Home
Part II: Building Your Own Network
Contents
1. aS Figure 18 10 Manually sharing a folder OK cona Ao Advanced Sharing x M Share this folder Limit the number of simultaneous users to w777 Figure 18 11 JE Setting the share name x ce roo Chapter 18 Managing Network Storage 2 13 If you want to specify permissions now click the Permissions button This brings up a dialog box that lets you create permissions for the share For more information see the next section Granting permissions Click OK The folder is now shared Granting permissions When you first create a file share all users are granted read only access to the share If you want to allow users to modify files in the share or allow them to create new files you need to add additional permissions Here s how to do this via the Share and Storage Management console 1 Choose Start gt Administrative Tools gt Share and Storage Management The Share and Storage Management console appears Right click the share you want to set permissions for choose Properties and then click the Permissions tab The dialog box as shown in Figure 18 12 appears This dialog box lets you set the permissions for the share itself or the NTFS permissions for the folder being shared Click the Share Permissions button The dialog box as shown in Figure 18 13 appears This dialog box lists all the users and groups to whom you
2. 2 14 Part Ill Getting Connected Figure 12 10 The HR Web site appears in the IIS Manager eS 6 In the Host Header text box enter the exact DNS name you want to use for the site For example enter hr lowewriter pri 7 Click OK The newly created Web site appears beneath the Sites node in the IIS Manager as shown in Figure 12 10 8 Close the IIS Manager 9 Create a Web page to display in the folder you created in Step 1 For this example I used Notepad to create a text file named default htm with the following text lt HTML gt lt BODY gt lt H1l gt Welcome to the HR Web Site lt H1 gt lt BODY gt lt HTML gt 10 Choose Start gt Administrative Tools gt DNS This brings up the DNS Manager as shown in Figure 12 11 11 In this example I navigated to LoweWriter pri Inthrnet Information Services 11S Manager In the navigation pane navigate to the node for your domain Go gt senvenot gt sites gt HR gt Die View Hep C HR Home 83 O e paa ika H B Sites 4 Default web site ms om 2 tal E D a o Authentication Compression Default Directory Document Browsing es 4 8 amp F Frroe Pages Handler HTTP ISAPI Filters Mappings Respo i JE F a Logging MIME Types Modules Output Caching Rules SSL Settings aj Eej Ready frstart E internet information Bvt Browse Web Sit
3. cscccssssssesseesscesscssscesscenscessecssesssesseesneesaness 229 Using a Virtual Private Network 0 cccceccccesssscsseeeeeeeeneecseeesseeessneessaees 231 Table of Contents xiii Part IV Network Management For Dummies 233 Chapter 16 Welcome to Network Management 235 What a Network Administrator Does cccccecesseeseeeeseeeeeeeeeeeeeeseeneeaees 235 Picking a Part Time Administrator and Providing the Right Resources ecceeseceseeeeseeeeeeeeesneessneeeeseeees 237 Documenting the Network ssi s 00 i00s erie kiden he sedaeseeiviieaiide tees 238 Performing Routine Chores ccccceccesceseesesseeeeceeceeeeseeseeseceeeeeeeeseeseeaeens 239 Maniasing Network US6rs iii sissescscetscsssscesseesoeedovevsasasesancdansesiiansendersecouecesctees 240 Acquiring Software Tools for Network Administrators c c008 241 Building a LIDKANy sveisecsscisvcssvacesssseciissecnedsanegidysseestoestiers RAS EGRE 243 Pursuing Certification cccccccecscssesssesseceeeessessecssecssecseeceseesseeseeeseeeseees 244 Chapter 17 Managing Windows User Accounts 245 Understanding Windows User ACCOUNMS ccsccceseeeseeeesseeseeeeseneessnees 245 Local accounts versus domain ACCOUMS ceseeseceseeeteeteeeeneeees 245 User AC COUNE Properties x si 2 0cs2eseeses esectcewsncvdeesteedaeenadedoutesecsgsoneceaee 246 Creating a New Usel ovseint ennie oeer r E E
4. Networking Learn to Get More and Do More at Dummies com Start with FREE Cheat Sheets cee Cheat Sheets include Ge e Checklists e Charts Common Instructions e And Other Good Stuff To access the Cheat Sheet created specifically for this book go to www dummies com cheatsheet networking Get Smart at Dummies com Dummies com makes your life easier with 1 000s of answers on everything from removing wallpaper to using the latest version of Windows Check out our e Videos e Illustrated Articles e Step by Step Instructions Plus each month you can win valuable prizes by entering our Dummies com sweepstakes Want a weekly dose of Dummies Sign up for Newsletters on Digital Photography e Microsoft Windows amp Office e Personal Finance amp Investing e Health amp Wellness e Computing iPods amp Cell Phones e eBay e Internet e Food Home amp Garden Find out HOW at Dummies com Sweepstakes not currently available in all countries visit Dummies com for official rules Networking FOR DUMMIES OTH EDITION by Doug Lowe Wiley Publishing Inc Networking For Dummies 9th Edition Published by Wiley Publishing Inc 111 River Street Hoboken NJ 07030 5774 www wiley com Copyright 2010 by Wiley Publishing Inc Indianapolis Indiana Published by Wiley Publishing Inc Indianapolis Indiana Published simultaneously in Canada No part of this publication may be re
5. ceeecceseeeseeeseceeeeseeeseeeeeeeeeeeneesnes 116 Understanding Network Address Translation cecceseesseseeeeeeeeeeees 116 Configuring Your Network for DHCP ccceceesseseeeeeseeeeeeeeeeeeeeeseseeneeaes 117 Understanding DHCP esinte ae tances aR aR ies ETEEN 117 DHCP SeryerS ooieoe r E E R ied eaeedeeaecne 118 Understanding SCOP S sesceisi iesenii eieiaeo sieuas piisi 119 Feeling excluded siisii sepeser erroreren esisi ii 120 Reservations suggested 0 0 eeccecesccesseeceseeceseeeseneeseseesseeeseeeneeess 120 How long to lease scence aser ca e R 121 Managing a Windows Server 2008 DHCP Servel c cccccssesseesteeseeees 122 Configuring a Windows DHCP Client cccceesceseeeseeseesseeseeeeseeeeeeseeees 124 USINE DNS sssrin eneee E les tdae udder casadestactcasrsuaecsteasanePeetdzaveaate 125 Domains and domain NAMES sissien iii i 125 Fully qualified domain naMes ce eeesseeseeseceneceneeeseeeseeeeeenneesaes 127 Working with the Windows DNS Servel c cescesesseeseeeeeeeeeseeeeseeseeeees 128 Configuring a Windows DNS Client cccccesceeseeseeeeeseeeeeeeeeeeeeeeeeeaeeaes 129 Chapter 7 Setting Up a Server 0 00c eee e eee eee eee 131 Network Operating System Features cccceceeseeseeseeseeeeeeeeeeeeseeseeeeaeees 131 Network SUPPOFt ssi fesseis detect cszacesdesachedeeeetacetedescncncdeseevadedenve stench these 132 Pile Sharing S CVICES scrissi ireset s
6. 7 Click OK The group is created Adding a member to a group Groups are collections of objects called members The members of a group can be user accounts or other groups When you create a group it has no members As a result the group isn t useful until you add at least one member Follow these steps to add a member to a group 1 Log on as an administrator You must have administrator privileges to perform this procedure Chapter 17 Managing Windows User Accounts 2 5 7 2 Choose Start gt Administrative Tools Active Directory Users and Computers The Active Directory Users and Computers management console appears 3 Open the folder that contains the group to which you want to add members and then double click the group The Group Properties dialog box appears 4 Click the Members tab The members of the group are displayed as shown in Figure 17 9 fis rroveries TE General Members Member Of Managed By es Figure 17 9 Adding members to a group Lx aa Aah e 5 Type the name of a user or other group that you want to add to this group and then click Add The member is added to the list 6 Repeat Step 5 for each user or group that you want to add Keep going until you ve added everyone 7 Click OK That s all there is to it ar The Group Properties dialog box also has a Member Of tab that lists each group that the current group is a member of 258 Part IV
7. File sharing o Of When file sharing is on files and printers that you have shared from this computer can be accessed by people on the network Turn on file sharing Turn off fije sharing Seeako l Apply 2 Opt Public folder charing Printer shanng w ar Ea Figure 3 4 Enabling file and printer sharing in Windows 7 Chapter 3 More Ways to Use Your Network 45 Enabling File and Printer Shaving Windows 7 Here are the steps to enable file and printer sharing 1 Click the Start button type Advanced Sharing Settings and press Enter This step opens the Advanced Sharing Settings page which lists net work settings for each of the networks you re connected to For a home computer two networks are listed Home or Work and Public For a computer connected to a domain network a third network named Domain is listed 2 Click the down arrow next to the network you want to enable file and printer sharing for For a home computer click the down arrow next to Home or Work For a computer connected to a domain network click the down arrow next to Domain Figure 3 4 shows the settings for a Domain network The settings for a Home or Work network are the same Do not enable file or printer sharing for the Public network fore teal yi e Network and Sharing Center Advanced sharing settings 4g Search Contrat Pane pl Change sharing options for different network profiles Wi
8. Share Cancel Chapter 3 More Ways to Use Your Network 4 9 5 Click the arrow in the drop down list choose Everyone and then click Add This action designates that anyone on your network can access the shared folder If you prefer you can limit access to just certain users To do so select each person you want to grant access to and then click Add 6 Select the level of access you want to grant each user You can use the drop down list in the Permission Level column to choose from three levels of access e Reader A reader can open files but can t modify or create new files or folders e Contributor A contributor can add files to the share but can change or delete only her own files e Co Owner A co owner has full access to the shared folder He can create change or delete any file in the folder 7 Click Share A confirmation dialog box appears to confirm that the folder has been shared Using the Public Folder in Windows Vista and Windows 7 Windows Vista and Windows 7 include an alternative method of sharing files on the network the Public folder The Public folder is simply a folder that s designated for public access Files you save in this folder can be accessed by other users on the network and by any user who logs on to your computer Before you can use the Public folder you must enable it In Windows 7 just follow the steps listed in the section Enabling File and Printer Sharing Windo
9. ear lier in this chapter 2 After you re sure that all users have logged off shut down the net work server Behave like a good citizen if possible decently and in order For Windows servers choose the Start Shut Down command 298 Part IV Network Management For Dummies ar RY NING Windows Server doesn t let you shut down the server without providing a reason for the shutdown When you press Ctrl Alt Delete a dialog box appears requiring you to provide the reason for the shutdown 3 Reboot the server computer or turn it off and then on again Watch the server start up to make sure that no error messages appear 4 Tell everyone to log back on and make sure that everyone can now access the network Remember this advice when you consider restarting the network server Restarting the network server is more drastic than restarting a client computer Make sure that everyone saves their work and logs off the network before you do it You can cause major problems if you blindly turn off the server computer while users are logged on Obviously restarting a network server is a major inconvenience to every network user Offer treats Looking at Event Logs One of the most useful troubleshooting techniques for diagnosing network problems is to review the network operating system s built in event logs These logs contain information about interesting and potentially troublesome events that occur during the d
10. A detailed inventory of your computer equipment Table 16 1 provides a sample checklist you can use to keep track of your computer equipment A System Information printout for each computer Choose Start All Programs dAccessories System Tools System Information A detailed list of network shares and standard drive assignments Don t just list the name of each network share provide a brief descrip tion of each share s purpose as well Any other information that you think may be useful Give details about how you must configure a particular application program to work with the network and copies of every network component s original invoice just in case something breaks and you need to seek warranty service Backup schedules Include a schedule of when each server is backed up NNG and an explanation of the tape rotation schedule Never put passwords in the binder Chapter 16 Welcome to Network Management 239 Table 16 1 Computer Equipment Checklist Computer location User Manufacturer Model number Serial number Date purchased CPU type and speed Memory Hard drive size Video type Printer type Other equipment Operating system version Application software and version Network card type MAC address aS Even if you keep track of the information in your network binder by using a spreadsheet or database program keep a printed copy
11. Network performance problems are among the most difficult network prob lems to track down and solve If a user simply can t access the network it usually doesn t take long to figure out why The cable is unplugged a net work card is malfunctioning or the user doesn t have permission to access the resource for example After you do a little investigating the problem usu ally reveals itself and you fix it and move on to the next problem 2 78 Part IV Network Management For Dummies Unfortunately performance problems are messier Here are just a few reasons that network administrators hate performance problems Performance problems are difficult to quantify Exactly how much slower is the network now than it was a week ago a month ago or even a year ago Sometimes the network just feels slow but you can t quite define exactly how slow it really is Performance problems usually develop gradually Sometimes a net work slows down suddenly and drastically More often though the network gradually gets slower a little bit at a time until one day its users notice that the network is slow Performance problems often go unreported Users gripe about the problem to each other around the water cooler but they don t for mally contact you to let you know that the network seems 10 percent slower than usual As long as they can still access the network they just assume that the problem is temporary or that they re imagining
12. au v Fie Server Distributed File System _ DFS Namespaces C DES Replication File Server Resource Manager vices for Network File System ows Search Service _ File Replication Service LJ Indexing Service indaws Server 2003 File Services Description manages shared folders and enables users to access files on this computer from the network lt Previous Next gt instal Cancel 150 Partit Building Your Own Network 5 Select the services you want to install Again you can select each service to see a brief text description of the service For example if you select the File Server service the following text is displayed File Server manages shared folders and enables users to access files on this computer from the network 6 Click Next A confirmation page appears listing the roles and services you ve selected 7 Click Install Windows installs the server role and its services A progress screen is displayed during the installation so you can gauge the installation s progress When the installation finishes a final results page is displayed 8 Click OK You re done Chapter 8 Configuring Windows XP Vista and 7 Clients In This Chapter Configuring network connections for Windows clients Setting the computer name description and workgroup Joining a domain Setting logon options Be your network setup is complete you must configure the n
13. s notice By break I don t neces sarily mean to physically break in two Although some broken cables look like someone took pruning shears to the cable most cable problems aren t visible to the naked eye You can quickly tell whether the cable connection to the network is good by looking at the back of your computer Look for a small light located near the spot where the cable plugs in if this light is glowing steadily the cable is good If the light is dark or it s flashing intermittently you have a cable prob lem or a problem with the network card or the hub or switch that the other end of the cable is plugged into Chapter 20 Solving Network Problems 29 If the light isn t glowing steadily try removing the cable from your computer and reinserting it This action may cure the weak connection Hopefully your network is wired so that each computer is connected to the network with a short six feet or so patch cable One end of the patch cable plugs into the computer and the other end plugs into a cable connector mounted on the wall Try quickly disconnecting and reconnecting the patch cable If that doesn t do the trick try to find a spare patch cable that you can use 1 Switches are prone to having cable problems too especially switches that are wired in a professional manner involving a rat s nest of patch cables Be careful whenever you enter the lair of the rat s nest If you need to replace a p
14. 1 Make sure that your computer and all devices attached to it are plugged in Computer geeks love it when a user calls for help and they get to tell that person that the computer isn t plugged in or that the power strip it s plugged into is turned off They write it down in their geek logs so that they can tell their geek friends about it later They may even want to take your picture so that they can show it to their geek friends Most accidents involving computer geeks are a direct result of this kind of behavior Try to be tactful when you ask a user whether he s sure that the computer is turned on 2 Make sure that your computer is properly connected to the network 3 Note any error messages that appear on the screen 4 Check the free disk space on your computer and on the server When a computer runs out of disk space or comes close to it strange things can happen Sometimes you get a clear error message indicating such a situation but not always Sometimes the computer just grinds toa halt operations that used to take a few seconds now take a few minutes Do a little experimenting to find out whether the problem is indeed a network problem or just a problem with the computer itself See the section Time to Experiment later in this chapter for some simple things that you can do to isolate a network problem Try restarting the computer An amazing number of computer problems are cleared up by
15. All that changed a few years ago when cellular providers began adding data capabilities to their networks Now cellphones can have complete mobile Internet access This has resulted in sophisticated PDA features being added to mobile phones and phone features being added to PDAs so that the dis tinctions are now blurred The term mobile device is used to describe a wide assortment of devices that you can hold in one hand and that are connected through a wireless network The term handheld is a similar generic name for such devices The following list describes some of the more common specifics of mobile devices Mobile phone A mobile phone or cellphone is a mobile device whose primary purpose is to enable phone service Most mobile phones include features such as text messaging address books appointment calendars games and may provide Internet access Smartphone A smartphone is a mobile phone with advanced features that aren t typically found on mobile phones There s no clearly drawn line between mobile phones and smartphones One distinction is whether the phone can provide integrated access to corporate e mail The screen on a smartphone is typically bigger than the screen on a traditional cellphone but the device still resembles a cellphone with a keyboard located beneath the screen Personal Digital Assistant PDA A PDA is a handheld device whose main function is to provide Personal Information Management PIM application
16. In most cases you re better off using a dedicated firewall router because these devices provide better security fea tures than the built in Windows firewall does Still the built in firewall is suit able for home networks or very small office networks Here are the steps that activate the built in firewall in Windows XP or Vista 1 Choose Start gt Control Panel The Control Panel appears 2 Click the Windows Firewall icon This step opens the Windows Firewall dialog box Figure 10 2 shows the Windows Vista version 3 Select the On Recommended option This option enables the firewall 4 Click OK That s all there is to it MP Windows Firewall Settings xe General Exceptions Advanced Windows Frewal can help prevent hackers or malicous software from gaining access to your Computer through the Internet or a network vu On recommended This setting blocks al outside sources from connecting to this computer except for those unblocked on the Exceptions tab Block all incoming connections Select this opton when you Connect to less secure networks Al exceptions wil be ignored and you wil not be notified when Windows Firewall blocks programs X Off not recommended Avoid using ths setting Turning off Windows Firewall wil make this computer more vulnerable to hackers or malicous software iW 1 Tellme more about these sermos Ca Cons For Windows 7 the procedure is a bit diff
17. Lets the user access her Exchange mailbox from a Web browser rather than from an Outlook client With this fea ture enabled the user can read e mail from any computer that has an Internet connection POP3 Enables Internet e mail using the POP3 protocol 1 IMAP4 Enables Internet e mail using the IMAP4 protocol Herter Caen Creare Seni a ee ie Garsas Aeiteas tecocerd Profle Teiphorea Cigencotce Ema Adder d l a a a Feb Ta F i Ee a ra dim d7 Ure inba hieman Erabied f misd Roiorara Enabled J Putas iP adc be Crab amg peaa chal meu a POP Ernabksj aisy prakanana aP Eval uira rakini hed il aay pa Figure 11 3 bia The brimi igang a p r ie prepre Exchange Features tab The Exchange Advanced tab The Exchange Advanced tab as shown in Figure 11 4 lets you configure vari ous advanced features of Exchange The following list describes these features Simple Display Name Lets you specify a display name that s used by computers that can t display the full display name You probably won t have to mess with this unless you have computers that can t display ASCII characters Hide from Exchange Address Lists Select this option to prevent this user from appearing in address lists This option is useful for mailboxes that you don t want to be widely known Downgrade High Priority Mail Bound for X 400 This option is compat ible with the original X 400 standard which w
18. Pause Printing Choose the same command again to release the job from its state of frustration and print it out already a Chapter 2 Life on the Network 39 To delete a print job Select the job and choose Document Cancel Printing To stop the printer Choose Printer Pause Printing To resume choose the command again To delete all print jobs Choose Printer Purge Print Documents To cut to the front of the line Drag to the top of the list the print job that you want to print All these tips apply to your print jobs only Unfortunately you can t capri ciously delete other people s print jobs The best thing about Windows printer management is that it shelters you from the details of working with different network operating systems Whether you print on a NetWare printer a Windows 2003 network printer or a shared Windows printer the Printer window icon manages all print jobs in the same way Logging Off the Network MBER we amp After you finish using the network log off Logging off the network makes the network drives and printers unavailable Your computer is still physically connected to the network unless you cut the network cable with pruning shears it s a bad idea don t do it but the network and its resources are unavailable to you Here are a few other tips to keep in mind when you log off After you turn off your computer you re automatically logged off the network After you star
19. Public network location settings v Turn on Windows Firewall Block all incoming connections including those in the list of allowed programs V Notify me when Windows Firewall blocks a new program x Tum off Windows Firewall not recommended PCS Figure 10 3 Activating the firewall in Windows 7 E n geGancetos E 92 Part Ill Getting Connected I also recommend you leave the Notify Me When Windows Firewall Blocks a New Program option enabled That way you ll be notified when the firewall blocks a suspicious program 6 Click OK The firewall is enabled Note that the firewalls included with Windows Vista and Windows 7 have additional options you can configure However I recommend against fiddling with those options unless you ve taken an upper division college course in computer security Do not enable the Windows Internet firewall if you re using a separate firewall router to protect your network Because the other computers on the network are connected directly to the router and not to your computer the firewall doesn t protect the rest of the network Additionally as an unwanted side effect the rest of the network will lose the capability of accessing your computer Beginning with Windows XP Service Pack 2 the firewall is turned on by default If your computer is already behind a firewall disable the Windows firewall that s enabled by Service Pack 2 Chapter 11 Managing E Mail with Exchange
20. Terminal Services Profle come General Address Account Profile Telephones Orpanizaton P Teodore Oever CS Last name Geaver Display name theodore Cleaver OK ance Apply Help The following sections describe some of the administrative tasks that you can perform via the various tabs of the User Properties dialog box Changing the user s contact information Several tabs of the User Properties dialog box contain contact information for the user 1 Address Lets you change the user s street address post office box city state zip code and so on Telephones Lets you specify the user s phone numbers Organization Lets you record the user s job title and the name of his boss Setting account options The Account tab of the User Properties dialog box as shown in Figure 17 6 features a variety of interesting options that you can set for the user From this dialog box you can change the user s logon name In addition you can change the password options that you set when you created the account and set an expiration date for the account Chapter 17 Managing Windows User Accounts 2 5 eaoreCeaver onertice TE MemberOf Diolin Environment Sessions Remote control TemmnalServicesProiie come General Address Account Profle Telephones Organization LoweWriter pri 7 User logan name pre Windaws 2000 LOWEWRITERS tcloav
21. The Physical Layer doesn t define any particular meaning for those signals other than the basic binary values 0 and 1 The higher levels of the OSI model must assign meanings to the bits transmitted at the Physical Layer One type of Physical Layer device commonly used in networks is a repeater A repeater is used to regenerate signals when you need to exceed the cable length allowed by the Physical Layer standard or when you need to redis tribute a signal from one cable onto two or more cables An old style 10BaseT hub is also a Physical Layer device Technically a hub is a multi port repeater because its purpose is to regenerate every signal received on any port on all the hub s other ports Repeaters and hubs don t examine the contents of the signals that they regenerate If they did they d be working at the Data Link Layer not at the Physical Layer Which leads me io DE Layer 2 The Data Link Layer The Data Link Layer is the lowest layer at which meaning is assigned to the bits that are transmitted over the network Data link protocols address things such as the size of each packet of data to be sent a means of address ing each packet so that it s delivered to the intended recipient and a way to ensure that two or more nodes don t try to transmit data on the network at the same time as Figure 30 1 Displaying the MAC address of your network adapter Chapter 30 Layers of the OSI Model 39 7 The Data
22. This part is all about network security backing up your data protecting your network from evil people who want to break your network s back and hardening your network against threats such as viruses and spyware Part VI Beyond Windows There s more to networking than Windows That s why this part focuses on the two most popular alternatives Linux and Macintosh Part VII The Part of Tens This wouldn t be a For Dummies book without a collection of lists of interest ing snippets ten networking commandments ten things you should keep in your closet ten big network mistakes and more Icons Used in This Book MBER C Re NING Those nifty little pictures in the margin aren t there just to pretty up the place They also have practical functions Hold it technical details lurk just around the corner Read on only if you have a pocket protector Pay special attention to this icon it lets you know that some particularly useful tidbit is at hand perhaps a shortcut or a little used command that pays off big Did I tell you about the memory course took Danger Will Robinson This icon highlights information that may help you avoid disaster 5 6 Networking For Dummies 9th Edition Where to Go from Here Yes you can get there from here With this book in hand you re ready to plow right through the rugged networking terrain Browse through the Table of Contents and decide where y
23. an exclusion range lets you punch a hole in a scope The IP addresses that fall within the hole aren t assigned Here are a couple of reasons to exclude IP addresses from a scope The computer that runs the DHCP service itself must usually have a static IP address assignment As a result the address of the DHCP server should be listed as an exclusion You may want to assign static IP addresses to your other servers In that case each server IP address should be listed as an exclusion Reservations are often a better solution to this problem as I describe in the next section Reservations suggested In some cases you may want to assign a specific IP address to a particular host One way to do this is to configure the host with a static IP address so that the host doesn t use DHCP to obtain its IP configuration However two major disadvantages to that approach exist TCP IP configuration supplies more than just the IP address If you use static configuration you must manually specify the subnet mask default gateway address DNS server address and other configuration information required by the host If this information changes you have to change it not only at the DHCP server but also at each host that you configured statically ar ar Chapter 6 Dealing with TCP IP 2 You must remember to exclude the static IP address from the DHCP server s scope Otherwise the DHCP server doesn t know about the static addr
24. and E Each of the first three classes A through C uses a different size for the net work ID and host ID portion of the address Class D is for a special type of address called a multicast address Class E is an experimental address class that isn t used The first four bits of the IP address are used to determine into which class a particular address fits If the first bit is a zero the address is a Class A address If the first bit is one and the second bit is zero the address is a Class B address If the first two bits are both one and the third bit is zero the address is a Class C address If the first three bits are all one and the fourth bit is zero the address is a Class D address If the first four bits are all one the address is a Class E address 170 Partit Building Your Own Network Because Class D and E addresses are reserved for special purposes I focus the rest of this discussion on Class A B and C addresses Table 6 1 summa rizes the details of each address class Table 6 1 IP Address Classes Class Address Starting Length of Number of Number of Range Bits Network ID Networks Hosts 1 126 x y z 0 8 126 16 777 214 B 128 191 x y z 10 16 16 384 65 534 C 192 223 x y z 110 24 2 097 152 254 Class A addresses Class A addresses are designed for very large networks In a Class A address the first octet of the address is the network ID and the remaining three octets are the host ID Because onl
25. confidential files 322 configuration settings troubleshooting 292 Confirm Installation Selections page 208 209 Connect To dialog box 163 connections checking 290 291 connectors 89 90 97 99 contact information user 250 330 contributor permission level 49 co owner permission level 49 copy backups 314 cordless phones 171 counters performance 285 Create Samba Share dialog box 370 crimp tool 87 89 90 crossover cables 91 CSMA CD carrier sense multiple access with collision detection 170 custom attributes 197 cycles per second 167 168 Index 403 e o daily backups 310 314 daisy chaining 91 94 96 DAT digital audio tape 310 data encryption 135 Data Link Layer OSI model 396 397 data theft 322 database servers 71 Datacenter version Windows Server 2008 136 decimal system 106 dedicated line 187 default gateway address 120 default Web site 210 211 deleting files 18 delivery options 194 delivery restrictions 194 Dell PowerVault NF500 260 desktop GNOME 359 Device Manager 66 DHCP Dynamic Host Configuration Protocol configuring for WAP 179 DNS client configuring 129 exclusions 120 lease duration 121 122 overview 117 118 reservations 120 121 scopes 119 120 servers 118 119 123 Windows client 124 for Windows Server 2008 122 124 DHCP Client service 296 DHCP management console 123 124 DHCP options 118 diagnostic commands 241 242 diagram network 72 73 238 d
26. dedicated versus peer to peer servers 69 diagrams drawing 72 73 infrastructure 71 72 inventory of current computers 65 68 need for network analyzing 64 65 NOS choosing 71 overview 63 64 sample plans 73 78 server types 69 71 plenum cable 85 PocketPC 222 pointer PTR record 128 POP3 protocol 196 ports 94 339 340 power management 154 PowerQuest PartitionMagic program 356 PowerVault NF500 Dell 260 prefabricated cables 86 Preferred Networks section Properties dialog box 180 Presentation Layer OSI model 399 Print command 34 Print dialog box 37 print queue 37 39 print servers 70 print spooling 34 279 Printer Sharing option Network and Sharing Center 43 printers 34 39 50 53 66 374 Printers and Faxes folder 51 52 Printers folder 35 52 printouts System Information 238 private IP address 116 117 processor 65 280 Product Activation feature Microsoft 146 product key 141 144 profile user 252 253 programs See also specific programs by name browsing network from 29 30 inventory 68 licenses 390 Linux 352 manuals 302 memory leak 286 sharing 13 14 properties user account 246 Properties dialog box folder 271 273 hard drive size 66 67 Mobile Services 223 224 network protocols 66 Offline Files tab 60 scope 123 sharing folders 46 48 sharing printers 51 53 TCP IP 124 129 User 193 196 249 253 Windows network connections 152 156 158 wireless peer 180 181 protoco
27. ing procedures show you how to work with a DHCP server in Windows Server 2008 The procedures for other operating systems are similar If you haven t already installed the DHCP server on the server open the Manage Your Server application choose Start Administrative Tools Manage Your Server click Add or Remove a Role select DHCP Server from the list of roles click Next and then complete the New Scope Wizard to create the first scope for the DHCP server This wizard asks you to enter a name and description for the scope Then it asks for the basic IP address range information for the scope as shown in Figure 6 2 Add Scope x A scopeis arange of possible IP addresses for a network The DHCP server cannot fully distribute IP addresses to clients until a scope is created Scope Name ffice Starting IP Address pasim Ending IP Address fisz 168 250 Subnet Mask 255 255 2550 Defauit Gateway optional fisz 0tt i S Subnet Type Wired lease duration willbe 6 days IV fActivate thes scope Coax J u After you enter the starting and ending IP addresses for the range and the subnet mask used for your network click OK The wizard then asks for any IP addresses you want to exclude from the scope the lease duration the default is 8 days the IP address of your gateway router the domain name for your network and the IP addresses for the DNS servers you want the Chapter 6 Dealing with TC
28. ingenious network managers at large companies figured out that although the Web is interesting for distributing public information to the world the Web is even better for distributing private information within a company Thus the idea of intranets was born An intranet is a network that s built by using the same tools and protocols that are used by the global Internet but applied instead to an organization s internal network 204 Part Ill Getting Connected ar Think of an intranet as a small private version of the World Wide Web Anyone who connects to your local area network LAN can access your intranet The intranet is accessed by using a Web browser such as Internet Explorer or Firefox However users don t need an Internet connection because the information on the intranet is stored on the company s server computers rather than on a computer that must be accessed from the Internet The intranet is analogous to a closed circuit television system which can be viewed only by people within the organization that owns the system In con trast the Internet is more like cable television in that anyone who s willing to pay 20 or so per month can watch Here are two interesting but contradictory points of view about the signifi cance of intranets 1 Some computer industry pundits say that intranets are more popular than the Internet For example many companies that sell Web develop ment tools make more money selling soft
29. network should be able to connect to your cabled network Figure 9 3 shows how an access point acts as a central connection point for wireless computers and how it bridges your wireless network to your wired network Infrastructure mode When you set up a wireless network with an access point you re creating an infrastructure mode network It s called infrastructure mode because the access point provides a permanent infrastructure for the network The access points are installed at fixed physical locations so the network has relatively stable boundaries Whenever a mobile computer wanders into the range of one of the access points it has come into the sphere of the network and can connect Notebook E rer II T 1 1 1 L NEI Wireless 10BaseT R E Access Switch Point Notebook Computer Wireless Network 10BaseT Network Chapter 9 Wireless Networking 1 15 An access point and all the wireless computers that are connected to it are referred to as a Basic Service Set or BSS Each BSS is identified by a Service Set Identifier or SSID When you configure an access point you specify the SSID that you want to use The SSID is often a generic name such as wireless or it can be a name that you create Some access points use the MAC address of the WAP as the SSID Multifunction WAPs ay Wireless access points often include other built in features For example some access point
30. new user Sa 2 Right click the domain that you want to add the user to and then choose New User This summons the New Object User Wizard as shown in Figure 17 2 3 Type the user s first name middle initial and last name As you type the name the New Object User Wizard automatically fills in the Full Name field Active Directory Users and Computers let x Fle Action View Help es Alm CORI ocslbmsanrae Active Directory Users and Comput Name Description Duilt in account for admini E D Saved Queries E j LoweWriter pri Members in this group can E Bult Members of this group are 5 Computers Members in this group can Members who have admini Members who have view DNS Administrators Group DNS cients who are permi Designated administrators All workstations and serve All domain controllers in th Al domain guests All domain users Designated administrators Members of this group are Members in this group can Built in account for guest Buft n account for anony Servers in this group can Members of this group are Designated administrators SSS a sarj 5m amp Active Directory iser eRe Bt 9 18PM New Object User 2 Create in LoweWnter pn Users User logon name Lowe Writer pri v User logon name pre Windows 2000 JLOWEWRITER 24 8 Part IV Network Mana
31. such as the operating system folders or installed program folders You can then back up those folders on a less regu lar basis The drives and folders that you select for a backup operation are collectively called the backup selection Table 22 1 How Backup Types Use the Archive Bit Backup Type Selects Files Based Resets Archive Bits on Archive Bit after Backing Up Normal No Yes Copy No No Daily No No Incremental Yes Yes Differential Yes No Selects files based on the Last Modified date Chapter 22 Backing Up Your Data 3 13 The archive bit would ve made a good Abbott and Costello routine All right I wanna know who modified the archive bit What Who No what Wait a minute just tell me what s the name of the guy who modified the archive bit Right Normal backups A normal backup or a full backup is the most basic type of backup Ina normal backup all files in the backup selection are backed up regardless of whether the archive bit has been set In other words the files are backed up even if they haven t been modified since the last time they were backed up When each file is backed up its archive bit is reset so backups that select files based on the archive bit setting won t back up the files When a normal backup finishes none of the files in the backup selection will have their archive bits set As a result if you immediately follow a n
32. this one is tough You don t want to pick something obvious like Password Administrator or your last name On the other hand you don t want to type something random that you ll later forget because you ll be in a big pickle if you forget the administra tor password ai Make up a complex password consisting of a mix of uppercase and lowercase letters some numerals and a special symbol or two then write it down and keep it in a secure location where you know that it won t get lost Networking protocols You almost always need to install the TCP IP pro tocol the Microsoft network client protocol and file and printer sharing Depending on how the server will be used you may want to install other protocols as well TCP IP configuration You need to know which IP address to use for the server Even if your network has a DHCP server to dynamically assign IP addresses to clients most servers use static IP addresses Domain name You need to know the domain name for the network Making Final Preparations Before you begin the installation take a few more steps Clean up the server s disk by uninstalling any software that you don t need and removing any old data that s no longer needed This step is especially important if you re converting a computer that s been in use as a client computer to a server You probably don t need Microsoft Office or a bunch of games on the computer after it becomes a server Do acompl
33. upgraded network 24 port 10BaseT Hub Chapter 5 Oh What a Tangled Web We Weave Cables Adapters and Other Stuff In This Chapter Getting a whiff of Ethernet Checking out the different types of network cable Installing twisted pair cable Working with hubs and switches Installing network interface cards Mulling over other devices such as repeaters bridges and routers able is the plumbing of your network In fact working with network cable is a lot like working with pipe You have to use the right pipe cable the right valves and connectors switches and routers and the right fixtures network interface cards Network cables have one more advantage over pipes You don t get wet when they leak This chapter tells you far more about network cables than you probably need to know I introduce you to Ethernet the most common system of network cabling for small networks Then you find out how to work with the cables used to wire an Ethernet network You also find out how to install a network interface card which enables you to connect the cables to your computer What Is Ethernet Ethernet is a standardized way of connecting computers to create a network Part Il Building Your Own Network L STY Rs ky gt Worthless filler about network topology A networking book wouldn t be complete without the usual textbook description of the three basic network topologies One type
34. work administration If you have more than a few dozen computers on your network consider investing in server based software that s designed to simplify the process For example Lumension www lumension com is a server based program that collects software patches from a variety of manufacturers and lets you create distributions that are automatically pushed out to client computers With software like Lumension you don t have to rely on end users to download and install patches and you don t have to visit each computer individually to install patches 348 Part V Protecting Your Network Part VI Beyond Windows The 5th Wave By Rich Tennant Ironically he went out there looking for a hot spot In this part A Ithough Bill Gates might be reluctant to admit it Windows isn t the only operating system now used on personal computers The two chapters in this part introduce you to the basics of networking with the two most popular alternatives to Windows Linux and Macintosh Chapter 25 Networking with Linux In This Chapter Finding out about Linux and how it differs from Windows Choosing which version of Linux to use for your server Installing Linux as well as configuring network settings and user accounts Using Samba to create a file server ar Lin the free operating system based on Unix is a popular alternative to Windows Server especially for specific applications such a
35. 2007 In This Chapter Creating user mailboxes Configuring Outlook to work with Exchange Viewing a different mailbox A Ithough not strictly a part of Windows Server 2008 Exchange Server 2007 is the mail server software that s used on most Windows net works Yes I know Microsoft doesn t call Exchange Server a mail server It s a messaging and collaboration server But the basic reason for Exchange Server s existence is e mail The other messaging and collaboration features are just icing on the cake In this chapter you discover how to perform the most commonly requested maintenance chores for Exchange Server such as how to create a new mailbox grant a user access to an additional mailbox and deal with mailbox size limits Managing Mailboxes When you create a new user by using the Add User Wizard from the Server Management Console an Exchange mailbox is automatically created for the new user As a result you don t usually have to create Exchange mailboxes separately But on occasion you may need to modify some aspect of a user s Exchange configuration Several tabs of the user account Properties dialog box let you manage basic mailbox settings To summon this dialog box choose Start Administrative Tools Active Directory Users and Computers Then drill down to the user 9h Part Ill Getting Connected eS Figure 11 1 The Exchange General tab pe uI account you need to modify and double click it
36. 225 IPSec 232 IPv6 Internet Protocol version 6 112 ISP Internet Service Provider 185 oK o key Windows Services 296 297 keyhole saw 88 efe labels cable 86 87 LAN local area network 11 12 103 lease duration 119 121 122 LED indicators 94 library network administrator 302 303 licenses 13 14 141 Link indicator light 94 linking drives 31 34 Linux See also Samba command shell 360 GNOME 358 359 installing 355 356 logging off 358 logging on 356 358 network configuration 362 365 overview 137 351 selecting distribution 354 355 shutting down 358 user accounts managing 360 362 versus Windows 351 353 Linux Mandriva 354 List Folder Contents permission 261 Local Area Connection properties dialog box 42 43 local area network LAN 11 12 103 local backups 316 317 local drives 26 local printer 35 local resources 21 22 local user accounts 163 245 246 locks physical 324 log files 285 logging off 39 358 logical addressing 398 logical AND operation 114 logical map 72 logical operations 107 logon 24 25 146 162 163 331 356 358 logon scripts 252 253 258 334 335 Lumension progam 347 ele MAC Media Access Control address 102 121 397 Mac OS X Server 137 372 406 Networking For Dummies 9th Edition Macintosh networking configuring Mac 373 files sharing 374 Mac OS X Server 372 network printer accessing 374 overview 371 with PCs 375 376 protocols
37. 371 372 shared files accessing 375 magazines network related 243 303 mail servers 70 mailboxes Exchange 2007 193 194 199 202 mainframe computers 17 18 Manage Your Server application 122 128 manuals 141 302 mapping network drives 31 34 55 Media Access Control MAC address 102 121 397 members adding to groups 256 257 memory 66 280 286 Microsoft Office 53 58 Microsoft Office Resource Kit 53 Microsoft Outlook 197 199 201 202 Microsoft Product Activation feature 146 Microsoft System Information program 67 Microsoft TechNet Web site 53 Microsoft Visio 72 73 238 Microsoft Windows See specific entries beginning with Windows migration path 236 mirrors 133 mobile devices 221 227 Modify permission 261 monitor computer 290 monitoring programs 284 motherboard 16 mount point 353 multiboot installation 138 139 142 multicast address 109 multifunction routers 103 118 multifunction wireless access points 175 177 multi port repeater 396 multitasking 133 multiuser operating system 352 My Computer window 4 My Network Places 29 30 eNe NAS Network Attached Storage 260 NAT network address translation 116 117 NetBoot 372 NetScout Systems Sniffer program 242 NetWare 155 347 376 network address translation NAT 116 117 network administrator certification pursuing 244 documentation 238 239 facing difficult situations 304 305 finding advice 304 keeping up with indus
