Microsoft Windows Server 2003 Deployment Kit [Electronic resources] : Deploying Network Services نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Microsoft Windows Server 2003 Deployment Kit [Electronic resources] : Deploying Network Services - نسخه متنی

Microsoft Corporation

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید

List of Figures

Chapter 1: Designing a TCP/IP Network

Figure 1.1: Designing a TCP/IP Network

Figure 1.2: Planning the IP-Based Infrastructure

Figure 1.3: Three-Tier Network Design Model

Figure 1.4: Developing a Routing Strategy

Figure 1.5: Designing an IP Addressing Scheme

Figure 1.6: Classful Routing Not Appropriate for Noncontiguous Subnets

Figure 1.7: Classless Routing Appropriate for Noncontiguous Subnets

Figure 1.8: Variable Length Subnetting of 131.107.106.0

Figure 1.9: Planning an IP Configuration Strategy

Figure 1.10: Planning IP Security

Figure 1.11: Perimeter Network Securing an Internal Network

Figure 1.12: Improving Availability

Figure 1.13: Planning IP Multicasting

Figure 1.14: IP Multicast Components

Figure 1.15: Introducing IPv6 on Your Network

Figure 1.16: Using 6to4 to Route IPv6 Packets

Figure 1.17: Using Link-Local ISATAP Addresses to Route IPv6 Packets on an IPv4 Network

Figure 1.18: Using 6to4 and ISATAP to Route IPv6 Packets Across the IPv4 Internet

