Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Network

Administration

Practical Notes
NA-324
CIT GCT Bahawalpur
Jr, Instructor: Hafiz Usman Dilshad
Practical Network Administration NA-324

List of Practical Activities for


Network Administration
1. Configuring and Managing Network Devices
2. Setting up a LAN Network
3. Configuring Network Security
4. Setting up a Wireless Network
5. Network Troubleshooting
6. Configuring Network Services
7. Configuring Network Virtualization
8. Setting up Network Monitoring
9. Hard Disk Partition Management
10. Exploring Control Panel for Task Scheduling
11. Local Printer Creation and Sharing
12. User and Group Account Management
13. Audit Implementation
14. Account Policy and User Rights Management
15. User Profile Implementation
16. Active Directory Installation, Configuration and Maintenance
17. System Policy Configuration
18. Resource Sharing and Security
19. Setting File and Folder Permissions
20. Resource Access and Permission Problems Troubleshooting
21. DNS and WINS Installation, Configuration and Maintenance
22. TCP/IP Configuration
23. DHCP Configuration and Maintenance
24. IIS Installation with its services
25. RAS Installation and Configuration
26. NAT Services Configuration and Maintenance
27. Deploying and Managing Exchange Server 2010 / 2013
28. Configuring Mailbox Servers
29. Managing Recipient Objects
30. VPN Configuration and Maintenance

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

1. Configuring and Managing Network Devices: This practical activity involves


configuring and managing different network devices like routers, switches, firewalls,
and access points. Students can learn how to configure these devices and
troubleshoot issues that may arise.

a. Identify the network devices: The first step is to identify the network devices that
need to be configured and managed. This may include routers, switches, firewalls,
access points, or other devices.
b. Access the device's configuration interface: Once you have identified the devices,
you need to access their configuration interface. This is usually done through a web
browser or a command line interface.
c. Configure the device: Once you have access to the device's configuration interface,
you can start configuring it based on the network requirements. This may include
setting up IP addresses, configuring routing protocols, setting up security settings,
and more.
d. Test the configuration: After configuring the device, you should test the
configuration to ensure that it is working as expected. This may involve running
network connectivity tests, monitoring traffic, and checking for errors.
e. Troubleshoot issues: If any issues arise during the configuration or testing process,
you need to troubleshoot them to identify the root cause and fix the issue. This may
involve using network troubleshooting tools like ping, traceroute, or Wireshark.
f. Document the configuration: It's essential to document the configuration changes
that you have made to the network devices. This documentation can help you
troubleshoot issues in the future and help other network administrators understand
the network topology and configurations.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

2. Setting up a LAN Network: This activity involves setting up a Local Area Network
(LAN) network, configuring IP addresses, and subnetting. Students can learn about
the different types of network topologies and how to create and manage them.

a. Plan the network topology: Before setting up a LAN network, it's essential to plan
the network topology. This includes identifying the network devices that will be
used, such as routers, switches, and access points, as well as the number of hosts
that will be connected to the network.
b. Configure the network devices: Once you have planned the network topology, you
need to configure the network devices. This includes configuring the IP addresses of
the devices, setting up routing protocols, and configuring security settings.
c. Connect the network devices: After configuring the network devices, you need to
connect them using Ethernet cables or wireless connections. You may also need to
set up VLANs or other network segmentation techniques to separate different parts
of the network.
d. Configure IP addresses: Once the devices are connected, you need to configure the
IP addresses for each device on the network. This includes assigning unique IP
addresses to each host and configuring the IP address of the default gateway.
e. Configure subnetting: To optimize network performance, you may want to use
subnetting to divide the network into smaller subnetworks. This involves dividing
the IP address space into smaller subnets and assigning IP addresses to hosts based
on their subnet.
f. Test the network: After setting up the LAN network and configuring IP addresses
and subnetting, you need to test the network to ensure that it is working correctly.
This may involve running network connectivity tests, monitoring traffic, and
checking for errors.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

3. Configuring Network Security: This activity involves configuring network security


settings like firewalls, VPNs, and intrusion detection systems. Students can learn
about the importance of network security and how to protect a network from
unauthorized access.

a. Identify network security requirements: The first step is to identify the network
security requirements. This includes understanding the network topology, the types
of devices and applications being used, and the potential threats that the network
may face.
b. Configure firewalls: The next step is to configure firewalls. This involves setting up
rules and policies to control traffic between different parts of the network and to
restrict access from unauthorized sources. This may include configuring network
address translation (NAT) and port forwarding rules, setting up virtual private
networks (VPNs), and configuring access control lists (ACLs).
c. Configure intrusion detection systems: After configuring firewalls, you should set
up intrusion detection systems (IDS). These systems monitor network traffic and
alert administrators if they detect suspicious activity. This may involve setting up
rules to monitor specific types of traffic, configuring thresholds for alerts, and
configuring responses to detected threats.
d. Secure network devices: It's also essential to secure individual network devices,
such as routers, switches, and access points. This may involve setting up secure
access protocols, disabling unused services and ports, and applying software
updates and patches.
e. Test network security: After configuring network security settings, you should test
the network to ensure that it is secure. This may involve running vulnerability scans,
penetration tests, and network intrusion tests.
f. Update network security policies: Network security policies should be reviewed and
updated regularly to ensure that they are effective against new threats. This may
involve reviewing logs and alerts, analyzing network traffic, and updating policies
and procedures.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

