List of Tables
Chapter 1: Designing a TCP/IP NetworkTable 1.1: Supernetted Block of AddressesTable 1.2: CIDR Routing Table EntryTable 1.3: IPv6 Features Supported by Windows Server 2003 IPv6Table 1.4: Server Applications Supported by Windows Server 2003 IPv6Table 1.5: IPv4 and IPv6 Node TypesTable 1.6: Leading Zero Suppression and All-Zero Contiguous Block CompressionTable 1.7: Fields in a Unicast Global AddressTable 1.8: Examples of ISATAP addressesTable 1.9: Fields in a Multicast AddressTable 1.10: Differences Between IPv4 Addressing and IPv6 AddressingChapter 2: Deploying DHCP
Table 2.1: Address Range and Clients per SubnetTable 2.2: DHCP Address Pools per SubnetTable 2.3: Example Address ReservationsTable 2.4: Scope Configurations on the DHCP Server at the Main OfficeTable 2.5: Scope Configurations on the DHCP Server at the Branch OfficeTable 2.6: Example DHCP OptionsChapter 3: Deploying DNS
Table 3.1: DNS RolesTable 3.2: DNS Namespace Design RequirementsTable 3.3: Mixed Internal and External DNS Namespace Design OptionsTable 3.4: Client Proxy CapabilitiesTable 3.5: Feature Support in Different Implementations of DNSTable 3.6: Internet DNS Domain Name RegistrationTable 3.7: Character Set RestrictionsTable 3.8: Replication Options for Active Directory-Integrated Zone DataChapter 4: Deploying WINS
Table 4.1: NetBIOS Node TypesChapter 5: Deploying ISA Server
Table 5.1: Determining the ISA Server Installation ModeTable 5.2: Determining Which Clients to DeployTable 5.3: Hardware Requirements for Different Network LoadsTable 5.4: Hardware Requirements for FirewallTable 5.5: Hardware Requirements for Forward CachingTable 5.6: Hardware Requirements for Reverse CachingTable 5.7: Comparing Features of ISA Server as a Stand-Alone Server or as an ArrayChapter 6: Deploying IPSec
Table 6.1: IPSec Security SolutionsTable 6.2: IPSec Transport Mode UsesTable 6.3: IPSec Tunnel Mode UsageTable 6.4: General IPSec Policy SettingsTable 6.5: Settings of IPSec RulesTable 6.6: Equivalent Filters for NoDefaultExempt=0Table 6.7: Choosing IPSec Protocol TypesTable 6.8: Choosing Authentication MethodsChapter 7: Deploying IAS
Table 7.1: Comparison of Voluntary and Compulsory TunnelingTable 7.2: Authentication Protocols That IAS SupportsTable 7.3: Selecting a Certificate Installation MethodChapter 8: Deploying Dial-up and VPN Remote Access Servers
Table 8.1: Advantages and Constraints of the PPTP and L2TP/IPSec VPN ProtocolsTable 8.2: Encryption Support Provided Under CHAP, MS-CHAP, and EAP-TLSTable 8.3: Encryption Required at Each Encryption Level for PPTP and L2TP/IPSec ConnectionsTable 8.4: Certificate Infrastructures Required for Remote Access Client AuthenticationTable 8.5: VPN Server Behind a Firewall: PPTP Filters on the Firewall''s Internet InterfaceTable 8.6: VPN Server Behind a Firewall: PPTP Filters on the Perimeter Network InterfaceTable 8.7: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall''s Internet InterfaceTable 8.8: VPN Server Behind a Firewall: L2TP/IPSec Filters on the Firewall''s Perimeter Network InterfaceTable 8.9: VPN Server in Front of a Firewall: Packet Filters for PPTPTable 8.10: VPN Server in Front of a Firewall: Packet Filters for L2TP/IPSecChapter 10: Connecting Remote Sites
Table 10.1: Comparing a PPTP Solution with an L2TP/IPSec SolutionTable 10.2: Using PPTP and L2TP/IPSec for Different VPN Connections on the Same NetworkTable 10.3: Comparing On-Demand and Persistent ConnectionsTable 10.4: Comparing One-Way and Two-Way Initiated ConnectionsTable 10.5: Requirements for Using a Third-Party CATable 10.6: Choosing a Data Encryption MethodTable 10.7: Encryption Strength by Connection TypeTable 10.8: Example Configuration of Demand-Dial Interfaces and User Accounts for a Two-Way Initiated VPN ConnectionTable 10.9: Example Configuration for a Dial-up One-Way Initiated ConnectionTable 10.10: New Features for Dial-up or VPN Site-to-Site Connections Since Windows NT Server 4.0 RRASTable 10.11: Capacity PlanningTable 10.12: Hardware and Software Requirements for a Demand-Dial RouterTable 10.13: Enabling the Routing and Remote Access ServiceTable 10.14: Configuring the Demand-Dial Interface for a Remote Site ConnectionTable 10.15: Configuring an Additional Demand-Dial Interface for a Temporary Link to the ISPTable 10.16: Creating a Common Remote Access Policy by Using the New Remote Access Policy WizardTable 10.17: Creating a Custom Remote Access Policy by Using the New Remote Access Policy WizardTable 10.18: Configuring the Static Route Dialog Box for a Site-to-Site ConnectionTable 10.19: Using the Configure Device Dialog Box to Configure PortsChapter 11: Deploying a Wireless LAN
Table 11.1: Example IP Address Allocation for IP Subnet 172.16.50.0/24Table 11.2: Support for Autoenrollment of Certificates Provided in WindowsTable 11.3: Adding a Remote Access Policy for Wireless Users