, news, and reviews delivered directly to your inbox by subscribing to TechRepublic’s free
newsletters.
You May Also Like
 DNS tip for Windows Server 2012 systems using iSCSITechRepublic
 Windows Server 2012 deduplication: How and where to tweakTechRepublic
 5 Signs Stocks Will Collapse in 2013Money News
 Donald Trump Tells Americans to Prepare for "Financial Ruins"Money News

77
p£¢ja
p£¢ja

f¡W-5z Configuring DHCP Server.

 Installing Windows Server 2008 DHCP Server


 Click on start > All programs > Administrative tools > Server Manager
 To start the DHCP installation process, you can click Add Roles from the Initial Configuration
Tasks window or from Server Manager à Roles à Add Roles.

Figure 1: Adding a new Role in Windows Server 2008

 When the Add Roles Wizard comes up, you can click Next on that screen.
 Next, select that you want to add the DHCP Server Role, and click Next.

Figure 2: Selecting the DHCP Server Role

78
p£¢ja
p£¢ja

 If you do not have a static IP address assigned on your server, you will get a warning that you
should not install DHCP with a dynamic IP address.
 On the other hand, you can optionally configure your DHCP Server during this part of the
installation.
 In my case, I chose to take this opportunity to configure some basic IP settings and configure my
first DHCP Scope.
 I was shown my network connection binding and asked to verify it, like this:

Figure 3: Network connection binding

 What the wizard is asking is, “what interface do you want to provide DHCP services on?” I took the
default and clicked Next.
 Next, I entered my Parent Domain, Primary DNS Server, and Alternate DNS Server (as you see
below) and clicked Next.

79
p£¢ja
p£¢ja

Figure 4: Entering domain and DNS information

 I opted NOT to use WINS on my network and I clicked Next.


 Then, I was promoted to configure a DHCP scope for the new DHCP Server. I have opted to
configure an IP address range of 192.168.1.50-100 to cover the 25+ PC Clients on my local
network. To do this, I clicked Add to add a new scope. As you see below, I named the Scope WBC-
Local, configured the starting and ending IP addresses of 192.168.1.50-192.168.1.100, subnet
mask of 255.255.255.0, default gateway of 192.168.1.1, type of subnet (wired), and activated the
scope.

80
p£¢ja
p£¢ja

Figure 5: Adding a new DHCP Scope

 Back in the Add Scope screen, I clicked Next to add the new scope (once the DHCP Server is
installed).
 I chose to Disable DHCPv6 stateless mode for this server and clicked Next.
 Then, I confirmed my DHCP Installation Selections (on the screen below) and clicked Install.

Figure 6: Confirm Installation Selections


81
p£¢ja
p£¢ja

 After only a few seconds, the DHCP Server was installed and I saw the window, below:

Figure 7: Windows Server 2008 DHCP Server Installation succeeded

 I clicked Close to close the installer window, and then moved on to how to manage my new DHCP
Server.

82
p£¢ja
p£¢ja

How to manage your new Windows Server 2008 DHCP Server.

 Like the installation, managing Windows Server 2008 DHCP Server is also easy. Back in my
Windows Server 2008 Server Manager, under Roles, I clicked on the new DHCP Server entry.

Figure 8: DHCP Server management in Server Manager

 While I cannot manage the DHCP Server scopes and clients from here, what I can do is to manage
what events, services, and resources are related to the DHCP Server installation. Thus, this is a good
place to go to check the status of the DHCP Server and what events have happened around it.
 However, to really configure the DHCP Server and see what clients have obtained IP addresses, I
need to go to the DHCP Server MMC. To do this, I went to Start à Administrative Tools à DHCP
Server, like this:

83
p£¢ja
p£¢ja

Figure 9: Starting the DHCP Server MMC

 When expanded out, the MMC offers a lot of features. Here is what it looks like:

Figure 10: The Windows Server 2008 DHCP Server MMC

84
p£¢ja
p£¢ja

 The DHCP Server MMC offers IPv4 & IPv6 DHCP Server info including all scopes, pools, leases,
reservations, scope options, and server options.
 If I go into the address pool and the scope options, I can see that the configuration we made when
we installed the DHCP Server did, indeed, work. The scope IP address range is there, and so are the
DNS Server & default gateway.

Figure 11: DHCP Server Address Pool

Figure 12: DHCP Server Scope Options

 So how do we know that this really works if we do not test it? The answer is that we do not. Now,
let’s test to make sure it works.

85
p£¢ja
p£¢ja

How do we test our Windows Server 2008 DHCP Server?

 To test this, I have a Windows Vista PC Client on the same network segment as the Windows
Server 2008 DHCP server. To be safe, I have no other devices on this network segment.
 I did an IPCONFIG /RELEASE then an IPCONFIG /RENEW and verified that I received an IP
address from the new DHCP server, as you can see below:

Figure 13: Vista client received IP address from new DHCP Server

 Also, I went to my Windows 2008 Server and verified that the new Vista client was listed as a client
on the DHCP server. This did indeed check out, as you can see below:

Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases

 With that, I knew that I had a working configuration and we are done!

86
p£¢ja
p£¢ja

f¡W-6z Configuring Mail Server.

HpHj¢V¢f (SMTP- Simple Mail Transfer Protocol) z C­mƒÊ¢e„ ®jCm Bc¡e fËc¡­el SeÉ HpHj¢V¢f hÉhq©a
qu z HpHj¢V¢f'l LjÑL¡ä CES¡­ll ¢eLV AaÉ¡¿¹ f¢lú¡l z cª®nÉl A¿¹l¡­m HpHj¢V¢f c¤lha£Ñ L¢ÇfEV¡­l pw­k¡N ÙÛ¡fe L­l Hhw
A­eLV¡ Hg¢V¢f'l g¡Cm VÊ¡¾pg¡l fË¢œ²u¡l j­a¡C ®j­pS h¡ h¡a¡Ñ VÊ¡¾pg¡l L­l b¡­L z HpHj¢V¢f'l LjÑ fË¢œ²u¡ ¢e­u CES¡­ll
¢Q¿¹¡ Ll­mJ Q­m z Hje¢V ¢p­ØVj HÉ¡X¢j¢e­ØVÊV­ll J H ¢e­u M¤h ®h¢n j¡b¡ O¡j¡­a qu e¡ z hm¡ h¡ýmÉ­k, HpHj¢V¢f q­µR
C¾V¡l­e­Vl AeÉaj hým hÉhq©a HL¢V fË­V¡Lm k¡ CES¡­ll SeÉ pjpÉ¡j¤š² HL¢V fË­V¡Lm ¢q­p­hC ph¡Ñ¢dL f¢l¢Qa z

Installing Exchange 2010 Step-by-Step

With our handy guide, you'll have Exchange 2010 installed and running on top of Windows Server 2008
R2 in no time.

This is the second part of a two part series on Microsoft Exchange 2010. In the first article we examined
the changes and enhancements in Exchange 2010. This time we'll walk through the steps required to
install a fully functional Exchange 2010 server on Windows Server 2008 R2.

System Requirements

1. First, you need to make sure that your Active Directory (AD) environment and your Exchange
server meet the minimum requirements:

a. AD forest functional level is Windows Server 2003 (or higher)


b. AD Schema Master is running Windows Server 2003 w/SP1 or later
c. Full installation of Windows Server 2008 w/SP2 or later OR Windows Server 2008 R2
for the Exchange server itself
d. Exchange server is joined to the domain (except for the Edge Transport server role)

Prerequisites

In this example we are going to install Exchange 2010 on a Windows Server 2008 R2 operating system.
Before installing Exchange we need to install some Windows components. It's important that you don't
miss anything here because the Exchange 2010 installer does not provide very good feedback if Server
2008 R2 is missing required components.

1. Install the 2007 Office System Converter: Microsoft Filter Pack


2. Add the appropriate Windows components/features

3. Open PowerShell via the icon on the task bar or Start >> All Programs >> Accessories >> Windows
PowerShell >> Windows PowerShell. Be sure that PowerShell opened with an account that has rights to
install Windows components/features.
4. Run the following command: Import-Module ServerManager

5. For a typical install with the Client Access, Hub Transport, and Mailbox roles run the following
command:Add-WindowsFeature NET-Framework,RSAT-ADDS,Web-Server,Web-Basic-Auth,Web-
87
p£¢ja
p£¢ja

Windows-Auth,Web-Metabase,Web-Net-Ext,Web-Lgcy-Mgmt-Console,WAS-Process-Model,RSAT-
Web-Server,Web-ISAPI-Ext,Web-Digest-Auth,Web-Dyn-Compression,NET-HTTP-Activation,RPC-
Over-HTTP-Proxy -Restart. For a full matrix of the required Windows components with regards to the
Exchange server roles see:http://technet.microsoft.com/en-us/library/bb691354.aspx#WS08R2

6. If your Exchange server will have the Client Access Server role set the Net.Tcp Port Sharing Service
to start automatically
7. Open PowerShell via the icon on the task bar or Start >> All Programs >> Accessories >> Windows
PowerShell >> Windows PowerShell. Be sure that PowerShell opened with an account that has rights to
modify service startup settings.
8. Run the following command: Set-Service NetTcpPortSharing -StartupType Automatic

Exchange 2010 Installation

88
p£¢ja
p£¢ja

Now we're ready to run the Exchange 2010 installer. We'll go through a typical installation that includes
the Client Access, Hub Transport, and Mailbox roles. This is what you will want to install if you are
only going to be running one Exchange server. If you scale out your Exchange architecture with
multiple servers then you will want to familiarize yourself with the Exchange server roles for a proper
deployment.

1. Logon to the desktop of your soon to be Exchange server with a Domain Admin account.
2. Run setup from the Exchange 2010 media.
3. Click on "Step 3: Choose Exchange language option" and choose one of the options (Install only
languages from the DVD will be fine in most cases).
4. Click on "Step 4: Install Microsoft Exchange."
5. Click Next at the Introduction page.
6. Accept the license terms and click Next.
7. Make a selection on the Error Reporting page and click Next.
8. Stick with the default "Typical Exchange Server Installation" and click Next.
9. Choose a name for your Exchange Organization and click Next.
10. Make a selection on the Client Settings page and click Next.
11. If you want your Exchange server to be available externally then choose a domain name such as
mail.myorganization.com, click Next.
12. Make a selection on the Customer Experience Improvement Program page and click Next.
13. If all the prerequisites are there then you can click Install.
14. Grab a cup of coffee or take a walk while the installation process does its thing.
15. When the installation has finished go back to the Exchange installation page click on "Step 5:
Get critical updates for Microsoft Exchange."
16. Install Microsoft Update (if necessary) so that Windows update will check for non-OS updates,
and verify that there are no Exchange updates.

89
p£¢ja
p£¢ja

পাঠঃ ৭ Server Config: File Server.


File Server
Open "Server Manager" and click "Add Role". Select "File Services" from the Server role list.

90
p£¢ja
p£¢ja

91
p£¢ja
p£¢ja

92
p£¢ja
p£¢ja

93
p£¢ja
p£¢ja

Now create a Folder and share it with below permissions.


Share name: UserData$ (You can hide the share using the dollar sign ($) at the end of the share name)

Administrators: Full Control

System: Full Control

Authenticated Users: Full Control

94
p£¢ja
p£¢ja

Security settings
Group: Authenticated Users

Type: Allow Applies to: This folder only

Permissions:
Traverse folder/execute file List folder / read data Read attributes
Read extended attributes Read permissions

95
p£¢ja
p£¢ja

Create a Quota Template.

96
p£¢ja
p£¢ja

97
p£¢ja
p£¢ja

98
p£¢ja
p£¢ja

99
p£¢ja
p£¢ja

Attach to a User's profile.

100
p£¢ja
p£¢ja

101
p£¢ja
p£¢ja

পাঠঃ ৮ ¢f˾ V p¡i¡Ñl (Print Server) z

LÓ¡­u¾V p¡i¡Ñl ®eVJu¡­LÑl ®r­œ ®eVJu¡¢LÑw Hl L¡S¢V p¡d¡lZa ¢f˾V p¡i¡Ñl Hl j¡dÉ­j pÇfæ Ll¡ qu z ¢f˾V p¡i¡Ñl e¡jL
¢Xi¡C­pl Ljf­r c¤­V¡ pw­k¡N p¤¢hd¡ h¡ ®f¡VÑ b¡­L z Hl HL¢V ¢f˾V¡­ll SeÉ Hhw Afl¢V pl¡p¢l ®eVJu¡LÑ LÉ¡h¢mw Hl p¡­b k¤š²
b¡­L z A­eL ¢f˾V p¡i¡Ñ­ll Bh¡l c¤­ul A¢dL ®f¡VÑ b¡­L z A¢a¢lš² ®f¡VÑ…­m¡ à¡l¡ HLp­‰ 2,3 Hhw 4 ¢V ¢f˾V¡l­L k¤š² Ll¡ qu z
kMe ®L¡e CES¡l HL¢V ¢f˾V Sh f¡W¡u aMe H¢V ®eVJu¡¢Lw ®Lh­ml j¡dÉ­j H­p g¡Cm p¡i¡Ñ­l Sj¡ qu z ¢f˾V p¡i¡Ñl pe¡š² L­l
¢fË¢¾Vw Hl SeÉ HL¢V g¡Cm p¡i¡Ñ­l A­fr¡ Ll­R z aMe ®p g¡Cm p¡i¡Ñl ®b­L g¡Cm¢V pwk¤š² ¢f˾V¡­l f¡¢W­u ®cu ¢f˾V Ll¡l SeÉ z
¢fË¢¾Vw pj¡ç q­m ¢f˾V p¡i¡Ñl g¡Cm p¡i¡Ñ­l HL¢V jÉ¡­pS ®gla f¡¢W­u S¡¢e­u ®cu ®k, ¢f˾V fË¢œ²u¡ pÇfæ q­u­R z ¢e­jÀ HL¢V ¢f˾V
p¡i¡Ñ­ll ¢Qœ ®cu¡ q­m¡ x

¢Qœx ¢f˾V p¡i¡Ñl

LÓ¡­u¾V -p¡i¡Ñl ®eVJu¡­LÑl f¡n¡f¡¢n ¢fu¡l-V¥-¢fu¡l ®eVJu¡­LÑJ ¢f˾V p¡i¡Ñl hÉhq¡l Ll¡ qu z a­h LÓ¡­u¾V -p¡i¡Ñl ®eVJu¡­LÑC ¢f˾V
p¡i¡Ñl ®h¢n hÉhq¡l q­u b¡­L z ¢f˾V p¡i¡Ñl ¢Xi¡C­pl ph­Q®u hs p¤¢hd¡ q­µR H¢V ®eVJu¡­LÑl ®k ®L¡e S¡uN¡­a ¢f˾V¡l ÙÛ¡f­el
p¤­k¡N ®cu z H­a L¢ÇfEV¡­ll p¡­b ¢f˾V¡l pwk¤š² Ll¡l ¢ho­u ®L¡e h¡dÉh¡dLa¡ ®eC z ¢fu¡l-V¥-¢fu¡l ®eVJu¡­LÑ ¢f˾V¡l ®k ®L¡e
HL¢V L¢ÇfEV¡­ll p¡­b k¤š² L­l a¡ k¢c ®nu¡l Ll¡ qu, a¡q­m ®eVJu¡­LÑl AeÉ¡eÉ L¢ÇfEV¡l M¤h pq­SC I ¢f˾V¡­l ¢f˾V Lj¡ä
f¡W¡­a f¡­l z HSeÉ Bm¡c ®L¡e ¢Xi¡C­pl fË­u¡Se qu e¡ z

102
p£¢ja
p£¢ja

f¡W-9z Remote Access Server.

Install the operating system


Install Windows Server 2008
1. On DC1, start your computer by using the Windows Server 2008 product disc.
2. Follow the instructions that appear on your screen. When prompted for a password, type
P@ssword.

Configure TCP/IP
Configure TCP/IP properties so that DC1 has a static IP address of 192.168.0.1 with the subnet mask
255.255.255.0 and a default gateway of 192.168.0.2.

Configure TCP/IP properties

1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.

Note : If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.

Figure 3. Initial Configuration Tasks window.

2. In the Network Connections window, right-click Local Area Connection, and then click
Properties.

3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties
4. Click Use the following IP address. Type 192.168.0.1 for the IP address, type 255.255.255.0 for the
subnet mask, type 192.168.0.2 for the default gateway, and type 192.168.0.1 for the preferred DNS
server.
5. Click OK, and then click Close.

103
p£¢ja
p£¢ja

Install Active Directory and DNS

Configure the computer as a domain controller for the Contoso.com domain. This will be the first and
only domain controller in this network.

