執行、管理和維護網路設備

執行、管理和維護網路設備

《執行、管理和維護網路設備》是2008年由世界圖書出版公司出版的圖書,作者是(美國)麥金 (美國)麥克林

基本介紹

  • 書名:執行、管理和維護網路設備
  • ISBN:9787506292467
  • 出版社:世界圖書出版公司
  • 出版時間:2008年6月1日
圖書信息,作者簡介,內容簡介,目錄,

圖書信息

出版社: 世界圖書出版公司; 第1版 (2008年6月1日)
平裝: 1362頁
正文語種: 英語
開本: 16
ISBN: 9787506292467
條形碼: 9787506292467
尺寸: 22.8 x 18.8 x 4.6 cm
重量: 1.4 Kg

作者簡介

作者:(美國)麥金 (美國)麥克林

內容簡介

《執行、管理和維護網路設備》教您如何安裝和配置TCP/IP和使用DHCP來管理IP定址;如何配置和管理DNS客戶端,伺服器和區域;如何管理路由和遠程訪問,包括VPNs;最新的操作更新與Windows伺服器更新服務(WSUS)和安裝後的安全性更新(PSSU);實施和管理安全程式,並使用SP1增強安全性;以及如何排除連線故障,解決伺服器問題等。並通過系統的課程、動手實踐、排除故障實驗、問題檢查以及官方考試準備指南,為您在MCP考試70-291和求職道路上提供王牌的學習指導平台。 為 Windows Server 2003 的核心 MCSA/MCSE 考試部分——更新測試 70-291 進行深入的考試準備,同時為您構築實際的工作技能。套件包括 300 道練習題、例題研習、問題診斷、試用軟體、考試折扣以及其他豐富內容。

目錄

Part 1 Learn at Your Own Pace
1 Introducing a Windows Server 2003 Network lnfrastructure
2 Understanding TCP/IP
3 Monitoring and Troublesh00ting TCP/IP Connections
4 Configuring DNS Servers and Clients
5 Configuring a DNS Infrastructure
6 Monitoring and Troublesh00ting DNS
7 Configuring DHCP Servers and Clients
8 Monitoring and TroubIesh00ting DHCP
9 Routing with Windows Server 2003
10 Configuring and Managing Remote Access
11 Managing Network Security
12 Maintaining a Network Infrastructure
Part 2 Prepare for the Exam
13 Implementing,Managing,and Maintaining IP Addressing(1.0)
14 Implementing,Managing,and Maintaining Name Resolution(2.0)
15 Implementing,Managing,and Maintaining Network Security(3.0)
16 Implementing,Managing,and Maintaining Routing And Remote Access(4.0)
17 Maintaining a Network Infrastructure(5.0)
Practices
ConfiguringTCP/IP Addresses
Learning to Work with Address Blocks
Working with Subnet Masks and Subnets
Using Network Monitor
Running Network Diagnostics and Netdiag
Capturing Name Resolution Traffic
Installing a DNS Server
Configuring a Primary DNS Suffix
Configuring a DNS Server to Perform Recursion
Comparing NetBI0S and DNS Name Resolution Traffic
Verifying SRV Resource Records for Active Directory in DNS
Deploying a Secondary DNS Server
Creating a Zone Delegation
Deploying a Stub Zone
Using IDNS Troubleshooting Tools
Installing and Configuring a DHCP Server
Performing a Manual Backup of the DHCP Server
Creating a New Superscope
Analyzing DHCP Messages
Enabling and Configuring Routing And Remote Access
Configuring Demand-Dial Routing
Installing and Configuring NAT
Creatinga Dial-Up Access Server
Deploying Remote Access
Configuring a VPN
Deploying a RADlUS Server
Creating and Using the Security Configuration
And Analysis Console
Using Network Security Protocols
Troubleshoot IPSec with IPSec Monitor
Troubleshoot Logon Issues with Network Monitor
Use Event Logs for Troubleshooting
Sampling Performance
Troubleshooting an Internet Connection
Configuring Services
Tables
Table 2-1:Subnet Mask Notations Compared
Table 2-2:Private Address Ranges
Table 2-3:The Powers of 2
Table 2-4:Subnet Mask Octet Values
Table 2-5:Memorizing Common Subnet Masks
Table 2-6:Subnet Address Ranges for Basic Subnetting Scenarios
Table 2-7:Traditional Options for Subnetting a/24 Address Block
Table 2-8:Variable-length Subnet IDs
Example:Requirement=6 subnets
Requirement=9 subnets
Requirement=3 subnets
Requriement=20 hosts per subnet
Requirement=9 subnets
Requirement=3 subnets
Requriement=20 hosts per subnet
Table 3-1:Network Monitor Versions
Table 3-2:Network Monitor Capture Window
Table 3-3:Netdiag Tests
Table 4-1:Computer Names and Name Suffixes
Table 4-2:Comparison of NetBIOS and DNS Names
Table 4-3:Typical Resource Record Fields
Table 4-4:FQDNs of a Multihomed Host
Table 5-1:Zone Replication Optiorls
Table 5-2:Default DNS Installation Settings
Table 5-3:Name-Checking Methods
Table 6-1:Command-Line Options Available with Set
Table 6-2:DNS Performance Counters
Table 8-1:DHCP Header Fields
Table 8-2:DHCP Server Log Fields
Table 8-3:Log Event Codes 50 and Above
Table 9-1:Comparing Static and Dynamic Routing
Table 9-2:Comparison of Translated Connections Features
Table 10-1:Authentication Protocol Features
Table 10-2:Authentication Protocol Support
Table 10-3:Encryption Types
Table 11-1:Groups in the Built-in Container in Active Directory
Table 11-2:Groups in the Users Container In AD
Table 11-3:Built-in Local Groups
Table 11-4:Security Templates
Table 11-5:Security Options for Improving Network Security
Table 11-6:Netcap Syntax
Table 12-1:Helpful Counters
Table 12-2:Repair Actions
Troubleshooting Labs
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Case Scenario Exercises
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 12

相關詞條

熱門詞條

聯絡我們