Contents

Introduction

Who Should Use This Book?

What Will You Find Inside?

What’s New in This Edition

I UP FRONT: NETWORK PLANNING AND DESIGN CONCEPTS

1 A Short History of Computer Networking

2 Overview of Network Topologies

LAN Topologies

Bus Topology

Star Topology

Ring Topology

Mesh Topology

Hybrid Topologies

Shared and Nonshared Network Media Topologies

Bridged Versus Routed Topologies

Building and Campus Topologies

Connecting Network Segments Within a Building: The Backbone

Design Considerations in a Campus LAN Environment

Scalability

Redundancy

Multi-Tiered Network Topology

Scalability

Redundancy

Fault Tolerance

3 Network Design Strategies

Planning a Logical Network Design

Who Are Your Clients?

What Kinds of Services or Applications Will the Network Offer?

What Degree of Reliability Do I Require for Each Network Link?

Choosing a LAN Protocol

Planning and Design Components

Document Everything

Test, Test, and Then Test Some More

Creating Policies and Procedures for Network Usage

Providing Training for Technical Personnel

You Can’t Forget the Budget (or Can You?)

The Physical Network

Planning Resources

4 Upgrading Strategies and Project Management

Where Do You Start?

Determining When an Upgrade Is Necessary—The Evaluation Process

Determining User Requirements and Expectations

Maintaining Support for Legacy Applications

What Resources Are Needed for the Upgrade?

Planning an Upgrade

Documenting the Plan

Evaluating the Plan As It Applies to Corporate Policies and Procedures

Setting Goals

Scheduling Downtime

Milestones and Criteria

Back-Out Procedures

Testing the Plan

Evaluating Competing Products

The Pilot Project

Deployment

Team Personnel

Keeping Users Informed

Tracking Progress

User Training

Closing the Book—Documenting What Has Changed and Why

Other Considerations for Upgrading

5 Protecting the Network: Preventative Maintenance Techniques

Power Conditioning and Uninterruptible Power Supplies (UPSs)

Power Is Money

Advanced Configuration and Power Interface (ACPI) and Standalone UPS Systems

Network Devices

Network Monitoring

Server and Workstation Backups

Backup Media—Tape, Optical Storage, and Hard Disk

Backup Rotation Schedules

Off-Site Storage

Routine Maintenance

Building Redundancy into the Network

Recovery Planning

Justifying Preventative Maintenance

II Physical Networking Components

6 Wiring the Network—Cables, Connectors, Concentrators, and Other Network Components

Structured Wiring

The Work Area

The Backbone Cabling System Structure

The Horizontal Cabling System Structure

The Telecommunications Closet

Important Definitions

Physical Cable Types

Twisted-Pair Cabling

Coaxial Cables

Fiber-Optic Cables

Terminations and Connections

Crimping

Insulation Displacement Contact

Modular Jacks and Plugs

Modular Plug Pair Configurations

Common Outlet Configurations

Patch Panels

Terminating Fiber

Fiber-Optic Splicing

Fiber-Optic Patch Panels

General Considerations for Fiber-Optic Cabling

Small Form Factor Connectors (SFF)

Telecommunications Rooms

Open Office Cabling

Consolidation Points

General Horizontal Cabling Subsystem Specifications

Documenting and the Administration of the Installation

Records

Drawings

Work Orders

Reports

7 Network Interface Cards

Choosing a Hardware Bus Type

ISA

PCI

PCMCIA

CardBus

Different Cards, Different Speeds

Network Cable Connectors and Terminators

The Wired for Management (WfM) Initiative

Universal Network Boot

Asset Management

Power Management

Remote Wake-Up

Should You Enable WOL?