38. Addresses tab The E mail Addresses tab of the User Properties dialog box as shown in Figure 11 2 displays the e mail addresses that are associated with a user account If an e mail address has been incorrectly assigned you can use this dialog box to change it Just select the incorrect e mail address click the Edit button and enter the correct e mail address You can also add or remove an e mail address from this dialog box Figure 11 2 The E mail Addresses tab SSS S Hest Can Demi Sedo fleece corel ee ee Eai l Eades bpeann bhard Eh ead hier ipp ha are deel iy ben Ta gharg the diei Hiki mi n ba lee eed bean kh Daar Peres Harr parij ee k orn raip teeth bral Ka cee See gee eet Cegerereds as mha CE news a FF dsiaaboaip upih eral echo ered on reopen pete Ce eea i jo l The Exchange Features tab Figure 11 3 shows the Exchange Features tab of the user Properties dialog box which lets you configure optional Exchange features for the user The following paragraphs describe these features Outlook Mobile Access Lets the user access Exchange data from a mobile device such as a cellphone or PDA 1 User Initiated Synchronization Lets the user start a synchronization operation which updates the mobile device s data from the data on the Exchange server Up to Date Notifications Enables automatic synchronizations 96 Part Ill Getting Connected Outlook Web Access
39. B Download and install updates Checked for Updates Never Installed Updates Never Customize This Server P Customizing your server Add roles Roles None Mal TF Donat show this window at logon Cose start 3 Gi Initial Configuration Tasks Ril 10 17PM 145 G Partit Building Your Own Network Life after Setup After the Setup program completes its duty you still have several tasks to complete before your server is ready to use The following sections describe these post installation chores Logging on After the Setup program restarts your computer for the last time you must log on to the server by using the Administrator account 1 Press Ctrl Alt Delete to open the Log On to Windows dialog box 2 Type the password you created for the Administrator account during setup 3 Click OK to log on Windows grinds and whirs for a moment while it starts up and then dis plays the familiar Windows desktop Activating Windows The Microsoft Product Activation feature is designed to prevent you from installing an illegal copy of Windows or other Microsoft software products After you install a product you have 30 days to activate it If you don t acti vate the product within 30 days it stops working To prevent that from hap pening activate the software immediately after installing it Fortunately activating a Windows server operating system is easy to do if you have a working Internet connection Wi
40. Connect using different credentials Cancel 32 Part I Let s Network SEs Figure 2 6 Browsing for the folder to map aaa 3 Optional Change the drive letter in the Drive drop down list You probably don t have to change the drive letter that Windows selects in Figure 2 5 drive Z If you re picky though you can select the drive letter from the Drive drop down list 4 Click the Browse button This step summons the dialog box as shown in Figure 2 6 Browse For Folder eS Select a shared network folder Gu Network Ml DOUGES10 4 pM SERVEROL netlogon Project sysvol jm WK09 001 5 Use the Browse for Folder dialog box to find and select the shared folder you want to use You can navigate to any shared folder on any computer in the network Click OK The Browse for Folder dialog box is dismissed and you return to the Map Network Drive dialog box refer to Figure 2 5 Optional If you want this network drive to be automatically mapped each time you log on to the network select the Reconnect at Logon check box If you leave the Reconnect at Logon check box deselected the drive letter is available only until you shut down Windows or log off the net work If you select this option the network drive reconnects automati cally each time you log on to the network Be sure to select the Reconnect at Logon check box if you use the net wo
41. FOr 0 eececeeeeceecceceeseeseeseeeeeeeeeseeseeneeaees 204 What You Need to Set Up an Intranet cccceececsseeseeesseseeeseesseeseeeseees 205 How to Set Up an IIS Web Servet ccsccsssssssessecseessesssecssesssesseesseessnees 205 How to Create a Simple Intranet Page 0 c ccc eescesecssecsseceeesseeseeeseeeseees 210 Creating Web Sites cccssssssesssssssesscescessecsseessesssesssesssessesseeseesseeesaeeaes 212 Chapter 13 Is It a Phone or a Computer Or Understanding VoIP and Convergence cccee ence een eee e eens 217 Understanding VOIP sic sistecesescecesdecssciea enik erison rinner vised RnS VETRE E E Etana 217 Advantages Of VOIP iroitti i E ETS EEEE EANES 219 Disadvantages Of VOIP 3s lt 3 ssascscecsnesissiveeesncestebeses vasdsesseaadesseatieasSausesveoadeavenaie 220 Popular VolP Providers isco seeecis oes sis snes cossctvesstovetsacdesesenswecsseaseessdscteseeveereets 220 Chapter 14 Dealing with Mobile Devices 221 The Many Types of Mobile Devices 0 cccccscsssceeeseceeseeesseeesseeessneensnees 221 Configuring Exchange for iPhone and Windows Mobile Devices 223 Configuring BlackBerry Devices cccesessesseeceeseeeeeseeseeeeseeeeeeseeseeneeaes 225 Considering Security for Mobile Devices cceseeseesseeseeseeeseeeteesseeees 226 Chapter 15 Connecting from Home 0000ee eee 229 Using Outlook Web ACCESS
42. Folders y I Saved Games J sysvol gt E Searches lt Chapter 2 Life on the Network 3 available on your network You can then click one of the computers to access its shared drives and folders Mapping Network Drives ag Figure 2 5 The Map Network Drive dialog box S way If you often access a particular shared folder you may want to use the spe cial trick known as mapping to access the shared folder more efficiently Mapping assigns a drive letter to a shared folder Then you can use the drive letter to access the shared folder as though it were a local drive In this way you can access the shared folder from any Windows program without having to browse the network For example you can map a shared folder named Data on the server named SERVERO1 Files to drive K on your computer Then to access files stored in the shared Data folder you look on drive K To map a shared folder to a drive letter in Windows 7 or Windows Vista follow these steps 1 Choose StartComputer The Computer window opens 2 Click the Map Network Drive button located on the toolbar This action summons the Map Network Drive dialog box as shown in Figure 2 5 amp Q Map Network Drive What network folder would you like to map Specify the drive letter for the connection and the folder that you want to connect to Drive Z vj Folder Browse xample server share V Reconnect at logon
43. For example Figure 2 10 shows the Print dialog box for WordPad the free text editing program that comes with Windows The available printers are listed near the top of this dialog box Choose the network printer from this list and then click OK to print your document That s all there is to it cmePint aa General Select Printer RP Xerox Phaser 6200N on SCRVEROL m Status Ready Print to fle Preferences Location r Comment Find Printer j Page Range A Number of copies 1 Pages 1 65535 ol Fnter either a single page number or a single 1 page range For example 5 12 2 3 4 3 Bit Conees Playing with the print queue After you send your document to a network printer you usually don t have to worry about it You just go to the network printer and voila your printed document is waiting for you 38 Part I Let s Network SSS Figure 2 11 Managing a print queue Dn That s what happens in the ideal world In the real world where you and I live all sorts of things can happen to your print job between the time you send it to the network printer and the time it prints 1 You discover that someone else already sent a 50 trillion page report ahead of you that isn t expected to finish printing until the national debt is paid off 1 The price of a framis valve suddenly goes up by 2 rendering foolish the recommendations you made in your report Your boss calls and te
44. HCL for short You can check the HCL for your specific server by going to the Microsoft Web site at www microsoft com whdc hcl default mspx You can also test your computer s compatibility by running the Check System Compatibility option from the Windows distribution disc The server operating system You also need a server operating system to install You need either the distri bution discs or access to a copy of them over the network In addition to the discs you need these items The product key The installation program asks you to enter the prod uct key during the installation to prove that you have a legal copy of the ar software If you have the actual CD ROM discs the product key should be ona sticker attached to the case Manuals If the operating system came with printed manuals keep them handy A startup diskette If you re installing on a brand new server you need some way to boot the computer Depending on the NOS version you re installing and the capabilities of the server computer you may be able to boot the computer directly from the distribution disc If not you need a floppy disk from which to boot the server Your license type You can purchase Microsoft operating systems on a per server or per user basis You need to know which plan you have when you install the NOS y Check the CD ROM distribution disc for product documentation and addi tional last minute information For example Windows servers have
45. However rather than connect to the public telephone network your phones connect directly to the Internet The main benefit is 2 18 Part Ill Getting Connected ar reduced cost especially if you make a lot of long distance phone calls Most VoIP services charge a single flat monthly rate usually in the neighborhood of 25 35 When you use a normal phone to make a long distance call your voice is transmitted usually in digital form over the public switched telephone net work or PSTN Along the way you re charged by the minute fees by your long distance service provider When you use VoIP your voice is still converted into digital form However rather than be sent over private networks owned by telephone companies it is sent over the Internet Because the Internet uses the IP protocol the digital data that represents your voice must be converted into packets that can be sent reliably over IP hence the name Voice Over IP or VoIP Carrying telephone conversations over the Internet isn t new In fact the technology has been around for many years Only recently has the technology become inexpensive enough to catch on for residential service That s why you may not have heard of VoIP until now There are two basic approaches to setting up VoIP 1 Software only VoIP systems These run on your computer and enable you to talk free with anyone else anywhere in the world provided they re using the same software you
46. I suggest you disable the Guest account 1 Service accounts Some network users aren t actual people I don t mean that some of your users are subhuman Rather some users are actually software processes that require access to secure resources and there fore require user accounts These user accounts are usually created automatically for you when you install or configure server software For example when you install Microsoft s Web server IIS an Internet user account called IUSR is created The complete name for this account is LUSR_ lt servername gt So if the server is named WEBI the account is named ITUSR_WEB1 IIS uses this account to allow anonymous Internet users to access the files of your Web site Don t mess with these accounts unless you know what you re doing For example if you delete or rename the IUSR account you must recon figure IIS to use the changed account If you don t IIS will deny access to anyone trying to reach your site Assuming that you do know what you re doing renaming these accounts can increase your network s security However don t start playing with these accounts until you ve researched the ramifications User rights User accounts and passwords are the front line of defense in the game of net work security After a user accesses the network by typing a valid user ID and password the second line of security defense rights comes into play In the harsh realities of
47. IIS Internet Information Services is a free component of Windows Server 2003 and 2008 but it isn t installed by default After you ve completed the installation of Windows Server you must add the Web Server role to enable 206 Part Ill Getting Connected IIS The following procedure is for Windows Server 2008 but the procedure for Windows Server 2003 is similar 1 Choose StartAdministrative ToolsServer Manager The Server Manager comes to life 2 Choose Roles in the navigation pane The roles configured for the server are displayed 3 Click Add Roles This launches the Welcome page of the Add Roles Wizard 4 Click Next The Select Server Roles page appears as shown in Figure 12 1 5 Check the Web Server IS role and then click Next The Web Server IIS page appears as shown in Figure 12 2 6 Click Next The Select Role Services page appears as shown in Figure 12 3 This page lists a variety of optional services that can be configured for IIS x Actve Directory Certificate Services eave Ose in Services G demon nsbortins setae T TORES L Active Directory Federation Services Installation Results _ Active Directory Lightweight Directory Services L Active Directory Rights Management Services C Application Server J Fax Server C Network Policy and Access Services C Print Services C Terminal Services e C UDOT Services 7 C Web Server is Figure 12 1 windows Deployment Services The Select ae
48. Let s Network ar ar That being said many software manufacturers sell their software with a con current usage license which means that you can install the software on as many computers as you want but only a certain number of people can use the software at any given time Usually special licensing software that runs on one of the network s server computers keeps track of how many people are cur rently using the software This type of license is frequently used with more specialized and expensive software such as accounting systems or com puter drafting systems Another benefit of networking is that networks enable computer users to com municate with one another over the network The most obvious way networks allow computer users to communicate is by passing messages back and forth using e mail or instant messaging programs Networks also offer other ways to communicate For example you can hold online meetings over the network Network users who have inexpensive video cameras Webcams attached to their computers can have videoconferences You can even play a friendly game of Hearts over a network during your lunch break of course Servers and Clients The network computer that contains the hard drives printers and other resources that are shared with other network computers is a server This term comes up repeatedly so you have to remember it Write it on the back of your left hand Any computer that s not a
49. Link Layer also provides basic error detection and correction to ensure that the data sent is the same as the data received If an uncorrect able error occurs the data link standard must specify how the node is to be informed of the error so it can retransmit the data At the Data Link Layer each device on the network has an address known as the Media Access Control address or MAC address This is the actual hardware address assigned to the device at the factory You can see the MAC address for a computer s network adapter by opening a command window and running the ipconfig all command as shown in Figure 30 1 In this example the MAC address identified as the physical address in the output of the network card is 00 50 BA 84 39 11 SY G WINDOWS System32 cmd exe 0 x perem fall induws IP Cunf iyurat iun Host Wane u areco 6 coeno o o Heug Primary Dns Suffix Node Type a 6 ooo Unknown IP Routing Enabled 5 Noe WINS Proxy Enabled No Ethernet adapter Local rca Connection Connection epecific DNS Suffix wei client2 atthi con Description D Link DFE S30TX PCI Adapter 2 Physical Address a o oua o 00 50 BA 84 39 11 Dhep Enabled es Autoconf iguration Enabled Yes IP Address 2 2 2 ee ee 192 168 1 1608 Subnet Mask gt o so S4 255_ 255 H Default Gateway 192 168 1 1 DHCP Server 192 168 1 1 DNE S
50. Linux system instead you must find a similar program that s written specifically for Linux Many Linux distributions come with an office suite called StarOffice which provides word processing spread sheet presentation graphics database e mail calendar and scheduling software Thousands of other programs are available for Linux Windows emulator programs the best known is Wine can run some Windows programs on Linux But the emulators run only some Windows programs and they run them slower than they would run on a Windows system Linux doesn t do Plug and Play the way Windows does Major Linux distributions come with configuration programs that can automatically detect and configure the most common hardware components but Linux doesn t have built in support for Plug and Play hardware devices You re more likely to run into a hardware configuration problem with Linux than with Windows Chapter 25 Networking with Linux 353 Linux uses a different system for accessing disk drives and files than Windows does For an explanation of how the Linux file system works see the I can t see my C drive sidebar that s coming up in this chapter Linux runs better on older hardware than the current incarnations of Windows do Linux is an ideal operating system for an older Pentium computer with at least 32MB of RAM and 2GB of hard drive space If you re fond of antiques Linux can run well on even a 486 com
51. Managemert Securty Device Settings Yau can share this pnnter with other users on ynur network The T printer will not be available when the computer is sleeping or turned off Share this printer Drivers If this printer is shared with users running different versions of Windows you may want to install additional drivers so that the A users do not have to find the print driver when they connect to the Figure 3 9 shared printer Sharing a Faen printer in MORONE PC Using Microsoft Office on a Network Microsoft Office is far and away the most popular suite of application pro grams used on personal computers and it includes the most common types of application programs used in an office a word processing pro gram Word a spreadsheet program Excel a presentation program PowerPoint and an excellent e mail program Outlook Depending on the version of Office you purchase you may also get a database program Access a desktop publishing program Publisher a set of Ginsu knives KnifePoint and a slicer and dicer ActiveSalsa This section describes the networking features of Microsoft Office System 2007 the latest and greatest version of Office Most of these features also work with previous versions of Office ay To get the most from using Office on a network you should purchase the Microsoft Office Resource Kit The Office Resource Kit also known as ORK contains information about installing and
52. Mbps Voice only 2 4 Mbps 4 Mbps Token Ring 3 16 Mbps 10BaseT Ethernet 4 20 Mbps 16 Mbps Token Ring 5 100 Mbps 2 pair 100BaseT Ethernet 1000 Mbps 4 pair 1000BaseTX 5e 1000 Mbps 2 pair 1000BaseT 6 1000 Mbps 2 pair 1000BaseT and faster broadband applications 6a 10000 Mbps 2 pair Future standard that will provide for 10 Gbps Ethernet What s with the pairs Most twisted pair cable has four pairs of wires for a total of eight wires Standard Ethernet uses only two of the pairs so the other two pairs are unused You may be tempted to save money by purchasing cable with just two pairs of wires but that s a bad idea If a network cable develops a prob lem you can sometimes fix it by switching over to one of the extra pairs If you use two pair cable though you don t have any spare pairs to use Don t use the extra pairs for some other purpose such as a voice line or a second data line The electrical noise in the extra wires can interfere with your network To shield or not to shield Unshielded twisted pair cable or UTP is designed for normal office environ ments When you use UTP cable you must be careful not to route cable close to fluorescent light fixtures air conditioners or electric motors such as automatic door motors or elevator motors UTP is the least expensive type of cable In environments that have a lot of electrical interference such as factories you may want to use shielded twis
53. Network Management For Dummies Creating a Logon Script ar A logon script is a batch file that s run automatically whenever a user logs on The most common reason for using a logon script is to map the network shares that the user needs access to For example here s a simple logon script that maps three network shares echo off net use m serverl shares admin net use n serverl shares mktg net use o server2 archives Here two shares on serverl are mapped to drives M and N and a share on server2 is mapped as drive O Scripts should be saved in the Scripts folder which is buried deep in the bowels of the SYSVOL folder typically c windows SYSVOL Sysvol domainname Scripts where domainname is your domain name Because you frequently need to access this folder I suggest creating a shortcut to it on your desktop After you ve created a logon script you can assign it to a user by using the Profile tab of the User Properties dialog box For more information see the section Setting the user s profile information earlier in this chapter Chapter 18 Managing Network Storage In This Chapter Understanding network storage Setting permissions Sharing folders Configuring and managing a file server Q key purpose of most computer networks is to provide shared access to disk storage In this chapter you find out about several ways that a network can provide shared disk storage Then you discove
54. Printers icon 2 Click the Add a Printer button on the toolbar This step starts the Add Printer Wizard as shown in Figure 2 8 P AAN ep Add Printer What type of printer do you want to install gt Add a local printer Use this option only if you don t have a USB printer Windows automatically installs USB printers when you plug them in Add a network wireless or Bluetooth printer Make sure that your computer is connected to the network or that your Bluetooth or wireless printer is turned on Cancel j 36 Part I Let s Network a Figure 2 9 The Add Printer Wizard asks you to pick a printer T EN 3 Select the Add a Network Wireless or Bluetooth Printer option The wizard searches the network for available printers and displays a list of the printers it finds as shown in Figure 2 9 z E ma Add Printer Searching for available printers Printer Nome Address 192 168 1102 Phaser 6125N Xerox Stop Ihe printer that want isn t listed Next Cancel 4 Click the printer you want to use If you can t find the printer you want to use ask your network adminis trator for the printer s UNC path which is the name used to identify the printer on the network or its IP address Then click The Printer That I Want Isn t Listed and enter the UNC or IP address for the printer when prompted 5 Click Next to add the printer The wizard copies to your com
55. These glitches aren t significant enough to merit a new version of the software but they re important enough to require fixing Most of the patches correct security flaws that computer hackers have uncovered in their relentless attempts to prove that they are smarter than the security programmers at Microsoft or Novell Periodically all the recently released patches are combined into a service pack Although the most diligent network administrators apply all patches when they re released many administrators just wait for the service packs For all versions of Windows you can use the Windows Update Web site to apply patches to keep your operating system and other Microsoft software up to date Windows Update scans your computer s software and creates a list of software patches and other components that you can download and install You can either e Find Windows Update in the Start menu e Fire up Internet Explorer and go to windowsupdate micro soft com Chapter 24 Hardening Your Network 34 7 ar You can configure Windows Update to automatically notify you of updates so you don t have to remember to check for new patches Novell periodically posts patches and updates to NetWare on its product support Web site support novell com You can subscribe to a service that automatically sends you e mail to let you know of new patches and updates Keeping a large network patched can be one of the major challenges of net
56. This type of network is an ad hoc mode network Amore complex type of network is an infrastructure mode network All this really means is that a group of wireless computers can be con nected not only to each other but also an existing cabled network via a device called a wireless access point or WAP I tell you more about ad hoc and infrastructure networks later in this chapter A Little High School Electronics I was a real nerd in high school I took three years of electronics The elec tronics class at my school was right next door to the auto shop Of course all the cool kids took auto shop and only nerds like me took electronics We hung in there though and found out all about capacitors and diodes while the cool kids were learning how to raise their cars and install 2 gigawatt stereo systems It turns out that a little of that high school electronics information proves useful when it comes to wireless networking not much but a little Chapter 9 Wireless Networking ar You ll understand wireless networking much better if you know the meanings of some basic radio terms Waves and frequencies For starters radio consists of electromagnetic waves that are sent through the atmosphere You can t see or hear them but radio receivers can pick them up and convert them into sounds images or in the case of wireless networks data Radio waves are cyclical waves of electromagnetic energy that repeat at a part
57. To find out the exact name of the network interface right click Computer in the Start Menu and choose Properties then click Device Manager This action opens the Device Manager dialog box which lists the name of the computer s network interface The Device Manager is also useful for tracking down other hardware devices attached to the computer or for checking which device drivers are being used for the computer s devices The network protocols that are in use To determine this informa tion in Windows XP open the Control Panel double click the Network Connections icon to open the Network Connections dialog box and then right click the network connection and choose the Properties com mand In Windows Vista or Windows 7 click the Start button and type Network Connections then right click Local Area Connection and choose Properties The kind of printer if any that s attached to the computer Usually you can tell just by looking at the printer itself You can also tell by examining the Devices and Printers window Any other devices connected to the computer A CD DVD or CD RW drive Scanner Zip or Jaz drive Tape drive Video camera Battle droid Hot tub Whether driver and installation disks are available Hopefully you can locate the disks or CDs required by hardware devices such as the net work card printers and scanners If not you may be able to locate the drivers on the Internet E Figure 4 1 The P
58. ZAD Pin 2 Orange White a A Sn Pin 3 White Green YN Pin 6 Green White Chapter 5 Cables Adapters and Other Stuff 9 Crossover cables A crossover cable can directly connect two devices without a hub or switch You can use a crossover cable to connect two computers directly to each other but crossover cables are more often used to daisy chain hubs and switches to each other If you want to create your own crossover cable you must reverse the wires on one end of the cable as shown in Table 5 3 This table shows how you should wire both ends of the cable to create a crossover cable Connect one of the ends according to the Connector A column and the other according to the Connector B column Note that you don t need to use a crossover cable if one of the switches or hubs that you want to connect has a crossover port usually labeled Uplink or Daisy chain If the hub or switch has an Uplink port you can daisy chain it by using a normal network cable For more information about daisy chaining hubs and switches see the section Hubs and Switches later in this chapter If you study Table 5 3 long enough and then compare it with Table 5 2 you may notice that a crossover cable is a cable that s wired according to the 568A standard on one end and the 568B standard on the other end Table 5 3 Creating a Crossover Cable Pin Connector A Connector B 1 White Green White orange 2 Green Ora
59. a docs folder that contains several files that have useful setup information Other software In most cases the installation program should be able to automatically configure your server s hardware devices and install appropriate drivers Just in case though dig out the driver discs that came with your devices such as network interface cards SCSI devices CD ROM drives printers and scanners 142 Partit Building Your Own Network A working Internet connection This item isn t an absolute requirement but the installation goes much more smoothly if you have a working Internet connection before you start The installation process may use this Internet connection for several tasks Downloading late breaking updates or fixes to the operating system This can eliminate the need to install a service pack after you finish installing the NOS Locating drivers for nonstandard devices This one can be a big plus if you can t find the driver disk for your obscure SCSI card Activating the product after you complete the installation for Microsoft operating systems For more information see the section Activating Windows later in this chapter A good book You spend lots of time watching progress bars during installation so you may as well have something to do while you wait Making Informed Decisions WING RY When you install an NOS you have to make some decisions about how you want the operating system and i
60. also routinely backs up the contents of the network server s disk to tape Yes tape see Chapter 22 for details That way if something happens to the network server the data can be recov ered from the backup tapes Chapter 2 Life on the Network 29 Oh the Network Places Vou ll Go ee Figure 2 2 Browsing the network in Windows 7 SS Windows enables you to access network resources such as shared folders by browsing the network In Windows XP you do this by double clicking the My Network Places icon that resides on your desktop In Windows Vista and Windows 7 choose Network from the Start menu Figure 2 2 shows the Windows 7 version of the network browser The network shown in Figure 2 2 consists of just three computers named WK09 001 DOUGE510 and SERVERO1 and a router named WRT54G You can open either of the computers by double clicking their icons to reveal a list of shared resources available on the computer For example Figure 2 3 shows the resources shared by the SERVERO1 computer You can also browse the network from any Windows application program For example you may be working with Microsoft Word 2007 and want to open a document file that s stored in a shared folder on your network All you have to do is use the Open command to bring up the dialog box In Office 2003 this command is on the File menu In Office 2007 you ll find it by clicking the Office button Choose Network in the list that appears in
61. and freeing up server disk space Much of the task of network administration involves making sure that things keep working by finding and correcting problems before users notice that something is wrong In this sense network administration can be a thankless job Gather organize and track the entire network s software inventory You never know when something will go haywire on the ancient Windows 95 computer that Joe in Marketing uses and you have to reinstall that old copy of Lotus Approach Do you have any idea where the installation disks are Chapter 16 Welcome to Network Management 23 7 Picking a Part Time Administrator and Providing the Right Resources The larger the network the more technical support it needs Small networks with just one or two dozen computers can manage with just a part time network administrator Ideally this person should be a closet computer geek someone who has a secret interest in computers but doesn t like to admit it someone who will take home books to read over the weekend and someone who enjoys solving computer problems just for the sake of solving them MBER The job of managing a network requires some computer skills but it isn t entirely a technical job Much of the work is routine housework Basically the network administrator does the electronic equivalent of dusting vacuuming and mopping the network periodically to keep it from becoming a mess Here are some resources t
62. any real measure of security because your neighbor could secretly switch back to your channel and listen in on your network You still need to secure your network as described in Chapter 10 WEP Mandatory or Disable Lets you use a security protocol called wired equivalent privacy Chapter 9 Wireless Networking 19 ar p Figure 9 5 Configuring DHCP for a Linksys wireless access point router NE DHCP configuration You can configure most multifunction access points to operate as a DHCP server For small networks its common for the access point also to be the DHCP server for the entire network In that case you need to configure the access point s DHCP server Figure 9 5 shows the DHCP configuration page for the Linksys WAP router To enable DHCP select the Enable option and then specify the other configuration options to use for the DHCP server Larger networks that have more demanding DHCP requirements are likely to have a separate DHCP server running on another computer In that case you can defer to the existing server by disabling the DHCP server in the access point hap 1492 168 4 DHCP hin Windows Intenet Explorer Jag OG Emio z 44 x p We S Bhtip 192 168 1 DHCP him a E Dinev eg Po an configure tt to act as a DHCP LUET Enable Disable SOC 192 168 1 100 Number of DHCP Users Client Lease Time Hi minutes 0 means one day ONS 1 Configuring Windows XP for
63. anything else it s this After you hook up your personal computer PC to a network it s not a personal computer anymore You re now part of a network of computers and in a way you ve given up one of the key con cepts that made PCs so successful in the first place independence I got my start in computers back in the days when mainframe computers ruled the roost Mainframe computers are big complex machines that used to fill entire rooms and had to be cooled with chilled water My first computer was a water cooled Binford Hex Core Model 2000 Argh argh argh I m not making up the part about the water A plumber was often required to install a mainframe computer In fact the really big ones were cooled by liquid nitro gen I am making up the part about the Binford 2000 Mainframe computers required staffs of programmers and operators in white lab coats just to keep them going The mainframes had to be carefully man aged A whole bureaucracy grew up around managing them Mainframe computers used to be the dominant computers in the workplace Personal computers changed all that They took the computing power out of the big computer room and put it on the user s desktop where it belongs PCs severed the tie to the centralized control of the mainframe computer 18 Part I Let s Network With a PC a user could look at the computer and say This is mine all mine Mainframes still exist but they re no
64. ar Ten base what The IEEE in its infinite wisdom has decreed that the following names shall be used to desig nate the various types of cable used with 802 3 networks in other words with Ethernet 1 10Base5 Old fashioned thick coaxial cable the yellow stuff The number 5 in 10Base5 is the maximum length of a yellow cable segment 500 meters Y 10Base2 Thin coaxial cable Thinnet The number 2 in 10Base2 stands for 200 meters which is about the 185 meter maxi mum segment length for Thinnet cable For engineers the IEEE is an odd bunch didn t know that the word about could be part of an engineer s vocabulary YY 10BaseT Unshielded twisted pair cable UTP The letter Tin 10BaseT stands for twisted In each name the number 70 means that the cable operates at 10 Mbps and Base means that the cable is used for baseband networks as opposed to broadband networks Don t ask Of these three official monikers 10BaseT is the only one used frequently 10Base5 and 10Base2 are usually just called thick and thin respec tively Fast Ethernet running over 10BaseT cabling uses the designation 100BaseT You can get around this rule by using stackable switches switches with a spe cial cable connector that connects two or more switches so that they function as a single switch Stackable switches are a must for large networks If your building is prewired and has a network jack near each desk you can
65. are The best known software only VoIP system is Skype www skype com The main advantage of Skype is that it s free Software only VoIP has two major drawbacks e You can only use it from your computer You can t just pick up a phone dial a number and make a call via Skype e The other person must use Skype You can t just call anyone e However you can sign up for a fee based program that lets you call regular phone numbers from Skype for about 0 02 per minute Note that Skype does offer mobile phone versions that can work on sev eral different types of mobile phones VoIP services such as Vonage and AT amp T CallVantage These services don t require a computer They use an Analog Telephone Adapter ATA that connects a normal telephone to the Internet The adapter lets you use VoIP pretty much as though it were a regular telephone You just pick up the phone and dial a number The fact that the call is routed over the Internet rather than over the public phone network is for the most part transparent Chapter 13 Is It a Phone or a Computer 2 9 Advantages of VolP VolP service has several compelling advantages over traditional telephone service Here are a few Long distance calls over VoIP are cheaper than they are over tradi tional phone service With VoIP you typically pay a fixed monthly rate of 25 35 for unlimited calls long distance or not If your phone bill now runs more than 35 per mont
66. are available elsewhere in OWA If you can t find a feature look in the Options page which you can reach by clicking Options at the bottom left of the window Figure 15 2 shows the Options page As you can see this page lets you create an Out of Office reply set your signature and change a variety of other options IB Microsoft Outlook Web Access Windows Internet Explorer Sor x Go We Bt Microvoh Outiock Web Access f Go th yop ager OD took Outlook Web Access E Options Save and Close Clone L Logott Long uate stye Moncay January UL AJ Moncay December 31 AW TI Corda Teme Style LOLAM ILS9PM v a gj Contacts 1 2 a G Deleted Items 097 Qurrent Time Zone GMT 08 00 Pacific Time US amp Canada Tousna JA atts 3 t peun Cotender Options ay Inadent Reports Week begins on Sunday Se beeratents ay start te imom JA ourna ig Ark E mad Day end tme SOPH v ig Notes Fest week of year Do not daplay week numbers v I Outbox a CJ Sort Rows Reminder Options i rc en To view reminders you must use Microsoft Internet Exciorer 5 or later Enable reminders for Calendar tems J Enable reminders for Task tena 4 Play a sound when a reminder is due Defaut remnder ISmeutes v Figure 15 2 reee D A Setting rues Sew tems to wew and recover nems that were recenity empted fam your Deleted Items flier Recovered tems ml be moved badk to your Deleted OWA a Options f hee 19 remnse
67. are combined one of these DHCP servers will have to be disabled In addition both networks had their own Internet connections With the networks bridged CCD can eliminate the DSL Users in both buildings can get their Internet access by using the shared T1 connection 1 The network administrator also has to determine how to handle directory services for the network Previously each network had its own domain With the networks bridged CCD may opt to keep these domains separate or it may decide to merge them into a single domain Doing so requires considerable work so it will probably leave the domains separate Chapter 4 Planning Your Network 7 4 Dave Y Brenda M Deborah Q Julie D ChrisE Alice M The Internet Building A Emily D SarahL Toby S Juan S Richard O Elias H Wireless Access Point Gaa Wireless Access Point TS Figure 4 6 a The Creative Buading B Course Develop ment wire less network solution Andrew T ee Improving network performance DCH Accounting DCH Accounting is an accounting firm that has grown in two years from 15 to 35 employees all located in one building Here s the lowdown on the existing network 1 The network consists of 35 client computers and three servers running Windows 2000 Server 1 The 35 client computers all run Windows XP Professional The client computers all have 10 100 Mbps Ethernet interfaces a few have 10 100 1000 interfa
68. available addresses Just for the fun of it here s the number of unique Internet addresses provided by IPv6 340 282 366 920 938 463 463 374 607 431 768 211 456 This number is so large that it defies under standing If the IANA had been around at the creation of the universe and started handing out IPv6 addresses at a rate of one per millisec ond it would now 15 billion years later have not yet allocated even 1 percent of the available addresses Unfortunately the transition from IPv4 to IPv6 has been a slow one Thus the Internet will continue to be driven by IPv4 for at least a few more years Subnetting is a technique that lets network administrators use the 32 bits available in an IP address more efficiently by creating networks that aren t limited to the scales provided by Class A B and C IP addresses With subnet ting you can create networks with more realistic host limits Subnetting provides a more flexible way to designate which portion of an IP address represents the network ID and which portion represents the host ID With standard IP address classes only three possible network ID sizes exist 8 bits for Class A 16 bits for Class B and 24 bits for Class C Subnetting lets you select an arbitrary number of bits to use for the network ID Two reasons compel me to use subnetting The first is to allocate the lim ited IP address space more efficiently If the Internet were limited to Class A B or C ad
69. better do so soon 1 Regularly back up your data If a virus hits you and your antivirus soft ware can t repair the damage you may need the backup to recover your data Make sure that you restore from a backup that was created before you were infected by the virus 346 Part V Protecting Your Network If you buy software from a store and discover that the seal has been broken on the disk package take the software back Don t try to install it on your computer You don t hear about tainted software as often as you hear about tainted beef but if you buy software that s been opened it may well be laced with a virus infection Use your antivirus software to scan your disk for virus infection after your computer has been to a repair shop or worked on by a consultant These guys don t intend harm but they occasionally spread viruses accidentally simply because they work on so many strange computers Don t open e mail attachments from people you don t know or attachments you weren t expecting Use your antivirus software to scan any floppy disk or CD ROM that doesn t belong to you before you access any of its files Patching Things Up One of the annoyances that every network manager faces is applying software patches to keep the operating system and other software up to date A soft ware patch is a minor update that fixes the small glitches that crop up from time to time such as minor security or performance issues
70. box that lets you set the workgroup name which must match the workgroup or domain name you want the Samba server to belong to and a description for the server as well as some basic security settings that control how users can access the Samba server You can set four basic types of security for your Samba server Domain Configures the Samba server to use a Windows domain control ler to verify the user If you specify this option you must e Provide the domain controller s name in the Authentication Server field e Set Encrypted Passwords to Yes if you use Domain mode Chapter 25 Networking with Linux 369 v Samba Server Configuration x Eile Preferences Help f 0o 8B Add Properties Delete Help Brecon __Jsrar rare remissions pescas O home doug Share Share Read Wnite Figure 25 8 Using the Samba Server Configur ation tool in a 1 Server Configures Samba to use another Samba server to authenticate users ay If you have more than one Samba server this feature lets you set up user accounts on just one of the servers Then in the Authentication Server field specify the name of the Samba server that should perform the authentication 1 Share Authorizes users separately for each share they attempt to access User Requires that users provide a valid username and password when they first connect to a Samba server That authentication then grants them access to all shares on the serv
71. cables have been used with Ethernet networks Almost all networks are now built with twisted pair cable In this type of cable pairs of wires are twisted around each other to reduce electrical interference You almost need a PhD in physics to understand why twisting the wires helps to reduce interference so don t feel bad if this con cept doesn t make sense You may encounter other types of cable in an existing network for example on older networks you may encounter two types of coaxial cable also known as coax pronounced COE ax The first type resembles televi sion cable and is known as RG 58 cable The second type is a thick yellow cable that used to be the only type of cable used for Ethernet You may also encounter fiber optic cables that span long distances at high speeds or thick twisted pair bundles that carry multiple sets of twisted pair cable between wiring closets in a large building Most networks however use simple twisted pair cable Twisted pair cable is sometimes called UTP The U stands for unshielded but twisted pair is the standard name Figure 5 1 shows a twisted pair cable When you use UTP cable to construct an Ethernet network you connect the computers in a star arrangement as Figure 5 2 illustrates In the center of this star is a device called a hub or switch Depending on the model Ethernet Figure 5 2 A network cabled with twisted pair cable ar Chapter 5 Cables Adapt
72. call waiting call forwarding caller ID 5 way calling and voice mail usually don t cost extra with VoIP Modern VoIP audio quality is as good as traditional phone service Sometimes it s better VoIP services have additional features that you can use if you connect a computer to the ATA device For example some services can send your voice mail messages to an e mail account as attachments Then you can use Microsoft Outlook or another mail program to listen to your voice mail 220 Part Ill Getting Connected Disadvantages of VoIP You have to consider a few disadvantages before you switch your phone ser vice over to VoIP Here are the most important ones You must have a reliable broadband Internet connection If your Internet connection goes down so will your VoIP connection The ATA requires electrical power to work As a result you can t use your VoIP phone during a power outage unless you connect it to an Uninterruptible Power Supply UPS In contrast traditional telephones draw their power directly from the phone lines That s why traditional phones continue to work even during power outages VoIP isn t really mobile in the same sense as a cellphone You probably need a cellphone too Calls to the 911 emergency system are problematic with VoIP services The basic problem is that the 911 system is designed to contact local emergency dispatchers Because VoIP services aren t tied to a particular locati
73. can be purchased online for 3 or 4 each Cable Ties Cable ties those little plastic zip things that you wrap around a group of cables and pull to tighten can go a long way toward helping keep your net work cables neat and organized You can buy them in bags of 1 000 at big box home improvement stores Twinkies If left sealed in their little individually wrapped packages Twinkies keep for years In fact they ll probably outlast the network itself You can bequeath em to future network geeks ensuring continued network support for genera tions to come Chapter 29 Ten Things You Should Keep in Your Closet 393 Extra Network Cards Ideally nearly all your computers will have network interfaces built directly into the motherboard However you will occasionally find that the network interface goes bad Rather than replace the entire motherboard you can often fix the problem by adding a cheap under 20 network card to use instead of the on board network interface Cheap Network Switches It s a good idea to keep a couple of cheap about 20 four or eight port net work switches on hand You don t want to use them for your main network infrastructure But they come in handy when you need to add a computer or printer somewhere and you don t have an available network jack For exam ple suppose one of your users has a short term need for a second computer but there s only one network jack in the user s offi