4. Setting up a Wireless Network: This activity involves setting up and configuring a


wireless network, managing access points, and configuring wireless security settings.
Students can learn about the different types of wireless networks and how to
manage them.

a. Plan the wireless network: Before setting up a wireless network, it's essential to plan
the network topology. This includes identifying the number of access points that will
be used, the coverage area of each access point, and the wireless security settings
that will be used.
b. Install and configure access points: Once you have planned the wireless network
topology, you need to install and configure the access points. This involves setting
up the access points to communicate with each other and to provide wireless
coverage for the network.
c. Configure wireless security settings: After installing and configuring the access
points, you need to configure the wireless security settings. This includes setting up
encryption protocols, configuring passwords, and setting up access control lists
(ACLs) to control access to the network.
d. Configure network settings: You also need to configure the network settings, such
as the SSID (service set identifier), channel settings, and IP addressing. You may also
need to set up VLANs or other network segmentation techniques to separate
different parts of the network.
e. Test the wireless network: After setting up the wireless network and configuring
wireless security and network settings, you need to test the network to ensure that
it is working correctly. This may involve running network connectivity tests,
monitoring traffic, and checking for errors.
f. Manage the wireless network: Once the wireless network is set up, you need to
manage it. This includes monitoring network performance, troubleshooting issues,
and updating firmware and software on the access points.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

5. Network Troubleshooting: This activity involves identifying and troubleshooting


network issues like slow network performance, connectivity issues, and DNS
problems. Students can learn about different network troubleshooting tools and
techniques.

a. Identify the problem: The first step in network troubleshooting is to identify the
problem. This may involve gathering information from users, reviewing network
logs, and monitoring network traffic.
b. Isolate the problem: Once you have identified the problem, the next step is to
isolate it. This involves determining which part of the network is causing the issue.
For example, the problem may be with a specific device, a network cable, or a
network switch.
c. Use network troubleshooting tools: After isolating the problem, you can use
network troubleshooting tools to diagnose the issue. This may include using tools
like ping, traceroute, and netstat to identify network connectivity issues.
d. Verify network settings: You should also verify the network settings, such as IP
addresses, subnet masks, and default gateways, to ensure that they are configured
correctly.
e. Check network hardware: You may also need to check network hardware, such as
network cables, switches, and routers, to ensure that they are working correctly.
f. Resolve the issue: Once you have identified the problem and diagnosed it using
troubleshooting tools and techniques, you need to resolve the issue. This may
involve replacing faulty network hardware, updating network settings, or installing
software updates.
g. Test the network: After resolving the issue, you should test the network to ensure
that it is working correctly. This may involve running network connectivity tests,
monitoring network traffic, and checking for errors.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

6. Configuring Network Services: This activity involves configuring network services


like DHCP, DNS, and FTP servers. Students can learn about the importance of these
services and how to manage them.

a. Identify the network services required: The first step in configuring network services
is to identify the services that are required. This may include services like DHCP,
DNS, and FTP servers.
b. Install and configure the server software: After identifying the required services, you
need to install and configure the server software on the appropriate server or
servers. This involves setting up the server software to provide the required services
and configuring the server settings.
c. Configure the server network settings: You also need to configure the network
settings on the server. This may involve configuring IP addresses, subnet masks, and
default gateways, as well as setting up DNS server settings.
d. Set up client configurations: Once the server is configured, you need to set up client
configurations to access the network services. This may involve configuring DHCP
client settings, setting up DNS client settings, or configuring FTP client settings.
e. Test the network services: After setting up the server and client configurations, you
need to test the network services to ensure that they are working correctly. This may
involve running tests on the DHCP, DNS, and FTP servers to ensure that they are
providing the required services.
f. Manage the network services: Once the network services are configured and tested,
you need to manage them. This involves monitoring the network services,
troubleshooting issues, and updating the server software and configurations as
needed.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

7. Configuring Network Virtualization: This activity involves configuring virtual


networks using technologies like virtual LANs (VLANs), virtual private networks
(VPNs), and virtual machines (VMs). Students can learn about the benefits of network
virtualization and how to set up virtual networks.

a. Identify the virtualization technology required: The first step in configuring network
virtualization is to identify the virtualization technology that is required. This may
include virtual LANs (VLANs), virtual private networks (VPNs), and virtual machines
(VMs).
b. Configure the virtualization software: After identifying the required virtualization
technology, you need to configure the virtualization software on the appropriate
servers. This involves setting up the virtualization software and configuring the
server settings.
c. Create virtual networks: Once the virtualization software is configured, you can
create virtual networks using the virtualization technology. This may involve creating
VLANs to segment the network, setting up VPNs to provide secure remote access,
or setting up virtual machines to run multiple operating systems.
d. Configure virtual network settings: You also need to configure the network settings
for the virtual networks. This may involve configuring IP addresses, subnet masks,
and default gateways for the virtual networks.
e. Test the virtual networks: After setting up the virtual networks, you need to test
them to ensure that they are working correctly. This may involve running network
connectivity tests, monitoring virtual network traffic, and checking for errors.
f. Manage the virtual networks: Once the virtual networks are configured and tested,
you need to manage them. This involves monitoring the virtual networks,
troubleshooting issues, and updating the virtualization software and configurations
as needed.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