Multi-Homed Systems

Load Balancing and Dual-Redundant Network Controllers

Software Drivers

Packet Drivers

The Open Data-Link Interface (ODI)

The Network Driver Interface Specification (NDIS)

IRQs and I/O Ports

IRQs

Base I/O Ports

Troubleshooting Network Cards

Checking the NIC Configuration on Linux

Checking the LEDs—Activity and Link Lights

Running the Adapter’s Diagnostic Program

Configuration Conflicts

Checking the Computer’s Network Configuration

Preventative Steps to Take

8 Network Switches

How Switches Work

Segmenting the Collision Domain

Full-Duplex Ethernet Switches

Using Switches to Create a Collapsed Backbone

Switch Hardware Types

Cut-Through Switches

Store-and-Forward Switches

Layer 3 Switches

Putting a Switch in Your Home Office

Stackable and Chassis Switches

Switch Troubleshooting and Management

9 Virtual LANs

Virtual LANs and Network Topologies

Switching Based on Network Frames

Implicit and Explicit Tagging

Implicit Tagging

Explicit Tagging

MAC Address VLANs

Protocol Rule-Based VLANs

Using Explicit Tagging on the Network Backbone

IEEE Standards for Virtual LANs

What Kind of Switch Should You Buy?

10 Routers

What Routers Do

Hierarchical Network Organization

Providing Security

The Difference Between Routable Protocols and Routing Protocols

When Do You Need to Use a Router?

Growing LAN Sizes

Delegating Responsibility for Local Area Networks

Connecting Branch Offices

Using a Router to Protect Your Network—NAT and Packet Filtering

Router Ports and Connections

Configuring Routers

Router Chassis Types

Using Routers over Wide Area Networks (WANs)

Routers and the Internet

11 Network Attached Storage (NAS) and Storage Area Networks (SANs)

Local Versus Networked Storage Devices

Defining Network Attached Storage (NAS)

Defining a Storage Area Network (SAN)

Network Attached Storage

Network Appliances

NAS Protocols

NAS Capacity Limitations—Bandwidth and Storage

Storage Area Networks

SAN and NAS—Mix and Match

Using Fibre Channel as a Network Transport

Encoding Data on Fibre Channel Networks

Basic SANs: Arbitrated Loops

Initializing the Loop

Arbitrating for Loop Access

Using a Fabric Switched Topology for SANs

A Mixed Topology of Loops and Switches

IP SANs and iSCSI

What Kind of NAS or SAN Solution Should You Use?

III LOW-LEVEL NETWORK PROTOCOLS

12 The IEEE LAN/MAN Committee Networking Standards

What Is the LAN/MAN Committee?

IEEE 802: Overview and Architecture

IEEE 802.1: Bridging and Management

IEEE 802.2: Logical Link Control

IEEE 802.3: CSMA/CD Access Method

IEEE 802.4: Token-Passing Bus Access Method and IEEE 802.5: Token-Ring Access Method

IEEE 802.7: Recommended Practices for Broadband Local Area Networks

IEEE 802.10: Security

IEEE 802.11: Wireless

Obtaining the IEEE 802 Standards Documents Free

13 Ethernet: The Universal Standard

A Short History of Ethernet

Variations on a Theme: How Many Kinds of Ethernet Are There?

Collisions: What Are CSMA/CA and CSMA/CD?

The Backoff Algorithm

Defining the Collision Domain—Buses, Hubs, and Switches

Restrictions on Legacy Ethernet Topologies

Limiting Factors of Ethernet Technologies

Interconnecting Devices and Cable Segment Length

The 5-4-3 Rule

Using a Bus Topology

Using a Star Topology

Hybrid LAN Topologies

Tree

Hierarchical Star

Using a Backbone to Connect the Enterprise

Ethernet Frames

XEROX PARC Ethernet and Ethernet II

The 802.3 Standard

The 802.2 Logical Link Control (LLC) Standard

Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)

Fast Ethernet

Gigabit Ethernet

10Gigabit Ethernet (IEEE 802.3ae)

Ethernet Problems

Collision Rates

Collision Types

Sampling Intervals

Reducing Collisions

Ethernet Errors

Simple Error Detection

Bad FCS and Misaligned Frames

Short Frames (Runts)

Giant Frames and Jabber

Multiple Errors

Broadcast Storms

Monitoring Errors

IV Dedicated Connections and WAN Protocols

14 Dial-Up Connections

The Point-to-Point Protocol and the Serial Line Internet Protocol

The Serial Line Internet Protocol (SLIP)

