List of Figures
Chapter 1: Designing a TCP/IP NetworkFigure 1.1: Designing a TCP/IP NetworkFigure 1.2: Planning the IP-Based InfrastructureFigure 1.3: Three-Tier Network Design ModelFigure 1.4: Developing a Routing StrategyFigure 1.5: Designing an IP Addressing SchemeFigure 1.6: Classful Routing Not Appropriate for Noncontiguous SubnetsFigure 1.7: Classless Routing Appropriate for Noncontiguous SubnetsFigure 1.8: Variable Length Subnetting of 131.107.106.0Figure 1.9: Planning an IP Configuration StrategyFigure 1.10: Planning IP SecurityFigure 1.11: Perimeter Network Securing an Internal NetworkFigure 1.12: Improving AvailabilityFigure 1.13: Planning IP MulticastingFigure 1.14: IP Multicast ComponentsFigure 1.15: Introducing IPv6 on Your NetworkFigure 1.16: Using 6to4 to Route IPv6 PacketsFigure 1.17: Using Link-Local ISATAP Addresses to Route IPv6 Packets on an IPv4 NetworkFigure 1.18: Using 6to4 and ISATAP to Route IPv6 Packets Across the IPv4 InternetFigure 1.19: Testing Your Network DesignChapter 2: Deploying DHCP
Figure 2.1: Deploying DHCPFigure 2.2: Designing Your DHCP ServerFigure 2.3: Subnets Configured to Use a DHCP Relay AgentFigure 2.4: Split-Scope ConfigurationFigure 2.5: Clustered DHCP ServersFigure 2.6: Integrating DHCP with Other ServicesFigure 2.7: Defining ScopesFigure 2.8: Implementing Your DHCP SolutionChapter 3: Deploying DNS
Figure 3.1: Deploying DNSFigure 3.2: Examining Your Current EnvironmentFigure 3.3: Designing a DNS NamespaceFigure 3.4: Name Resolution in the Contoso DivisionFigure 3.5: Conditional Forwarding in the Trey Research DivisionFigure 3.6: Designing a DNS Server InfrastructureFigure 3.7: Conditional Forwarding to an Off-Site ServerFigure 3.8: Designing DNS ZonesFigure 3.9: Configuring and Managing DNS ClientsFigure 3.10: Securing Your DNS InfrastructureFigure 3.11: Integrating DNS with Other Windows Server 2003 ServicesFigure 3.12: Implementing Windows Server 2003 DNSChapter 4: Deploying WINS
Figure 4.1: Deploying WINSFigure 4.2: Building Your WINS Server StrategyFigure 4.3: WINS Topology Pre-ClusteringFigure 4.4: WINS Topology Post-ClusteringFigure 4.5: Designing Your WINS Replication StrategyFigure 4.6: WINS Replication in a Hub-and-Spoke TopologyFigure 4.7: Replication in a T Network TopologyFigure 4.8: Deploying WINS Over a Large Number of Branch OfficesFigure 4.9: Deploying WINS Over a Few Large SitesFigure 4.10: Large-Scale WINS Deployment Using Hub TopologyFigure 4.11: Securing WINS During the Deployment ProcessFigure 4.12: Integrating WINS During the Deployment ProcessFigure 4.13: Implementing Your WINS SolutionChapter 5: Deploying ISA Server
Figure 5.1: Deploying Your ISA ServerFigure 5.2: Determining the Role of ISA ServerFigure 5.3: ISA Server in Firewall ModeFigure 5.4: ISA Server in Forward Cache ModeFigure 5.5: ISA Server in Reverse Cache ModeFigure 5.6: Evaluating Interoperability IssuesFigure 5.7: Running Other Services with ISA ServerFigure 5.8: Designing for High AvailabilityFigure 5.9: ISA Server Capacity Planning ProcessFigure 5.10: DNS Round RobinFigure 5.11: Securing the DesignFigure 5.12: Back-to-Back Perimeter NetworkFigure 5.13: Three-Homed Perimeter NetworkFigure 5.14: ISA Server in ExtranetsFigure 5.15: Implementing Your ISA Server SolutionFigure 5.16: Details of Implementing Your ISA Server SolutionChapter 6: Deploying IPSec