8. Setting up Network Monitoring: This activity involves setting up network


monitoring tools like Wireshark, Nagios, and PRTG. Students can learn how to
monitor network traffic, identify network issues, and troubleshoot network problems.

a. Identify the network monitoring tools required: The first step in setting up network
monitoring is to identify the network monitoring tools that are required. This may
include tools like Wireshark, Nagios, and PRTG.
b. Install and configure the monitoring software: After identifying the required network
monitoring tools, you need to install and configure the monitoring software on the
appropriate servers. This involves setting up the monitoring software to collect
network data and configuring the server settings.
c. Configure the monitoring settings: You also need to configure the monitoring
settings on the monitoring software. This may involve configuring the types of data
to collect, setting up monitoring thresholds, and configuring alerting settings.
d. Monitor network traffic: Once the monitoring software is configured, you can start
monitoring network traffic. This involves collecting data on network traffic and
analyzing it to identify network issues.
e. Troubleshoot network issues: If network issues are identified, you need to
troubleshoot them. This may involve using the monitoring software to trace the
source of the issue, identifying the root cause of the problem, and implementing a
fix.
f. Manage the network monitoring: Once the network monitoring is set up, you need
to manage it. This involves monitoring the monitoring software, troubleshooting
issues, and updating the monitoring software and configurations as needed.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

9. Hard Disk Partition Management: Partitioning a hard disk involves dividing it into
one or more sections, each of which appears to the operating system as a separate
drive. There are several reasons why you might want to partition a hard disk.

a. Organizing Data
b. Running Multiple Operating Systems
c. Performance
Now, let's get into the practical steps of partitioning a hard disk.

a. First, you need to open the Disk Management tool. In Windows, you can do this by
right-clicking on the Start button and selecting "Disk Management" from the
context menu. In macOS, you can open the Disk Utility tool from the Applications
folder.
b. In Disk Management, you should see a list of all the disks connected to your
computer. Find the disk you want to partition and right-click on it. Select "Shrink
Volume" to create unallocated space on the disk.
c. Enter the amount of space you want to shrink the volume by, in MB (megabytes).
This will create unallocated space that you can use to create a new partition.
d. Right-click on the unallocated space and select "New Simple Volume". Follow the
prompts in the wizard to create a new partition. You can assign a drive letter, format
the partition, and choose whether to use it as a primary or logical partition.
e. Once you've created your partition(s), you can use them just like any other drive.
You can move files to and from them, install applications on them, and back them
up using your preferred backup software.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

10. Exploring Control Panel for Task Scheduling: Task scheduling in Windows allows
you to schedule tasks to run automatically at specified times or events. You can
schedule tasks to run programs, perform system maintenance, or run scripts, among
other things. Here are the steps to explore the Control Panel for task scheduling.

1. Click the Start button and type "Control Panel" in the search box. Click on "Control
Panel" to open it.
2. In the Control Panel, click on "System and Security".
3. Under "System and Security", click on "Administrative Tools".
4. In the Administrative Tools window, click on "Task Scheduler". This will open the
Task Scheduler window.
5. In the Task Scheduler window, you can explore the various tasks that are scheduled
on your computer. The tasks are organized into folders, and you can expand each
folder to see the individual tasks.
6. You can view the properties of a task by right-clicking on it and selecting
"Properties". This will open a window with tabs that allow you to view and edit the
task's properties, such as the trigger that starts the task, the actions it performs, and
the conditions that must be met for the task to run.
7. To create a new task, click on "Create Task" in the right-hand pane of the Task
Scheduler window. This will open a wizard that guides you through the process of
creating a new task.
8. In the wizard, you can choose the name, description, and security options for the
task, as well as the trigger that starts it, the actions it performs, and the conditions
that must be met for it to run.
9. Once you have created a task, it will appear in the Task Scheduler window, where
you can view and edit its properties or delete it if necessary.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

11. Local Printer Creation and Sharing: Following are the steps for sharing local Printer.

a. Click the Start button and go to "Settings" > "Devices" > "Printers & scanners".
b. Click on "Add a printer or scanner".
c. Select "The printer that I want isn't listed".
d. Select "Add a printer using a TCP/IP address or hostname" and enter the IP address
or hostname of the computer that the printer is connected to. Click "Next".
e. Windows will detect the printer and automatically install the driver.
f. Once the printer is installed, you can select it as the default printer or choose to
print a test page to make sure it is working properly.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