The Point-to-Point Protocol (PPP)

Establishing a Link: The Link Control Protocol (LCP)

Network Control Protocols (NCPs)

Configuring a Windows XP Professional Client for Dial-Up

When Dial-Up Isn’t Fast Enough

15 Dedicated Connections

Leased Lines

The T-Carrier System

Fractional T1

Diagnosing Problems with T-Carrier Services

Asynchronous Transfer Mode (ATM)

ATM Frames

ATM Connections

The ATM Architecture Model (B-ISDN/ATM Model)

LAN Emulation (LANE)

ATM Service Categories

The Importance of Frame Relay and the X.25 Interface

The Frame Relay Header

Network Congestion Signaling

The Local Management Interface Signal Mechanism

Using Switched Virtual Circuits (SVCs)

Possible Problems Using Frame Relay

16 Digital Subscriber Lines (DSL) Technology

DSL and Cable Modems

Topological Differences Between Cable and DSL

A Quick Primer on the PSTN

xDSL

The Future of DSL

17 Using a Cable Modem

How Cable Modems Work

Providing IP Addresses to Cable Modems

First-Generation Cable Modem Systems

How Cable Modems Differ from xDSL Broadband Access

The Data Over Cable Service Interface Specification (DOCSIS)

Choosing Between Cable and DSL

V Wireless Networking Protocols

18 Introduction to Wireless Networking

Why Wireless Networks Have Proliferated

Access Points and Ad Hoc Networks

Ad Hoc Networks

Using an Access Point to Mediate Wireless Communications

Physical Transmission Technologies

Frequency Hopping Versus Spread Spectrum

The IEEE 802.11 Wireless Standard

The Physical Layer

The MAC Layer

Other Services Performed at the MAC Layer

Sources of Interference for Wireless Networks

19 IEEE 802.11b: Wi-Fi Pioneer

Components of an 802.11-Based Wireless Network

802.11b—First, But Fading Away

802.11b/g Channels

Proprietary Extensions to 802.11b

What to Look for in an Access Point

Distance Limitations

Firewalls

Access Points with VPN Support

Do You Need a Wireless Network?

Connecting the Wireless Network to a Wired LAN

Dual-Mode Access Points

Why Wi-Fi?

20 Faster Service: IEEE 802.11a

Overview of the IEEE 802.11a Standard

Interference from Consumer Devices

Increased Bandwidth in the 5GHz Band

802.11a Signal Modulation

802.11a Channels

Proprietary Extensions to 802.11a

Using Wireless Networking in Public Places

Security Concerns

Comparing 802.11a with 802.11b and 802.11g

21 The IEEE 802.11g Standard

Overview of the 802.11g Standard

Installing a Wireless-G Broadband Router

Installing and Configuring a Wireless Network Adapter

Using the Setup CD

Using the Windows XP Service Pack 2 Wireless Network Setup Wizard

Proprietary Extensions to the IEEE 802.11g Standard

Improving Network Performance with Dual-Band Wireless Technology

Which Wireless Protocol Should You Use?

22 Bluetooth Wireless Technology

The Bluetooth Special Interest Group (SIG)

General Overview of Bluetooth

Piconets and Scatternets

Piconets

Scatternets

Bluetooth Device Modes

SCO and ACL Links

SCO Links

ACL Links

Bluetooth Packets

What Are Bluetooth Profiles?

The Generic Access Profile

The Service Discovery Application Profile

The Cordless Telephony Profile and the Intercom Profile

The Serial Port Profile

The Headset Profile

The Dial-Up Networking Profile

Other Bluetooth Profiles

Bluetooth Is More Than a Wireless Communication Protocol

23 Security and Other Wireless Technologies

Instant Messaging and Consumer Devices

Comparing Mobile Information Devices

BlackBerry PDAs

Wireless Security

WEP

Wired Protected Access (WPA), WPA2, and 802.11i

How Well Do You Know Your Users?