Configure DC1 as a domain controller


1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information, click
Provide computer name and domain.
Note: If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. Change computer name to DC1, and then click OK.
4. In the Computer Name/Domain Changes dialog box, click OK.
5. Click Close, and then click Restart Now.
6. After the server restarts, in the Initial Configuration Tasks window, under Customize This
Server, click Add roles.
7. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
8. Select the Active Directory Domain Services check box, and then click Next.
9. In the Active Directory Domain Services dialog box, click Next.
10. In the Confirm Installation Selections dialog box, click Install.
11. In the Installation Results dialog box, click Close.
12. Click Start, and then click Run. In Open, type dcpromo, and then click OK.
13. On the Welcome page of the Active Directory Domain Services Installation Wizard, click Next.
14. Click Create a new domain in a new forest, and then click Next.
15. In FQDN of the forest root domain, type contoso.com, and then click Next.
16. In Forest functional level, select Windows Server 2003, and then click Next.
17. Click Next to accept Windows Server 2003 for the domain functional level.
18. Click Next to accept DNS server for the additional options for this domain controller.
19. Click Yes, the computer will use a dynamically assigned IP address (not recommended).
20. Click Yes in the confirmation dialog box.
21. Click Next to accept the default folder locations.
22. In Directory Services Restore Mode Administrator Password, type a password, and then click
Next.
23. Click Next.

24. The Active Directory Domain Services Installation Wizard will begin configuring Active
Directory. When the configuration is complete, click Finish, and then click Restart Now.

104
p£¢ja
p£¢ja

Create a user account with remote access permission :

Create a user account and configure the account with remote access permission.

Create and grant permission to a user account in Active Directory:


1. On DC1, click Start, point to Administrative Tools, and then click Active Directory Users and
Computers.
2. In the left side tree, expand contoso.com, right-click Users, point to New, and then click User.
3. In Full name, type user1, and in User logon name, type user1.
4. Click Next.
5. In Password, type P@ssword and in Confirm password, type P@ssword again.
6. Clear the User must change password at next logon check box, and then select the User cannot
change password and Password never expires check boxes.
7. Click Next, and then click Finish.

To grant remote access permission to user1:


1. In the left tree, click Users. In the details pane, right-click user1, and then click Properties.
2. On the Dial-in tab, in Network Access Permission, click Allow access, and then click OK.
Note : In a real-world scenario, you would use Network Policy Server (NPS) to configure and enable
remote access policies.
3. Close Active Directory Users and Computers.

Create a shared folder and file


DC1 is a file server that should be accessible to a remote user after access and authentication
methods have been configured.

Create a shared folder and file


1. On DC1, click Start, and then click Computer.
2. Double-click Local Disk (C:).
3. Right-click inside the blank space of the Windows Explorer window, point to New, and then click
Folder.
4. Name the folder CorpData.
5. Right-click the CorpData folder, and then click Share.
6. Type domain users, and then click Add.
7. Click Domain Users, and then click the Contributor permission level.
8. Click Share, and then click Done.
9. Double-click the CorpData folder, right-click the blank space in the empty folder, point to New,
and then click Text Document.
10. Name the document VPNTest.
11. Open VPNTest and add some text.
12. Save and close VPNTest.

105
p£¢ja
p£¢ja

Configuring VPN1

VPN1 is a computer running Windows Server 2008 that provides the following roles:

Active Directory Certificate Services, a certification authority (CA) that issues the computer
certificate required for an SSTP-based VPN connection.
Certification Authority Web Enrollment, a service that enables the issuing of certificates through a
Web browser.
Web Server (IIS), which is installed as a required role service for Certification Authority Web
Enrollment.
Note : Routing and Remote Access does not require IIS because it listens to HTTPS connections
directly over HTTP.SYS. IIS is used in this scenario so that CLIENT1 can obtain a certificate over the
Internet from VPN1.

Network Policy and Access Services, which provides support for VPN connections through Remote
Access Service.

VPN1 configuration consists of the following steps:


Install the operating system.
Configure TCP/IP for Internet and intranet networks.
Join the Contoso.com domain.
Install the Active Directory Certificate Services and Web Server (IIS) server roles.
Create and install the Server Authentication certificate.
Install the Network Policy and Access Services (Routing and Remote Access) server role.
Configure VPN1 to be a VPN server.
The following sections explain these steps in detail.

Install the operating system


To install Windows Server 2008 on VPN1:

Install Windows Server 2008


1. On VPN1, start your computer by using the Windows Server 2008 product disc.
2. Follow the instructions that appear on your screen. When prompted for a password, type
P@ssword.

Configure TCP/IP
Configure TCP/IP properties so that VPN1 has a static IP address of 131.107.0.2 for the public
(Internet) connection and 192.168.0.2 for the private (intranet) connection.

Configure TCP/IP properties


1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.
Note : If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Network Connections window, right-click a network connection, and then click Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4. Click Use the following IP address.

106
p£¢ja
p£¢ja

5. Configure the IP address and subnet mask with the following values:
a. On the interface connected to the public (Internet) network, type 131.107.0.2 for the IP address,
and type 255.255.0.0 for the subnet mask.
b. On the interface connected to the private (intranet) network, type 192.168.0.2 for the IP address,
type 255.255.255.0 for the subnet mask, and type 192.168.0.1 for the preferred DNS server.
6. Click OK, and then click Close.
7. To rename the network connections, right-click a network connection, and then click Rename.
8. Configure the network connections with the following names:
a. On the interface connected to the public (Internet) network, type Public.
b. On the interface connected to the private (intranet) network, type Private.

9. Close the Network Connections window.

Run the ping command from VPN1 to confirm that network communication between VPN1 and DC1
works.

Use the ping command to check network connectivity


1. On VPN1, click Start, click Run, in the Open box, type cmd, and then click OK. In the
command window, type ping192.168.0.1.
2. Verify that you can successfully ping DC1.
3. Close the command window.

Join the Contoso domain


Configure VPN1 to be a member server in the Contoso.com domain.

Join VPN1 to the Contoso.com domain

1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Provide computer name and domain.
Note
If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. In Computer name, clear the text and type VPN1.
4. In Member of, click Domain, type contoso, and then click OK.
5. Enter administrator for the user name and P@ssword for the password.
6. When you see a dialog box welcoming you to the contoso.com domain, click OK.
7. When you see a dialog box telling you to restart the computer, click OK. Click Close, and then click
Restart Now.

107
p£¢ja
p£¢ja

Install Active Directory Certificate Services and Web Server

To support SSTP-enabled VPN connections, first install Active Directory Certificate Services and Web
Server (IIS) to enable Web enrollment of a computer certificate.

Install VPN and certificate services roles

1. On VPN1, log on as administrator@contoso.com with the password P@ssword.


2. In the Initial Configuration Tasks window, under Customize This Server, click Add roles.
Note : If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
3. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
4. Select the Active Directory Certificate Services check box.

Figure 4. Select Server Roles window.

5. Click Next, and then click Next again.


6. In the Select Role Services dialog box, under Role services, select the Certification Authority
Web Enrollment check box.
7. In the Add Roles Wizard dialog box, click Add Required Role Services.

108
p£¢ja
p£¢ja

Figure 5. Add Roles Wizard dialog box.

8. Click Next.
9. Click Standalone, and then click Next.
10. Click Root CA (recommended), and then click Next.
11. Click Create a new private key, and then click Next.
12. Click Next to accept the default cryptographic settings.
13. In the Configure CA Name dialog box, click Next to accept the default CA name.

Figure 6. Configure CA Name dialog box.

14. Click Next repeatedly to accept default settings.


15. In the Confirm Installation Selections dialog box, click Install. The installation might take several
minutes.
16. In the Installation Results dialog box, click Close.

109
p£¢ja
p£¢ja

Create and install the Server Authentication certificate

The Server Authentication certificate is used by CLIENT1 to authenticate VPN1. Before installing the
certificate, you must configure Internet Explorer to allow certificate publishing.

Configure Internet Explorer


1. On VPN1, click Start, right-click Internet Explorer, and then click Run as
administrator.
2. If a phishing filter alert appears, click Turn off automatic Phishing Filter, and then
click OK.
3. Click the Tools menu, and then click Internet Options.
4. In the Internet Options dialog box, click the Security tab.
5. Under Select a zone to view or change security settings, click Local intranet.
6. Change the security level for Local intranet from Medium-low to Low, and then click
OK.
Note
In a real-world scenario, you should configure individual ActiveX® control
settings by using Custom level rather than lowering the security level.

Figure 7. Internet Options dialog box.

110
p£¢ja
p£¢ja

Use Internet Explorer to request a Server Authentication certificate.

Request a Server Authentication certificate


1. On VPN1, in the Internet Explorer Address bar, type http://localhost/certsrv, and then
press ENTER.
2. Under Select a task, click Request a certificate.
3. Under Request a Certificate, click advanced certificate request.
4. Under Advanced Certificate Request, click Create and submit a request to this CA.
5. Click Yes to allow the ActiveX control.

Figure 8. Advanced Certificate Request page.

6. Under Identifying Information, in the Name field, type vpn1.contoso.com, and in the
Country/Region field, type US.
Note
The name is the certificate subject name and must be the same as the Internet
address used in the SSTP connection settings configured later in this document.
7. Under Type of Certificate Needed, select Server Authentication Certificate.
8. Under Key Options, select the Mark keys as exportable check box, and then click
Submit.
9. Click Yes in the confirmation dialog box.

111
p£¢ja
p£¢ja

The Server Authentication certificate is now pending. It must be issued before it can be installed.

Issue and install the Server Authentication certificate


1. On VPN1, click Start, and then click Run.
2. In Open, type mmc, and then click OK.
3. In the Console1 snap-in, click File, and then click Add/Remove Snap-in.
4. Under Available snap-ins, click Certification Authority, then click Add.
5. Click Finish to accept the default setting of Local computer.
6. Click OK to close the Add or Remove Snap-ins dialog box.
7. In the newly created MMC console, in the left pane, double-click Certification
Authority (Local).
8. Double-click contoso-VPN1-CA, and then click Pending Requests.

Figure 9. Certification Authority console.

9. In the middle pane, right-click the pending request, point to All Tasks, and then click
Issue.
10. In Internet Explorer, in the Certificate Pending page, click Home. If this page is not
visible, browse to http://localhost/certsrv.
11. Under Select a task, click View the status of a pending certificate request.
12. Under View the Status of a Pending Certificate Request, select the just-issued
certificate.
13. Click Yes to allow the ActiveX control.
14. Under Certificate Issued, click Install this certificate.
15. Click Yes in the confirmation dialog box.
Move the installed certificate from the default store location.

112
p£¢ja
p£¢ja

Move the certificate


1. On VPN1, in the previously created MMC console, click File, and then click Add/Remove
Snap-in.
2. Under Available snap-ins, click Certificates, and then click Add.

Figure 10. Certificates snap-in dialog box.

3. Click Finish to accept the default setting of My user account.


4. Click Add, click Computer account, and then click Next.
5. In the Select Computer dialog box, click Finish to accept the default setting of Local
computer.
6. Click OK to close the Add or Remove Snap-ins dialog box.
7. In the console tree pane, double-click Certificates - Current User, double-click Personal,
and then click Certificates.
8. In the middle view pane, right-click the vpn1.contoso.com certificate, point to All Tasks,
and then click Export.
9. In the Welcome page, click Next.
10. Click Yes, export the private key, and then click Next.
11. Click Next to accept the default file format.
12. Type P@ssword in both text boxes, and then click Next.
13. In the File to Export page, click Browse.
14. In the File name text box, type vpn1cert, and then click Browse Folders.
15. Under Favorite Links, click Desktop, and then click Save to save the certificate to the
desktop.
16. In the File to Export page, click Next.
17. Click Finish to close the Certificate Export Wizard, and then click OK in the

113
p£¢ja
p£¢ja

confirmation dialog box.


18. In the console tree pane, double-click Certificates (Local Computer), and then double-
click Personal.
19. Click Certificates, and then right-click Certificates, point to All Tasks, and then click
Import.
20. In the Welcome page, click Next.
21. In the File to Import page, click Browse.
22. Under Favorite Links, click Desktop, and from the drop-down list, select Personal
Information Exchange for the file type.

Figure 11. Certificate Import Wizard.

23. In the middle view pane, double-click vpn1cert.


24. In the File to Import page, click Next.
25. In the Password text box, type P@ssword, and then click Next.
26. In the Certificate Store page, click Next to accept the Personal store location.
27. Click Finish to close the Import Export Wizard, and then click OK in the confirmation
dialog box.

Figure 12. Location of Server Authentication certificate.

114
p£¢ja
p£¢ja

Important
If the procedures in this document are not followed in the order presented, the presence of an all
purpose certificate (contoso-VPN1-CA) could create issues. Delete the contoso-VPN1-CA
certificate in the Local Computer store to ensure the SSTP listener binds to the server
authentication certificate (vpn1.contoso.com).

Delete the all purpose certificate


1. In the middle view pane, double-click Certificates, right-click contoso-VPN1-CA, and
then click Delete.
2. Click Yes in the confirmation dialog box.
Install Routing and Remote Access
Configure VPN1 with Routing and Remote Access to function as a VPN server.

Install VPN and certificate services roles


1. On VPN1, in the Initial Configuration Tasks window, under Customize This Server,
click Add roles.
Note If the Initial Configuration Tasks window is not already open, you can open it
by clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
3. Select the Network Policy and Access Services check box, click Next, and then click
Next again.
4. In the Select Role Services dialog box, under Role services, select the Routing and
Remote Access Services check box.
5. Click Next, and then click Install.
6. In the Installation Results dialog box, click Close.
115
p£¢ja
p£¢ja

Configure Routing and Remote Access.


Configure VPN1 to be a VPN server providing remote access for Internet-based VPN clients.

Configure VPN1 to be a VPN server


1. On VPN1, click Start, point to Administrative Tools, and then click Routing and
Remote Access.
2. In the Routing and Remote Access console tree, right-click VPN1, and then click
Configure and Enable Routing and Remote Access.
3. In the Welcome to the Routing and Remote Access Server Setup Wizard page, click
Next.
4. In the Configuration page, click Next to accept the default setting of Remote access
(dial-up or VPN).
5. In the Remote Access page, click VPN, and then click Next.
6. In the VPN Connection page, under Network interfaces, click Public. This is the
interface that will connect VPN1 to the Internet.
7. Click Enable security on the selected interface by setting up static packet filters to
clear this setting, and then click Next.
Note
Normally, you would leave security enabled on the public interface. For the
purposes of testing lab connectivity, you should disable it.
8. Click From a specified range of addresses, and then click Next.
9. Click New, type 192.168.0.200 for the Start IP address, type 192.168.0.210 for the
End IP address, click OK, and then click Next.
10. Click Next to accept the default setting, which means VPN1 will not work with a
RADIUS server. In this scenario, Routing and Remote Access Server will use Windows
Authentication.
11. In the Completing the Routing and Remote Access Server Setup Wizard page, click
Finish.
12. If the dialog box that describes the need to add this computer to the remote access
server list appears, click OK.
13. In the dialog box that describes the need to configure the DHCP Relay Agent, click OK.
14. Close the Routing and Remote Access snap-in.

Configuring CLIENT1

CLIENT1 is a computer running Windows Vista with SP1 that functions as a remote access VPN client
for the Contoso.com domain.
CLIENT1 configuration consists of the following steps:
Install the operating system.
Configure TCP/IP.
The following sections explain these steps in detail.

116
p£¢ja
p£¢ja

Install the operating system

To install Windows Vista with SP1 on CLIENT1:


Install Windows Vista SP1
1. On CLIENT1, start your computer by using the Windows Vista with SP1 product disc. Follow the
instructions that appear on your screen.
2. When prompted for the installation type, choose Custom.
3. When prompted for the user name, type user1.
4. When prompted for the computer name, type CLIENT1.
5. When prompted for the computer location, choose Home.

Configure TCP/IP
Configure TCP/IP properties so that CLIENT1 has a static IP address of 131.107.0.3 for the public
(Internet) connection.
Configure TCP/IP properties
1. On CLIENT1, click Start, and then click Control Panel.
2. Click Network and Internet, click Network and Sharing Center, and then click Manage
network connections.
3. Right-click Local Area Connection, and then click Properties. If a dialog box is displayed that
requests permissions to perform this operation, click Continue.
4. In the Local Area Connection Properties dialog box, click Internet Protocol Version 4
(TCP/IPv4), and then click Properties.
5. Click Use the following IP address. In IP address, type 131.107.0.3 for the IP address, and
type 255.255.0.0 for the subnet mask.
6. Click OK, and then click Close.

117
p£¢ja
p£¢ja

Configure the hosts file to have a record for VPN1. This simulates a real-world scenario in which
the corporate VPN server would have a publicly resolvable host name.