12. User and Group Account Management: Following are the steps for User and Group
Management.

a. Create a new user account: Use the appropriate tools and settings to create a new
user account. For example, on a Windows computer, you can use the Control Panel
to create a new user account.
b. Set a password: When creating a new user account, set a strong password to
protect the account. Use a combination of uppercase and lowercase letters,
numbers, and special characters. Avoid using easily guessable passwords such as
"password" or "123456".
c. Assign permissions and privileges: Determine what permissions and privileges the
user account should have. For example, you may want to grant read-only access to
certain files and folders or allow the user to install software. Use the appropriate
tools and settings to configure the permissions and privileges for the user account.
d. Create a new group: Use the appropriate tools and settings to create a new group.
For example, on a Windows computer, you can use the Computer Management
console to create a new group.
e. Add users to a group: Use the appropriate tools and settings to add a user to a
group. For example, on a Windows computer, you can use the Computer
Management console to add a user to a group.
f. Manage passwords: Set password policies and enforce strong passwords for user
accounts. For example, on a Windows computer, you can use the Local Security
Policy or Group Policy to set password policies.
g. Monitor user activity: Use appropriate tools and settings to monitor user activity
and detect potential security threats. For example, on a Windows computer, you can
use the Event Viewer to view security logs and audit user activity.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

13. Audit Implementation: Following are steps for Audit Implementation.

a. Determine the scope and objectives: Identify the specific areas of the system or
processes that need to be audited and define the objectives of the audit. This will
help you determine the appropriate audit procedures and tests to perform.
b. Develop an audit plan: Create a detailed audit plan that outlines the scope of the
audit, the audit objectives, the audit procedures, and the timeline for completing
the audit. This will help ensure that the audit is conducted in a systematic and
organized manner.
c. Collect and analyze data: Collect relevant data from various sources such as system
logs, financial records, or other documentation. Analyze the data to identify any
anomalies or irregularities that may indicate a potential security threat.
d. Conduct audit tests: Use appropriate audit procedures and tests to verify the
accuracy and completeness of the data. This may include performing a sample
review of financial transactions or testing the system's access controls.
e. Document findings: Document the findings of the audit, including any issues or
areas of concern that were identified. This will help you develop recommendations
for improving the system or processes to prevent future security threats.
f. Develop recommendations: Based on the findings of the audit, develop
recommendations for improving the system or processes. This may include
implementing new security controls, improving policies and procedures, or
providing additional training to employees.
g. Report results: Prepare a report summarizing the findings and recommendations of
the audit. Present the report to management and other stakeholders and discuss
any follow-up actions that need to be taken to address the issues identified during
the audit.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

14. Account Policy and User Rights Management: are some simple steps for practical
account policy and user rights management.

a. Define account policies: Determine the policies that will govern the use and
management of user accounts on the system. This may include password policies,
account lockout policies, and user permissions policies.
b. Configure account policy settings: Use the appropriate tools and settings to
configure the account policy settings on the system. For example, on a Windows
computer, you can use the Local Security Policy or Group Policy to configure
password policies, account lockout policies, and user permissions policies.
c. Assign user rights: Determine the user rights that are necessary for each user to
perform their job duties. This may include the right to log on locally, the right to
create and manage user accounts, or the right to install software.
d. Create security groups: Use the appropriate tools and settings to create security
groups that will be used to manage user rights and permissions on the system. For
example, on a Windows computer, you can use the Computer Management console
to create security groups.
e. Add users to security groups: Use the appropriate tools and settings to add users to
the appropriate security groups. For example, on a Windows computer, you can use
the Computer Management console to add users to security groups.
f. Monitor user rights and account activity: Use appropriate tools and settings to
monitor user rights and account activity on the system. This will help you detect any
potential security threats and prevent unauthorized access.
g. Review and update account policies and user rights regularly: Review and update
account policies and user rights regularly to ensure that they are up-to-date and
reflect the current needs of the organization. This may include adjusting password
policies or adding or removing user rights based on changes in the organization's
needs.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

15. User Profile Implementation: Following are some simple steps for implementing user
profiles in a practical setting.

1. Determine the user profile requirements: Identify the specific requirements for the
user profiles, such as the applications, settings, and data that need to be included in
each user profile.
2. Create user profiles: Use the appropriate tools and settings to create user profiles
on the system. For example, on a Windows computer, you can use the User Profile
Wizard tool to create user profiles.
3. Customize user profiles: Customize the user profiles to meet the specific needs of
the users. This may include setting up the desktop background, configuring
applications, or customizing settings.
4. Test user profiles: Test the user profiles to ensure that they are working correctly
and that all of the required settings and applications are included.
5. Deploy user profiles: Deploy the user profiles to the appropriate users or groups of
users. This may involve copying the user profiles to a network share or deploying
them using an automated deployment tool.
6. Manage user profiles: Monitor the user profiles to ensure that they are functioning
correctly and that they are meeting the needs of the users. This may involve
troubleshooting issues, updating user profiles as needed, or creating new user
profiles as new users join the organization.
7. Backup user profiles: Regularly backup the user profiles to prevent data loss or
corruption. This can be done using a variety of tools and methods, including system
backup tools, third-party backup software, or cloud backup services.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