Personal Area Networks (PANs)

VI Lan and Wan Network, Service, and Application Protocols

24 Overview of the TCP/IP Protocol Suite

TCP/IP and the OSI Reference Model

TCP/IP Is a Collection of Protocols, Services, and Applications

TCP/IP, IP, and UDP

Other Miscellaneous Protocols

The Internet Protocol (IP)

IP Is a Connectionless Transport Protocol

IP Is an Unacknowledged Protocol

IP Is an Unreliable Protocol

IP Provides the Address Space for the Network

Just What Does IP Do?

Examining IP Datagram Header Information

IP Addressing

The Address Resolution Protocol—Resolving IP Addresses to Hardware Addresses

Proxy ARP

RARP—The Reverse Address Resolution Protocol

The Transmission Control Protocol (TCP)

TCP Provides a Reliable Connection-Oriented Session

Examining TCP Header Information

TCP Sessions

TCP Session Security Issues

The User Datagram Protocol (UDP)

Examining UDP Header Information

Interaction Between UDP and ICMP

Ports, Services, and Applications

Well-Known Ports

Registered Ports

The Internet Control Message Protocol (ICMP)

ICMP Message Types

25 Basic TCP/IP Services and Applications

The File Transfer Protocol (FTP)

FTP Ports and Processes

Data Transfers

FTP Protocol Commands

Server Replies to FTP Commands

Using a Windows FTP Command-Line Client

Using Red Hat Linux FTP

Using the Red Hat Linux Command-Line FTP Client

The Trivial File Transfer Protocol (TFTP)

The Telnet Protocol

What Is a Network Virtual Terminal and NVT ASCII?

Telnet Protocol Commands and Option Negotiations

Telnet and Authentication

Using Telnet and FTP with a Firewall

The R-Utilities

How the Traditional R-Utilities Authorize Access to Your Network’s Resources

The rlogin Utility

Using rsh

Using rcp

Using rwho

Using ruptime

The Finger Utility

Other Services and Applications Built on the TCP/IP Suite

Secure Network Services

26 Internet Mail Protocols: POP3, SMTP, and IMAP

How SMTP Works

The SMTP Model

SMTP Service Extensions

SMTP Commands and Response Codes

SMTP Response Codes

Putting It All Together

The Post Office Protocol (POP3)

The AUTHORIZATION State

The TRANSACTION State

The UPDATE State

The Internet Message Access Protocol Version 4 (IMAP4)

Transport Protocols

Client Commands

System Flags

Retrieving the Message Header and Body of the Message

Data Formatting

The User’s Inbox and Other Mailbox Naming

Universal Commands

Other IMAP Commands

Non-Authenticated Commands

Authenticated Commands

27 Troubleshooting Tools for TCP/IP Networks

Checking the Host System’s Configuration First

Using hostname and Related Commands

Using ipconfig and ifconfig to Check Host Configurations

Using ping and tracert to Check Connectivity

The ping Command

The traceroute Command

The netstat and route Commands

The arp Command

The tcpdump Utility

The WinDump Utility

Using the nslookup Command to Troubleshoot Name Resolution Issues

Other Useful Commands

Using Network Connection Repair in Windows XP

28 BOOTP and Dynamic Host Configuration Protocol (DHCP)

What Is BOOTP?

Format of the BOOTP Packet

The BOOTP Request/Reply Mechanism

BOOTP Vendor-Specific Information Options

Downloading an Operating System

Taking BOOTP One Step Further: DHCP

The DHCP Packet Format and Additional Options

The DHCP Client/Server Exchange

Installing and Configuring a DHCP Server on Windows 2000/2003

Installing the DHCP Server Service on Windows 2000 or Server 2003

Authorizing the Server

Using the MMC Action Menu

Configuring the DHCP Server and Scope Options

Providing Support for BOOTP Clients

Enabling the DHCP Relay Agent

What Is a DHCP Cluster?

Considerations for Using DHCP in Large or Routed Environments

How DHCP Interacts with Microsoft’s Dynamic Domain Name Service (DNS)

Reservations and Exclusions

What Is APIPA?

