This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
These technologies are designed to address issues that occur with locating and accessing files, controlling the amount of traffic that passes over WAN links, and providing users with local file server access. Additionally enables a network to survive a WAN link failure and facilitate consistent backups.
Achieved as follows:-
DFS Namespaces enables the creation of a single virtual directory tree which references to the shared folders on various file servers. This directory tree is a collection of references to these folders, which users can browse and access file shares.
DFS Replication is a replication engine which works in tandem with DFS Namespaces. It provides data distribution by replicating shared folders to multiple locations, load balancing by directing users to multiple servers, and data collection by enabling administrators to replicate data from remote servers to a central location.
(Word count = 156 including heading)
Internet Protocol Security (IPsec)
IPsec is an open standard security comprising of a suite of protocols which use a series of cryptographic algorithms to provide security for the TCP/IP hosts at the internet layer. Because it operates at the internet layer all traffic can be secured no matter what application is used.
IPsec has numerous security protocols which it uses to establish a mutual authentication between nodes (hosts) at the commencement of a communications session and negotiation of cryptographic keys that are used during that session. Both sides require a shared IPsec configuration called an IPsec Policy to establish security settings; this will allow both sides to agree on how to transmit secure traffic between them.
IPsec can be configured for either transport mode or tunnel mode
Delivers end-to-end communications from host to host or host to gateway, usually on the same network
Provides gateway-to-gateway protection. That is site-to-site communication that crosses the Internet or other insecure networks.
In summary the IPsec role is to -
Protecting the contents of IP Packets
Defend a network against attack by packet filtering and enforcing trusted communications
(Word count = 206 including heading)
Configure Windows Server to act as a Primary Name Server
Log on to server (W2K801) as administrator
Click Start, then in Server Manager double-click on roles.
Click Add Roles. Click Next to dismiss welcome window.
In Select Server Roles place checkmark next to DNS Server. Click Next.
Click Next and then Install
Click Close when installation completes
Click Start, then click Administrative Tools, then click DNS
DNS Management Console appears ââ‚¬" expand if necessary.
Highlight W2K801 Forward Lookup Zones and right click
Click New Zone.
Click Next in New Zone Wizard Screen
Select Primary Zone Radio Button, click Next.
In Zone Name Screen text box type contoso.com. Click Next.
In Zone File screen accept default selection of Create a new file with this file name. Click Next
In Dynamic Update Screen accept default selection of Do not allow dynamic updates radio button. Click Next.
(Word count = 161 including heading)
Screenshot Showing Primary Name Server for zone contoso.com
Dynamic Host Configuration Protocol (DHCP)
DHCP is a protocol that automates the process of assigning, tracking and re-assigning IP addresses to devices on a network.
Essentially DHCP allows devices to join a network without having to have a pre-configured IP address. It allows devices to be assigned a unique IP address from a defined range of addresses (called a scope) and these are renewed and released each time a device connects or leaves a network.
(Word count = 75 including heading)
Create a new DHCP Scope
Log on W2K801 Windows Server 2008 as administrator.
Click Start then click Administrative Tools then click DHCP
As an IPv4 DHCP Scope is being configured ââ‚¬" click on the server name in server manager screen and then click on IPv4.
Right Click on IPv4 and then click New Scope
Welcome to the New Scope Wizard window appears click Next button to dismiss welcome screen.
In Scope Name enter scope name and description. Click Next.
In IP Address Range type in the start and end IP address in the Start IP Address and End IP Address fields and enter subnet mask either by length or IP address. Click Next.
In Add Exclusion and Delay enter an IP Address exclusion range or leave blank. Click Next.
Enter required DHCP Lease length in Lease Duration window and click Next.
The Configure DHCP Options window appears. Click on Yes, I want to configure these options now, and click Next.
In Router (Default Gateway) enter default gateway for scope, click Add, then Next.
In Domain Name and DNS Servers enter appropriate information if required. Click Next.
In WINS Servers enter appropriate information if required. Click Next.
In Activate Scope click Yes, I want to activate this scope now, click Next.
(Word count = 223 including heading)
Screenshot showing DHCP Scope installed
Testing DHCP Server Functionality
To test the functionality of the scope installed in part b of Question 2 the following tests can be carried out.
First log on to a DHCP client in this instance W2K802 as administrator. In the Server Manager Screen click on view Network Connections. Right click on the network connection and select properties, then highlight TCP/IPv4 and click on Properties. Under the General tab ensure that Obtain an IP address automatically button is selected. Click Okay and close to save changes.
Click on START and type in cmd followed by enter. In the command prompt screen type in ipconfig /renew. This command re-establishes TCP/IP connections on all network adapters.
Following this type in the command ipconfig /all which will return the full TCP/IP configuration for all network adapters. This command will return a number of parameters which should indicate correct functioning of the DHCP Scope as follows.
The IP address returned should be from the valid range assigned in the DHCP Scope.
The lease start and finish times will correspond to the lease duration times set in DHCP Scope.
The DHCP Server IP address will be displayed
(Word count = 200 including heading)
Screenshot displaying result from ipconfig /all command result
When deciding on whether a VPN is a suitable vehicle for its needââ‚¬â„¢s an organisation should examine a number of factors.
VPNs can have reliability and performance issues as these can often be out of an organisations direct control. Additionally hardware and software compatibility could cause performance issues. If performance is of primary concern for a business alternative solutions such as leased lines may be necessary.
A VPN can offer significant cost savings to an organisation by eliminating the requirement for expensive leased lines, and reducing support costs. Again hardware and software issues may mean cost savings are not always recognised.
VPN technology is scalable and it is quite easy to add new users with little effort to a network. This means businesses are able to gain capacity and usage without large outlays for infrastructure changes.
VPNs allow employees network accessibility almost anywhere, by using locally available high speed broadband access ââ‚¬" such as DSL, cable and via 3G/4G mobile devices.
Although VPNs offer a very high level of security by using advanced encryption and authentication protocols it does not make them impenetrable. Therefore usage of strong security protocols such as security tokens should be implemented to safeguard against unauthorised access.
Word count = 207 including heading)
Configuring Windows 2008 as a VPN server with NPS
Log on as Administrator
In Server Manager screen click Add Roles, click Next
Select Network Policy and Access Services. Click Next twice
In Select Role Service screen place check mark in Remote Access Service option.
Click Next, then Install.
Click Start, then Administrative Tools, then Routing and Remote Access
Highlight and Right Click on server name
Select Configure and Enable Routing and Remote Access
Wizard screen appears, click Next
Select Remote Access (dial-up or VPN) radio button, click Next
Select VPN checkbox, click Next
Select Local Area Network assigned for VPN use, click Next
In IP address assignment screen select from specified range of addresses radio button, click Next
Select New, enter start and end IP Addresses. Click OK, then Next twice and Finish
Click Start, then Administrative Tools, then Network Policy Server
Highlight Network Policies and right click, then click on New
Enter Allow Administrators Remote Access in Policy Name text box.
Select Remote Access Server (VPN-Dialup) from type of network access server, click Next
Click Add in specify conditions screen
Select Windows Groups, click Add
Click Add Groups
Enter Administrators in Select Groups screen, click Okay twice.
Accept defaults in Configure Authentication Methods screen, click Next
Accept default setting in Specify Access Permission screen, click Next
Accept defaults in Configure Authentication Methods screen, click Next
Configure Constraints as required. Click Next
Accept defaults in Configure Settings, click Next and Finish
Word count = 275 including heading