16. Active Directory Installation, Configuration and Maintenance: Active Directory is a


Microsoft technology that provides centralized management of users, computers,
and other resources in a network. Here are some steps for installing, configuring,
and maintaining Active Directory.

a. Plan the installation: Determine the requirements for the Active Directory
environment, including the number of users and computers, the domain structure,
and the level of security needed.
b. Install Active Directory Domain Services (AD DS): Use the appropriate installation
media to install AD DS on the server that will host the Active Directory domain.
c. Configure the Active Directory domain: Use the Active Directory Domain Services
Configuration Wizard to configure the Active Directory domain, including the
domain name, forest name, and other settings.
d. Create user accounts: Use the Active Directory Users and Computers snap-in to
create user accounts for the users in the organization.
e. Create computer accounts: Use the Active Directory Users and Computers snap-in
to create computer accounts for the computers in the organization.
f. Organize resources into groups: Use the Active Directory Users and Computers
snap-in to organize users and computers into groups that reflect the structure and
needs of the organization.
g. Configure security settings: Use the Group Policy Management Console to configure
security settings for the domain, including password policies, account lockout
policies, and other security settings.
h. Monitor and maintain the Active Directory environment: Regularly monitor the
Active Directory environment to ensure that it is functioning correctly and take
appropriate action to address any issues that arise. This may include monitoring
event logs, testing backup and recovery procedures, and performing regular
maintenance tasks such as defragmenting Active Directory databases.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

17. System Policy Configuration: System policy configuration involves setting rules and
restrictions on a computer system to control user behavior and system
performance. Following are some steps for configuring system policies.

a. Determine the system policy requirements: Identify the specific requirements for the
system policies, such as the applications and system settings that need to be
included in each policy.
b. Access the Group Policy Editor: Use the appropriate tools and settings to access the
Group Policy Editor on the system. For example, on a Windows computer, you can
use the Local Group Policy Editor or Group Policy Management Console.
c. Create new policies: Create new policies or modify existing ones to meet the specific
needs of the system. This may include setting rules for specific users or groups,
restricting access to certain applications, or configuring specific settings.
d. Configure policy settings: Configure the policy settings to meet the specific
requirements of the system. This may include enabling or disabling features, setting
minimum and maximum values for certain settings, or controlling the behavior of
certain applications.
e. Test the policies: Test the policies to ensure that they are working correctly and that
all of the required settings and applications are included.
f. Deploy the policies: Deploy the policies to the appropriate users or groups of users.
This may involve linking the policies to specific organizational units or deploying
them using an automated deployment tool.
g. Monitor the policies: Monitor the policies to ensure that they are functioning
correctly and that they are meeting the needs of the system. This may involve
troubleshooting issues, updating policies as needed, or creating new policies as new
requirements arise.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

18. Resource Sharing and Security: Resource sharing and security involves setting up
access controls on a computer network to ensure that resources are only accessible
to authorized users or groups. Following are some steps for configuring resource
sharing and security.

a. Determine the resource sharing and security requirements: Identify the specific
requirements for the resource sharing and security, such as the files and folders that
need to be shared, the users or groups that need access to these resources, and the
level of security needed.
b. Set up file and folder sharing: Use the appropriate tools and settings to set up file
and folder sharing on the system. For example, on a Windows computer, you can
use the File and Printer Sharing option in the Network and Sharing Center.
c. Configure permissions: Use the appropriate tools and settings to configure
permissions on the shared resources. This may include setting read, write, and
execute permissions, and assigning these permissions to specific users or groups.
d. Set up password-protected sharing: Use the appropriate settings to set up
password-protected sharing on the system. This will require users to enter a
password to access shared resources.
e. Test the sharing and security: Test the sharing and security to ensure that it is
working correctly and that only authorized users or groups can access the shared
resources.
f. Monitor the sharing and security: Regularly monitor the sharing and security to
ensure that it is functioning correctly and take appropriate action to address any
issues that arise. This may include monitoring event logs, testing backup and
recovery procedures, and performing regular maintenance tasks such as
defragmenting hard drives.
g. Update and maintain the sharing and security: Regularly update and maintain the
sharing and security to ensure that it remains effective and efficient, and that it
meets the changing needs of the organization. This may include updating
permissions, creating new shares, or modifying security settings.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

19. Setting File and Folder Permissions: Setting file and folder permissions involves
controlling the level of access that users or groups have to specific files and folders
on a computer. Following are some steps for setting file and folder permissions.

a. Determine the permission requirements: Identify the specific requirements for the
file and folder permissions, such as the users or groups that need access to specific
files and folders, and the level of access they require.
b. Access the file or folder properties: Right-click on the file or folder and select
Properties from the context menu.
c. Navigate to the Security tab: Select the Security tab from the Properties dialog box.
d. Add users or groups: Click on the Edit button to modify the permission settings.
This will open the Permissions dialog box. Click on the Add button to add users or
groups to the list.
e. Set permission levels: In the Permissions dialog box, set the permission levels for
each user or group. This may include setting read, write, or execute permissions, as
well as denying certain permissions.
f. Test the permission settings: Test the permission settings to ensure that they are
working correctly and that the required users or groups have access to the files and
folders.
g. Monitor the permission settings: Regularly monitor the permission settings to
ensure that they are functioning correctly and take appropriate action to address
any issues that arise. This may include monitoring event logs, testing backup and
recovery procedures, and performing regular maintenance tasks such as
defragmenting hard drives.
h. Update and maintain the permission settings: Regularly update and maintain the
permission settings to ensure that they remain effective and efficient, and that they
meet the changing needs of the organization. This may include updating
permissions, creating new permissions, or modifying security settings.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