Configure the hosts file


1. On CLIENT1, click Start, click All Programs, click Accessories, right-click Command
Prompt, and then click Run as administrator.
2. In the User Account Control dialog box, click Continue.
3. In the command window, type the following and then press ENTER:
notepad %windir%\system32\drivers\etc\hosts
4. Add the following text in a new line at the end of the document:
131.107.0.2 vpn1.contoso.com
5. Save and close the hosts file.

Run the ping command from CLIENT1 to confirm that network communication between CLIENT1 and
VPN1 works.

Use the ping command to check network connectivity

1. On VPN1, click Start, point to Administrative Tools, and then click Windows Firewall
with Advanced Security.
2. In the console tree, click Inbound Rules.

Figure 13. Windows Firewall with Advanced Security snap-in.

3. In the details pane, scroll down and double-click File and Printer Sharing (Echo Request -
ICMPv4-In) for the Public profile. Verify that this rule is enabled.

118
p£¢ja
p£¢ja

Figure 14. File and Printer Sharing (Echo Request - ICMPv4-In) Properties dialog box.

4. Under General, select the Enabled check box, and then click OK.
5. On CLIENT1, in the command window, type ping vpn1.contoso.com, and then press ENTER.
6. Verify that you can successfully ping VPN1.
For the purpose of this test lab, this connection signifies that the remote user can connect to the
office VPN server over the public Internet.
7. Close the command window.

119
p£¢ja
p£¢ja

f¡W-10z Remote Access Server.

Install the operating system


Install Windows Server 2008
1. On DC1, start your computer by using the Windows Server 2008 product disc.
2. Follow the instructions that appear on your screen. When prompted for a password, type
P@ssword.

Configure TCP/IP
Configure TCP/IP properties so that DC1 has a static IP address of 192.168.0.1 with the subnet mask
255.255.255.0 and a default gateway of 192.168.0.2.

Configure TCP/IP properties

1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.

Note : If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.

Figure 3. Initial Configuration Tasks window.

2. In the Network Connections window, right-click Local Area Connection, and then click
Properties.

3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties
4. Click Use the following IP address. Type 192.168.0.1 for the IP address, type 255.255.255.0 for the
subnet mask, type 192.168.0.2 for the default gateway, and type 192.168.0.1 for the preferred DNS
server.
5. Click OK, and then click Close.

120
p£¢ja
p£¢ja

Install Active Directory and DNS

Configure the computer as a domain controller for the Contoso.com domain. This will be the first and
only domain controller in this network.

Configure DC1 as a domain controller


1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information, click
Provide computer name and domain.
Note: If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. Change computer name to DC1, and then click OK.
4. In the Computer Name/Domain Changes dialog box, click OK.
5. Click Close, and then click Restart Now.
6. After the server restarts, in the Initial Configuration Tasks window, under Customize This
Server, click Add roles.
7. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
8. Select the Active Directory Domain Services check box, and then click Next.
9. In the Active Directory Domain Services dialog box, click Next.
10. In the Confirm Installation Selections dialog box, click Install.
11. In the Installation Results dialog box, click Close.
12. Click Start, and then click Run. In Open, type dcpromo, and then click OK.
13. On the Welcome page of the Active Directory Domain Services Installation Wizard, click Next.
14. Click Create a new domain in a new forest, and then click Next.
15. In FQDN of the forest root domain, type contoso.com, and then click Next.
16. In Forest functional level, select Windows Server 2003, and then click Next.
17. Click Next to accept Windows Server 2003 for the domain functional level.
18. Click Next to accept DNS server for the additional options for this domain controller.
19. Click Yes, the computer will use a dynamically assigned IP address (not recommended).
20. Click Yes in the confirmation dialog box.
21. Click Next to accept the default folder locations.
22. In Directory Services Restore Mode Administrator Password, type a password and then click
Next.
23. Click Next.

24. The Active Directory Domain Services Installation Wizard will begin configuring Active
Directory. When the configuration is complete, click Finish, and then click Restart Now.

121
p£¢ja
p£¢ja

Create a user account with remote access permission :

Create a user account and configure the account with remote access permission.

Create and grant permission to a user account in Active Directory:


1. On DC1, click Start, point to Administrative Tools, and then click Active Directory Users and
Computers.
2. In the left side tree, expand contoso.com, right-click Users, point to New, and then click User.
3. In Full name, type user1, and in User logon name, type user1.
4. Click Next.
5. In Password, type P@ssword and in Confirm password, type P@ssword again.
6. Clear the User must change password at next logon check box, and then select the User cannot
change password and Password never expires check boxes.
7. Click Next, and then click Finish.

To grant remote access permission to user1:


1. In the left tree, click Users. In the details pane, right-click user1, and then click Properties.
2. On the Dial-in tab, in Network Access Permission, click Allow access, and then click OK.
Note : In a real-world scenario, you would use Network Policy Server (NPS) to configure and enable
remote access policies.
3. Close Active Directory Users and Computers.

Create a shared folder and file


DC1 is a file server that should be accessible to a remote user after access and authentication
methods have been configured.

Create a shared folder and file


1. On DC1, click Start, and then click Computer.
2. Double-click Local Disk (C:).
3. Right-click inside the blank space of the Windows Explorer window, point to New, and then click
Folder.
4. Name the folder CorpData.
5. Right-click the CorpData folder, and then click Share.
6. Type domain users, and then click Add.
7. Click Domain Users, and then click the Contributor permission level.
8. Click Share, and then click Done.
9. Double-click the CorpData folder, right-click the blank space in the empty folder, point to New,
and then click Text Document.
10. Name the document VPNTest.
11. Open VPNTest and add some text.
12. Save and close VPNTest.

122
p£¢ja
p£¢ja

Configuring VPN1

VPN1 is a computer running Windows Server 2008 that provides the following roles:

Active Directory Certificate Services, a certification authority (CA) that issues the computer
certificate required for an SSTP-based VPN connection.
Certification Authority Web Enrollment, a service that enables the issuing of certificates through a
Web browser.
Web Server (IIS), which is installed as a required role service for Certification Authority Web
Enrollment.
Note : Routing and Remote Access does not require IIS because it listens to HTTPS connections
directly over HTTP.SYS. IIS is used in this scenario so that CLIENT1 can obtain a certificate over the
Internet from VPN1.

Network Policy and Access Services, which provides support for VPN connections through Remote
Access Service.

VPN1 configuration consists of the following steps:


Install the operating system.
Configure TCP/IP for Internet and intranet networks.
Join the Contoso.com domain.
Install the Active Directory Certificate Services and Web Server (IIS) server roles.
Create and install the Server Authentication certificate.
Install the Network Policy and Access Services (Routing and Remote Access) server role.
Configure VPN1 to be a VPN server.
The following sections explain these steps in detail.

Install the operating system


To install Windows Server 2008 on VPN1:

Install Windows Server 2008


1. On VPN1, start your computer by using the Windows Server 2008 product disc.
2. Follow the instructions that appear on your screen. When prompted for a password, type
P@ssword.

Configure TCP/IP
Configure TCP/IP properties so that VPN1 has a static IP address of 131.107.0.2 for the public
(Internet) connection and 192.168.0.2 for the private (intranet) connection.

Configure TCP/IP properties


1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.
Note : If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Network Connections window, right-click a network connection, and then click Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4. Click Use the following IP address.

123
p£¢ja
p£¢ja

5. Configure the IP address and subnet mask with the following values:
a. On the interface connected to the public (Internet) network, type 131.107.0.2 for the IP address,
and type 255.255.0.0 for the subnet mask.
b. On the interface connected to the private (intranet) network, type 192.168.0.2 for the IP address,
type 255.255.255.0 for the subnet mask, and type 192.168.0.1 for the preferred DNS server.
6. Click OK, and then click Close.
7. To rename the network connections, right-click a network connection, and then click Rename.
8. Configure the network connections with the following names:
a. On the interface connected to the public (Internet) network, type Public.
b. On the interface connected to the private (intranet) network, type Private.

9. Close the Network Connections window.

Run the ping command from VPN1 to confirm that network communication between VPN1 and DC1
works.

Use the ping command to check network connectivity


1. On VPN1, click Start, click Run, in the Open box, type cmd, and then click OK. In the
command window, type ping192.168.0.1.
2. Verify that you can successfully ping DC1.
3. Close the command window.

Join the Contoso domain


Configure VPN1 to be a member server in the Contoso.com domain.

Join VPN1 to the Contoso.com domain

1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Provide computer name and domain.
Note
If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. In Computer name, clear the text and type VPN1.
4. In Member of, click Domain, type contoso, and then click OK.
5. Enter administrator for the user name and P@ssword for the password.
6. When you see a dialog box welcoming you to the contoso.com domain, click OK.
7. When you see a dialog box telling you to restart the computer, click OK. Click Close, and then click
Restart Now.

124
p£¢ja
p£¢ja

Install Active Directory Certificate Services and Web Server

To support SSTP-enabled VPN connections, first install Active Directory Certificate Services and Web
Server (IIS) to enable Web enrollment of a computer certificate.

Install VPN and certificate services roles

1. On VPN1, log on as administrator@contoso.com with the password P@ssword.


2. In the Initial Configuration Tasks window, under Customize This Server, click Add roles.
Note : If the Initial Configuration Tasks window is not already open, you can open it by
clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
3. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
4. Select the Active Directory Certificate Services check box.

Figure 4. Select Server Roles window.

5. Click Next, and then click Next again.


6. In the Select Role Services dialog box, under Role services, select the Certification Authority
Web Enrollment check box.
7. In the Add Roles Wizard dialog box, click Add Required Role Services.

125
p£¢ja
p£¢ja

Figure 5. Add Roles Wizard dialog box.

8. Click Next.
9. Click Standalone, and then click Next.
10. Click Root CA (recommended), and then click Next.
11. Click Create a new private key, and then click Next.
12. Click Next to accept the default cryptographic settings.
13. In the Configure CA Name dialog box, click Next to accept the default CA name.

Figure 6. Configure CA Name dialog box.

14. Click Next repeatedly to accept default settings.


15. In the Confirm Installation Selections dialog box, click Install. The installation might take several
minutes.
16. In the Installation Results dialog box, click Close.

126
p£¢ja
p£¢ja

Create and install the Server Authentication certificate

The Server Authentication certificate is used by CLIENT1 to authenticate VPN1. Before installing the
certificate, you must configure Internet Explorer to allow certificate publishing.

Configure Internet Explorer


1. On VPN1, click Start, right-click Internet Explorer, and then click Run as
administrator.
2. If a phishing filter alert appears, click Turn off automatic Phishing Filter, and then
click OK.
3. Click the Tools menu, and then click Internet Options.
4. In the Internet Options dialog box, click the Security tab.
5. Under Select a zone to view or change security settings, click Local intranet.
6. Change the security level for Local intranet from Medium-low to Low, and then click
OK.
Note
In a real-world scenario, you should configure individual ActiveX® control
settings by using Custom level rather than lowering the security level.

Figure 7. Internet Options dialog box.

127
p£¢ja
p£¢ja

Use Internet Explorer to request a Server Authentication certificate.

Request a Server Authentication certificate


1. On VPN1, in the Internet Explorer Address bar, type http://localhost/certsrv, and then
press ENTER.
2. Under Select a task, click Request a certificate.
3. Under Request a Certificate, click advanced certificate request.
4. Under Advanced Certificate Request, click Create and submit a request to this CA.
5. Click Yes to allow the ActiveX control.

Figure 8. Advanced Certificate Request page.

6. Under Identifying Information, in the Name field, type vpn1.contoso.com, and in the
Country/Region field, type US.
Note
The name is the certificate subject name and must be the same as the Internet
address used in the SSTP connection settings configured later in this document.
7. Under Type of Certificate Needed, select Server Authentication Certificate.
8. Under Key Options, select the Mark keys as exportable check box, and then click
Submit.
9. Click Yes in the confirmation dialog box.

128
p£¢ja
p£¢ja

The Server Authentication certificate is now pending. It must be issued before it can be installed.

Issue and install the Server Authentication certificate


1. On VPN1, click Start, and then click Run.
2. In Open, type mmc, and then click OK.
3. In the Console1 snap-in, click File, and then click Add/Remove Snap-in.
4. Under Available snap-ins, click Certification Authority, then click Add.
5. Click Finish to accept the default setting of Local computer.
6. Click OK to close the Add or Remove Snap-ins dialog box.
7. In the newly created MMC console, in the left pane, double-click Certification
Authority (Local).
8. Double-click contoso-VPN1-CA, and then click Pending Requests.

Figure 9. Certification Authority console.

9. In the middle pane, right-click the pending request, point to All Tasks, and then click
Issue.
10. In Internet Explorer, in the Certificate Pending page, click Home. If this page is not
visible, browse to http://localhost/certsrv.
11. Under Select a task, click View the status of a pending certificate request.
12. Under View the Status of a Pending Certificate Request, select the just-issued
certificate.
13. Click Yes to allow the ActiveX control.
14. Under Certificate Issued, click Install this certificate.
15. Click Yes in the confirmation dialog box.
Move the installed certificate from the default store location.

129
p£¢ja
p£¢ja

Move the certificate


1. On VPN1, in the previously created MMC console, click File, and then click Add/Remove
Snap-in.
2. Under Available snap-ins, click Certificates, and then click Add.

Figure 10. Certificates snap-in dialog box.

3. Click Finish to accept the default setting of My user account.


4. Click Add, click Computer account, and then click Next.
5. In the Select Computer dialog box, click Finish to accept the default setting of Local
computer.
6. Click OK to close the Add or Remove Snap-ins dialog box.
7. In the console tree pane, double-click Certificates - Current User, double-click Personal, and
then click Certificates.
8. In the middle view pane, right-click the vpn1.contoso.com certificate, point to All Tasks, and
then click Export.
9. In the Welcome page, click Next.
10. Click Yes, export the private key, and then click Next.
11. Click Next to accept the default file format.
12. Type P@ssword in both text boxes, and then click Next.
13. In the File to Export page, click Browse.
14. In the File name text box, type vpn1cert, and then click Browse Folders.
15. Under Favorite Links, click Desktop, and then click Save to save the certificate to the desktop.
16. In the File to Export page, click Next.
17. Click Finish to close the Certificate Export Wizard, and then click OK in the confirmation
dialog box.

130
p£¢ja
p£¢ja

18. In the console tree pane, double-click Certificates (Local Computer), and then double-click
Personal.
19. Click Certificates, and then right-click Certificates, point to All Tasks, and then click Import.
20. In the Welcome page, click Next.
21. In the File to Import page, click Browse.
22. Under Favorite Links, click Desktop, and from the drop-down list, select Personal
Information Exchange for the file type.

Figure 11. Certificate Import Wizard.

23. In the middle view pane, double-click vpn1cert.


24. In the File to Import page, click Next.
25. In the Password text box, type P@ssword, and then click Next.
26. In the Certificate Store page, click Next to accept the Personal store location.
27. Click Finish to close the Import Export Wizard, and then click OK in the confirmation dialog
box.

Figure 12. Location of Server Authentication certificate.

131
p£¢ja
p£¢ja

Important
If the procedures in this document are not followed in the order presented, the presence of an all
purpose certificate (contoso-VPN1-CA) could create issues. Delete the contoso-VPN1-CA
certificate in the Local Computer store to ensure the SSTP listener binds to the server
authentication certificate (vpn1.contoso.com).

Delete the all purpose certificate


1. In the middle view pane, double-click Certificates, right-click contoso-VPN1-CA, and
then click Delete.
2. Click Yes in the confirmation dialog box.

132
p£¢ja
p£¢ja

Install Routing and Remote Access


Configure VPN1 with Routing and Remote Access to function as a VPN server.

Install VPN and certificate services roles


1. On VPN1, in the Initial Configuration Tasks window, under Customize This Server,
click Add roles.
Note If the Initial Configuration Tasks window is not already open, you can open it
by clicking Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Add Roles Wizard dialog box, in Before You Begin, click Next.
3. Select the Network Policy and Access Services check box, click Next, and then click
Next again.
4. In the Select Role Services dialog box, under Role services, select the Routing and
Remote Access Services check box.
5. Click Next, and then click Install.
6. In the Installation Results dialog box, click Close.

Configure Routing and Remote Access.

Configure VPN1 to be a VPN server providing remote access for Internet-based VPN clients.