74. cccccsccesesesees 389 VI Thou Shalt Schedule Downtime before Working upon Thy Network c ccccssccssceesseeeeeeeesseesseeeeeeees 389 VII Thou Shalt Keep an Adequate Supply of Spare Parts cce 389 VIII Thou Shalt Not Steal Thy Neighbor s Program WIthOUt a LICENS Cis cesses ichisse sc speskesechdecvesads ie a EE NARA 390 IX Thou Shalt Train Thy Users in the Ways of the Network 390 X Thou Shalt Write Down Thy Network Configuration upon Tablets oi Stone via ieee ae easiest ones lied desea 390 Chapter 29 Ten Things You Should Keep in Your Closet 391 Duct Tape isesdsstecsctatiaad erties zis akae Ee EARE Ea EREE ER OEN EE EAE EENI EE anise 391 MOUS ena EE aust E E O A ONS 392 Patel Caples is an e E R E AE ETAR 392 Cable Tiesnese kaani 392 UE WinkieS so esene tonee sinner r E E SA E E E aE iiias 392 Extra Network Card i2 iscsscecsaccccesss neiaie E EEn arei 393 Cheap Network Swit hes ssiscssscissccsvecssecssscdeceusscastevsdesuavesssvstedecsecesseiase coves 393 The Complete Documentation of the Network on Tablets of Stone 393 The Network Manuals and Disks cccsscsssssssesseesseessecsseessesssesseeestens 394 Ten Copies of This BOOK 0 c cscscsseccscsscceecescseeesseveondensestcbecesesaeastodeasessnnest 394 Chapter 30 Layers of the OSI Model 0 0000 395 Layer 1 The Physical Layer sccctestaccecsiictestiecoenhbesivtesteleciscsstiaeatcedevess 396 Laye
75. cece eee eeeeaee 21 Distinguishing between Local Resources and Network Resources 2l Whatsina Name sicisenoneroni anonn E O Eee 22 Logging On to the Network ccccccceesseseesceeeeeeeeseeseeaeceeeeeeseeeeeseseeeeeeeeeaes 24 Vill Networking For Dummies 9th Edition Understanding Shared Folders cccccecscsssesscesseeseceeeeseeeseeeeeeseeeseeeseessees 26 Four Good Uses for a Shared Folder cccecccsceseeseeseceeeeeeeseeseeeeseeneeneeees 26 Store files that everybody Needs cccccsscsseeseesseesseeseceseeseeeseeenes 27 Store VOUr OWN MES scsi sscesessseesdhcssiesscdsseeesevsete sais onesocecvedeecdacesneeeditiale 27 Make a pit stop for files on their way to other users eeeeee 28 Back up your local hard drives icccnulannicancindihdeiaineiae 28 Oh the Network Places You ll Go cccccccccsccessscesseeesssecessecessecesseeessesesaes 29 Mapping Network Drives esiet casteseuvctecstactsaalocessasss eastdineds davaviecvetvaeees 31 Using a Network Printers casescssseccesadeseesiisaeviudesvsoscvieetessastansseusseassnierspeneeeas 34 Adding a network Print Diss isc csccsccseeessastvenccseerscaseces sasesaseasneeneesreatesses 35 Printing toa network PTiNter c cesccss segestdsncesplansessdoenesysavecassodoeseetesees 37 Playing with the print Queue c sdaceesccisctetgessasszcacceastievecgtecvssanereesbeees 37 Logging Off the NetWork nuuese ns eke eet ar Ei 39 Chapter 3 More Ways to Use Yo
76. comes at a price Application gateways are more expensive than packet filters both in terms of their purchase price and in the cost of configuring and maintaining them In addition application gateways slow down the network performance because they do more detailed checking of packets before allowing them to pass The Built In Windows Firewall All versions of Windows since Windows XP come with a built in packet filtering firewall If you don t have a separate firewall router you can use this built in firewall to provide a basic level of protection Refer to Chapter 10 for the steps to follow to configure the Windows Firewall Chapter 24 Hardening Your Network 343 NING RY Do not enable the Windows Firewall if you re using a separate firewall router to protect your network Because the other computers on the network are connected directly to the router and not to your computer the firewall won t protect the rest of the network Additionally as an unwanted side effect the rest of the network will lose the ability to access your computer Virus Protection Viruses are one of the most misunderstood computer phenomena around these days What is a virus How does it work How does it spread from computer to computer I m glad you asked What is a virus Make no mistake viruses are real Now that most people are connected to the Internet viruses have really taken off Every computer user is susceptible to attacks by
77. confused that it can t even move It just sits there like a deer staring at oncoming headlights It doesn t move no matter how hard you press the Esc key or the Enter key You can move the mouse all over your desktop or you can even throw it across the room but the mouse pointer on the screen stays per fectly still When a computer starts acting strangely you need to reboot If you must reboot do so as cleanly as possible I know that this procedure may seem elementary but the technique for safely restarting a client computer is worth repeating even if it s basic 1 Save your work if you can Use the File gt Save command if you can to save any documents or files that you were editing when things started to go haywire If you can t use the menus try clicking the Save button on the toolbar If that doesn t work try pressing Ctrl S the standard keyboard shortcut for the Save command 2 Close any running programs if you can Choose the FileExit command or click the Close button in the upper right corner of the program window Or press Alt F4 3 Shut down the computer For Windows XP choose Start Turn Off Computer For Windows Vista or Windows 7 click the Start button click the right arrow that appears next to the padlock icon and choose Shut Down The Shut Down Windows dialog box appears 4 Select the Restart option and then click OK Your computer restarts itself If restarting your computer doe
78. don t have to worry about the nosy guy down in Accounting who likes to poke around in other people s files Don t overuse the network drive Remember that other users have probably filled up their own hard drives so they want to use the space on the network drive too Before you store personal files on a network drive make sure that you have permission A note from your mom will do On domain networks a drive typically drive H is commonly mapped to a user s home folder The home folder is a network folder that s unique for each user You can think of it as a network version of My Documents If your network is set up with a home folder use it rather than My Documents for any important work related files That s because the home folder is usually included in the network s daily backup sched ule In contrast most networks do not back up data you store in My Documents 28 Part I Let s Network ar Make a pit stop for files on their way to other users Hey Wally could you send me a copy of last month s baseball stats Sure Beav But how If the baseball stats file resides on Wally s local drive how does Wally send a copy of the file to Beaver s computer Wally can do it by copying the file to a network folder Then Beaver can copy the file to his local hard drive Here are some tips to keep in mind when you use a network drive to exchange files with other network users Remember to del
79. each octet of a subnet mask including counting 0 For your reference these values are listed in Table 6 3 Table 6 3 The Eight Subnet Octet Values Binary Octet Decimal Binary Octet Decimal 00000000 0 11111000 248 10000000 128 11111100 252 11000000 192 11111110 254 11100000 224 11111111 255 11110000 240 115 16 Partit Building Your Own Network Private and public addresses Any host with a direct connection to the Internet must have a globally unique IP address However not all hosts are connected directly to the Internet Some are on networks that aren t connected to the Internet Some hosts are hidden behind firewalls so their Internet connection is indirect Several blocks of IP addresses are set aside just for this purpose for use on private networks that aren t connected to the Internet or to use on networks hidden behind a firewall Three such ranges of addresses exist as summa rized in Table 6 4 Whenever you create a private TCP IP network use IP addresses from one of these ranges Table 6 4 Private Address Spaces CIDR Subnet Mask Address Range 10 0 0 0 8 255 0 0 0 10 0 0 1 10 255 255 254 172 16 0 0 12 255 255 240 0 172 16 1 1 172 31 255 254 192 168 0 0 16 255 255 0 0 192 168 0 1 192 168 255 254 Understanding Network Address Translation Many firewalls use a technique called network address translation or NAT to hide the actual IP address of a host from the outside world When
80. handling all the work your network will throw at them Don t cut corners by using a bottom of the line computer that you bought at a discount computer store The following list describes the four most important components of your server hardware Processor Your server should have a powerful processor Any proces sor that s available in a 500 computer from a low cost general appli ance store is generally not a processor that you want to see in your file server In other words avoid processors designed for consumer grade home computers Memory You can t have too much memory Memory is cheap so don t skimp Don t even think about running a server with fewer than AGB of RAM Disk Don t mess around with inexpensive IDE hard drives To have a respectable system you should have nothing but SCSI drives 1 Network card A 9 95 network card may be fine for your home network but don t use one in a file server that supports 100 users and expect to be happy with the server s performance Remember that the server computer uses the network more often than any clients do Equip your servers with good network cards The server s configuration options All network operating systems have options that you can configure Some of these options can make the difference between a pokey network and a zippy network Unfortunately no hard and fast rules exist for setting these options Otherwise you wouldn t have options Th
81. i Hub Modular wall jacks Connecting a twisted pair cable to a wall jack or a patch panel is similar to connecting it to an RJ 45 plug However you don t usually need any special tools Instead the back of the jack has a set of slots that you lay each wire across You then snap a removable cap over the top of the slots and press it down This action forces the wires into the slots where little metal blades pierce the insulation and establish the electrical contact When you connect the wire to a jack or a patch panel be sure to untwist as little of the wire as possible If you untwist too much of the wire the signals that pass through the wire may become unreliable Chapter 5 Cables Adapters and Other Stuff 93 Hubs and Switches MBER KV amp When you use twisted pair cable to wire a network you don t plug the com puters into each other Instead each computer plugs into a separate device called a hub Years ago hubs were expensive devices expensive enough that most do it yourself networkers who were building small networks opted for coax cable rather than twisted pair because networks wired with coax cable don t require hubs Nowadays the cost of hubs has dropped so much that the advantages of using twisted pair cabling outweigh the hassle and cost of using hubs With twisted pair cabling you can more easily add new computers to the network move computers find and correct cable problems and service th
82. in this book Logon Script This is the name of the user s logon script A logon script is a batch file that s run whenever the user logs on The main purpose Chapter 17 Managing Windows User Accounts 2 5 3 of the logon script is to map the network shares that the user requires access to Logon scripts are a carryover from the early versions of Windows NT Server In Windows Server 2008 profiles are the preferred way to configure the user s computer when the user logs on includ ing setting up network shares However many administrators still like the simplicity of logon scripts For more information see the section Creating a Logon Script later in this chapter Home Folder This is where you specify the default storage location for the user Resetting User Passwords By some estimates the single most time consuming task of most network administrators is resetting user passwords It s easy to just think users are forgetful idiots but put yourself in their shoes You insist that they set their passwords to something incomprehensible such as 94kD82leL384K that they change it a week later to something more unmemorable such as dJUQ63DWd8331 and that they don t write it down Then you get mad when they forget their passwords So when a user calls and says she forgot her password the least you can do is be cheerful when you reset it for them After all they ve probably already spent 15 minutes trying to remembe
83. install BlackBerry Enterprise Server or BES on a server computer For small organizations you can install BES on the same physical server as Exchange But if you have more than a few dozen BlackBerry users you re better off using a separate server dedicated to BES After you ve installed BES you can use it to manage your BlackBerry users Figure 14 3 shows the BlackBerry Manager application which you use to manage your BES administration From this page you can configure new BlackBerry users modify or delete existing users and perform other tasks required to manage your BlackBerry environment 226 Part Ill Getting Connected BlackBerry Manager Security Administrator Authority Ele Edt Too view Hep Eeer vew 4 Refresh es Cxplorer View x Server Configuration Users UsersPendngDekte I Black erry Doman Name oo Emal address N 4 amp Servers G tay sws ooo IT Policy A D weso mos cs 1 User Groups Erir fo EPOP Gn BD Local Ports Device Managemnt A aac 300 Page Eea tele ta Name PIN Status Last Contact Time Doug Lowe 83383383 Running 11416 2007 3 19 10 PM P andy mork BIBIS Running 114162007 3 17 22 PM Alan an UIII Running 11 16 2007 3 20 11 PM Dari More AIGR3I3A3 Running 11 16 2007 3 17 51 PM No user has been selected E T Account Figure 14 3 The K gt Lisers S gt Find User BlackBerry Manager application J aaia x p EE 4 Considering Secur
84. is to share access to a printer rather than sharing files Even if you don t use passwords imposing basic security precautions like limiting access that certain users have to certain network directories is still possible Just remember that if passwords aren t used nothing prevents a user from signing on by using someone else s username Generating passwords For Dummies How do you come up with passwords that no one can guess but that you can remember Most security experts say that the best passwords don t correspond to any words in the English language but consist of a random sequence of letters numbers and special characters Yet how in the heck are you supposed to memorize a password like Dks4 DJ2 Especially when you have to change it three weeks later to something like 3pQ amp X d8 Chapter 23 Securing Your Network 327 328 Part V Protecting Your Network ar lt P Here s a compromise solution that enables you to create passwords that con sist of two four letter words back to back Take your favorite book if it s this one you need to get a life and turn to any page at random Find the first four or five letter words on the page Suppose that word is When Then repeat the process to find another four or five letter word say you pick the word Most the second time Now combine the words to make your password WhenMost I think you ll agree that WhenMost is easier to remember than 3PQ amp X D8 and i
85. must be located between your network and the Internet as shown in Figure 24 1 Here one end of the firewall is connected to a network hub which is in turn connected to the other computers on the network The other end of the fire wall is connected to the Internet As a result all traffic from the LAN to the Internet and vice versa must travel through the firewall Switch N N N N N N N Chapter 24 Hardening Your Network 339 ANG O The term perimeter is sometimes used to describe the location of a firewall on your network In short a firewall is like a perimeter fence that completely surrounds your property and forces all visitors to enter through the front gate In large networks especially campus wide or even metropolitan networks it s sometimes hard to figure out exactly where the perimeter is located If your network has two or more WAN connections make sure that every one of those connections connects to a firewall and not directly to the network You can do this by providing a separate firewall for each WAN connection or by using a firewall with more than one WAN port The Many Types of Firewalls Firewalls employ four basic techniques to keep unwelcome visitors out of your network The following sections describe these basic firewall techniques Packet filtering A packet filtering firewall examines each packet that crosses the firewall and tests the packe
86. name Al Excel Flee To access a file that resides on a network volume that s mapped to a drive letter all you have to do is use the drop down list at the top of the dialog box to select the network drive If the network volume isn t mapped to a drive click Folders near the lower left corner of the Open dialog box select Network and then browse to the file you want to open You can map a network drive directly from the Open dialog box by navigat ing to the folder you want to map right clicking the folder and choosing Map Network Drive If you try to open a file that another network user has opened already Office tells you that the file is already in use and offers to let you open a read only version of the file You can read and edit the read only version but Office doesn t let you overwrite the existing version of the file Instead you have to use the Save As command to save your changes to a new file Using workgroup templates Although an occasional sacrifice to the Office gods may make your computing life a bit easier a template isn t a place of worship Rather a template is a special type of document file that holds formatting information boilerplate text and other customized settings that you can use as the basis for new documents Four Office programs Word Excel Access and PowerPoint enable you to specify a template whenever you create a new document When you create anew document in
87. need to restart the computer click OK and then restart the computer The computer is added to the domain or workgroup Configuring Network Logon ar Every user who wants to access a domain based network must log on to the domain by using a valid user account The user account is created on the domain controller not on the client computer Network logon isn t required to access workgroup resources Instead work group resources can be password protected to restrict access Chapter 8 Configuring Windows XP Vista and 7 Clients 63 When you start a Windows computer that s been configured to join a domain which I describe in the section Configuring Client Computer Identification earlier in this chapter the Log On to Windows dialog box displays The user can use this dialog box to log on to a domain by entering a domain username and password and then selecting the domain that she wants to log on to from the Log On To drop down list ay You can create local user accounts in Windows that allow users to access resources on the local computer To log on to the local computer the user selects This Computer from the Log On To drop down list and enters the user name and password for a local user account When a user logs on by using a local account he isn t connected to a network domain To log on to a domain the user must select the domain from the Log On To drop down list If the computer isn t part of a domain
88. network nothing beats a well thought out schedule of backups followed religiously If this were an actual network Bible a foot note here would refer you to related verses in Chapter 22 388 Part vit The Part of Tens II Thou Shalt Protect Thy Network from Infidels Do you remember Colonel Flagg from M A S H who hid in trashcans look ing for Commies I don t recommend that you actually become him but on the other hand you don t want to ignore the possibility of getting zapped by a virus your network being invaded by hackers or your data being compro mised by an unscrupulous user Make sure that your Internet connection is properly secured with a firewall and don t allow any Internet access that cir cumvents your security To counter virus threats use network aware antivirus software to ensure that every user on your network has up to date virus protection And teach your users so they know how to avoid those virus threats that manage to sneak past your virus protection Ill Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files Don t wait until your 500GB network drive is down to just 1GB of free space before you think about cleaning it up Set up a routine schedule for disk housekeeping where you wade through the files and directories on the net work disk to remove old junk IV Thou Shalt Not Tinker with Thine Network Configuration Unless Thou Knowest What Thou Art Doing Networks are fini
89. of network topology is a bus in which network nodes that is computers are strung together in a line like this Oe ee ee A bus is the simplest type of topology but it has some drawbacks If the cable breaks some where in the middle the whole network breaks A second type of topology is the ring A ring is very much like a bus except with no end to the line The last node on the line is connected to the first node forming an end less loop A third type of topology is a star In a star network all the nodes are connected to a central hub In effect each node has an independent connection to the network so a break in one cable doesn t affect the others Ethernet networks are based on a bus design However fancy cabling tricks make an Ethernet network appear to be wired like a star when twisted pair cable is used You can think of Ethernet as a kind of municipal building code for networks It specifies what kind of cables to use how to connect the cables how long the cables can be how computers transmit data to one another by using the cables and more Chapter 5 Cables Adapters and Other Stuff 8 Although Ethernet is now the overwhelming choice for networking that wasn t always the case In ye olde days Ethernet had two significant competitors Token Ring This IBM standard for networking is still in some organiza tions especially where IBM mainframe or midrange systems are in
90. of tedious con figuration work In this section you discover the ins and outs of DHCP what it is how it works and how to set it up Understanding DHCP DHCP allows individual computers on a TCP IP network to obtain their con figuration information in particular their IP addresses from a server The DHCP server keeps track of which IP addresses have already been assigned so that when a computer requests an IP address the DHCP servers offer it an IP address that isn t already in use 778 Partit Building Your Own Network The alternative to DHCP is to assign each computer on your network a static IP address 1 Static IP addresses are okay for networks with a handful of computers NING For networks with more than a few computers using static IP addresses v is a huge mistake Eventually some poor harried administrator guess who will make the mistake of assigning two computers the same IP address Then you have to manually check each computer s IP address to find the conflict DHCP is a must for any but the smallest networks Although the primary job of DHCP is to assign IP addresses DHCP provides more configuration information than just the IP address to its clients The additional configuration information is referred to as DHCP options The fol lowing list describes some common DHCP options that can be configured by the server Router address also known as the default gateway address Expiration time for
91. of the information on hand If your network is large you may want to invest in a network discovery pro gram such as NetworkView Software s NetworkView www networkview com This program can gather the network documentation automatically It scans the network carefully for every computer printer router and other device it can find and then builds a database of information The program then automatically draws a pretty diagram and chugs out helpful reports Performing Routine Chores Much of the network manager s job is routine stuff the equivalent of vacu uming dusting and mopping or changing your car s oil and rotating the tires 24 0 Part IV Network Management For Dummies These tasks are boring but they have to be done Create backups The network manager must ensure that the network is properly backed up If something goes wrong and the network isn t backed up guess who gets the blame On the other hand if disaster strikes yet you re able to recover everything from yesterday s backup with only a small amount of work lost who gets the pat on the back the fat bonus and the vacation in the Bahamas Chapter 22 describes the options for network backups Read it soon Provide security Another major task for a network administrator is sheltering the network from the evils of the outside world These evils come in many forms including hackers trying to break into your net work and virus programs arriving
92. offer higher capacity and faster backup speed than Travan drives but for more money of course DAT digital audio tape units can back up as much as 80GB on a single tape and DLT digital linear tape drives can store up to 200GB on one tape DAT and DLT drives can cost 1 000 or more depending on the capacity If you re really up the backup creek with hundreds of gigabytes to back up you can get robotic tape backup units that automatically fetch and load tape cartridges from a library so you can do complete backups without having to load tapes manually Naturally these units aren t cheap The small ones which have a library of about eight tapes and a total backup capacity of over 5 000GB start at about 4 000 Chapter 22 Backing Up Your Data 3 Backup Software All versions of Windows come with a built in backup program In addition most tape drives come with backup programs that are often faster or more flexible than the standard Windows backup You can also purchase sophisticated backup programs that are specially designed for networks that have multiple servers with data that must be backed up For a basic Windows file server you can use the backup program that comes with Windows Server Server versions of Windows come with a decent backup program that can run scheduled unattended tape backups Backup programs do more than just copy data from your hard drive to tape Backup programs use special compression techniqu
93. operating system must support a wide variety of networking protocols to meet the needs of its users A large network typically consists of a mixture of various versions of Windows as well as Macintosh and Linux computers As a result the server may need to simultaneously support TCP IP NetBIOS and AppleTalk protocols Many servers have more than one network interface installed In that case the NOS must be able to support multiple network connections e Ideally the NOS should be able to balance the network load among its network interfaces e If one of the connections fails the NOS should be able to seam lessly switch to another connection Most network operating systems include a built in capability to function as a router that connects two networks The NOS router functions should also include firewall features to keep unauthorized packets from entering the local network File sharing services One of the most important functions of a network operating system is to share resources with other network users The most common resource that s shared is the server s file system organized disk space that a network server must be able to share in whole or in part with other users In effect those users can treat the server s disk space as an extension of their own computers disk space The NOS allows the system administrator to determine which portions of the server s file system to share Although an entire ha
94. or a firewall computer the firewall must be located between your network and the Internet as shown in Figure 10 1 Here one end of the firewall is connected to a network hub which is in turn connected to the other computers on the network The other end of the fire wall is connected to the Internet As a result all traffic from the LAN to the Internet and vice versa must travel through the firewall Hub The term perimeter is sometimes used to describe the location of a firewall on your network In short a firewall is like a perimeter fence that completely sur rounds your property and forces all visitors to enter through the front gate In large networks it s sometimes hard to figure out exactly where the perimeter is located If your network has two or more Internet connections make sure that every one of those connections connects to a firewall and not directly to the network You can do this by providing a separate firewall for each Internet connection or by using a firewall with more than one Internet port Some firewall routers can also enforce virus protection for your network For more information about virus protection see Chapter 23 190 Part Ill Getting Connected Figure 10 2 The Windows Vista Firewall dialog box aS The built in Windows firewall Both Windows XP and Vista include a built in firewall that provides basic packet filtering firewall protection
95. other network users can and often should find out your username 1 Password A secret word that must be entered in order to gain access to the account You can set up Windows so that it enforces password policies such as the minimum length of the password whether the pass word must contain a mixture of letters and numerals and how long the password remains current before the user must change it Group membership The group or groups to which the user account belongs Group memberships are the key to granting access rights to users so that they can access various network resources such as file shares or printers or to perform certain network tasks such as creating new user accounts or backing up the server Many other account properties record information about the user such as the user s contact information whether the user is allowed to access the system only at certain times or from certain computers and so on I describe some of these features in later sections of this chapter Creating a New User To create a new domain user account in Windows Server 2008 follow these steps 1 Choose StartAdministrative Tools Active Directory Users and Computers This fires up the Active Directory Users and Computers management console as shown in Figure 17 1 Chapter 17 Managing Windows User Accounts 2 4 7 Figure 17 1 The Active Directory Users and Computers management console SSS SS Figure 17 2 Creating a
96. overloaded 281 282 410 Networking For Dummies 9th Edition servers continued overview 14 15 41 42 print 70 restarting 288 297 298 Web 70 205 Service accounts 331 Service Configuration window 363 365 368 A network restart command 36 service packs 146 147 192 346 service set identifier SSID 166 175 177 services 132 135 148 150 295 297 376 Session Layer OSI model 399 setup script 139 Share and Storage Management console 264 273 275 share name 47 263 shared resources 12 13 18 23 shares 238 262 263 366 370 sharing File and Printer Sharing feature 42 46 files 12 132 133 374 folders 26 28 31 34 46 49 271 273 Internet connections 187 overview 41 42 printers 50 53 programs 13 14 shielded twisted pair STP cable 84 85 shredding trash 325 shutdown 332 358 simple display name 196 Skype 218 Slackware 354 Sleep feature 289 smart card 251 smartphone 222 SMB Server Message Block 366 smbd daemon 367 sneakernet 10 Sniffer program NetScout Systems 242 software 17 67 205 236 238 solid cable 85 86 special permissions 262 special shares 263 spectrums 169 SPI stateful packet inspection 341 splitting databases Access 58 spooling print 279 spyware 286 SSID service set identifier 166 175 177 stackable switches 96 standard drive assignments lists 238 Standard version Windows Server 2008 136 140 standards wireless 170 171 star t
97. s security features 336 Part V Protecting Your Network Chapter 24 Hardening Your Network In This Chapter Understanding what firewalls do Examining the different types of firewalls Using the built in Windows firewall Looking at virus protection Patching your computers f your network is connected to the Internet a whole host of security issues bubble to the surface You probably connected your network to the Internet so that your network s users could get out to the Internet Unfortunately however your Internet connection is a two way street Not only does it enable your network s users to step outside the bounds of your network to access the Internet but it also enables others to step in and access your network And step in they will The world is filled with hackers who are looking for networks like yours to break into They may do it just for the fun of it or they may do it to steal your customer s credit card numbers or to coerce your mail server into sending thousands of spam messages on their behalf Whatever their motive rest assured that your network will be broken into if you leave it unprotected This chapter presents an overview of three basic techniques for securing your network s Internet connection controlling access via a firewall detecting viruses with antivirus software and fixing security flaws with software patches Firewalls A firewall is a security conscious router that sits between t
98. shares folders that have been designated as publicly accessible via the network You can see a list of the current shares available from a file server by firing up the File Server Manager and clicking Shares in the console tree The Share and Storage Management console displays the share name description and network path for each share that you ve already created To create additional shares use the Provision a Shared Folder Wizard as I describe in the following procedure 1 In the Share and Storage Management console choose Provision Share The opening screen of the Provision a Shared Folder Wizard appears as shown in Figure 18 2 Here the wizard asks you what folder you want to share G Provision a Shared Folder Wizard Tete faa Shared Folder Locaton Steps ape Specify the folder that you want to share On a volume with appropnate charactenstics Shared Folder Location and space select an existing folder or create a new one If an appropriate volume does NTFS Permissions Share Protocole z T pra Settings and Create C Wata Shares Marketing Browse Confirmation Indexing Unknown Highly available server Volume is not chisterad 266 Part IV Network Management For Dummies Figure 18 3 The wizard asks if you want to set the NTFS permissions 2 Type the path of the folder that you want to share over the network and then click Next If you aren t sure of the path y
99. simply restarting the computer Of course in many cases the problem recurs so you have to eventually isolate the cause and fix the problem Some problems are only intermittent and a simple reboot is all that s needed Try restarting the network server See the section How to Restart a Network Server later in this chapter Chapter 20 Solving Network Problems 289 How to Fix Dead Computers If a computer seems dead here are some items to check The plug Is the computer plugged in The surge protector If the computer is plugged into a surge protector or a power strip make sure that the surge protector or power strip is plugged in and turned on If the surge protector or power strip has a light it should be glowing 1 The On Off switch Make sure that the computer s On Off switch is turned on This advice sounds too basic to even include here but some computers are set up so that the computer s power switch is always left in the On position and the computer is turned on or off by means of the switch on the surge protector or power strip Many computer users are surprised to find out that their computers have On Off switches on the backs of the cases To complicate matters newer computers have a Sleep feature in which they appear to be turned off but are really just sleeping All you have to do to wake this type of computer is jiggle the mouse a little I used to have an uncle like that You can easily ass
100. system Asking How does it work when a network works if a network works for me Say what Assessing how networks change computing life Identifying and offering sympathy to the network administrator Comparing servers to clients What have they got that you don t got omputer networks get a bad rap in the movies In the Terminator movies Skynet a computer network of the future takes over the planet builds deadly terminator robots and sends them back through time to kill everyone unfortunate enough to have the name Sarah Connor In The Matrix movies a vast and powerful computer network enslaves humans and keeps them trapped in a simulation of the real world And in one of Matthew Broderick s first movies War Games a computer whiz kid nearly starts World War III by connecting to a Defense Department network and playing the game Global Thermonuclear War Fear not These bad networks exist only in the dreams of science fiction writers Real world networks are much more calm and predictable They don t think for themselves they can t evolve into something you don t want them to be and they won t hurt you even if your name is Sarah Connor 10 Part I Let s Network Now that you re over your fear of networks you re ready to breeze through this chapter It s a gentle even superficial introduction to computer net works with a slant toward the concepts that can help you use a computer that s attached
101. system on a single com puter Of course only one of these operating systems can be running at any time When you boot the computer a menu appears with each of the installed operating systems listed You can choose which operating system to boot from this menu Multiboot is most useful for software develop ers or network managers who want to make sure that software is compatible with a wide variety of operating systems Rather than set up a bunch of separate computers with different operating system versions you can install sev eral operating systems on a single PC and use that one PC to test the software For production network servers however you probably don t need to have more than one operating system installed If you still insist on loading two or more oper ating systems on a network server be sure to install each operating system into its own disk partition Although most network operating systems let you install two or more operat ing systems into a single partition doing so is not a good idea To support two operating sys tems in a single partition the operating systems have to play a risky shell game with key system files moving or renaming them each time you restart the computer Unfortunately things can go wrong For example if lightning strikes and the power goes out just as the NOS is switch ing around the startup files you may find your self with a server that can t boot to any of its installe
102. that s the case the NAT device must use a globally unique IP to represent the host to the Internet behind the firewall however the host can use any IP address it wants As packets cross the firewall the NAT device translates the private IP address to the public IP address and vice versa One of the benefits of NAT is that it helps to slow down the rate at which the IP address space is assigned That s because a NAT device can use a single public IP address for more than one host It does this by keeping track of out going packets so that it can match up incoming packets with the correct host To understand how this process works consider this sequence of steps 1 A host whose private address is 192 168 1 100 sends a request to 216 239 57 99 which happens to be www google com The NAT device changes the source IP address of the packet to 208 23 110 22 the IP address of the firewall That way Google will send its reply back to the firewall router The NAT records that 192 168 1 100 sent a request to 216 239 57 99 Chapter 6 Dealing with TCP IP 2 Now another host at address 192 168 1 107 sends a request to 207 46 134 190 which happens to be www microsoft com The NAT device changes the source of this request to 208 23 110 22s0 that Microsoft will reply to the firewall router The NAT records that 192 168 1 107 sent a request to 207 46 134 190 3 A few seconds later the firewall receives a reply from 216 239 57 99 The des
103. that net work backups have on the rest of the network consider using a 1 000 Mbps switch rather than a normal 100 Mbps switch to connect the serv ers and the backup client That way network traffic between the server and the backup client won t bog down the rest of the network 1 Any files that are open while the backups are running won t get backed up That s usually not a problem because backups are run at off hours when people have gone home for the day However if someone leaves his or her computer on with a Word document open that Word docu ment won t be backed up One way to solve this problem is to set up the server so that it automatically logs everyone off the network before the backups begin 1 Some backup programs have special features that enable them to back up open files For example the Windows Server 2003 backup does this by creating a snapshot of the volume when it begins thus making temporary copies of any files that are modified during the backup The backup backs up the temporary copies rather than the versions being modified When the backup finishes the temporary copies are deleted How Many Sets of Backups Should Vou Keep Don t try to cut costs by purchasing one backup tape and reusing it every day What happens if you accidentally delete an important file on Tuesday and don t discover your mistake until Thursday Because the file didn t exist on Wednesday it won t be on Wednesday s back
104. the backup over the network from a client computer or a dedicated backup server you ll flood the network with gigabytes of data being backed up Your users will then complain that the entire network has slowed to a snail s pace Network performance is one of the main reasons you should try to run your backups during off hours when other users aren t accessing the network Another reason to do this is so that you can perform a more thorough backup If you run your backup while other users are accessing files the backup program is likely to skip over any files that are being accessed by users at the time the backup runs As a result your backup won t include those files Ironically the files most likely to get left out of the backup are often the files that need backing up the most because they re the files that are being used and modified Chapter 22 Backing Up Your Data 3 1 7 Here are some extra thoughts on client and server backups You may think that backing up directly from the server would be more efficient than backing up from a client because data doesn t have to travel over the network Actually this assumption doesn t always hold because the network may well be faster than the tape drive The net work probably won t slow down backups unless you back up during the busiest time of the day when hordes of network users are storming the network gates ay To improve network backup speed and to minimize the effect
105. the configuration information Domain name 1 DNS server address 1 WINS server address DHCP servers A DHCP server can be a server computer located on the TCP IP network Fortunately all modern server operating systems have a built in DHCP server capability To set up DHCP on a network server all you have to do is enable the server s DHCP function and configure its settings In the section Managing a Windows Server 2008 DHCP Server later in this chapter I show you how to configure a DHCP server for Windows 2008 A server computer running DHCP doesn t have to be devoted entirely to DHCP unless the network is very large For most networks a file server can share duty as a DHCP server especially if you provide long leases for your IP addresses I explain the idea of leases later in this chapter Many multifunction routers also have built in DHCP servers So if you don t want to burden one of your network servers with the DHCP function you can enable the router s built in DHCP server An advantage of allowing the router to be your network s DHCP server is that you rarely need to power down a router In contrast you occasionally need to restart or power down a file server to perform system maintenance to apply upgrades or to do some needed troubleshooting ar Chapter 6 Dealing with TCP IP 1 9 Most networks require only one DHCP server Setting up two or more servers on the same network requires that you car
106. the folder you share contains other folders network users can access files in those folders too anne Don t share an entire hard drive unless you want to grant everyone on the net D work the freedom to sneak a peek at every file on your hard drive Instead you should share just the folder or folders containing the specific documents that you want others to be able to access For example if you store all your Word documents in the My Documents folder you can share your My Documents folder so that other network users can access your Word documents Sharing a folder in Windows XP To share a folder on a Windows XP computer follow these steps 1 Double click the My Computer icon on your desktop The My Computer window comes to center stage 2 Select the folder that you want to share Click the icon for the drive that contains the folder you want to share and then find the folder itself and click it 3 Choose FileSharing and Security The Properties dialog box for the folder that you want to share appears Notice that the sharing options are grayed out 4 Select the Share This Folder on the Network option After you select this option the rest of the sharing options come alive as shown in Figure 3 5 Chapter 3 More Ways to Use Your Network 4 7 yP D If you prefer you can skip Steps 2 4 Instead just right click the folder you want to share and then choose Sharing and Security from the pop up menu th
107. the smallest networks benefit from having a separate dedicated server computer Here are a few points to ponder regarding dedicated versus nondedicated servers Using a dedicated server computer makes the network faster easier to work with and more reliable Consider what happens when the user of a server computer which doubles as a workstation decides to turn off the computer not realizing that someone else is accessing files on her hard drive You don t necessarily have to use your biggest and fastest computer as your server computer I ve seen networks where the slowest computer on the network is the server This is especially true when the server is mostly used to share a printer or to store a small number of shared files If you need to buy a computer for your network consider promoting one of your older computers to be the server and using the new computer as a client Looking at Different Types of Servers Assuming that your network will require one or more dedicated servers consider which types of servers the network needs In some cases a single server computer can fill one or more of these roles Whenever possible try to limit each server computer to a single server function File servers File servers provide centralized disk storage that can be conveniently shared by client computers on the network The most common task of a file server is to store shared files and programs For example the members of a small wo
108. this taldar No do not change NTFS permissions Yes change NTIS permissions To change NTFS permissions click Edit Permissions For more information about sharing and permissions see Managing Permissions for Shared Folders crean ies es Chapter 18 Managing Network Storage 26 7 Provision a Shared Folder Wiz rd _ 5 x Share Protocols 22 Steps Select each protocol over which users can access thes shared folder Shared Folder Location NTFS Permissions W smg Share Protocole Shore nome SMB Settings arketing SMB Pemissons Share path DFS Namespace Publishing CSERVEROI Marketing Review Settings and Create Share F NFS Contemation Share name Share patt A NFS not installed on this server E Figure 18 4 Specifying the share name lt Previous Neas Conca 4 Type the name that you want to use for the share in the Share Name box The default name is the name of the folder being shared If the folder name is long you can use a more succinct name here Windows Server 2008 includes the ability to share files using the Unix NFS file protocol If you ve enabled NFS sharing on this computer this dialog box also lets you set the sharing information for NFS 5 Click Next The dialog box as shown in Figure 18 5 appears 6 Enter a description for the share and then click Next The dialog box as shown in Figure 18 6 appears 268 Part IV Net
109. to a network This chapter goes easy on the details the detailed and boring stuff comes later What Is a Network A network is nothing more than two or more computers connected by a cable or in some cases by radio connection so that they can exchange information Of course computers can exchange information in ways other than networks Most of us have used what computer nerds call the sneakernet That s where you copy a file to a CD or DVD disk or a removable flash drive and then walk the data over to someone else s computer The term sneakernet is typical of computer nerds feeble attempts at humor The whole problem with the sneakernet is that it s slow plus it wears a trail in your carpet One day some penny pinching computer geeks discov ered that connecting computers with cables was cheaper than replacing the carpet every six months Thus the modern computer network was born You can create a computer network by hooking together all the computers in your office with cables and using the computer s network interface an elec tronic circuit that resides inside your computer and has a special jack on the computer s backside Then you set up your computer s operating system software to make the network work and voila you have a working net work That s all there is to it If you don t want to mess with cables you can create a wireless network instead In a wireless network each computer is equip