20. Resource Access and Permission Problems Troubleshooting: Troubleshooting resource


access and permission problems can be a complex process. Following are some
steps to help identify and resolve issues.

a. Identify the problem: Determine the specific resource access or permission problem
that needs to be resolved. This may involve identifying a particular file or folder that
users cannot access, or an error message that is displayed when attempting to
access a resource.
b. Check the permission settings: Review the permission settings for the resource in
question and ensure that the appropriate users or groups have the necessary access
levels.
c. Check group membership: Verify that users or groups attempting to access the
resource are members of the appropriate group or groups.
d. Check the network connection: Ensure that the network connection is working
correctly, and that the resource in question is accessible from the user's location.
e. Check the user account settings: Verify that the user account settings are correct,
and that the user has been granted the appropriate access permissions.
f. Test the access: Test the user's access to the resource and monitor any error
messages or other issues that may arise.
g. Analyze error messages: Analyze any error messages that are displayed and attempt
to resolve any issues that are identified.
h. Update and maintain the access and permission settings: Regularly update and
maintain the access and permission settings to ensure that they remain effective
and efficient, and that they meet the changing needs of the organization. This may
include updating permissions, creating new permissions, or modifying security
settings.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

21. DNS and WINS Installation, Configuration and Maintenance: DNS (Domain Name
System) and WINS (Windows Internet Name Service) are used to translate host
names into IP addresses, making it easier to access network resources. Following are
the steps to install, configure and maintain DNS and WINS on a Windows-based
system:

a. Install DNS and WINS: DNS and WINS are typically installed with the Windows
operating system. If they are not already installed, you can add them using the Add
or Remove Programs feature in the Control Panel.
b. Configure DNS and WINS settings: Once DNS and WINS are installed, configure the
settings according to the specific requirements of your network. This may include
setting the server’s name and IP address, specifying forwarders and root hints, and
configuring zones and records.
c. Create DNS and WINS records: Create DNS and WINS records for the resources on
your network, including hosts, servers, and services.
d. Test DNS and WINS functionality: Test the functionality of DNS and WINS by
attempting to access network resources using host names and checking the results
against the IP addresses.
e. Monitor DNS and WINS performance: Regularly monitor the performance of DNS
and WINS to ensure that they are functioning correctly and take appropriate action
to address any issues that arise.
f. Troubleshoot DNS and WINS issues: If there are any issues with DNS or WINS,
troubleshoot the issues using tools such as the Event Viewer, Network Monitor, and
the nslookup command.
g. Perform regular maintenance: Perform regular maintenance tasks, such as updating
DNS and WINS records, defragmenting hard drives, and monitoring event logs to
ensure that DNS and WINS remain effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

22. TCP/IP Configuration: TCP/IP (Transmission Control Protocol/Internet Protocol) is the


protocol used to connect devices to the internet and other networks. Following are
the steps to configure TCP/IP settings on a Windows-based system.

a. Open the Control Panel: Click on the Start menu, select Control Panel, and then click
on Network and Sharing Center.
b. Open the Network and Sharing Center: Click on Change adapter settings and then
right-click on the network adapter that you want to configure and select Properties.
c. Select Internet Protocol Version 4 (TCP/IPv4): Check the box next to Internet
Protocol Version 4 (TCP/IPv4) and click on Properties.
d. Configure IP address settings: Choose between obtaining an IP address
automatically or manually configuring an IP address. If you choose to manually
configure the IP address, enter the IP address, subnet mask, default gateway, and
DNS server addresses in the appropriate fields.
e. Configure advanced TCP/IP settings: Click on the Advanced button to configure
advanced TCP/IP settings, such as IP address conflicts, DNS suffixes, and IP version
preference.
f. Test the TCP/IP configuration: Test the TCP/IP configuration by attempting to
connect to network resources and checking the results.
g. Troubleshoot TCP/IP issues: If there are any issues with the TCP/IP configuration,
troubleshoot the issues using tools such as the Event Viewer, Network Monitor, and
the ipconfig command.
h. Perform regular maintenance: Perform regular maintenance tasks, such as updating
the TCP/IP configuration settings, monitoring event logs, and scanning for viruses
and malware to ensure that the TCP/IP configuration remains effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

23. DHCP Configuration and Maintenance: DHCP (Dynamic Host Configuration Protocol) is
used to automatically assign IP addresses to devices on a network. Following are the
steps to configure and maintain DHCP on a Windows-based system.