Configure VPN1 to be a VPN server


1. On VPN1, click Start, point to Administrative Tools, and then click Routing and
Remote Access.
2. In the Routing and Remote Access console tree, right-click VPN1, and then click
Configure and Enable Routing and Remote Access.
3. In the Welcome to the Routing and Remote Access Server Setup Wizard page, click
Next.
4. In the Configuration page, click Next to accept the default setting of Remote access
(dial-up or VPN).
5. In the Remote Access page, click VPN, and then click Next.
6. In the VPN Connection page, under Network interfaces, click Public. This is the
interface that will connect VPN1 to the Internet.
7. Click Enable security on the selected interface by setting up static packet filters to
clear this setting, and then click Next.
Note
Normally, you would leave security enabled on the public interface. For the
purposes of testing lab connectivity, you should disable it.
8. Click From a specified range of addresses, and then click Next.
9. Click New, type 192.168.0.200 for the Start IP address, type 192.168.0.210 for the
End IP address, click OK, and then click Next.
10. Click Next to accept the default setting, which means VPN1 will not work with a
RADIUS server. In this scenario, Routing and Remote Access Server will use Windows
Authentication.
11. In the Completing the Routing and Remote Access Server Setup Wizard page, click
Finish.
12. If the dialog box that describes the need to add this computer to the remote access
server list appears, click OK.
133
p£¢ja
p£¢ja

13. In the dialog box that describes the need to configure the DHCP Relay Agent, click OK.
14. Close the Routing and Remote Access snap-in.

Configuring CLIENT1

CLIENT1 is a computer running Windows Vista with SP1 that functions as a remote access VPN client
for the Contoso.com domain.
CLIENT1 configuration consists of the following steps:
Install the operating system.
Configure TCP/IP.
The following sections explain these steps in detail.

Install the operating system

To install Windows Vista with SP1 on CLIENT1:


Install Windows Vista SP1
1. On CLIENT1, start your computer by using the Windows Vista with SP1 product disc. Follow the
instructions that appear on your screen.
2. When prompted for the installation type, choose Custom.
3. When prompted for the user name, type user1.
4. When prompted for the computer name, type CLIENT1.
5. When prompted for the computer location, choose Home.

Configure TCP/IP
Configure TCP/IP properties so that CLIENT1 has a static IP address of 131.107.0.3 for the public
(Internet) connection.
Configure TCP/IP properties
1. On CLIENT1, click Start, and then click Control Panel.
2. Click Network and Internet, click Network and Sharing Center, and then click Manage
network connections.
3. Right-click Local Area Connection, and then click Properties. If a dialog box is displayed that
requests permissions to perform this operation, click Continue.
4. In the Local Area Connection Properties dialog box, click Internet Protocol Version 4
(TCP/IPv4), and then click Properties.
5. Click Use the following IP address. In IP address, type 131.107.0.3 for the IP address, and
type 255.255.0.0 for the subnet mask.
6. Click OK, and then click Close.

134
p£¢ja
p£¢ja

Configure the hosts file to have a record for VPN1. This simulates a real-world scenario in which
the corporate VPN server would have a publicly resolvable host name.

Configure the hosts file


1. On CLIENT1, click Start, click All Programs, click Accessories, right-click Command
Prompt, and then click Run as administrator.
2. In the User Account Control dialog box, click Continue.
3. In the command window, type the following and then press ENTER:
notepad %windir%\system32\drivers\etc\hosts
4. Add the following text in a new line at the end of the document:
131.107.0.2 vpn1.contoso.com
5. Save and close the hosts file.

Run the ping command from CLIENT1 to confirm that network communication between CLIENT1 and
VPN1 works.

Use the ping command to check network connectivity

1. On VPN1, click Start, point to Administrative Tools, and then click Windows Firewall
with Advanced Security.
2. In the console tree, click Inbound Rules.

Figure 13. Windows Firewall with Advanced Security snap-in.

3. In the details pane, scroll down and double-click File and Printer Sharing (Echo Request -
ICMPv4-In) for the Public profile. Verify that this rule is enabled.

135
p£¢ja
p£¢ja

Figure 14. File and Printer Sharing (Echo Request - ICMPv4-In) Properties dialog box.

4. Under General, select the Enabled check box, and then click OK.
5. On CLIENT1, in the command window, type ping vpn1.contoso.com, and then press ENTER.
6. Verify that you can successfully ping VPN1.
For the purpose of this test lab, this connection signifies that the remote user can connect to the
office VPN server over the public Internet.
7. Close the command window.

136
p£¢ja
p£¢ja

f¡W-11x Installing Linux and orientation with commonly used commands.

Linux

1. Linux is quite possibly the most important free software achievement.


2. It has been developed into an operating system for business, education and personal
productivity.
3. Linux (pronounced with a short I, as in LIH-nucks) is a UNIX operating system clone.

History of Linux

1. UNIX is one of the most popular operating systems worldwide because of its large support base
and distribution.
2. It was originally developed at AT&T as a multitasking operating system for minicomputers and
mainframes in the 1970’s, but has since grown to become one of the most widely used operating
systems.
3. Linux is a free version of UNIX developed by LINUS TORVALDS at the university of Helsinki
in Finland.

About Linux

1. Linus Torvalds originally developed Linux as a hobby project.


2. Minix, a small UNIX system developed by Andy Tanenbaum, inspired it
3. The Linux kernel uses no code from AT&T or any other proprietary source.
4. On October 5, 1991, Linus announced the first “official” version of Linux ,which was version
0.02.

Famous Linux Distributions

1. Red Hat Linux


2. SuSe Linux
3. Caldera Linux
4. Mandrake Linux
5. Open Linux
6. Aryabhat Linux

Why Linux?

1. Linux is a UNIX like operating systems


2. Multi-user, Multi-tasking and Multi Processor Support
3. There are no royalty or license fees “ A Linux Distribution has thousands of dollars worth of
software for no cost or a couple of dollars if purchased on CD/DVD “
4. Software Development Supports
5. Linux runs on nearly any CPU
6. Linux works very well as a personal computer UNIX for the desktop
7. Linux works well for server operations
8. X-Window system (An excellent window system called X)

137
p£¢ja
p£¢ja

1. Hardware Devices : The lower most layer is the hardware components (i.e. physical
components like your motherboard, hard disk drive, floppy drive, memory, etc…)

2. Kernel : When your system is booted, the Linux kernel will be loaded into the memory of your
system and after that the kernel will control the entire operating system.
3. Shell : Shell is an interpreter through which a user can interact with kernel. Shell is program or
command. An application program may be a image editor, word processor, music player, Games, and
etc…..

138
p£¢ja
p£¢ja

Linux File System Structure

1. The /dev Directory : The directory contains file system entries which represent device that are
attached to the system.
2. The /etc Directory : The directory is reserved for configuration file that are local to your
machine.
3. The /lib Directory : The directory should contain only those libraries that are needed to
execute the binaries in /bin and /sbin.
4. The /dev Directory : The directory refers to temporarily mounted file systems, such as CD-
ROMs and floppy disks.
5. The /opt Directory : The directory provides an area for usually large, static application software
package to be stored.
6. The /home Directory : The directory have the home directory for the user’s.
7. The /boot Directory : The directory have the kernel and booting files.
8. The /tmp Directory : The directory only temporarily files stores.
9. The /lost + found Directory : The directory used by function to placed the files.
10 Examples : linking files.
11. The /proc Directory : The directory contains special “ file” that either extract information from
or send information to the kernel.
12. The /sbin Directory : The directory is for executables used only by the root user.
13. The /bin Directory : The directory is for executables used only by the users.
14. The /usr Directory : The directory is for files that can be shared across a whole site.
15. The /var Directory : The directory “ … variable data files. This include spool directory and file,
administrative and logging data, and transient and temporary files”.
16. The /root Directory : This is home directory for the administrator.

139
p£¢ja
p£¢ja

Types of file permission


a. Regular file
b. Directory
c. Block device
d. Linking files
e. Character files

Install sys

Linux server software CD in CD/DVD room or ISO File select for VMS.

140
p£¢ja
p£¢ja

Press Enter key.


Select Skip press Enter.:

141
p£¢ja
p£¢ja

Click Next:

Select your preferred Language English and Enter:

142
p£¢ja
p£¢ja

Select keyboard layout US English and Enter.

Select Basic storage Devices , Next and hit Enter:

143
p£¢ja
p£¢ja

Type host name for your server Next and Enter.

144
p£¢ja
p£¢ja

Select your Time Zone (Asia Dhaka) and click Next:

Enter the Root Password and click Next:

145
p£¢ja
p£¢ja

146
p£¢ja
p£¢ja

Select the Mode of Partition (Create custom layout) and click Next:

147
p£¢ja
p£¢ja

Select Write changes to disk and next:

Click next

148
p£¢ja
p£¢ja

select customize Now next

Now the installation will begin. It will take a while depends upon your hardware configuration:

At
the end of installation, hit Reboot and you will get the login screen as shown.
after complete server then login as “root
password “root password”

149
p£¢ja
p£¢ja

Linux Desktop

a. Text Mode and Graphical Mode


b. Multiple Non-GUI (Text Mode) logins are possible through Virtual Consoles.
C. There are by default 6 Virtual Text Mode Consoles available through CTRL-ALT-F[1-6].
CTRL-ALT-F7 will bring back the GUI mode.
d. In GUI Mode, there are two Desktop Environments
e. GNOME
f. KDE
g. GNOME is the default Desktop
h. Use switchdesk command to switch between desktops environments.

150
p£¢ja
p£¢ja

CONFIGURATION OF LINUX SERVER MISC SERVICE

151
p£¢ja
p£¢ja

STATIC NETWORK CONFIGURATION

a. Linux desktop right click.


b. open in terminal.
1. #setup

( Run the “Network configuration” tool)

152
p£¢ja
p£¢ja

2. Edit your LANcard settings from “edit devices”

3. Edit the settings as:

Type static IP netmask,default getway and are the mandetory fields that you need to fill up correctly to
setup a working static network.
4. Save and exit to the terminal.
5. #service network restart

153
p£¢ja
p£¢ja

পাঠঃ ১২। LVM concept and Installation various packages by using local repository.

Yum Server (Local Repository)

1. Make directory Into the (/media)


2. Copy all files from your cd/dvd.
3. Install 3 esentials software for yum server
a. deltapromo.................................
b. python-deltapromo.......................
c. createrepo....................................
4. Create a local.repo file into the (/etc/yum.repos.d) directory.
5. Use create repo command for make yum server.

Package install

1. mkdir /media/rhel6
2. cp -rf /media/RHEL_6.1................/* /media/rhel6
3. cd /media/RHEL_6.1...................../Packages
4. rpm -ivh deltapromo...........................(press tab key)
5. rpm -ivh python-deltapromo................. (press tab key)
6. rpm -ivh createrepo................... (press tab key)
7. touch /etc/yum.repos.d/local.repo (for create new file)
8. vim /etc/yum.repos.d/local.repo (edit this file and change the below)
[local]
name = rhel6
baseurl = file:///media/rhel6
enable = 1
gpgcheck = 0

9. createrepo /media/rhel6/Packages
10. yum clear all
11. yum repolist (to check yum server repolist)

Server Configure: DNS, DHCP, HTTP & FTP DNS Configuration (comd and conf colore)
1. setup
2. service network restart
3. vim /etc/hosts

::1 localhost.localdomain localhost.localdomain localhost6 localhost6.localdomain6 localhost


linux1
192.168.56.1 linux1.cloud.com linux1 (Only add this line)
Save and exit file

4. vim /etc/resolv.conf (no edit any line just see)


# Generated by NetworkManager
search cloud.com
nameserver 192.168.56.1
save and exit

154
p£¢ja
p£¢ja

5. service network restart


6. cd /media/cd/Packages/
7. rpm -ivh bind-9.7.3-2.el6.i686.rpm (for packages install)
8. yum install bind*
9. rpm -ql bind (for see edit file location)
10. vim /etc/named.conf
options {
listen-on port 53 { 127.0.0.1; 192.168.56.1;};
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { localhost; };
11. 4yy (for zone file copy)
zone "linux1.cloud.com." IN {
type master;
file "named.fwd";
};
zone "56.168.192.in-addr.arpa" IN {
type master;
file "named.rev";
};
include "/etc/named.rfc1912.zones";
save and exit
12. cp /var/named/named.localhost /var/named/named.fwd
13. vim /var/named/named.fwd
$TTL 1D
@ IN SOA linux1.cloud.com. root.cloud.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
IN NS linux1.cloud.com.
linux1.cloud.com. IN A 192.168.56.1
linux1.cloud.com. IN MX 10 linux1.cloud.com.
smtp IN CNAME linux1.cloud.com.
mail IN CNAME linux1.cloud.com.
proxy IN CNAME linux1.cloud.com.

14. cp /var/named/named.fwd /var/named/named.rev

15. vim /var/named/named.rev


$TTL 1D
@ IN SOA linux1.cloud.com. root.cloud.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
IN NS linux1.cloud.com.
1 IN PTR linux1.cloud.com.
155
p£¢ja
p£¢ja

16. service named status


17. service named start
18. service named restart
19. chown root.named /var/named/named*
20. service named restart
21. chkconfig named on
22. nslookup 192.168.56.1 (for check status)

[root@localhost Packages]# nslookup 192.168.56.1


Server: 192.168.56.1
Address: 192.168.56.1#53

1.56.168.192.in-addr.arpa name = linux1.cloud.com.

23. dig @localhost linux1.cloud.com


24. nslookup linux1.cloud.com
[root@localhost Packages]# nslookup linux1.cloud.com
Server: 192.168.56.1
Address: 192.168.56.1#53
Name: linux1.cloud.com
Address: 192.168.56.1
--: END :--

DHCP Configuration

Package install
1. yum install –y dhcp* (when you create local repository)
or (without repository comd)
cd /media/RHEL_6.1............./Packages
rpm –ivh dhcp*
rpm -ql dhcp

2. /usr/share/doc/dhcp-4.1.1/dhcpd.conf.sample (copy this file from here to /etc/dhcp/dhcpd.conf)


cp /usr/share/doc/dhcp-4.1.1/dhcpd.conf.sample /etc/dhcp/dhcpd.conf
cp: overwrite `/etc/dhcp/dhcpd.conf'? y

156
p£¢ja
p£¢ja

3. vi /etc/dhcp/dhcpd.conf
(and change the follwing below)

7 option domain-name "example.com";


8 option domain-name-servers ns1.example.org, ns2.example.org; option
7 option domain-name "cloud.com";
8 option domain-name-servers linux1.cloud.com, 192.168.56.1;
18 #authoritative;
18 authoritative;
22 log-facility local7;
22 log-facility local6;
27 subnet 10.152.187.0 netmask 255.255.255.0 {
28 }
27 #subnet 10.152.187.0 netmask 255.255.255.0 {
28 # }
32 subnet 10.254.239.0 netmask 255.255.255.224 {
33 range 10.254.239.10 10.254.239.20;
34 option routers rtr-239-0-1.example.org, rtr-239-0-2.example.org;
32 subnet 192.168.56.0 netmask 255.255.255.0 {
33 range 192.168.56.11 192.168.56.254;
34 #option routers rtr-239-0-1.example.org, rtr-239-0-2.example.org;
}
(note: after 34 line all enable line must be disable by using #)

1. vi /etc/rsyslog.conf

60 local7.* /var/log/boot.log
60 local6.* /var/log/dhcp.log

2. service rsyslog restart


3. service dhcpd restart

HTTP Server Configure


1. Install packages httpd
2. Conf file location (/etc/httpd/conf/httpd.conf
3. HTML file location (/var/www/html)

Package install and step


1. yum install –y httpd* (when you create local repository)
or (without repository comd)
cd /media/RHEL_6.1............./Packages
rpm –ivh httpd*
rpm -ql httpd

2. vi /etc/httpd/conf/httpd.conf
(edit this file and change the follwing below)

157
p£¢ja
p£¢ja

Line No-136 Listen 192.168.56.1:80


Line No-275 ServerName linux1.cloud.com:80
Line No-402 Directory index index.html
Line No-1003 <Virtualhost 192.168.56.1:80>
Server admin root@cloud.com
Document Root /var/www/html
Server Name www.cloud.com
Error log /logs/linux1.cloud.com-error-log
Custom log logs/linux1.cloud.com
</Virtualhost>

1. vi /etc/hosts (go to last line and add this line into hosts file)

192.168.56.1 www.cloud.com

2. service httpd restart


3. cd /var/www/html
4. touch /var/www/html/index.html
5. vi /var/www/html/index.html

<html>
<title>
THIS IS ICT REFRSHER TRG WEB PAGE
</title>
<head>
Welcome to ICT REFRSHER TRG WEB PAGE
</head>
<body>
</body>
</html>
7. firefox
8. browse 192.168.56.1 or https://www.cloud.com.
Note : open your internet browser and check HTTP server

158
p£¢ja
p£¢ja

FILE TRANSFER PROTOCOL (FTP)

