Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 91

~1~

MCSE (Microsoft Certified System Eng.) CCNA (Cisco Certified Network Associate) NETWORKING
NETWORK INTRODUCTION:- Connectivity two or more P.C. with any transmitter
media is known as Network.

NETWORKING INTRODUCTION:- After conn


ection the sharing of data and resourcing is known as Networking.

TYPE OF NETWORK
According to distance cover:(1) LAN:- Local Area Networking (With in 1 Km) (2) MAN:- Metropolitan Area N\W (With in 10 Km) (3) CAN:- Campus Area N\W (Group Network) (Ex. Bank Network) (4) WAN:- Wide Area N\W (Above 10 Km) (Multiple) According to Work:Peer to Peer Networking (Working Model) Client Server Networking (Domain Model) Benefit Of Network Exchange Server Novel Network Network Terms:(1) Server :- Who gives the services to client. (2) Client:- who accept the services from sever. (3) Workstation (4) Host:- The terms IP Address Used. (5) Node:- Any devices which can communicate each other in a network is known as node. (6) Segment :- A group of P.C. is known as Segment. (7) Back Born:- That wire who connect the all P.C.

~2~
Requirement of Networking :(1) Two or more P.C. (LAN card/ Ethernet) (2) Transmission media (Hub, Cable, Punching tools etc) (3) Protocol:- TCP/IP Address. (1) It is printed circuit board which used to connect P.C. with transmission media. It may be 8 bit, 16 bit, 32 bit, 64 bit, each any (Media Access control)/ ether net Address/ Physical address. It is a 48 bit binary address which is represented by 12 digit Hexa Decimal No. The first 6 digit re-present the many feature date and last 6 digits represent the model no. Command :- IP Config/All C:\> IP Config/All Physical Address-------------------------------------------Ethernet Frame Size:- source MAC + diction MAC2 + CRC (Checking Error) 1512 Byte- Around 1500 Byte Transmission Media:- There are two part of transmission media Bounded Unbounded Physical Cable Logical Connection Wire Wireless (1) Co Axial Blue tooth (2) Twisted Pair Infrared (3) Fibro Pair Radio Wave Satellite Selection of Cable Depend Upon:(1) Cost (2) Speed (3) EMI (Electro magnetic Interface) (4) Avis Dropping (distance) (5) Tapping (6) Ease of Installation Twist Pair Cable:- There are two part of twist pair cable (1) STP (Shielded Twisted Pair) (2) UTP(Unshielded Twist Pair) (1) Twist Cable :- Twist can minimize the interface (Cross talk) (2) Straight Cable:- Use to connect between two difference devises Ex.:- P.C. to Hub, P.C. to Switch, Hub/Switch to Printer. (3) Cross cable:- Use to connect Between Same devices Ex. P.C. to P.C., Hub to Hub, Switch to Switch, Switch to Hub.

~3~
Use:- Uplink to Uplink :- Cross cable Uplink to Normal:- Straight cable Normal to Normal:- Cross cable

TOPOLOGY (Physical Layout of N/W)


Type Of Topology:(1) Star (2) Bus (3) Ring (1) Star :- All system are connected together with a central connecting devices known as hub or switch. Connector:- RJ-45 (Register jack 45) Cable:- Straight cable (UTP)
HUB (1) (2) (3) (4) Single broad cast domain. Single collision domain. Divide the frequency. First layer devices(Physical layer devices) (1) (2) (3) (4) Switch Single broad cast domain Multiple collision domain. Can not divide the frequency. Second layer devices (date link layer devices)

PROTOCOL
Sets of role and regulation for communicating between two or more devices. There are three type of protocol. (1) TCP/IP :- Transmission control Protocol / Internet Protocol. (2) IPX / SPX :- Internetworking packet exchange / Sequent packet exchange (Novel) (3) Net BEUT :- Network Bios Exchange User Interface. (IBM) IP Address :- (1) 32 bit binary address, which is represented dotted decimal no. (2) it is combination network & host address. 8 bit Class :- A Network address (1.126) 8 bit Host address 8 bit Host address 8 bit Host address

A= Total No. of N/w = 2N (N = No. of network bit & n= No. of Host Bit) Network address Host address Host address

Class :-B Network address

~4~
(128-191) B= Total No. of N/w = 2N Class :-C Network address Network address Network address Host address

(192-223) C= Total No. of N/w = 2N Class :- D Multi cast Class :- E R& D Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop back adaptor diagnostic purpose.

FILE SYSTEM
There are three type of file system. (1) FAT 16 (File allocation table 16) (2) FAT 32 (File allocation table 32) (3) NTFS (New technology file system) Difference between FAT 16, FAT 32, NTFS

FAT 16
HDD Support Cluster Size Security Quota Inscription Operating System 2 GB 32 KB NO NO NO DOS/ Win 9x/ NT/ 2000/ XP/ 2003

FAT 32

NTFS

2 TB 16 EB 4 KB 512 Kb NO YES NO YES NO YES Win98 /ME / 2000 / XP/ Win NT/ 2000/ XP/ 2003 2003

PARTITION
Logical division of HDD is known as partition. Types of partition (1) Primary Dos Partition :- Active Partition (2) Extended Partition :- Logical Drive

How to create the partition:-

~5~
(1) Fdisk (2) Disk Manager (DM) (3) Pro Magic (With out formatting)

Command :- System Transfer Command :- A:\ sys c:

~6~ MCSE FIRST PAPER Code :- 70-270 Topic (1) Installation of Windows XP. (2) User & Group Management (3) Local Security Policy
(a) Password Policy (b) Account Policy (c) Audit Policy (d) User Right Policy (e) Security Option (4) User Profile & Hardware Profile (5) TCP/IP Configuration (a) IP configuration (b) Ping (6) Sharing / Mapping & Offline Folder (7) NTFS Feature (a) Disk Quota (b) EFS:- (Encrypted File System) (c) Compression (d) File & Folder Level Security (8) Dial up Connection & Internet Sharing (9) NT Backup & Restore (10) Trouble shooting (a) System State Backup (b) A.S.R. :- (Automatic System Recovery) (c) Recovery Console

Windows XP

INSTALLATION XP
Minimum Requirement of Win XP. (1) CPU P-1 (133 MHz), Recommended :- (233 MHz) (2) REM 64 MB, Recommended :- 128 MB (3) HDD 1500 MB, Recommended :- 1.5 GB (4) CD :- Software XP (5) CD ROM :- 12X (X= 150 Kbps)

~7~

Installation :(1) Boot the system with Win XP Bootable CD & then press any key to installation. (2) Boot the system with Win 98 startup disk / CD. CD ROM drive Suppose d: A:/> d: Remove the Win98 CD & then Insert the Win XP CD which contain the file (I386) D:/> CD I386 D:/I386/> WinNT.exe (3) For duel Booting Start :- Run :- Commend (CD Drive d:/I386/WinNT32.exe) (4) Unattended Installation :- ( Through Answering File) Requirement Win2000, Win XP, Win 2003 (A) Create Folder on Any drive {any name(deploy)} (B) Insert Win2000, Win XP, Win 2003 (C) Open :- Support / Tools/ Deploy. cab (a) Select all file. (b) Right Click (c) Extract (d) Path Your Create Folder (Your Name) (e) Open the Folder (Deploy {Your name}) (f) Run Setup Manager. Exe (g) Welcome to the setup manager wizard He ask me to choose the one topic (a) Create a New answering File (b) Modify Exacting file We Choose the first topic. And than next and set the appropriate answer and than save this file to floppy drive. (5) Rom drive:/ I386/ WinNT32.exe. / Unattended C:\text\ unattended (6) RIS Installation (Remote Installation Server)

~8~

User & Group Management

(1) My Computer :- First of all to right click the My computer and then select the manage & see the table :Computer Management
Computer Management (-) System Tools (+) Event Viewer (+) Shared folder (+) Local User and Group (Click this) (+) Performance Logs and Alerts Device Manager (-) Storage (+) Removable Storage Disk Defragmenter Disk Management (+) Services and Application

Click the Local User and Group and show the two icon (1) User (2) Group. Right click the User and create the new user. And saw the table to create the new user.
New User User Name :Full Name :Description :Password :Confirm Password :[] User Must Change Password at next logon [] User cannot change password [] Password never expires [] Accounts is disabled

~9~
(2) Click the start menu and click the setting and then open the control panel. And choose the Computer management or User Account to create the New User.

Command to User Create :- lusrmgr.msc


(3) Click the start menu and click the ran command :- MMC (Microsoft Management Control). Add:- Add/ Remove Snap.in :- Local User & Group :- Add :---------------Close (All Time Save). Local Security Policy Policy implemented on machine net far User & Group.

Command :- secpol.mse Command :- MMC


Start :- Ran :- secpol.mse Start :- Program :- Administrative Tools :- Local Security Policy Local Security Settings
Security Setting [+] Account Policies (Click This) [+] Local Policies [+] Public Key Policies [+] Software Restriction Policies [+] IP security Policies on Local Comp. Password Policy (Click this) Account Lockout Policy Enforce Password History Maximum Password Age Minimum Password Age Minimum Password Length Password Must meet Com Store Password using revere..

Enforce Password History :Maximum Password Age :Minimum Password Age :Minimum Password Length :Password Must meet Com :Store Password using revere... :-

(Enable/ disable) 0 to 24 42 days / (0-999) (0+999) 0 to 14 Character Enable Enable Reversibility

~ 10 ~

Account Lockout Policy There are three types of Account Lockout Policy. (1) Account Lockout Duration :- XX Minute (2) Account Lockout Threshold :-2 Invalid Logon (0 to 999) (3) Reset Account Lockout Counter After :- XX minute Group Identity:(1) Collection Of User is known as Group (2) If you have to set right & permission to more then one user, then set right / permission on group & add user to this group. There are two type of group (1) Local Group (2) Domain Group
Local Group (1) Creation local PC that is Win XP / Win 2003 member server. (2)Right & Permission are set locally. (3) Store the information in SAM (Security Account Manager) Domain Group (1)Creation on DC (2)Right & Permission are set Globally (Entire Network) (3) Store the information in Active Directory Database.