a. Install the DHCP server role: Use the Server Manager to add the DHCP server role to
your Windows-based system.
b. Configure DHCP settings: Configure the DHCP settings by specifying the scope,
lease duration, default gateway, DNS server, and other network settings.
c. Authorize the DHCP server: Authorize the DHCP server using the Active Directory
Users and Computers console to ensure that only authorized DHCP servers can
assign IP addresses on the network.
d. Configure DHCP options: Configure DHCP options, such as DHCP client options and
DHCP server options, to provide additional network information to clients.
e. Test DHCP functionality: Test the DHCP functionality by connecting a client device
to the network and verifying that it is assigned an IP address by the DHCP server.
f. Monitor DHCP performance: Monitor the performance of DHCP by reviewing event
logs and performance counters to ensure that DHCP is functioning correctly.
g. Troubleshoot DHCP issues: If there are any issues with DHCP, troubleshoot the
issues using tools such as the Event Viewer, Network Monitor, and the ipconfig
command.
h. Perform regular maintenance: Perform regular maintenance tasks, such as updating
DHCP settings, monitoring event logs, and scanning for viruses and malware to
ensure that DHCP remains effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

24. IIS Installation with its services: IIS (Internet Information Services) is a web server
software package that is used to host websites and web applications. Following are
the steps to install and configure IIS with its services on a Windows-based system.

a. Install IIS: Use the Server Manager to add the IIS server role to your Windows-based
system.
b. Configure website settings: Configure the website settings by specifying the website
name, directory location, IP address, port number, and other website settings.
c. Add website content: Add website content, such as HTML pages, images, and other
files, to the website directory.
d. Configure website authentication: Configure website authentication to ensure that
only authorized users can access the website content.
e. Configure website logging: Configure website logging to monitor website traffic
and performance.
f. Test website functionality: Test the website functionality by accessing the website
from a client device and verifying that it functions correctly.
g. Configure FTP services: Configure FTP services to allow users to upload and
download files to and from the website.
h. Configure SMTP services: Configure SMTP services to allow the website to send
email notifications to users.
i. Configure DNS settings: Configure DNS settings to ensure that the website is
accessible by domain name.
j. Configure SSL/TLS settings: Configure SSL/TLS settings to provide secure
communication between the website and client devices.
k. Monitor IIS performance: Monitor the performance of IIS by reviewing event logs
and performance counters to ensure that IIS is functioning correctly.
l. Troubleshoot IIS issues: If there are any issues with IIS, troubleshoot the issues using
tools such as the Event Viewer, Network Monitor, and the IIS Manager.
m. Perform regular maintenance: Perform regular maintenance tasks, such as updating
website content, monitoring event logs, and scanning for viruses and malware to
ensure that IIS remains effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

25. RAS Installation and Configuration: RAS (Remote Access Service) is a feature in
Windows-based systems that allows users to connect to a remote network or
computer from a different location. Following are the steps to install and configure
RAS on a Windows-based system.

a. Install RAS: Use the Server Manager to add the RAS server role to your Windows-
based system.
b. Configure RAS settings: Configure the RAS settings by specifying the type of
connection, such as VPN or dial-up, and the protocols to be used, such as PPTP or
L2TP.
c. Add user accounts: Add user accounts to the system and grant them access to the
RAS server.
d. Configure RAS authentication: Configure RAS authentication to ensure that only
authorized users can access the RAS server.
e. Configure RAS encryption: Configure RAS encryption to provide secure
communication between the remote client and the RAS server.
f. Test RAS functionality: Test the RAS functionality by connecting a remote client to
the RAS server and verifying that it functions correctly.
g. Monitor RAS performance: Monitor the performance of RAS by reviewing event logs
and performance counters to ensure that RAS is functioning correctly.
h. Troubleshoot RAS issues: If there are any issues with RAS, troubleshoot the issues
using tools such as the Event Viewer, Network Monitor, and the RAS Manager.
i. Perform regular maintenance: Perform regular maintenance tasks, such as updating
user accounts, monitoring event logs, and scanning for viruses and malware to
ensure that RAS remains effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

26. NAT Services Configuration and Maintenance: NAT (Network Address Translation) is a
service that allows multiple devices on a network to share a single public IP address.
Following are the steps to configure and maintain NAT services on a Windows-
based system.

a. Install the Routing and Remote Access Service: Use the Server Manager to add the
Routing and Remote Access Service role to your Windows-based system.
b. Configure NAT settings: Configure NAT settings by specifying the internal and
external network interfaces, the public IP address to be used, and the NAT protocol
to be used, such as TCP or UDP.
c. Add NAT rules: Add NAT rules to specify which devices on the internal network can
access the external network and how traffic will be routed between the two
networks.
d. Configure NAT logging: Configure NAT logging to monitor traffic between the
internal and external networks and to track usage and performance.
e. Test NAT functionality: Test NAT functionality by accessing the external network
from a device on the internal network and verifying that it functions correctly.
f. Monitor NAT performance: Monitor the performance of NAT by reviewing event
logs and performance counters to ensure that NAT is functioning correctly.
g. Troubleshoot NAT issues: If there are any issues with NAT, troubleshoot the issues
using tools such as the Event Viewer, Network Monitor, and the Routing and
Remote Access Service Manager.
h. Perform regular maintenance: Perform regular maintenance tasks, such as updating
NAT rules, monitoring event logs, and scanning for viruses and malware to ensure
that NAT remains effective and efficient.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