110. to other network variables Write down the results of each test so that you have an accurate record of the effect that each change makes on your network s performance Be sure to change only one aspect of the network each time you run the benchmark If you make several changes you don t know which one caused the change One change may improve performance but the other change may worsen performance so that the changes cancel each other out kind of like offsetting penalties in a football game If possible conduct the baseline test during normal working hours when the network is undergoing its normal workload To establish the network s baseline performance run the benchmark test two or three times to make sure that the results are repeatable 284 Part IV Network Management For Dummies Monitor Network Performance Figure 19 1 Monitoring performance in Windows Server a One way to monitor network performance is to use a stopwatch to see how long it takes to complete common network tasks such as opening documents or printing reports If you choose to monitor your network by using the stop watch technique you may want to get a clipboard baseball cap and gray sweat suit to complete the ensemble A more high tech approach to monitoring network performance is to use a monitor program that automatically gathers network statistics for you After you set up the monitor it plugs away silently spying on your networ
111. to the appropriate seg ment However a bridge can t look inside the message to see what type of information is being sent A router can As a result routers work at a higher level than bridges Thus routers can perform additional tasks such as filter ing packets based on their content Many routers also have built in bridging functions so routers are often used as bridges You can configure a network with several routers that can work cooperatively together For example some routers can monitor the network to determine the most efficient path for sending a message to its ultimate destination If a part of the network is extremely busy a router can automatically route mes sages along a less busy route In this respect the router is kind of like a traffic reporter flying in a helicopter The router knows that the 101 is bumper to bumper all the way through Sunnyvale so it sends the message on the 280 instead Chapter 5 Cables Adapters and Other Stuff 03 Here s some additional information about routers Routers used to be expensive and used only on large networks However the price of small routers has dropped substantially in recent years so they re now becoming common even on small networks The functional distinctions between bridges and routers and switches and hubs for that matter get blurrier all the time Multifunction routers which combine the functions of routers bridges hubs and switches are ofte
112. training process painless for you and your users 1 Write a summary of what your users need to know about the network on one page if possible Include everyone s user IDs the names of the servers network drive assignments and printers and the procedure for logging on to the network Everyone needs a copy of this Network Cheat Sheet Emphasize the etiquette of network life Make sure that everyone understands that not all free space on the network drive is personal space it s shared and it should be used sparingly Explain the impor tance of treating other people s files with respect Ask users to check with their fellow users before sending a three hour print job to the printer Don t bluff your way through your role as network manager If you re not a computer genius don t pretend to be one just because you know a little more than everyone else Tell users that everyone is in this together and that you will do your best to try to solve any network prob lems that may come up Organize a Library As the network manager every network user expects you to be an expert at every computer program he uses That task is manageable when you have only two network users and they only use Microsoft Word But if you have a gaggle of users who use a bevy of programs being an expert in all them is next to impossible The only solution is a well stocked computer library that has all the informa tion you may need to solv
113. translates into roughly 1 2 million bytes per second In practice Ethernet can t move information that fast because data must be transmitted in packages of no more than 1 500 bytes called packets So 150KB of information has to be split into 100 packets Ethernet s transmission speed has nothing to do with how fast electri cal signals move on the cable The electrical signals travel at about 70 percent of the speed of light or as Captain Kirk would say Warp factor point seven oh 1 A newer version of Ethernet called Fast Ethernet or 100 Mbps Ethernet moves data ten times as fast as normal Ethernet Because Fast Ethernet moves data at a whopping 100 Mbps and uses twisted pair cabling it s often called 100BaseT and sometimes 100BaseTX 1 An even faster version of Ethernet known as Gigabit Ethernet is also available Gigabit Ethernet is now the most common type used for new networks but plenty of existing networks in place still run at 100 Mbps S2 Partit Building Your Own Network Most networking components that you can buy these days support all three network speeds 10 Mbps 100 Mbps and 1 000 Mbps These components are called 10 100 1000 Mbps components All about Cable Figure 5 1 Twisted pair cable SS Although you can use wireless technology to create networks without cables most networks still use cables to physically connect each computer to the network Over the years various types of
114. two at a users group meeting You can probably convince your boss to pay your fees to join the group If you can t find a real life guru try to find an online guru Check out the various computing newsgroups on the Internet Subscribe to online newsletters that are automatically delivered to you by e mail Spew Helpful Bluffs and Excuses As a network administrator sometimes you just can t solve a problem immediately You can do two things in this situation Chapter 21 How to Stay on Top of Your Network 305 The first solution is to explain that the problem is particularly difficult and are that you ll have a solution as soon as possible The second solution is to look the user in the eye and try a phony explanation 1 It was the version of your software Oh they fixed that with version 39 1 It was those cheap imported memory chips 1 It was those Democrats Or Republicans 1 The problem was caused by stray static electricity Those types of prob lems are difficult to track down Users who don t properly discharge themselves before using their computers can cause all kinds of problems You need more memory You need a bigger disk You need a dual core processor to do that Jar Jar Binks did it You should upgrade to Windows 7 You didn t upgrade to Windows 7 did you It could be a virus Or sunspots All work and no beer makes Homer something something something 306 Part IV N
115. up to form an ad hoc network For example if you and a few of your friends all have notebook computers with 802 11b g wireless network adapters you can meet anywhere and form an ad hoc network All the computers within range of each other in an ad hoc network are called an Independent Basic Service Set or IBSS Configuring a Wireless Access Point The physical setup for a wireless access point is pretty simple You take it out of the box put it on a shelf or on top of a bookcase near a network jack and a power outlet plug in the power cable and plug in the network cable Chapter 9 Wireless Networking 1 7 1 ar NING RY The software configuration for an access point is a little more involved but still not complicated It s usually done by using a Web interface To get to the configuration page for the access point you need to know the access point s IP address Then you just type that address into the address bar of a browser from any computer on the network Multifunction access points usually provide DHCP and NAT services for the networks and double as the network s gateway router As a result they typi cally have a private IP address that s at the beginning of one of the Internet s private IP address ranges such as 192 168 0 1 0r10 0 0 1 Consult the documentation that came with the access point to find out more If you use a multifunction access point that is both your wireless access point and your Internet
116. use ARCnet This standard is still commonly used for industrial network applications such as building automation and factory robot control But these older networks are now pretty much obsolete so you don t need to worry about them Ethernet is now the only real choice for new networks small or large Here are a few tidbits you re likely to run into at parties where the conversa tion is about Ethernet standards Ethernet is a set of standards for the infrastructure on which a network is built All the network operating systems that I discuss in this book including all versions of Windows NetWare Linux and Macintosh OS X can operate on an Ethernet network If you build your network on a solid Ethernet base you can change network operating systems later Ethernet is often referred to by network gurus as 802 3 pronounced eight oh two dot three which is the official designation used by the IEEE pronounced eye triple e not aieeee a group of electrical engi neers who wear bow ties and have nothing better to do than argue all day long about things like inductance and cross talk and it s a good thing they do If not for them you couldn t mix and match Ethernet com ponents made by different companies The original vintage Ethernet transmits data at a rate of 10 million bits per second or 10 Mbps Mbps is usually pronounced megabits per second Because 8 bits are in a byte that
117. use a small hub or switch to connect two or more computers to the network by using a single jack Just use one cable to plug the daisy chain port of the hub into the wall jack and then plug each computer into one of the hub s ports Network Interface Cards Every computer that connects to your network must have a network inter face Most new computers come with a built in network interface But you may need to add a separate network interface card to older computers that don t have built in interfaces The following sections show you what you need to know to purchase and install a network interface card Chapter 5 Cables Adapters and Other Stuff 9 7 Picking a network interface card You can buy inexpensive network interface cards at any computer supply store and most large office supply stores also carry them The following pointers should help you pick the right card for your system 1 The network interface cards that you use must have a connector that matches the type of cable you use If you plan on wiring your network with Thinnet cable make sure that the network cards have a BNC con nector For twisted pair wiring make sure that the cards have an RJ 45 connector Some network cards provide two or three connectors I see them in every combination BNC and AUI RJ 45 and AUI BNC and RJ 45 and all three AUI connectors are pretty much obsolete As for BNC connec tors get them only if your network has existing coax
118. users only here s the scoop on networks how to use one and how it makes life easier e Getting started find out how to plana network and what hardware and software you need to set one up e More techie stuff what network builders need to know about TCP IP DHCP and DNS e l Il be your server learn about setting up a server configuring Windows clients and going wireless Hooking up connect your network to the Internet and set up a firewall Going mobile explore the unique factors that affect network access via iPhones BlackBerry devices and other smartphones Network management learn to keep your network secure and A your users happy Go to Dummies com for videos step by step examples Those other guys discover how to network Macs and PCs or set how to articles or to shop i up a Linux network For Dummies A Branded Imprint of WILEY 24 99 US 29 99 CN 17 99 UK TSBN AOU at Oost Fase Doug Lowe
119. using Office on a network and comes with a CD that has valuable tools If you don t want to purchase the ORK you can view it online and download the ORK tools from the Microsoft TechNet Web site www microsoft com technet Nanoo nanoo earthling 54 Part I Let s Network Ni RY NG Installing Office on a network some options You need to make some basic decisions when you prepare to install Microsoft Office on a network In particular here are some possible approaches to installing Microsoft Office on your network clients You can simply ignore the fact that you have a network and purchase a separate copy of Office for each user on the network Then you can install Office from the CD on each computer This option works well if e Your network is small e Each computer has ample disk space to hold the necessary Office files e Each computer has its own CD ROM drive If the computer doesn t have a CD ROM drive you can share a CD ROM drive on another computer and install the software from the shared drive 1 On a larger network you can use the Office Setup program in Administrative Setup mode This option lets you create a special type of setup on a network server disk from which you can install Office on network computers Administrative Setup enables you to control the custom features selected for each network computer and reduce the amount of user interaction required to install Office on each computer I
120. want to add Type the name of the mailbox you want to add and then click OK The mailbox is added to the list box in the Microsoft Exchange dialog box 202 Part Ill Getting Connected Figure 11 9 The Advanced tab PCS 6 Click OK You re returned to the Change E mail Account dialog box 7 Click Next and then click Finish You re done You can now view the Support mailbox To actually view the mailbox you need to open the Folder List window in Outlook by choosing View Folder List Then you can double click the Support mailbox in the list to open it Chapter 12 Creating an Intranet In This Chapter Getting acquainted with intranets Finding good uses for intranets Figuring out what you need to set up an intranet Setting up an IIS Web server Setting up a simple intranet Managing IIS N o I m not mispronouncing Internet The term intranet has gained popularity in recent years It s similar to the Internet but with a twist Rather than connect your computer to millions of other computers around the world an intranet connects your computer to other computers in your company or organization How is an intranet different from your ordinary run of the mill network Read on and I ll explain What Is an Intranet Everyone knows that the Internet and especially the World Wide Web has become a phenomenon Millions of computer users worldwide surf the Web and many join the bandwagon every day Recently
121. weren t designed primarily to be network servers If you dedicate a computer to the task of being a full time server use a special network operating system rather than the standard Windows operating system A network operating system also known as a NOS is specially designed to handle networking functions efficiently e The most commonly used network operating systems are the server versions of Windows At the time I wrote this chapter the current server version of Windows was Windows Server 2008 However many companies still use the previous version Windows Server 2003 and a few even use its predecessor Windows 2000 Server 16 Part I Let s Network ai e Other network operating systems include Linux and Novell NetWare 1 Many networks are both peer to peer and dedicated server networks at the same time These networks have e At least one server computer that runs a NOS such as Windows Server 2008 e Client computers that use the server features of Windows to share their resources with the network Besides being dedicated your servers should also be sincere What Makes a Network Tick ar To use a network you don t really have to know much about how it works Still you may feel a little bit better about using the network if you realize that it doesn t work by voodoo A network may seem like magic but it isn t The following list describes the inner workings of a typical network Networ
122. wiring If it doesn t cards that have just RJ 45 connectors are adequate Most newer network cards are designated as 10 100 1000 Mbps cards which means that they work at 10 Mbps 100 Mbps or 1000 Mbps These cards automatically detect the network speed and switch accordingly Ah progress 1 When you purchase a network card make sure that you get one that s compatible with your computer Many older computers can accommo date cards designed for the standard 16 bit ISA bus Newer computers can accommodate cards that use the PCI bus If your computer supports PCI purchase a PCI card PCI cards are not only faster than ISA cards but are also easier to configure Use ISA cards only for older computers that can t accommodate PCI cards Network cards can be a bit tricky to set up Each different card has its own nuances You can simplify your life a bit if you use the same card for every computer in your network Try not to mix and match network cards 1 Some computers come with network interfaces built in In that case you don t have to worry about adding a network card Installing a network card Installing a network interface card is a manageable task but you have to be willing to roll up your sleeves If you ve installed one adapter card you ve installed them all In other words installing a network interface card is just like installing a modem a new video controller card a sound card or any other type of card I
123. you re picky about the diagrams you can even purchase stencil sets that have accurate drawings of specific devices such as Cisco routers or IBM mainframe computers You can add information to each computer or device in the diagram such as the serial number or physical location Then you can quickly print an inventory that lists this information for each device in the diagram You can easily create large diagrams that span multiple pages Sample Network Plans In what s left of this chapter I present some network plans drawn from real life situations These examples illustrate many of the network design issues I cover earlier in this chapter The stories you re about to read are true The names have been changed to protect the innocent Building a small network California Sport Surface Inc California Sport Surface Inc CSS is a small company specializing in the installation of outdoor sports surfaces such as tennis courts running tracks and football fields CSS has an administrative staff of just four employees who work out of a home office The company has three computers A brand new Dell desktop computer running Windows 7 Home Basic Edition shared by the president Mark and vice president Mary to prepare proposals and marketing brochures handle correspondence and do other miscellaneous chores This computer has a built in 10 100 1000 Mbps Ethernet network port An older Dell computer running Windows XP
124. your computer s monitor 1 Most network operating systems enable you to set an expiration time for passwords For example you can specify that passwords expire after 30 days When a user s password expires the user must change it Your users may consider this process a hassle but it helps to limit the risk of someone swiping a password and then trying to break into your computer system later You can configure user accounts so that when they change passwords they can t reuse a recent password For example you can specify that the new password can t be identical to any of the user s past three passwords You can also configure security policies so that passwords must include a mixture of uppercase letters lowercase letters numerals and special symbols Thus passwords like DIMWIT or DUFUS are out Passwords like 87d0IM wit or duF39 amp US are in Some administrators of small networks opt against passwords altogether because they feel that security isn t an issue on their network Or short of that they choose obvious passwords assign every user the same pass word or print the passwords on giant posters and hang them throughout the building Ignoring basic password security is rarely a good idea even in small networks You should consider not using passwords only if your network is very small say two or three computers if you don t keep sensitive data on a file server or if the main reason for the network
125. 0 World Wide Web HTTP 110 Post Office Protocol POP3 119 Network News Transfer Protocol NNTP 137 NetBIOS Name Service 138 NetBIOS Datagram Service 139 NetBIOS Session Service 143 Internet Message Access Protocol IMAP 161 Simple Network Management Protocol SNMP 194 Internet Relay Chat IRC 389 Lightweight Directory Access Protocol LDAP 396 NetWare over IP 443 HTTP over TLS SSL HTTPS The rules that you set up for the packet filter either permit or deny packets that specify certain IP addresses or ports For example you may permit packets that are intended for your mail server or your Web server and deny all other packets Or you may set up a rule that specifically denies packets that are heading for the ports used by NetBIOS This rule keeps Internet hackers from trying to access NetBIOS server resources such as files or printers One of the biggest weaknesses of packet filtering is that it pretty much trusts that the packets themselves are telling the truth when they say who they re from and who they re going to Hackers exploit this weakness by using a hacking technique called P spoofing in which they insert fake IP addresses in packets that they send to your network Another weakness of packet filtering is that it examines each packet in isolation without considering what packets have gone through the firewall before and what packets may follow In other words packet filtering is stateless Rest assured that h
126. 02 11g networks operate on the same radio frequency as many cordless phones 2 4 GHz If you set up an 802 11b or 802 11g network in your home and you also have a 2 4 GHz cordless phone the network and phone may occasionally interfere with each other The only way to completely avoid the interference is to switch to a 900 MHz phone or use more expensive 802 11n network components which transmit at 5 GHz rather than at 2 4 GHz Home on the Range The maximum range of an 802 11g wireless device indoors is about 300 feet This range can have an interesting effect when you get a bunch of wireless computers together such that some of them are in range of each other but others are not Suppose that Wally Ward and the Beaver all have wire less notebooks Wally s computer is 200 feet away from Ward s computer and Ward s computer is 200 feet away from Beaver s in the opposite direc tion see Figure 9 2 In this case Ward can access both Wally s computer and Beaver s computer but Wally can access only Ward s computer and Beaver can access only Ward s computer In other words Wally and Beaver can t access each other s computers because they re outside the 300 feet range limit This is starting to sound suspiciously like an algebra problem Now suppose that Wally starts walking toward Ward at 2 miles per hour and Beaver starts running toward Ward at 4 miles per hour 171 172 Partit Building Your Own Network
127. 1 Cane Manager Provides se Manual Local ae The 4 Cryptographic Ser Provides fo Started Automatic Network S Services n tool Extended Standard SSS Table 20 1 Key Windows Services Service What It Does Computer Maintains a list of computers on the network that can be Browser accessed If this service is disabled the computer cannot use browsing services such as My Network Places DHCP Client Enables the computer to obtain its IP address from a DHCP server If this service is disabled the computer s IP address isn t config ured properly DNS Client Allows the computer to access a DNS server to resolve DNS names If this service is disabled the computer cannot handle DNS names including Internet addresses and Active Directory names Server Provides basic file and printer sharing services for the server If this service is stopped clients cannot connect to the server to access files or printers Workstation Enables the computer to establish client connections with other servers lf this service is disabled the computer cannot connect to other servers NING Chapter 20 Solving Network Problems 29 7 Key services usually stop for a reason so simply restarting a stopped service probably won t solve your network s problem at least not for long Review the system log to look for any error messages that may explain why the ser vice stopped in the first place If you r
128. 192 337 343 345 388 fish tape 88 fixes NOS 142 floppy drive disabling 324 folders permissions 261 262 Public 49 50 shared 26 28 31 34 46 49 271 273 forward slash characters 353 Foundation version Windows Server 2008 fractional T1 line 187 fractional T3 line 187 frequencies 167 168 full backup 313 Full control permission 261 full installation NOS 137 138 full name Linux account 361 fully qualified domain names 127 eGo General tab Exhange Properties dialog box 223 Properties dialog box 152 153 User Properties dialog box 249 250 generations backup 318 Gigabit Ethernet 81 GNOME 358 359 graphical user interface GUD 352 group accounts 255 257 332 333 361 group memberships 246 330 Group Properties dialog box 257 Guest account 331 GUI graphical user interface 352 e H o hackers 322 340 hard drive 13 46 65 67 242 See also partitions hard drive hardening network See network hardening hardware 140 141 352 Hardware Compatibility List HCL 141 hertz Hz 167 hidden shares 263 hierarchical naming system DNS 127 high speed private lines 187 home directory 330 361 home folder 27 253 host ID in IP address 108 112 115 Hotfix Checker program 242 HTTP HyperText Transfer Protocol 400 hub 10 11 17 82 83 282 286 325 396 HyperText Transfer Protocol HTTP 400 Hz hertz 167 ojo IBSS Independent Basic Service Set 176 icons used in book 5
129. 23 automated installation NOS 139 140 automatic logon 25 e Bo backbone speed 282 Background Printing enabling 374 backup selection 312 313 backups local 316 317 network 316 317 network administrator tasks 240 before NOS installation 143 number of sets to keep 317 318 overview 309 schedules 238 286 security 320 software for 311 tape 310 318 320 325 types of 312 316 user rights 332 virus threats 345 bands radio spectrum 169 bandwidth 83 169 BarracudaWare Yosemite Backup 311 baseline 283 Baseline Security Analyzer program 242 Basic Service Set BSS 175 benchmark 283 binary system 105 107 402 Networking For Dummies 9th Edition binder network administration 238 302 390 bits 106 109 115 312 313 BlackBerry devices 222 225 226 BNC connector 101 boot levels Linux 368 boot partition 355 bottlenecks 278 282 bridges 101 102 176 bringing computer up 11 broadband connections 186 broadcast SSID 178 broadcast domain 113 Browse for Folder dialog box 32 browser accessing OWA from 230 browsing network 29 30 BSS Basic Service Set 175 bus topology 80 oC o cable categories of 83 84 checking connections 290 291 crossover 91 infrastructure plan 71 72 installation guidelines 86 87 overview 16 17 82 83 patch panels 91 92 plenum 85 repeaters 99 101 RJ 45 connectors 89 90 shielding 84 85 solid 85 86 strande
130. 24 network protocols 66 132 143 154 155 281 292 371 372 network discovery program 239 networks components of 16 17 disadvantages of 17 19 overview 1 6 9 12 purpose of 12 14 NetworkView program 239 New dialog box 55 56 New Host dialog box 128 129 New Object Group dialog box 255 256 New Object User Wizard 247 249 New Resource Record dialog box 215 216 New Scope Wizard 122 123 newsletters e mail 303 304 NIC network interface card 16 96 99 280 911 VoIP calls to 220 nmbd daemon 367 No Locks method Access 58 node 11 normal backups 313 314 NOS See network operating system Windows Server 2008 NOT operation 107 Novell NetWare 347 NTFS permissions 266 NTFS volumes 332 NWLink IPX SPX NetBIOS Compatible Transport Protocol 154 ede octets 108 115 Office Microsoft 53 58 Office Resource Kit ORK 53 offline computer 11 offline files 58 60 on the network 11 100 Mbps Ethernet 81 89 90 100BaseT 81 89 90 99 100 online computer 11 On Off switch computer 289 Open dialog box 54 55 Open System Interconnection OSI model 395 400 Open Transport 372 open door approach to security 323 324 opened software packages 346 operating systems 66 67 71 See also network operating system Options page OWA 231 OR operation 107 Organization tab User Properties dialog box 250 organizational skills network administrator 19 237 ORK Office Resource Kit 53 OS
131. 252 accounts See user accounts Active Directory 134 135 Active Directory Users and Computers tool 134 135 223 225 246 247 253 257 ad hoc networks 166 176 adapters wireless networking 172 173 Add E mail Account dialog box 198 199 Add Printer Wizard 35 36 Add Roles Wizard 148 206 208 Add Web Site dialog box 212 214 Address Leases DHCP management console 124 Address Pool DHCP management console 124 Address tab User Properties dialog box 250 addresses See IP addresses Admin Permissions dialog box 273 274 Administrative Setup mode 54 administrator See network administrator Administrator account 146 330 Advanced Sharing dialog box 271 272 Advanced Sharing Settings page 45 46 Advanced tab Microsoft Exchange dialog box 201 202 Properties dialog box 153 154 AFP AppleTalk Filing Protocol 373 alias 194 All Records method Access 58 Alohanet 170 Analog Telephone Adapter ATA 218 220 AND operation 107 antennas 167 168 antivirus programs 344 346 388 Apache Web server 372 Apple See Macintosh networking Apple iPhone 223 225 AppleTalk 372 373 AppleTalk Filing Protocol AFP 373 application gateway 342 Application Layer OSI model 400 applications See programs APs access points See wireless access point archive bit 312 313 ARCnet standard 81 AT amp T 258A 88 89 AT amp T CallVantage 218 ATA Analog Telephone Adapter 218 220 attachments e mail 344 346 authorizing DHCP server 1
132. 318 router address for scope 120 routers 102 103 118 132 187 189 232 398 routine chores performing 239 240 routing Network Layer 398 eSe safe computing 345 346 Samba installing 366 367 overview 365 366 Samba Server Configuration tool 368 370 starting 367 368 stopping 367 368 scheduled tasks 286 scopes 119 120 security Access database 58 administrator account 328 329 built in accounts 330 331 closed door approach 323 324 groups 332 333 IPSec 232 logon scripts 334 335 mobile devices 226 227 network administrator tasks 240 open door approach 323 324 overview 18 321 323 passwords 326 328 permissions 332 physical 324 325 policy network 335 Samba server 368 369 services NOS 134 135 spyware 286 user accounts 329 330 user profiles 334 user rights 331 332 usernames 325 326 virus protection 388 WAP 383 384 segments cable 100 282 Select Role Services page 206 207 Select Server Roles page 148 149 206 Select Users Computers or Groups dialog box 200 275 Server Core 136 Server Manager page 147 148 Server Message Block SMB 366 server roles 147 150 263 264 Server service 296 servers See also file servers sharing configuration options 280 281 database 71 dedicated 15 16 69 DHCP 118 119 123 firewalls 188 189 hardware 280 IIS Web 205 209 intranets 205 loss of privacy on computer used as 18 mail 70 NOS requirements 140 141 operating system 71 141
133. 7 Planning the Infrastructure You also need to plan the details of how you ll connect the computers in the network You have to determine which network topology the network will use which type of cable will be used where the cable will be routed and which other devices most likely network switches and perhaps a router will be needed Although you have many cabling options to choose from you ll probably use Cat5e or better for most if not all of the desktop client computers on the network However you have many questions to answer beyond this basic choice Where will you place workgroup switches on a desktop somewhere within the group or in a central wiring closet How many client computers will you place on each switch and how many switches will you need If you need more than one switch which type of cabling will you use to connect the switches to one another 12 Part Il Building Your Own Network ar For more information about network cabling see Chapter 5 If you re installing new network cable don t scrimp on the cable itself Because installing network cable is a labor intensive task the cost of the cable itself is a small part of the total cable installation cost And if you spend a little extra to install higher grade cable now you don t have to replace the cable in a few years when it s time to upgrade the network Drawing Diagrams T Figure 4 4 Using Visio to create
134. 9 Choose File gt Exit to close Outlook and then restart Outlook The mailbox is configured Viewing Another Mailbox Sometimes you want to set up Outlook so that in addition to the user s main mailbox he has access to another user s mailbox For example suppose you create a user named Support so that your customers can send e mail to 200 Part Ill Getting Connected nay Figure 11 7 The Mailbox Rights tab D Support YourCompany com to ask technical support questions If you don t set up at least one of your users so that he can read the Support mailbox any mail sent to Support YourCompany com will languish unanswered Assuming that s not what you want you can set up one or more of your users to access the Support mailbox so that they can read and respond to the mail First you must configure the Support user account s mailbox so that it grants access rights to the user that you want to have access to the account To do that follow these steps 1 On the server choose Start Active Directory Users and Computers and then find and double click the e mail account you want to access from another user s Outlook The Properties dialog box appears 2 Click the Exchange Advanced tab and then click the Mailbox Rights button The Permissions for Support dialog box appears as shown in Figure 11 7 3 Click the Add button This brings up a Select Users Computers or Groups dialog box 4 Type the name o
135. 96 thin coaxial cable 96 three letter acronym TLA 11 Time to Live 129 Time Warner Cable Digital Phone 220 TLA three letter acronym 11 Token Ring standard 81 top level domains 125 topology network 80 tracking log 299 300 training network 240 transaction applications 204 205 Transmission Control Protocol Internet Protocol See TCP IP transmission speed Ethernet 81 Transport Layer OSI model 398 399 trash shredding 325 Travan drives 310 Trojan horse programs 322 323 344 Troubleshoot button Properties dialog box 153 troubleshooting client computer restarting 293 295 computers fixing 289 290 connection checking 290 291 documenting 299 300 error messages 291 event logs 298 299 experimenting 292 293 network server restarting 297 298 network services restarting 295 297 network settings 292 overview 287 288 tuning network 283 twisted pair cable 16 82 84 88 89 99 101 o f o UNC path 36 understudy network administrator 237 Uninterruptible Power Supply UPS 143 Unix 137 unshielded twisted pair UTP cable 82 84 up computer state 11 updates 142 286 upgrades 137 138 236 uplink port 91 94 UPS Uninterruptible Power Supply 143 Up to Date Notifications 195 USB adapter wireless 173 user accounts administrator 328 329 built in 330 331 creating 246 249 deleting 254 255 disabling 254 domain 245 246 enabling 254 groups 255 257 Linux 356 360 362 local 245 246
136. Analyzer If you prefer GUI based tools check out this program which you can download for free from the Microsoft Web site To find it go to www microsoft comand search for Microsoft Baseline Security Analyzer A third party utility Get one of those 100 in 1 utility programs such as Symantec s Norton Utilities It has invaluable utilities for repairing dam aged hard drives rearranging the directory structure of your hard drive and gathering information about your computer and its equipment Never use a hard drive repair program that isn t designed to work with the operating system or version that your computer uses or the file system you installed Anytime you upgrade to a newer version of your operating system also upgrade your hard drive repair program to a ver sion that supports the new operating system version Protocol analyzer A protocol analyzer or packet sniffer can monitor and log the individual packets that travel along your network You can configure the protocol analyzer to filter specific types of packets watch for specific types of problems and provide statistical analysis of the captured packets Most network administrators agree that Sniffer by NetScout Systems Inc www netscout com is the best protocol analyzer available How ever it s also one of the most expensive If you prefer a free alternative check out Ethereal which you can download for free from www ethereal com Network Monitor Windo
137. Browse to the alias address you just created For this example I browsed to hr lowewriter pri Figure 12 13 shows the resulting page 2 16 Part Ill Getting Connected eS Figure 12 12 Creating a CNAME record aS C HR Web Sile Defaull htm Windows Internet Explorer ah G FE internet Explorer canna A ia R Welcome to the IIR Web Site Figure 12 13 Viewing a Web site Chapter 13 Is Ita Phone or a Computer Or Understanding VolP and Convergence In This Chapter How VoIP works Advantages of VoIP Disadvantages of VoIP Some popular VoIP providers O of the newest trends in networking is the convergence of two distinct but similar types of networks computer networks and telephone net works Both types of networks can be either cabled or wireless and both can carry voice and data In other words the distinction between computer networks and telephone networks is getting blurry This chapter gives you a brief introduction to VoJP a technology that lets you send voice data over your computer network In other words VolP attempts to make your phone cables obsolete by having the computer network handle voice traffic ar This chapter isn t a complete guide to VoIP For that check out VoIP For Dummies written by Timothy V Kelly and published by Wiley Understanding VolP VoIP which stands for Voice Over IP Internet Protocol works much the same as a regular telephone
138. Connection dialog box With this dialog box you can choose the network that you want to join if more than one network is listed and then click Connect to join the selected network Connecting to a Wireless Network with Windows Vista or Windows 7 Wireless networking in Windows Vista or Windows 7 is easier than in Windows XP When Windows Vista or Windows 7 detects that a wireless net work is within range a balloon notification appears on the screen to indicate 82 Part Il Building Your Own Network that one or more wireless networks are available You can double click this balloon to summon the dialog box shown in Figure 9 8 Then you can double click the network you want to connect to Select a network to connect to Show All My linksys Unsecured network Figure 9 8 Connecting to a wireless network Eee Part Ill Getting Connected The 5th Wave By Rich Tennant RICATENN ANT at s it We re getting a wireless network for the house In this part A fter you build your network the chapters in this part show you how to connect it to the outside world You ll figure out how to connect your network to the Internet set up and manage an e mail server set up a corporate intranet use your network as a telephone system and connect to your network from home Whew You ll be more connected than a Hollywood talent agent Chapter 10 Connecti
139. Data Chapter 19 Network Performance Anxiety 285 The Windows Performance Monitor lets you keep track of several different aspects of system performance at a time You track each performance aspect by setting up a counter You can choose from dozens of different counters Table 19 1 describes some of the most commonly used counters Note that each counter refers to a server object such as physical disk memory or processor Table 19 1 Commonly Used Performance Counters Object Counter What It Indicates Physical Free Space The percentage of free space on the server s Disk physical disks The free space should measure at least 15 percent Physical Average Queue How many disk operations are waiting while the Disk Length disk is busy servicing other disk operations The number of operations should be two or fewer Memory Pages Second The number of pages retrieved from the vir tual memory page files per second A typical threshold is about 2 500 pages per second Processor Processor Time The percentage of the processor s time that itis doing work rather than sitting idle The amount of time should be 85 percent or less Here are a few more things to consider about performance monitoring Performance Monitor enables you to view real time data or to view data that you can save in a log file Real time data gives you an idea about what s happening with the network at a particular moment but the more u
140. Explorer E SUED k S hipan making ion please see the Host Name Domain Name Firmware Version LAN IP Address E eN Enable Disable Figure 9 4 ssp linksys The main hoor Shia configura WEP O Mandatory Disable _WEPKey Semng tion page EEE inc adress 00 208A24 30 11 for a typical wireless access point router SSW SSID Broadcast Disables the access point s periodic broadcast of the SSID Normally the access point regularly broadcasts its SSID so that wireless i devices that come within range can detect the network and join in For a more secure network you can disable this function Then a wire less client must already know the network s SSID to join the network Channel Lets you select one of 11 channels on which to broadcast All the access points and computers in the wireless network should use the same channel ar If you find that your network frequently loses connections try switching to another channel You may be experiencing interference from a cord less phone or other wireless device operating on the same channel Switching channels is also a friendly way for neighbors with wireless net works to stay out of each other s way For example if you share a build ing with another tenant who also has a wireless network you can agree to use separate channels so that your wireless networks don t interfere with each other Keep in mind that this agreement doesn t give you
141. For the complete lowdown on networking cables refer to Chapter 5 Chapter 1 Networks Will Not Take Over the World and Other Network Basics 7 ar You can do away with network cable by creating a wireless network although that option has some challenges of its own For more informa tion about wireless networking see Chapter 9 Network switch Networks built with twisted pair cabling require one or more switches A switch is a box with a bunch of cable connectors Each computer on the network is connected by cable to the switch The switch in turn connects all the computers to each other In the early days of twisted pair networking devices known as hubs were used rather than switches The term hub is sometimes used to refer to switches but true hubs went out of style sometime around the turn of the century Network software Of course the software makes the network work To make any network work a whole bunch of software has to be set up just right For peer to peer networking with Windows you have to play with the Control Panel to get networking to work And a network operating system such as Windows Server 2008 requires a substantial amount of i tweaking to get it to work just right For more information about choosing which network software to use for your network refer to Chapter 7 It s Not a Personal Computer Anymore If I had to choose one point that I want you to remember from this chapter more than
142. HIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL ACCOUNTING OR OTHER PROFESSIONAL SERVICES IF PROFESSIONAL ASSISTANCE IS REQUIRED THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFOR MATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE FURTHER READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ For general information on our other products and services please contact our Customer Care Department within the U S at 877 762 2974 outside the U S at 317 572 3993 or fax 317 572 4002 For technical support please visit www wiley com techsupport Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books Library of Congr
143. Home Edition used by the bookkeeper Erin who uses QuickBooks to handle the company s accounting needs This computer also has a built in network port but it is just a 10 100 port it does not support Gigabit speed 74 Partit Building Your Own Network A notebook that runs Windows Vista Ultimate Edition used by the com pany s chief engineer Daniel who often takes it to job sites to help with engineering needs This computer has a built in 10 100 1000 Mbps Ethernet port The company owns just one printer a moderately priced inkjet printer that s connected to Erin s computer The computers aren t networked so when ever Mark Julie or Daniel needs to print something that person must copy the file to a diskette and give it to Erin who then prints the document The computer shared by Mark and Julie is connected to the Internet by using a residential DSL connection The company wants to install a network to support these three computers Here are the primary goals of the network 1 Provide shared access to the printer so that users don t have to exchange diskettes to print their documents Provide shared access to the Internet connection so that users can access the Internet from any of the computers Allow for the addition of another desktop computer which the company expects to purchase within the next six months and potentially another notebook computer If business is good the company hopes to hire anot
144. I Open System Interconnection model 395 400 Outlook 197 199 201 202 Outlook Mobile Access 195 223 Outlook Web Access 196 229 231 ownership file 332 eo po packet filtering 339 341 packet sniffer 242 packets 81 93 parent domain 125 PartitionMagic program PowerQuest 356 partitions hard drive 65 66 1 142 144 355 password generators 328 passwords account options 251 administrator 143 329 logging on with 24 25 Mac 373 NOS policies 134 security 326 328 user account 246 253 254 329 patch cables 85 95 291 patch panels 91 92 patches 346 347 path share 263 Pause key 291 Pause Printing command 38 39 PC card wireless 173 PC user groups 304 PCI card wireless 172 173 PCI slots 98 PCs networking Macs with 375 376 PDAs Personal Digital Assistants 222 408 Networking For Dummies 9th Edition peer to peer network 15 16 69 performance backups 316 bottlenecks 278 282 monitoring 284 285 overview 277 problems 277 278 tips 286 tuning 283 performance counters 285 Performance Monitor tool 284 285 perimeter 189 339 permissions granting 273 275 model 323 324 network storage 260 262 overview 332 share 263 troubleshooting 292 user 49 Permissions for Support dialog box 200 Personal Digital Assistants PDAs 222 phones cordless 171 Physical Layer OSI model 396 physical map 72 physical security 324 325 ping command 147 pins 88 90 planning network
145. IEEE 802 11 standards 170 173 Index 4 05 IIS Internet Information Services Manager 212 213 IIS Internet Information Services Web servers 205 209 ILS Internet Locator Service 197 IMAP4 protocol 196 incremental backups 314 315 Independent Basic Service Set IBSS 176 infrastructure 71 72 282 infrastructure mode 166 174 175 Initial Configuration Tasks page 145 147 148 Installation program Linux 362 Installation Results page Add Roles Wizard 208 209 interference sources of 86 Internet cable connections 186 connecting LAN to through router 103 DSL connections 186 firewalls 188 192 337 338 high speed private lines 187 overview 12 185 password generators 328 research on 244 sharing connection 187 VoIP service 220 Internet Information Services IIS Manager 212 213 Internet Information Services IIS Web servers 205 209 Internet Locator Service ILS 197 Internet Protocol IP addresses 108 111 128 177 See also TCP IP Internet Protocol TCP IP item Properties dialog box 154 Internet Protocol version 6 IPv6 112 Internet Service Provider ISP 185 intranets IIS Web servers setting up 205 209 overview 203 204 pages creating 210 212 requirements 205 uses for 204 205 Web sites creating 212 216 inventory 65 68 238 239 IP Internet Protocol addresses 108 111 128 177 See also TCP IP IP spoofing 340 ipconfig all command 147 397 iPhone configuring Exchange for 223
146. L aL aL ab 2550 255R 240 0 Don t confuse a subnet mask with an IP address A subnet mask doesn t repre sent any device or network on the Internet It s just a way of indicating which portion of an IP address should be used to determine the network ID You can spot a subnet mask right away because the first octet is always 255 and 255 isn t a valid first octet for any class of IP address The great subnet roundup You should know about a few additional restrictions that are placed on subnet masks in particular The minimum number of network ID bits is eight As a result the first octet of a subnet mask is always 255 vw The maximum number of network ID bits is 30 You have to leave at least two bits for the host ID portion of the address to allow for at least two hosts If you used all 32 bits for the network ID that would leave no bits for the host ID Obviously that doesn t work Leaving just one bit for the host ID doesn t work either That s because a host ID of all ones is reserved for a broadcast address and all zeros refers to the network itself Thus if you used 31 bits for the network ID and left only one for the host ID host ID 1 would be used for the broadcast address and host ID 0 would be the network itself leaving no room for actual hosts That s why the maximum network ID size is 30 bits Because the network ID is always composed of consecutive bits set to 1 only nine values are possible for