Local Group There are two type of Local Group. (1) Built in Local Group (2) Built-in Special Group(System Group)
Built in Local Group (1) It reside in Local & Group Folder. (2) You have to add the User in this Group. (3) Ex.:- Administrator, Guest, Power User, Backup Operator, Network Configuration, User (Ordinary User) Built-in Special Group (System Group) (1) Can not reside in Group Folder. (2) Can not add. (3) Everyone.

~ 11 ~
To create the group there are two step of to create group. (Step 1) Click the start menu and Ran command (lusrmgr.msc)
Local User & Group Local user & Group User Group (Right Click) Group Name:- (255 character) Description :- Optional Member :Optional Add:- Select User:- Advanced :- Find Now

(Step 2) Click the start menu and Ran command (secpol.msc)


Security Settings [+]Account Policies [+]Local Policies (Double Click) [+]Public Key Policies [+]Software Restriction Policies [+]IP Security Policies on Local Computer. Audit Policy User Right Assignment (Click Open) Security Option Select Right(Log on locally) :- Open :- Add :Select User & Group:advanced :- Find Now :Ok

Sharing, Mapping & Offline File (1) Sharing :- it is used to show the file and folder and changing and saving to another computers this is type of sharing, C:$ D:$ E:$ These drive already share but hidden to (Administrator Control) Step (1) :- Start menu :- Run :- Computer Name (IP Address) :- (192.168.0.2\c$) Step (2) :- Computer management And Share folder Step (2) :- Data :- Right Click:- Share & Security :-

~ 12 ~
Do not share this folder Share this folder Share name :Comment :User limit :- Maximum Allowed Allow this number of user Permissions Caching New share Ok Cancel apply

Permissions :- Everyone :- Full Control Change Read ok Mapping It used to a share folder as a drive & Icon then you have to make network drive. Step (1)Start :- Run :- IP address :Step (2)Data :- Right Click :- Map Network Drive Step (3) My computer or Network :- Right Click :- Map Network Drive :- Path(//Computer name{IP address}/share folder). [] Reconnect at logon Ok. Offline File If you want to access the shared resources, when the network is break, then use offline file(Folder). Step (1) :- Start :- Setting :- Control Penal :- Folder Option :- Offline file. [] Enable Offline [] Synchronize offline files when logon []Synchronize offline file when log off Apply ok Step (2) :- Start :- Run :- (IP address[//192.168.0.2]) :- data :- right click:- make available offline :- ok

~ 13 ~
NTFS FEATURE It used to specify the disk space to a particular user. Step (1) :- Logon as a administrator :Right click on any drive (c:, d:, e:,) Properties Quota tab [] Enable Quota management [] deny disk space to users exceeding quota limit Click the Quota Entries And Click the Quota menu and create the new Quota entry and then select the user and then limit the Quota. Quota Entries :- Quota menu :- New Quota Entry :- Select User :- Limit Quota E.F.S. (Encrypted File system) (1) It is a feature of win XP/ Win 2000/ Win 2003. (2) It is a user level security. (3) It used to convert the plan text of data to encrypted from that is cipher text. Step :- Logon as user (User name) and create a folder to any drive and right click the this folder and click the properties and then click the advanced and we click the encrypt content to secure data and click ok and click and then apply changes to this folder, subfolder and file and apply. Logon as a user:- create a folder :- right click :- properties :- advanced :- click the encrypt content to secure data. :- apply :- apply changes to this folder and subfolder and file :- ok (Compression) It used to compress the file and folder and save the disk space. Step :- Same step like that EFS. Note :- Compress and Encrypt are usually apposite to each other.

~ 14 ~
File and Folder Level Security Folder level security (Permission) :Data :- Sub folder :- file Right click the data Security Advanced Remove the click to Inherit from parent the permission Click the remove Apply ok Add Advanced Find now Select user Select administrator Ok Set the permission
Permission Full control Modify Read & Execute List Folder Contents Read Write Special Permission Allow [] [] [] [] [] [] [] Deny [] [] [] [] [] [] []

~ 15 ~

CLIENT SERVER
Domain :- It is a logical grouping of Computer in a network. Domain Controller :- The Machine which control the active directory services is known as domain controller. Active Directory :- It is a directory services in win2000/ win 2003 server operating system which Constance the information of network servers in hole network. & easy to locket and mileage this resource. Requirement of Domain Controller:(1) Win 2000/ Win2003 server. (2) At least one NTFS Vol. (3) TCP/IP configuration (4) Administrative privilege.

Command :- DCPROMO (Domain Controller Promo)


Step to create the domain Start :- Run :- Command (dcpromo) :- Next :- Next :- (choose the one topic) (1) Create a new Domain tree (Click this ) (2) Additional Domain And then Create a new domain tree in a new forest (Choose the one topic) (1) Child Domain Controller (2) New Domain tree in exacting forest. (Click this) And then Enter the DNS Name (Domain Name Services) :- Vikrant.com Enter Net bios Name :Next :- Next :Vikrant

~ 16 ~
Install a configure DNS Next :- Finish :- Restart

Command :- (1)dcpromo /forceremoval (To remove the domain) (3) dsa.msc (To create the user) (4) gpupdate /force (5) Netdom /Query Fsmo (To check the server)
Client Server :- these step for create client server Logon the administrator:My computer:- Right click:- Properties :- Computer Name :- Change:(1) Domain ( Click this) (2) Workgroup User name :- Administrator Password :- ----------------Next :- ok : Restart

User Profile
It is used to set the computing environment of each user that is it used to set the desktop setting, start menu setting, favorites setting, cookies etc. Type of User Profile (1) Local User Profile (Default Profile) :- It automatic creative when user logon first time. Its settings are save in document & setting folder. (2) Roaming Profile :- It setting are environment of entire network, when user logon from in any computer in a network or when user change its desktop setting it update on server after logoff. Step :(1) Logon as Administrator. (2) Create a folder on any NTFS Vol. with full control sharing permission.

~ 17 ~
(3) Open User properties (start-run-dsa.msc-create user) (4) Select Profile tab. Local path \\IPAddress\shared folder\user name \\Computer name\shared folder\%username% Apply ok & Log on as a User (3) Mandatory Profile :- Implemental of entire network when user changes its setting from network then it can not update on server after user logoff. Step :(1) Logon as user (2) Open shared folder (3) Open user folder (4) Show all hidden file with extension name. (5) Rename NTUSER.DAT to NTUSER.MAN (6) Right click to NTUSER.DAT (7) Advanced (8) Encrypt (9) Every lots (10) logoff & then logon

TCP/IP (Transmission Control Protocol/ Internet Protocol)


Number System:(1) Binary system :- Base-2 (2) Octal No. :- Base-8 (3) Decimal No. :- Base-10 (4) Hexa Decimal :- Base-16 0,1 0,1,2,3,4,5,6,7 0,1,2,3,4,5,6,7,8,9 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

It is a combination of two protocol TCP/IP. It develop by DOD (Department of defiance) in U.S. Used by ARPA (Advanced Recharge Project Agency) and first time used by IANA (Internet Assuaged Numbering Authority ). TCP work on 4th layer (Transport layer) IP work on 3ed layer (Network layer) IP Address :(1) It is a numerical No of each machine in IP Address. (2) It is a software Address (3) It is a 32 bit binary Address which is represented on 3 dotted decimal No.

~ 18 ~
(4) It is combination of Network Address and Host Address. (5) It is divide into classes. The first Octed (Byte) of IP Address represent the classes

8 bit Class :- A Network address (1.127)

8 bit Host address

8 bit Host address

8 bit Host address

A= Total No. of N/w = 2n (n = No. of network bit) Network address Host address Host address

Class :-B Network address

(128-191) B= Total No. of N/w = 2n -2 Class :-C Network address Network address Network address Host address

(192-223) C= Total No. of N/w = 2n -2 Class :- D Multi cast Class :- E R& D Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop back adaptor diagnostic purpose. Class A: - The deplorer of IP Address set that, first bit in first Byte is always off. Class B:- The first bit is always on and second bit is always off. Class C:- The first two bit is always on and the third bit is always off. Note :- Reserved Address (1) All network Address is set to 0. (2) All network Address is set to 1 (subnet mask). (3) Address 127.0.0.1, or 127.255.255.255 are not used (Loop Back) (4) All Host Address is set to 0 Network address. (5) All Host Address is set to 1. (6) All bit is set to (32 bit) Default rout of router. (7) All bit to 1 , 255.255.255.255 are not used.

~ 19 ~

Private IP Address
It is used for Private Network. Class A:- 10.0.0.0 Class B:- 172.16.0.0 Class C:- 192.168.0.0 Total No. of Network Host per Network Class A:Total No of Network Host per Network = Class B:Total No of Network Host per Network Class C:Total No of Network Host per Network = = = = 2N (N= 5+8+8) 25*28*28 = 2097152 2n -2 (n:- 8) 28 -2 = 256-2 = 256 = = = = 2N (N= 6+8) 26*28 = 16384 2n -2 (n:- 16) 216 -2 = 65534 = = 2N 27 = 128 = = To To To 10.255.255.255 172.31.255.255 192.168.255.255

2N (N:- No. of Network Address) 2n -2 (n:- No of Host Address)

2n -2 = 224 -2 = 16777216

Subnet Mask Subnet Mask represented the Computer in a Network default Subnet Mask.

~ 20 ~
(1) A:- 255.0.0.0 (2) B:- 255.255.0.0 (3) C:- 255.255.255.0

Dial Up Connection
Modem {Modulation & Demodulation} Step 1 :- Install Modem & Then Configuration Step 2 :- Start :- Setting :- Network Connection :- New Connection Wizard :- Next :- Click the Connect to the Internet :- Click the Connect using Dial up Mode :- ISP Name :- Airtel :Phone No :User Name(Phone No.) :- Password :- Add Shortcut :- Finish.

Backup & Restore


Backup Devices:(1) FDD (2) HDD (3) CD R/W (4) DVD R/W (5) Pen Drive (6) Zip Drive (100 MB + 250 MB) (7) LS 120 (8) Jizz Drive (9) SAN Types of Backup:- There are five type of Backup. (1) (2) (3) (4) (5) Normal Backup Incremental Backup Differential Backup Copy Backup Daily Backup

~ 21 ~
(1) Normal Backup:- The Backup select all file and folders during Backup (First Time). It clear the Archive Attribute. (2) Incremental Backup:- The Backup select all file and folder after Normal Backup or Incremental Backup, that is creative or modified. It also clear the Archive Attribute. (3) Differential Backup :- The Backup select all file and folder which is creative or modified after each normal or Incremental Backup. It set the Archive Attribute. (4) Copy Backup :- The Backup select all file and folder during consecutive to Incremental Backup it also set the Archive Attribute. (5) Daily Backup :- The backup select all file and folder which is creative or modified per day. It also set the Archive Attribute.

