You are on page 1of 145

UNIT OF COMPETENCE

CONFIGURE AND ADMINISTER


Prepared By Abenezer A.

SERVER

Prepared By Abenezer A.
Previ Next End

LEARNING OUTCOMES:
E-Mail : abiti.hana@gmail.com

LO1:- Confirm server specification.

LO2:- Verify server compatibility and inter operability.

LO3:- Configure and test server.


Prepared by: Abenezer A.

2
Previ Next End

LO1:- CONFIRM SERVER SPECIFICATION


E-Mail : abiti.hana@gmail.com

Objectives:- After completing this Learning outcome the


trainees should able to know:

 Define Network Operating system and its characteristics

 Define Server and its Roles


Prepared by: Abenezer A.

 Define Windows Server 2003 Application and their Function

 Identify Windows Server 2003 Specifications

 Identify Windows Server 2003 Technology and resource

3
Previ Next End
E-Mail : abiti.hana@gmail.com

LO1:- CONFIRM SERVER SPECIFICATION


Definition and Characteristics of Network OS

 A network operating system (NOS) is the software that


runs on a server computer and enables the server to
manage data, users, groups, security, applications, and
other networking functions.
Prepared by: Abenezer A.

 It is a computer operating system that is designed primarily


to support workstation, personal computer, and, in some
instances, older terminal that are connected on a local
area network (LAN).
4
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 The network operating system is designed to allow shared


file and printer access among multiple computers in a
network, typically a local area network (LAN), a private
network or to other networks.

 Network Operating Systems are based on


Prepared by: Abenezer A.

a client/server architecture in which a server enables


multiple clients to share and access resources.

5
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Advantage of NOS

 Centrally manage network resources, such as programs,


data and devices.

 Secure access to a network.

 Allow remote users to connect to a network.


Prepared by: Abenezer A.

 Allow users to connect to other networks like the Internet.

 Back up data and ensure its availability.

 Multiuser, Multitasking, and Multiprocessor Systems


6
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Supports multiple user accounts at the same time and


enables concurrent access to shared resources by
multiple clients. Allow for simple additions
of clients and resources.

 Monitor the status and functionality of network elements.


Prepared by: Abenezer A.

 Distribute programs and software updates to clients.

 Ensure efficient use of a server's capabilities.

7
Previ Next End

Differences between Network and Desktop OS


E-Mail : abiti.hana@gmail.com

Network Operating System Desktop Operating System

■ Supports multiple users ■ Supports a single user


■ Runs multiuser applications ■ Runs single-user applications
■ Shares files and folders on a ■ Shares files and folders on a
large network with high security. small network with limited
■ Designed for a corporate security
environment serving multiple ■ Designed for a small
Prepared by: Abenezer A.

users with a wide range of needs . office/home office (SOHO) with


■ Support large number of users. a limited number of users

8
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

Types of Network
 There are two types of network based on configuration
1. Peer to peer network

2. Server based network


Prepared by: Abenezer A.

9
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

1. Peer to peer network:-


 This is a type of network in which all computers are connected to
each other. It is inexpensive to setup.

 Files are placed on any computer and can be accessed by any other
computer in the network.

 This type of network is best for small or medium size organization.


Prepared by: Abenezer A.

10
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

1.1. Advantages of peer to peer network:-


 It is easy to configure

 It is not expensive to setup

1.2. Disadvantages of peer to peer network:-


 No control over all the computers i.e. decentralized
Prepared by: Abenezer A.

 Security problem

11
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

2. Server based network:-


 This is type of network in which there is a server that is attached
to client computer. So one computer is behaving as a center
server controlling and managing other computers.

2.1. Advantages of client and server network:-


 Security is well managed in these systems
Prepared by: Abenezer A.

 New resources can be easily added and removed to these


networks
 New technology can be put in without any problem
 Server can be accessed remotely also

12
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

2.2. Disadvantages of client and server network:-


 It is expensive to setup
 Maintenance of these systems require more staff
 All computers are dependent on server. If server crashes
then all computers effected

Examples of network operating systems:-


Prepared by: Abenezer A.

 Windows server 2003 (client and server network)


 Appleshare

13
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

Types of Network Operating System


1. Macintosh OS X.

2. Microsoft Windows Server.

3. UNIX/Linux.

4. Novell NetWare
Prepared by: Abenezer A.

14
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

1. Novell NetWare:
 Novell NetWare was the first OS to meet
network OS requirements and enjoy widespread
deployment in PC-based LANs back in the
1980s
 The original NetWare product in 1983,
supported clients running both GUI and MS-
DOS, ran over a proprietary star network
topology and was based on a Novell-built file
Prepared by: Abenezer A.

server using the Motorola 68000 processor, but


the company soon moved away from building its
own hardware, and NetWare became hardware-
independent, running on any suitable Intel-
based IBM PC compatible system, and a wide
range of network cards. 15
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

2. Microsoft Windows:
 Network operating systems
offered by Microsoft are
Windows 2000 Server and
Windows Server 2003.
Prepared by: Abenezer A.

 Windows Server operating


systems use a central Database
called Active Directory to
manage network resources.
16
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

3. Linux/UNIX:
 Linux is an operating system
similar to UNIX.
 It runs on many different
computers and was first
released in 1991.
Prepared by: Abenezer A.

 Linux operating systems


include RedHat, Caldera,
SUSE, Debian, Fedora, Sanba
and Slackware
17
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

4. Macintosh OS X.
 Mac OS is the computer
operating system for Apple
Computer's Macintosh line of
personal computers and
workstations.
Prepared by: Abenezer A.

 A popular feature of its latest


version, Mac OS X , is a
desktop interface with some
3-D appearance
characteristics.
18
Previ Next End

QUIZ (5%)
E-Mail : abiti.hana@gmail.com

1. Define network operating system?

2. What is the basic difference between desktop operating


system and server operating system?

3. List and define the basic type of NOS?


Prepared by: Abenezer A.

19
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

What is Server?
 Servers is large system with higher processing speed,
memory and hard disk capacity whose role in a network is to
provide services and resources to users.

 In a large network environment, servers may have one or


more specific roles in a network, depending on the number of
Prepared by: Abenezer A.

users, volume of traffic, number of peripherals, and so on

 Computer that functions as servers within a domain can have


one of two roles, Domain Controller or Member Server.

20
Previ Next End
E-Mail : abiti.hana@gmail.com

SERVER-BASED NETWORK:-

 Server-based network:- A network in which


network security and storage are managed
centrally by one or more servers.
Prepared by: Abenezer A.

21
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

How It Works

 In a server-based network, special computers called


servers handle network tasks such as authenticating
users, storing files, managing printers, and running
applications such as database and e-mail programs.

 Security is generally centralized in a security provider,


Prepared by: Abenezer A.

which allows users to have one user account for logging


on to any computer in the network. Because files are
stored centrally, they can be easily secured and backed
up.
22
Previ Next End

CONT….
Role of Server:
E-Mail : abiti.hana@gmail.com

1. Domain Controller is the authentication server or security


server validate users for logging on and accessing network
resources.
2. Member servers is a computer that provides specific
function.
Such as :-File and print servers provide users with
Prepared by: Abenezer A.

centralized locations for storing files and accessing print


devices.
3. Standalone Server is a computer install only NOS without
service 23
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

Choosing a NOS
 The main features to consider when selecting a NOS
include:

 Performance

 Management and monitoring tools


Prepared by: Abenezer A.

 Security

 Scalability

 Robustness/fault tolerance

24
Previ Next End
E-Mail : abiti.hana@gmail.com

Client Requirements issues


 One of the first and most important activities to
get on when confirming server specifications is to
confirm client needs and to ensure that they
acknowledge that requirements have been
captured correctly.
Prepared by: Abenezer A.

 So one of the tasks in confirming client needs is to


document the requirements.

25
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 This may include identifying or clarifying


 The business case

 Level of services they need

 Maintenance and backup requirements

 Bandwidth issues

 The nature of the data (e.g. text, multimedia)


Prepared by: Abenezer A.

 Security needs (E.g. levels of user access and privileges)

 Available support resources

 Cost or budget.

26
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Once requirements have been defined and client needs

are clarified, it’s time to start thinking about identifying

products that fit the solution. In this case, we need to

focus on the possible server solutions.

 Remember: a server consists of


Prepared by: Abenezer A.

 Hardware

 Software

 Network connections.
27
Previ Next End
E-Mail : abiti.hana@gmail.com

Identify Windows Server 2003 Specifications

What is Server Specification?

 Server specifications provide detailed information

for your server, including dimensions, electrical,

power, temperature, environment, and service


Prepared by: Abenezer A.

clearances.

 It is the hardware and software specifications of

your server. 28
Previ Next End

Example of Server Specifications is given as follow


E-Mail : abiti.hana@gmail.com

Hardware Specifications
 Server Model: DELL PowerEdge 860
 Processor:Intel Dual Core Xeon Pro 3050 2.13GHz
 Memory: DDR2 8 GB ECC Registered
 Harddrive: 500 GB S-ATA II
 CaseType: Rack Mount 1 U
 LANPort:2 LAN Port (2 Gigabit port)
 Cacheand FSB:2MB Cache, 1066MHz FSB, Dual Channel Memory, ECC Supported
Software Specifications
Operating System:
Prepared by: Abenezer A.

 Windows Server 2003/2008 X-86 based OS


InstalledApplications:
 MS Office 2007/2010 (32-bit version)*
 Apache 2.0 Webserver
 SQL Server 2008/MySQL5, PHP5, CGI, Perl, SSI
 POP3, SMTP, IMAP, Webmail
 Symantec Antivirus 29
Previ Next End

Identify Windows Server 2003 Technology and


E-Mail : abiti.hana@gmail.com

resource

HARDWARE OF SERVER

 CPU

 RAM

 HDD
Prepared by: Abenezer A.

 RAID Controller

 FAN

 POWER SUPPLY……
30
Previ Next End
E-Mail : abiti.hana@gmail.com

CONT….

Types of Computer Server

1. Blade Server

2. Rack Mount Server


Prepared by: Abenezer A.

3. Tower Server

31
Previ Next End
E-Mail : abiti.hana@gmail.com

1. BLADE SERVER
 Blade server.
A server architecture that
houses multiple server modules
("blades") in a single chassis. It
is widely used in datacenters to
save space and improve system
management. Either self-
Prepared by: Abenezer A.

standing or rack mounted, the


chassis provides the power
supply, and each blade has its
own CPU, RAM and storage.
32
Previ Next End

2. RACK MOUNT SERVER


E-Mail : abiti.hana@gmail.com

 A rack server, also called a rack-


mounted server, is a computer
dedicated to use as a server and
designed to be installed in a
framework called a rack. The rack
contains multiple mounting slots
called bays, each designed to hold a
Prepared by: Abenezer A.

hardware unit secured in place with


screws. A rack server has a low-
profile enclosure, in contrast to
a tower server, which is built into an
upright, standalone cabinet.
33
Previ Next End

3. TOWER SERVER
E-Mail : abiti.hana@gmail.com

 A tower server is a computer intended


for use as a server and built in an
upright cabinet that stands alone.
The cabinet, called a tower, is similar
in size and shape to the cabinet for a
tower-style personal computer. This is
Prepared by: Abenezer A.

in contrast to rack server s or blade


server s, which are designed to
be rack-mounted .

34
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next
End

35
Previ Next End

LO2: VERIFYING SERVER COMPATIBILITY


E-Mail : abiti.hana@gmail.com

AND INTER-OPERABILITY
Objectives:
 After completing this Learning outcome the student
should be able to:

 Review Hardware and software compatibility

 Install Required operating system and software


Prepared by: Abenezer A.

36
Previ Next End

REVIEW HARDWARE AND SOFTWARE


E-Mail : abiti.hana@gmail.com

COMPATIBILITY

Computer compatibility
 A family of computer models is said to be compatible
if certain software that runs on one of the
models can also be run on all other models of
the family.
Prepared by: Abenezer A.

 The computer models may differ in performance,


reliability or some other characteristic. These
differences may affect the outcome of the running
of the software.
37
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

What is Software compatibility?


 Software compatibility is a characteristic of
software components or systems which can operate
satisfactorily together on the same computer, or on
different computers linked by a computer network.

It is possible that some software components or


Prepared by: Abenezer A.

systems may be compatible in one environment


and incompatible in another.

38
Previ Next End

CONT…..
E-Mail : abiti.hana@gmail.com

 Software compatibility can refer to the


compatibility that particular software has running
on a particular CPU architecture such as Intel or
PowerPC.

 Software compatibility can also refer to ability for


the software to run on a particular operating
Prepared by: Abenezer A.

system. Very rarely is compiled software compatible


with multiple different CPU architectures.

39
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Software incompatibility occurs many times for


new software released for a newer version of an
operating system which is incompatible with the
older version of the operating system because
it may miss some of the features and functionality
that the software depends on.
Prepared by: Abenezer A.

 Software that works on older versions of an


operating system is said to be backwards
compatible.
40
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

What is Hardware Compatibility?


 Hardware Compatibility List (HCL) is a list of
computer hardware (typically including many types
of peripheral devices) that is compatible with a
particular operating system or device management
software.
Prepared by: Abenezer A.

 In today's world, there is a vast amount of computer


hardware in circulation, and many operating
systems too.
41
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Hardware compatibility can refer to the


compatibility of computer hardware components
with a particular CPU architecture, bus,
motherboard or operating system.

 Hardware that is compatible may not always run at


Prepared by: Abenezer A.

its highest stated performance, but it can work


with legacy components.

42
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 An example is RAM chips, some of which can run at


a lower (or sometimes higher) clock rate than rated.
Hardware that was designed for one
operating system may not work for another, if
device or kernel drivers are unavailable.
For example, much of the hardware for Mac OS
Prepared by: Abenezer A.

X is proprietary hardware [1] with drivers


unavailable for use in operating systems such as
Linux.

43
Previ Next End
E-Mail : abiti.hana@gmail.com

INSTALLING WINDOWS SERVER 2003


Preplanning and Preparing a Server Installation

 Before you begin the actual installation of Windows

Server 2003, you must make several decisions.

 How well you plan these steps will determine how


Prepared by: Abenezer A.

successful your installation is.

44
End
CONT…
Previ Next

Verifying Minimum Hardware Requirements


E-Mail : abiti.hana@gmail.com

 The first step of the installation is verifying that your hardware


meets the system requirements. although there is a minimum
requirement for the CPU and RAM, there is also a recommended
CPU and RAM configuration. For the sake of performance we
have to use recommended.

Requirement Standard Enterprise Server


Server
Minimum CPU speed 133MHz 133MHz for x86-based computers
733MHz for Itanium-based
Prepared by: Abenezer A.

computers
Recommended CPU 550MHz 733MHz
speed
Minimum RAM 128MB 128MB
Maximum RAM 4GB 32GB
Multiprocessor support Up to 4 Up to 8
Disk space 1.5GB 1.5GB 45
Previ Next End

GATHERING THE INFORMATION


E-Mail : abiti.hana@gmail.com

NECESSARY TO PROCEED
 During the installation of Windows Server 2003, you
will have to tell the Setup Wizard how you want your
server configured.

 The wizard will take the information you provide and will
configure the server settings to meet your specifications.
Prepared by: Abenezer A.

 Taking the time to gather the information described in


the following sections before starting your installation
will likely make your installation go faster and easier.

46
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

Selecting the Computer Name


 Each computer on a network must have a name that is
unique within that network. Many companies have a
standard naming convention for their servers and
workstations.
Name of the Workgroup or Domain
Prepared by: Abenezer A.

 During the server installation, the Setup Wizard will ask


for the name of the workgroup or domain that the server
will be joining. You can either enter the name of an
existing organizational structure or enter a new name,
creating a new workgroup or domain.
47
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

Network Protocol and IP Address of the Server

 When installing Windows Server 2003, you must install and


configure a network protocol that will allow it to communicate
with other machines on the network. Currently, the most
commonly used protocol is called TCP/IP, which stands for
Transmission Control Protocol/Internet Protocol. This protocol
Prepared by: Abenezer A.

allows computers throughout the Internet to communicate.


After you install the TCP/IP protocol, you need to configure an
IP address for the server

48
Previ Next End
E-Mail : abiti.hana@gmail.com

CHOOSE AN INSTALLATION METHOD


1. Attended installation

2. Unattended installation

3. Other installation options


Prepared by: Abenezer A.

49
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

1. Attended Installation:- An attended installation requires a


user’s continuous involvement during the installation process.
This installation method requires the least amount of
preparation.

Note:- Attended installations are time consuming.

2. Unattended Installation:- An unattended installation does


Prepared by: Abenezer A.

not require constant user involvement during the installation


process. The installation can be initiated by pre-configuring an
answer file called unattend.txt. Unattend.txt file contains all
the necessary settings and options that are selected and
entered during an attended installation.
50
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

Unattended installations are beneficial:


 When the operating system is to be installed on several
similar servers.
 For deploying/organizing a large number of client
operating systems such as Windows XP or Windows 2000
Professional.
Prepared by: Abenezer A.

 Unattended installation requires a lot of planning; it may


be essential to run through at least one attended
installation to ensure that all the settings and options
entered in the answer file are accurate.

51
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

3. Other Installation Options


3.1. Network installation
3.2. Imaged installation

3.1. Network Installation


 For installing Windows Server 2003 on computers connected to
an existing network:
 Copy the \I386 directory from the installation CD to a shared
Prepared by: Abenezer A.

folder on the network.


 Copy files, such as answer files and device drivers, to the same
folder.
 Map the folder to a drive letter on the machine where the
operating system is to be installed.
52
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

3.3. Imaged Installation

 Imaged installation is useful when Windows Server


2003 needs to be set up on several identical
computers.

 Disk image is used to perform imaged installations.


Prepared by: Abenezer A.

53
Previ Next End

MAKE PRE-INSTALLATION DECISIONS


E-Mail : abiti.hana@gmail.com

(QUESTION?)

1. Partitioning

2. File system

3. Licensing

4. Server name

Initial password
Prepared by: Abenezer A.

5.

6. Network settings

7. Upgrade or clean installation

54
Previ Next End

INSTALL WINDOWS SERVER 2003


E-Mail : abiti.hana@gmail.com

Step 1: Correct your Boot Sequence by Entering in the

BIOS Setup

Step 2: Insert your CD /DVD in your Drive and start

your Computer from CD/DVD and Press Any Key


Prepared by: Abenezer A.

from the keyboard when the message is appeared

55
Previ Next End

After Press Any Key from the keyboard this message is


E-Mail : abiti.hana@gmail.com

appeared
Prepared by: Abenezer A.

56
Previ Next End
STEP 3:PRESS ENTER TO INSTALL WINDOWS SERVER 2003
AFTER THE FOLLOWING INFORMATION IS DISPLAYED ON YOUR
E-Mail : abiti.hana@gmail.com

SCREEN
Prepared by: Abenezer A.

57
Previ Next End

STEP 4: PRESS F8 FROM THE KEYBOARD TO


E-Mail : abiti.hana@gmail.com

ACCEPT THE LICENCE AGREEMENT


Prepared by: Abenezer A.

58
Previ Next End

STEP 5:SELECT A PARTITION IF IT IS CREATED IF NOT


E-Mail : abiti.hana@gmail.com

PLEASE CREATE THE PARTITION BY READING THE

INSTRUCTION
Prepared by: Abenezer A.

59
Previ Next End

STEP 6: SELECT THE FILE SYSTEM OF THE


E-Mail : abiti.hana@gmail.com

PARTITION(NTFS/FAT)
Prepared by: Abenezer A.

60
Previ Next End

STEP 7: PRESS ENTER TO START UP THE SETUP OF


E-Mail : abiti.hana@gmail.com

THE WINDOWS
Prepared by: Abenezer A.

61
Previ Next End

AND FINALLY YOUR COMPUTER WILL RESTART AFTER


E-Mail : abiti.hana@gmail.com

THE FOLLOWING PROGRESS(YOU CAN PRESS ENTER


TO RESTART WITHOUT FINISHING THIS PROGRESS

,DOING THIS HAVE NOT ANY PROBLEM)


Prepared by: Abenezer A.

62
Previ Next End

AFTER RESTART YOUR COMPUTER WILL BOOT WITH


E-Mail : abiti.hana@gmail.com

THE FOLLOWING DISPLAY


Prepared by: Abenezer A.

63
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

LOGON TO WINDOWS
End

64
Previ Next End
E-Mail : abiti.hana@gmail.com

LO3: CONFIGURE AND TEST SERVER

Objective: At the end of this the student should be


able to know the following contents

 Configure server as required by technical


requirements.

 Define scope and applicability of the testing


Prepared by: Abenezer A.

against technical requirements.

 Develop Test plan with reference to resources


and network impact.
65
Previ Next End
E-Mail : abiti.hana@gmail.com

DIRECTORY SERVICE
What is Directory Service?

 A Directory Service is a software application that stores


and organizes information about the network users and
resources.

 The Directory Service allows the network administrators


Prepared by: Abenezer A.

to manage the user’s access to the resources.

 The Directory acts as a central point of control and


management of the network operating system.

66
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

Main advantages of Directory Services are

 Directory Services help in Simplifying management: By acting as


a single point of management, a directory can ease the
administrative tasks associated with complex networks.

 Directory Services provide higher level of security. Directories


offer a single logon facility and they provide more secure
authentication process.
Prepared by: Abenezer A.

 Directory Services allow interoperability: Most of Directory


Services available today are based upon industry standards This
allows sharing of resources in a heterogeneous environment.

67
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Directory Services software application store data in its


own database. Following are the important data
which are kept in Directory Services database.
 User Account Information (Login name, Password, Restrictions).
 User Personal Information (Phone number, Address, Employee
ID).
 Peripheral Configuration Information (Printers, Modem, Fax).
Prepared by: Abenezer A.

 Application Configuration (Desktop Preference, Default


Directories).
 Security Information.
 Network Structure.
 Network Infrastructure Configuration.
68
Previ Next End
E-Mail : abiti.hana@gmail.com

CONFIGURING ACTIVE DIRECTORY AND DNS


What is Active Directory?
 Active Directory is the directory service for the Microsoft
Windows 2003 network operating system.
 Active Directory consists of both a database and a
service.
Prepared by: Abenezer A.

 Active Directory is a database of information about


resources on the network, such as computers, users,
shared folders, and printers.
 It is also a service that makes this information available
to users and applications. 69
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Active Directory® is the Microsoft's implementation of


Directory Services its purpose is to store information
about users, resources, and other network components,
and to provide that information according to access
permissions of the entity who is requesting it.

 Active Directory (AD) is meant for use in Microsoft


Prepared by: Abenezer A.

Windows network environments and it provides central


authentication and authorization services for Windows-
based computers.

70
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

CONT….
End

71
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Before we configure Active Directory, let's


start with the following core components of
the Active Directory service in details.
 Domains
 Forests
 Domain Controllers
Prepared by: Abenezer A.

 Organizational units
 Tree
 Trust
72
Previ Next End

DOMAIN
E-Mail : abiti.hana@gmail.com

 A Domain is a logical grouping of users, computers, and

resources that makes up a security and administrative

boundary.

 It is not a physical entity and doesn’t identify the actual


Prepared by: Abenezer A.

network topology or physical location of the network, but it

provides a way to secure and organize objects.

 For example, Microsoft.com and Amazon.com are domains

73
Previ Next End

FOREST
E-Mail : abiti.hana@gmail.com

 Defines a collection of one or more domains that share a

common schema, configuration, and global catalog.

 Is a collection of trees that do not share a contiguous DNS

naming structure.
Prepared by: Abenezer A.

74
Previ Next End
E-Mail : abiti.hana@gmail.com

SCHEMA & CONFIGURATION

Schema

 Is the configuration information that governs the


structure and content of the directory

Configuration

 Configuration defines the logical structure of a


Prepared by: Abenezer A.

forest, such as the number and configuration of


sites in the forest.