Troubleshooting Microsoft DHCP

Managing Logging

Using DHCP with Red Hat Linux

The DHCP Server Daemon

The DHCP Relay Agent

Configuring a Router or WAP to Provide DHCP Services

Using MAC Address Filtering to Stop Unauthorized Users

29 Network Name Resolution

Hardware Versus Protocol Addresses

NetBIOS

The LMHOSTS File

Windows Internet Name Service

Installing and Configuring WINS on Windows 2000/2003 Servers

Managing the Windows 2000 WINS Server

Managing the Windows Server 2003 WINS Service

Using netsh Commands to Manage WINS

TCP/IP Names

The HOSTS File

Domain Name System

Configuring DNS Clients

Using nslookup

Dynamic DNS

Installing DNS on a Windows Server

Network Information Service

30 Using the Active Directory Service

Early Directory Technologies

The Difference Between the Directory and the Directory Service

Interesting Objects

What Active Directory Delivers

Evolution of Directory Services from X.500 to LDAP

The Active Directory Schema

Objects and Attributes

Standard Objects in the Active Directory

What Is a Domain Tree? What Is a Forest?

Domain Models—May They Rest in Peace

Partitioning the Active Directory into Domains

A Domain Is Still a Domain

Active Directory Trees and Forests

The Active Directory and Dynamic DNS

Dynamic DNS

How the Active Directory Uses DNS

Using Sites to Manage Large Enterprises

Directory Replication

Summarizing the Directory Data Using the Global Catalog

Active Directory Service Interfaces (ADSI)

Directory-Aware Application Programming

Now It’s Just Domain Controllers and Member Servers

The Active Directory Schema

Modifying the Active Directory Schema

Finding Objects in the Active Directory

Finding a User Account

Finding a Printer in the Active Directory

Using Start/Search

The Active Directory Service and Windows Server 2003

New Active Directory Features in Windows Server 2003

Installing Active Directory on a Windows Server 2003 Computer

31 File Server Protocols

Why File Server Protocols are Important

Server Message Block (SMB) and the Common Internet File System (CIFS)

SMB Message Types

SMB Security Provisions

Protocol Negotiation and Session Setup

Accessing Files

Using NET Commands

Monitoring and Troubleshooting SMB Communications

Using the SMB/CIFS Protocol on Non-Microsoft Clients: Samba

The Common Internet File System (CIFS)

NetWare Core Protocol (NCP)

General Requests and Responses

Burst Mode

Request Being Processed Response

Terminating Connections

Unix Network File System (NFS)

Protocol Components: Remote Procedure Call (RPC) Protocol

External Data Representation (XDR)

The NFS Protocol and Mount Protocol

Configuring NFS Servers and Clients

NFS Client Daemons

Server-Side Daemons

Troubleshooting NFS Problems

Microsoft Distributed File System (DFS)

Creating a DFS Root

Adding Links to the DFS Root

32 The Hypertext Transfer Protocol

The Beginning of HTTP

Defining HTTP

HTTP Mechanics

HTTP Header Fields

URLs, URIs, and URNs

33 Routing Protocols

Basic Types of Routing Protocols

The Routing Information Protocol (RIP)

OSPF (Open Shortest Path First)

Multi-Protocol Label Switching (MPLS)

Combining Routing and Switching

Adding a Label

Using Frame Relay and ATM with MPLS

34 The Secure Sockets Layer (SSL) Protocol

Symmetric and Asymmetric Encryption

Digital Certificates

The SSL Handshake Procedure

Using Information in the Digital Certificate to Prevent Interception Attacks

http:// and https://

Adding Another Layer to the Network Protocol Stack

Does SSL Provide Enough Security for Internet Transactions?

OpenSource SSL

35 Introduction to the IPv6 Protocol

What’s the Difference Between IPv4 and IPv6?