1. Package Name: vsftpd


2. Document Root: /var/ftp/pub/
3. Configuration File: /etc/vsftpd/vsftpd.conf
4. Comds To Be Exec on Terminal:
a. #yum install vsftpd* -y
b. #service vsftpd restart; chkconfig vsftpd on
[N.B. At this stage any existing user can access the ftp from their browser using the ftp host IP
e,g ftp://192.168.56.1.They can download anything that is placed inside the document root
/var/ftp/pub.To restrict ftp use follow the steps mentioned below.]
c. #vim /etc/vsftpd/vsftpd.conf
Edit following fields:
Anonymous_enable=NO
Chroot_list_enable=YES
Save and exit the configuration file.
d. #service vsftpd restart; chkconfig vsftpd on

Basic Command of Linux


# pwd (present working directory)
# cd (change directory)
# ls (to view content list)
# ls -l (to view detail list)
# ls -al (to show all file or folder)
# mkdir /test (for creating folder,here test is a folder)
# touch file{1,2} (for creating file)
# cd . (present working directory)
# cd .. (previous working directory)
# mkdir /test (absolute path)
# mkdir test (relative path)
# Esc+shift+:+wq (for coming out from any file)
# useradd username (to creat an user)
# passwd username (to give password for that user)
# finger username (to know info about user)
# rm -f filename (to delete a file)
# id -a username (to know user id & group id)
# groupadd groupname
# usermod -g groupname username
# cp source destination (to copy something)
# chown username:groupname filename (to change the ownership of file)
# userdel -r username (to delete user)
# userdel -rf username (to delete user forcefully)
# hostname (to know host)
# df -h (to see partition)
# fdisk -l (to see device & partition
# setup (different type of configuration)
# ifconfig (to know ip)
# yum install packagename* -y (to install any package)
# getenforce (to get the current mode of selinux)
# mount (to mount a filesystem)

159
p£¢ja
p£¢ja

Linux Essential Commands

Command Example Syntax Description


cd change directory
mkdir create directory
mv move/rename
rm rm -rf sha* [-r=remove directory] remove files/folder
rmdir remove empty directory
cp [-r=copy directory] copy file
rpm –qa To show all installed software list
top To Show CPU Utilization
df –h To list physical devices
mount To show mounted drives
tcpdump Monitoring Network activities
df df -h disk free
du du -h -c filename disk usage
find find /etc -name filename find files
chgrp change group ownership for files
chown change user ownership for files
chmod change file & folder permission
ls show directory context
touch touch filename time streams create file & modify file
free free -h total ram & uses
pwd present working directory
cal cal -y Calendar
mkfs mkfs -t vfat /dev/hda6 Formatting
fsck fsck -a /dev/hda7 linux filesystem check, -a=autamatic, -n
e2fsck file system check
fdisk fdisk /dev/hda partition tool
eject eject -t cdrom open in command
find find / -name filename -print find a particular file
fdformat fdformat /dev/fd0 lowlavel floopy format
rm rm -rf / Danger, delete all file and folder
finger when user login
tail tail -l 1 -f (realtime logging information show)
/var/log/httpd/apache/error_log print the last record of the error file
chsh chsh -s /bin/bash username change user login shall
tr tr 'A-Z''a-z' < .bash_profile
mknod mknod filename b,c 2 1 create block or cha device
apm apm -vVmsS s=sespend advanced power management
modinfo modinfo module name (information of module)
ls ls filename to show list
file file <filename> to show file description
head head file1 file2 compare two files
stat stat file to show file description (full)
type type ls,,man,,more location of command

160
p£¢ja
p£¢ja

cut cut /etc/passwd | cut -d : -f 1


hotplug configure usb, memory stick
lsusb to show selcted usb
df df -h disk free ; -h=human readable
who who -imh -i=login time; -m=current user;-h=header
switchdes switchdesk kde ;graphical & text mode interface for
k choosing desktop environment
uname uname –r -r=kernel version
date date -s yy-month-d
date -s h:minuite
chage chage [options] user name change user password expiry information
apropos apropos command name search the whatis database for strings
clear #clear Clear the working history from desktop

Adding user
adduser or useradd username
eg: adduser -m tarzan
ex:adduser -s /bin/sh -d /home/users -c "Shahriar Kabir" linuxcolor

Password for user & others


passwd username
passwd -d username eg:remove password
passwd -l username eg:lock user account
passwd -u username eg:unlock user account

Deleting User
userdel -r username r=all file/folder including home

Adding group
groupadd groupname

System Shut down and restart


init 0 #init 0 system shut down
init 6 #init 6 system restart

161
p£¢ja
p£¢ja

Advence Network

পাঠঃ ১। Intro to Army WAN

Bm¡Qe¡l p¤¢ hd¡bÑ Bjl¡ f¡W¢VL d¡l¡h¡¢qL i¡h EfÙÛ¡fe Llhx

1z ARMY WAN ¢L?


2z ARMY WAN Evf¢š J¢hÙ¹ª¢a Hhw f¢lQ¡me¡ fÜ¢az
3z ¢h¢iæ WEB address pÇfLÑ d¡le¡z
4z ¢h¢iæ WEB SERVER pÇfLÑ d¡le¡ J p¤¢hd¡z

1z ARMY WAN ¢L?

1z ARMY WAN Evf¢š J ¢hÙ¹ª¢a Hhwf¢lQ¡me¡ fÜ¢az

¢h¢iæ WEB / IP Address pÇfLÑ d¡le¡z

¢h¢iæ WEB SERVER pÇfLÑ d¡le¡ J p¤¢hd¡z


ARMY WEB PORTAL SERVER PAGE

ARMY WEB PORTAL SERVER PAGE

162
p£¢ja
p£¢ja

AITSO WEB SERVER PAGE

163
p£¢ja
p£¢ja

ARMY OFFICIAL SERVER PAGE

Facilities

1. DCMS SYSTEM.
2. E LEARNING SYSYEM.
3. PATIENT MANAGEMENT SYSTEM.
4. REPORTS AND RETURNS.
5. DHAKA ARMY PABX DIRECTORY.
6. ARDOC LIBRARY.
ETC

STC&S SERVER PAGE

164
p£¢ja
p£¢ja

STC&S SERVER PAGE

66 INF DIV SERVER PAGE

165
p£¢ja
p£¢ja

DCMS WEB PAGE

166
p£¢ja
p£¢ja

পাঠঃ ২। Intro to STC&S LAN and server room.

Visit on STC&S

LAN and server room

167
p£¢ja
p£¢ja

f¡W-3z Establishing a simple wireless AP (Access Point).

HÉ¡L­pp f­u¾V z HL¢V ®eVJu¡LÑ CØV¡h¢mØV Ll­a ¢h¢iæ fÜ¢a Ahmðe Ll­a qu h¡ ¢h¢iæ fËL¡l ®k¡N­k¡N j¡dÉj hÉhq¡l
Ll­a qu z L¢ÇfEV¡l ­eVJu¡LÑ Le¢gN¡­ll SeÉ ®k pLm ¢Xi¡Cp h¡ VÊ¡¾p¢jne ¢j¢Xu¡l fË­u¡Se a¡l j­dÉ HÉ¡L­pp f­u¾V HL¢V
AeÉaj ¢Xi¡CS z haÑj¡­e C¾V¡l­eV Hl SeÉ LÉ¡hm ®eVJu¡­LÑl ¢hLÒf ¢q­p­h LÉ¡hm R¡s¡ Ab¡Ñv Ju¡l­mp fÜ¢a Ahmðe L­l
®k¡N­k¡N fËc¡e Ll¡ q­µR z HL¢V HÉ¡L­pp f­u¾V Le¢gN¡l Ll­a ®k pLm a­bÉl fË­u¡Se qu a¡q¡ ¢e­jÀ fËcš q­m¡ x

 p¡d¡lZa Ju¡l­mp ¢Xi¡Cp h¡ HÉ¡­L­pp f­u¾V (H¢f) Hl ¢eSü ¢LR¤ Le¢gN¡l Ll¡ b¡­L z Bjl¡ ¢Xi¡C­pl p¡­b ®k
®je¤uÉ¡m b¡­L a¡l j­dÉ abÉ…­m¡ ®cu¡ b¡­L z HC Le¢gN¡l Bjl¡ CµR¡ Ll­m ¢e­S­cl j­a¡ f¢lhaÑe L­l ¢e­a f¡l­h¡ z
a¡l SeÉ k¡ Ll­a q­h z

 ¢Xi¡Cp Hl Le¢gN¡l Ae¤k¡u£ HL¢V L¢ÇfEV¡l­L Le¢gN¡l L­l ¢e­a q­h z

 H¢f¢V­L L¢ÇfEV¡l¢Vl p¡­b pw­k¡N fËc¡e Ll­a q­h z Ab¡Ñv H¢f'l mÉ¡e ®f¡VÑ q­a HL¢V ®ØVV LÉ¡hm ¢c­u L¢ÇfEV¡­ll
p¡­b pw­k¡N fËc¡e Ll­a q­h z

 C¾V¡l­eV H„­fÔ¡l¡l Q¡m¤ L­l HÉ¡­XÊp h¡­l ¢Xi¡Cp¢Vl BC¢f V¡Cf L­l ¢L-­h¡­XÑl H¾V¡l L£ ­Q®f ¢Xi¡Cp Hl j­dÉ
fË­hn Ll¡ k¡­h Hhw HM¡­e ¢Xi¡Cp Hl ¢hÙ¹¡¢la abÉ f¡Ju¡ k¡­h z öl¦­aC Home Tab H ®kph ­p¢Vw B­R a¡ ®cM¡­hz

 Bjl¡ ¢Xi¡Cp¢Vl BC¢f f¢lhaÑe Ll­a Q¡C­m Express Setup H ®k­a q­h Hhw HM¡e ®b­L Host Name J
fË­u¡Se£u ®p¢Vw f¢lhaÑe L­l ®eu¡ k¡­h z

168
p£¢ja
p£¢ja

 ¢e­jÀl ¢Q­œ f¢lhaÑe Ll¡l fl AhÙÛ¡ ®cM¡­e¡ q­m¡ z a­h ¢Xi¡C­pl BC¢f f¢lhaÑ­el p¡­b p¡­b ¢e­Sl L¢ÇfEV¡­ll
BC¢fJ f¢lhaÑe L­l ¢e­a q­h z

 HL¢V f¢lf§eÑ ¢Xi¡Cp Le¢gN¡e Ll¡l fl d¡l¡h¡¢qL ¢Qœ ¢e­jÀ fËcš q­m¡ x

169
p£¢ja
p£¢ja

170
p£¢ja
p£¢ja

171
p£¢ja
p£¢ja

172
p£¢ja
p£¢ja

173
p£¢ja
p£¢ja

174
p£¢ja
p£¢ja

f¡W-4z VOIP- Basic fun and emp of IP Phone and ATA, Installation of Elastix Server.

Voice over IP: Voice over IP (VoIP) is a methodology and group of technologies for the delivery
of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony,
broadband telephony, and broadband phone service.
rotocols

Voice over IP has been implemented in various ways using both proprietary protocolsand protocols
based on open standards. Examples of the VoIP protocols are:

1. H.323
2. Media Gateway Control Protocol (MGCP)
3. Session Initiation Protocol (SIP)
4. H.248 (also known as Media Gateway Control (Megaco))
5. Real-time Transport Protocol (RTP)
6. Real-time Transport Control Protocol (RTCP)
7. Secure Real-time Transport Protocol (SRTP)
8. Session Description Protocol (SDP)
9. Inter-Asterisk eXchange (IAX)
10. JingleXMPP VoIP extensions
11. Skype protocol
12. Teamspeak

The H.323 protocol was one of the first VoIP protocols that found widespread implementation for
long-distance traffic, as well aslocal area network services. However, since the development of newer,
less complex protocols such as MGCP and SIP, H.323 deployments are increasingly limited to carrying
existing long-haul network traffic. In particular, the Session Initiation Protocol (SIP) has gained
widespread VoIP market penetration.
Why VOIP

1. Cost reduction
2. Toll by-pass
3. WAN cost reduction
4. Operational improvement
5. Common network infrastructure
6. Simplification of routing administration
7. Business tool integration
8. Voice mail, email and fax mail integration
9. Web + call
10. Mobility using IP

175
p£¢ja
p£¢ja

Concept OF VOIP

176
p£¢ja
p£¢ja

177
p£¢ja
p£¢ja

178
p£¢ja
p£¢ja

179
p£¢ja
p£¢ja

1.1 Hardware

First you shall prepare the following items: A PC with an empty HDD and DIGIUM with FXO Card.

1.2 Software
Make sure you have these software: Elastix 2.0.3
Elastix 2.0.3, about 682MB in size, can be downloaded from:
http://downloads.sourceforge.net/project/elastix/Elastix%20PBX%20Appliance%20Software/2.0.3/Elas
tix-2.0.3-i386-bin-15Nov2010.iso
Then burn the downloaded driver into a CD.

Installation of Elastix 2.0.3 System


2.1 Brief Introduction to Elastix System

The Elastix system is an integrated system which includes the operating system CentOS and other
software like Asterisk, Dahdi, FreePBX. All necessary software can be installed well at one time, not
requiring independent peration for any one of them. Then Asterisk and relative services will be
automatically started up upon installation.
For detailed information about Elastix, please go to the official website of Elastix:
http://www.elastix.org.

2.2 Installation of Elastix System

Step1: Set the guide mode

Set BIOS to boot from CD-ROM. Put the CD of Elastix system burned already into CD-ROM and start
the PC.

180
p£¢ja
p£¢ja

Step2: Install Elastix

1. The system will go into the CD guide after the PC being started. Then the following interface will be
shown on the screen. See Figure 1. Press Enter directly to go into the default installation mode.( Figure
1)

2. Next, choose the language for installation. Here select ‘English’ (Figure 2).

181
p£¢ja
p£¢ja

3. Next, choose a keyboard type according to your requirement. Usually we choose ‘us’ (Figure 3).

4. Next is the partitioning operation. You have four options to select. For a brand new HDD, select the
default setting ‘Use free space on selected drivers and create default layout’. For an HDD with some
data already, if you want to discard it, use the option ‘Remove all partitions on selected drivers and
create default layout’; if you want to keep the old data, select the option ‘Create custom layout’ to do
partitioning. What we use here is a new HDD. Select the default setting and click on ‘OK’ (Figure 4).

182
p£¢ja
p£¢ja

5. Next, the following prompt ‘Review and modify partitioning layout?’ pops up. Select ‘No’ here
(Figure 5).

6. Next, the following prompt ‘Would you like to configure the eth0 network interface in your system?’
pops up. Select ‘Yes’ here (Figure 6).

183
p£¢ja
p£¢ja

7. Next, choose to configure IPv4 or IPv6. Here we select ‘Activate on boot’ and ‘Enable IPv4 support’,
and then click ‘OK’ (Figure 7).

8. Next, choose to manually or dynamically configure IP address. Here we select ‘Manual address
configuration’, enter the IP address and the subnet mask below, and then click ‘OK’ (Figure 8).
IP : 192.168.55.1
Prefix : 255.255.255.0
184
p£¢ja
p£¢ja

9. Next, enter the gateway address, the primary DNS address and the secondary DNS address, and then
click ‘OK’ (Figure 9).

10. Next, determine how to get the hostname, assigned automatically via DHCP or entered manually.
Here we select ‘manually’ and enter a hostname such as ‘voip’ on the dotted line (Figure 10).

185
p£¢ja
p£¢ja

11. Next, select a time zone according to the real situation. Here we select ‘Asia/Dhaka’ (Figure 11).

12. Next, enter the system administrator password (Figure 12).

186
p£¢ja
p£¢ja

13. Next, the partitioning and formatting of the HDD begins. After that, the system installation starts.
Upon all files being installed successfully, the PC will be restarted automatically (Figure 13).

Note: You must take out the Elastix CD before the PC restart; or the system will go into the installation
guide interface again.
14. After the PC restart, the system goes into the startup interface (Figure 14).

187
p£¢ja
p£¢ja

15. During the startup process, the following prompt will pop up to ask for a new MySQL root
password. Here we can set any password as we want (Figure 15).

16. Also in the startup process, the following prompt will pop up to ask for a web login password. Here
we can set any password as we want, such as ‘admin’ (Figure 16).

188
p£¢ja
p£¢ja

Step3: Log on the system


There pops up the login prompt after the system startup. Please use the root username to log in, and the
password is just the one set during the installation process.

Step4: When all the above steps are finished, the Elastix operating system has been installed
successfully.