COMMEND :- NTBACKUP (TO BACKUP & RESTORE)


Step1:- Start :- Run :- NTBACKUP Step2:- Start :- Program :- Accessories :- System Tools :- Backup :- Advanced:(1) Backup (Click this) (2) Restore (3) A.S.R. :(1) Backup every thing on my computer (2) Backup selected File , Drive or Network data (Click this) (3) Only Backup the System state backup. :-Item to Backup
+ My Computer + My Documents + Network Places Select file and folder which is used to Backup

Next :Choose a place to save your Backup Type a name for the backup Next:-

~ 22 ~
Advanced :Select the type of Backup Normal Backup (Select this) Incremental Backup Differential Backup Copy Backup Daily Backup Select the option you want to user (Next) Append this backup to the exacting Backup (1) Low (2) Letter (Click this) Schedule Backup Finish Note:(1) Boot Drive :- Contains Windows (System Root) (2) System Drive :- Contain Booting file always C: (Primary Partition) (3) Booting File :- NTLDR, Boot.INI, NTdetect.com, Bootsect.doc, NT boot dd.sys, NToskrnl.exe

Recover Console
It is a command pro console through which you have repair operating System, like create a format partition, start and step services, repair MBR (Master Boot Record).

Command :- I386\WinNT32.exe\ Cmdcons Disable Mouclass (device) Enable Mouclass (Device) Service_System_Start Dcgpofix (Domain Controller Group Policy Disable) MMC:- RSOP:- Right Click:- Garnet Policy:- Normal:- Fix MBR (Master Boot Record)

~ 23 ~

~ 24 ~

Second Paper
Code :- 70-290
(1) Over View Of DC / ADC / CDC (2) Terminal Service (3) I I S ( Internet Information service) (4) Disk Management (5) Print Management (6) MBSA / SUS

I I S( Internet Information Service) It is used to create the Website in Local Area Network Or Entire Network. (1) HTTP:- (Hyper Text Transfer Protocol) (2) FTP :- (File Transfer Protocol) (3) NNTP :- (Network Newed Transfer Protocol) (4) SMTP :- (Simple Mail Transfer Protocol) (5) SNMP :- (Simple Network Management Protocol) (6) POP :- (Post Office Protocol) Step 1 :- Start :- Setting :- Control Panel :- Add \ Remove Program :- Add \ Remove Window Components :- Application Server :- Details :- Select the I I S :- Details :- Select the FTP :- Next :- Ok :- Finish. Step 2 :- Open TCP / IP Properties :- Advanced :- IP Address :- Add IP Address (192.168.0.22, 192.168.0. 23..etc) Step 3 :- Create a Folder :- Text (Share this folder) :- Notepad (Massage) :- Save :- File Name (Vikrant.html). Step 4 :- Start :- Program :- Administrator Tools :- I I S

~ 25 ~
Start :- Run :- Command intermgr.msc

Command :- Intermgr.msc
+Com + + + + Website (Right Click)

New Site :- Description :- XYZ :- Assigned IP Address (192.168.0.20 .) Port :- 80 .. :- Path (Vikrant.html) File :- Permission (Read Write Brows etc) :- Next :- Finish

Terminal Server
There are two part of Terminal Server (1) Remote Administrator Mode (2) Application Mode Requirement of Terminal Server (1) Window 2000 or Window 2003 server. Step 1 :- Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window Component :- To select the Terminal Server :- Yes :- Next :- To select the Full Security :Next :- Finish :- Restart. Step 2 :- Start :- Run :- TSCC.MSC Start :- Program :- Administrator tools :- T.S. Configuration. T.S. configuration + Connection R.D.P(Remote Desktop Protocol) - TCP :-Right Click :- Properties :- Add User :- Set Permission :- [] Full control

~ 26 ~
[] User Access [] Guest Access [] Special Permission :- Apply :- ok On Clint Window XP / Window 2003 In Built :- Remote Desktop Connection (R.D.C.) Start :- Program :- Accessories :- Communication R.D.C. :Brows Connect User Name:- Administrator Password :-------------------On Clint (Win95/98/NT/2000) T.C. Clint :- Share Windows \ system 32 \ Clint Run: - \\192.168.0.100 :- T.C. Clint: - Win32 Setup.exe (2) Application Mode:Step 1 :- As a TIS IST Step 2 :- Start :- Run :- DSA.MSC Add User Component + Built in + Computer + + + User (Vikrant Kumar) Select

Select User (Vikrant Kumar):Properties:Environment:[] Start the following Program at log on %system%system32/msword.exe OK

Disk Management
There are two type of disk management

~ 27 ~
(1) Basic Disk (2) Dynamic Disk

Basic Disk (1) (2) (3) (4) Dos/win95/98/NT/2000/XP/2003 Partition Boot Partition System Partition

Dynamic Disk (1) (2) (3) (4) Win2000/XP/2003 Volume Boot Volume System Volume (a) Simple Volume (b) Spanned Volume (c) Stripe Volume (d) Mirror Volume (e) RAID-5 Volume

Basic to Dynamic Disk Convert Minimum 1MB of free space Start :- Run :- Compmgmt.msc :Computer Management [-] System Tools [+]Event Viewer [+]Shared Folder [+]Local User And Group [+]Performance Logs and Alerts Device Manager [-] Storage [+]Removable Storage Disk Defragmenter

Disk Management
[+] Service and Application

Command :- Compmgmt.msc Basic Disk


(Right Click)

C:

D:

Unattended

~ 28 ~
Right Click:Convert Dynamic Disk :Disk Drive:Convert :Restart Simple Volume :- Used to Create a Simple Volume a single Dynamic Disk. It can be extended. Spanned Volume: - Used to Create a Spanned Volume on 2 to 32 Hard disk (Dynamic Disk) data store frequently on a disk. It cannot support fault tolerance it increase the disk space but not this performance. It can be also extended. Stripe Volume: - Minimum 2 to 32 Hard disk. Data stores sequence on a stripe. It increase the disk performance but cannot support fault tolerance. It can not be extended. It is also known as RAID-0 (Redundant Array Inexpensive Disk-0). Mirror Volume :- Minimum 2 to 32 Hard disk. It automatically copy the data from one Hard disk to another Hard disk (Image). It support full fault tolerance with operating system. It can not improve the disk performance 50% is off disk space useless unless fault access. RAID-5 :- Minimum 3 to 32 Hard disk. Data store sequence on a stripe set with parity. It support fault tolerance and improve the disk performance. 33% of disk space is useless.

Printer Manage
There are two type of Printer. (1) Local Printer (2) Network Printer (1) Local Printer :- Directly Connected on P.C. (2) Network Printer:- Connected through other P.C. directly connected on hub/switch. Printer Device :- It is a physical component which is used to print the hard copy of data. Printer :- It is a software drive of print device, which is used to communicate between P.C. (Operating system) and print device. It is different for different print device. Print Pooling:- It is a one or more INF File, which is used to convert the print command into a proper format that accept the print device.

P.C.

P.C.

P.C.

P.C.

P.C.

~ 29 ~

HP DeskJet Driver :-

Properties :- Port :- [] Enable Pooling. Hub/ Switch

Printer

Printer Printer Manufacture & Model Print Queue :- It Temporary Storage location on print sever that store the all printing document on Entire Network. Print Server:- The P.C. (Machine) which contain the printer driver. Step 1 :- Start :- Setting :- Printer :- Add Printer :- Next :- [] Local Print attach the computer :- Select One type:[] Select port (LPT) line printer terminal []Create a new port (Hub/Switch) :- Standard TCP/IP address :- IP address:- 192.168.0.10:Standard Jet Direct :Manufacture :- ---------HP Model No.:- DeskJet 465:Printer Name :-DeskJet465:- Shared As (HP DeskJet) :- Next :- Text Page:- Finish Start :- Run :- [\\192.168.0.10] Printer Security :[HP DeskJet645] :- Right Click :- Properties:- Security :- Add User & Group :- Set Permission:-

~ 30 ~
Allow Print Print Document Manage Printer [yes] [] [] Deny [] [] []

MBSA (Microsoft Base Line Security Analyses)


It is used to analyses the correct security patches of system tool in a Network. It is downloaded by Microsoft Website.

SUS (Software Update Services)


It is used to update the P.C. in Intra net threw SUS server. Requirement :- window 2000 server with service pack 2 / window 2003 server (1) IE [Internet Explorer] (2) IIS (3) RAM :- 1 GB (4) HDD :- 2 GB (100 MB for SUS Server) (5) Internet Connection (6) SUS :- It is download by Microsoft website (33MB) :- Install:- client :- window 2000SP-2 / XP-SP1, Window 2003

~ 31 ~

Third Paper
Code :- 70-291 (Network Infrastructure) 70-293 (Network Infrastructure Design)

N.I (Network Infrastructure)


(1) O.S.I (Open System Interconnection) (2) Sub Netting (3) DHCP (4) DNS (5) WINS (6) RAS & VPN (7) Radius (8) IP Security (9) Network Monitoring Tools (10)Certificate Server (11)NAT

~ 32 ~

Host
10000000 11000000 11100000 11110000 11111000 11111100 11111110 11111111

Subnet Mask 192.168.0.128 192.168.0.194 192.168.0.224 192.168.0.240 192.168.0.248 192.168.0.252 192.168.0.254 192.168.0.255

No. Of Sub network 2N 2 (21) 4 (22) 8 (23) 16 (24) 32 (25) 64 (26) X X

Block Size 2n 27 26 25 24 23 22 21 20

Host Per Network 2n-2 27-2 = 126 26-2 = 62 25-2 = 30 24-2 = 14 23-2 = 6 22-2 = 2 21-2 = 0 20-2 = 0

Sub Netting
The division of a large Network into a small Network is known as sub netting. It redoes the collision. It saves the IP Address. Class C:- Table (192 to 223) N:- No of Network (1 form) n :- No of Host (0 form)

For Ex:- I have to use 62-62 P.C. In 4 Sub Network.