The IPv6 Headers

IPv6 Extension Headers

The Options Type Field for Hop-by-Hop and Destination Options

Other IPv6 Considerations

The Future of IPv6

VII Network User and Resource Management

36 Windows NT Domains

Workgroups and Domains

Interdomain Trust Relationships

Domain Controllers

Windows NT Domain Models

Windows NT User Groups

Built-In User Groups

Creating User Groups

Special User Groups

Managing User Accounts

Adding a User to a Group

User Profiles

Limiting the Time a User Can Log On

Limiting Which Workstations a User Can Log On To

Account Information

Allowing Dial-Up Access

Replication Between Domain Controllers

Passwords and Policies

Detecting Failed Logon Attempts

Strategies to Minimize Logon Problems

37 Windows 2000 and Windows Server 2003 User and Computer Management Utilities

The Microsoft Management Console

User Management

Creating a New User Domain in the Active Directory

Managing Other User Account Information

Using the Action Menu

Computer Management

Adding a Computer to the Domain

Managing Other Computer Account Information

Windows 2000 User Groups

Choosing a Group Based on the Group’s Scope

Built-In Groups

Creating a New User Group

Other Things You Can Do with the Active Directory Computers and Users Snap-In

38 Managing Unix and Linux Users

User Administration

The /etc/passwd File

Using a Shadow Password File

The /etc/groups File

Adding or Removing User Accounts

Using a Linux GUI Utility to Manage Users

Network Information Service (NIS)

Master and Slave NIS Servers

NIS Maps

The NIS Server ypserve Daemon and Maps Location

Setting the NIS Domain Name Using the Command domainname

Starting NIS: ypinit, ypserve, and ypxfrd

NIS Slaves

Changing NIS Maps

Pushing Modifications to NIS Slave Servers

Other Useful NIS YP Commands

NIS Clients

Common Login Problems

39 Rights and Permissions

User-Level and Share-Level Security

Microsoft Windows Share-Level Security

Assigning User Rights for Windows 2000, Server 2003, and XP

Managing User Password Policies

NTFS Standard and Special Permissions

Windows Permissions Are Cumulative

User Groups Make Managing User Rights Easier

User Groups in Windows 2000 and Server 2003

Active Directory Groups

NetWare

Trustees

File-System Rights

Object and Property Rights

Differences Between NDS and File-System and Directory Rights

Inheritance of Rights

The Everyone Group and the [Public] Group

Unix and Linux

Viewing File Permissions

SUID and SGID File Permissions

Using the su Command

40 Network Printing Protocols

Printing Protocols and Printing Languages

Using lpr/lpd and the TCP Stream Protocols

Data Link Control Protocol (DLC)

Internet Printing Protocol (IPP)

IPP Object Types

IPP Operations

What’s New in Version 1.1?

Where Can You Find IPP?

41 Print Servers

Unix/Linux Printing

The BSD Spooling System: lpr and lpd

The SVR4 Printing System

Configuring Windows Print Servers

Printers and Printing Devices

Installing and Configuring Printers on Windows Servers

Windows NT 4.0

Windows 2000 Server

Windows XP

Printing Under NetWare

Print Queue Object Properties

Printer Object Properties

Print Server Object Properties

PSERVER.NLM and NPRINTER.NLM

The NetWare 6.x iPrint Utility

Hardware-Based Print Servers—Print Server Appliances

VIII System and Network Security

42 Basic Security Measures Every Network Administrator Needs to Know

Policies and Procedures

Network Connection Policy

Acceptable Use Statement and Usage Guidelines

Escalation Procedures

What a Security Policy Should Include

Physical Security Measures

Locking the Door

Uninterruptible Power Supply (UPS)

Disposing of Hardware and Media in a Secure Manner

The Two Sides of Security

Before the Fact: Controlling Access

After the Fact: Auditing Use

Passwords

System Daemons and Services

Removing Dead Wood

Delegating Authority

User Accounts

Application Servers, Print Servers, and Web Servers

Don’t Forget About Firewalls

43 Auditing and Other Monitoring Measures

Unix and Linux Systems

Using syslog

System Log Files

Configuring Windows NT 4.0 Auditing Policies

Setting Up Events to Audit

Using the Windows NT 4.0 Event Viewer

Configuring Windows 2000 and Windows Server 2003 Auditing Policies

Enabling Auditing for Files and Folders

Enabling Auditing for Printers

Logging Shutdown and Startup Events with Windows 2003 Server

Using the Event Viewer

Auditing Windows XP Professional Computers

Novell Security

SYSCON and AUDITCON

NetWare Auditing Solutions

44 Security Issues for Wide Area Networks

You’ve Been Targeted!