Step 5 : Go to another PC open the internet browser and type the following URL
https://192.168.55.1

189
p£¢ja
p£¢ja

Click I Understand the risk

Click Add exception

190
p£¢ja
p£¢ja

191
p£¢ja
p£¢ja

Click Get certificate

Click on confirm security exception

Type user name admin and admin password as you given into the setup time.
Click Submit

192
p£¢ja
p£¢ja

This is home page


Click on PBX for all type of configuration.
How to add an extension or a telephone number

Select Generic SIP Device and click on submit

193
p£¢ja
p£¢ja

Type user extension : 3650


Display Name : CI School
Go to under the dialog box chose secret option for password
Then click on submit

194
p£¢ja
p£¢ja

Click apply configuration changes here .New extension has been created.

195
p£¢ja
p£¢ja

Configure a software phone (Zoiper)

Click Here for Option

Click Add new SIP account


Put the name here like (CI school) and click OK or any other name.

196
p£¢ja
p£¢ja

Domain /Server IP : 192.168.55.1


User name : 3650
Password/Secret : 3650sip

Click on Apply
Click on OK

Now the software phone is ready to use.

197
p£¢ja
p£¢ja

Click here for dial pad


Backup and Restore

Go tosystem Backup/Restore

Click on Perform a Backup

198
p£¢ja
p£¢ja

Select all options and click on Process

New backup is completed


To check new backup go to Backup/Restore.
You can see the following page.

199
p£¢ja
p£¢ja

You can download the backup file by clicking here

Restore

Select the backup file (which file you want to restore) and click on Restore

200
p£¢ja
p£¢ja

Trunks

Click on System-Hardware detector (to check the digium card)

Click PBX-Trunks-Add DAHDI Trunk

201
p£¢ja
p£¢ja

Fill up the following info as below


Trunk name :
Match pattern : .
DAHDI Identifier :

Now Submit Changes


Apply configuration changes here
Outbound Route

202
p£¢ja
p£¢ja

Click on Outbound Routes(from the left menu)


Fill up the following info as below
Route name :
Prefix :
Match pattern :
Trunk seq For Mached routes :

Now Submit Changes

203
p£¢ja
p£¢ja

Apply configuration changes here

Inbound Routes

Click on Inbound Routes (from the left menu)

204
p£¢ja
p£¢ja

Select extensions as you want to use in your VOIP Operator.

IVR

Click on system recording (from the left menu) for record your voice from IP phone or any other
extensions

205
p£¢ja
p£¢ja

Type your extensions number to record voice


And click on Go

Name of the recording : welcome _voice

206
p£¢ja
p£¢ja

207
p£¢ja
p£¢ja

208
p£¢ja
p£¢ja

209
p£¢ja
p£¢ja

পাঠঃ৫। Overview of Com sy, VPN, Digital Signature.

Overview

 What is security?
 Why do we need security?
 Who is vulnerable?
 Common security attacks and countermeasures
– Firewalls & Intrusion Detection Systems
– Denial of Service Attacks
– TCP Attacks
– Packet Sniffing
– Social Problems

What is “Security”

 Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a
visitor acts suspicious.

2. Measures adopted by a government to prevent espionage, sabotage,


or attack.

3. Measures adopted, as by a business or homeowner, to prevent a crime


such as burglary or assault: Security was lax at the firm's smaller plant.
…etc.

Why do we need security?

 Protect vital information while still allowing access to those who need it
– Trade secrets, medical records, etc.
 Provide authentication and access control for resources
– Ex: AFS
 Guarantee availability of resources
– Ex: 5 9’s (99.999% reliability)

210
p£¢ja
p£¢ja

Who is vulnerable?

 Financial institutions and banks


 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government agencies
 Multinational corporations
 ANYONE ON THE NETWORK

Common security attacks and their countermeasures

 Finding a way into the network


– Firewalls
 Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
 Denial of Service
– Ingress filtering, IDS
 TCP hijacking
– IPSec
 Packet sniffing
– Encryption (SSH, SSL, HTTPS)
 Social problems
– Education

Firewalls

 Basic problem – many network applications and protocols have security problems that
are fixed over time
– Difficult for users to keep up with changes and keep host secure

– Solution
• Administrators limit access to end hosts by using a firewall
• Firewall is kept up-to-date by administrators

 A firewall is like a castle with a drawbridge


– Only one point of access into the network
– This can be good or bad

 Can be hardware or software


– Ex. Some routers come with firewall functionality
– ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X
have built in firewalls

211
p£¢ja
p£¢ja

 Used to filter packets based on a combination of features


– These are called packet filtering firewalls
• There are other types too, but they will not be discussed
– Ex. Drop packets with destination port of 23 (Telnet)
– Can use any combination of IP/UDP/TCP header information
– man ipfw on unix47 for much more detail

 But why don’t we just turn Telnet off?


 Here is what a computer with a default Windows XP install looks like:
– 135/tcp open loc-srv
– 139/tcp open netbios-ssn
– 445/tcp open microsoft-ds
– 1025/tcp open NFS-or-IIS
– 3389/tcp open ms-term-serv
– 5000/tcp open UPnP

 Might need some of these services, or might not be able to control all the machines on
the network

 What does a firewall rule look like?


– Depends on the firewall used
 Example: ipfw
– /sbin/ipfw add deny tcp from cracker.evil.org to wolf.tambov.su telnet
 Other examples: WinXP & Mac OS X have built in and third party firewalls
– Different graphical user interfaces
– Varying amounts of complexity and power

212
p£¢ja
p£¢ja

Intrusion Detection

 Used to monitor for “suspicious activity” on a network


– Can protect against known software exploits, like buffer overflows
 Open Source IDS: Snort, www.snort.org

 Uses “intrusion signatures”


– Well known patterns of behavior
• Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS
attempts, etc.
 Example
– IRIX vulnerability in webdist.cgi
– Can make a rule to drop packets containing the line
• “/cgi-bin/webdist.cgi?distloc=?;cat%20/etc/passwd”
 However, IDS is only useful if contingency plans are in place to curb attacks as they are
occurring

Minor Detour…

 Say we got the /etc/passwd file from the IRIX server


 What can we do with it?

Dictionary Attack

 We can run a dictionary attack on the passwords


– The passwords in /etc/passwd are encrypted with the crypt(3) function (one-way
hash)
– Can take a dictionary of words, crypt() them all, and compare with the hashed
passwords
 This is why your passwords should be meaningless random junk!
– For example, “sdfo839f” is a good password
• That is not my andrew password
• Please don’t try it either

213
p£¢ja
p£¢ja

Denial of Service

 Purpose: Make a network service unusable, usually by overloading the server or


network
 Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
– Mini Case Study: Code-Red

 SYN flooding attack


 Send SYN packets with bogus source address
– Why?
 Server responds with SYN ACK and keeps state about TCP half-open connection
– Eventually, server memory is exhausted with this state
 Solution: use “SYN cookies”
– In response to a SYN, create a special “cookie” for the connection, and forget
everything else
– Then, can recreate the forgotten information when the ACK comes in from a
legitimate connection

 SMURF
– Source IP address of a broadcast ping is forged
– Large number of machines respond back to victim, overloading it

214
p£¢ja
p£¢ja

ICMP echo (spoofed source address of victim)


Sent to IP broadcast address
ICMP echo reply

Internet

Perpetrator Victim

 Distributed Denial of Service


– Same techniques as regular DoS, but on a much larger scale
– Example: Sub7Server Trojan and IRC bots
• Infect a large number of machines with a “zombie” program
• Zombie program logs into an IRC channel and awaits commands
• Example:
– Bot command: !p4 207.71.92.193
– Result: runs ping.exe 207.71.92.193 -l 65500 -n 10000
– Sends 10,000 64k packets to the host (655MB!)
• Read more at: http://grc.com/dos/grcdos.htm

 Mini Case Study – CodeRed


– July 19, 2001: over 359,000 computers infected with Code-Red in less than 14
hours
– Used a recently known buffer exploit in Microsoft IIS
– Damages estimated in excess of $2.6 billion

 Why is this under the Denial of Service category?


– CodeRed launched a DDOS attack against www1.whitehouse.gov from the 20th
to the 28th of every month!
– Spent the rest of its time infecting other hosts

 How can we protect ourselves?


– Ingress filtering
 If the source IP of a packet comes in on an interface which does not have
a route to that packet, then drop it
 RFC 2267 has more information about this
– Stay on top of CERT advisories and the latest security patches
 A fix for the IIS buffer overflow was released sixteen days before
CodeRed had been deployed!

215
p£¢ja
p£¢ja

TCP Attacks

 Recall how IP works…


– End hosts create IP packets and routers process them purely based on
destination address alone

 Problem: End hosts may lie about other fields which do not affect delivery
– Source address – host may trick destination into believing that the packet is from
a trusted source
• Especially applications which use IP addresses as a simple authentication
method
• Solution – use better authentication methods
 TCP connections have associated state
– Starting sequence numbers, port numbers
 Problem – what if an attacker learns these values?
– Port numbers are sometimes well known to begin with (ex. HTTP uses port 80)
– Sequence numbers are sometimes chosen in very predictable ways

 If an attacker learns the associated TCP state for the connection, then the connection
can be hijacked!
 Attacker can insert malicious data into the TCP stream, and the recipient will believe it
came from the original source
– Ex. Instead of downloading and running new program, you download a virus and
execute it

Say hello to Alice, Bob and Mr. Big Ears

216
p£¢ja
p£¢ja

Alice and Bob have an established TCP connection

 Mr. Big Ears lies on the path between Alice and Bob on the network
He can intercept all of their packets

217
p£¢ja
p£¢ja

 What if Mr. Big Ears is unable to sniff the packets between Alice and Bob?
– Can just DoS Alice instead of dropping her packets
– Can just send guesses of what the ISN is until it is accepted
 How do you know when the ISN is accepted?
– Mitnick: payload is “add self to .rhosts”
– Or, “xterm -display MrBigEars:0”

 How do we prevent this?


 IPSec
– Provides source authentication, so Mr. Big Ears cannot pretend to be Alice
– Encrypts data before transport, so Mr. Big Ears cannot talk to Bob without
knowing what the session key is

218
p£¢ja
p£¢ja

Five Minute Break

 Recall how Ethernet works …


 When someone wants to send a packet to some else …
 They put the bits on the wire with the destination MAC address …
 And remember that other hosts are listening on the wire to detect for collisions …
 It couldn’t get any easier to figure out what data is being transmitted over the network!
 This works for wireless too!
 In fact, it works for any broadcast-based medium

 What kinds of data can we get?


 Asked another way, what kind of information would be most useful to a malicious user?
 Answer: Anything in plain text
– Passwords are the most popular
 How can we protect ourselves?
 SSH, not Telnet
– Many people at CMU still use Telnet and send their password in the clear (use
PuTTY instead!)
– Now that I have told you this, please do not exploit this information
– Packet sniffing is, by the way, prohibited by Computing Services

 HTTP over SSL


– Especially when making purchases with credit cards!
 SFTP, not FTP
– Unless you really don’t care about the password or data
– Can also use KerbFTP (download from MyAndrew)
 IPSec
– Provides network-layer confidentiality

219
p£¢ja
p£¢ja

 People can be just as dangerous as unprotected computer systems


– People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to
give up valuable information
– Most humans will breakdown once they are at the “harmed” stage, unless they
have been specially trained
• Think government here…

 Fun Example 1:
– “Hi, I’m your AT&T rep, I’m stuck on a pole. I need you to punch a bunch of
buttons for me”

 Fun Example 2:

– Someone calls you in the middle of the night


 “Have you been calling Egypt for the last six hours?”
 “No”
 “Well, we have a call that’s actually active right now, it’s on your calling
card and it’s to Egypt and as a matter of fact, you’ve got about $2000
worth of charges on your card and … read off your AT&T card number
and PIN and then I’ll get rid of the charge for you”

 Fun Example 3:
– Who saw Office Space?
– In the movie, the three disgruntled employees installed a money-stealing worm
onto the companies systems
– They did this from inside the company, where they had full access to the
companies systems
• What security techniques can we use to prevent this type of access?

 There aren’t always solutions to all of these problems

– Humans will continue to be tricked into giving out information they shouldn’t
– Educating them may help a little here, but, depending on how bad you want the
information, there are a lot of bad things you can do to get it

 So, the best that can be done is to implement a wide variety of solutions and more
closely monitor who has access to what network resources and information
– But, this solution is still not perfect

Conclusions

 The Internet works only because we implicitly trust one another


 It is very easy to exploit this trust
 The same holds true for software
 It is important to stay on top of the latest CERT security advisories to know how to
patch any security holes

220
p£¢ja
p£¢ja

 http://www.robertgraham.com/pubs/network-intrusion-detection.html
 http://online.securityfocus.com/infocus/1527
 http://www.snort.org/
 http://www.cert.org/
 http://www.nmap.org/
 http://grc.com/dos/grcdos.htm
 http://lcamtuf.coredump.cx/newtcp/

VPN: Virtual Private Network

Outline

 Introductions
 What is it?
 Overview
 Security/Tunneling
 Advantages and Disadvantages
 Demonstration

Introductions

 Gregg
 BSG – Student Developer
 Unified Western Grocers – Retail Technology Specialist
 Liz
 BSG – Business Analyst
 ResNet – Network Technician
 COB CRC: Tier 2/3 Support Technician
 Whitney
 BSG – Student Tester/Analyst

VPN: What is it?

 Virtual Private Network


 Remote network communication through Internet
 Used by companies/organizations who want to communicate confidentially
 Two parts:
 Protected or “inside” network
 “Outside” network or segment (less trustworthy)

Types of VPN

 Secure VPNs use cryptographic tunneling protocols.


 IPsec, SSL/TLS, Open VPN, PPTP, L2TP, L2TPv3, VPN-Q and MPVPN
 Trusted VPNs rely on the security of a single provider’s network to protect the traffic.
 MPLS and L2F

221
p£¢ja
p£¢ja

VPN: Security

 Encryption
 IPSec
 Authentication
 User/System and Data
 AAA Servers
(Authentication, Authorization, and Accounting)
 Firewalls

VPN: Tunneling

 Requires 3 protocols
 Carrier
 Default network protocol
 Passenger
 Original data
 Encapsulation
 GRE, IPSec, L2F, PPTP, L2TP

VPN: Encapsulation

VPN: Tunneling (cont.)

 Two Basic types of tunneling


 Site-to-Site
 Typically uses GRE
 Remote-Access
 Typically uses PPP

222
p£¢ja
p£¢ja

VPN: Advantages

 Cost Effective
 Greater scalability
 Easy to add/remove users
 Mobility
 Security

VPN: Disadvantages

 Understanding of security issues


 Unpredictable Internet traffic
 Difficult to accommodate products from different vendors

VPN Demonstration

223
p£¢ja
p£¢ja

224
p£¢ja
p£¢ja

225
p£¢ja
p£¢ja

226
p£¢ja
p£¢ja

227
p£¢ja
p£¢ja

228
p£¢ja
p£¢ja

Virtual private network

229
p£¢ja
p£¢ja

VPN connectivity overview


A virtual private network (VPN) extends a private network across a public network, such as the
Internet. It enables a computer or network-enabled device to send and receive data across shared or
public networks as if it were directly connected to the private network, while benefiting from the
functionality, security and management policies of the private network.[1] A VPN is created by
establishing a virtual point-to-point connection through the use of dedicated connections, virtual
tunneling protocols, or traffic encryptions. Major implementations of VPNs include OpenVPN and
IPsec.
A VPN connection across the Internet is similar to a wide area network (WAN) link between websites.
From a user perspective, the extended network resources are accessed in the same way as resources
available within the private network.[2] One major limitation of traditional VPNs is that they are point-
to-point, and do not tend to support or connect broadcast domains. Therefore communication,
software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in
Windows networking, may not be fully supported or work exactly as they would on a real LAN.
Variants on VPN, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling protocols, are
designed to overcome this limitation

230
p£¢ja
p£¢ja

পাঠঃ ৬। Basic concepts on open BTS

Open BTS and its Basic fun


• The main goal of the Open BTS project is present de GSM air interface to standard GSM handsets and
uses the Asterisk PBX software to connect calls. You will be able to make call between GSM handsets
and any kind of device compatible with Asterisk in your own network, in other words, without pay by
the calls.
• A GSM network is a complex system composed by several components. The last mile of this system is
the BTS (Base Transceiver Station). The BTS is responsible to transmit and receive the RF (Radio
Frequency) signals to the user terminal (cell phone, PDA, modem, etc). The BTS’s are controlled by a
BSC (Base Station Controller) that is connected to the MSC/VLR (Mobile Switching Center/Visitor
Location Register). Basically, the MSC/VLR is responsible to authenticate the user against the database
(HLR - Home Location Register, AuC - Authentication Center). Below is a picture of the key elements
of a GSM network:

The Open BTS Project


The Open BTS (Base Transceiver Station) project is an effort to construct an open-source Unix
application that uses the Universal Software Radio Peripheral (USRP) to present a GSM air interface
("Um") to standard GSM handsets and uses the Asterisk software PBX to connect calls. The Open BTS
uses the USRP hardware to receive and transmit the GSM Signalling. This is done by using the GNU
Radio framework. The Asterisk is used to interface the GSM calls between the cellular phones under the
Open BTS network. Any other device that can be connected to the Asterisk can be also used

231
p£¢ja
p£¢ja

232
p£¢ja
p£¢ja

233
p£¢ja
p£¢ja

HW/NW Trouble shooting (HNT)

পাঠঃ ১ Com HW/OS maint and basic troubleshooting

হাডওয় ার ও মাদারেবাড স ং কই আেছ িক িপিস পাওয়ার পাে না :

1। কিসং-এর পাওয়ার সা াই চক ক ন এখােন সম া থাকেত পাের৷


2। কিসংেয়র পাওয়ার ইেচর সােথ মাদারেবােডর য সংেযাগ স ক আেছ িকনা চক ক ন৷
3। অেনক সময় িব ্য সরবরাহ িবি হেয় আবার িফের আসার পের পাওয়ার আেস না৷এর কারণ মাদারেবােডর
পাওয়ার ক াপািসটর কমেতা িডসচাজ/িনউ াল না হওয়া৷
4। এজ আপিন পরবত েত পাওয়ার অন করার েব পাওয়ার সা াই থেক পাওয়ার কড স ণ িবি ন কের ন ন কের সংেযাগ
িদন৷

কি উটার হাডিড েক িডেট করেছ না : কি উটার বহারকারীেদর এ ধরেনর সম ায় ায়ই পড়েত হয়৷ িবিভ কারেণ কি উটাের
পাওয়ার দওয়ার পর হাডিড েক কি উটার িডেট করেত পাের না৷

সম ার স া কারণস হ:

১। ভােলাভােব ল ক ন হাডিডে র সােথ কিসংেয়র পাওয়ার সা াই থেক আসা পাওয়ার কড কমেতা সং আেছ িক-না৷
২। হাডিড র সােথ মাদার বােড র আইিডই বাস ক াবল ারা স কভােব সং আেছ িক-না৷
৩। হাড িডে র জা ার স ং ক আেছ িকনা ? এে ে হাডিডে র জা ার ইভােব সট করা যায় এক মা ার স ং অ
ভ স ং৷
৪। হাড িড মাদারেবােডর সােথ াইমাির না সেক াির িহেসেব সং িনি ত হান৷
৩ ও ৪ নং কনিফগােরশরেনর জ যিদ একই স ংেস একািধক IDE Device (CD ROM, HDD) থােক তেব তা পাওয়া নাও
যেত পাের-
যমন দখা গল য এক HDD ও এক CD Rom উভেয়ই Secondary master িহেসেব
কনিফগার করা৷ এে ে Device-এর কােনা এক নাও পাওয়া যেত পাের৷
৫। BIOS-এ IDE অেটা িডেট অপশন িডেজবল থাকেল তা ৪ IDE িডভাইেসর জ এনাবল করেত হেব ন বা া য়ািল
HDD ক িডেট কিরেয় িদেত হেব৷

‘অপাের ং িসে ম নট ফাউ , NTLDR িমিসং‘ : সাধারণ উইে াজ এ িপ, উইে াজ ২০০০ িকংবা এন উইে াজ স েহ এ সম া
হেয় থােক৷ এ সম া একবার হেয় গেল ন ন কের উইে াজ লাড দয়া ছাড়া উপায় নই৷ বরং হওয়ার আেগই এক Boot
Floppy তির কের তােত িসে ম াইভ হেত (েয াইেভ উইে াজ লাড থােক) Folder option-এ িগেয় Show all file
option Enable এবং Hide protected file চক ব হেত Check উ েয় boot.ini; ntdetect.com;
ntldr ফাইল িতন কিপ কের boot floppy ত রেখ িদন৷ পরবত েত সম া হেল boot floopy িদেয় মিশন ট কের
িসে ম াইেভ ফাইল িতন আবার কিপ কের রা ন৷ সাধারণত HDD ত Bad Sector থাকেল িকংবা সংেযাগ ব া পিরবতন
করেল িকংবা ভাইরাস জিনত কারেণ এ সম া হেত পাের৷

সফ মােড কি উটার চা হে : উইে াজ অপাের ং িসে ম াভািবকভােব চা হেত না পারেল অেনক সময় সফ মােড চা হয়৷
সফ মাড হেলা উইে ােজর িবেশষ এক অব া যখন এ এেকবাের েয়াজনীয় ফাইল এবং াইভারস হ িনেয় লাড হয়। বলা যেত পাের
‘িবপদকালীন‘ অব া যখন তম রসদ িদেয় ােণ বেচ থাকাটাই ণ৷ সফ মােড উইে াজ চা হেল াথিমক ভােব ির াট কের
দখা যেত পাের নরায় াভািবকভােব তা চা হয় িকনা৷ বার বার কের থ হেল ঝেত হেব সম া তর৷ উইে ােজর কােনা
ণ ফাইেলর িত বা হাডওয়ােরর সম ার কারেণ তা হেত পাের৷ কােনা ন ন হাডওয় ার স ংস পিরবতেনর ফেল যিদ উইে াজ
বার বার সফ মােড চেল যায় তেব ববত স ংস িরভাস কের ফলাই য়। সফ মাডেক এজ ডায়াগিনি ক মাডও বলা হয়৷
উইে াজ ২০০০/এ িপ/২০০৩ চা হওয়ার সময় F8 চাপেল য ম আেস সখান থেক সফ মাড চা করা যেত পের৷ তেব আেগই বলা
হেয়েছ; এ ডায়াগিনি ক মাড৷ এই মােড বাড়িত কােনা িক ই যমন- সাউ , ি ার, হাই কালার িডসে ইত ািদ িক ই কাজ করেব না৷

234
p£¢ja
p£¢ja

ািফ কাড ু কালার দখাে না : ািফ কােডর কালার স ং অপশন আপিন ড টেপ রাইট মাউস ি ক কের াপা জ-এর
স ং ােব Color setting ও Screen area হেত িনধারণ করেত পােরন৷ িক যিদ এখােন True Color অপশন না
আেস তাহেল ঝেত হেব য আপনার ািফ কােডর াইভার কমেতা লাড হয়িন অথবা আপনার কি উটার নরমাল েড চলেছ না৷
যিদ ািফ কাড কমেতা ইন ল না হয় তেব Setting Tab-এর Advance Button-এ ি ক ক ন৷ এবার Adapter
Tab হেত Change বাটেন ি ক কের নরায় ািফ এর াইভার িচিনেয় িদন- এে ে ািফ কােডর াইভােরর িসিড
েয়াজন হেত পাের৷

কি উটার েত বীপ শ করেছ :

কি উটাের পাওয়ার দয়া মা তা িক Indicating Beep িদেয় থােক যা ারা বাঝা যায় কি উটােরর অব া। িনেচ এ েলা
উে খ করা হেলা। Beep সং া-১ : কিসংেয় অভ রীন সম PCI, ISA ( পিরেফরাল), কী- বাড, মাউস, যাম ও েসসর মাদার
বােডর সিহত স কভােব সং আেছ।
কি উটার চা হেত কােনা সম া হেল তা হেলা HDD, Floppy, CD ROM Drive এবং মিনটেরর সংেযাগ সম া হেত
পাের৷ স েলা খয়াল ক ন৷

Beep সং া ২, ৩ ও ৪ : রম স কভােব রম েট সং হয়৷ রম েল ন ন কের সংেযােগর চ া কের দ ন৷


Beep সং া ৫ : সব কাড মাদার বােড কমেতা লাগােনা আেছ িক-না দ ন৷
Beep সং া ৬: মাদার বােড কী- বাড সংেযাগ েল সম া৷
Beep সং া ৭ : েসসর সম া অথবা েসসর সংেযােগ সম া৷
Beep সং া ৮ : িভিডও কাড কাজ করেছ না অথবা সংেযাগ সম া৷
Beep সং া ৯ : এ ব িবরল এবং ভয়ানক এ িনেদশ কের আপনার মাদার বােডর বােয়াস খারাপ হেয় থাকেত পাের৷
Beep সং া ১০ : এ ও েবর মেতা িবরল৷ এ িনেদশ কের য আপনার মাদার বােডর CMOS Chip ন যা বােয়াস এর সট
আপেক সভ রােখ৷

আপিন থেকই িপিস ির াট হে : িবিভ কারেণ এ হেত পাের। যমন-

১। RAM এ
২। অপাের ং িসে েম
৩. ভাইরাসজিনত সম া এে ে ভাইরাস চক কের ন ন কের OS লাড ক ন৷ তােতও সমাধান না হেল রম চ ক ন৷ তেব মােঝ
মােঝ কােনা সফটওয় ার সােপাট না করেল তার মা েম কি উটার অেটােম ক ািল ির ট হয়৷ সে ে সফটওয় ার আন ল কের িদন৷

িক িদন পরপর িপিস া হেয় যায়ঃ হ যা, িপিস া হবার পছেন সবেচেয় বড় কারণ স কভােব বহার না করা৷ িপিস‘র গিত এর
হাডওয় ার কনিফগােরশেনর ওপর যমন িনভর কের, তমিন এর সফটওয় ার কনিফগােরশনও মনেটে ও ভািবত কের এর গিতেক৷
িপিস‘র পারফরেম অপাের ং িসে েমর ওপেরও িনভরশীল৷ সাধারণত দখা যায়, ন ন উইে াজ ই টল করার পের িপিস‘র গিত সেবা
থােক৷ এরপর ধীের ধীের গিত অেপ া ত া হেয় যায়৷ এর কারণ েয়াজেনর বিশ সফটওয় ার ই টল করা৷ েয়াজন না হেল বিশ
সফটওয় ার ই টল কের মেমািরর ওপর চাপ বাড়ােনা িনষ েয়াজন৷ অেনক সফটওয় ার আেছ য েলা সরাসির সামনাসামিন না চলেলও
নপে িবিভ সািভস চা কের রােখ৷ এ সে িবিভ ডাটা বইজ সাভার, এি ভাইরাস া াম ইত ািদর কথা বলা যেত পাের৷ এ েলা
িপিস‘র গিতেক অেনকাংেশ ধীর কের দয়৷

াশ হাডিড থেক ডাটা ন ার : সাধারণ হাডিড াশ করেল ডাটা উ ার স ব হয় না৷ তার উপর হাডিডে না েঝ কােনা
অপােরশন চালােল তা আরও িতর কারণ হেত পাের৷ এজ কােনা েফশনােলর সাহা নয়াই ভােলা৷ তারপরও যিদ িক উ ার করা যায়
তােত ম িক? তেব খয়াল রাখেবন াস হওয়া হাডিড েলও ফরেমট/পা শন এর চ া করেবন না৷ যিদ ডাটা উ ার করেত চান৷ ‘ভােব
হাডিড াস করেত পাের এক িসিল ার াস, অ সািকট াশ৷ যিদ িসিল ার াস কের তেব ঝেত হেব এর মা ার ট রকড এ
কােনা সম া আেছ তা ক করেত হেব৷ মা ার ট রকড িনেয় িফচােরর পরবত অংেশ আেলাচনা রেয়েছ৷ িক সািকট াস করেল
সমমােনর অ ন হাডিড থেক একই িসিরয়াল সািকট ঁেজ বর কের তা িরে েসর মা েম হাডিডে র সািকট াস িরেপয়ার স ব৷ িক
সফটওয় ার যমন Easy recovery pro একােজ সাহা করেত পাের৷

235
p£¢ja
p£¢ja

সাউ িনেয় সম া : থেম িডভাইস ােনজার থেক িনি তভােব সাউ কােডর জ কােনা াইভার লাড করা আেছ িক-না ?
যিদ স ক াইভার লাড করা থােক তেব সাউ আসার কথা৷ এ ে Control panel-এর Sound & Multimedia
option হেত audio- ত িগেয় দ ন Volume mute করা িক-না৷ থাকেল তা উ েয় িদন৷ এেতও যিদ সাউ না আেস তেব
াইভার ভাসন স ক নয়৷ িকংবা সাউ কাড ন ৷ এে ে স ক াইভার লাড ক ন িকংবা সাউ কাড পিরবতন ক ন৷ িক আপিন যিদ
িনি ত হন য, াইভার ভাসন এবং সাউ কাড কই আেছ সে ে মাদােবােড িভ েট সাউ কাড সংেযাগ কের দখেত পােরন৷
এরপর দ ন সাউ কােডর স ক পােট ি কার লাগােনা আেছ িক-না৷ আজকাল বিশরভাগ মাদারেবােডই সাউ িব ইন থােক৷ অেনেক
ভােলা
পারফরেমে র জ িপিসআই েট উ ত সাউ কাড লািগেয় নন৷ এেত ল রাখেত হেব মাদারেবাড কান বহােরর অপশন িনবাচন করা
হেয়েছ৷ উইে াজ ২০০৩ সাভাের বাই িডফ সাউ অফ থােক৷ েতই তা চা কের নয়া যেত পাের৷ এজ কে াল ােনল থেক সাউ
অপশন িসেল ক ন৷

হাডওয় ার কনি সম া : এই সম া হেল উইে ােজর েতই হয়৷ সাধারণত একািধক হাডওয় ার একই আইআরিকউ (IRQ) বা
িরেসাস বহার করেল এ ধরেনর সম া হেত পাের৷ তেব একই আইিকউ বহার করেলই এমন সম া অিনবায নয়৷ সাধারণ কােনা
িডভাইেসর সম ার কারেণ স অ িডভাইসেক িক টা ভািবত করায় এই সম া দখা দয়৷ িকংবা কােনা হাডওয় ােরর াইভার
সফটওয় ার েরা ির আনইন ল না কের সই হাডওয় ার অপসারণ কের সই েট ন ন হাডওয় ার াপন৷ িকংবা িভ েট ািপত
হাডওয় ােরর াইভার ইন েলর সময় তােদরেক একই ট লােকট কের দয়ার জ অথবা ি ার সংেযাগ একেপােট আর ি ােরর
াইভার অ পােট ই টল করেল হাডওয় ার কনি হেত পাের৷ এজ হাডওয় ার সংেযাগ ব া খয়াল কের সই অ যায়ী াইভার
লাড করা উিচত৷ অব বতমােন Plug & Play হাডওয় ার েলােত এই সম া িবরল৷

236
p£¢ja
p£¢ja

f¡W-2z Identification of common network problems, Network security and trouble shooting.
­eVJu¡LÑ hÉhq¡­ll ®r­œ e¡e¡¢hd pjpÉ¡ ®cM¡ ¢c­a f¡­l z pLm pjpÉ¡ HLC fËL«¢al e¡J q­a f¡­l z a­h hÉhq¡¢lL ®r­œ ®kpLm
pjpÉ¡pj¤q p¡d¡lZa ®cM¡ k¡u ®ppLm pjpÉ¡ J a¡l pj¡d¡e pÇf­LÑ ¢LR¤ B­m¡Qe¡ ¢e­jÀ fËcš q­m¡ x

mÉ¡e L¡XÑ B­R ¢L¿º LÉ¡hm Ce Ll­m HmC¢X S­me¡ z H­r­œ fËb­jC ®cM­a q­h mÉ¡eL¡XÑ¢Vl XÊ¡Ci¡l pgVJu¡l ®pVBf B­R
¢Le¡ z k¢c a¡J ¢WL ®cM¡ k¡u ®p­r­œ p¤CQ ®f¡VÑ Abh¡ mÉ¡e ®f¡­VÑ m¤S L¡­eLne b¡L­a f¡­l, HLV¥ i¡mi¡­h Q¡f ¢c­u m¡¢N­u
®cM¡ ®k­a f¡­l z k¢c a¡­aJ ¢WL e¡ qu a¡q­m h¤T­a q­h LÉ¡hm Hl p¡­b L¡­eƒl ¢WLj­a¡ m¡N¡­e¡ e¡C z k¢c a¡­aJ ¢WL e¡ qu
a¡q­m h¤T­a q­h LÉ¡hm¢Vl j¡TM¡­e ®L¡b¡J ®hËL B­R z ®p­r­œ LÉ¡hm¢V Abh¡ mÉ¡eL¡XÑ¢V f¢lhaÑe Ll¡ fË­u¡Se q­h L¡lZ LÉ¡hm
J mÉ¡e L¡XÑ ®k­L¡¢V­a h¡ Ei­uC pjpÉ¡ b¡L­a f¡­l z
Cookies j¤­R ®gm¤e z C¾V¡l­e­V ïje/l¡E¢Sw Hl pju A­eL J­uhp¡CVC Bfe¡l AS¡­¿¹ Bfe¡l q¡XÑ¢X­ú Hje
¢LR¤ ®R¡V ®R¡V g¡Cm ®l­M k¡u k¡ Bfe¡l Password ïj­el pju J a¡¢lM pwlrZ L­l z Hl j¡dÉ­j Bfe¡l C¾V¡l­e­V hË¡E¢Sw
dle pÇf­LÑ ­h¡T¡ k¡u Hhw Bfe¡l L¢ÇfEV¡­ll N¢a­L L¢j­u ®cu z ®p­r­œ H…­m¡­L j¤­R ®gm¡C Ešj z H…­m¡ j¤­R ®gm¡l SeÉ
Windows ®g¡ô¡­ll j­dÉ Cookies Hhw Internet Temporary file e¡jL ­k c¤¢V ®g¡ô¡l l­u­R a¡l j­dÉ ®b­L pLm
g¡Cm j¤­R ®gm¤e Abh¡ Internet Explorer Q¡m¤ L­l Hl Tooks H ¢LÓL L­l Internet Options H ¢LÓL Ll­a q­h z HM¡e
®b­L General VÉ¡h q­a Delete Afn­e ¢LÓL Ll­mC Bfe¡l g¡Cm…­m¡ j¤R­he ¢Le¡ a¡ ¢e¢ÕQa Ll­h z Cookie f¢lØL¡­ll
SeÉ ¢LR¤ Software J f¡Ju¡ k¡u z ®kje- Cookie Crusher z