27. Deploying and Managing Exchange Server 2010 / 2013: Deploying and managing
Exchange Server 2010 / 2013 involves the following steps.

a. Planning: Determine the size of your organization and the number of users who will
be using Exchange Server. This will help you decide which edition of Exchange
Server is suitable for your organization.
b. System Requirements: Ensure that your server meets the system requirements for
Exchange Server.
c. Installation: Install Exchange Server 2010 / 2013 on your server and follow the on-
screen prompts to complete the installation process.
d. Configuration: Configure Exchange Server, including creating mailboxes, configuring
email addresses, and setting up email policies.
e. Migration: If you are upgrading from a previous version of Exchange Server, plan
and execute the migration to Exchange Server 2010 / 2013.
f. Management: Manage Exchange Server by monitoring performance, managing
storage, and managing recipients.
g. Security: Ensure that your Exchange Server is secure by configuring firewalls, setting
up SSL certificates, and configuring anti-malware and anti-spam protection.
h. Backups and Disaster Recovery: Create regular backups of your Exchange Server
data and implement a disaster recovery plan to minimize downtime in the event of
a system failure.
i. Updates and Patches: Stay up to date with the latest updates and patches for
Exchange Server to ensure that your system is secure and functioning optimally.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

28. Configuring Mailbox Servers: Configuring Mailbox Servers for Exchange Server
involves the following steps.

a. Plan for mailbox server deployment: Determine the size of your organization and
the number of users who will be using Exchange Server. This will help you decide
how many mailbox servers you will need and the appropriate configuration for each
server.
b. Install Exchange Server: Install Exchange Server on your server and configure it for
use as a mailbox server.
c. Configure mailbox databases: Create mailbox databases and configure database
settings, such as storage limits and mailbox retention settings.
d. Configure mailbox policies: Configure mailbox policies to enforce settings for
mailbox features such as archiving, retention, and mobile devices.
e. Manage mailbox permissions: Manage mailbox permissions to ensure that users
have the appropriate level of access to the mailboxes they need to use.
f. Monitor mailbox server performance: Monitor mailbox server performance to
identify and resolve issues that may affect mailbox access or performance.
g. Backup and recovery: Implement backup and recovery procedures for mailbox
databases to ensure that data is not lost in the event of a system failure.
h. Configure High Availability: Configure mailbox server high availability features, such
as database availability groups, to ensure that mailbox access is maintained in the
event of a server failure.
i. Configure message routing: Configure message routing settings to ensure that
messages are delivered correctly between mailbox servers and to external email
systems.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

29. Managing Recipient Objects: Managing recipient objects for Exchange Server involves
the following steps.

a. Create recipient objects: Create new recipient objects such as mailboxes, contacts,
and distribution groups in Exchange Server.
b. Modify recipient object properties: Modify recipient object properties such as
display name, email address, and storage limits.
c. Move recipient objects: Move recipient objects between mailbox databases, mailbox
servers, and Active Directory sites.
d. Delete recipient objects: Delete recipient objects that are no longer required.
e. Manage recipient object permissions: Configure mailbox permissions, such as access
rights and delegate permissions.
f. Manage distribution groups: Create and manage distribution groups to simplify the
process of sending emails to groups of users.
g. Manage address lists: Create and manage address lists to provide users with an
easy-to-use directory of recipient objects.
h. Manage resource mailboxes: Configure and manage resource mailboxes such as
conference rooms, equipment, and shared mailboxes.
i. Manage mail-enabled public folders: Create and manage mail-enabled public
folders to provide a way for users to share information and collaborate.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)
Practical Network Administration NA-324

30. VPN Configuration and Maintenance: Configuring and maintaining a VPN (Virtual
Private Network) involves the following steps.

a. Determine your VPN requirements: Decide what type of VPN you need based on
the size of your organization, the number of remote users, and the level of security
required.
b. Select a VPN technology: Choose the VPN technology that best meets your needs,
such as PPTP, L2TP, or SSL VPN.
c. Plan your VPN architecture: Design your VPN architecture, including the number
and location of VPN gateways and the addressing scheme to be used.
d. Configure VPN gateways: Configure VPN gateways at each end of the VPN
connection, including IP address and routing configuration.
e. Configure VPN clients: Install and configure VPN client software on remote user
devices.
f. Configure VPN authentication and authorization: Set up user authentication and
authorization mechanisms such as digital certificates, pre-shared keys, or user
credentials.
g. Test the VPN connection: Test the VPN connection to ensure that it is working
correctly and that remote users can access network resources.
h. Monitor VPN performance: Monitor VPN performance to identify and resolve issues
that may affect VPN connectivity or performance.
i. Update and maintain VPN infrastructure: Keep VPN software and hardware up to
date with the latest patches and updates to maintain the security and reliability of
the VPN.

Jr, Instructor: Usman Dilshad (CIT GCT Bwp) Zain Ul Abdin (ICT NUST)

You might also like