Figure 6.1: Deploying IPSecFigure 6.2: Determining Your IPSec NeedsFigure 6.3: Filtering Packets by Using IPSecFigure 6.4: Peer-to-Peer Security in IPSecFigure 6.5: Using IPSec to Secure an Application ServerFigure 6.6: Gateway-to-Gateway Tunneling Between SitesFigure 6.7: One Endpoint Does Not Support IPSecFigure 6.8: Traffic Must Be Decrypted for Third-Party Firewall InspectionFigure 6.9: Designing IPSec PoliciesFigure 6.10: Assigning IPSec PoliciesFigure 6.11: Deploying Your IPSec SolutionChapter 7: Deploying IAS
Figure 7.1: Deploying IASFigure 7.2: IAS ArchitectureFigure 7.3: Designing IASFigure 7.4: IAS Configured as a RADIUS ServerFigure 7.5: IAS Configured as a RADIUS Proxy at a Third-Party ISPFigure 7.6: IAS as a RADIUS Proxy with Multiple ForestsFigure 7.7: Load BalancingFigure 7.8: IAS Configured as Both a RADIUS Server and a RADIUS ProxyFigure 7.9: Designing an Optimized IAS SolutionFigure 7.10: Creating a Remote Access Policy StrategyFigure 7.11: Securing Your Remote Access StrategyFigure 7.12: Implementing Your IAS SolutionFigure 7.13: Deploying IAS as a RADIUS ServerFigure 7.14: Deploying IAS as a RADIUS ProxyChapter 8: Deploying Dial-up and VPN Remote Access Servers
Figure 8.1: Deploying Dial-up and VPN Remote Access ServersFigure 8.2: Choosing Dial-up or VPNFigure 8.3: Dial-up Remote Access DesignFigure 8.4: VPN Remote Access DesignFigure 8.5: Designing a Remote Access Server SolutionFigure 8.6: Components of Network Access Quarantine Control for Remote AccessFigure 8.7: Deploying a VPN Remote Access Server SolutionFigure 8.8: Deploying a Dial-up Remote Access Server SolutionChapter 9: Deploying Remote Access Clients Using Connection Manager
Figure 9.1: Deploying Connection ManagerFigure 9.2: Providing Connection Manager Phone Book SupportFigure 9.3: Customizing Connection ManagerFigure 9.4: Implementing Your Connection Manager SolutionFigure 9.5: Double-Dial Using RADIUS ProxyFigure 9.6: Preparation for Running the CMAK Wizard— Component ProfileFigure 9.7: Preparation for Running the CMAK Wizard— Top-Level Profile (page 1)Figure 9.8: Preparation for Running the CMAK Wizard— Top-Level Profile (page 2)Figure 9.9: Preparation for Running the CMAK Wizard— Top-Level Profile (page 3)Figure 9.10: Preparation for Running the CMAK Wizard— Top-Level Profile (page 4)Figure 9.11: Preparation for Running the CMAK Wizard— Top-Level Profile (page 5)Figure 9.12: Preparation for Running the CMAK Wizard— Top-Level Profile (page 6)Figure 9.13: Preparation for Running the CMAK Wizard— Top-Level Profile (page 7)Chapter 10: Connecting Remote Sites
Figure 10.1: Connecting Remote SitesFigure 10.2: One-Way Initiated On-Demand Dial-up PPTP VPN SolutionFigure 10.3: Persistent Two-Way Initiated L2TP/IPSec VPN SolutionFigure 10.4: One-Way Initiated On-Demand Dial-up SolutionFigure 10.5: Choosing a Remote Site Connection TypeFigure 10.6: Choosing Security FeaturesFigure 10.7: Integrating the Remote Site Connection into Your NetworkFigure 10.8: Preparing for Server ConfigurationFigure 10.9: Deploying a Site-to-Site ConnectionFigure 10.10: Deployment Tasks for a Site-to-Site Connection WorksheetChapter 11: Deploying a Wireless LAN
Figure 11.1: Deploying a Wireless LANFigure 11.2: Adapting the Network Infrastructure for a WLANFigure 11.3: Designing Your Wireless Network Access SolutionFigure 11.4: Channel Overlap for 802.11b APs in the United StatesFigure 11.5: Example of 802.11b Channel AllocationFigure 11.6: Example of a Public Space WLAN Infrastructure in an AirportFigure 11.7: Implementing Your WLAN Test Environment