75
Previ Next End

GLOBAL CATALOG
E-Mail : abiti.hana@gmail.com

 It contains information about all objects in the forest and, in

particular, where to find them. Global catalogs also contain

membership information for universal groups.


Prepared by: Abenezer A.

76
Previ Next End

DOMAIN CONTROLLER
E-Mail : abiti.hana@gmail.com

 A domain controller manages information in the Active


Directory database and enables users to log on to the
domain, be authenticated for accessing resources in the
domain, and search the directory for information about
users and network resources.
 Domain controllers act as the central security
Prepared by: Abenezer A.

component of a domain.
 All security and account validation is performed by a
domain controller.
 Every domain must have at least one domain controller.

77
Previ Next End

ORGANIZATIONAL UNIT
E-Mail : abiti.hana@gmail.com

 Organizational Unit (OU) is a special container of Active


Directory, which is used to organize Active Director objects
within a domain into administrative groups or simply an
organizational unit (OU) is a logical group of Active Directory
objects. An OU can contain objects like user accounts, groups,
computers, printers, file shares, and other OUs from the same
domain.
Prepared by: Abenezer A.

78
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

CONT….
End

79
Previ Next End

TREE
E-Mail : abiti.hana@gmail.com

 An Active Directory tree is a collection of Active


Directory domains that begins at a single root and
branches out into peripheral, child domains. Domains in
an Active Directory tree share the same namespace.
Prepared by: Abenezer A.

80
Previ Next End

TRUST
E-Mail : abiti.hana@gmail.com

 Active Directory Trust relationship is a logical link


which allows a domain to access another domain, or a
forest to access another forest. Trusts which are created
automatically are called as implicit Trusts and the
trusts which are created manually are called as
Explicit Trusts.
Prepared by: Abenezer A.

81
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 The following are the characteristics of


Windows 2003 Trusts.
 Active Directory Trusts can be created manually
(explicitly) or automatically (implicitly).

 Active Directory Trusts can be either transitive or non


transitive. A transitive trust extends the trust
Prepared by: Abenezer A.

relationships with other domains and a no transitive does


not allow the trust to flow to any other domains in the
forest.

 Active Directory Trusts can be one-way or two-way.

82
Previ Next End
E-Mail : abiti.hana@gmail.com

TYPES OF TRUST

1. Parent-child Trust:

2. Tree-root Trust:

3. Shortcut Trust:

External Trust:
Prepared by: Abenezer A.

4.

5. Realm Trust:

6. Forest Trust:
83
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Parent-child Trust: Parent-child Trust is an


completely established, two-way, transitive trust
when you add a new child domain to a tree.

 Tree-root Trust: Tree-root Trust is an completely


established, two-way, transitive trust when you
add a new tree root domain to a forest.
Prepared by: Abenezer A.

84
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Shortcut Trust: Shortcut Trust is an clearly created,


transitive trust between two domains in a forest to improve
user logon times. Shortcut Trust will make a trust path
shorter between two domains in the same forest. The
Shortcut Trust can be one-way or two-way.

 External Trust: External Trust is explicitly created, non-


Prepared by: Abenezer A.

transitive trust between Windows Server 2003 domains


that are in different forests or between a Windows Server
2003 domain and Windows NT 4 domain. The External
Trust can be one-way or two-way.
85
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Realm Trust: Realm Trust is explicitly created transitive or


non-transitive trust between a non Windows Kerberos
realm and a Windows Server 2003 domain. This trust helps
to create trust relationship between Windows Server 2003
domain and any Kerberos version 5 realm. The Realm
Trust can be and one-way or two-way.
Prepared by: Abenezer A.

 Forest Trust: Forest Trust is explicitly transitive (between


two forests) created trust between two forest root domains.
The Forest Trust can be one-way or two-way.

86
Previ Next End

PRE REQUEST TO INSTALL ACTIVE


E-Mail : abiti.hana@gmail.com

DIRECTORY

 Install Network Driver

 Give IP address to server computer

 Check file NTFS or Not…

 Give password to server computer

Established Network Between server computer


Prepared by: Abenezer A.

and client computer or connect network cable


b/n client and server computer

 Insert windows server 2003 sp2 or sp3 CD/DVD


87
Previ Next End

OPERATION SHEET
E-Mail : abiti.hana@gmail.com

Install Active Directory (Operation Sheet)


 To install Active Directory on Windows Server 2003

 Click Start, click Run, type dcpromo, and then click OK.
Prepared by: Abenezer A.

88
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

1. On the first page of the Active Directory Installation Wizard, click


Next.
Prepared by: Abenezer A.

89
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 On the next page of the Active Directory Installation Wizard, click


Next
Prepared by: Abenezer A.

90
CONT…
 On the Domain Controller Type page, click Domain Controller for a
new domain, and then click Next

91
CONT…
 On the Create New Domain page, click Domain in a new forest, and then
click Next

92
CONT…

 On the New Domain Name page, in the Full DNS name for new domain box, type
corp.contoso.com, and then click Next

93
CONT…

Accept the domain NETBIOS name.


(NetBIOS names provides for down-level compatibility.)

94
CONT…
Note:
If your AD has been planned and the growth factor has been taken into account I
would recommend to plan these locations right from the beginning. Logs and
database should be on a different partition. This will improve performance

95
CONT…
Type a password (record this password part of your secure server documentation)
click next.
Note: This password does not need to be the same as your domain administrator
password. To read more regarding this topic click on the "AD help link" on the same
window

96
CONT…

97
Previ Next End
E-Mail : abiti.hana@gmail.com

MANAGING USERS AND GROUPS


 You have to create user accounts on each server when someone
joins your organization and remove those accounts when someone
leaves.
 Users have to provide a user name and password each time
someone accesses resources on a different server. When it’s time
to change users’ passwords, users must do so on each server
Prepared by: Abenezer A.

98
Previ Next End
E-Mail : abiti.hana@gmail.com

INTRODUCTION TO THE USER ACCOUNT


 A user Account provides a user with the ability to log
on to the domain to gain access to network resources or
to log on to a computer to gain access to resource on
that computer
Prepared by: Abenezer A.