Computer Viruses, Trojan Horses, and Other Destructive Programs

Trojan Horse Programs

Computer Viruses

How Infections Occur

Your Network Under Fire—Common Attacks

Denial-of-Service Attacks

Distributed Denial-of-Service Attacks

SYN Flooding

ICMP Redirects

The Ping of Death

Forged Email

Password Protection and SecurID and Smart Cards

Network Back Doors

Network Probes

Spoofing and Impersonation

If It’s Too Good to Be True, It Isn’t

Preventative Measures

Protecting Routers

The Network As Target

Protecting Host Computers—Encryption and Virus-Protection Software

Using Tripwire

User Awareness and Training

Staying on Top of Security Issues

45 Firewalls

What Is a Firewall?

Packet Filters

Filtering on IP Addresses

Filtering Based on Protocols

Filtering Based on Port Numbers

Intrusion Detection (Stateful Inspection)

Filtering Based on Applications

Windows Firewall Versus Third-Party Firewall Programs

Proxy Servers

Standard Proxy Applications

Impersonating the End User: Network Address Translation (NAT)

Advantages and Disadvantages of a Proxy Server

Hybrids

What to Expect from a Firewall

Inexpensive Firewalls for SOHO Environments

Hardware Solutions

Software Solutions

Using Both Hardware and Software Firewalls

How Do You Know That the Firewall Is Secure?

46 Virtual Private Networks (VPNs) and Tunneling

What Is a VPN?

The Mobile Workforce

Protocols, Protocols, and More Protocols!

IPSec Protocols

Internet Key Exchange (IKE)

The Authentication Header (AH)

Encapsulation Security Payload (ESP)

The Point-to-Point Tunneling Protocol (PPTP)

Layer Two Tunneling Protocol (L2TP)

L2TP Encapsulation

Creating a VPN Connection with Windows XP Professional

Setting Up and Using a VPN Connection in Windows XP

Troubleshooting a VPN Connection

Selecting a Router with VPN Support

47 Encryption Technology

Computers and Privacy

What Is Encryption?

Single-Key Encryption—Symmetric Encryption

Public-Key Encryption

RSA Public Key Cryptography

Digital Certificates

Pretty Good Privacy (PGP)

IX Troubleshooting Networks

48 Strategies for Troubleshooting Network Problems

A Documented Network Is Easier to Troubleshoot

Documentation and Maintenance—Keeping Things Up-to-Date

Problem-Solving Techniques

The Problem Resolution Cycle

Auditing the Network to Locate Problem Sources

Pitfalls of Troubleshooting

49 Network Testing and Analysis Tools

Basics: Testing Cables

Handheld Cable Checkers

Cable Testers

Bit Error Rate Testers (BERT)

Time Domain Reflectometers

Impedance

Setting a Pulse Width

Velocity

Network and Protocol Analyzers

Establishing a Baseline

Statistical Data

Protocol Decoding

Filtering

Software-Based Analyzers

Other Software LAN Analyzer Products

Hardware Analyzers

Simple Network Management Protocol (SNMP)

SNMP Primitives

Network Objects: The Management Information Base (MIB)

Proxy Agents

The Complex Road to SNMPv2 and SNMPv3

RMON

50 Troubleshooting Small Office and Home Office (SOHO) Networks

Power Problems

Computer Configuration Issues

Component Problems—You Can’t Get There from Here

Secure Those Cables!

Firewall Problems

Keeping Your Network Healthy

Wireless Networking Problems

When All Else Fails

X Upgrading Network Hardware

51 Upgrading Older Ethernet Networks

Upgrading from 10BASE-2 or 10BASE-T

Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T

Network Cables

Network Interface Card (NIC)

Network Cable Connectors

Bridges, Hubs, Repeaters, and Switches

Connecting Networks That Use Different Cables or Topologies

Other Possibilities

Upgrading the Network Backbone to Gigabit Ethernet

Using Gigabit Ethernet for High-End Servers

Gigabit Ethernet to the Desktop?