147. NG Here are some other threats to physical security that you may not have considered The nightly cleaning crew probably has complete access to your facility How do you know that the person who vacuums your office every night doesn t really work for your chief competitor or doesn t consider com puter hacking to be a sideline hobby You don t so consider the clean ing crew to be a threat What about your trash Paper shredders aren t just for Enron accoun tants Your trash can contain all sorts of useful information sales reports security logs printed copies of the company s security policy even hand written passwords For the best security every piece of paper that leaves your building via the trash bin should first go through a shredder 1 Where do you store your backup tapes Don t just stack them up next to the server Not only does that make them easy to steal it also defeats one of the main purposes of backing up your data in the first place securing your server from physical threats such as fires If a fire burns down your computer room and the backup tapes are sitting unprotected next to the server your company may go out of business and you ll cer tainly be out of a job Store the backup tapes securely in a fireproof safe and keep a copy off site too 4 I ve seen some networks in which the servers are in a locked computer room but the hubs or switches are in an unsecured closet Remember that every un
148. NT 3 1 and NetWare 3 x each server computer maintained its own directory database a file that contained an organized list of the resources available just on that server The problem with that approach was that network administrators had to maintain each directory database separately That wasn t too bad for networks with just a few servers but maintaining the directory on a network with dozens or even hundreds of servers was next to impossible In addition early directory services programs that made the directory data bases usable were application specific For example a server had one direc tory database for user logons another for file sharing and yet another for e mail addresses Each directory had its own tools for adding updating and deleting directory entries The most popular modern directory service is Active Directory which is standard with Windows based server operating systems Active Directory provides a single directory of all network resources It drops the old style 15 character domain and computer names that were used by Windows NT Server in favor of Internet style DNS style names such as Marketing MyCompany com or Sales YourCompany com Figure 7 1 shows the Active Directory Users and Computers tool which manages Active Directory user and computer accounts on Windows Server 2008 Security services All network operating systems must provide some measure of security to protect the network from unauthorized ac
149. O 100 VE Network Conne This connection uses the following tems Chent for Microsoft Networks ca B detemrestic Network Enhancer M E VMware Bridge Protocol SB Fie and Printer Shanna for Microsoft Networks y lt gt Install Uninstal Properties Description Figure 3 1 Allows your computer to access resources on a Microsoft The Local asai Area E Show icon n notification arca when connected Connection Z Notiy me when this connection has imted orno connectivity Properties Ceglar Co Core j Enabling File and Printer Sharing Windows Vista To enable file and printer sharing in Windows Vista follow these steps 1 Choose Start Network This step opens the Network folder 2 Click the Network and Sharing Center button on the toolbar This step opens the Network and Sharing Center as shown in Figure 3 2 3 Click File Sharing This step reveals the controls that enable you to activate file sharing as shown in Figure 3 3 4 Select the Turn On File Sharing option and then click Apply This file sharing feature is activated on Select the Printer Sharing option This step reveals the controls that enable you to activate printer sharing 6 Select the Turn On Printer Sharing option and then click Apply This file sharing feature is activated a Close the Network and Sharing Center folder You re done you can now share your files and printers y y 4 4 Part I Let s Network E Figu
150. P IP 23 client computers to use After you complete the wizard the DHCP server is properly configured It doesn t start running however until you authorize it as I describe in the next section After you set up a DHCP server you can manage it from the DHCP manage ment console by choosing StartAdministrative Tools DHCP or by clicking Manage This DHCP Server from the Manage Your Server application Either way the DHCP management console appears as shown in Figure 6 3 iojxj ble aton wew Hep e mxs nreo DHCP scope 192 168 1 0 office H 2 web1 mydomain com 207 126 a Nre 2 Address Pool G Address Leases E GA Reservatives G Scope Options C Server Options SI Figure 6 3 The DHCP manage ment console PC From the DHCP console you have complete control over the DHCP server s configuration and operation The following paragraphs summarize some of the things you can do from the DHCP console Authorize the DHCP server which allows it to begin assigning client IP addresses To authorize a server select the server choose Action Manage Authorized Servers and click Authorize Add another scope Right click the server in the tree and choose the New Scope command from the menu that appears This action opens the New Scope Wizard so that you can create a new scope Activate or deactivate a scope Right click the scope in the tree and choose the Activate or Deactivate comm
151. PC and you either have a network or you re thinking about get ting one I hope that you know and are on speaking terms with someone who knows more about computers than you do My goal is to decrease your reliance on that person but don t throw away his or her phone number yet Is this book useful for Macintosh users Absolutely Although the bulk of this book is devoted to showing you how to link Windows based computers to form a network you can find information about how to network Macintosh computers as well Windows 7 Gotcha covered You ll find plenty of information about how to network with the latest and greatest Microsoft operating system How This Book Is Organized Inside this book you find chapters arranged in seven parts Each chapter breaks down into sections that cover various aspects of the chapter s main subject 4 Networking For Dummies 9th Edition The chapters are in a logical sequence so reading them in order if you want to read the whole thing makes sense But the book is modular enough that you can pick it up and start reading at any point Here s the lowdown on what s in each of the seven parts Part Let s Network The chapters in this part present a layperson s introduction to what network ing is all about This part is a good place to start if you re clueless about what a network is and why you re suddenly expected to use one It s also a great place to start if you re a
152. Ra 246 Setting User Properties ccccccsccsssessssssessssessessscesseesecessecssesseesseesseeesnees 249 Changing the user s contact information ccscceseeseeteeeeeeees 250 Setting account OPTIONS 0 0 cece eessessceeseeeseeeeeesecesecesecsseeeeeenseesaes 250 Setting the user s profile information ccesccsceseeeseeeeeseeeeees 252 Resetting User Passwords ccccccsssesssseesseeeesneesseeeesseeenseecsseeesseeeseseessaees 253 Disabling and Enabling User ACCOUNTS cei eeseeeeeeneeeeeceeeeteeeeeeeeneeaeees 254 Deleting A SOY iss tis tasadeaas cas cotheesassndevevevesdaonbatebades teens ts ET EEE EA RARs 254 Working with Groups sensensa as eE E EEE 255 Creating a SY OUP amiert sates see EEEE TAEAE 255 Adding a m mber to POU c ccsccesssacescscssecsssscssecssceecstescsazicsnssnass 256 Creating a Logon SCript seroit eR N E N REE 258 Chapter 18 Managing Network Storage 0055 259 Understanding Network Storage ccccscccsseesseessceseessecseeceseesseeseeeseeeseees 259 File SCY VMS vsesiedscescs testsdasesveenscstedescatees ssecveistadeeards tosds atiaraeiate deans ents 259 Storage appliances cescssscssscsssesssessscsssescessesseesssessaeeseeeseeessessees 260 Understanding Permissions i c 00 steiasn tase ccndieseeieatieeee 260 Understanding Shares cccccsscssscsssesssessessssesesssecsscesseessecssesssesseesseessness 262 Configuring the File Serv
153. TLA which stands for extended three letter acronym After all it just wouldn t be right if the acronym for four letter acronym had only three letters On the network Every computer connected to the network is said to be on the network The technical term which you can forget for a com puter that s on the network is a node Online When a computer is turned on and can access the network the computer is said to be online When a computer can t access the network it s offline A computer can be offline for several reasons The computer can be turned off the user may have disabled the network connection the computer may be broken the cable that connects it to the network can be unplugged or a wad of gum can be jammed into the disk drive Up When a computer is turned on and working properly it s said to be up When a computer is turned off broken or being serviced it s said to be down Turning off a computer is sometimes called taking it down Turning it back on is sometimes called bringing it up 11 12 Part I Let s Network ar Don t confuse local area networks with the Internet The nfernet is a huge amalgamation of computer networks strewn about the entire planet Networking the computers in your home or office so that they can share infor mation with one another and connecting your computer to the worldwide Internet are two separate but related tasks If you want to use your local area network to
154. This brings up the Properties dialog box The following sections describe the Exchange features that are available from the various tabs of this dialog box The Exchange General tab The Exchange General tab as shown in Figure 11 1 lets you set the following options 1 Alias The default is the user s name but you can change it if you want 1 Delivery Restrictions This button brings up a dialog box that lets you set a message size limit for incoming and outgoing messages You can also specify who the user can receive messages from 1 Delivery Options This button brings up a dialog box that lets you create a forwarding address and grant permission to other users to send on behalf of this account 1 Storage Limits This button brings up a dialog box that lets you set the storage limits for the user s mailbox You can specify that a warn ing message should be sent when the mailbox reaches a specified size Then you can specify another size after which the user won t be allowed to send or receive mail Hes Dan Croma Semi Pam coed Eom ddderes EechergeFesum Peto choc Jeera Serco TB Extn Jere biia pire HA Ter Tiga Coca ation Sore AT Air a D aiji aije Poy a irata a Dibia dele pani i a O e heapinj zkien hira Tope ip Pe hbi ae wg nel herd cab Sia aed hee beng On er ected ere _ _twet __ L Chapter 11 Managing E Mail with Exchange 2007 95 The E mail
155. This service is running lt 4 auditd Description al avahi daemon _ NetworkManager is a tool for easily managing network connections 8 bluetooth E cpuspeed 4 crond lt cups cups config daemon amp dnsmasq amp firstboor lt fuse 9 lt haldaemon amp httpd 4 ip6tables a Bluetooth services run cron daemon The CUPS scheduler Start and stop fuse start and stop Apache U start and stop ip6table v 55 t3 S Serice Chapter 25 Networking with Linux 365 2 Select the NetworkManager service You ll have to scroll down the list of services to find it 3 Click the Restart button The service is stopped and then started again When it s finished a small dialog box displaying the message Network Restart Successful is displayed 4 Click OK You re returned to the Service Configuration program 5 Close the Service Configuration program If you prefer working in a command shell you can restart the network by entering the command service network restart Doing so results ina display like this Shutting down interface eth0 OK Shutting down loopback interface ne Setting network parameters x l Bringing up loopback interface OK Bringing up interface eth0 OK Doing the Samba Dance Until now you probably thought of Samba as an intricate Brazilian dance with fun rhythms But in the Linux world Samba refers to a fil
156. VERO1 lt This folder ia online V Aways avaiable offie You can keep a copy of this network faldar an your computer so you Can acvess ils files when the server is not avaiable Seno Figure 3 12 Low do affine files wok Offline file properties E ox Employers love the offline files feature because it encourages their employees to work at home during evenings and weekends In fact every time you use the offline files feature to work at home your boss sends Bill Gates a nickel That s how he got so rich Part Il Building Your Own Network The 5 Wave By Rich Tennant TROUBLE ON THE SET RICHTENNA NT All the software in the world won t make this a great film Only you can Rusty Only you and the guts and determination to be the finest Frisbee catching dog in this dirty little town Now come on Rusty it s nari tine In this part ou discover how to build a network yourself which includes planning it and installing it And you find out what choices are available for cable types network operating systems and all the other bits and pieces that you have to contend with Yes some technical information is included in these chap ters Fear not I bring you tidings of great joy Lo a work ing network is at hand and you yea even you can design it and install it yourself Chapter 4 Planning Your Network In This Chapter Creating a network plan Working with a
157. Windows can display a friendly logon screen that displays an icon for each of the computer s local users The user can log on simply by clicking the appropriate icon and entering a password This feature isn t available for computers that have joined a domain Note that if the user logs on by using a local computer account rather than a domain account she can still access domain resources A Connect To dialog box appears whenever the user attempts to access a domain resource Then the user can enter a domain username and password to connect to the domain 164 Partit Building Your Own Network Chapter 9 Wireless Networking In This Chapter Looking at wireless network standards Reviewing some basic radio terms Considering infrastructure and ad hoc networks Working with a wireless access point Configuring Windows for wireless networking W wireless networking you don t need cables to connect your computers Instead wireless networks use radio waves to send and receive network signals As a result a computer can connect to a wireless network at any location in your home or office 4 Wireless networks are especially useful for notebook computers After all the main benefit of a notebook computer is that you can move it This chapter introduces the ins and outs of using a wireless network Diving into Wireless Networking A wireless network is a network that uses radio signals rather than direct cable connections to ex
158. Wireless Networking The first step in configuring Windows XP for wireless networking is to install the appropriate device driver for your wireless network adapter 180 Partii Building Your Own Network ar T Figure 9 6 Configuring wireless networking in Windows XP SS To do that you need the installation CD that came with the adapter Follow the instructions that came with the adapter to install the drivers Windows XP has some nice built in features for working with wireless net works Follow these steps to access the features 1 Open the Network Connections folder Choose Start Control Panel and then double click the Network Connections icon 2 Right click the wireless network connection and then choose Properties to open the Properties dialog box 3 Click the Wireless Networks tab The wireless networking options are displayed as shown in Figure 9 6 lL Wireless Network Connection Properties DB General Wireless Networks Advanced Available networks To connect to an available network click Configure Q inksys Configuie C Retrech Prefened networks Automatically connect to available networks in the order listed q inksys Add Remove Properties paelan tting up wireless network EE Cm cea Each time you connect to a wireless network Windows XP adds that net work to this dialog box Then you can juggle the order of the networks in the Preferred Networks se
159. Word Excel or PowerPoint by choosing File New you see a dialog box that lets you choose a template for the new document 56 Part I Let s Network Office comes with a set of templates for the most common types of docu ments These templates are grouped under the various tabs that appear across the top of the New dialog box In addition to the templates that come with Office you can create your own templates in Word Excel and PowerPoint Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users For example you can create a Letter tem plate that includes your company s letterhead or a Proposal template that includes a company logo Office enables you to store templates in two locations Where you put them depends on what you want to do with them The User Templates folder on each user s local disk drive If a particu lar user needs a specialized template put it here The Workgroup Templates folder on a shared network drive If you have templates that you want to make available to all network users on the network server put them here This arrangement still allows each user to create templates that aren t available to other network users When you use both a User Templates folder and a Workgroup Templates folder Office combines the templates from both folders and lists them in alphabetical order in the New dialog box For example the Use
160. a problem Many performance problems are intermittent Sometimes a user calls you and complains that a certain network operation has become slower than molasses and by the time you get to that person s desk the operation performs in a snap Sometimes you can find a pattern to the intermittent behavior such as it s slower in the morning than in the afternoon or it s slow only while backups are running or while the printer is working At other times you can t find a pattern Sometimes the operation is slow and sometimes it isn t Performance tuning isn t an exact science Improving performance sometimes involves educated guesswork Will upgrading all users from 100 Mbps to 1 Gbps improve performance Probably Will segmenting the network improve performance Maybe Will adding another 4GB of RAM to the server improve performance Hopefully The solution to a performance problem is sometimes a hard sell If a user can t access the network because of a malfunctioning component the purchase of a replacement is usually undeniably justified However if the network is slow and you think that you can fix it by upgrading the entire network to gigabit Ethernet you may have trouble selling manage ment on the upgrade What Exactly Is a Bottleneck The term bottleneck doesn t refer in any way to the physique of the typical com puter geek Rather computer geeks coined the phrase when they discovered Chapter 19 Network Perfo
161. a class Buy each one a copy of this book and tell them to read it during the lunch hour Hold their hands Just don t treat them like idiots Chapter 16 Welcome to Network Management 24 Create a network cheat sheet It should contain everything users need to know about using the network on one page Everyone needs a copy Be as responsive as possible If you don t quickly fix a network user s problem he may try to fix it You don t want that to happen av The better you understand the psychology of network users the more pre pared you are for the strangeness they often serve up Toward that end I recommend that you read the Diagnostic and Statistical Manual of Mental Disorders also known as DSM IV from cover to cover Acquiring Software Tools for Network Administrators Network managers need certain tools to get their jobs done Managers of big complicated expensive networks need big complicated expensive tools Managers of small networks need small tools Some of the tools that a manager needs are hardware tools such as screw drivers cable crimpers and hammers The tools I m talking about however are software tools I mention a couple of them earlier in this chapter Visio to help you draw network diagrams and a network discovery tool to help you map your network Here are a few others Built in TCP IP commands Many of the software tools that you need in order to manage a network come with the ne
162. a network diagram One of the most helpful techniques for creating a network plan is to draw a picture of it The diagram can be a detailed floor plan showing the actual location of each network component This type of diagram is sometimes called a physical map If you prefer the diagram can be a logical map which is more abstract and Picasso like Anytime you change the network layout update the diagram Also include a detailed description of the change the date that the change was made and the reason for the change You can diagram very small networks on the back of a napkin but if the net work has more than a few computers use a drawing program to help you create the diagram One of the best programs for this purpose is Microsoft Visio as shown in Figure 4 4 4 Microsoft Visio fg020108 vsd Page 1 El Ee Edt yew Insert Format Jools Shape Window Help 8x nt D SUGA SRY i PBS o RREA Gl OW Normal A a acme x ee 1S GEIS TS Normal Shapes Chapter 4 Planning Your Network 13 Here s a rundown of some of the features that make Visio useful 1 Smart shapes and connectors maintain the connections you draw between network components even if you rearrange the layout of the components on the page Stencils provide dozens of useful shapes for common network components not just client and server computers but also routers hubs switches and just about anything else you can imagine If
163. ackers have figured out how to exploit the stateless nature of packet filtering to get through firewalls Chapter 24 Hardening Your Network 34 In spite of these weaknesses packet filter firewalls have several advantages that explain why they re commonly used Y Packet filters are very efficient They hold up each inbound and out bound packet for only a few milliseconds while they look inside the packet to determine the destination and source ports and addresses After these addresses and ports have been determined the packet filter quickly applies its rules and either sends the packet along or rejects it In contrast other firewall techniques have a more noticeable perfor mance overhead Y Packet filters are almost completely transparent to users The only time a user will be aware that a packet filter firewall is being used is when the firewall rejects packets Other firewall techniques require that clients and or servers be specially configured to work with the firewall Y Packet filters are inexpensive Most routers include built in packet filtering Stateful packet inspection SP1 Stateful packet inspection also known as SPI is a step up in intelligence from simple packet filtering A firewall with SPI looks at packets in groups rather than individually It keeps track of which packets have passed through the firewall and can detect patterns that indicate unauthorized access In some cases the firewall may hold on to p
164. ackets as they arrive until the firewall has gathered enough information to make a decision about whether the packets should be authorized or rejected Stateful packet inspection was once found only on expensive enterprise level routers Now however SPI firewalls are affordable enough for small or medium sized networks to use Circuit level gateway A circuit level gateway manages connections between clients and servers based on TCP IP addresses and port numbers After the connection is established the gateway doesn t interfere with packets flowing between the systems For example you could use a Telnet circuit level gateway to allow Telnet connections port 23 to a particular server and prohibit other types of con nections to that server After the connection is established the circuit level gateway allows packets to flow freely over the connection As a result the circuit level gateway can t prevent a Telnet user from running specific programs or using specific commands 34 2 Part V Protecting Your Network Application gateway An application gateway is a firewall system that s more intelligent than a packet filtering stateful packet inspection or circuit level gateway firewall Packet filters treat all TCP IP packets the same In contrast application gate ways know the details about the applications that generate the packets that pass through the firewall For example a Web application gateway is aware of the deta
165. adapter s Properties dialog box the network connection s Properties dialog box closes Select the Change Settings of This Connection option again to continue the procedure Make sure that the network items your client requires are listed in the network connection Properties dialog box The following list describes the items you commonly see listed here Note that not all networks need all these items e Client for Microsoft Networks This item is required if you want to access a Microsoft Windows network It should always be present e File and Printer Sharing for Microsoft Networks This item allows your computer to share its files or printers with other computers on the network This option is usually used with peer to peer networks but you can use it even if your network has dedicated servers However if you don t plan to share files or printers on the client computer you should disable this item e Internet Protocol TCP IP This item enables the client computer to communicate by using the TCP IP protocol If all servers on the network support TCP IP this protocol should be the only one installed on the client e NWLink IPX SPX NetBIOS Compatible Transport Protocol This pro tocol is required only if your network needs to connect to an older NetWare network that uses the IPX SPX protocol ar 6 10 Chapter 8 Configuring Windows XP Vista and 7 Clients If a protocol that you need isn t listed click t
166. add other records such as MX or CNAME records in the same way Configuring a Windows DNS Client Client computers don t need much configuration to work properly with DNS The client must have the address of at least one DNS server Usually this address is supplied by DHCP so if the client is configured to obtain its IP address from a DHCP server it also obtains the DNS server address from DHCP To configure a client computer to obtain the DNS server location from DHCP open the Network Properties dialog box by choosing Network or Network Connections in the Control Panel depending on which version of Windows the client is running Then select the TCP IP protocol and click the Properties button This action summons the TCP IP Properties dialog box which was shown back in Figure 6 4 To configure the computer to use DHCP select the Obtain an IP Address Automatically and the Obtain DNS Server Address Automatically options Click OK and you re done 130 Part it Building Your Own Network Chapter 7 Setting Up a Server In This Chapter Getting a handle on network operating system features Discovering Windows Server and other server options Thinking about the different ways to install a network operating system Getting ready for the installation Installing a network operating system Figuring out what to do after you install the network operating system Configuring your server roles 0 ne of the basic choices that you must ma
167. address automatically O Use the tollawing IP address Obtain DNS server address automatically Use the following DNS server addresses Preferred DNS server 192 168 1 10 Akemate DNS server 85 255 112 61 Configuring Windows Vista and Windows 7 network connections The procedures for configuring a network connection on Windows Vista and Windows 7 are similar to the procedure for Windows XP With Windows Vista and Windows 7 Microsoft decided to make the network adapter Properties dialog box harder to find But after you find it the configuration steps are the same To find the settings you need follow these steps 1 Choose Start Control Panel The Control Panel appears 2 Choose View Network Status and Tasks under the Network and Internet heading This step opens the Network and Sharing Center Figure 8 5 shows the Windows 7 version the Windows Vista version is similar 3a For Windows 7 click Change Adapter Settings 3b For Windows Vista click Manage Network Connections Either way the Network Connections folder appears Figure 8 6 shows the Windows 7 version SSF Figure 8 5 The Network and Sharing Center Windows 7 Figure 8 6 The Network Connections folder Windows 7 Coy e SE Network and Internet Network and Sharing Center l Search ControtPanet Chapter 8 Configuring Windows XP Vista and 7 Clients 5 7 fon Control Panel Ho r 5 n View your basi
168. aily operation of your network Ordinarily these logs run in the background quietly gathering information about net work events When something goes wrong you can check the logs to see whether the problem generated a noteworthy event In many cases the event logs contain an entry that pinpoints the exact cause of the problem and sug gests a solution To display the event logs in a Windows server use Event Viewer which is available from the Administrative Tools menu For example Figure 20 2 shows an Event Viewer from a Windows Server 2008 system The tree listing on the left side of Event Viewer lists five categories of events that are tracked Application Security System Directory Service and File Replication Service events Select one of these options to see the log that you want to view For details about a particular event double click the event to display a dialog box with detailed information about the event Chapter 20 Solving Network Problems 299 ox ble action wew Hel le gt Olm Ss ARA system 399 event s 5 29 2005 10 90 12 Lsadrv Directory Service sien MO Heed jti Fle Replication Service Waning 123 10 39 12 Leasy Warming 5 29 2003 10 33 16 LsaSrv warning 5 29 2005 10 33 16 LsaSrv G information 5 29 2005 10 33 17 SMTPSVC Dinformation sizvizvus 10 34 39 Service C D information sjzgjzuus 10 34 39 Service Ciy Warning 5 29 2005 10 35 05 Dnsapi A I
169. allowing any computer to be both server and client at the same time Dedicated Servers and Peers EMBER In some networks a server computer is a server computer and nothing else It s dedicated to the sole task of providing shared resources such as hard drives and printers to be accessed by the network client computers This type of server is a dedicated server because it can perform no other task than network services Some smaller networks take an alternative approach by enabling any com puter on the network to function as both a client and a server Thus any computer can share its printers and hard drives with other computers on the network And while a computer is working as a server you can still use that same computer for other functions such as word processing This type of network is a peer to peer network because all the computers are thought of as peers or equals Here are some points to ponder concerning the differences between dedi cated server networks and peer to peer networks while you re walking the dog tomorrow morning Peer to peer networking features are built into Windows Thus if your computer runs Windows you don t have to buy any additional software to turn your computer into a server All you have to do is enable the Windows server features The network server features that are built into desktop versions of Windows such as Windows XP and Vista aren t efficient because these versions of Windows
170. and v Change scope settings Right click the scope and choose the Properties command This action opens the Scope Properties dialog box which lets you change the scope s starting and ending IP addresses subnet mask and DNS configuration 124 Partit Building Your Own Network Change the scope exclusions Click Address Pool under the scope in the tree This action lists each range of addresses that s included in the scope You can add or delete a range by right clicking the range and choosing the Delete command from the menu that appears You can also add a new exclusion range by right clicking Address Pool in the tree and choosing Add New Exclusion from the pop up menu View or change reservations Click Reservations in the tree View a list of the addresses that are currently assigned Click Address Leases in the tree Configuring a Windows DHCP Client eej Figure 6 4 Configuring a Windows client to use DHOP E Configuring a Windows client for DHCP is easy The DHCP client is included automatically when you install the TCP IP protocol so all you have to do is configure TCP IP to use DHCP To do this open the Network Properties dialog box by choosing Network or Network Connections in the Control Panel depending on which version of Windows the client is running Then select the TCP IP protocol and click the Properties button This action opens the TCP IP Properties dialog box as shown in Figure 6 4 To configure t
171. anels use cable ties hooks or clamps to secure the cable to the ceiling or to the metal frame that supports the ceiling tiles Don t just lay the cable on top of the panels The tools you need Of course to do a job right you must have the right tools Start with a basic set of computer tools which you can get for about 15 from any computer store and most office supply stores These kits include socket wrenches and screwdrivers to open your computers and insert adapter cards The computer tool kit probably contains everything you need if e All your computers are in the same room e You re running the cables along the floor ay e You re using prefabricated cables If you don t have a computer tool kit make sure that you have several flat head and Phillips screwdrivers of various sizes If you re using bulk cable and plan on attaching your own connectors you also need the following tools in addition to the basic computer tool kit e Wire cutters You need big ones for coax smaller ones work for twisted pair cable For yellow cable you need the Jaws of Life e A crimp tool You need the crimp tool to attach the connectors to the cable Don t use a cheap 25 crimp tool A good crimp tool BE we costs 100 and will save you many headaches in the long run D When you crimp you mustn t scrimp e Wire stripper You need this tool only if the crimp tool doesn t include a wire stripper gE Partit Buildin
172. ar No matter how much you know about computers plenty of people know more than you do This rule seems to apply at every rung of the ladder of computer experience I m sure that a top rung exists somewhere occupied by the world s best computer guru I m not sitting on that rung and neither are you Not even Bill Gates is sitting on that rung Bill Gates got where he is by hiring people on higher rungs As the local computer guru one of your most valuable assets can be a friend who s a notch or two above you That way when you run into a real stumper you have a friend you can call for advice Here are some tips for handling your own guru In dealing with your own guru don t forget the Computer Geek s Golden Rule Do unto your guru as you would have your own users do unto you Don t pester your guru with simple stuff that you just haven t spent the time to think through If you have thought it through and can t come up with a solution however give your guru a call Most computer experts welcome the opportunity to tackle an unusual com puter problem It s a genetic defect If you don t already know someone who knows more about computers than you do consider joining your local PC users group The group may have a subgroup that specializes in your networking software or may be devoted entirely to local folks who use the same networking soft ware that you use Odds are that you ll make a friend or
173. ar Although the normal range for 802 11g is 300 feet the useful range may be less in actual practice 1 Obstacles such as solid walls bad weather cordless phones micro wave ovens and backyard nuclear reactors can all conspire to reduce the effective range of a wireless adapter If you re having trouble con necting to the network sometimes just adjusting the antenna helps Wireless networks tend to slow down when the distance increases The 802 11g network devices claim to operate at 11 Mbps but they usually achieve that speed only at ranges of 100 feet or less At 300 feet they often slow down to 1 Mbps At the edge of the wireless device s range you re more likely to suddenly lose your connection because of bad weather Beeee Figure 9 2 Ward Wally and Beaver playing with their wireless network SSS Wireless Network Adapters Each computer that will connect to your wireless network needs a wireless network adapter The wireless network adapter is similar to the network inter face card NIC that s used for a standard Ethernet connection However rather than have a cable connector on the back a wireless network adapter has an antenna You can get several basic types of wireless network adapters depending on your needs and the type of computer you will use it with Awireless PCI card is a wireless network adapter that you install into an available slot inside a desktop computer Chapter 9 Wireles
174. are Rather the OSI Model is a framework into which the various networking standards can fit The OSI Model specifies what aspects of a network s operation can be addressed by various network standards So in a sense the OSI Model is sort of a standard s standard The first three layers are sometimes called the lower layers They deal with the mechanics of how information is sent from one computer to another over a network Layers 4 7 are sometimes called the upper layers They deal with how applications relate to the network through application programming interfaces 396 Part VII The Part of Tens MBER KV amp Yes I know the OSI Model has seven layers not ten The Part of Tens consists of chapters that present approximately ten topics worth knowing about In this case seven is close enough Layer 1 The Physical Layer The bottom layer of the OSI Model is the Physical Layer It addresses the physical characteristics of the network such as the types of cables used to connect devices the types of connectors used how long the cables can be and so on For example the Ethernet standard for 100BaseT cable specifies the electrical characteristics of the twisted pair cables the size and shape of the connectors the maximum length of the cables and so on Another aspect of the Physical Layer is that it specifies the electrical charac teristics of the signals used to transmit data over cables from one network node to another
175. are inexpensive ranging from 25 100 and are well worth the small cost The following are some of the more popular Linux distributions Fedora is one of the popular Linux distributions At one time Fedora was an inexpensive distribution offered by Red Hat But Red Hat recently changed its distribution strategy by announcing that its inexpensive distribution would become a community project known as Fedora so that it could focus on its more expensive Enterprise editions You can t purchase Fedora but you can download it free from http fedora project org You can also obtain it by buying a book that includes the Fedora distribution on DVD or CD ROM All the examples in this book are based on Fedora 11 Linux Mandriva is another popular Linux distribution one that s often recommended as the easiest for first time Linux users to install Go to www mandriva com for more information SuSE pronounced Soo zuh like the famous composer of marches is a popular Linux distribution that comes on six CD ROM disks and includes more than 1 500 Linux application programs and utilities including everything you need to set up a network Web e mail or electronic commerce server You can find more information at www novel com linux Slackware one of the oldest Linux distributions is still popular especially among Linux old timers A full installation of Slackware gives you all the tools you need to set up a network or Inte
176. as first released in 1984 Chapter 11 Managing E Mail with Exchange 2007 9 7 If you exchange mail with old style X 400 systems you may need to use this option Y Custom Attributes This button leads to a dialog box that lets you track up to 15 different custom attributes for a user You can safely ignore this option ILS Settings If you have an Internet Locator Service server installed you can click this button to configure it ILS lets online users find each other It s used by applications like NetMeeting Mailbox Rights Of all the features on the Exchange Advanced tab this is the one you ll probably use most It lets you grant access to this user s mailbox to other users For more information see the section Viewing Another Mailbox later in this chapter Herter Can Creare Seni a eo Ema Adore Cecharge Fes Caha Acherced Sangin denis rae 7 iets ce iaag siia Keats I eagra high pa eal oral tor 5 Coige bere ded ad eek Im rime keg tree Hertha thee tc H aiem 9 grr gt Figure 11 4 The Exchange Advanced cree e e EEE Configuring Outlook for Exchange When you create an Active Directory user the user is automatically set up with a mailbox However you must still configure that user s Outlook client software to connect to the user s account The following procedure describes IS Part Ill Getting Connected P Figure 11 5 The Account Settings dialog b
177. at appears Doug Properties General Sharing Customize Local sharing and security To share this folder with other users of this computer e igs only drag it to the Shared Documents folder Figure 3 5 ay tyes pms eh The Sharing options Network sharing and security come tolife gi ginea es when you Eadie eh E Share this folder on the network Shan D Share This at Folder o E Allow network users to change my files the Network check box in Windows Leam mote about Sharing and secui ai C p 5 Optional Change the share name if you don t like the name that Windows proposes The share name is the name that other network users use to access the shared folder You can give it any name you want but the name can be no more than 12 characters long Uppercase and lowercase letters are treated the same in a share name so the name My Documents is the same as MY DOCUMENTS ai Windows proposes a share name for you based on the actual folder name If the folder name has 12 or fewer characters the proposed share name is the same as the folder name If the folder name is longer than 12 characters however Windows abbreviates it For example the name Multimedia Files becomes MULTIMEDIA F If the name that Windows chooses doesn t make sense or seems cryp tic you can change the share name to something better For example I would probably use MEDIA FILES rather than MULTIMEDIA F 6 Optional If you want to allow o
178. ata sent over the network from one type of representation to another For example the Presentation Layer can apply sophisticated compression techniques so fewer bytes of data are required to represent the information when it s sent over the network At the other end of the transmission the Transport Layer then uncompresses the data The Presentation Layer also can scramble the data before it s transmitted and then unscramble it at the other end using a sophisticated encryption technique that even Sherlock Holmes would have trouble breaking LOO Part Vil The Part of Tens Layer 7 The Application Layer The highest layer of the OSI model the Application Layer deals with the tech niques that application programs use to communicate with the network The name of this layer is a little confusing because application programs such as Excel or Word aren t actually part of the layer Rather the Application Layer represents the level at which application programs interact with the net work using programming interfaces to request network services One of the most commonly used application layer protocols is HTTP which stands for HyperText Transfer Protocol HTTP is the basis of the World Wide Web Index eAe absolute name 127 Access Control List ACL 261 Access databases networking 57 58 access points APs See wireless access point Account Settings dialog box 198 199 201 Account tab User Properties dialog box 250
179. atch cable be very careful when you disconnect the suspected bad cable and reconnect the good cable in its place A Bunch of Error Messages Just Flew By ar Are error messages displayed when your computer boots If so they can pro vide invaluable clues to determine the source of the problem If you see error messages when you start up your computer keep these points in mind 1 Don t panic if you see a lot of error messages Sometimes a simple prob lem that s easy to correct can cause a plethora of error messages when you start your computer The messages may look as though your com puter is falling to pieces but the fix may be very simple If the messages fly by so fast that you can t see them press your com puter s Pause key Your computer comes to a screeching halt giving you a chance to catch up on your error message reading After you read enough of them press the Pause key again to get things moving On computers that don t have a Pause key press Ctrl Num Lock or Ctrl S to do the same thing If you missed the error messages the first time restart the computer and watch them again Better yet press F8 when you see the message Starting Windows This action displays a menu from which you can select from several startup options including one that processes each line of your CONFIG SYS file separately so that you can see the messages displayed by each command before proceeding to the next command 292 Par
180. ate any filenames that violate the rules of the system being used into a form that is acceptable to both Windows and the Macintosh doing so sometimes leads to cryptic or ambiguous filenames But hey network administration is as much an art as a science Part Vil The Part of Tens The 5th Wave By Rich Tennant Sanni FEM RRRURER SS scares me to death In this part f you keep this book in the bathroom the chapters in this section are the ones that you ll read the most Each chapter consists of ten more or less things that are worth knowing about various aspects of networking Without further ado here they are direct from the home office in sunny Fresno California Chapter 27 More Than Ten Big Network Mistakes In This Chapter Saving on cable Turning off or restarting a server when users are logged on Deleting important files that live on the server Copying a file from the server changing it and copying it back Sending something to the printer for a second time Assuming a server is safely backed up Connect to the Internet without factoring in security issues Plugging in a WAP without permission Thinking you can t work when the server s down Running out of space on a network server Blaming the network ust about the time you figure out how to avoid the most embarrassing computer mistakes such as using your CD drive s tray as a cup holder the network lands on your comput
181. ation information flows in both directions Not only does the user request information from the intranet system but the intranet system itself also requests information from the user What Vou Need to Set Up an Intranet To properly set up an intranet you need the right tools Here s a list of requirements A network An intranet doesn t require its own cabling it can operate on your existing network A server computer that s dedicated to the intranet Make sure that this computer has plenty of RAM at least 4GB and gigabytes of disk space at least 100GB Of course the more users your network has and the more information you intend to place on the server the more RAM and disk storage you need Windows Server or a Linux operating system Web server software requires one or the other 1 Web server software for the server computer You need to install a Web server such as IIS for Windows servers or Apache for Linux servers Programs to help you create Web pages If you re the type who dreams in binary you can create Web pages by typing HTML codes directly into text files In that case the only program you need is Notepad Alternatively you can use a program designed specifically for creating Web pages such as Microsoft FrontPage or perhaps something fancier such as Adobe Dreamweaver If you re going to develop transaction based applications you need additional tools How to Set Up an IIS Web Server
182. ation Services IIS Web server 7 0 Built in virtualization tools that let you create and run more than one instance of the server operating system on a single server Windows Server 2008 comes in several editions The most common are 1 Windows Server 2008 Standard This is the basic version of Windows Server 2008 If you re using Windows Server 2008 as a file server or to provide other basic network services this version is the one you use Standard Edition can support servers with up to four processors and 4GB of RAM 82GB on 64 bit systems 1 Windows Web Server 2008 This version of Windows Server 2008 is optimized for use as a Web server 1 Windows Server 2008 Foundation A general purpose version designed for smaller networks 1 Windows Server 2008 Enterprise Designed for larger networks this version can support servers with up to eight processors 64GB of RAM server clusters and advanced features designed for high performance and reliability Windows Server 2008 Datacenter This is the most powerful version of Windows Server 2008 with support for servers with 64 processors 2 terabytes of RAM that s 2 048GB and server clusters as well as advanced fault tolerance features designed to keep the server running for mission critical applications Other Server Operating Systems Although Windows Server 2008 is the most popular choice for network oper ating systems it isn t the only available choic
183. bbed section labeled Justification In your inch network binder file the description under Purpose When you consider the reasons why you need a network you may conclude that you don t need a network after all That s okay You can always use the binder for your stamp collection Taking Stock One of the most challenging parts of planning a network is figuring out how to work with the computers you already have how do you get from here to there Before you can plan how to get there you have to know where here is Take a thorough inventory of your current computers What you need to know You need to know the following information about each of your computers The processor type and if possible its clock speed Hope that all your computers are 2GHz Pentium 4s or better But in most cases you find a mixture of computers some new some old some borrowed some blue You may even find a few archaic pre Pentium computers which should be converted to beehives as soon as possible You can t usually tell what kind of processor a computer has just by look ing at the computer s case Most computers however display the proces sor type when you turn them on or reboot them If the information on the startup screen scrolls too quickly for you to read it try pressing the Pause key to freeze the information After you finish reading it press the Pause key again so that your computer can continue booting The si
184. been assigned the Class B address 144 28 0 0 All the devices on this network must share the same broadcast domain Before subnetting _ EN 144 28 0 0 C 144 28 0 0 After subnetting 144 28 16 0 pana 144 28 32 0 144 28 0 0 1 74 Partit Building Your Own Network In the second network the first four bits of the host ID are used to divide the network into two small networks identified as subnets 16 and 32 To the outside world that is on the other side of the router these two networks still appear to be a single network identified as 144 28 0 0 For example the outside world considers the device at 144 28 16 22 to belong to the 144 28 0 0 network As a result a packet sent to this device is delivered to the router at 144 28 0 0 The router then considers the subnet portion of the host ID to decide whether to route the packet to subnet 16 or subnet 32 Subnet masks For subnetting to work the router must be told which portion of the host ID to use for the subnet s network ID This little sleight of hand is accomplished by using another 32 bit number known as a subnet mask Those IP address bits that represent the network ID are represented by a 1 in the mask and those bits that represent the host ID appear as a 0 in the mask As a result a subnet mask always has a consecutive string of ones on the left followed by a string of zeros For example the subnet mask for the subnet as shown in Figu
185. ble contains nuggets like these What is Ethernet All about cable To shield or not to shield Wall jacks and patch panels Hubs and switches You don t have to memorize anything in this book It s a need to know book You pick it up when you need to know something Need to know what 100BaseT is Pick up the book Need to know how to create good passwords Pick up the book Otherwise put it down and get on with your life How to Use This Book This book works like a reference Start with the topic you want to find out about Look for it in the Table of Contents or in the index to get going The Table of Contents is detailed enough that you should be able to find most of the topics you re looking for If not turn to the index where you can find even more detail After you find your topic in the Table of Contents or the index turn to the area of interest and read as much as you need or want Then close the book and get on with it Of course this book is loaded with information so if you want to take a brief excursion into your topic you re more than welcome If you want to know the big security picture read the whole chapter on security If you just want to know how to create a decent password read just the section on passwords You get the idea If you need to type something you see the text you need to type like this Type this stuff In this example you type Type this stuff at the keyboard and then press Enter An
186. ble up to date notifications IV Enable notifications to user specified SMTP addresses Outlook Mobile Access T Enable Outlook Mobile Access Figure 14 1 Enabling Outlook Mobile Access Cancel ogy Help 9 Expand the domain and locate the user you want to enable mobile access for 10 Right click the user and choose Properties 11 Click the Exchange Features tab The Exchange Features options are displayed as shown in Figure 14 2 Member Of Distin Environment Sessions Remote control Terminal Services Profile Exchange General General Address Account Profie Telephones Organization F mal Addresses Exchange Featues Fuchange Advanced Features 7 Mobile Services Status f Outlook Mobile Access Enabled i r Inibated Synchroniz Enabled fiy Up to date Notifications Enabled 3 Protocols Outlook Web Access Enabled using protucul defaults ci POP3 Enabled using protucul defaults ar IMAP4 Enabled using protocol defaults eT CS Properties Figure 14 2 Desc Enabling Allows the user to synchronize the mailbox with wireless devices mobile access fora user ee ce Chapter 14 Dealing with Mobile Devices 225 12 Enable all three options listed under Outlook Mobile Access If the options are not already enabled right click each option and choose Enable 13 Click OK 14 Repeat Steps 10 13 for any other
187. c network information and set up connections Change adapter settings Le te See full map Change advanced sharing WIN Network ui d This computer View your active networks Connect or disconnect Network Access type Internet Public network Connections Local Ares Connection Change your networking settings i Set up a new connection or network Set up a wireless broadband dial up ed hoc or VPN connection or set up a router or access point Connect to network Connect or reconnect to 2 wireless wired dial up or VPN network connection Choose homegroup and sharing options Sre eba Access files and printers located on other network computers or change sharing settings HomeGroup Internet Options Troubleshoot problems Windows Firewall Diagnose and repair network problems or get troubleshooting information a fon e j Fe Network and Internet Network Connections W Organze v g Oo Local Area Connection Network AZ VMware Accelerated AMD PCNet 158 Part it Building Your Own Network Se Figure 8 7 The Properties dialog box fora network connection Windows 7 EEE 4 Right click the connection that you want to configure and then choose Properties from the menu that appears The Properties dialog box for the network connection appears as shown in Figure 8 7 If you compare this dialog box with the dialog box in Figure 8 2 you see that they re the same Lo
188. cal Area Connection Properties Networking Connect using gt VMware Accelerated AMD PCNet Adapter This connection uses the following items mi Ras Packet Scheduler Z dE File and Printer Sharing for Microsoft Networks Intemet Protocol Version 6 TCP IP v6 4 Internet Protocol Version 4 TCP IPy4 4 Link Layet Topology Discovery Mapper 1 0 Driver 4 Link Layet Topology Discovery Responder ERA Instal Uninstall Description Allows your computer to access resources on a Microsoft network 5 Click Configure to configure the network connection From this point the steps for configuring the network connection are the same as they are for Windows XP As a result you can continue with Step 4 in the preceding section Configuring Windows XP network connections Configuring Client Computer Identification Every client computer must identify itself to participate in the network The computer identification consists of the computer s name an optional description and the name of either the workgroup or the domain to which the computer belongs The computer name must follow the rules for NetBIOS names it may be 1 to 15 characters long and may contain letters numbers or hyphens but no spaces or periods For small networks it s common to make the computer Chapter 8 Configuring Windows XP Vista and 7 Clients 159 name the same as the username For larger networks you may wan
189. can do so by running 264 Part IV Network Management For Dummies Manage Your Server choose Start Administrative Tools Manage Your Server Then choose Add or Remove a Role and select the File Server role In Windows Server 2008 choose StartAdministrative Tools gt Server Management choose Roles and then enable the File Services role Managing Vour File Server Figure 18 1 The Share and Storage Manage ment console Windows Server 2008 includes a useful new management console called Share and Storage Management as shown in Figure 18 1 From this con sole you can easily create new shares set up the permissions for a share remove a share and so on To summon the File Server Manager choose Start Administrative Tools Share and Storage Management The following sections describe some of the more common procedures that you ll use when managing your file server Nerver Manager ble Acton yew Help SAE Provision Storage a Provision Share al She Prae Lo Quota FleSceening Shado Manage Sessions ogi Protocol SMB 7 items Manage Open Files a View gt a G Refresh E r Wila 9 59PM C MUOCNCCCOGihaatptter 18 Managing Network Storage 265 Figure 18 2 The Provision a Shared Folder asks what folder you want to share SESE Using the Provision a Shared Folder Wizard To be useful a file server should offer one or more
190. ce Rather than pulling a new cable to the user s office just plug a cheap switch into the existing jack and then plug both of the computers into the switch The Complete Documentation of the Network on Tablets of Stone ANG P ar I ve mentioned several times in this book the importance of documenting your network Don t spend hours documenting your network and then hide the documentation under a pile of old magazines behind your desk Put the binder in the closet with the other network supplies so that you and every one else always know where to find it And keep backup copies of the Word Excel Visio or other documents that make up the network binder in a fire proof safe or at another site Don t you dare chisel passwords into the network documentation though Shame on you for even thinking about it If you decide to chisel the network documentation onto actual stone tablets consider using sandstone It s attractive inexpensive and easy to update just rub out the old info and chisel in the new Keep in mind however that sand stone is subject to erosion from spilled Diet Coke Oh and make sure that you store it on a reinforced shelf 394 Part Vil The Part of Tens The Network Manuals and Disks In the Land of Oz a common lament of the Network Scarecrow is If I only had the manual True the manual probably isn t a Pulitzer Prize candidate but that doesn t mean you should toss it in a landfill ei
191. ce shown in Figure 8 3 is an Intel Pro 100 VE Network Connection It s installed in slot 3 of the computer s PCI bus Chapter 8 Configuring Windows XP Vista and 7 Clients 153 Local Area Connection Properties we Connect using E Intel R PRO 100 VE Network Conne This connection uses the following tems v eli crosoft Network M E Hia and Panter Shaning tor Miemsatt Networks M EnS Packet Schedar M E intemet Protocol TCP IP D ovat _urestat_ C Properes Figure 8 2 Eae Description The Allows your computer to access resources on a Microsoft Properties sas dialog C Show icon in notification area when connected box for a Z Notify me when this connection has limited or no connectivity network ea aD Ga es Intel R PRO 100 VE Network Connection Properties GE ear General Advanced Driver Resources Power Management Beh intei PRO 100 VE Network Connection Device type Network adaptera Manufacturer Intel Location PCI bus 3 device 8 function 0 Device etatue This device is working properly F you are having problems with this device cick Troubleshoot to Figure 8 3 start the troubleshooter The Properties a dialog Troubleshoot box for a Device ueage network Use tis devic able ly adapter ae Co Come ay If you re having trouble with the adapter you can click the Troubleshoot button to open the Windows XP Hardware Troubleshooter Y
192. ceccescesseseeeseeeeeeeeceeeeeseeaeens 324 Securing User ACCOUMHS ccsscssscsssesssesesseesssessecsscessesssecssesssesseesseessness 325 Obfuscating your Usernames nssrsessssisriisresii ires 325 Using passwords Wisely sss ivseiesctencessesesedeiaceuieioee ive daviaeneveedeerned 326 Generating passwords For DUMMIES cccesccesseeseeeseeeeeeeeeeeees 327 Secure the Administrator account cecceceeseeseeseeeeeeeeeneeeeeseeaeens 328 Managing User Security ccccccsccssesssesssesseeseeesseeeseeseeeseeseeeeseseeeeseesseenes 329 User AC COUMUS soere eesosa as E tay E Ain decaatat edits 329 Built in AC COUN 23243 62ers naea neon ra eeke Pp e TIARE 330 User TIGHUS seee fran EE EE EEE VEEE ERV Eaa 331 Permissions who gets what csccscssesscesseeeseceaeceaeeeeeeeeeeeeeesees 332 Group theraps iseinean s eiei E AES 332 User Profle S iesene E RAES 334 LO SONSCHIPUS P E T evvaransncaneeanvavees 334 Securing Yo r USerS sirere nerriet aer eiee ER AECE AERAN EAEE RERS 335 Chapter 24 Hardening Your Network aaaea 337 Firewalls neosensgi eie A E E E EE RESES 337 The Many Types Of Firewall S esserscsceoneii rrei nsn is 339 Packet fItering sinrserenr ndis neironi dnain Ese EEE 339 Stateful packet inspection SPD esessssssessseserssssesrsesssersessesnssssesess 341 Circuit level gateway ccsccssccsscsscssscsssesecessesssessaessaeeseeesneessessnes 341 Application gateway ii aiinanidadiia nnn baiintii
193. ces 1 The servers have 10 100 Mbps cards All offices in the building are wired with Cat5 wiring to a central wiring closet where a small equipment rack holds two 24 port 10 100 Mbps switches 78 PartI Building Your Own Network 1 Internet access is provided through a T1 connection with a Cisco 1700 router Lately network performance has been noticeably slow particularly Internet access and large file transfers between client computers and the servers Users have started to complain that sometimes the network seems to crawl The problem is twofold 1 The network has outgrown the old 100 Mbps switches All network traffic must flow through them and they re limited to the speed of 100 Mbps As a result the new computers with the gigabit networking ports are connecting to the network at 100 Mbps not 1000 Mbps 1 The network has outgrown the capabilities of Windows 2000 Server The server computers themselves are old and the operating system is outdated The performance of this network can be dramatically improved in two steps 1 Upgrade the network infrastructure Replace the old network hubs with three 24 port 10 100 1000 Mbps switches 2 Replace the aging servers with faster servers running Windows Server 2007 The network is reconfigured as shown in Figure 4 7 P The Internet cow Egy 24 port 10 1000 Switch 24 port 10BaseT Hub aay Figure 4 7 The DCH Accounting
194. cess Hacking seems to be the national pastime these days With most computer networks connected to the Internet anyone anywhere in the world can and probably will try to break into your network The most basic type of security is handled through user accounts which grant individual users the right to access the network resources and govern which resources the user can access User accounts are secured by passwords therefore good password policy is a cornerstone of any security system Most network operating systems give you some standard tools for maintain ing network security Establish password policies such as requiring that passwords have a minimum length and include a mix of letters and numerals 1 Set passwords to expire after a certain number of days Doing so forces network users to change their passwords frequently Chapter 7 Setting Up a Server 135 Encrypt network data A data encryption capability scrambles data before it s sent over the network or saved on disk making unauthorized use a lot more difficult ake p Good encryption is the key to setting up a virtual private network or VPN which enables network users to securely access a network from a remote location by using an Internet connection 1 Issue digital certificates These special codes are used to ensure that users are who they say they are and files are what they claim to be I Active Directory Users and Compute
195. ch as hard drives printers and 22 Part I Let s Network CD ROM or DVD drives that are connected directly to your computer You can use local resources whether you re connected to the network or not Network resources on the other hand are the hard drives printers optical drives and other devices that are connected to the network s server comput ers You can use network resources only after your computer is connected to the network The whole trick to using a computer network is to know which resources are local resources they belong to you and which are network resources they belong to the network In most networks your C drive is a local drive as is your My Documents folder If a printer is sitting next to your PC it s probably a local printer You can do anything you want with these resources without affecting the network or other users on the network as long as the local resources aren t shared on the network You can t tell just by looking at a resource whether it s a local resource or a network resource The printer that sits right next to your com puter is probably your local printer but then again it may be a network printer The same statement is true for hard drives The hard drive in your PC is probably your own but it may be a network drive which can be used by others on the network Because dedicated network servers are full of resources you may say that they re not only dedicated and si
196. change information A computer with a wireless network connection is like a cellphone Just as you don t have to be connected to a phone line to use a cellphone you don t have to be connected to a network cable to use a wireless networked computer JO Partii Building Your Own Network The following list summarizes some key concepts and terms that you need to understand to set up and use a basic wireless network 1 A wireless network is often referred to as a WLAN for wireless local area network Some people prefer to switch the acronym around to local area wireless network or LAWN The term Wi Fi is often used to describe wireless networks although it technically refers to just one form of wireless networks the 802 11b standard See the section Eight Oh Two Dot Eleventy Something Or Understanding Wireless Standards later in this chapter for more information 1 wireless network has a name known as an SSID SSID stands for Service Set Identifier Wouldn t that make a great Jeopardy question I ll take obscure four letter acronyms for 400 please All the computers that belong to a single wireless network must have the same SSID 1 Wireless networks can transmit over any of several channels For computers to talk to each other they must be configured to transmit on the same channel The simplest type of wireless network consists of two or more computers with wireless network adapters
197. cky things After yours is up and running don t mess with it unless you know what you re doing You may be tempted to log on to your firewall router to see whether you can tweak some of its settings to squeeze another ounce of performance out of it But unless you know what you re doing be careful Be especially careful if you think you know what you re doing It s the people who think they know what they re doing who get them selves into trouble Chapter 28 Ten Networking Commandments 389 V Thou Shalt Not Covet Thy Neighbor s Network Network envy is a common malady among network managers If your net work users are humming along fine at 100 Mbps don t covet your neighbor s Gigabit network If your network users are happy with Windows XP resist the urge to upgrade to Vista or Windows 7 unless you have a really good reason And if you run Windows Server 2003 fantasizing about Windows Server 2008 is a venial sin You re especially susceptible to network envy if you re a gadget freak There s always a better switch to be had or some fancy network protocol gizmo to lust after Don t give in to these base urges Resist the devil and he will flee V1 Thou Shalt Schedule Downtime before Working upon Thy Network As a courtesy try to give your users plenty of advance notice before you take down the network to work on it Obviously you can t predict when random problems strike But if you know you re goin
198. computer viruses and using a network increases your vulner ability because it exposes all network users to the risk of being infected by a virus that lands on any one network user s computer Viruses don t just spontaneously appear out of nowhere Viruses are computer programs that are created by malicious programmers who ve lost a few screws and should be locked up What makes a virus a virus is its capability to make copies of itself that can be spread to other computers These copies in turn make still more copies that spread to still more computers and so on ad nauseam Then the virus waits patiently until something triggers it perhaps when you type a particular command or press a certain key when a certain date arrives or when the virus creator sends the virus a message What the virus does when it strikes also depends on what the virus creator wants the virus to do Some viruses harmlessly display a gotcha message Some send e mail to everyone it finds in your address book Some wipe out all the data on your hard drive Ouch A few years back viruses moved from one computer to another by latching themselves onto floppy disks Whenever you borrowed a floppy disk from a buddy you ran the risk of infecting your own computer with a virus that may have stowed away on the disk 344 Part V Protecting Your Network Nowadays virus programmers have discovered that e mail is a much more efficient method to spread the
199. connect your computers to the Internet you can consult Chapter 10 for instructions Why Bother with a Network Frankly computer networks are a bit of a pain to set up So why bother Because the benefits of having a network outweigh the difficulties of setting up one You don t have to be a PhD to understand the benefits of networking In fact you learned everything you need to know in kindergarten Networks are all about sharing Specifically networks are about sharing three things files resources and programs Shaving files Networks enable you to share information with other computers on the net work Depending on how you set up your network you can share files with your network friends in several different ways You can send a file from your computer directly to a friend s computer by attaching the file to an e mail message and then mailing it Or you can let your friend access your com puter over the network so that your friend can retrieve the file directly from your hard drive Yet another method is to copy the file to a disk on another computer and then tell your friend where you put the file so that he can retrieve it later One way or the other the data travels to your friend s com puter over the network cable and not on a CD or DVD disk or flash drive as it would in a sneakernet Shaving resources You can set up certain computer resources such as hard drives or printers so that all computers on the n
200. ction to indicate which network you prefer to join if you find yourself within range of two or more networks at the same time You can use the Move Up and Move Down buttons next to the Preferred Networks list to change your preferences To add a network that you haven t yet joined click the Add button This action opens the dialog box shown in Figure 9 7 Here you can type the SSID value for the network that you want to add You can also specify other Chapter 9 Wireless Networking 18 1 E Figure 9 7 Adding a wireless network in Windows XP information such as whether to use data encryption how to authenticate yourself and whether the network is an ad hoc rather than an infrastructure network Guan ERIE Wireless network properties we Network name SSID Wireless network key WEP This network requires a key tor the tollovang L Data encryption WEP enabled C Network Authentication Shared mode L The key it provided for me automatically C This is a computer to computer ad hoc network wireless access points are not used Cx cre When your computer comes within range of a wireless network a pop up balloon appears on the taskbar indicating that a network is available If one of your preferred networks is within range clicking the balloon automati cally connects you to that network If Windows XP doesn t recognize any of the networks clicking the balloon displays the Wireless Network
201. ctive Directory Users and Computers management console appears 3 Click Users in the console tree 4 In the Details pane right click the user that you want to enable or disable and then choose either Enable Account or Disable Account to enable or disable the user Deleting a User Deleting a user account is surprisingly easy Just follow these steps 1 Log on as an administrator You must have administrator privileges in order to perform this procedure 2 Choose Start Administrative Tools Active Directory Users and Computers The Active Directory Users and Computers management console appears Chapter 17 Managing Windows User Accounts 2 5 5 3 Click Users in the console tree 4 In the Details pane right click the user that you want to delete and then choose Delete Windows asks whether you really want to delete the user just in case you re kidding 5 Click Yes Poof The user account is deleted Working with Groups A group is a special type of account that represents a set of users who have common network access needs Using groups can dramatically simplify the task of assigning network access rights to users Rather than assigning access rights to each user individually groups let you assign rights to the group itself Then those rights automatically extend to any user that you add to the group The following sections describe some of the key concepts that you need to understand in order to us
202. d e An incremental backup on each other normal business day for example Tuesday Wednesday Thursday and Friday 1 When you use incremental backups the complete backup consists of the full backup tapes and all the incremental backup tapes that you ve made since you did the full backup If the hard drive crashes and you have to restore the data onto a new drive you first restore Monday s normal backup and then you restore each of the subsequent incremental backups Incremental backups complicate the task of restoring individual files because the most recent copy of the file may be on the full backup tape or on any of the incremental backups Backup programs keep track of the location of the most recent version of each file in order to simplify the process 1 When you use incremental backups you can choose whether you want to e Store each incremental backup on its own tape e Append each backup to the end of an existing tape Often you can use a single tape for a week of incremental backups Differential backups A differential backup is similar to an incremental backup except that it doesn t reset the archive bit when files are backed up As a result each differential backup represents the difference between the last normal backup and the current state of the hard drive 3 6 Part V Protecting Your Network ar To do a full restore from a differential backup you first restore the last normal backup and
203. d 85 86 tools 87 88 wall jacks 91 92 cable Internet connections 186 cable ties 87 CallVantage AT amp T 218 Cancel Printing command 39 carrier sense multiple access with collision detection CSMA CD 170 categories cable 83 84 cellphone 222 certificates digital 135 certification network administrator 244 Change E mail Account dialog box 201 channels wireless network 166 178 cheat sheets network 241 302 chkconfig command 367 368 circuit level gateway 341 classes IP address 108 111 classless IP addresses 108 cleanup network server 240 Client for Microsoft Networks 154 clients 14 16 41 42 293 295 324 See also Windows clients configuring clock speed 65 closed door approach to security 323 324 coaxial cable 82 96 99 101 collision indicator 94 Comcast Digital Voice 220 command shell Linux 360 commands TCP IP 241 242 communication over network 14 compare after backup feature 319 compression methods 311 Computer Browser service 296 Computer folder 31 33 48 computer identification 158 162 computer industry keeping up with 303 computer magazines 303 computer name 23 143 158 159 292 Computer Name Changes dialog box 159 160 Computer Name Domain Changes dialog box 161 162 computer tools 87 392 computers See also servers components reinstalling internal 290 equipment inventory 238 mainframe 17 18 network plan 65 67 concurrent usage license 14 Cone of Silence 324
204. d For example if a user retrieves a record in a form that allows the record to be updated Access locks the record while the user edits it so that other users can t edit the record until the first record is finished e No Locks This method doesn t really mean that the record isn t locked Instead No Locks means that the record isn t locked until a user writes a change to the database This method can be con fusing to users because it enables one user to overwrite changes made by another user e All Records All Records locks an entire table whenever a user edits any record in the table Access lets you split a database so that the forms queries and reports are stored on each user s local disk drive but the data itself is stored on a network drive This feature can make the database run more efficiently on a network but it s a little more difficult to set up To split a data base choose Tools Database UtilitiesDatabase Splitter Access includes built in security features that you should use if you share an Access database from a Windows client computer such as one running Windows XP or Windows Vista If you store the database on a domain server you can use the server s security features to protect the database Access automatically refreshes forms and datasheets every 60 seconds That way if one user opens a form or datasheet and another user changes the data a few seconds later the first user sees the changes
205. d as always thanks to all the behind the scenes people who chipped in with help I m not even aware of Publisher s Acknowledgments We re proud of this book please send us your comments at http dummies custhelp com For other comments please contact our Customer Care Department within the U S at 877 762 2974 outside the U S at 317 572 3993 or fax 317 572 4002 Some of the people who helped bring this book to market include the following Acquisitions Editorial and Media Composition Services Development Project Coordinator Sheree Montgomery Project Editor Nicole Sholly Layout and Graphics Ashley Chamberlain Executive Editor Amy Fandrei Joyce Haughey Copy Editor Jennifer Riggs Proofreader Evelyn C Gibson Technical Editor Lee Musick Indexer BIM Indexing amp Proofreading Services Editorial Manager Kevin Kirschner Editorial Assistant Amanda Graham Sr Editorial Assistant Cherie Case Cartoons Rich Tennant www the5thwave com Publishing and Editorial for Technology Dummies Richard Swadley Vice President and Executive Group Publisher Andy Cummings Vice President and Publisher Mary Bednarek Executive Acquisitions Director Mary C Corder Editorial Director Publishing for Consumer Dummies Diane Graves Steele Vice President and Publisher Composition Services Debbie Stailey Director of Composition Services Contents at a Glance Introduction cccccccccccccccccccccccccccccccccccccccecececccccccccccec
206. d computer networks sometimes act as though they re held together by baling wire chewing gum and duct tape To make matters worse networks breed suspicion After your computer is attached to a network users begin to blame the network every time some thing goes wrong regardless of whether the problem has anything to do with the network You can t get columns to line up in a Word document Must be the network Your spreadsheet doesn t add up The network is acting The worst thing about network failures is that sometimes they can shut down an entire company It s not so bad if just one user can t access a particular shared folder on a file server If a critical server goes down however your network users may be locked out of their files their applications their e mail and everything else they need to conduct business as usual When that hap pens they beat down your doors and don t stop until you get the network back up and running In this chapter I describe some of the most likely causes of network trouble and suggest some basic troubleshooting techniques that you can employ when your network goes on the fritz 288 Part IV Network Management For Dummies When Bad Things Happen to Good Computers The following basic troubleshooting steps specify what you should examine at the first sign of network trouble In many if not most of the cases one of the following steps can get your network back up and running
207. d enable access for UNIX client computers 4 Click Next Depending on the role or roles you select an additional page may be dis played asking you to select the role services you want to install For exam ple Figure 7 5 shows the Role Services page for the File Services role pM Figure 7 4 The Select Server Roles page pee E zs Figure 7 5 The Role Services page PCS Chapter 7 Setting Up a Server 14 g Add Roles Wizard Before You Begin Server Roles Hle Services Robe Services Confirmation Progress Resulls Select Server Roles Select ane or mare roles to instal nn this server Roles i ISOOOOoOoL Ino Active Directory Certificate Services Active Directory Domain Services Active Directory Federaton Services Active Direct Apniication Server DHCP Server DNS Server Fax Server File Services Network Policy and Access Services Print Services Termine Services UDDI Services Web Server 15 indows Deployment Services Windows SharePoint Services y Lightweight Directory Services Active Directory Rights Management Services x Description ae provides technologies that help you manage storage enable file replication manage shared folders ensure fast file searching and enable access tor LINTX client computers pee wees e coe Select the role services to install for File Services Role services 8
208. d file manage ment for the unicycle and there you are Although multitasking creates the appearance that two or more programs execute on the computer at the same time in reality a computer with a single processor can execute only one program at a time The operating system switches the CPU from one program to another to create the appearance that several programs execute simultaneously but at any given moment only one of the programs processes commands The others are patiently waiting their turns However if the computer has more than one CPU the CPUs can exe cute programs simultaneously but that s another kettle of fish Directory services Directories are everywhere and were even in the days when they were all hard copy When you needed to make a phone call you looked up the number in a phone directory When you needed to find the address of a client you looked her up in your Rolodex And then there were the nonbook versions When you needed to find the Sam Goody store at a shopping mall for example you looked for the mall directory usually a lighted sign showing what was where 134 Partit Building Your Own Network Networks have directories too providing information about the resources that are available on the network such as users computers printers shared folders and files Directories are an essential part of any network operating system In early network operating systems such as Windows
209. d from 2 windows Aut Security Group Members of this group ha Figure 7 1 Active Directory Users and 4 gt Computers f N E start m Active Directory User e git 8 40PM Understanding Windows Server 2008 Versions The current version of Windows for network servers is Windows Server 2008 Windows Server 2008 builds on Windows Server 2003 with many new fea tures Here are just a few of its new features 1 Even more enhancements to Active Directory including the ability to manage digital certificates a new type of domain controller called a read only domain controller and the ability to stop and restart Active Directory services without shutting down the entire server 136 Parti Building Your Own Network Anew graphical user interface based on Windows Vista including a new all in one management tool called the Server Manager Anew version of the operating system called Server Core which doesn t have a graphical user interface Server Core is run entirely from the command line or by a remote computer that connects to the server via Microsoft Management Console Server Core provides efficient file serv ers domain controllers or DNS and DHCP servers Remote connection enhancements that enable computers to establish Web based connections to the server with the HTTPS protocol without having to establish a virtual private network VPN connection Yet another new version of the Internet Inform
210. d inthe var directory would be stored in the third partition The directory where a drive mounts is the drive s mount point Notice that Linux uses regular forward slash characters to separate directory names rather than the backward slash characters used by Windows Typing backslashes instead of regular slashes is one of the most common mistakes made by new Linux users While we re on the subject Linux uses a dif ferent convention for naming files too In Windows filenames end in a three letter extension that s separated from the rest of the filename by a period The extension is used to indicate the file type For example files that end in exe are program files but files that end in doc are word processing documents Linux doesn t use filename extensions but peri ods are often used in Linux filenames to sepa rate different parts of the name and the last part often indicates the file type For example ldap conf and pine conf are both con figuration files 354 Part VI Beyond Windows Choosing a Linux Distribution Because the kernel that is the core operating functions of the Linux operat ing system is free several companies have created their own distributions of Linux which include the Linux operating system along with a bundle of pack ages to go along with it such as administration tools Web servers and other useful utilities as well as printed documentation These distributions
211. d operating systems The best way to set up a multiboot system is to install each operating system into its own parti tion Then you can use a boot manager program to choose the partition you want to boot from when you start the computer If you re going to install the NOS on more than one server you can save time by first copying the distribution CD to a shared hard drive That s because even the fastest CD ROM drives are slower than the network Even with a basic 10 100 Mbps network access to hard drive data over the network is much faster than access to a local CD ROM drive Automated and remote installations In case you find yourself in the unenviable position of installing an NOS on several servers you can use a few tricks to streamline the process Automated setup Lets you create a setup script that provides answers to all the questions asked by the installation program After you create the script you can start the automated setup leave and come back P when the installation is finished Creating the setup script is a bit of work so automated setup makes sense only if you have more than a few servers to install 140 Partit Building Your Own Network ar Remote Installation Services RIS The Microsoft feature that lets you install Windows Server from a remote network location without even going to the server computer This feature is tricky to set up so it s worth it only if you have to install
212. d reports from the sales system in Building B to keep track of sales and employees frequently go to the other building to follow up on important sales or to look into sales trends Although several solutions to this problem exist the easiest is to bridge the networks with a pair of wireless switches To do this CCD will purchase two wireless access points one to be plugged into the switch in Building A and the other to be plugged into the switch in Building B After the access points are configured the two networks will function as a single network Figure 4 6 shows a logical diagram for the completed network Although the wireless solution to this problem sounds simple a number of complications still need to be dealt with specifically Depending on the environment the wireless access points may have trouble establishing a link between the buildings It may be necessary to locate the devices on the roof In that case CCD will have to spend a little extra money for weatherproof enclosures Because the wireless access point in Building A will be connected to a switch rather than to a hub the switch will provide some degree of iso lation between the networks As a result overall network performance shouldn t be affected Before the networks were connected each network had its own DHCP server to assign IP addresses to users as needed Unfortunately both DHCP servers have the same local IP address 192 168 0 1 When the networks
213. d this computer thing figured out someone popped into your office hooked up a cable and said Happy networking Makes you want to scream Either way you ve found the right book Help is here within these humble pages This book talks about networks in everyday and often irreverent terms The language is friendly you don t need a graduate education to get through it And the occasional potshot helps unseat the hallowed and sacred tradi tions of networkdon bringing just a bit of fun to an otherwise dry subject The goal is to bring the lofty precepts of networking down to earth where you can touch them and squeeze them and say What s the big deal I can do this About This Book This isn t the kind of book you pick up and read from start to finish as if it were a cheap novel If I ever see you reading it at the beach lll kick sand in your face This book is more like a reference the kind of book you can pick up turn to just about any page and start reading It has 30 chapters each one covering a specific aspect of networking such as printing on the net work hooking up network cables or setting up security so that bad guys can t break in Just turn to the chapter you re interested in and start reading 2 Networking For Dummies 9th Edition Each chapter is divided into self contained chunks all related to the major theme of the chapter For example the chapter on hooking up the network ca
214. dI22UR3xdkL you can find random password generators on the Internet Just go to a search engine such as Google www google com and search for Password Generator You ll find Web pages that generate random passwords based on criteria that you specify such as how long the password should be whether it should include letters numbers punctuation uppercase and lowercase letters and so on Secure the Administrator account It stands to reason that at least one network user must have the authority to use the network without any of the restrictions imposed on other users This user is the administrator The administrator is responsible for setting up Chapter 23 Securing Your Network 329 NING s NING RY the network s security system To do that the administrator must be exempt from all security restrictions Many networks automatically create an administrator user account when you install the network software The username and password for this initial administrator are published in the network s documentation and are the same for all networks that use the same network operating system One of the first things that you must do after getting your network up and running is to change the password for this standard administrator account Otherwise your elaborate security precautions are a complete waste of time Anyone who knows the default administrator username and password can access your system with full administrator r
215. dband connections for technical reasons you don t really want to know Cable Internet access works over the same cable that brings 40 billion TV channels into your home whereas DSL is a digital phone service that works over a standard phone line Both offer three major advantages over normal dialup connections Cable and DSL are much faster than dialup connections A cable connection can be anywhere from 10 to 200 times faster than a dialup connection depending on the service you get And the speed of a DSL line is comparable to cable Although DSL is a dedicated con nection cable connections are shared among several subscribers The speed of a cable connection may slow down when several subscribers use the connection simultaneously 4 With cable and DSL you re always connected to the Internet You don t have to connect and disconnect each time you want to go online No more waiting for the modem to dial your service provider and listening to the annoying modem shriek while it attempts to establish a connection Cable and DSL don t tie up a phone line while you re online With cable your Internet connection works over TV cables rather than over phone cables With DSL the phone company installs a separate phone line for the DSL service so your regular phone line isn t affected Unfortunately there s no such thing as a free lunch and the high speed always on connections offered by cable and DSL don t come wi
216. disabled account Smart Card is Required for Interactive Logon If the user s computer has a smart card reader to automatically read security cards select this option to require the user to use it 252 Part IV Network Management For Dummies Account is Trusted for Delegation This option indicates that the account is trustworthy and can set up delegations This is an advanced feature that s usually reserved for administrator accounts Account is Sensitive and Cannot be Delegated Prevents other users from impersonating this account Use DES Encryption Types for This Account Beefs up the encryption for applications that require extra security Do Not Require Kerberos Preauthentication Select this option if you use a different implementation of the Kerberos protocol Setting the user s profile information The Profile tab as shown in Figure 17 7 lets you configure the user s profile information This dialog box lets you configure three bits of information related to the user s profile incodore leaver Properties ET MemberOf Dialin Environment Sessions Renale contol Teminal Services Profile COMe General Address Accoun Profle Telephones Organization User profile aa TE Figure 17 7 The Profile tab ox oa soy _ Hed Profile Path This field relates to a feature called roaming Because roaming profiles aren t frequently used I don t cover them
217. down your network Hubs Because switches are inexpensive now you can affordably solve many performance problems by replacing old outdated hubs with switches Using switches rather than hubs reduces the overall load on your network 1 Segment sizes Keep the number of computers and other devices on each network segment to a reasonable number About 20 devices is usu ally the right number Note that if you replace your hubs with switches you instantly cut the size of each segment because each port on a switch constitutes a separate segment The network s speed If you have a really old network you may discover that many if not all of your users are still working at 10 Mbps Upgrading to 100 Mbps speeds up the network dramatically Upgrading to 1 Gbps speeds it up even more The backbone speed If your network uses a backbone to connect seg ments consider upgrading the backbone to 1 Gbps The hardest part about improving the performance of a network is determin ing where the bottlenecks are With sophisticated test equipment and years of experience network gurus can make good educated guesses Without the equipment and experience you can still make good uneducated guesses Malfunctioning components Sometimes a malfunctioning network card or other component slows down the network For example a switch may malfunction intermittently occasion ally letting packets through but dropping enough of them to slow down the ne
218. dresses every network would be allocated 254 65 000 or 16 million IP addresses for host devices Although many networks with more than 254 devices exist few if any exist with 65 000 let alone 16 million Unfortunately any network with more than 254 devices would need a Class B allocation and probably waste tens of thousands of IP addresses gt a Figure 6 1 A network before and after sub netting PCS Chapter 6 Dealing with TCP IP 13 The second reason for subnetting is that even if a single organization has thousands of network devices operating all those devices with the same network ID would slow the network to a crawl The way TCP IP works dic tates that all the computers with the same network ID must be on the same physical network The physical network comprises a single broadcast domain which means that a single network medium must carry all the traffic for the network For performance reasons networks are usually segmented into broadcast domains that are smaller than even Class C addresses provide Subnets A subnet is a network that falls within another Class A B or C network Subnets are created by using one or more of the Class A B or C host bits to extend the network ID Thus rather than the standard 8 16 or 24 bit net work ID subnets can have network IDs of any length Figure 6 1 shows an example of a network before and after subnetting has been applied In the unsubnetted network the network has
