Saturday, April 3, 2010

Lesson 4

Configuring and Managing the DNS Server Role

DNS Domain Name System

Windows Server 2008 includes both DNS and Windows Internet Naming System (WINS) name resolution services to allow 2008 computers to translate between human-readable names, which are easier for us humans to understand and remember then IP addresses but they are necessary for TCP/IP communications.
The DNS namespace is hierarchical and based on a unique root that can have any number of subdo-mains. A Fully Qualified Domain Name (FQDN) is the name of a DNS host in this namespace indicating the host’s location relative to the root of the DNS domain tree. An example of an FQDN is host1.subdomain.microsoft.com. The top level is com The Second level domain is microsoft.com which are registered to individuals or organizations. Then second level domains have many subdomains and any domain can have hosts. A host is a specific computer or network device with in a domain such as a computer.
DNS names and the DNS protocol are required for Active Directory domains and for compatibility with the Internet.
A DNS zone is a contiguous portion of a namespace for which a server is authoritative. A server can be authoritative for one or more zones, and a zone can contain one or more contiguous domains. A DNS server is authoritative for a zone if it hosts the zone, either as a primary or secondary DNS server. Each DNS zone contains the resource records it needs to answer queries for its portion of the DNS namespace.

There are several types of DNS servers: primary, secondary, master name, and caching-only.

• A DNS server that hosts a primary DNS zone is said to act as a primary DNS server. Primary DNS servers store original source data for zones. With Windows Server 2003, you can implement primary zones in one of two ways: as standard primary zones (zone data is stored in a text file) or as an Active Directory–integrated zone (zone data is stored in the Active Directory database).
• A DNS server that hosts a secondary DNS server is said to act as a secondary DNS server. Secondary DNS servers are authoritative backup servers for the primary server. The servers from which secondary servers acquire zone information are called masters.
• A caching-only server forwards requests to other DNS servers and hosts no zones, but builds a cache of frequently requested records.

A DNS zone is a collection of host name-to-IP address mappings for hosts in a contiguous portion of the DNS namespace. Contiguous meaning that is, connected by a parent child relationship. For each DNS domain name included in a zone, the zone becomes the authoritative source for information about that domain. These zones are stored in text files or within active directory. Recommended is to have a primary and secondary zone to provide fault tolerance if one of the servers fail. There are four Standard Zones, Standard primary, Standard secondary, Reverse lookup and Stub zones.

• The Standard primary zone hosts a read/write copy of the DNS zone in which resource records are created and managed.
• The Standard secondary zone is a copy of the Standard primary zone. These are copied from the in what is called a zone transfer which can be a full zone transfer (called an AXFR) or an incremental zone transfer (called an IXFR) which only sends updates from the Standard primary zone.
• The reverse zone is a zone which gives the ability to lookup either by IP address or DNS name.
• The Stub zone is a pointer the DNS server that is authoritative for that zone, and it is used to maintain or improve DNS resolution efficiency.

Active Directory – Integrated zones has the following benefits:

• Fault tolerances keeping redundant copies stored on multiple servers.
• Security DNS stored in active directory you can modify the discretionary access control list (DACL). DACL enables you on specify which users and groups may modify the DNS zones.
• These Zones are multi-master meaning that zones can be updated in more than one location.
• Replication is efficient zone transfers are replaced by more efficient Active Directory replication.
• Maintain the use of secondary zones by transferring which can also be transferred in to secondary zones similar to the way file-backed secondary zones are transferred.

DNS Resource Record is the information that is related to the DNS Domain; the host record defining a host IP address and are represented in binary form in packets. Typical Resource record fields are Owner, TTL(time to live), Class, Type and RDATA(Resource Record Data). The following are the different types of resource records:

• SOA(Start of Authority) This record indicates the starting point of the authority for information stored in a zone. It is the first record created when creating a zone and contains zone specific information used for maintaining the zone. It’s RDATA fields are, Authoritative Server, Responsible Person, Serial Number, Refresh, Retry, Expire, and Minimum TTL.
• A(Host) Record maps FQDN to an IPv4 IP address and AAAA(Host) Record maps FQDN to an IPv6 IP address.
• PTR Record performs the reverse function of the A resource record by mapping an IP address to FQDN.
• NS (Name Server) Record identifies a DNS server that is authoritative for a zone; that is, a DNS server that hosts a primary or secondary copy of the DNS zone in questions.
• MX(Mail Exchanger) Record specifies a server that is configured to act as a mail server for a DNS name.
• CNAME (Canonical Name/Alias) Record creates an alias for a specified FQDN. You ca use CNAME records to hide the implementation details of your network from the clients connecting to it.
• SRV (Service Locator) Record enables you to specify the locations of servers that provide a specific network server over a specific protocol and in a specific domain.

The DNS Name Resolution Process starts and passes the query to h the local DNS resolver client service for resolution. If the query cannot be resolved locally it is sent to the preferred DNS server as configured in the clients TCP/IP properties. IF the query does not match an entry in cache the resolution process continues with the client querying a DNS server to resolve the name.

When a query is sent to a DNS the following are the most common responses:

• Authoritative answer is a positive answer returned to the client and delivered with the authority bit set in the DNS message to indicate the answer was obtained from a server with direct authority for the queried name.
• Positive answer can consist of the queried resource record or a list of featured records that fits the queried DNS domain name and record type specified in the query message.
• Referral answer contains additional resource records not specified by the name or type in the query.
• Negative answer is where an authoritative server reported that the queried name exsists but no records of the specified type exist for that name.

Root hints contain the names and IP addresses of the DNS servers authoritative for the root zone. By default, DNS Servers use root hints file, called cache.dns on MS Servers. The DNS Server service must be configured with root hints to resolve queries for names that it is not authoritative for or for which it contains no delegations.

Recursion is one of the two process types for DNS name resolution. A DNS client will request that a DNS server provide a complete answer to a query that does not include pointers to other DNS servers, effectively shifting the workload of resolving the query from the client to the DNS server. The iterative type of query keeps the workload on the client going from one server to the next to get it name resolution. For the DNS server to perform recursion properly, the server needs to know where to begin searching for names in the DNS namespace. This information is provided by the root hints file, cache.dns, which is stored on the server computer.

A DNS server on a network is designated as a forwarder by having the other DNS servers in the network forward the queries they cannot resolve locally to that DNS server. Conditional forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.

Sunday, March 7, 2010

Lesson 3

Configuring and Managing the DHCP Server Role

DHCP is a simple, standard protocol that makes TCP/IP network configuration much easier for the administrator by dynamically assigning IP addresses and providing additional configuration information to DHCP clients automatically. It is based heavily on BOOTP but rather than pushing preconfigured parameters to the expected clients, DHCP can dynamically allocate and reclaim IP addresses from a pool of IP addresses. DHCP is an open, industry-standard protocol reducing the complexity of administering networks based on TCP/IP. It is defined by IEFT (Internet Engineering Task Force) in RFC (Request for Comments) 2131 and 2132. DHCP functions at the application layer of the OSI (Open System Interconnection) model, as defined by ISO (International Organizations for Standardization) and the ITU-T (International Telecommunication union ) Telecommunications Standards Section.

Four Key Benefits of DHCP
• Centralized administration of IP configuration
• Dynamic host configuration
• Seamless IP host configuration
• Flexibility and scalability

Additional configuration information is provided in the form of options and can be associated with reserved IPs to a vendor or user class, to a scope, or to an entire DHCP server.

APIPA is useful for providing addresses to single-segment networks that do not have a DHCP server.

DHCP Terminology

• DHCP client – Computer on the network obtaining information from the DHCP server.
• DHCP server – Computer on the network providing DHCP configuration to clients.
• DHCP lease – This defines the duration for which the DHCP lease to the client. The lease duration can be between 1 minute and 999 days. The default lease is eight days.

DHCP Message Types

• DHCPDISCOVER – Sent by the client to locate a DHCP Server.
• DHCPOFFER – Sent by the DHCP server in response to DHCPDICOVER with the offered configuration parameters.
• DHCPREQUEST – Sent by the client to signal acceptance of the offer (DHCPOFFER) from the DHCP server.
• DHCPDECLINE – Sent by the client to the DHCP Server, informing that the offer has been declined.

• DHCPACK – Sent by the DHCP server to the client to confirm.
• DHCPNACK - Sent by the DHCP server to the client to deny the DHCPREQUEST.
• DHCPRELEASE - Sent by the client to a DHCP server to relinquish an IP address and cancel the remaining lease.
• DHCPINFORM - Sent by the client to a DHCP server to ask only for additional local configuration parameters.