Gigabit Ethernet Can Cover the Distance

10 Gigabit Ethernet Is Becoming Economically Feasible

52 Upgrading from Bridges and Hubs to Routers and Switches

Growing Beyond a Small LAN

Segmenting the Network Can Improve Performance

Connecting Remote Locations

From Bridges to Routers

Network Protocol Issues

Network Addressing Issues

Other Router Management Issues

Using a Router to Segment the Network

Connecting to a Larger WAN or the Internet

From Bridges to Switches

53 Adding Wireless Networking to a LAN

Why Go Wireless?

Choosing Locations for Access Points

Security Issues

XI MIGRATION AND INTEGRATION

54 Migrating from NetWare to Windows 2000 or Windows 2003

Windows Protocols and Services

Client Services for NetWare (CSNW)

Gateway Services for NetWare (GSNW)

Microsoft’s Services for NetWare Version 5.0 (SFN)

Comparison of Windows Server and NetWare File Permission Rights

Installing File and Print Services for NetWare Version 5.0 (FPNW 5.0)

Microsoft Directory Synchronization Services (MSDSS)

File Migration Utility (FMU)

55 Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux

Windows Server Support for Unix Protocols and Utilities

TCP/IP

Telnet

The File Transfer Protocol

Managing the FTP Service on Windows Server 2003

The Dynamic Host Configuration Protocol and BOOTP

DNS

Applications

Microsoft Windows Services for Unix 3.5

Installing SFU 3.5

Network File System

The Korn Shell

Password Synchronization

User Name Mapping

New Telnet Server and Client

ActiveState ActivePerl 5.8

Samba

Sun Network Information System

56 Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP

Do You Need to Upgrade the Operating System or Applications?

Upgrading to Windows 2000 Server

Before You Begin

Windows NT Domain Controllers and Member Servers

Modeling the Directory Structure After Your Business Organization

Domains Are Partitions of the Active Directory

Migration Considerations: Centralized Versus Decentralized Management

Implementing a Migration to the Active Directory for Windows 2000

Start by Upgrading Primary Domain Controller

Adding Other Domains to the Active Directory

Upgrade the Master Domain First

Upgrade the BDCs Next

Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003

Hardware Requirements for a Windows Server 2003 Upgrade

The Application Compatibility Toolkit Application

What Role Will Your Server Perform?

An Example of Upgrading Windows 2000 Server to Windows Server 2003 Standard Edition

Should You Continue to Use Windows 2000 Professional or Move to Windows XP Professional?

Upgrading for SOHO Clients

57 Migration and Integration: NetWare, Unix, and Linux

Why Use Unix or Linux?

Key Differences Between Unix/Linux and NetWare

File Sharing

Printer Sharing

User Authentication

Moving User Accounts

Networking Protocols

Applications

Finding Linux Drivers for Hardware

Novell Open Enterprise Server

XII Appendixes

A Overview of the OSI Seven-Layer Networking Reference Model

It’s Only a Model!

Encapsulation

Physical Layer

Data Link Layer

Network Layer

Transport Layer

Session Layer

Presentation Layer

Application Layer

B Networking Glossary

C Internet Resources for Network Administrators

Standards Organizations

Network Hardware and Software Manufacturers

Wireless Networking

Security

D The Lightweight Directory Access Protocol

A Quick Introduction to LDAP

The X.500 Protocols and Standards

Acronyms, Acronyms, Acronyms!

The Schema

The Lightweight Directory Access Protocol

The LDAP Protocol

Binding to the Server

Searching the Database

Adding, Modifying, or Deleting Information in the Directory

Comparing Information in the Directory

LDAP Directories

Windows 2000 Server, Windows Server 2003, and NetWare Are Not the Only Choices You Have

Sticking to Standards: Interoperability Between Directories

E Introduction to Setting Up a SOHO Network

Assessing Your Requirements: What Do You Need?

Applications Drive Hardware Purchases

SOHO Network Topologies

Backup Solutions for a SOHO Network

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset