Digi Academy

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Digi Academy
A Milano

Chiedi il prezzo
Chiedi informazioni a un consulente Emagister

Informazioni importanti

Tipologia Corso
Luogo Milano
Inizio Scegli data
  • Corso
  • Milano
  • Inizio:
    Scegli data
Descrizione

Implementing an IPv4 Network Infrastructure Overview of Name Resolution Services in an IPv4 Network Infrastructure Configuring and Troubleshooting IPv4 Selecting an IPv4 Addressing scheme for branch offices

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa
Inizio Scegli data
Luogo
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa

Cosa impari in questo corso?

Windows Server 2008
Server
Security
VPN
Management
Windows Server
Windows
Testing
Office
Firewall

Programma

Implementing and Verifying IPv4 in the branch office


After completing this module, students will be able to:


Plan an IPv4 addressing scheme.


Determine which name services you must deploy.


Configure and troubleshoot an IPv4 network.


This module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.


Overview of the DHCP Server Role


Configuring DHCP Scopes


Configuring DHCP Options


Managing a DHCP Database


Monitoring and Troubleshooting DHCP


Configuring DHCP Security


Selecting a Suitable DHCP Configuration


Implementing DHCP


Reconfiguring DHCP in the Head Office


Testing the Configuration


Troubleshooting DHCP Issues


After completing this module, students will be able to:


Describe the function of the DHCP Server Role.


Configure DHCP scopes.


Configure DHCP options.


Manage a DHCP database.


Monitor and troubleshoot the DHCP Server Role.


Configure security the DHCP Server Role.


This module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.


Installing the DNS Server Role


Configuring the DNS Server Role


Configuring DNS Zones


Configuring DNS Zone Transfers


Managing and Troubleshooting DNS


Selecting a DNS Configuration


Deploying and Configuring DNS


Troubleshooting DNS


After completing this module, students will be able to:


Install the DNS server role.


Configure the DNS server role.


Create and configure DNS zones.


Configure zone transfers.


Manage and troubleshoot DNS.


This module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.


Overview of IPv6


IPv6 Addressing


Coexistence with IPv6


IPv6 Transition Technologies


Transitioning from IPv4 to IPv6


Configuring a New IPv6 Network and Client


Configuring an ISATAP Router to Enable Communication Between an IPv4 Network and an IPv6 Network


Transitioning to a Native IPv6 Network


After completing this module, students will be able to:


Describe the features and benefits of IPv6.


Implement IPv6 addressing.


Implement an IPv6 coexistence strategy.


Describe and select a suitable IPv6 transition solution.


Transition from IPv4 to IPv6.


Troubleshoot an IPv6-based network.


To support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.


Configuring Network Access


Configuring VPN Access


Overview of Network Policies


Overview of the Connection Manager Administration Kit


Troubleshooting Routing and Remote Access


Configuring DirectAccess


Configuring Routing and Remote Access as a VPN Remote Access Solution


Configuring a Custom Network Policy


Create and distribute a CMAK Profile


Configure the AD DS Domain Controller and DNS


Configure the PKI Environment


Configure the DirectAccess Clients and Test Intranet Access


Configure the DirectAccess Server


Verify DirectAccess Functionality


After completing this module, students will be able to:


Configure network access.


Create and configure a VPN solution.


Describe the role of network policies.


Use the Connection Manager Administration Kit to create and configure client connection profiles.


Troubleshoot routing and remote access.


Implement DirectAccess.


NPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.


Installing and Configuring a Network Policy Server


Configuring RADIUS Clients and Servers


NPS Authentication Methods


Monitoring and Troubleshooting a Network Policy Server


Installing and Configuring the Network Policy Server Role Service


Configuring a RADIUS Client


Configuring Certificate Auto-Enrollment


Configuring and Testing the VPN


After completing this module, students will be able to:


Install and configure NPS.


Configure RADIUS clients and servers.


Describe NPS authentication methods.


Monitor and troubleshoot NPS.


In this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.


Overview of Network Access Protection


How NAP Works


Configuring NAP


Monitoring and Troubleshooting NAP


Configuring NAP Components


Configuring Client Settings to Support NAP


After completing this module, students will be able to:


Describe how NAP can help protect your network.


Describe the various NAP enforcement processes.


Configure NAP.


Monitor and troubleshoot NAP.


Security is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.


Windows Security Overview


Configuring Windows Firewall with Advanced Security


Deploying Updates with Windows Server Update Services


Deploying a Windows Firewall Rule


Implementing WSUS


After completing this module, students will be able to:


Describe a process for increasing the security of Windows Server 2008.


Configure Windows Firewall with Advanced Security.


Describe Windows Server Update Services and how to use it.


Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.


Overview of IPsec


Configuring Connection Security Rules


Configuring NAP with IPsec Enforcement


Monitoring and Troubleshooting IPsec


Selecting a Network Security Configuration


Configuring IPsec to Authenticate Computers


Testing IPsec Authentication


After completing this module, students will be able to:


Describe when and how to use IPsec.


Configure Connection Security rules.


Configure IPsec with NAP Enforcement.


Describe how to monitor and troubleshoot IPsec.


File and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.


Configuring and Troubleshooting File Shares


Encrypting Network Files with EFS


Encrypting Partitions with BitLocker


Configuring and Troubleshooting Network Printing


Creating and Configuring a File Share


Encrypting and Recovering Files


Creating and Configuring a Printer Pool


After completing this module, students will be able to:


Describe how to manage file share security.


Explain how to encrypt network files with EFS.


Describe how to encrypt partitions with BitLocker.


Discuss how to configure and troubleshoot network printing.


Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.


Branch Office Data Access


DFS Overview


Overview of DFS Namespaces


Configuring DFS Replication


Configuring BranchCache


Installing the DFS Role Service


Configuring the Required Namespace


Configuring DFS Replication


Performing Initial Configuration Tasks for BranchCache


Configuring BranchCache Clients


Configuring BranchCache on the Branch Server


Monitoring BranchCache


After completing this module, students will be able to:


Describe the challenges experienced when providing data access to branch offices.


Identify the basic components of DFS.


Describe DFS namespaces.


Explain how to configure DFS replication.


Discuss how to configure BranchCache.


Network storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.


Monitoring Network Storage


Controlling Network Storage Utilization


Managing File Types on Network Storage


Configuring FSRM Quotas


Configuring File Screening


Configuring File Classification and File Management


After completing this module, students will be able to:


Describe how to monitor network storage by using FSRM.


Explain how to manage quotas by using FSRM.


Describe how to implement file screening, classification management, and file management tasks by using FSRM.


This module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.


Recovering Network Data with Volume Shadow Copies


Recovering Network Data and Servers with Windows Server Backup


Configuring Shadow Copies


Configuring a Scheduled Backup


After completing this module, students will be able to:


Describe how to configure and use volume shadow copies.


Describe how to configure and use Windows Server Backup.


When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.


Monitoring Tools


Using Performance Monitor


Monitoring Event Logs


Establishing a Performance Baseline


Identifying the Source of a Performance Problem


Centralizing Events Logs


After completing this module, students will be able to:


Describe monitoring tools for Windows Server 2008 R2.


Describe how to use performance monitor.


Describe how to monitor event logs.



Gli utenti che erano interessati a questo corso si sono informati anche su...
Leggi tutto