Figure 1.19: Testing Your Network Design

Chapter 2: Deploying DHCP

Figure 2.1: Deploying DHCP

Figure 2.2: Designing Your DHCP Server

Figure 2.3: Subnets Configured to Use a DHCP Relay Agent

Figure 2.4: Split-Scope Configuration

Figure 2.5: Clustered DHCP Servers

Figure 2.6: Integrating DHCP with Other Services

Figure 2.7: Defining Scopes

Figure 2.8: Implementing Your DHCP Solution

Chapter 3: Deploying DNS

Figure 3.1: Deploying DNS

Figure 3.2: Examining Your Current Environment

Figure 3.3: Designing a DNS Namespace

Figure 3.4: Name Resolution in the Contoso Division

Figure 3.5: Conditional Forwarding in the Trey Research Division

Figure 3.6: Designing a DNS Server Infrastructure

Figure 3.7: Conditional Forwarding to an Off-Site Server

Figure 3.8: Designing DNS Zones

Figure 3.9: Configuring and Managing DNS Clients

Figure 3.10: Securing Your DNS Infrastructure

Figure 3.11: Integrating DNS with Other Windows Server 2003 Services

Figure 3.12: Implementing Windows Server 2003 DNS

Chapter 4: Deploying WINS

Figure 4.1: Deploying WINS

Figure 4.2: Building Your WINS Server Strategy

Figure 4.3: WINS Topology Pre-Clustering

Figure 4.4: WINS Topology Post-Clustering

Figure 4.5: Designing Your WINS Replication Strategy

Figure 4.6: WINS Replication in a Hub-and-Spoke Topology

Figure 4.7: Replication in a T Network Topology

Figure 4.8: Deploying WINS Over a Large Number of Branch Offices

Figure 4.9: Deploying WINS Over a Few Large Sites

Figure 4.10: Large-Scale WINS Deployment Using Hub Topology

Figure 4.11: Securing WINS During the Deployment Process

Figure 4.12: Integrating WINS During the Deployment Process

Figure 4.13: Implementing Your WINS Solution

Chapter 5: Deploying ISA Server

Figure 5.1: Deploying Your ISA Server

Figure 5.2: Determining the Role of ISA Server

Figure 5.3: ISA Server in Firewall Mode

Figure 5.4: ISA Server in Forward Cache Mode

Figure 5.5: ISA Server in Reverse Cache Mode

Figure 5.6: Evaluating Interoperability Issues

Figure 5.7: Running Other Services with ISA Server

Figure 5.8: Designing for High Availability

Figure 5.9: ISA Server Capacity Planning Process

Figure 5.10: DNS Round Robin

Figure 5.11: Securing the Design

Figure 5.12: Back-to-Back Perimeter Network

Figure 5.13: Three-Homed Perimeter Network

Figure 5.14: ISA Server in Extranets

Figure 5.15: Implementing Your ISA Server Solution

Figure 5.16: Details of Implementing Your ISA Server Solution

Chapter 6: Deploying IPSec

Figure 6.1: Deploying IPSec

Figure 6.2: Determining Your IPSec Needs

Figure 6.3: Filtering Packets by Using IPSec

Figure 6.4: Peer-to-Peer Security in IPSec

Figure 6.5: Using IPSec to Secure an Application Server

Figure 6.6: Gateway-to-Gateway Tunneling Between Sites

Figure 6.7: One Endpoint Does Not Support IPSec

Figure 6.8: Traffic Must Be Decrypted for Third-Party Firewall Inspection

Figure 6.9: Designing IPSec Policies

Figure 6.10: Assigning IPSec Policies

Figure 6.11: Deploying Your IPSec Solution

Chapter 7: Deploying IAS

Figure 7.1: Deploying IAS

Figure 7.2: IAS Architecture

Figure 7.3: Designing IAS

Figure 7.4: IAS Configured as a RADIUS Server

Figure 7.5: IAS Configured as a RADIUS Proxy at a Third-Party ISP

Figure 7.6: IAS as a RADIUS Proxy with Multiple Forests

Figure 7.7: Load Balancing

Figure 7.8: IAS Configured as Both a RADIUS Server and a RADIUS Proxy

Figure 7.9: Designing an Optimized IAS Solution

Figure 7.10: Creating a Remote Access Policy Strategy

Figure 7.11: Securing Your Remote Access Strategy

Figure 7.12: Implementing Your IAS Solution

Figure 7.13: Deploying IAS as a RADIUS Server

Figure 7.14: Deploying IAS as a RADIUS Proxy

Chapter 8: Deploying Dial-up and VPN Remote Access Servers

Figure 8.1: Deploying Dial-up and VPN Remote Access Servers

Figure 8.2: Choosing Dial-up or VPN

Figure 8.3: Dial-up Remote Access Design

Figure 8.4: VPN Remote Access Design

Figure 8.5: Designing a Remote Access Server Solution

Figure 8.6: Components of Network Access Quarantine Control for Remote Access

Figure 8.7: Deploying a VPN Remote Access Server Solution

Figure 8.8: Deploying a Dial-up Remote Access Server Solution

Chapter 9: Deploying Remote Access Clients Using Connection Manager

Figure 9.1: Deploying Connection Manager

Figure 9.2: Providing Connection Manager Phone Book Support

Figure 9.3: Customizing Connection Manager

Figure 9.4: Implementing Your Connection Manager Solution

Figure 9.5: Double-Dial Using RADIUS Proxy

Figure 9.6: Preparation for Running the CMAK Wizard— Component Profile

Figure 9.7: Preparation for Running the CMAK Wizard— Top-Level Profile (page 1)

Figure 9.8: Preparation for Running the CMAK Wizard— Top-Level Profile (page 2)

Figure 9.9: Preparation for Running the CMAK Wizard— Top-Level Profile (page 3)

Figure 9.10: Preparation for Running the CMAK Wizard— Top-Level Profile (page 4)

Figure 9.11: Preparation for Running the CMAK Wizard— Top-Level Profile (page 5)

Figure 9.12: Preparation for Running the CMAK Wizard— Top-Level Profile (page 6)

Figure 9.13: Preparation for Running the CMAK Wizard— Top-Level Profile (page 7)

Chapter 10: Connecting Remote Sites

Figure 10.1: Connecting Remote Sites

Figure 10.2: One-Way Initiated On-Demand Dial-up PPTP VPN Solution

Figure 10.3: Persistent Two-Way Initiated L2TP/IPSec VPN Solution

Figure 10.4: One-Way Initiated On-Demand Dial-up Solution

Figure 10.5: Choosing a Remote Site Connection Type

Figure 10.6: Choosing Security Features

Figure 10.7: Integrating the Remote Site Connection into Your Network

Figure 10.8: Preparing for Server Configuration

Figure 10.9: Deploying a Site-to-Site Connection

Figure 10.10: Deployment Tasks for a Site-to-Site Connection Worksheet

Chapter 11: Deploying a Wireless LAN

Figure 11.1: Deploying a Wireless LAN

Figure 11.2: Adapting the Network Infrastructure for a WLAN

Figure 11.3: Designing Your Wireless Network Access Solution

Figure 11.4: Channel Overlap for 802.11b APs in the United States

Figure 11.5: Example of 802.11b Channel Allocation

Figure 11.6: Example of a Public Space WLAN Infrastructure in an Airport

Figure 11.7: Implementing Your WLAN Test Environment

/ 146