Subnet Mask 192.168.10.0 192.168.10.64 192.168.10.128 192.168.10.192 Valid IP Address 192.168.10.1 To 192.168.10.65 To 192.168.10.129 To 192.168.10.192 To 192.168.10.62 192.168.10.126 192.168.10.190 192.168.10.254 Broadcast Address 192.168.10.63 192.168.10.127 192.168.10.191 192.168.10.255

~ 33 ~

Class B :- Table (128 to 191) N:- No of Network (1 form)

~ 34 ~
n :- No of Host (0 form)

Host 10000000,00000000 11000000,00000000 11100000,00000000 11110000,00000000 11111000,00000000 11111100,00000000 11111110,00000000 11111111,00000000 11111111,10000000 11111111,11000000 11111111,11100000 11111111,11110000 11111111,11111000 11111111,11111100 Host 11111111,11111110 11111111,11111111 10000000,00000000,00000000 11000000,00000000,00000000 11100000,00000000,00000000 11110000,00000000,00000000 11111000,00000000,00000000 11111100,00000000,00000000 11111110,00000000,00000000 11111111,00000000,00000000 11111111,10000000,00000000 11111111,11000000,00000000 11111111,11100000,00000000 11111111,11110000,00000000 11111111,11111000,00000000 11111111,11111100,00000000 11111111,11111110,00000000 11111111,11111111,00000000 11111111,11111111,10000000 11111111,11111111,11000000 11111111,11111111,11100000 11111111,11111111,11110000 11111111,11111111,11111000 11111111,11111111,11111100 11111111,11111111,11111110 11111111,11111111,11111111

Subnet Mask 255.255.128.0 255.255.192.0 255.255.224.0 255.255.240.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 Subnet Mask 255.255.255.254 255.255.255.255 255.128.0.0 255.192.0.0 255.224.0.0 255.240.0.0 255.248.0.0 255.252.0.0 255.254.0.0 255.255.0.0 255.255.128.0 255.255.192.0 255.255.224.0 255.255.240.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.254 255.255.255.255

No. of Sub network 2N 2 (21) 4 (22) 8 (23) 16 (24) 32 (25) 64 (26) 128 (27) 256 (28) 512 (29) 1024 (210) 2048 (211) 4096 (212) 8192 (213) 16384 of Sub(214) No. network N 32768 (215) 2 65536 (216)1) 2 (2 4 (22) 8 (23) 16 (24) 32 (25) 64 (26) 128 (27) 256 (28) 512 (29) 1024 (210) 2048 (211) 4096 (212) 8192 (213) 16384 (214) 32768 (215) 65536 (216) 131072 (217) 262144 (218) 524288 (219) 1048576 (220) 2097152 (221) 4194304 (222) 8388608 (223) 16777216 (224)

Block Size 2n 215 214 213 212 211 210 29 28 27 26 25 24 23 22Block Size 2n 21 20223 222 221 220 219 218 217 216 215 214 213 212 211 210 29 28 27 26 25 24 23 22 21 20

Host Per Network 2n-2 215-2 = 32766 214-2 = 16382 213-2 = 8190 212-2 = 4094 211-2 = 2046 210-2 = 1022 29-2 = 510 28-2 = 254 27-2 = 126 26-2 = 62 25-2 = 30 24-2 = 14 23-2 = 6 22Host Per Network 2n-2 -2 = 2 21-2 = 0 20223-2 = 8388606 -2 = 0 222-2 = 4194302 221-2 = 2097150 220-2 = 1048574 219-2 = 524286 218-2 = 262142 217-2 = 131070 216-2 = 65534 215-2 = 32766 214-2 = 16382 213-2 = 8190 212-2 = 4094 211-2 = 2046 210-2 = 1022 29-2 = 510 28-2 = 254 27-2 = 126 26-2 = 62 25-2 = 30 24-2 = 14 23-2 = 6 22-2 = 2 21-2 = 0 20-2 = 0

~ 35 ~

Class :- A :- Table (1 to 126) N:- No of Network (1 form) n :- No of Host (0 form)

DHCP (Dynamic Host Configuration Protocol)


It automatically provide the IP address to the client computer for a leave period. IP Address Configuration

Static
(1) Manually configure (2) May be IP Conflict or Bed configuration. (3) Administrative overload, when P.C. are frequently moved

Dynamic
(1) Automatically configure from DHCP Server. (2) No IP Conflict. (3) No Administrative overload.

~ 36 ~ (IP Lease Process)


(1) IP leaves request. (DHCP Discover Massage) :- The client machine send the broadcast massage to a network (Where is DHCP). (2) IP leaves Offer :- DHCP Server send the offer massage to client machine (Threw Mack Address) with own Identifier
DHCP

IP leaves Request IP leaves Offer Selection IP leaves Acknowledgement

Client

(3) IP leaves selection :- Client machine send the IP leaves selection to DHCP Server. (4) IP leaves Acknowledgement:- DHCP Server send the acknowledgement massage to client machine for a leaves period. IP Leave Renewal Process
Manually C:\> IP Config /Release C:\> IP Config /Renew Automatic Just after 50% of the leaves period client machine send the leaves renewal process to DHCP Server, Next 87.5% of the leaves period client machine send the leaves renewal process to DHCP Server is not renewal the client machine of then client release the IP address and send the Broadcast Massage.

If DHCP Server is not available, then client :Win95/98/NT IP:-0.0.0.0 APIPA (Automatic private IP Address) DHCP Server :Requirement :- Win 2000/2003 server O.S. (Static IP Address) Step 1 :- Start :- Setting :- Control Panel :- Add/Remove Program :- Add/Remove Window Component :- Network Services :- Details :- DHCP :- Next :- Finish Win XP/2000/2003 IP :- 169.254.X.X

~ 37 ~
Step 2 :- Start :- Run :- DHCPMGMT.MSC

Command :- DHCPMGMT.MSC
Start IP Address :---------------------------------------End IP Address :-----------------------------------------Length :-----Subnet Mask:-------

Step 3 :- Start :- Program :- Administrative Tools :- DHCP Right Click :- New Scope :- Next :Scope Name :-XYZ Description :- Optional Next :IP Address Range DHCP + Computer Name (Right Click) + +

Start

End IP Address Add

IP Exclusions :----Optional

Next :Lease Duration :- 8 Days (Default) :Yes, I want to configure these option now.:Yes, I want to configure this scope:Default Router (Default Gateway):IP Address :--Router Port :----

~ 38 ~
DNS Server (Computer Name Or IP Address):Regional :- Win Server or IP Address:Computer Name or IP Address:Yes, I want to active this scope :- Finish DHCP Computer Name Right click:- Authorize

On Client :TCP/IP Properties :[Click this] Obtain the IP Address automatically +Computer name + Address lease +Address Pool +Reservation (Right Click) +Scope Option

Right click :- New reservation :- Reservation name (XYZ) IP Address 192.168.0.45 Mac address:- Client PC OK

DHCP Relay Agent


Router :- It is a multiple broadcast domain device, which is used to connect two or more different network, it filter the BAD Broadcast (Unknown IP Address) of data or Broadcasting packet. HUB / Switch Router Hub / Switch

192.168.0.5 192.168.0.6

192.168.0.7

192.168.0.8

10.0.0.5

10.0.0.6

10.0.0.7

10.0.0.8

192.168.0.4

10.0.0.4

~ 39 ~

DHCP Relay Agent :It is routing & Remote Access protocol which is used to Relay the DHCP Client Broadcasting massage to the DHCP Server. As a Router (Multiple NIC / Static IP Address) Start :- Program :- Administrator Tools :- Routing & Remote Access Start :- Run :- RRASMGMT.MSC

Command :- RRASmgmt.msc
Computer name (Right Click) + +

Right click:- Configure Routing & Remote Access services :- Next:[] VPN [] RAS [] NAT [] Custom (Click this) :[] RAS [] VPN [] [] [] LAN Routing :- finish :- Yes DHCP Server =Static IP Address Scope 1 :- 192.168.0.200 to 220 Gateway :- 192.168.0.4 Scope 2 :- 10.0.0.200 to 220 Gateway :- 10.0.0.4 These Scope are in the Super Scope

~ 40 ~
System Router :- DHCP Relay Agent Start :- Run :- RRASmgmt.msc :+Computer Name + + IP Routing + + General :- Right click :-New routing Protocol :- DHCP Relay Agent :- OK + DHCP Agent (Right Click) :- New Interface

:- Local Area Connection :- 1 :- Local Area Connection :- 2 OK

ADD

To right click the DHCP Agent :- Properties :- DHCP Address Server :192.168.0.5 OK ADD

DHCP Database
% System Root % :- System 32 :- DHCP :- DHCP.MDB (Actual Database) J 50. Log J 50XXX .Log Res 1 . Log Res 2 . Log (Jetpack. Log file) (Renamed Log file 1 MB of each) Reserve File (1MB of each for emergency purpose)

Temp . EDB - Temporary File J 50 . CHK - Check Point Initially data is written on Jet pack . Log file & after committed the data is written on actual data base (DHCP.MLB) when log file full then it renamed as J 50XXX. Log. Check Point File :- Used to keep the track of committed database.

~ 41 ~
DHCP Server automatically take backup after each 60 Mints. Backup Data Base :Start :- Run :- DHCPmgmt.msc Comp. (192.168.0.4) + Add Pool + Add Loss + Reserve + + (Right Click)

Right Click :- Backup /Restore :-Windows :- System 32 :- DHCP :- Backup.