219. e rg Drowse hr lowewriter pri on 60 o Chapter 12 Creating an Intranet 2 15 1et x Fic Acton View Help Selo JERE a Poll eke N amp ONS Name Type Data Timestamp B j Leve _msdes D Forward Lookup Zones BD sites E EI _medce LoweWriter pri E tp T op ee asics E vomainvnszones pies E Forestunszones a yi El same as parent tnider Start nf Authority SOA 63 server 1lowewriter p static i Domainonszones E same as parent tolder Name Server NS lservern 1 lowewriter pri static i E Forestonszones E came as parent folder Host A 192 168 253 128 static y Reverse Lookup Zones E h osmbavwuexe Host A 192 168 1 10 4 23 2007 9 00 00 w E Conditional Forwarders Eliservero1 Hoet A 192 169 253 128 11 3 2007 enon fi Global Logs fe vistao1 Hoet A 192 168 1 120 4 23 2007 10 00 00 SSS Figure 12 11 The DNS Manager 4 tle i Console start m Sj internet information ser HRWeb Site I DNS Manager ii 2 10PM 12 Choose Action New Alias CNAME The New Resource Record dialog box appears as shown in Figure 12 12 13 Enter the alias name you want to use in the Alias Name text box For example enter an alias name such as hr 14 Enter the computer name of your Web server in the Target Host text box For example enter a server name like 1server01 15 Click OK The DNS alias is created 16 Close the DNS Manager 17 Open a browser window 18
220. e The following sections briefly describe two other server choices Linux and Macintosh OS X Server Chapter 7 Setting Up a Server 13 7 Linux Perhaps the most interesting operating system now available is Linux The free Linux operating system is based on Unix a powerful network operating system often used on large networks Linux was started by Linus Torvalds who thought it d be fun to write a version of Unix in his free time as a hobby He enlisted help from hundreds of programmers throughout the world who volunteered their time and efforts via the Internet Today Linux is a full featured version of Unix its users consider it to be as good as or better than Windows In fact almost as many people now use Linux as use Macintosh computers Linux offers the same networking benefits of Unix and can be an excellent choice as a server operating system Apple Mac OS X Server All the other server operating systems I describe in this chapter run on Intel based PCs with Pentium or Pentium compatible processors But what about Macintosh computers After all Macintosh users need networks too For Macintosh networks Apple offers a special network server operating system known as Mac OS X Server Mac OS X Server has all the features you expect in a server operating system file and printer sharing Internet features e mail and others The Many Ways to Install a Network Operating System Regardless of which network operating syste
221. e and printer sharing program that allows Linux to mimic a Windows file and print server so Windows computers can use shared Linux directories and printers If you want to use Linux as a file or print server in a Windows network you have to know how to dance the Samba Understanding Samba Because Linux and Windows have such different file systems you can t create a Linux file server simply by granting Windows users access to Linux directories Windows client computers couldn t access files in the Linux directories There are just too many differences between the file systems these for example 366 Part VI Beyond Windows ar Linux filenames are case sensitive Windows filenames aren t For exam ple in Windows Filel txt and file1 txt are the same file In Linux they re different files Linux filenames can contain periods In Windows only one period is allowed and it separates the filename from the file extension Windows has file attributes such as Read only and Archive Linux doesn t have these More fundamentally Windows networking uses a protocol called SMB which stands for Server Message Block to manage the exchange of file data between file servers and clients Linux doesn t have SMB support built in That s why Samba is required Samba is a program that mimics the behavior of a Windows based file server by implementing the SMB protocol When you run Samba on a Linux server Windows co
222. e Home icon lets you access your home directory The Computer icon is similar to the Windows My Computer icon And the Trash icon is similar to the Recycle Bin in Windows 1 The panel at the top of the desktop area includes several menus and icons The Applications menu lists applications you can run and the Actions menu lists actions you can perform 1 Workspaces you ask A workspace is like a separate desktop where you can keep windows open to reduce the clutter on your screen The panel beneath the desktop area contains a tool the Workspace Switcher which lets you switch active workspaces by clicking one of the rect angles in the grid F Applications Places System o Doug Lowe Sun jul 5 1 59 PM iD Unsaved Document 1 gedit File Edit View Search Tools Documents Help Be dje New Open Save Print _ Unsaved Document 1 a Ln 1 Coll Figure 25 2 A typical GNOME 360 Part vi Beyond Windows Getting to a Command Shell There are two basic ways to get to a command shell the program that pro vides the command line when you need to run Linux commands directly Press Ctrl Alt Fx that is one of the function keys to switch to one of the virtual consoles There are 12 virtual consoles one for each func tion key Then you can log on and run commands to your heart s con tent When you re done press Ctrl Alt F7 to return to GNOME Virtual console 7 is the one that GNOME
223. e comput ers that you need to remove from the network temporarily Hubs or switches A switch is simply a more sophisticated type of hub Because the cost of switches has come down dramatically in the past few years new networks are built with switches rather than hubs You probably have to find a hub at a garage sale or on eBay If you have an older network that uses hubs and seems to run slowly you can probably improve the net work s speed by replacing the older hubs with newer switches Switches are more efficient than hubs but not just because they re faster 1 Inahub every packet that arrives at the hub on any of its ports is auto matically sent out on every other port The hub has to do this because it doesn t keep track of which computer is connected to each port Suppose that Wally s computer is connected to Port 1 on an 8 port hub and Ward s computer is connected to Port 5 If Ward s computer sends a packet of information to Wally s computer the hub receives the packet on Port 1 and then sends it out on Ports 2 through 8 All the computers connected to the hub get to see the packet and determine whether the packet was intended for them A switch keeps track of which computer is connected to each port If Wally s computer on Port 1 sends a packet to Ward s computer on Port 5 the switch receives the packet on Port 1 and then sends the packet out only on Port 5 This system is faster and also improves t
224. e following important tuning options are available for most servers Chapter 19 Network Performance Anxiety 28 NING Virtual memory options Virtual memory refers to disk paging files that the server uses when it doesn t have enough real memory to do its work Few servers ever have enough real memory so virtual memory is always an important server feature You can specify the size and location of the virtual memory paging files For the best performance provide at least 1 2 times the amount of real memory For example if you have 4GB of real memory allocate at least 6GB of virtual memory If necessary you can increase this size later Disk striping Use the disk defragmenter to optimize the data storage on your server s disks If the server has more than one hard drive you can increase perfor mance by creating striped volumes which allow disk I O operations to run concurrently on each of the drives in the stripe set Network protocols Make sure that your network protocols are config ured correctly and remove any protocols that aren t necessary 1 Free disk space on the server Servers like to have plenty of breathing room on their disks If the amount of free disk space on your server drops precipitously low the server chokes up and slows to a crawl Make sure that your server has plenty of space a few gigabytes of unused disk space provides a healthy buffer Servers that do too much One common source
225. e groups and some of the most common proce dures you ll employ when setting up groups for your server Creating a group If none of the built in groups meets your needs you can create your own group by following these steps 1 Log on as an administrator You must have administrator privileges to perform this procedure 2 Choose Start gt Administrative Tools Active Directory Users and Computers The Active Directory Users and Computers management console appears 3 Right click the domain to which you want to add the group and then choose New Group The New Object Group dialog box appears as shown in Figure 17 8 256 Part IV Network Management For Dummies ey Figure 17 8 Creating a new group Sa New Object Group xi Rw Create in LoweWriter prifUsers Group name Group name pre Windowes 2000 Group scope Group type 4 F Domain local Security Global C pDstnbubon C Ur lt 4 Type the name for the new group Enter the name in both text boxes 5 Choose the group scope The choices are Domain Local Global and Universal For groups that will be granted access rights to network resources choose Domain Local Use Global for groups to which you ll add users and Domain Local groups Use Universal groups only if you have a large network with mul tiple domains 6 Choose the group type The choices are Security and Distribution In most cases choose Security
226. e hackers can t get into your network via a wireless computer located in the parking lot or across the street If you think that s unlikely think again Several underground Web sites on the Internet actually display maps of unsecured wireless networks in major cities For more information about securing a wireless network see Chapter 9 Thinking Vou Can t Work Just Because the Network Is Down A few years back I realized that I can t do my job without electricity Should a power failure occur and I find myself without electricity I can t even light a candle and work with pencil and paper because the only pencil sharpener I have is electric Some people have the same attitude about the network They figure that if the network goes down they may as well go home That s not always the case Just because your computer is attached to a network doesn t mean that it won t work when the network is down True if the wind flies out of the network sails you can t access any network devices You can t get files from network drives and you can t print on network printers But you can still use your com puter for local work accessing files and programs on your local hard drive and printing on your local printer if you re lucky enough to have one Running Out of Space on a Server One of the most disastrous mistakes to make on a network server is to let it run out of disk space When you buy a new server with hundr
227. e network with bad packets Daisy chaining switches If a single switch doesn t have enough ports for your entire network you can connect switches by daisy chaining them as shown in Figure 5 5 If one of the switches has an uplink port you can use a normal patch cable to con nect the uplink port to one of the regular ports on the other hub or switch If neither device has an uplink port use a crossover cable to connect them For instructions on making a crossover cable see the section Crossover cables earlier in this chapter Chapter 5 Cables Adapters and Other Stuff 95 gt a Figure 5 5 You can daisy chain hubs or switches together On many newer switches each port on the switch can automatically detect whether it s connected to another switch In that case you don t have to use special uplink ports or crossover cables You can use a standard patch cable to connect the switches by using any available port You can often increase the overall performance of your network by using two or more connections between switches For example you may use two patch cables to create two connections between a pair of switches The number of switches that you can chain together is limited 1 For 10 Mbps networks don t connect more than three switches together For 100 Mbps or 1000 Mbps you can chain only two switches together 96 Part Il Building Your Own Network ar
228. e problem along with an indication of whether those steps were undone when they didn t help solve the problem The date the problem was finally resolved Chapter 21 How to Stay on Top of Your Network and Keep Its Users Off Your Back In This Chapter Training your users Organizing a library Finding sources for help Coming up with great excuses A network manager has a rotten deal Users come to you whenever any thing goes wrong regardless of whether the problem has anything to do with the network They knock on your door if they can t log on if they lost a file or if they can t remember how to use the microwave This chapter shows a few basic rules to simplify your life as a network manager Train Vour Users After you first get your network up and running invite all the network users to Network Obedience School so that you can teach them how to behave on the network Show them the basics of accessing the network make sure that they understand how to share files and explain the rules to them A great way to prepare your users for this session is to ask them to read the first three chapters of this book I wrote those chapters with the network user in mind so they explain the basic facts of network life If your users read those chapters first they re in a much better position to ask good questions during obedience school 302 Part IV Network Management For Dummies Here are more ways to make the
229. e problems that come up When a user bugs you with a new bug you can say with confidence I ll get back to you on that one Your library should include these items A copy of your network binder All the information you need about the configuration of your network should be in this binder Don t put the original copy of the network binder in the library Keep the original under lock and key in your office And keep an extra copy off site in a safe place A copy of the manuals for every program used on the network Most users ignore the manuals so they don t mind if you borrow them for the library If a user won t part with a manual at least make a note of the manual s location so that you know where to find it Chapter 21 How to Stay on Top of Your Network 303 1 A copy of the Windows Resource Kit for every version of Windows in use on your network You can get the Windows Resource Kit at any bookstore that has a well stocked section of computer books A copy of the network software manual or manuals At least 20 copies of this book Hey I have bills to pay Seriously your library should contain books appropriate to your level of expertise Of course For Dummies books are available on just about every major com puter subject Devoting an entire shelf to these yellow and black books isn t a bad idea Keep Up with the Computer Industry The computer business changes fast and your users probably expect
230. e same disastrous effect Chapter 27 More Than Ten Big Network Mistakes 38 If your network is set up with a dedicated file server you probably won t be tempted to turn it off or restart it But if your network is set up as a true peer to peer network where each of the workstation computers including your own also doubles as a server computer be careful about the impulsive urge to turn off or restart your computer Someone may be accessing a file or printer on your computer at that very moment Before you turn off or restart a server computer find out whether anyone is logged on If so politely ask him or her to log off Also remember that many server problems don t require a server reboot Instead you can often correct the problem just by restarting the particular service that s affected Deleting Important Files on the Server NG Without a network you can do anything you want to your computer and the only person you can hurt is yourself Kind of like the old victimless crime debate Put your computer on a network though and you take on a certain amount of responsibility You must find out how to live like a responsible member of the network society Therefore you can t capriciously delete files from a network server just because you don t need them They may not be yours You wouldn t want someone deleting your files would you Be especially careful about files that are required to k
231. e sure all the wires are slipped into the correct pinholes Insert the plug and wire into the crimping portion of the tool and then squeeze the handles to crimp the plug Squeeze it tight Remove the plug from the tool and double check the connection You re done Here are a few other points to remember when dealing with RJ 45 connectors and twisted pair cable 1 The pins on the RJ 45 connectors aren t numbered You can tell which is Pin 1 by holding the connector so that the metal conductors are facing up as shown in Figure 5 3 Pin 1 is on the left 1 Some people wire 10BaseT cable differently using the green and white pair for Pins 1 and 2 and the orange and white pair for Pins 3 and 6 Doing it this way doesn t affect the operation of the network the net work is color blind as long as the connectors on both ends of the cable are wired the same way If you re installing cable for a Fast Ethernet system be extra careful to follow the rules of Category 5 or better cabling Among other things make sure that you use Category 5 components throughout The cable and all the connectors must be up to Category 5 specs When you attach the connectors don t untwist more than half an inch of cable And don t try to stretch the cable runs beyond the 100 meter maximum When in doubt have cable for a 100 Mbps Ethernet system professionally installed 12345508 Pin connections WK Pin 1 White Orange
232. e to everyone who can access the network If you choose the closed door approach you set up each user so that he or she has access to nothing Then you grant each user access only to those specific files or folders that he or she needs The closed door approach results in tighter security but can lead to the Cone of Silence Syndrome Like Max and the Chief who can t hear each other talk while they re under the Cone of Silence your network users will constantly complain that they can t access the information that they need As a result you ll find yourself often adjusting users access rights Choose the closed door approach only if your network contains a lot of sensitive information and only if you re willing to invest time administrating your network s security policy You can think of the open door approach as an entitlement model in which the basic assumption is that users are entitled to network access In contrast the closed door policy is a permissions model in which the basic assumption 324 Part V Protecting Your Network is that users aren t entitled to anything but must get permissions for every network resource that they access P gt If you ve never heard of the Cone of Silence go to YouTube www youtube com and search for Cone of Silence You ll find several clips from the original Get Smart series Physical Security Locking Vour Doors The first level of security in any computer network is p
233. e using Windows 2000 Server Windows Server 2003 or Windows Server 2008 you can double click a service to display a dialog box that describes the service This information can come in handy if you re not certain what a particular service does How to Restart a Network Server NING RY ar Sometimes the only way to flush out a network problem is to restart the net work server that s experiencing trouble Restarting a network server is an action you should take only as a last resort Network operating systems are designed to run for months or even years at a time without rebooting Restarting a server invariably results in a temporary shutdown of the network If you must restart a server try to do it during off hours Before you restart a server check to see whether a specific service that s required has been paused or stopped You may be able to just restart the individual service rather than the entire server For more information see the section How to Restart Network Services earlier in this chapter Here s the basic procedure for restarting a network server 1 Make sure that everyone is logged off the server The easiest way to do that is to restart the server after normal business hours when everyone has gone home for the day Then you can just shut down the server and let the shutdown process forcibly log off any remaining users To find out who s logged on refer to the section Who s on First
234. e using a surge protector that is more than two or three years old replace it with a new one 1 The monitor The monitor has a separate power cord and switch Make sure that the monitor is plugged in and turned on The monitor has two cables that must be plugged in One runs from the back of the monitor to the back of the computer the other is a power cord that comes from the back of the monitor and must be plugged into an electrical outlet Cables Your keyboard monitor mouse and printer are all connected to the back of your computer by cables Make sure that these cables are all plugged in securely Make sure that the other ends of the monitor and printer cables are plugged in properly too Monitor adjustment Some monitors have knobs that you can use to adjust the contrast and brightness of the monitor s display If the com puter is running but the screen is dark try adjusting these knobs They may have been turned down all the way Internal components If you re reasonably competent and daring try turning off the computer unplugging it opening the case and carefully removing and then reseating components such as memory and video cards These components often come unseated from their sockets Removing and reinstalling them can often revive a dead computer Ways to Check a Network Connection lt r The cables that connect client computers to the rest of the network are finicky beasts They can break at a moment
235. ease duration The default value is eight days which is appropriate in many cases However you may encounter situations in which a longer or shorter interval may be appropriate 1 The more stable your network the longer the lease duration can safely exist If you only periodically add new computers to your network or replace existing computers you can safely increase the lease duration past eight days The more volatile the network the shorter the lease duration should be For example you may have a wireless network in a university library used by students who bring their laptop computers into the library to work for a few hours at a time For this network a duration as short as one hour may be appropriate J22 Partit Building Your Own Network NING RY Don t configure your network to allow leases of infinite duration Although some administrators feel that this duration cuts down the workload for the DHCP server on stable networks no network is permanently stable Whenever you find a DHCP server that s configured with infinite leases look at the active leases I guarantee that you ll find IP leases assigned to computers that no longer exist Managing a Windows Server 2008 DHCP Server Ey Figure 6 2 Specifying the scope s address range and subnet mask EEE The exact steps to follow when you configure and manage a DHCP server depend on the network operating system or router you re using The follow
236. eate Share Steps To provision a shared folder wah the following settings click Create LORS Shared Folder Location these setting click Previous or elect the appropriate page in the orientation pane NTFS Permissions Share Protocols Share folder eettinge SMB Settings Share location C Data Shares Marketing SMB Pennissions NTFS permissions NT SERVICE Truetedinetaller Allow Full Control nherted DFS Namespace Publishing NT SERVICE Trustedinstaller Alow inhemted NT AUTHORITY SYSTEM Allow Full Control inherited center comme S NT AUTHORITY SYSTEM Allow rihented BUILTIN Administrators Allow Full Control ritverited r BUILTIN Administrators Allow nherted BUILTIN Users Alow Read amp Execute List Folder Contents F BUILTIN Users Mlow Create Folders Append Data inherited BUILTIN Users Alow Create Files Wnte Data inhented CREATOR OWNER Allow frherted Share over SMR Marketing Share palh WLSERVERO1 Marketing User imt Maamum allowed Offline setting Selected files and programs available offline SMB permissions Everyone Allow Change Read BUILTIN Administrators Allow Full Control Fa emon C ces Chapter 18 Managing Network Storage 2 7 Ta Confirmation Stepe Shared Folder Location V You have eucceeefully completed the Provision a Shared Folder Wizard NTFS Pemissions Share Protocols Talo SMB Settinas jemal SMD Pemissions eak l l O shae over SMB Success DFS Name
237. eate custom share permissions All users and groups have only Read access Administrators have Full Control al other users and groups have only Read access g Administratore have Full Control all other usere and groupe have only Read access and Wnte access Users and groups have custom share permissions Fenmissions For more information about sharing end permissions see Meneuing Permissions for Shared Folders Previous Neas Cancet_ Chapter 18 Managing Network Storage 269 7 Select the sharing permissions you want to impose You have four choices e All Users and Groups have Read Only Access Use this option to share information that you want everyone to have access to but you don t want to allow anyone to change the information e Administrators Have Full Control All Other Users and Groups Have Only Read Access e Administrators Have Full Control All Other Users and Groups Have Only Read Access and Write Access e Users and Groups Have Custom Share Permissions When you select this option you can then click the Permissions button to set custom permissions 8 Click Next The dialog box as shown in Figure 18 7 appears Op Provision a Shated Folder Wizard a oj xj DFS Namespace Publishing You can publish an SMB share to a DFS namespace by specilying an existing Shared Folder Location namespace and the folders you want to create in the namespace The last folder in the namespace path wil
238. eaverc1 Or you may use the first letter of your first name followed by your complete last name Then Wally s username is wcleaver and Beaver s is bcleaver In most networks capitalization doesn t matter in usernames Thus bcleaver is the same as BCleaver Every computer on the network must have a unique computer name You don t have to know the names of all the computers on the network but it helps if you know your own computer s name and the names of any server computers you need to access The computer s name is sometimes the same as the username of the person who uses the computer but that s usually a bad idea because in many com panies people come and go more often than computers Sometimes the names indicate the physical location of the computer such as of fice 12 or back room Server computers often have names that reflect the group that uses the server most like acctng server or cad server Some network nerds like to assign techie sounding names like BL3K5 87a And some like to use names from science fiction movies HAL Colossus M5 and Data come to mind Cute names like Herbie aren t allowed However Tigger and Pooh are entirely acceptable recommended in fact Networks are what Tiggers like the best Usually the sensible approach to computer naming is to use names that have numbers such as computer001 or computer002 Network resources such as shared disk folders and printers have
239. ecee Part I Lets Network ccce l Chapter 1 Networks Will Not Take Over the World and Other Network Basics 9 Chapter 2 Life on the Network c ccccccsssessecsseesseeseeeseceseesseceseessecseeeseeseeesseeeeeeeeessees 21 Chapter 3 More Ways to Use Your Network cccccsscsssessseessesseeseeeseeseeeseeeseeeeessees 41 Part Il Building Vour Own Network cccccccccsccccseccssccese 67 Chapter 4 Planning Your Network ccccceccccsscssssessceseessecesecesecsseeeeeeseesseeeseeeseeseessees 63 Chapter 5 Oh What a Tangled Web We Weave Cables Adapters and Other Stuff cccsessssscescsssessscssscssseseessesssesseeesseeseessnesees 79 Chapter 6 Dealing with TEPIP oireen pere eere E EEE EEAS 105 Chapter 7 Setting Up a Server csccsscssscsssesssesssesseesecessecssecssessseessesssesseessessaeesaeeans 131 Chapter 8 Configuring Windows XP Vista and 7 Clients cccccceesceseeseeeeeees 151 Chapter 9 Wireless Networking ccccescessessscesecesecesecsseessecsseeseeeseeseeseseeeseeeseesseeeas 165 Part Ill Getting Connected occse 183 Chapter 10 Connecting Your Network to the Internet ccceeseeseeseeseeeseeeeees 185 Chapter 11 Managing E Mail with Exchange 2007 c ccscccscesssessessseeseeeseeeseesseeees 193 Chapter 12 Creating an Intranets sccciiesececdveecevsscanteds caetedaatceessantecdoibetesacdedenncts EEES 203 Chapter 13 Is It a Phone or a Computer Or Understand
240. eck the process requires two forms of identification Your username The name by which the network knows you Your username is usually some variation of your real name like Beav for the Beaver Everyone who uses the network must have a username Your password A secret word that only you and the network know If you type the correct password the network believes that you are who you Say you are Every user has a different password and the password should be a secret In the early days of computer networking you had to type a logon command at a stark MS DOS prompt and then supply your user ID and password Nowadays the glory of Windows is that you get to log on to the network through a special network logon screen Figure 2 1 shows the Windows 7 version of this dialog box Here are some more logon points to ponder The terms user JD and logon name are sometimes used instead of user name They mean the same thing As long as we re talking about words that mean the same thing log in and log on mean the same thing as do respectively log out and log off as ways of saying I m outta here Although you see both out there in the world this book uses log on and log off throughout and if there s any exception the book says why and grouses about it a bit As far as the network s concerned you and your computer aren t the same thing Your username refers to you not to your computer That s why you have a user
241. ed acceca 183 Chapter 10 Connecting Your Network to the Internet 185 Connecting to the Internet ccc cccesccesceeseesccceseeeseeseeeseesseeeseeeseesseenseenes 185 Connecting with cable or DSL eeesesesssesseesscessessneesseesseessessees 186 Connecting with high speed private lines T1 and T3 187 Sharing an Internet CONNECTION cee cccesscesseeseeeseeeeesseeeeeenseeeees 187 Securing Your Connection with a Firewall cccceesesseeessesteeseeeseeeeees 188 Using a fre walls sccisss sands dodves dessaveceises staddensansuaveds s Eni N As 188 The built in Windows firewall ccccccccescceeseeeseeeseeeeeseesseeeeeeeess 190 Chapter 11 Managing E Mail with Exchange 2007 193 Managing MailDOx S vecssicssesducdedessenevesectedsaiesnesssceesauectvaneueredd thevscpaaeevdoasivvsiees 193 The Exchange General tabuen 194 The E mail Addresses tab ccccscsscssseeeeeseeeeeseeneeeeceeeeeeeneeeesseeaeees 195 The Exchange Features taDt nri 195 The Exchange Advanced tab cecccessccesecesseeeseeeseeeesseesseeesseeees 196 Configuring Outlook for Exchange ccccccscessseeseesseeseesseeeseceseeeseesseenes 197 Viewing Another Mailbox cccccceesccesseeceseeeeseeesscecsseeessneesseeeeseeesseeenaes 199 Chapter 12 Creating an Intranet 00 e eee eee ee 203 What Isan Intranet soeia iE daaeve cena R ets 203 What Do You Use an Intranet
242. ed network folders are available you may wonder what you re supposed to do with them This section describes four good uses for a network folder Chapter 2 Life on the Network 2 7 Store files that everybody needs A shared network folder is a good place to store files that more than one user needs to access Without a network you have to store a copy of the file on everyone s computer and you have to worry about keeping the copies synchronized which you can t do no matter how hard you try Or you can keep the file on a disk and pass it around Or you can keep the file on one computer and play musical chairs whenever someone needs to use the file he goes to the computer that contains the file On a network you can keep one copy of the file in a shared folder on the net work and everyone can access it Store your own files You can also use a shared network folder as an extension of your own hard drive storage For example if you filled up all the free space on your hard drive with pictures sounds and movies that you downloaded from the Internet but the network server has billions and billions of gigabytes of free space you have all the drive space you need Just store your files on the net work drive Here are a few guidelines for storing files on network drives Using the network drive for your own files works best if the network drive is set up for private storage that other users can t access That way you
243. eds of gigabytes of disk space you might think you ll never run out of space But it s amazing how quickly an entire network full of users can run through a few hundred gigabytes of disk space Unfortunately bad things begin to happen when you get down to a few giga bytes of free space on a server Windows begins to perform poorly and may even slow to a crawl Errors start popping up And when you finally run out of space completely users line up at your door demanding an immediate fix 1 The best way to avoid this unhappy situation is to monitor the free disk space on your servers on a daily basis It s also a good idea to keep track of free disk space on a weekly basis so you can look for project trends Chapter 27 More Than Ten Big Network Mistakes 385 For example if your file server has 100GB of free space and your users chew up about 5GB of space per week you know you ll most likely run out of disk space in 20 weeks With that knowledge in hand you can for mulate a plan Adding additional disk storage to your servers isn t always the best solu tion to the problem of running out of disk space Before you buy more disks you should e Look for old and unnecessary files that can be removed e Consider using disk quotas to limit the amount of network disk space your users can consume Always Blaming the Network Some people treat the network kind of like the village idiot who can be blamed whenever anything goes
244. eep the network run ning For example some versions of Windows use a folder named wgpo0000 to hold e mail If you delete this folder your e mail is history Look before you delete The first time you accidentally delete an important file from a network share you may be unpleasantly surprised to discover that the Recycle Bin does not work for network files The Recycle Bin saves copies of files you ve deleted from your computer s local hard disk but it does not save copies of files you delete from network shares As a result you can t undelete a file you ve acci dentally deleted from the network 382 Part vit the Part of Tens Copying a File from the Server Changing It and Then Copying It Back Sometimes working on a network file is easier if you first copy the file to your local hard drive Then you can access it from your application program more efficiently because you don t have to use the network This is especially true for large database files that have to be sorted to print reports You re asking for trouble though if you copy the file to your PC s local hard drive make changes to the file and then copy the updated version of the file back to the server Why Because somebody else may be trying the same thing at the same time If that happens the updates made by one of you whoever copies the file back to the server first are lost Copying a file to a local drive is rarely a good idea Sending Som
245. efore you can access the network from your Mac you must configure your Mac for networking Activate AppleTalk and assign your network name and password Activating AppleTalk After all the cables are in place you have to activate AppleTalk Here s how 1 Choose the Chooser desk accessory from the Apple menu 2 Click the Active button 3 Close the Chooser Assigning your name and password After you activate AppleTalk you re ready to assign an owner name a pass word and a name for your computer This process allows other network users to access your Mac Here s how 1 Choose the File Sharing control panel from the Apple menu Apple gt Control Panels File Sharing 2 Type your name in the Owner Name field 3 Type a password in the Owner Password field Don t forget what the password is 4 Type a descriptive name for your computer in the Computer Name field Other network users will know your computer by this name 5 Click the Close button 3 14 Part VI Beyond Windows Accessing a network printer Accessing a network printer with AppleTalk is no different than accessing a printer when you don t have a network If more than one printer is available on the network you use the Chooser to select the printer you want to use Chooser displays all the available network printers just pick the one you want to use And keep the following points in mind Be sure to enable Background Printing for the network
246. efully coordinate the IP address ranges known as scopes for which each server is responsible If you acciden tally set up two DHCP servers for the same scope you may end up with dupli cate address assignments if the servers attempt to assign the same IP address to two different hosts To prevent this situation from happening set up just one DHCP server unless your network is so large that one server can t handle the workload Understanding scopes A scope is simply a range of IP addresses that a DHCP server is configured to distribute In the simplest case in which a single DHCP server oversees IP configuration for an entire subnet the scope corresponds to the subnet However if you set up two DHCP servers for a subnet you can configure each one with a scope that allocates only one part of the complete subnet range In addition a single DHCP server can serve more than one scope You must create a scope before you can enable a DHCP server When you create a scope you can provide it with these properties Ascope name which helps you to identify the scope and its purpose Ascope description which lets you provide additional details about the scope and its purpose 1 A starting IP address for the scope An ending IP address for the scope A subnet mask for the scope You can specify the subnet mask with dotted decimal notation or with Classless Inter Domain Routing CIDR notation One or more ranges of excluded addresse
247. ement console Here you can perform common administrative tasks such as adding additional zones changing zone settings or adding A or MX records to an existing zone The DNS management console hides the details of the resource records from you thus allowing you to work with a friendly graphical user interface instead To add anew host that is an A record to a zone right click the zone in the DNS management console and choose the Add New Host command This action opens the New Host dialog box as shown in Figure 6 6 x Name uses parent domain name if blank PrinterO1 Fully qualified domain name FQDN Pnnteroi Lowewniter on TP address 192 168 168 201 T Create associated pointer PTR record I Allow any authenticated user to update DNS records with the some owner name ttinx cme This dialog box lets you specify the following information Name The host name for the new host 1 IP Address The host s IP address Create Associated Pointer PTR Record Automatically creates a PTR record in the reverse lookup zone file Select this option if you want to allow reverse lookups for the host Chapter 6 Dealing with TCP IP 29 Allow Any Authenticated User to Update Select this option if you want to allow other users to update this record or other records with the same host name You should usually leave this option deselected Time to Live The TTL value for this record You can
248. ength and antennas is cesesisccecscevesedeasicatrdanceseivenetvdaescavdneseavainse 167 Spectrums and the FCC oy ccssedcaseeds sooo en ctees tons jevisevadidecds Mkasioeeeeeess 169 Eight Oh Two Dot Eleventy Something Or Understanding Wireless Standards csccscesceeseeteeseeteeseeeeeees 170 Home onthe RANG 33 44 cseencaed sac esedesscsuecvensedetsnice EE TEE TRA NEO a Erana 171 Wireless Network Adapters cccccccscccesseceseeessseeesseesseeeeeeeeseeesseeesseeesees 172 Wireless ACCESS POINtS wis icisisiestisssectcenicsitens ales vedevess Acsaneesuageceabedatetei sanese 173 Infrastructure MOE ciies cic cccdossenscedssvscvaevescnesvesectgecsecsbdavienyscsevaescnaes 174 Multifunction WAP wcss s ccicdesdsatesscs cies ccacsezesndacs cenecdacuaaasnds tear ecacaneedeess 175 ROAMING esse e e aar E SEEE EE ESEE Ries howe 175 Wireless brid ging sisca eerta EEA 176 Ad KOC MEtWOTKS seisein iona aE EEA TANNER rare eC aae Erai 176 Configuring a Wireless Access Point issesesisresesesreresrorioreverrnrevisssresesries 176 Basic Configuration Options ececeesesseeseeeeeceneceeeeseseeeeeeeeneesaes 177 DHCP configuration aaneen e E Gahan eesdiaes 179 Configuring Windows XP for Wireless Networking cccceseeees 179 Connecting to a Wireless Network with Windows Vista Or WiNdOWS 7 ccsssceesseeesseeeseeeeceeesceesseeeeeeeesseeenses 181 Ki xii Networking For Dummies 9th Edition Part Ill Getting Connect
249. ential security problems by restricting the backup user ID to a certain client and a certain time of the day If you re really clever and paranoid you can probably set up the backup user s account so that the only program it can run is the backup program Use encryption to protect the contents of your backup tapes Secure the backup tapes in a safe location such as um a safe Preferably one that is fireproof Speaking of fireproof safes I don t trust them Even better than a fireproof safe is a safe deposit box at a nearby bank Chapter 23 Securing Your Network In This Chapter Assessing the risk for security Determining your basic security philosophy Physically securing your network equipment User account security Other network security techniques Making sure your users are secure ar B efore you had a network computer security was easy You simply locked your door when you left work for the day You could rest easy secure in the knowledge that the bad guys would have to break down the door to get to your computer The network changes all that Now anyone with access to any computer on the network can break into the network and steal your files Not only do you have to lock your door but you have to make sure that other people lock their doors too Fortunately network operating systems have built in provisions for network security This situation makes it difficult for someone to steal your fi
250. enum cable is required only if the air conditioning and heating systems aren t ducted When in doubt have the local inspector look at your facility before you install cable Sometimes solid sometimes stranded The actual copper wire that comprises the cable comes in two varieties solid and stranded Your network will have some of each In stranded cable each conductor is made from a bunch of very small wires that are twisted together Stranded cable is more flexible than solid cable so it doesn t break as easily However stranded cable is more expensive than solid cable and isn t very good at transmitting signals over long distances Stranded cable is best used for patch cables such as patch panels to hubs and switches Strictly speaking the cable that connects your computer to the wall jack is a station cable not a patch cable but it s an appropriate use for stranded cable It s not technically correct but most people refer to the cable that connects a computer to a wall jack as a patch cable 86 Part Il Building Your Own Network ANG so In solid cable each conductor is a single solid strand of wire Solid cable is less expensive than stranded cable and carries signals farther but it isn t very flexible If you bend it too many times it breaks Normally you find solid cable in use as permanent wiring within the walls and ceilings of a building Installation guidelines The hardest part of ins
251. epace Publiching Review Settings and Create Stare Confiemation ree Figure 18 9 You re done E Sharing a folder without the wizard If you think wizards should be confined to Harry Potter movies you can set up a share without bothering with the wizard Just follow these steps 1 Open a Windows Explorer window and navigate to the folder that you want to share 2 Right click the folder and choose Properties This action brings up the Properties dialog box for the folder 3 Click the Sharing tab The Sharing tab comes to the front as shown in Figure 18 10 4 Click the Advanced Sharing button The dialog box as shown in Figure 18 11 appears 5 Select the Share This Folder option to designate the folder as shared The rest of the controls on this dialog box will be unavailable until you check this box 2 72 Part IV Network Management For Dummies 6 Type the name that you want to use for the share in the Share Name box and type a description of the share in the Comments box The default name is the name of the folder being shared If the folder name is long you can use a more succinct name here The description is strictly optional but can sometimes help users deter mine the intended contents of the folder General Sharing Securty Previous Versions Customize Network Fle and Folder Sharing eee Network Path Not Shared Advanced Shanna advanced sharing options GP Advanced Sharing
252. ept that Windows does all the copying automatically Windows also uses smoke and mirrors to make it look like the copies are actually on the network even though you re not connected to the network For example if you map a drive drive M for example and make it available offline you can still access the offline copies of the file on the M drive That s because Windows knows that when you aren t connected to the network it should redirect drive M to its local copy of the drive M files The main complication of working with offline files of course is what hap pens when two or more users want to access the same offline files Windows can attempt to straighten that mess out for you but it doesn t do a great job of it Your best bet is to not use the offline files feature with network resources that other users may want available offline too In other words it s okay to make your home drive available offline because that drive is acces sible only to you But I don t recommend making shared network resources available offline unless they re read only resources that don t contain files you intend to modify Using the offline files feature is easy In Windows Vista or Windows 7 open the Computer folder right click the mapped network drive you want to make available offline and then choose Always Available Offline In Windows XP open My Computer right click the mapped drive and choose Make Available Offline If you d
253. equires at least a little technical know how the organizational skills are more important What Have They Got That Vou Don t Got With all this technical stuff to worry about you may begin to wonder whether you re smart enough to use your computer after it s attached to the network Let me assure you that you are If you re smart enough to buy this book 20 Part I Let s Network Oj Figure 1 2 Your official CND certificate because you know that you need a network you re more than smart enough to use the network after it s put in You re also smart enough to install and manage a network yourself It isn t rocket science I know people who use networks all the time They re no smarter than you are but they do have one thing that you don t have a certificate And so by the powers vested in me by the International Society for the Computer Impaired I present you with the certificate in Figure 1 2 confirming that you ve earned the coveted title Certified Network Dummy better known as CND This title is considered much more prestigious in certain circles than the more stodgy CNE or MCSE badges worn by real network experts Congratulations and go in peace Certificate of Network Dumminess This certifies that has ascended to the Holy Order of CERTIFIED NETWORK DUMMY and is hereby entitled to all the rights and privileges therein headaches and frustrations hitherto and Pizza and Jolt Cola w
254. er Logon Hours Log On To I Unlock account T User must change password at next logon T User cannot change password Password never expires T Store password using reversible encryption xl D Account expires Figure 17 6 os The E Account tab Cancel Ano Help SRi Ce eej ae The following account options are available in the Account Options list box User Must Change Password at Next Logon This option which is selected by default allows you to create a one time only password that can get the user started with the network The first time the user logs on to the network he s asked to change the password User Cannot Change Password Use this option if you don t want to allow users to change their passwords Obviously you can t use this option and the preceding one at the same time Password Never Expires Use this option if you want to bypass the pass word expiration policy for this user so that the user will never have to change her password Store Password using Reversible Encryption This option stores pass words using an encryption scheme that hackers can easily break so you should avoid it like the plague Account is Disabled This option allows you to create an account that you don t yet need As long as the account remains disabled the user can t log on See the section Disabling and Enabling User Accounts later in this chapter to find out how to enable a