D.O.R.A. Discover (DHCPDISCOVER), Offer (DHCPOFFER), Request (DHCPREQUEST), Acknowledge (DHCPACK) is the process between the client and the DHCP server.
DHCP Scope The Scope determines which IP Addresses are allocated to clients. You can configure as many scopes on a DHCP server as needed for your environment.
DHCP Reservation: These are reserved IP addresses for hosts that need to have a static IP address. Examples are e-mail servers, and application servers. These are set up using the MAC address of the DHCP client computer so only the client with that address will get that reserved address.
DHCP Maintenance: Because DHCP is a key component in your organization, you must manage and monitor it. DHCP management consists of backing up and restoring the database as well as reconciling, compacting, and, in some cases, removing the database.

Wednesday, March 3, 2010

Lesson 2

Installing Microsoft Windows Server 2008

Installing and Initial Server Configuration:

Best practices when installing Windows Server 2008 recommends installing the software onto which type of media fresh (media that has never been used before) or previously used media(media containing existing files). If Windows Server 2008 is installed onto a disk partition containing a previous version of Windows, the files will be preserved but the software will not be usable. Note: The Windows Server 2008 distribution media contains a bootable system that can be used for a standalone software installation or to repair an existing installation.
Once you have installed Windows 2008 Server the software will automatically launch the ICT Initial Configuration Tasks. You should go through all of these tasks (Administrator password, time zone, windows update, networks settings, adding server roles and features …). Note: By default, the Windows Firewall is turned on. It is also especial important to download and apply any that have been released since the creation of the media you are using to install.

When setting up your network connection keep in mind a server usually has a static IP address so you will also need to manually setup the DNS address information.

Network discovery finds and accesses other computer and resources shared on the network. Warning if you inappropriately allow network discovery in a public network such as at a wireless café, you would be allowing anyone to access file shares on your system.

Configuring Server Roles:

To improve security and manageability of Windows 2008 Servers you use the Server Manager console to install one or multiple server roles. To reduce the attach surface on Windows 2008 computers, system files(executables and DLL files) associated with a particular role will not be installed on a server until not be install until the role is installed, instead of leaving unused software lying dormant on the server as a potential target for a network virus or worm. This also keeps the system/server cleaner to run these applications.

Configuring Server Storage:

Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks, basic and dynamic.

Basic disks use partition tables that are recognized and supported by older operating systems. All disks in a windows 2008 server start out as basic until they are converted to dynamic disks.

Dynamic disks provide access to advance configuration features.

Windows Server 2008 allows you to configure various types of storage including RAID-0, RAID-1, and RAID-5 storage arrays.
A volume describes a logical unit of space that is made up of space contained on one or more physical disks.

A simple volume is type of volume consists of free space contained on a single physical disk. You can configure all of the available space on a disk as a simple volume, or you can configure multiple simple volumes using the space on a single disk.

A spanned volume is made up of free space from multiple physical disks. For example, if you have two physical disks in a server that are each 500GB in size, you can combine them into a single spanned volume that is 1TB in size.

A striped volume is similar to a spanned volume in that it is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks, thus improving the read performance of the volume.

A mirrored volume is a fault tolerant volume consisting of two physical disks, in which the data on one disk is copied exactly on to the second disk.

A RAID-5 volume is also a fault tolerant volume where data in interleaved across three or more disks much in the same way as a stripe volume, but with additional information know as parity. If on disk in RAID-5 fails, the data on the failed disk can be rebuilt using the parity information stored on the other disks in the rest of the volume. A max of 32 disks can be used in this type volume.

When creating a new partition you can either assign the patrician a drive letter, or else you can configure a mount point that will appear as a folder within the existing drive letter.

Before you can manage a disk drive in Windows 2008 Server the disk needs to be initialized. With either of the two following styles:

MBR (Master Boot Record) – this partition style is recognized by down level operating systems.

GPT (GUID Partition Table ) – this partition style is recommended for disks larger than 2TB, or disks that are used in Itanium computers.

Installing Server Core:
The server core is introduced as a new option in 2008 for installing only the services required for a specific function/role (DHCP, DNS, file Server or domain controller) and takes up an extremely small footprint. The installation process for Server Core is identical to the installation of a full version of Windows Server 2008. Once a Server Core computer is installed, however, it can be managed locally using only command-line utilities and the limited GUI facilities installed on a Server Core computer. A Server Core computer will allow you to launch the Windows Registry Editor, Notepad, and a number of Control Panel applets. However, it does not include a Start menu and does not allow you to install or run any of the MMC consoles, such as Computer Management or Active Directory Users and Computer.

Sunday, February 28, 2010

Lesson 1

Introduction to Networking Concepts

TCP/IP: The most commonly used network protocol on modern networks is the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. TCP/IP Protocols were developed by the Department of Defense–ARPANET (1960s). Its purpose is to share data/talk to other computes and only share/talk to computers that we trust and want to allow access. TCP/IP is not just one protocol but a collection of specialized protocols/subprotocols. TCP/IP has become the protocol of choice and both Microsoft and NetWare/Novell use it as their default protocol.

IP Versions

IPv4: Addressing Networks recognize two addresses: Logical (Network layer) IP address assigned dynamically or manually, and the Physical (MAC, hardware) address is static, assigned by the manufacture. The IPv4 protocol handles logical addressing. The IP address contains specific parameters (unique 32-bit number, divided into four octets, and separated by periods). Example: 192.168.1.99. The addresses are then further divided in classes. The first octet specifies the network class you are using on your network.

Classes:
A 1-126 00000001 - 01111111 Subnet Mask 255.0.0.0
B 128-191 10000000 - 10111111 Subnet Mask 255.255.0.0
C 192-223 11000000- 11011111 Subnet Mask 255.255.255.0
D 224-230 11100000-11101111 Reserved for Multi Casting Video Conferencing
E 240-254 11110000-11110111 Testing and Research

IPv6: Addressing is the next generation of IP addressing that is gradually replacing IPv4. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. Most new development of applications, servers, and network devices support it. Advantages are a more efficient header, better security, better prioritization provisions, automatic IP address configuration, and it also adds billions of additional IP addresses. IPv6 enhances security through the use of IPSec, where as in IPv4 it is an optional feature.

DNS (Domain Name System): TCP/IP addressing is made up of numbers which are not easily remembered by most humans. Therefore a naming system was established. Which takes the host/device or domain IP address and gives it a common name such as Host Name “SERVER” or Domain Name “procomps.com”. The DNS (Domain Name System) relies on many computers across the globe. These computers are related in hierarchical and distributed manners, with 13 computers, known as root servers, so DNS will not fail if there are a handful of the servers experiencing errors. Thus, when changing your DNS for a mail server, it can take up to 24 hours for all DNS servers in the system to update. Reasons to use DNS for its scalability, transparency ease of use and simplicity. The components of DNS are namespace, zones, name servers and resource records.



Dynamic Host Configuration Protocol (DHCP): Each host on a TCP/IP network needs to be configured with a unique IP address. Network administrators can use the Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addresses to multiple client computers. DHCP is a simple, standard protocol that makes TCP/IP network configuration much easier for the administrator by dynamically assigning IP addresses and providing additional configuration information to DHCP clients automatically. Clients may also be configured to use APIPA or an alternate static IP address configuration if DHCP is unavailable. To support and use the DHCP service across multiple subnets, routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in RFC 1542.

Five Benefits of DHCP:
• Centralized administration of IP configuration
• Dynamic host configuration
• Seamless IP host configuration
• Scalability
• Flexibility

DHCP relay agents eliminate the need to have a DHCP server on every subnet. The DHCP relay agent listens for DHCPDISCOVER, DHCPREQUEST and DHCPINFORM which messages that are broadcast from the client?

Using the Routing and Remote Access Service: The Routing and Remote Access service provides the ability to use a Windows Server 2008 computer as a router, which passes network traffic from one TCP/IP network to another, as well as remote access capabilities using either dial-up or VPN technology. This routing service included with Windows Server 2008 is better suited for a smaller networks.

Network Access Protection (NAP)
Network Access Protection (NAP) is a new feature in Windows Server 2008. NAP allows administrators to enforce network security policies, such as mandatory anti-virus or firewall configuration.

Thursday, January 21, 2010

Blog Intro

My Name is Danny C

I'm taking the class to pass the Microsoft Exam 70-291 . Currently the company Progressive Components I have been working for the past 11 years has moved from a Netware(GroupWise, iFolder, ) environment to a internal and hosted Microsoft environment. My company is now requiring me to get my Microsoft Certified Systems Administrator(MCSA) over the next year and I think this class will help me prep for the exams. I look forward to learning more along with refining my networking skills.