WINS [Window Internet Name Services]


It is also a naming convention, which is used to resolve Net Bios Name to IP Add. Computer Name
Wins Net Bios name (Flat name) 15 Character (No Special Character is used) (India) LM Host file DNS Fully Qualify Domain Name (FQDN) 255 Character (India.Pak.Com) Host file

(1)Net Bios Broad Casting :-

C:\> NBTSTST C C:\> NBTSTST R

(To see the Cache Table) (To Delete Cache Table)

~ 42 ~

(2)LM Host File :- It is a simple text editor which used to keep the track of computer name & its IP Address :% System Root % :- System 32 :- Drivers :- Etc :- LM Host.Txt

Win Setup
Step (1) :- Start :- Setting :- Control Penal :- Add/Remove Program:- Add/Remove Window Component :- Network Services :- Details :- Wins :- Next :- Finish Step (2) :- ON Client TCP/IP Properties :- Advanced :- Wins :- Add IP Address of Wins Server :- OK On Server :Start :- Run :- Winsmgmt.msc Computer +Active Registration (Right Click :- Find By Owner) + Replication Partner

Command :- Winsmgmt.Msc

Replication Partner :+Active Registration (Right Click :- Find By Owner) + Replication Partner Start :- Run :- Winsmgmt.msc Computer +Active Registration + Replication Partner (Right Click :- New Replication Partner)

:- IP Add (IP Add & Another Wins Server) 192.168.0.4 :- Add Data Path :- % System Root % :- System32 :- Wins.MDB (Actual Data base) J 50. Log (Jetpack. Log file)

~ 43 ~
J 50XXX .Log Res 1 . Log Res 2 . Log (Renamed Log file 1 MB of each) Reserve File (1MB of each for emergency purpose)

Temp . EDB - Temporary File J 50 . CHK - Check Point

DNS (Domain Name Services)


It is also a Naming Connection, Which is used to resolve the Host Name to IP Address & IP Address to Host Name.

Top-Level Domain

[] Root Domain
.UK

.MII

.Edu

. Com

.Nic .Gor

.IN

.US

3-Character (Organization Wise) .Com

2- Character (Country Wise)

Sub Domain

~ 44 ~

Yahoo.Co m

Rediff.Co m

Gmail.Co m

DNS Query
There are two part of DNS Query. (1) Recursive Query :- (DNS Client to DNS Server) (2) Iterative Query :- (One DNS Server to Another DNS Server)

(2) Iterative Query (3) .Com- IP Address

DNS
SERVER
Local DNS

ROOT DOMAIN TOP LEVEL


SUB DOMAIN
INTEL.COM

(4) Iterative Query (5) Intel IP Address (6) Iterative Query

~ 45 ~
(7) Resolve R E C U R S I V E INTEL.COM IP Address

ON CLIENT XP

C:\>IP Config /DisplyDNS (To saw the Resolver cache table Entry) C:\>IP Config /FlushDNS (To Delete cache table on Client) C:\>DNSCMD /clearcache (To delete the cache table on Server) Note :- Must be install the Support Tool

Zone
It is Logical Hierarchical contiguous Domain Single Name Space. DOMAIN FOREST

DOMAIN TREE

DOMAIN TREE

IT.Com D.C.

ITI.Com D.C.

MCSE.IT .COM

CCNA.IT. COM

GNIIT.ITI.CO M

IIT.ITI.CO M

~ 46 ~

ZONE
Forward Lookup (1)Contain the Information of Host Name to IP Address. (2) Host Name ----to-------IP Address Reverse Lookup (1)Contain the Information of IP Address to Host Name. (2) IP Address ---to------Host Name

Zone Type:On window NT:- (1) Primary Zone (2)Secondary Zone On Window 2000:(1)Standard Primary Zone (2)Standard Secondary Zone (3)Active Directory Integration On Window 2003 :(1)Standard Primary Zone:- (Contain the Read/Write copy of Zone Database) (2)standard Secondary Zone:- (Contain the Read only copy Primary Zone Database) (3)Stub Zone :- (Start of Authority Name Server) (4)Active Directory Integration :- (For Active Directory)

~ 47 ~

DNS Installation & Configuration


Step 1 :- Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window Component :- Network Services :- Details :- DNS :- Next :- Finish. Step 2 :- Start :- Run :- DNSmgmt.msc Or Start :- Program :- administrator Tools :- DNS :Computer Name +Forward Lookup Zone (Right Click) +Reverse Lookup Zone

Right Click :- New Zone :- Zone Type :[] Standard Primary (Click this) [] Standard Secondary [] Stub [] ADI (Active Directory Integration) (Click This) : - Zone Name Vikrant.com : - Zone File Name Vikrant.com.DNS (Click this) & [] Non Secure :- Next :- Finish

:-Allow Dynamic Update [] Secure

Computer Name +Forward Lookup Zone + Vikrant.com +Reverse Lookup Zone (Right Click)

Right click :- New Zone :- Zone Type [] Standard Primary (Click this) [] Standard Secondary [] Stub [] ADI (Active Directory Integration) (Click This) : - Zone Name 192.168.0 Network Address :- Zone File 0.168.192

~ 48 ~
Address in DNS :- Allow Dynamic Update [] Secure (Click this) & Non Secure :- Next :finish.

Computer Name +Forward Lookup Zone + Vikrant.com +Reverse Lookup Zone + 192.168.0.X

Zone Transfer
The Process of replicating one DNS to another DNS is Called Zone Transfer.

Computer Name +Forward Lookup Zone + Vikrant.com +Reverse Lookup Zone + 192.168.0.X

(Right Click)

Right click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Following DNS Server IP Address 192.168.0.6 Secondary IP Address :- Add :- Ok

Computer Name +Forward Lookup Zone + Vikrant.com +Reverse Lookup Zone + 192.168.0.X (Right Click)

Right Click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Follow DNS Server 192.168.0.6 IP Address Secondary Server DNS :- Add :- OK

~ 49 ~

Secondary Zone
Step 1 :- Install the DNS Start :- Setting :- Control Penal :- Add/Remove Program :- Add/Remove Window Component :- Network Services :- Details :- DNS :- Next :- Finish. Step 2 :- Start :- Run :- DNSmgmt.msc Computer Name +Forward Lookup Zone (Right Click) +Reverse Lookup Zone Right Click :- New Zone :- Zone Type:[] Standard Primary [] Standard Secondary (Click This) [] Stub [] ADI (Active Directory Integration) :- Zone Name :- Master DNS Vikrant.com 192.168.0.5 :Primary IP address :- Next :- Ok

Computer Name +Forward Lookup Zone + Vikrant.com +Reverse Lookup Zone (Right Click)

Same Processes

DNS Forwarder
It is process the which DNS client Query can forward from one DNS Server to another DNS Server.

~ 50 ~
Step 1 :- Start :- Run :- DNSmgmt.msc Computer name (Right Click) + Forward Lookup + vikrant.com +Reverse Lookup + 192.168.0.6 Right click :- Properties :- Forward :- Add public IP Address

202.56.215.6 202.56.230.6

Add Add

:- Apply :- ok

Resource Record
Host Record :- Contain the Host Name & its IP address Forward Lookup. PTR (Pointer Record) :- Contain the IP Address & its Host name in Reverse Lookup. SON (Start of Authority) :- Points the 1st Authorize DNS Server. NS (Name Server) :-------------------------------------------------------MX (Mail Exchange) :- Point the mail Server. Alias (C Name) :- Conical Name SRV (Server Record) :- Contain the Site, Domain & Protocol. Information. (1) (2) (3) (4) (5) Site TCP UDP Domain Forest

GUI :- Globule Unique Identifier IP :- Service Record is not created then :Step 1 :- % System Root % :- System 32 :- Config :Net logon.DNS Net logon.DNS Delete both file:- Then Stop & Start the DNS Server & Net Logon services.

~ 51 ~

DNS Database
Primary.DNS Secondry.DNS Active Direction Integration

Read / write only %System root% System32 :- DNS:DNS.MDB

Read only copy

DC %System Root% :- NTDS :NTDS.DIT :It contain 4 logical partition. (1) Scheme Partition (2) Configuration Partition (3) Domain Partition (4) Application Partition :- It contain DNS Database. [Both Domain Controller (DC&ADC) contain Read/ write copy of DNS database which is replicated threw AD replication process.

ADC

Trouble Shooting Of DNS


(1) (2) (3) (4) (5) C:\> NS Lookup IP Config / Flush DNS IP Config / Registeredes IP Config / Display DNS IP Config / Clear Cache

Start :- Run :- DNSmgmt.msc File Edit View Insert Tool Table Window Help

Computer name + Forward Lookup + Vikrant. Com + Reverse Lookup + 192.168.0.6

View :- Advanced

RAS (Remote Access Services)

~ 52 ~

Used to Connect two more P.C. through Dial-up Connection (Telephone Line). Telephone Line

PSTN (Public Switch Telephone Network)


PSTN (1)Carry Analog signal (2) Cannot Carry Voice/Data Simultaneously. (3) Slow (64 KBPS)

ISDN (Integrated Service Digital Network


ISDN (1) Carry Digital Signal (2) Can carry Voice/Data Simultaneously. (3)Fast:BSI (Basic Rate Interface) :- 128 KBPS PRI (Primary Rate Interface) :- 1.544 KBPS

Step 1 :- Install & Configure modem on both side. Step 2 :- On Server Step 3 :- Start :- Run :- RRASmgmt.msc :Step 4 :- Start :- Program :- Administrative Tools :- RRAS

Command :- RRASmgmt.msc
Computer name (Right click) +---+---+----

Right click :- Configure & enabling :- RRAS :- Next :- select the Dial Up/ VPN If you select the Dial up then next process Click the Dial up :- Next :- IP Address (To click the [*]Automatically Assign IP Address) :- if you are not click the automatically Assign ip Address then you are give the static IP Address:- next :- Finish Step 5 :- Start :- Run :- RRASmgmt.msc Right Click :- Properties :- Security :- Authentication Provider.