99
Previ Next End
CONT…
E-Mail : abiti.hana@gmail.com

Types of User Account


1. Local user accounts

2. Domain user accounts

3. Built-in user account


Prepared by: Abenezer A.

100
Previ Next End

1. LOCAL USER ACCOUNTS


E-Mail : abiti.hana@gmail.com

 Is an account that allows users to log on at and gain


access to resource on only the computer where you create
the local user account

 Do not create local user account on computer that


require access to Domain resources, because the domain
Prepared by: Abenezer A.

does not recognize local user account properties or assign


access permissions for domain resources unless he or she
connects to the local computer using the Action menu on
the computer management console
101
Previ Next End
E-Mail : abiti.hana@gmail.com

USE OF LOCAL USER ACCOUNTS


 Provide access to resources on the local computer

 Are created in the local security database

Similarly certain built in local groups are:


Administrators,
Users, Guests, and
Backup operators.
Prepared by: Abenezer A.

102
Previ Next End
E-Mail : abiti.hana@gmail.com

2. DOMAIN USER ACCOUNTS

 Domain user accounts allow users to log on to the domain

and gain access to resources anywhere on the network.

The user provides his or her user name and password

during the logon process.


Prepared by: Abenezer A.

 You create a domain user account in a container or an

organizational unit(OU)in the copy of the active Directory

Database(called the Directory) on a domain controller


103
Previ Next End

USE OF DOMAIN USER ACCOUNTS


E-Mail : abiti.hana@gmail.com

 Provide access to network resources

 Provide the access token for authentication

 Are created in Active Directory on a domain controller

The example of certain built in domain groups are:


Account Operators,
Prepared by: Abenezer A.

Administrators,
Backup Operators,
Network Configuration Operators,
Performance Monitor Users, and
Users.
104
Previ Next End
E-Mail : abiti.hana@gmail.com

3. BUILT-IN USER ACCOUNTS

 Is an account which is created automatically


creates accounts called built-in accounts.

 Two commonly used built-in accounts are


Administrator and Guest
Prepared by: Abenezer A.

105
Previ Next End
E-Mail : abiti.hana@gmail.com

USER PROFILES
 The system creates a user profile the first time that a
user logs on to a computer.

 At following logons, the system loads the user's profile,


and then other system components configure the user's
environment according to the information in the profile.
Prepared by: Abenezer A.

106
Previ Next End
E-Mail : abiti.hana@gmail.com

TYPES OF USER PROFILES

1. Local User Profiles

2. Roaming User Profiles

3. Mandatory User Profiles

4. Temporary User Profiles


Prepared by: Abenezer A.

107
Previ Next End
E-Mail : abiti.hana@gmail.com

1. LOCAL USER PROFILES

 A local user profile is created the first time that a


user logs on to a computer.

 The profile is stored on the computer's local hard


disk.

 Changes made to the local user profile are specific


Prepared by: Abenezer A.

to the user and to the computer on which the


changes are made.

108
Previ Next End
E-Mail : abiti.hana@gmail.com

2. ROAMING USER PROFILES


 A roaming user profile is a copy of the local profile
that is copied to, and stored on, a server share.
 This profile is downloaded to any computer that a
user logs onto on a network. Changes made to a
roaming user profile are synchronized with the
Prepared by: Abenezer A.

server copy of the profile when the user logs off.


 The advantage of roaming user profiles is that
users do not need to create a profile on each
computer they use on a network.
109
Previ Next End
E-Mail : abiti.hana@gmail.com

3. MANDATORY USER PROFILES

 A mandatory user profile is a type of profile that


administrators can use to specify settings for users.

 Only system administrators can make changes to


mandatory user profiles. Changes made by users to
desktop settings are lost when the user logs off.
Prepared by: Abenezer A.

110
Previ Next End
E-Mail : abiti.hana@gmail.com

4. TEMPORARY USER PROFILES

 A temporary profile is issued each time that an


error condition prevents the user's profile from
loading. Temporary profiles are deleted at the end
of each session, and changes made by the user to
desktop settings and files are lost when the user
Prepared by: Abenezer A.

logs off. Temporary profiles are only available on


computers running Windows 2000 and later.

111
Previ Next End

DYNAMIC HOST CONFIGURATION OF


E-Mail : abiti.hana@gmail.com

PROTOCOL (DHCP)

 DHCP needs to be assign IP dynamically for

client by server computer.

Advantage
Prepared by: Abenezer A.

 To be absence repeated of Address or host

number as well as need to ordered users

112
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next
End

113
Previ Next End

HOW TO TEST DHCP


E-Mail : abiti.hana@gmail.com

 To test this, Windows Server 2008 DHCP server. To


be safe, I have no other devices on this network
segment.

 I did an IPCONFIG /RELEASE then an


IPCONFIG /RENEW and verified that I received
Prepared by: Abenezer A.

an IP address from the new DHCP server, as you


can see below:

114
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

CONT….
End

115
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

CONT…
End

116
Previ Next End

FILE TRANSFER PROTOCOL (FTP)


E-Mail : abiti.hana@gmail.com

 Is a standard network protocol used to transfer computer files from one


host to another host over a TCP-based network, such as the Internet.

 Is a protocol for exchanging files over the Internet. FTP uses the Internet's
TCP/IP protocols to enable data transfer.

 A member of the TCP/IP suite of protocols, used to copy files between two
computers on the Internet. Both computers must support their respective
Prepared by: Abenezer A.

FTP roles: one must be an FTP client and the other an FTP server.

 FTP is most commonly used to download a file from a server using the
Internet or to upload a file to a server.

 It use 21 port number throughout internet.

117
Previ Next End

WEB SERVER(IIS)
E-Mail : abiti.hana@gmail.com

 Is a member server which helps as to manage and control the file


which is created by HTML, XHTML ASP language with the given
specific port number 80 with the given protocol (HTTP/HTTPS).

 Web servers a computer that is maintained by a system administrator or


internet service provider (ISP) and that responds to requests from a
user's browser.
Prepared by: Abenezer A.