Auto Complete Afne Disable L­l ¢ce z ¢h¢iæ gl­j User name/pasword ®mM¡l SeÉ Auto
Complete Afne¢V ®hn EfL¡l£ z ¢L¿º¤ Hl g­m Bfe¡l L¢ÇfEV¡­ll AeÉ¡eÉ hÉhq¡lL¡l£ Bfe¡l user name Hhw
Password pÇf­LÑ Ae¤j¡e Ll­a f¡­l z HC option ¢V active b¡L­m ¢LR¤ J­uhp¡C­V Hhw p¡QÑ C¢”­e ¢h¢iæ ®XV¡ H¢¾VÊ
¢g­ô Bf¢e ®kph ®XV¡ H¢¾VÊ L­l­Re a¡ pwl¢ra ®b­L k¡uz g­m Bfe¡l f­lC ®k HC hË¡ES¡­ll j¡dÉ­j Iph J­uhp¡CV h¡ p¡QÑ
C¢”­e fË­hn L­l, ®p Bfe¡l ®cJu¡ abÉpj§q ®cM­a f¡­lz ¢eÕQC Bfe¡l ®N¡fe£u abÉ¡h¢ml SeÉ HV¡ ýj¢Lül¦f z HC Auto
complete option ¢V hå L­l ®cJu¡l SeÉ tools>Internet option>Content VÉ¡­h ¢LÓL Ll¦e z Hlfl f¡­pÑ¡e¡m
Cegl­jne ®pLn­e A­V¡ Lj¢fÔV ®h¡a¡­j ¢LÓL Ll¦e z A­V¡ Lj¢fÔV ­p¢Vwp e¡­j HLV¡ EC­ä¡ J­fe q­h z HM¡­e gljp Hhw
usernames & Paswords on form option c¤¢V Disable L­l ¢ce z

History j¤­R ¢ce z C¾V¡l­eV H„­fÔ¡l¡­l History ®g¡ô¡­l Bfe¡l hË¡ESL«a pLm J­uhp¡C­Vl abÉ pwl¢ra b¡­L z
Hl g­m History ®a ¢LÓL L­l Bf¢e f§­hÑ ïjZL«a J­uhp¡C­Vl a¡¢mL¡ J ¢WL¡e¡ ®f­a f¡­le z H Afne¢V HL¢cL ®b­L
Bfe¡l SeÉ p¤¢hd¡SeL q­mJ Hl j¡dÉ­jC Bfe¡l A¢g­pl hp, pqLj£Ñ, hå¥h¡åh AbÑ¡v AeÉ k¡l¡ Bfe¡l L¢ÇfEV¡l¢V hÉhq¡l L­l
a¡l¡ ph¡C Bfe¡l ïjZ pÇf­LÑ abÉ ®f­a f¡­l z H­a Bfe¡l fË¡C­i¢p ¢LR¤V¡ q­mJ eø qu a¡C e¡ ? HC Aa£a C¢aq¡p j¤­R
®gm¡l SeÉ ToolsInteernet. OptionGeneral tab H Click Ll¦e z HM¡­e History ­pLne ®b­L Clear
History h¡V­e ¢LÓL Ll¦e z Hh¡l Days to keep pages in History Hl X¡e f¡­n 01 L­l ¢ce z Bh¡l Bf¢e k¢c pjÙ¹
History ®g¡ô¡l f¢lØL¡l e¡ L­l ®Lhm HL¢V ®f­Sl e¡j j¤R­a Q¡e a¡J pñh z HSeÉ History ®h¡a¡­j ¢LÓL Ll¦e z
History e¡­j HLV¡ Windows h¡j f¡­n J­fe q­h z HMe ®k g¡Cm¢V/®fS¢V Bf¢e j¤­R ®gm­a Q¡e z a¡l Jfl Right
Click Ll¦e z pop up windows ­b­L delete L­l ¢ce z

Filtering Content z ¢LR¤ ¢LR¤ J­uhp¡CV B­R k¡ ¢nö­cl SeÉ Ef­k¡N£ eu z I pLm J­uhp¡C­V ïje ®b­L ¢nö­cl­L
¢hla l¡M¡l SeÉ p¡d¡lZa Bm¡c¡ pgJuÉ¡l hÉhq¡l Ll¡ qu z ¢L¿º¤ C¾V¡l­eV H„­fÔ¡l¡l Hl ¢eSü ¢LR¤ Built in Filtering
Tools B­R k¡l j¡dÉ­jJ C¾V¡l­e­V ïje HLV¡ ¢e¢cÑø j¡œ¡l ¢eu¿»e Ll¡ k¡u z HSeÉ Tolls>Internet>Option>Content
tab H ¢LÓL Ll­a q­hz HM¡­e Content Advisor ®pLn­e Enable ­h¡a¡­j ¢LÓL Ll¦e z Content Advisor window
J­fe q­h z HM¡­e Language, Nudity, Sex, Violence e¡­j Q¡l¢V LÉ¡V¡N¢l f¡­he z H­LL¢V LÉ¡V¡N¢l ¢p­mƒ L­l ¢e­Q
Slider Hl j¡dÉ­j ®m­im ¢edÑ¡le L­l ¢ce z ¢e­Q Description h­„ fË­aÉL ®m­im L£ L£ allow L­l a¡l heÑe¡ ®cJu¡ B­Rz
Hh¡l J­L L­l ®hl q­u Bp¤e z
Spam ®WL¡­a HLV¡ ®L±nm z ®L¡­e¡ J­uhp¡C­V ®L¡­e¡ ®l¢S­øÊne glj f¤le Ll¡l pju Abh¡ AeÉ ®L¡­e¡ L¡l­e ®L¡­e¡
f¡h¢mL fÉ¡­mp H A­eL pjuC Bfe¡l Email Address ®cJu¡l fË­u¡Se q­a f¡­l z öd¤j¡œ H pLm ®r­œ hÉhq¡­ll SeÉ
Bf¢e HLV¡ ¢h­no Email address hÉhq¡l Ll¦e z Bfe¡l hÉ¢š²Na fË­u¡S­e AeÉ B­lL¢V Email Address hÉhq¡l
Ll¦e z ¢h¢iæ J­uhp¡C­V Bfe¡l pÇf­LÑ abÉ ®cJu¡l fË­u¡S­e B­lL¢V ¢ho­ul ¢c­L mr l¡M¤e z H pju öd¤j¡œ Bh¢nÉL ®r­œ
abÉ ¢ce Hhw ®L¡­e¡ n¢fw p¡C­V Abh¡ ®X¢mi¡¢l H­XÊp fË­u¡Se e¡ q­m false information ¢ce z Bn¡ Ll¡ k¡u Jf­ll
fc­rf c¤¢V NËqe Ll¡l g­m Bfe¡l hÉ¢š²Na C-®jCm H­XÊp¢V ØfÉ¡j h¡ Ah¡¢’a C-®jC­ml k¿»e¡ ®b­L A­eLV¡ ®lq¡C f¡­h z
AhnÉ HSeÉ spam killer h¡ H dl­el AeÉ ®L¡e pgVJuÉ¡l hÉhq¡l Ll­a f¡­le z
237
p£¢ja
p£¢ja

C¾V¡l­eV L¡­eLne ®nu¡¢lw z je Ll¦e Bfe¡l¡ c¤C hå¥ Bfe¡­cl L¢ÇfEV¡­l ®eVJu¡¢LÑw L­l­Re z HMe Bfe¡l HL hå¥l
C¾V¡l­eV L¡­eLne l­u­R q­a f¡­l a¡ Dial-up h¡ Broad Band z Bf¢e Q¡­µRe a¡l C¾V¡l­eV L¡­eLne ®nu¡l Ll­a Bl
HC L¡S¢V ®ki¡­h Ll­he z (i) Start ®je¤­a ¢LÓL Ll¦e z (ii) Settings ®b­L Network Connections ¢p­mƒ Ll¦e z
(iii) HM¡e ®b­L Dial-up, Local area network, PPPoE (Properties), h¡ VPN connection­kV¡ Q¡­µRe a¡
¢p­mƒ Ll¦e Hhw h¡j f¡­nl Network Tasks ­b­L Change Settings of this connection ¢p­mƒ Ll¦e z (iv)
Hh¡l Advanced Tab ­b­L Allow other network users to connect through this computer's Internet
connection h­„ ¢p­mƒ Ll¦ez (v) HMe Bf¢e k¢c Q¡e AeÉ¡eÉ CES¡ll¡ HC C¾V¡l­eV L¡­eLne Enable h¡ Disable
Ll­a f¡l­h, HM¡e ®b­L Allow other network users to control or disable the shaved internet
connection ¢p­mƒ Ll¦e z (vi) Internet connection shaving Hl home networking connection H
Bfe¡l HÉ¡X¡ÃV¡l AbÑ¡v ®k L¢ÇfEV¡­ll C¾V¡l­eV L¡­eLne AeÉ¡eÉ L¢ÇfEV¡l ®nu¡l Llh a¡l HÉ¡X¡ÃV¡l¢V ¢p­mƒ L­l ¢ce z

C¾V¡l­eV ¢ØfX h¡s¡­e¡ z HC ¢Vfp¢V k¡l¡ hËXhÉ¡ä hÉhq¡l L­le a¡­cl SeÉ z a­h qu­a¡ H¢V X¡u¡m-Bf J L¡S
Llhz (i) fËb­jC mr Ll¦e ®k, Bf¢e Administration ¢q­p­h mN Ce L­l­Re ¢L-e¡ z Ll­m - (ii) Start H ¢LÓL Ll¦ez (iii)
Run ¢p­mƒ L­l gpedit.msc V¡Cf L­l J­L ®h¡a¡­j ¢LÓL Ll¦ez (iv) Hh¡l EC­ä¡l h¡j ¢c­Ll Local Computer
Policy'l ¢e­Q Administrative Templates H X¡hm ¢LÓL Ll¦ez (v) Hlfl Network H X¡hm ¢LÓL Ll¦ez (vi)
Aaxfl QoS Packet Scheduler ®L q¡Cm¡CV Ll¦e z (vii) X¡e ¢c­Ll EC­ä¡ ®b­L limit Reservable
bandwidth ®b­L Afne¢V X¡hm ¢LÓL Ll¦e z (viii) Settings ­b­L Enable ¢p­mƒ Ll¦e z (ix) Bandwidth limit
(%) Hl f¡­nl h­„ O V¡Cf L­l Ok h¡a¡j Q¡f¤e z ¢LR¤ ¢LR¤ L¢ÇfEV¡­ll p¡­b p¡­bC fËi¡h mr Ll­he z Bl ¢LR¤ ¢LR¤­a s
L¡l fË­u¡Se q­hz p¡d¡lZa AeÉ¡eÉ ®fË¡NË¡j Bfe¡l hËXhÉ¡ä h¡ C¾V¡l­eV L¡­eLn­el 20% ¢ØfX ¢e­S­cl SeÉ ¢lS¡iÑ L­l l¡­M z
Bl Ef­ll ¢Vf­pl j¡dÉ­j Bjl¡ AeÉ¡eÉ ®fË¡NË¡­jl ¢lS¡iÑ L­l l¡M¡ ¢ØfX­L h¡c ¢c­u a¡ Bj¡­cl hË¡E¢Sw J X¡Ee­m¡¢Xw H
hÉhq¡l Ll­h¡ z g­m ü¡i¡¢hLi¡­hC Bj¡­cl hËXhÉ¡ä ¢ØfX ®h­s k¡­h z

Pagefile h¡c ®cu¡ z p¡d¡lZa Windows XP ®k XÊ¡C­i Ceøm Ll­he ®p XÊ¡Ci Pagefile.sys e¡j HL¢V g¡Cm
®~al£ qu z H¢VC ¢h¢iæ HÉ¡¢fÔ­Lne ®m¡X q­a p¡q¡kÉ L­l z A­eLV¡ Virtual Memory ¢q­p­h H¢V hÉhq²a qu z Bfe¡l¡ k¢c
Q¡e fË¢ah¡l Windows XP ®m¡X qh¡l pju H¢V ea¥e L­l ®~a¢l q­h, a¡ q­m ¢e­Ql ¢euj¢V ¢n­M l¡M¤e z (i) Control Panel
H k¡ez (ii) ®pM¡e ®b­L Administrative tools ¢p­mƒ Ll¦e z k¡l¡ M¤­S f¡­he e¡ a¡l¡ Performance and
Maintenance H ¢LÓL Ll¦e z (iii) Hh¡l Local Security policy ®a X¡hm ¢LÓL Ll¦e z (iv) HL¢V ea¥e EC­ä¡ Bp­hz
®pM¡­el h¡j f¡n Local Policy l Security Options H ¢LÓL Ll¦e z (v) X¡e f¡­nl EC­ä¡l HLcj ¢e­Q Bp¤e z (vi)
Shutdown: Clear virtual memory pagefile Afne¢V X¡hm ¢LÓL Ll¦e z (vii) ea¥e Bp¡ EC­ä¡ ®b­L Enable
¢p­m­ƒ Ll¦e z (viii) Ok Ll¦e z

Lj¢fÔV Shutdownz A®e­LC h­me ®k, Windows XP p¡V X¡Ee Ll¡l flJ f¤l¡f¤¢l hå qu e¡ z EC­ä¡­a h¡aÑ¡
B­p ®k, "It's now safe to turn off your Computer." Bfe¡l¡ L¢ÇfEV¡l f¤l¡f¤¢l hå Ll¡l SeÉ k¡ Ll­he a¡ q­m¡-
(i) Control Panel k¡ez (ii) Power Options H ¢LÓL Ll¦e Abh¡ Performance and maintenance qu
Power Options H ¢LÓL Ll¦e z (iii) ea¥e Bp¡ EC­ä¡l Ef­ll APM Afne H ¢LÓL Ll¦e z (iv) Hh¡l Advance
Power Management Hl h„¢V AbÑ¡v Enable Advanced Power Management Support ¢VL ¢ce z (v)
Ok Ll¦e z hÉp Hlfl ®b­L A­V¡­j¢VL Bfe¡l L¢ÇfEV¡l hå q­u k¡­h Shut Down Lj¡ä ®ch¡l fl z

­pÔ¡ Shutdown z B¢j fË¡u pjuC ®k pjpÉ¡l pÇj¤M£e qa¡j a¡ q­m¡, Shut Down Lj¡ä ®ch¡l fl fË¡u 1 h¡ 2 ¢j¢eV
fl L¢ÇfEV¡l hå q­a¡ z â¦a hå Ll¡l SeÉ ®k pj¡d¡e…m¡ ®fm¡j ®p…­m¡ q­m¡ - (i) Shut Down Ll¡l B­N ph…­m¡
Running program hå Ll¦ez (ii) Control Panel H Administrative tools Hl Services H k¡e (Abh¡
Start>Run>Services V¡Cf L®l H¾V¡l Ll¦e) z (iii) X¡ef¡­nl EC­ä¡ ®b­L Nvidia Driver Helper Service
Afne¢V X¡hm ¢LÓL Ll¦e z (iv) ea¥e EC­ä¡ ®b­L Stop ¢LÓL L­l Ok Ll¦e z (v) Hh¡l Shut Down Ll¦e z Shut
Down Hl pju Page file h¡c ¢ce (Page file h¡c ¢ce Awn ®cM¤e )z

238
p£¢ja

S-ar putea să vă placă și