Computer name (Right click) +---+---+----

~ 53 ~

Window Authentication Radius Authentication

Authentication Method (1) PAP (Password Authentication Protocol) (2) SPAP (Shiva Password Authentication Protocol) Encrypted. (3) CHAP (Challenge Hand Shaking Authentication Protocol) Non Microsoft. (4) MSCHAP (Microsoft Challenge Hand Shaking Authentication Protocol) 95/98.NT. (5) MSCHAP-2 (----------------------------Version 2) 2000/XP/2003. (6) EAP (Extelcible Authentication Protocol) :- For Smart Card Authentication.
Step 6 :- Start :- Run dsa.msc :Open User Properties :- Dial Up :- Click The Allow Access& Click the Always Call Back Telephone No.------------. :- Apply :- OK ON Client Step 7 :- Start :- Setting :- Network Connection :- Create New Connection :- Click the Connect to MY Workplace :- Dial Up :- Connection Name XYZ :- Phone No. (Give the RAS Server Telephone No.) :- Next :- Next :- Finish

VPN (Virtual Private Network)


It is used to Connect the two remote network through Public Network (Internet) in a secure manner. ISI Internet

VPN Server

User Name :- Administrator Password :- ---------IP Address :- (Public IP Address) Tunnel Protocol :- (To Secure Data Connection) There are two part of Tunnel Protocol (1) PPTP :- (Point to Point Tunnel Protocol)

Client XP Internet ISI

~ 54 ~
(2) L2TP :- (Layer-2 Tunnel Protocol)
PPTP Provide Authentication Support Inter networking IP based 128 Client From VPN Client L2TP Provide Authentication & IP Security IP Based / Frame Relay / X.25 etc. 128 Client from VPN Client

RADIUS
Remote Authentication Dial in User Services. Also Known As IAS (Internet Authentication Services) Sometimes it is also known as AAA A:- Authentication A:- Authorization A:- Accounting RADIUS Server

RAS

RAS

RAS

VPN

VPN

VPN

Authorization Authentication RAS CLIENT RAS CLIENT RAS CLIENT VPN CLIENT VPN CLIENT Accounting VPN CLIENT

~ 55 ~
User Name: - --------Password :-----------Confirm Password:---------Radius Feature (1) Support Remote Access Policy (2) Win 2003 Standard Edition support 50 Radius client (3) Win 2003 Enterprise Edition, Then Unlimited Client Note :- If more then one RAS/VPN Sever then, use Radius Server for Authentication. IAS Server & RAS/VPN both are same (Domain/Workgroup). Step 1 :- Configuration of IAS:Step 2 :- Start :- Setting :- Control Penal :- Add/ Remove Program :- Add Remove Window Component :- Network Services :- Detail :- IAS :- Next :- Finish Step 3 :- Start :- program :- administrator tool :- IAS IAS + Radius Client (Right Click)

Right Click :- New Radius Client :- Friendly Name (XYZ) :- Client IP Address (RAS/VPN IP Address) Add:- Next :- Secret Key :- 12345, Confirm Key :- 12345 :- Next :- Finish. On RAS /VPN Server Client Start :- Run :- RRASmgmt.msc :Computer Name (Right Click) + + + Properties :- Security :-Authentication Provider Radius Authentication (Accounting Provider) :-------- Configure :--Server Name IP Address of Radius Server :Or

Secret Key (Click Change) :- Secret Key 12345, Confirm Key 12345 :- OK

~ 56 ~

NAT (Network Address Translation)


(Routing Protocol)
It is used to convert private IP Address to Public IP Address & Public To Private. IETF :- Internet Engineer Task Force. IP Address

Private Use in private Network =>10.X.X.X =>172.16.X.X =>192.168.X.X Step 1 :- Start :- Run :- RRASmgmt.msc Computer Name (Right Click)

Public Use in Public (Internet Network)

Right Click :- Confirm & Enable RRAS :- Next :- Click to Remote Access & NAT :- Create a New Domain :- Dial up Connection :- Next :- Interface Name (XYZ) by Default (Remote Router) :- Click to Connect Only Dial up / ISD Line. :- Select Modem :- Phone No. :- Airtel (172315) :- Router Proceed :- User Name :- Airtel (Register) :- Domain & Password is Optional :- Finish Start :- Run :- RRASmgmt.msc +Computer Name + Network Interface (Right Click) Right Click :- Remote Router :- Right Click :- Connect

~ 57 ~

[IP Secourity]
To Block Access IP Security Run :- Secpol.msc :- IP Security Policy :- Create Policy :- Name (XYZ) :- Next :- Next :Next :- Local N/W :- O.A. Active Directory default :- Next :- Yes :- Finish :- Add :- Next This shared role does not Specify :- 2 :- Internet does not access any body in my computer :next :- Local N/W :- O.A. Active Directory default (keyboard O.S. Protocol) :- Next :- Yes (Click) All Icm Traffic (Only one IP) :- Edit :- Add :- Next :- Next :- Next :- Next :- Finish This in [XXX name] In IP New Security Policy :- Right :- [click] Un Assign IN IP Client Run :- //192.168.0.32 Run :- Secpol.msc :- IP Security :- Right click :- All Task :- Export :- File Name (Vikrant). In Next PC Run :-//192.168.0.1 (Server) OK :- (Vikrant) :- Copy :- Desktop :- Paste :- Next, Run :- Secpol.msc :- IP Security :- All Task :-Import :- Desktop :- (Vikrant) :- New IP Security :- Right Click :- Assign & Un Assignly.

~ 58 ~

~ 59 ~

Code: - 70-294 70-297

5th & 6th PAPER

{Active Directory}
(1) It is a centralized database in Win 2000 / 2003 Server Operating System. That contains Network Object & Resources EX :- User Organization Unit Group Contacts Computer Shared Folder Printer Etc. (2) It automatically created, during the promotion of Server to D.C. by using DCPromo.exe Command . Active Directory :%System Root% :- NTDS :- NTDS.DIT (Actual Database File) : Edb.log :- Current log file :- 10 MB

~ 60 ~
Edb.001.log Edb002.log Renamed Log File :- 10 MB Res 1 .log Res 2 .log Reserve Log File :- 10 MB Edb.Chk :- Check Point file Temp.Cdb :- Temporary File

Initially information is written into current log file (Edb.log) & after connected it is written it actual database (NTDS.DIT) when current log file is full, then it rename as Edbxxx.log file. Reserve file is used for emergency purpose, when disk space is full. Check point file keeps the record of committed database.

{Benefit of Active Directory}


=>Centralized Database => Sociability => Extensible (Parent Root Domain) (Global Catalog Server) => Easley Manageable DOMAIN TREE => Recoverable (System State Data Backup) => DNS Integration It.com ADC

Parnell Domain DOMAIN TREE

IT.COM D.C.

NETTECH .COM

MCSE. IT, COM

CCNA. IT. COM

Forest

A.NET TECH. COM

B.NET TECH. COM

~ 61 ~

Forest :- Logical Grouping of Domain tree. Domain Tree :- It is a logical Hierarchical Cententiguous domain name space. Domain :- It is a logical Grouping of in a network (Forest) well at list one domain controllers are present. Domain Controller :- Window 2000/2003 Server machine which contains the active directory database. It is a physical component. Additional Domain Controller (ADC) :- Window 2000/2003 Server machine which contains the read write copy of database of main D.C. (Root Domain). It support whole tolerance. Member Server :- Win 2000/2003 Server machine which is a part of domain controller but does not contain active directory database. Parent Root Domain :- The First Domain Controller is known as Parent Root Domain. Which contains all 5 FSMO Roles (Flexible Single Master Operation). Global Catalog Server :- It contains the complete information of own domain and personal information of other Domain. By default the first domain controller Parent Root Domain is known as Global Catalog Server. But we are to create more then one Global Catalog Server. Schema :- The structure of Active Directory contains object classes and attribute classes. Schema of A.D. can be modified by user account which is a member of Domain Admin, Enterprise Admin, Schema Admin. By default Administrator of Parent Root Domain (GC Catalog Server) Can be modified the schema of active directory.

~ 62 ~

D.C.

A.D.C.

Start :- Program :- Administrative Tools :- A.D. Site & Services. Run :-

Dcsite.msc

A.D. Site & Server +Site +Default Site + Server +Comp1 + NTDS Setting (Properties) +Comp2 :--- [Click This] Global Catalog + NTDS Setting (Properties) :--- [Click This] Global Catalog

{Active Directory}
Requirement of Active Directory => Window 2000/ 2003 Server =>At least One NTFS VOL. =>TCP/IP Configure =>Administrative Control

{Active Directory Object}


Organization Unit (O.U.):- It is a logical component of Active Directory Basically it is container object, which contains Group User O.U. Contact Computer Printer Shared Folder Etc

~ 63 ~
Benefit Of O.U. :- => Group Policy =>Delegating Control =>Administrator & Management Right :- Assigned Directory to User and Group. Permission :- Assigned for local machine (Entire Network) or Domain. {Note :- Policy cannot Directory linked with user & Group}

{Group}
Creating Group :- Start :- Run :- Dsa.msc A.D. user & Group +India.com + Built-in + Computer + + + + User (Right Click) Right Click :- New :- Group :- Group Name :- XXX Group Scope [] Domain Local [] Global [] Universal Group Type [] Security [] Distribute Bution

Group Type:Security :- Right can be assign to this group. Distribution :- Right can not be Assign to this group. It is used for mailing purpose .

Group Scope:{1}Domain Local :- Open group membership Ex:- User of any domain in a forest can be member of this group. Limited resources access permission Ex:- Member of this group can assess the resources locally. {2}Global :- Limited group membership Ex. User of local Domain Controller can be member of this group.

~ 64 ~
Open Resources Access Permission Ex. Member of this group can access the resources is all domain controller in a forest. {3} Universal:- Open group member ship & Open resource Access Permission. Ex. Member of this group can access the resources in Entire forest & User of any domain controller can be member of this group.

Printer N1 It.com N2 Domain Local (XYZ) N1 N2 A1 A2 B1

A.it.com Global

B.it.com

A1 , A2

B1 , B2

Note :- Universal Security Group can not be created when domain function level raise to mixed mode it only create, when it is in native mode & Win 2003 mode. Domain Functional level :Mixed Mode :- Win NT / Win 2000 / Win 2003 Native Mode :- Win 2000 / Win 2003 Win 2003 Mode :- Win 2003 Start :- Run :- Dsa.msc +India.com (Right Click) + + +

~ 65 ~

Right click :- Raise Domain :- Funchal Level :- Current Mixed (Change the Native) :- Raise

Group (Built-in)

Local Group (Built-in) Container) Ex.:- Administrator Guest Backup Operator Replicator User N/W Configuration

Domain Group (User Ex. :- Domain Admin Enterprise Admin Main

Schema Admin Domain User Domain Computer Certificate Admin Etc

Note :- Built-in Local Group is automatically created when O.S. is installed & after DC Promo, some extra group are also created known domain group (User Container). Contacts (Object) :E-Mail Address & User, which is on other Domain controller. Ex. :- Yahoo.com / Rediff mail.com etc. Use in exchange server (Mailing Purpose) Computer (Object) :- It automatically created on domain controller, when we join the client machine to Domain. Printer (Object) :- It automatically published in active directory, when printer is installed . Share Folder (Object):- It can not be published in Active Directory. It can be manually configure in Active Directory. Start :- Run :- Dsa.msc A.D. User & Group + India.com +Built-in +Computer + User (Right Click) +

~ 66 ~

Right click:- New :- Shared Folder :- Name:- XXX Path :- \\192.168.0.0\\XXX :- Apply Ok

{FSMO ROLES}
FSMO (Flexible Single Master Operation) There are five FSMO Roles (1) Schema Master (2) Domain Naming Master (3) PDC Emulator (4) RID (5) Infrastructure Master

Forest Wide Roles Domain Wide Roles

By Default first Domain Controller in a forest contains all five roles, known as Global Catalog Server / Parent Root Domain. A.D.C. have No Roles C.D.C. contains Domain Wide Roles that is two roles. Schema Master :- It D.C. holding this role can music that schema of Active Directory be modified No Roles

It.Com D.C.