 Provide information to user on the internet

 Distribute application to user over the internet instead of through


physical media, such as CD, flash disk, floppy disk and other external

memory.

118
Previ Next End

DIFFERENCE BETWEEN FTP&WEB


WEB Server FTP Server

 Web server is just a server  FTP stands for File Transfer


that hosts web pages. Protocol. This creates a
connection between computers
 Uses HTTP (Hypertext to allow uploading and
Transfer Protocol ) downloading of files.
HTTPS(secured) which is a
 Use TCP /IP protocol which
set of rules used to control help to send and receive simple
how multimedia, code and files.
text based files are give up  Once connected you can
via web browsers served browse through the files in your
from a local or remote web FTP client and basically drag
servers. and drop them to your side.
 Used 80 port number.  Use 21 port number.

119
Previ Next End

CONT..
 HTTP is a protocol used by the  While the FTP protocol is
World Wide Web that allows
used to transfer files from a
the transfer of files from a web
server to a user’s web browser computer to and from an
for viewing web pages on the FTP server. FTP facilitates
Internet. the transfer of files from one
 HTTP transfers only web page computer to another.
content to the browser so as to
view it. The transferred file is  FTP, on the other hand,
not saved in the memory space. transfers the whole file to the
HTTP does not require a another computer, and the
password and user name to
file is saved in memory.
access the server to transfer
files. 12
0
Previ Next End

CONT..
 HTTP is faster and more efficient  Whereas the FTP protocol
for transferring smaller files. requires authentication.
HTTP is able to use a single
connection to transfer multiple  While FTP is faster and more
files, efficient in transferring larger
 HTTP only transfers the contents files.
of a web page into a browser for  While FTP requires a new
viewing. connection to be created with
 HTTP is a one-way system as files each file transfer.
are transported only from the
server onto the workstation’s  FTP is a two-way system as
browser. The files are transferred files are transferred back and
but not downloaded, therefore not forth between server and
copied into the memory of the workstation
receiving device. 12
1
Previ Next End

DOMAIN NAME SYSTEM (DNS)


E-Mail : abiti.hana@gmail.com

 Domain Name System (DNS) is a naming system based


on a distributed database used in Transmission Control
Protocol/Internet Protocol (TCP/IP) networks to
translate computer names to Internet Protocol (IP)
addresses.

 DNS is most commonly associated with the Internet.


Prepared by: Abenezer A.

However, private networks use DNS extensively to


resolve computer names and to locate computers
within their local networks and the Internet.

Maryhelpcollege.com TO 192.168.11.1
122
Previ Next End

DNS PROVIDES THE FOLLOWING BENEFITS:


E-Mail : abiti.hana@gmail.com

 DNS names are user-friendly, which means that


they are easier to remember than IP addresses.
 DNS names remain more constant than IP
addresses. An IP address for a server can change,
but the server name remains the same.
 DNS allows users to connect to local servers using
Prepared by: Abenezer A.

the same naming convention as the Internet.


 Generally DNS is used for translating host
names to IP addresses and the reverse.

123
Previ Next End

PRINT SERVER
E-Mail : abiti.hana@gmail.com

 It is a server that use to centralize printing job. It helps


network administrator control who can and to specify it
availability time in that network which save printer resource
and cost.

 Print servers can be used to save costs by utilizing one


printing device for multiple workstations as opposed to
Prepared by: Abenezer A.

individual printers.

124
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 A print server, or printer server, is a device that


connects printers to server computers over a network. It
accepts print jobs from all client computers and sends the jobs
to the appropriate printers.

 A print server may be a networked computer with one or more


shared printers. Alternatively a print server may be a
Prepared by: Abenezer A.

dedicated device on the network, with connections to the


LAN and one or more printers.

125
Previ Next End

Advantage and Disadvantage of shared printer


E-Mail : abiti.hana@gmail.com

: users can not move from place to place to find


printer and to printer their document.
: save cost that incurred to buy printer for each
user of the company which need to have printer.
administrator to control the printer and simple to
upgrade the networked printer.
Prepared by: Abenezer A.

 Some times it is disadvantageous because proprietary


commands are not usable Restricts user fr.om using printer
personally.
 May have data traffic.
126
Previ Next End
E-Mail : abiti.hana@gmail.com

It is a server option which helps us to take a backup of the


whole computer information or a single drive. File server also
used to take backup but it takes only shared folders file.

We can take a backup of our data in to two ways

 Whole computer information backup

 Single drive backup


Prepared by: Abenezer A.

We do not need to install the backup server, we use through


accessory of server computer or client computer.

127
Previ Next End

CONT….
E-Mail : abiti.hana@gmail.com

 Is a feature helps us to make a backup or a copy of


the original document for the safety of the original
data.

 Helps us to protect our operating system, volume,


files, and application data and data can be saved
Prepared by: Abenezer A.

to single or multiple disks, DVD, removable media,


or remote shared folders. They can be schedule to
run automatically or manually.
128
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next
End
Previ Next End

INSTALL DNS ON WINDOWS SERVER 2003


E-Mail : abiti.hana@gmail.com

Before installing and configuring DNS on our server we have to perform

some preliminary tasks. Specifically, we have to configure the server with

a static IP address and a DNS suffix. The suffix will be used to fully-

qualify the server name. To begin:

 When the Internet Protocol (TCP/IP)

window comes up, enter an IP address ,

subnet mask and default gateway IP


Prepared by: Abenezer A.

addresses that are all compatible with

your LAN.

 Our LAN is on a 192.168.1.0/24 network,

so our settings are as follows:

130
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 3. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This
tells the server to use its own DNS server service for name resolution, rather
than using a separate server. After filling out those fields , click the Advanced
button.

 4. When the Advanced TCP/IP Settings window comes up, click the DNS tab,
enter firewall.test on the DNS suffix for this connection text field, check
Register this connection's address in DNS , check Use this connection's
DNS suffix in DNS registration , and click OK , OK , and then Close
Prepared by: Abenezer A.

131
Previ Next End
CONT..
E-Mail : abiti.hana@gmail.com

 Now that we have configured our server with a static IP


address and a DNS suffix, we are ready to install DNS. To
do this:
1. Go to Start > Control Panel > Add or Remove Programs .
2. When the Add or Remove Program window launches, click
Add/Remove Windows Components on the left pane.
3. When the Windows Components Wizard comes up, scroll down
Prepared by: Abenezer A.

and highlight Networking Services and then click the Details


button.
4. When the Networking Services window comes up, place a check
mark next to Domain Name System (DNS) and click OK and
OK again.
132
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next
End

133
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 Note that, during the install, Windows may generate


an error maintaining that it could not find a file
needed for DNS installation. If this happens, insert
your Windows Server 2003 CD into the server's
CD-ROM drive and browse to the i386 directory.
The wizard should automatically find the file and
Prepared by: Abenezer A.

allow you to select it. After that, the wizard should


resume the install.

134
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 After this, DNS should be successfully installed. To launch


the DNS MMC, go to Start > Administrative Tools > DNS
Prepared by: Abenezer A.

135
Previ Next End

CONT…
E-Mail : abiti.hana@gmail.com

 On the left pane of the DNS MMC, there is a server


node with three nodes below it, titled Forward
Lookup Zones, Reverse Lookup Zones and Event
Viewer.

 The Forward Lookup Zones node stores zones that are


used to map host names to IP addresses, whereas the
Prepared by: Abenezer A.

Reverse Lookup Zones node stores zones that are used


to map IP addresses to host names.

136
Previ Next End

SETTING UP A CACHE-ONLY DNS SERVER


E-Mail : abiti.hana@gmail.com

 A cache-only DNS server contains no zones or


resource records. Its only function is to cache
answers to queries that it processes, that way if the
server receives the same query again later, rather
than go through the recursion process again to
answer the query, the cache-only DNS server would
Prepared by: Abenezer A.

just return the cached response, thereby saving time.

 With that said, our newly installed DNS server is


already a cache-only DNS server!
137
Previ Next End

CREATING A PRIMARY FORWARD LOOKUP ZONE


E-Mail : abiti.hana@gmail.com

 With its limited functionality, a cache-only DNS server is


best suited for a small office environment or a small
remote branch office. However, in a large enterprise where
Active Directory is typically deployed, more features
would be needed from a DNS server, such as the ability to
store records for computers, servers and Active Directory.
The DNS server stores those records in a database, or a
zone .
DNS has a few different types of zones, and each has a
Prepared by: Abenezer A.


different function. We will first create a primary forward
lookup zone titled firewall.test . We do not want to name it
firewall.cx , or any variation that uses a valid top-level
domain name, as this would potentially disrupt the
clients' abilities to access the real websites for those
domains. 138
Previ Next End

STEPS TO CREATE FORWARD LOOKUP ZONES


E-Mail : abiti.hana@gmail.com

1. On the DNS MMC, right-click the Forward Lookup


Zones node and choose New Zone .
2. When the New Zone Wizard comes up, click Next .
3. On the Zone Type screen, make sure that Primary zone
is selected and click Next .
4. On the Zone Name screen, type firewall.test .
5. On the Zone File screen, click Next .
Prepared by: Abenezer A.

6. On the Dynamic Update screen, make sure that “ Do not


allow dynamic updates ” is selected and click Next .
7. On the next screen, click Finish .
We now have a foundation that we can place resource records
in for name resolution by internal clients.
139
Previ Next End

CREATING A PRIMARY REVERSE LOOKUP ZONE


E-Mail : abiti.hana@gmail.com

 Different to the forward lookup zone, a reverse


lookup zone is used by the DNS server to resolve IP
addresses to host names. Not as frequently used as
forward lookup zones, reverse lookup zones are often
used by anti-spam systems in countering spam and
by monitoring systems when logging events or issues.
Prepared by: Abenezer A.

To create a reverse lookup zone:

140
Previ Next End

STEPS TO CREATING A PRIMARY REVERSE LOOKUP ZONE


E-Mail : abiti.hana@gmail.com

1. On the DNS MMC, right-click the Reverse


Lookup Zones node and choose New Zone .
2. When the New Zone Wizard comes up, click Next .
3. On the Zone Type screen, make sure that Primary
zone is selected and click Next .
4. On the Reverse Lookup Zone Name screen, enter
192.168.1 and click Next .
5. On the Zone File screen, click Next .
Prepared by: Abenezer A.

6. On the Dynamic Update screen, make sure that “Do


not allow dynamic updates” is selected and click
Next .
7. On the next screen, click Finish .

141
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next

CONT…
End

142
Previ Next End

Exercise 1: Installing and Configuring the DNS


E-Mail : abiti.hana@gmail.com

Service
1. Open the Configure Your Server Wizard by selecting
Start _ Administrative Tools _ Configure Your Server.
2. Click Next to dismiss the Welcome screen and click
Next again to dismiss the Preliminary Steps screen.
3. Click the DNS Server item in the Server Role list and
click Next to continue.
4. Click Next on the Summary page to complete the
DNS installation.
5. The Configure A DNS Sever Wizard automatically
Prepared by: Abenezer A.

appears. Click Next to dismiss the Welcome screen.


6. Select the Create Forward And Reverse Lookup
Zones radio button and click Next to
continue. If you want to create a caching-only server,
you can select the Configure Root Hints Only option.
143
Previ Next End

8. If not already selected, select the Primary Zone option


E-Mail : abiti.hana@gmail.com

and the Store The Zone In Active Directory option. Click


Next when you are ready.
9. Enter sybex.com in the Zone Name field and click Next
to continue.
10. Select the Allow Only Secure Dynamic Updates radio
button and click Next.
11. If not already selected, select No, Don’t Create A
Reverse Lookup Zone Now and click Next to continue.
12. If not already selected, select the No, It Should Not
Prepared by: Abenezer A.

Forward Queries radio button and click Next to continue


13. Click Finish to end the wizard. The Configure Your
Server wizard reappears and in forms you that the DNS
service was successfully installed. Click the Finish
button.
144
Prepared by: Abenezer A. E-Mail : abiti.hana@gmail.com
Previ
Next
End

145

You might also like