5 Roles

It.com A.D.C.

A.It.com C.D.C.

B.It.com C.D.C.

3 Roles

~ 67 ~
=>D.C. holding these Roles becomes unavailable then A.D. Schema cannot be modified. => Domain Naming Master :- D.C. Holding this Roles can ensure that addition of other D.C. in forest. => D.C. holding this Roles become unavailable then we cannot promote / D.C. mort other D.C. in forest. => PDC :- It act as a PDC for Win NT B.D.C. that is backward compatible.

NT

2000 XP

A.D.C.

D.C.

Use to perfected password update that is user logon Authentication due to bad password. Time Sanative It over write the G.P.O It is use to prevent the over write the G.P.O. RID (Relative Identifier ) Use to Address Role of user RID Use to prevent the duplication of user, when User move for one D.C. to another D.C. S.I.D.:- Domain ID + RID Some For All User in a Forest S.I.D. => C:/> whomi / user Global Unique of each user RID Infrastructure Master :- Use to provide the consistency of User Group membership => Use to up to date group membership information. => Global Catalog Server must not hold this Roles. Infrastructure Master can up to date User & Group membership from G.C. Server on same Domain Controller then it cannot work properly.

Unique to Each User

~ 68 ~ Viewing FSMO Roles Roles Schema Master Domain Naming Master PDC Emulator RID Infrastructure When Com.It.com Com.It.com Com.It.com Com.It.com Com.It.com

{Transferring FSMO Roles}


C:\> NTDSUTIL NTDSUTIL : Roles : Connection : Connect to Server Com.It.com :Quit : Transfer Schema Master : Transfer Domain Naming Master : Transfer PDC : Transfer RID : Transfer Infrastructure Master

Seizing FSMO Roles


(If D.C. is permanently not Active able ) NTDSUTIL : Roles : Connections : Connect to Server Comp.It.Com : Quit : Seafaring Schema Master : Seize Domain Naming Master : Seize PDC : Seize RID : Seize Infrastructure Master Ping Packet Internet Grapier

{Group Policy & Software Deployment Policy}

~ 69 ~

(1) Polices:- Set of rules based which can be linked or associated with [Domain, Site & O.U. (Computer User)]. (2) Rights :- Assigned to user & Group e.g. Allow logon locally. (3) Permission :- Object e.g. file & Folder, printer etc - Sharing Permission - NTFS Permission

{Policies}

Local Policy %System Root% System 32 (Group Policy) Local Security Policy

Active Directory Based Policy %System Root% Sys Vol Sys Vol vikrant.com Policies:- Domain Security Policy Scripts:- Domain Controller Security Policy

Command :- C:/> DCGPOFIX (Crack the Policy)


Software Deployment Assigning
=>Assigned Software Software automatically install. =>Software are can be assigned for both user & Computer. =>MSI:- Microsoft Installer Package can be Published & Assigned both. =>.ZAP:- ZAW Down level application package can be only published (User Only) =>.ZAP file is to be created

Publishing
=>Published packages are appeared in Add/Remove Program. =>Software can be published only for user not computer

Step1 :- Create a folder & Share with full control

~ 70 ~
e.g. C:- SFT (folder name) Step2 :- Copy all installation file from CD is C:\SFT. Folder Step3:- Open Ad Users & Computers Run :- Dsa.Msc

AD User & Computers +Vikrant.com + + + + Text + O.U. (Right Click) Right click :- Properties :- group Policy :- New :- Edit :-

+Computer Configuration + Software Setting +Software Installation :- New Policy //SRV1/SFT (Network Path) .MSI :- (Click This) Assigned :- Ok +Windows Setting +Administrative Template +User Configuration + Software Setting +Software Installation :- New Package :-//SRV1/SFT/ (Network Path) .MSI ;- (Click This) Published :- Ok + Window Setting + Administrative Template

Step 4 :- run :- GPUPDATE

/FORCE

(Refreshing Policy)

Note :- For Computer Based Policy, client machine must be restarted to affect the change (Policy) Published Non .MSI Package C :- SFT :- Setup.exe Open the Notepad and write this

~ 71 ~
[Application] Setup Command = \\SRV1\SFT\Setup.exe Display Version = 5.0 Friendly Name = Acrobat Reader Path: C:\ SFT (Save this file ) Fill Name :- ABC.ZAP File Type :- All File :- Ok

[Active Directory Sites & Services]


Site :- Logical Grouping of Domain Controller on the behalf of Physical or Network
Connectivity well Connected Server are to be Physical in same site. A Site may contain more then on Domain A Domain can have more then on Site Replication (Synchronous of Data Base)
Intra Site Replication Replication ON window in Site Inter Site Replication Replication between deferent Site

Server 1

Inter Site (Replication) Site Link

Server 4

Server 2 Intra Site

Server 3 Local Bridge Head Server

Server 5 Intra site

Server 6

(Intra Site Replication)

~ 72 ~
Active Directory Configuration is automatically created between different Server of the same site which is used for Replication. RPC (Remote Precede Call) is used as transportation protocol. Replication Timing () None () One per Hour (1 Hour) () Twice Per Hour (30Minite) () Four time Per Hour (15Minite) =>KCC (Knowledge Consistency Character) is used to create Replication Topology

(Inter Site Replication)


Benefits of Inter Site Replication (1) Database is automatically compressed is larger then 50KB in Inter site Replication. (2) Each Site must have at least on local Bridge server which reduces WAN Traffic. Site Link :- A logical connection between different site which is to be created manually. (1) IP Link :- IP Link is preferred is WAN connection is fast Reliable & Permanent. (2) SMTP Link :- SMTP Link can be used in if WAN connection is slow, Tempory & Non-Reliable.

[Logical Partition Of Active Directory]


NTDS.DIT is Logically divided into four partition (1) Schema :- Forest Wide Replication (2) Configuration :- Domain Wide Replication (3) Domain Partition :- Forest / Domain Wide Replication (4) Application :- e.g. :- DNS Database

Created Site & Site Link

Run :- DSsite.Msc
AD Site & Site Link

~ 73 ~
+ Site (Right Click :- Create New Site :- Bombay :- Ok) +Default First Site + Server + Comp 1 + Comp 2 + Bombay (Right Click & Move to Bombay) + Server + Comp 2 + Transports + IP (Right Click :- Create New IP Link :- Link Name :- ABC :- OK) +SMTP +Subnet :- Right Click :- Create New Subnet :Site :- Bombay Subnet 10.0.0.0 Address 255.0.0.0 ok

C:/> Repadmin / Synoll Manual Replication Monitoring replication Traffic Run :- Replmon

~ 74 ~

Paper

Exchange Server 2003


Topic (1) Installation Of Exchange Server 2003 (2) Creating Mail Box Of A User
a. b. c. d. Configuring Clients Outlook Express Microsoft Outlook 2003 Outlook Web Access

(3) Folders
a. b. c. d. e. Public Folder Personal Folder (PST) Private Folder Delegation Mail Box Rights

(4) Microsoft Exchange Information Store


a. Exchange Database b. Storage Group & Store

(5) Internet Mailing & SMTP Connection (6) Routing Group & Connector
a. Administrative Group

(7) Secure Massaging & Certificate Services (8) Front End / Back End Server (9) Disaster Recovery

~ 75 ~
a. Backup / Restore b. Recovery Of Deleted Mail Box c. Recovery Of Deleted Items

Benefits Of Exchange Server


(1) (2) (3) (4) (5) Security Customized Mail Box Setting Monitoring Massage Tracking Group Ware Etc

Mail Box :- Consists of Inbox Outbox Sent Item Deleted Item Drafts Etc

Exchange server

Slandered Edition :- Database Up To 16 GB Only :- Single Storage Group :- No Clustering

Enterprise Edition :- Unlimited Database :- Multiple Storage Group & Stores :- Clustering Services

Installation Of Exchange Server


Requirement (1) Window 2000 Server + Service Pack 3.0 or Higher

~ 76 ~
Window 2003 Server (2) Active Directory & DNS (Domain Controller) (3) IIS & ASP.NET Add / Remove Program :- Window Component :- Application Server :- Details :() ASP.NET (Click This) ()IIS :- Details:- (Click This) (Click This) (Click This) (Click This) (Click This) Click All

Exchange Client MAPI Client (Massaging Application POP3 Client (Post Office Protocol Version Programming Interface) 3.0)
Massages are not downloaded to the local disk of Massages are downloaded to the local disk (By machine. Default) e.g. Microsoft Outlook 2003 e.g. Outlook Express Microsoft Outlook Third Party Software Etc.

OWA (Outlook Web Access) :-HTTP Client


e.g. Internet Explorer

Different between Microsoft Outlook & Outlook Express Microsoft Outlook


:- Can be configured as MAPI or POP 3 Client :- Massage Recalling :- Global Address List :- Delegation :- On Line Voting :- Recovery of Deleted Mail Item :- Personal Folder :- Public Folder Additional Package Etc

Outlook Express
:- Cant be Configured as MAPI Client :- Built In Operating System

Creating Mail Box of a User


Start :- Run :- Dsa.msc

~ 77 ~
Administrator Tools :- A.D. User & Computer A.D. User & Computer +Built In +Domain Controller +Computers +User (Right Click) Right Click :- Create New User :- User Name :---------------------------------:Password :---------Confirm pass:-----

:- next :- Click This ()Create Exchange Mail Box :- Ok (Existing User) :- Select User Account :- Right Click :- Create Mail Box :- Next :- Ok

(1)OWA (Outlook web Access)


=> Outlook Web Access (HTTP Client) => Open Internet Explorer =>Http:\\192.168.0.0\Exchange :User: ------------Password: --------Ok

(2)Configuring Outlook Express (POP3 Client)


Step 1 :- Open Outlook Express Step 2 :- Tools :- Account :- Mail :- Display :- abc Name ::Email Address :- abc@vikrant.com

:-

Protocol :- POP3 Incoming Mail Server :- 192.168.0.1 Outgoing Mail Server :- 192.168.0.1

:Password :---:- OK

~ 78 ~

(3) Configuring Microsoft Outlook (MAPI Client)


Start :- Program :- Microsoft Office :- Microsoft Outlook :- Click This () Create New Mail Account :-

() Microsoft Exchange server (MAPI) () POP3 ()IMAP 4 ()HTTP ()Additional Server

:Exchange Server :- 192.168.0.1 Mail Box :- Administrator

:- Next :- OK

Net Meting Command :- CONF

{Folder}
Personal Folder :PST :- Personal Storage Type :- PST Folder can be Password Protected :- It is Created from MS-Outlook :- Default Size :- 2GB Creating .PST Folder :- Open Ms-Outlook

~ 79 ~
:- New :- Outlook Data.file :- PST :Folder Name :- My Folder Location :- --------------------------------Password :- ------------------------------:- OK

Public Folder ::- Public Folder is access to every on (By Default)


:- Can be created from Ms-Outlook also Creating Public Folder. :- Open Ms-Outlook

+Inbox +Outbox +Sent Item +Deleted Item +Public Folder (Right Click) :- Right Click :- New Folder :- e.g. Sales Report :- Ok

Private Folder (Mail Box) ::- Mail Box of a User is called Private Folder

Delegation :- Log on as User e.g. Abc :- Open Ms-Outlook :- Tools :- Option :Delegation :- Add User ::- Inbox :- Read :- Ok

Mail Box Right :- Log on as Administrator Onto to Server Machine :- Run :- Dsa.msc A.D. User & Computer View :- -----(Advanced Feature) +Vikrant.com + Built In + Computers + Domain Controller + User + Abc (Right Click) :-

~ 80 ~
Right Click :- Properties :Exchange Advanced Mail Box Right Add User :- XYZ [] Full Mail Box Access :- Ok :-

Installed Exchange Command C:\Exchange2003\Setup+I386\Setup.exe /Disasterrecovery

{Microsoft Exchange Database}

.edb
=> Rich Text massage

.stm
=> Streaming Media(Multimedia Massage)

C:- Program file :- Exchange Server (Exchsrver) :- MDB Data :Priv1.edb Private Folder Database Priv1.stm Pub1.edb Public Folder Database Pub1.stm E00.log Current Transaction log (5MB) E000001.log E000002.log Renamed Transaction log file (5MB) Res.log Res.log Reserved log file (5MB Each) => Initially massage are written into Transaction log file (e00.log) which of 5MB and later on committed to actual database. When this log file full then renamed as exxxxxx.log => There are two Reserved log file of 5MB. ESE :- Extensible Storage Engines

{Microsoft Exchange Information Store}

~ 81 ~

=> Is one of the Core Component of Exchange Server. => Basically this is a service which must be always running because this service manage Exchange Database. Storage Group :=> Is a logical container which consists of Mail Box & Public Folder. =>By default first storage is created during installation which contains only two stores ie on mail Box store & One Public store. But maximum we can have four storage Group & each store group can have max. five stores :- (Enterprise Edition Only)

{Creating Storage Group & Stores}


Start :- Program :- Microsoft Exchange :- System Manager

+First Organization + Server +Com1 + Protocol + Storage Group :- - - - Right Click :- Create New Storage Group :- Second + First Storage Group Storage Group :- Ok + Mail Box Store + Public Store + + + + + Second Storage Group : - - - Right Click :- Create New Mail Box Store :- First + First Storage Group Store :- Do You Went to Mount this Store :- Yes :- Ok

+First Organization + Server + Comp 1 + Connector :- Right Click :- Create SMTP Connector :Connector Name :- Vikrant Kumar Start :- Program :- Exchange Server :- System Manager :--- :- Comp 1 :- Server :Local Bridgehead Address Scope :- Domain :-* [] Click This Allow massage to be Replayed to these Domain :- Ok

{Internet Mailing & SMTP Connector}

~ 82 ~

+ Protocol + POP 3 + HTTP + SMTP +SMTP Virtual Server :- Delivery :- Advanced : External DNS Add :- 202.56.215.6 202.56.230.6 :- Ok

{Routing Group & Connectors}

~ 83 ~
Routing Group :- Logical of group of well connected server (Exchange) By Default, First Routing group is created which contains the entire server irrespective of their physically connectivity & Location.

Server 1 Server2 Server3 Connector

Routing Group 1# Local Bridgehead server

Routing Group 2# Local Bridgehead Server

# Each Routing Group must have at least one local bridgehead Server.

{Connector}
Logical Link or Connection between different routing groups.

Types of Connector :(1) RGC (Routing Group Connector) :- RGC is preferred if WAN connection is fast reliable & Permanent (a) Can not be used for Internet Mailing (b) Not Configurable (c) Uses either SMTP or RPC as Transportation Protocol (2) SMTP (Simple Mail Transfer Protocol) :-

~ 84 ~
(a) Can be used even if WAN connection is slow, Temporary & NonReliable. (b) Can be used for Internet Mailing also (c) Configurable (d) Uses SMTP as Transportation Protocol. (3) X.400 Connector :(a) Used for X.400 Based massaging Server. (b) Bandwidth less then 10kbps.

{Administrative Group}
Is a logical container which can contain. System Polices Routing Group Public Folder Benefits :(1) Management & Administration (2) Delegate Control

{Creating Routing Group & Connector}


Start :- program :- Microsoft Exchange :- System Manager:-

+First Organization :- Properties :() Display Routing Group (click this) () Display Administration group (Click this) + Routing Group :- Right Click :- Create New Routing Group :- Second Routing Group:- Ok

+ First Routing Group + Connector + Members :- Server 1 Server 2

Drag & Drop

+ Second Routing Group + Connector :- Right Click :- Create RGC or SMTP Connector + Member :- Server 2 Connector Name :- Vikrant Local Bridgehead Server :- Server 2

~ 85 ~

{Server Massaging & Certificate Services}


Step 1 :- Installing Certificate Service Start :- Setting :- Control Panel :- Add Remove Program :- Window Component :- () Certificate Service (Click This). :() Enterprise Root CA (Click this) () Enterprise Subordinate CA () Standalone Root CA () Standalone Subordinate CA :- CA Name :- Vikrant :- Next :- Ok Step 2 :Start :- Program :- Administrative Tools :- IIS

+Comp1 + Website + Default Web Site :- Properties :+ + + Properties :- Directory Security :Server Certificate :- () Create New Certificate (Click This) :- () Send Request to on line Certificate Authority (Click This) :- Next :- Next :- Next :- Ok

~ 86 ~

View Certificate :- Edit :() Use 128 Bit Encryption () Require SSC () Accept Client Requests :- OK + + + + Default Website :- Right Click :- STOP & START :- Service :- OK + +

{Front End / Back End Server}


Benefits :(1) Security (2) Single Uniform IP Address (3) Only Frontend Server will handle yhe request. (4) Frontend server can not have mail box.

Start :- Program :- Microsoft Exchange :- System Manager

+First Organization + Server + Comp 1 :- Properties :- () Click this This is My Front end Server :- Ok + Comp 2

~ 87 ~

{Trouble Shooting}
Backup:(1) System State Data Backup :Start :- NT Backup :- Advanced :Backup Restore ASR

() () () Backup System State Data :- Next :- Ok (Click this) (2) IIS :Start :- Program :- Administrative tools :- Internet Information Server :+Comp 1 :- Right Click :- All+Ask :- Backup / Restore :- File Name :- Vikrant :- Ok + + + %System Root% :- System 32 :- InetSRV meta Back:- Vikrant

~ 88 ~

(3) Exchange Data Backup :-

Offline Backup
=> Database is not checked for errors during Backup. => Renamed Transaction file are not automatically deleted even after the Backup. Backup Software Third Party Software e.g. VERITAS ARC Serue etc Built in NTBackup

Online Backup
=> Error checking is performed during Backup => Renamed transaction log file are automatically or incremental backup. Run :- NT Backup Backup :- () () Backup Selected File & Folder. () :+Microsoft Exchange server + Comp 1 + Ms-Information Store () First Storage Group (Click this) () Second Storage Group (Click This) :- Next :- OK

{Recovery}

~ 89 ~
Step 1 :- Install win 2003 Server with same computer Name & IP Address & component. Step 2 :- Install IIS & ASP.NET Step 3 :- Restore IIS Step 4 :- Restore System State Data Backup. Step 5 :- Insert Exchanged data base.

Run :- E:\setup\I386\Setup.exe/Disasterrecovery
Step 6 :- Restore Exchanged Database.

{Recovery of Deleted Mail Box}


=> By default Mail Box of a user is retained by Server for 30 Days (Box this could be 99999 days) Step 1 :- Create a User account with same name or different name :- But do not create Mail Box. Run :- DSA.MSC Create New User :User Name :- Vikrant Logon Name :- Vikrant :Password :-------------------------------:-

() Create Exchange Mail Box (Un Check this Option) :- OK Step 2 :Start :- Program :- Microsoft Exchange :- System Manager

+First Organization + Server + Comp 1 + Protocol + storage Group + Mail Box Store + Mail Box :- (Deleted Mail Box) (X.Abc) :- Right Click :- Reconnect :- Vikrant :- Ok

~ 90 ~

{Recovery of Deleted Mail Items}


=> By default deleted mail items are retained by SRV. For 7 Days (MAPI Client)

Tools
+ Inbox + Outbox + Drafts + Deleted :- Select this Folder + +

Recover deleted Mail Items :- select :- Deleted Mails :- Restore :- Ok

~ 91 ~
On Server Machine

System Manager + Mail Box Store :- Properties :- Limit :Keep Deleted Items :7 Days Keep Deleted Mail Box :- 30 Days

You might also like