255. er Now you have a whole new list of dumb things you can do mistakes that can give your average computer geek a belly laugh because they seem so basic to him Well that s because he s a com puter geek Nobody had to tell him not to fold the floppy disk he was born with an extra gene that gave him an instinctive knowledge of such things Here s a list of some of the most common mistakes made by network novices Avoid these mistakes and you deprive your local computer geek of the plea sure of a good laugh at your expense 380 Part Vil The Part of Tens Skimping on Cable If your network consists of more than a few computers or has computers located in different rooms invest in a professional quality cable installation complete with wall mounted jacks patch panels and high quality network switches It s tempting to cut costs by using cheap switches and by stringing inexpensive cable directly from the hubs to each computer on the network But in the long run that approach actually proves to be more expensive than investing in a good cable installation in the first place Here are just a few of the reasons it pays to do the cabling right in the first place A good cable installation lasts much longer than the computers it ser vices A good cable installation can last 10 or 15 years long after the computers on your network have been placed on display in a computer history museum Installing cable is hard work No one enjo
256. er subject to the restrictions of the account they re authorized under User mode is the default For each network user who needs to access the Samba server you must 1 Create a Linux user account for each user 2 Create a separate Samba user account The Samba user account maps to an existing Linux user account so you must create the Linux user account first To create a Samba user account choose Preferences Samba Users from the Samba Server Configuration window This brings up the Samba Users dialog box as shown in Figure 25 9 You can use this dialog box to add edit or delete users 370 Part VI Beyond Windows Figure 25 9 The Samba Users dialog box lists your Samba users E Figure 25 10 The Create Samba Share dialog box pa ar v Samba Users x C Ate user Edit User Delete User To be useful a file server should offer one or more shares directories that have been designated as publicly accessible via the network Again you use the Samba Server Configuration program to manage your shares To add a share click the Add button in the Samba Server Configuration program s toolbar This brings up the Create Samba Share dialog box as shown in Figure 25 10 You can then Enter the path for the directory you want to share Enter a description for the share 1 Select whether to allow either read only or read write access Click the Access tab if you want to s
257. er Role cscccsccssssssessscssscssseessesseesseesaeesaeeees 263 Managing Your File Server cccsccesessseseeseeseeeeeeceeeeseeaeeaeceeeeeeeeneeeaeeaeens 264 Using the Provision a Shared Folder Wizard cccscseseeee 265 Sharing a folder without the wizard cccecceseseeeeeeeeeseeeeeseeseens 271 Granting permissions eosina NE aE RTE NEE NES 273 Chapter 19 Network Performance Anxiety 5 277 Why Administrators Hate Performance ProblemS eeeseeseeseseesese 277 What Exactly Is a Bottlene k isci scc vstivsczasserveacieesaneestezeonetsavenceccouecventees 278 XIV Networking For Dummies 9th Edition The Five Most Common Network Bottlenecks ccceeseeseeseeteeteeteees 280 The hardware inside your servers cccscceesseeeseeeeseeessneeeseeeeeeees 280 The server s configuration Options c cccscesescsesseeesseesseeesteeees 280 Servers that do t00 MUCH vis scssseiees vecvdsscecsceees esedeteanedsasresaence dees 281 WHE NEtWOrKAMMAS tLUCtULe 335 52 f sseicei veel cscs tees ceabcees da veseeSstaees cet cvaess 282 Malfunctioning COMPONENtS wis 1s c cessscscedescestcecseescecsssteescaeseeecacee 282 Tune Your Network the Compulsive Way ccccescssesseeeeeeeeeeeeeeeeaeens 283 Monitor Network Performance cccccccsssceessecsseeeesseeesseeceeeeseeeessneessnees 284 More Performan e Vip issisetsscecssesvesieesceondadteansesteetdeveesades
258. er is a gizmo that gives your network signals a boost so that the sig nals can travel farther It s kind of like the Gatorade stations in a marathon As the signals travel past the repeater they pick up a cup of Gatorade take a sip splash the rest of it on their heads toss the cup and hop in a cab when they re sure that no one s looking You need a repeater when the total length of a single span of network cable is larger than the maximum allowed for your cable type Cable Maximum Length 10Base2 coaxial 185 meters or 606 feet 10 100BaseT twisted pair 100 meters or 328 feet 100 Partii Building Your Own Network aS Figure 5 7 Using a repeater ESS For coaxial cable the cable lengths given here apply to cable segments not to individual lengths of cable A segment is the entire run of cable from one terminator to another and may include more than one computer In other words if you connect ten computers with 25 foot lengths of thin coaxial cable the total length of the segment is 225 feet Made you look Only nine cables are required to connect ten computers that s why it s not 250 feet For 10BaseT or 100BaseT cable the 100 meter length limit applies to the cable that connects a computer to the hub or the cable that connects hubs to each other when hubs are daisy chained with twisted pair cable In other words you can connect each computer to the hub with no more than 100 meters of cable and you can c
259. erae eaen ase e iioa 132 Multitasking encsi ir ena ER ARA 133 Directory SCIVICES scepsis ara EE EE Er 133 Security Services uses sre nren stdednedeguodecoceadeceaideceaheCetitss 134 Understanding Windows Server 2008 Versions ccscccseecseseesreeseeees 135 Other Server Operating Systems cccsceeseseeeeseeseeseceeceeeeeeeseeaeeseeaeeaes 136 MANNS E E ina spat oes Mextusecs A testes ccs sdoc AE AE 137 Apple Mat OS X Server sincan ra ERCE 137 The Many Ways to Install a Network Operating System 006 137 Full installation versus UPgrade ceeeceeceseeseeeneeeeeeneeeeeeeneennees 137 Installation over the network cescceseeeseeeseeesseeeeseesseeeseeees 138 Automated and remote installations cee eeeeseeseeeseeeneeeneeaes 139 Gathering Y Our Stuff orur n n R E E E ERNES 140 A capable server Computer ccccccsceeescessseeeeseeesseeceseeesseeesseessaees 140 The server Operating SYSTEM ccceesseceseceseeeeseeeseeeessneesseeeeeseeees 141 Other SoftWare shinni s 141 A working Internet connection ss esriisssresrirsoissirseererisssresresssisscei 142 Pr DOO l BLOND SEEI AN E PA A AE E E 142 Table of Contents Making Informed Decisions 0 0 0 0 ceseeseeseesseceeeeeeeeeeeeceeeeeseeeeeeeeeaeeeaeeees 142 Making Final Pr paration Sessien ierni nenia 143 Installing Windows Server 2008 ccccscssesseeseeceeseeseeeceeceeeeeeeseeseeeeaeees 144 Life ALCOR SOUP essorer crs
260. erent 1 Choose Start Control Panel The Control Panel appears 2 Click the System and Security link The System and Security page appears 3 Click the Windows Firewall link The Windows Firewall page appears 4 Click the Turn Windows Firewall On or Off link The page shown in Figure 10 3 appears 5 Click the Turn On Windows Firewall option Note that you can independently turn the firewall on or off for public network that is for your connection to the Internet and for your home or work network that is if you have a network that connects other computers in your home or office I recommend you either turn the firewall on for both or turn it off for both Turn the firewall off if you re using a separate firewall built into the router that connects your Chapter 10 Connecting Your Network to the Internet 9 computer or home or work network to the Internet Turn the firewall on if you don t have a separate firewall GO Window Firewall Custurnize Settings X Seurch Contrat Panel Customize settings for each type of network You cen modify the firewall settings for each type of network location that you use What are network locatinns Home or work private network location settings 3 Tum on Windows Firewall E Block all incoming connections including those in the list of allowed programs J Notify me when Windows Firewall blocks a new program D Tum off Windows Firewall not recommended
261. ers and Other Stuff 83 hubs and switches enable you to connect from 4 to 48 computers or more by using twisted pair cable For more information about the differences between hubs and switches see the section Hubs or switches later in this chapter June s computer Beaver s computer Ward s computer Twisted pair cable In the UTP star arrangement if one cable goes bad only the computer attached to that cable is affected The rest of the network continues to chug along Cable categories Twisted pair cable comes in various grades called categories These cat egories are specified by the ANSI EIA Standard 568 ANSI stands for American National Standards Institute EIA stands for Electronic Industries Association The standards indicate the data capacity or bandwidth of the cable Table 5 1 lists the various categories of twisted pair cable Although higher category cables are more expensive the real cost of install ing Ethernet cabling is the labor required to pull the cables through the walls You should never install anything less than Category 5e cable And if at all possible invest in Category 6 cable to allow for future upgrades to your network To sound like the cool kids say Cat 6 rather than Category 6 S4 Part it Building Your Own Network NING RY Table 5 1 Twisted Pair Cable Categories Category Maximum Data Rate Intended Use 1 1
262. ervers e s e o o amp 204 127 198 19 63 240 76 19 Lease Obtained Sunday June 13 2004 8 28 14 PM Lease Expires Monday June 14 2004 8 28 14 PM pe xl One of the most import functions of the Data Link Layer is to provide a way for packets to be sent safely over the physical media without interference from other nodes attempting to send packets at the same time Ethernet uses a CSMA CD technique to accomplish this Switches are the most commonly used Data Link Layer devices in most networks A switch is similar to a hub but instead of regenerating incoming signals of every port a switch examines the MAC address of every incoming packet to determine which port to send the packet to 398 Part Vil The Part of Tens Layer 3 The Network Layer The Network Layer handles the task of routing network messages from one computer to another The two most popular Layer 3 protocols are IP which is usually paired with TCP and IPX normally paired with SPX for use with Novell and Windows networks One important function of the Network Layer is logical addressing As you know every network device has a physical address called a MAC address which is assigned to the device at the factory When you buy a network inter face card to install in a computer the MAC address of that card is fixed and can t be changed But what if you want to use some other addressing scheme to refer to the compute
263. es to squeeze your data so that you can cram more data onto fewer tapes Compression factors of 2 1 are common so you can usually squeeze 100GB of data onto a tape that would hold only 50GB of data without compression Tape drive manufacturers tend to state the capacity of their drives by using compressed data assuming a 2 1 compression ratio So a 200GB tape has an uncompressed capacity of 100GB Whether you achieve a compression factor of 2 1 depends on the nature of the data you re backing up If your network is used primarily by Office applications and is filled with Word and Excel documents you ll probably get better than 2 1 compression If your network data consists primarily of graphic image files you prob ably won t get much compression Most graphic image file formats are compressed already so they can t be compressed much more by the backup software s compression methods Backup programs also help you keep track of which data has been backed up and which hasn t They also offer options such as incremental or differential backups that can streamline the backup process as I describe in the next section MBER If your network has more than one server invest in good backup software The most popular is Yosemite Backup made by BarracudaWare See www barracudaware com Besides being able to handle multiple servers one of the main advantages of backup software such as Yosemite Backup is that it can properly back
264. eseeseeeeeeeeees 4 Part V Protecting Your Network cscssccssssscsssesssesssssseeseeeseeesnees 5 Part VI Beyond Windows cecceseesesssesecesceseeseeseeseceeeeeeeeeeeeseeaeeatenes 5 Part VI The Part Of Tens iss3 assesses sersvtbonssts oi Gdladveis rE E 5 Icons Used in This Book ccccsccsscssseessecsseesscsseesseessceseeesseessesssessneesseesseses 5 Where to Go frome Her er ssosiiciectes caeasseesaeeeestasenan E TN AEON 6 Part Lets Network cocccccccccccccccccccccccccccccccccccccccccccccecee 7 Chapter 1 Networks Will Not Take Over the World and Other Network Basics ccc cece eee eens 9 What Isa NetWork ssc R E ai 10 Why Bother with a N twork iccisscsssccecetivsczassersenssseeaedssnedeneecteasteeteneeceectenees 12 Sharing MES aeneae raees a E E EEE ETIE EAEE AE 12 Sharin FESOUPCES trr AEAT A 12 SHAVING Programi S sisser E E T E iE 13 Servers ali CEMS heraa o EE A ES 14 Dedicated Servers and Peers isisscssses iscvescescausesacucescastceacesassedetdasectesstedecvacs 15 What Makes aiNetwork TICK scc ec de dcussessbcsseiecevstbescsubdde tekseeibebs ri a 16 It s Not a Personal Computer Anymore cccccseesseeseeeeesseesseeseeeseessees 17 The Network Administrator a jececc sesecsesdecsssevcceesteccesidedvseasceseeieviveniesetecansiess 19 What Have They Got That You Don t Got ccccesceesessseeseeeeesseesseenes 19 Chapter 2 Life on the Network 0 2
265. ess Control Number 2009940275 ISBN 978 0 470 53405 2 Manufactured in the United States of America 100987654321 WILEY About the Author Doug Lowe has written enough computer books to line all the birdcages in California His other books include Networking All in One Desk Reference For Dummies PowerPoint 2007 For Dummies Java All in One Desk Reference For Dummies and Microsoft Word 2007 All in One For Dummies Although Doug has yet to win a Pulitzer Prize he remains cautiously optimis tic He is hopeful that Ken Burns will pick up the film rights to this book and produce a documentary on computer networking for PBS while PBS still has a budget Doug lives in sunny Fresno California where the motto is Turn On the Water with his wife Debbie one of his three daughters Bethany anda couple of crazy dogs Dedication This one is for mom I will miss you so Author s Acknowledgments I d like to thank project editor Nicole Sholly who did a great job of manag ing all the editorial work that was required to put this book together in spite of a short schedule and oft missed deadlines and Amy Fandrei who made the whole project possible I d also like to thank Lee Musick who gave the entire manuscript a thorough technical review tested every line of code and offered many excellent suggestions as well as copy editor Jennifer Riggs who made sure the i s were crossed and the t s were dotted oops reverse that An
266. ess and may assign it to another host Then comes the prob lem You have two hosts with the same address on your network A better way to assign a fixed IP address to a particular host is to create a DHCP reservation A reservation simply indicates that whenever a particular host requests an IP address from the DHCP server the server should provide it the address that you specify in the reservation The host doesn t receive the IP address until the host requests it from the DHCP server but whenever the host does request IP configuration it always receives the same address To create a reservation you associate the IP address that you want assigned to the host with the host s MAC address Accordingly you need to get the MAC address from the host before you create the reservation Usually you can get the MAC address by running the command ipconfig all from acommand prompt If TCP IP has not yet been configured on the computer you can get the MAC address by choosing the System Information command Choose Start All Programs Accessories System Tools System Information If you set up more than one DHCP server be sure to specify the same reserva tions on each server If you forget to repeat a reservation on one of the serv ers that server may assign the address to another host How long to lease One of the most important decisions that you make when you configure a DHCP server is the length of time to specify for the l
267. ess hours such as at night when no one is in the office These jobs tend to slow down the network by hogging the serv er s hard drives Sometimes faulty application programs can degrade performance For example some programs develop a memory leak They use memory but then forget to release the memory after they finish Programs with memory leaks can slowly eat up all the memory on a server until the server runs out and grinds to a halt If you think a program has a memory leak contact the manufacturer of the program to see whether a fix is available 1 Spyware can slow a system to a crawl A common source of performance problems on client computers is spyware those annoying programs that you almost can t help but pick up when you surf the Internet Fortunately you can remove spyware with a variety of free or inexpensive spyware removal tools For more information use Google or another search engine to search for spyware removal Chapter 20 Solving Network Problems In This Chapter Checking the obvious things Fixing computers that have expired Pinpointing the cause of trouble Restarting client and server computers Reviewing network event logs Keeping a record of network woes fe it Networks are prone to breaking They have too many parts Cables Connectors Cards Switches Routers All these parts must be held together in a delicate balance the network equilib rium is all too easy to disturb Even the best designe
268. est desk in charge of the network gt Don t warn anyone in advance or else everyone may mess up their desks intentionally the night before the inspection 238 Part IV Network Management For Dummies Is assertive and willing to irritate people to get the job done A good network administrator should ensure that backups are working before a disk fails and that everyone is following good antivirus practices before a virus wipes out the entire network Knows how to install the software Usually the person who installs the network is also the network administrator This is appropriate because no one understands the network better than the person who designs and installs it Documenting the Network One of the network administrator s main jobs is to keep the network docu mentation up to date I suggest that you keep all important information about your network in a three ring binder Give this binder a clever name such as The Network Binder Here are some items it should include An up to date diagram of the network This diagram can be a detailed floor plan showing the location of each computer or a more abstract and Picasso like depiction Anytime you change the network layout update the diagram Include a detailed description of the change the date that lt P the change was made and the reason for the change Microsoft sells the Visio program which is specially designed for creating network diagrams I highly recommend it
269. et limits on access for example to specific users v Create Samba Share jox Directory Browse Share name Description Basic Permissions Read only Read Write z z R Cancel 2 oK When you create a new share using the Samba Configuration program the share should be immediately visible to network users If not try restarting the Samba server as I describe in the section Starting and stopping Samba in this chapter Chapter 26 Macintosh Networking In This Chapter Hooking up a Macintosh network Using a Macintosh network Mixing Macs and PCs J book dwells on networking Windows based computers as if Microsoft were the only game in town Hah They wish To be politically correct I should at least acknowledge the existence of a different breed of computer the Apple Macintosh This chapter presents what you need to know to hook up a Macintosh net work use a Macintosh network and mix Macintoshes and Windows PCs on the same network This chapter isn t a comprehensive tome on Macintoshes but it s enough to start What Vou Need to Know to Hook Up a Macintosh Network The following sections present some key things you should know about net working Macintosh computers before you start plugging in cables Mac networking protocols Every Macintosh ever built even an original 1984 model includes networking support Of course newer Macintosh computer
270. ete backup of the computer Operating system setup pro grams are almost flawless so the chances of losing data during instal lation are minimal But you still face the chance that something may go wrong 1 If the computer is connected to an Uninterruptible Power Supply UPS that has a serial or USB connection to the computer unplug the serial or USB connection In some cases this control connection can confuse the operating system s Setup program when it tries to determine which devices are attached to the computer Light some votive candles take two Tylenol and put on a pot of coffee 144 Partit Building Your Own Network Installing Windows Server 2008 After you ve planned your installation and prepared the computer you re ready to run the Setup program The following procedure describes the steps that you must follow in order to install Windows Server 2008 on a new com puter that has a bootable DVD drive 1 Insert the distribution CD in the DVD drive and restart the computer After a few moments the Windows Setup Wizard fires up 2 Click Install Now to start the installation The wizard next asks for the product key which is printed on a sticker attached to the CD case 3 Enter the 25 character product key and then click Next Because the key is so long it s easy to make a mistake If Setup com plains that the product key is invalid don t panic Just try again After you input the correct product ke
271. ete files that you saved to the network folder after they re picked up Otherwise the network folder quickly fills up with unnecessary files Create a folder on the network drive specifically intended for holding files en route to other users Name this folder PITSTOP or something similar to suggest its function In many cases it s easier to send files to other network users by e mail than by using a network folder Just send a message to the other network user and attach the file you want to share The advantage of sending a file by e mail is that you don t have to worry about details like where to leave the file on the server and who s responsible for deleting the file Back up your local hard drive If enough drive space is available on the file server you can use it to store backup copies of the files on your hard drive Just copy the files that you want to back up to a shared network folder Obviously if you copy all your data files to the network drive and every body else follows suit it can fill up quickly Check with the network man ager before you start storing backup copies of your files on the server The manager may have already set up a special network drive that s designed just for backups And if you re lucky your network manager may be able to set up an automatic backup schedule for your important data so that you don t have to remember to back it up manually I hope that your network administrator
272. ething to the Printer Again Just Because It Didn t Print the First Time NING RY What do you do if you send something to the printer and nothing happens Right answer Find out why nothing happened and fix it Wrong answer Send it again and see whether it works this time Some users keep sending it over and over again hoping that one of these days it ll take The result is rather embarrassing when someone finally clears the paper jam and then watches 30 copies of the same letter print Or when 30 copies of your document print on a different printer because you had the wrong printer selected Assuming That the Server Is Safely Backed Up Some users make the unfortunate assumption that the network somehow rep resents an efficient and organized bureaucracy worthy of their trust Far from the truth Never assume that the network jocks are doing their jobs backing up the network data every day even if they are Check up on them Conduct Chapter 27 More Than Ten Big Network Mistakes 383 a surprise inspection one day Burst into the computer room wearing white gloves and demand to see the backup tapes Check the tape rotation to make sure that more than one day s worth of backups is available If you re not impressed with your network s backup procedures take it upon yourself to make sure that you never lose any of your data Back up your most valued files to a CD RW drive or a flash drive Connecting to the Internet witho
273. etwork s client computers In particular you have to configure each client s net work interface card so that it works properly and you have to install the right protocols so that the clients can communicate with other computers on the network Fortunately the task of configuring client computers for the network is child s play in Windows For starters Windows automatically recognizes your network interface card when you start your computer All that remains is to make sure that Windows properly installed the network protocols and client software With each version of Windows Microsoft has simplified the process of config uring client network support In this chapter I describe the steps for config uring networking for Windows XP Windows Vista and Windows 7 Configuring Network Connections Windows automatically detects the presence of a network adapter normally you don t have to install device drivers manually for the adapter When Windows detects a network adapter it automatically creates a network con nection and configures it to support basic networking protocols However you may need to change the configuration of a network connection manually I describe the procedures for Windows XP Vista and 7 in the following sections 152 Part it Building Your Own Network Configuring Windows XP network connections The following steps show how to configure your network connection on a Windows XP system 1 Choose Star
274. etwork Management For Dummies Part V Protecting Your Network The 5th Wave By Rich Tennant Oh Arthur is very careful about security on the Web He never goes online in the same room on consecutive days In this part Q of the major annoyances of running a network is keeping the network safe The world is full of crazy people who get their kicks from trying to bring innocent networks like yours to their knees The chapters in this part describe the most important things you can do as a network administrator to keep your network safe You ll read about backing up critical data protecting your network from viruses and other threats and hardening your Internet connection to keep intruders at bay Chapter 22 Backing Up Your Data In This Chapter Understanding the need for backups Working with tape drives and other backup media Understanding the different types of backups Determining how many backups to keep Mastering tape rotation Cleaning the heads Backing up securely f you re the hapless network manager the safety of the data on your network is your responsibility In fact it s your primary responsibility You get paid to lie awake at night worrying about your data Will it be there tomorrow If it s not can you get it back And most importantly if you can t get it back will you be there tomorrow This chapter covers the ins and outs of being a good
275. etwork can access them For example the laser printer attached to Ward s computer in Figure 1 1 is a shared resource which means that anyone on the network can use it Without the network June Wally and the Beaver would have to buy their own laser printers Chapter 1 Networks Will Not Take Over the World and Other Network Basics 13 ar NING RY Hard drives can be shared resources too In fact you must set up a hard drive as a shared resource to share files with other users Suppose that Wally wants to share a file with the Beaver and a shared hard drive has been set up on June s computer All Wally has to do is copy his file to the shared hard drive in June s computer and tell the Beaver where he put it Then when the Beaver gets around to it he can copy the file from June s computer to his own unless of course Eddie Haskell deletes the file first You can share other resources too such as an Internet connection In fact sharing an Internet connection is one of the main reasons many networks are set up Shaving programs Rather than keep separate copies of programs on each person s computer putting programs on a drive that everyone shares is sometimes best For example if ten computer users all use a particular program you can pur chase and install ten copies of the program one for each computer Or you can purchase a ten user license for the program and then install just one copy of the program on a s
276. eusers crg Hells 1 am an Outlook and You Are Feb 8 2007 Thu 2 8 2007 30 AM ae B Yisdmnbdeng com Yosemite Backup Actvity Log for Restore Fie Thu 2 8 2007 9 26 AM i Ge Steghen Geez Fi Plot trading Software Phone conversation on Friday Thu 2 8 2007 6 10 AM ve Yiadmingbct engrcom Yosemite Backup Activity Log for Wednesday Diffe Wed 2 7 2007 11 19 PM sw a inlo neweggcom Auto Notification from Newegg com Wed 2 7 2007 7 53 PH 6w d Las Gonzaler WORD a sti acting funny stap n when you can Wed 2 7 2007 1 19 PM 4a I Frandsco Magos OCF Templates Wed 2 7 2007 12 50 PM Li Corde Quale ARCHIVE PROJECT Wed 2 7 2007 11 40 AM ss Atks Bortner IP address for swatch Wed 2 7 2007 11 05 aM sa D Scottie RE Desabiing Internet Wed 2 7 2007 10 44 AM wes d Adam Fears RE Rado Wed 2 7 2007 20 28 AM s Yi d Lus Gonrsier Never Mag Wed 2 7 2007 10 20 AM 0 Sus Gonse 1 camat open any Word Docs I need help Wed 2 7 2007 20 28 AM se S Youhave 19 remnder s pP Internet Protected Mode On kios Chapter 15 Connecting from Home 23 If you re familiar with Outlook you ll have no trouble using OWA Almost all Outlook s features are available including your Inbox calendar contacts tasks reminders and even public folders You can even set up an Out of Office reply One difference between OWA and Outlook is that there s no menu bar across the top However most of the functions that are available from the menu bar
277. executive with the company sold his old BlackBerry on eBay a few months after he left the firm He had assumed that because he had removed the battery everything on the BlackBerry had been erased The point of this true story is that mobile devices such as BlackBerrys pose anew Set of challenges for network administrators and that even administra tors of small networks are facing these challenges For example just a few years ago only large companies had BlackBerrys or other mobile devices that integrated with Exchange e mail But now it isn t uncommon for compa nies with just a few employees to have mobile devices This chapter is a brief introduction to mobile devices and the operating sys tems they run with an emphasis on Windows Mobile and BlackBerry devices You ll find out more about how these devices can interact with Exchange e mail and the steps you can take to ensure their security The Many Types of Mobile Devices Once upon a time there were mobile phones and PDAs A mobile phone was just that a handheld telephone you could take with you The good ones had nice features such as a call log an address book and perhaps a crude 222 Part Ill Getting Connected game but not much else PDAs Personal Digital Assistants were hand held computers that were designed to replace the old fashioned Day Timer books people used to carry around with them to keep track of their appoint ment calendars and address books
278. explanation usually follows just in case you re scratch ing your head and grunting Huh Whenever I describe a message or information that you see on the screen I present it this way A message from your friendly network Introduction 3 This book rarely directs you elsewhere for information just about every thing that you need to know about networks is right here If you find the need for additional information plenty of other For Dummies books can help If you have a networking question that isn t covered in this book allow me to suggest my own Networking All in One Desk Reference For Dummies 3rd Edition Wiley this much expanded reference book goes deeper into specific network operating systems and TCP IP protocols You can also find plenty of other For Dummies books that cover just about every operating system and application program known to humanity What Vou Don t Need to Read Aside from the topics you can use right away much of this book is skippable I carefully placed extra technical information in self contained sidebars and clearly marked them so that you can steer clear of them Don t read this stuff unless you re really into technical explanations and want to know a little of what s going on behind the scenes Don t worry My feelings won t be hurt if you don t read every word Foolish Assumptions I m making only two assumptions about who you are You re someone who works with a
279. ey won t line up at your door to ask you to print their documents for them Shaving a printer in Windows XP The following procedure shows you how to share a printer in Windows XP 1 From the Start menu choose Printers and Faxes The Printers and Faxes folder appears as shown in Figure 3 8 In this example the Printers folder lists a single printer named HP PSC 750 Printers and Faxes Die Edt View favorites Tools Liep O P ph p gt Folders F Printer Lasks Add a printer gt Set up faxing Other Places Control panel Sy Scanners and Camoras My Documents Gy Mr Pictures 2 Select the printer that you want to share Click the icon for the printer to select the printer 3 Choose File Sharing You re right This command doesn t make sense You re sharing a printer not a file but the Sharing command is on the File menu Go figure When you choose File Sharing the Properties dialog box for the printer appears 4 Select the Share This Printer option 52 Part I Let s Network 5 Optional Change the share name if you don t like the name sug gested by Windows Other computers use the share name to identify the shared printer so choose a meaningful or descriptive name Click OK You return to the Printers folder where a hand is added to the printer icon to show that the printer is now a shared network printer To take your shared printer off the network so tha
280. f the user you want to grant access to and then click OK You re returned to the Permissions for Support dialog box The user you added will be selected in the list of users with access to the mailbox Pid Pagrus Ge AEs wooo Daan binira eects Aachen Cine Hitech bikti tipan Seine fromm a Beda a a ad Ti mabe iH Fima peer ss ore Adios Dearie B Oo m Cika e B oO B oO B 5 Oo Oo T ah cera pi Ful maba ahi Sree mie aoe Chapter 11 Managing E Mail with Exchange 2007 20 Figure 11 8 The Change E mail Account dialog box SEs 5 Select the Allow check box for the Full Mailbox Access option to grant the user full access to the mailbox and then click OK The Mailbox Rights dialog box is dismissed 6 Click OK The user Properties dialog box is dismissed After you ve granted access to the account you can configure the user s Outlook to read the Support account Follow these steps 1 On the user s computer start Outlook and choose Tools Account The Account Settings dialog box is displayed Select your main e mail account and then click Change The Change E mail Account dialog box appears as shown in Figure 11 8 Click the More Settings button and then click the Advanced tab The Advanced tab of the Microsoft Exchange dialog box appears as shown in Figure 11 9 Click the Add button A dialog box appears to prompt you for the name of the mailbox you
281. f you ve ever installed one of these cards you can prob ably install a network interface card blindfolded Q Partl Building Your Own Network Here s the step by step procedure for installing a network interface card 1 Shut down Windows and then turn off the computer and unplug it Rud Never work in your computer s insides with the power on or the power 2D cord plugged in 2 Remove the cover from your computer Figure 5 6 shows the screws that you must typically remove to open the cover Put the screws someplace where they won t wander off Remove these screws EE Figure 5 6 Removing your com puter s cover Ee 3 Find an unused expansion slot inside the computer The expansion slots are lined up in a neat row near the back of the computer you can t miss em e Most newer computers have at least two slots known as PCI slots These are the slots you re looking for to install your network card into e Some computers have other types of slots which are designed for video cards or for older interface cards Your network card won t fit into these other slots so don t try to force it 4 When you find the right type of slot that doesn t have a card in it remove the metal slot protector from the back of the computer s chassis a If a small retaining screw holds the slot protector in place remove the screw and keep it in a safe place b Pul
282. f you choose to use Administrative Setup you can use the Network Installation Wizard which comes with the Office Resource Kit The Network Installation Wizard lets you customize settings for installing Office on client computers For example you can choose which Office components to install provide default answers to yes no questions that Setup asks the user while installing Office and select the amount of interaction you want the Setup program to have with the user while installing Office No matter which option you choose for installing Office on your network you must purchase either a copy of Office or a license to install Office for every computer that uses Office Purchasing a single copy of Office and installing it on more than one computer is illegal Accessing network files Opening a file that resides on a network drive is almost as easy as opening a file on a local drive All Office programs use File Open to summon the Open dialog box as shown in its Excel incarnation in Figure 3 10 The Open dialog box is nearly identical in other Office programs Sse Figure 3 10 The Open dialog box in Excel 2007 ar 55 Chapter 3 More Ways to Use Your Network FX Open A S 4 Search p Gore Douglowe Documents Date modified Type Size Tags E Documents This folder is empty HE Desktop el Recent Places pt Computer EB Pictures R Music Recently Changed B Searches J Pubic Folders a Fle
283. full backup That s a few more disks than most people want to keep in the closet You could use DVDs but you ll need about a dozen of them and it will take an hour or so to fill each one So you ll have to devote a Saturday to creating your backup Because of the limitations of CDs and DVDs most network administrators back up network data to tape Depending on the make and model of the tape drive you can copy as much as 800GB of data onto a single tape One of the benefits of tape backup is that you can run it unattended In fact you can schedule tape backup to run automatically during off hours when no one s using the network In order for unattended backups to work you must ensure that you have enough tape capacity to back up your entire network server s hard drive without having to manually switch tapes If your network server has only 100GB of data you can easily back it up onto a single tape However if you have 1 000GB of data invest in a tape drive that features a magazine changer that can hold several tapes and automatically cycle them in and out of the drive That way you can run your backups unattended Here are some additional thoughts concerning tape backups A popular style of tape backup for small servers is Travan drives Travan drives come in a variety of models with tape capacities ranging from 20GB to 40GB You can purchase a 20GB drive for under 200 For larger networks you can get tape backup units that
284. g Your Own Network NING s ANG ot If you plan on running cables through walls you need these additional tools e A hammer e A keyhole saw This one is useful if you plan on cutting holes through walls to route your cable e A flashlight e A ladder e Someone to hold the ladder e Possibly a fish tape A fish tape is a coiled up length of stiff metal tape To use it you feed the tape into one wall opening and fish it toward the other opening where a partner is ready to grab it when the tape arrives Next your partner attaches the cable to the fish tape and yells something like Let er rip or Bombs away Then you reel in the fish tape and the cable along with it You can find fish tape in the electrical section of most well stocked hardware stores If you plan on routing cable through a concrete subfloor you need to rent a jackhammer and a backhoe and hire someone to hold a yellow flag while you work Better yet find some other route for the cable Pinouts for twisted pair cables Each pair of wires in a twisted pair cable is one of four colors orange green blue or brown The two wires that make up each pair are complementary one is white with a colored stripe the other is colored with a white stripe For example the orange pair has an orange wire with a white stripe the orange wire and a white wire with an orange stripe the white orange wire Likewise the blue pair has a blue wire with a w
285. g to patch the server on Thursday morning you earn points if you tell everyone about the incon venience two days before rather than two minutes before You ll earn even more points if you patch the server Saturday morning Tell your boss you ll take next Thursday morning off to make it up VII Thou Shalt Keep an Adequate Supply of Spare Parts There s no reason that your network should be down for two days just because a cable breaks Always make sure that you have at least a minimal supply of network spare parts on hand As luck would have it Chapter 29 suggests ten things you should keep in your closet 390 Part Vit The Part of Tens VIII Thou Shalt Not Steal Thy Neighbor s Program without a License How would you like it if Inspector Clouseau barged into your office looked over your shoulder as you ran Excel from a network server and asked Do you have a liesaunce A liesaunce you reply puzzled Yes of course a liesaunce that is what I said The law specifically prohibits the playing of a computer program on a network without a proper liesaunce You don t want to get in trouble with Inspector Clouseau do you Then make sure you have the correct licenses for the applications you run on your network IX Thou Shalt Train Thy Users in the Ways of the Network Don t blame the users if they don t know how to use the network It s not their fault If you re the network administrator your
286. gement For Dummies ar SS Figure 17 3 Setting the user s password SSSR 4 Optional Change the Full Name field if you want it to appear differ ently than proposed For example you may want to reverse the first and last names so the last name appears first Type the user logon name This name must be unique within the domain Pick a naming scheme to follow when creating user logon names For example use the first letter of the first name followed by the complete last name the complete first name followed by the first letter of the last name or any other scheme that suits your fancy Click Next The second page of the New Object User Wizard appears as shown in Figure 17 3 New Object User x Grate in LoweWnter pa Users Password e Corin password e IV User must change password at next logon T User cannot change paeeword I Password never expires I Account is disabled ste Tie s 7 Type the password twice You re asked to type the password twice so type it correctly If you don t type it identically in both boxes you re asked to correct your mistake 8 Specify the password options that you want to apply The following password options are available e User Must Change Password at Next Logon e User Cannot Change Password e Password Never Expires e Account is Disabled Chapter 17 Managing Windows User Accounts 2 4 9 For more information about these op
287. gin with a backslash such as System32 dns uses the current folder as its starting point If the current folder happens to be Windows Windows System32 dns and System32 dns refer to the same location In many cases relative and fully qualified domain names are interchangeable because the software that interprets them always interprets relative names in the context of the root domain That s why for example you can type www wiley com without the trailing dot rather than www wiley com to go to the Wiley home page in a Web browser Some applications such as DNS servers may interpret relative names in the context of a domain other than the root 128 Partl Building Your Own Network Working with the Windows DNS Server EEE Figure 6 6 The New Host dialog box SSS The procedure for installing and managing a DNS server depends on the net work operating system you re using This section is specific to working with a DNS server in Windows 2008 Working with BIND in a Linux or Unix environ ment is similar but without the help of a graphical user interface You can install the DNS server on Windows Server 2008 from the Manage Your Server application Choose Start Administrative Tools Manage Your Server Click the Add or Remove a Role link select DNS Server from the list of server roles and then click Next to install the DNS server After you set up a DNS server you can manage the DNS server from the DNS manag
288. gned However new techniques for working with IP addresses have helped to alle viate this problem and a new standard for 128 bit IP addresses known as IPv6 is on the verge of winning acceptance Networks and hosts IP stands for Internet Protocol and its primary purpose is to enable commu nications between networks As a result a 32 bit IP address consists of two parts The network ID or network address Identifies the network on which a host computer can be found The host ID or host address Identifies a specific device on the net work indicated by the network ID Most of the complexity of working with IP addresses has to do with figuring out which part of the complete 32 bit IP address is the network ID and which part is the host ID The original IP specification uses the address classes system to determine which part of the IP address is the network ID and which part is the host ID A newer system known as classless IP addresses is rapidly taking over the address classes system You come to grips with both systems later in this chapter The dotted decimal dance IP addresses are usually represented in a format known as dotted decimal notation In dotted decimal notation each group of eight bits known as an octet is represented by its decimal equivalent For example consider the fol lowing binary IP address 11000000101010001000100000011100 Chapter 6 Dealing with TCP IP 09 The dotted decimal equivalent t
289. guring computer identification 158 162 network connections 152 158 network logon 162 163 overview 151 Windows DHCP client configuring 124 Windows DNS client configuring 129 Windows Firewall 190 192 342 343 Windows Mobile 222 225 Windows Performance Monitor tool 284 285 Windows Resource Kit 303 Windows Server 2008 activating 146 creating accounts 246 249 DHCP server 122 124 DNS server 128 129 IIS Web Server 206 installing 144 145 logged on users finding 293 logging on 146 overview 15 service packs 146 147 testing installation 147 versions 135 136 Windows Setup Wizard 144 Windows Storage Server 260 Windows Update Web site 346 347 Windows user accounts See user accounts Windows Vista Add Printer Wizard 35 36 browsing network 29 computer identification 160 162 connections configuring 156 158 domain name 25 File and Printer Sharing feature 43 44 Firewall settings 190 logging off network 39 mapping network 31 33 offline files 59 Public folder 49 50 sharing folders in 48 49 sharing printer in 52 53 wireless networking 181 182 Windows Web Server 2008 136 Windows XP browsing network 29 computer identification 159 160 configuring connections 152 156 File and Printer Sharing feature 42 43 Firewall settings 190 logging off network 39 Logon dialog box 24 25 mapping network 33 offline files 59 Service Pack 2 192 sharing folders in 46 48 shari
290. h you may want to consider VolP You can take your ATA device with you on the road and use it any where that you can plug into the Internet For example you can go on vacation and take your ATA with you Then you can plug into the Internet and receive or make calls by using your home phone number Of course you don t have to take your ATA with you After all avoiding calls from your in laws may be the reason yov re going on vacation in the first place Because calls are carried over the Internet and not over the public switched telephone network your phone isn t tied to a specific area code In fact VoIP lets you choose any area code you want For example if your small company is located in Fresno you can get a VoIP service with a 415 area code so that your customers will think you re in San Francisco lt P An enterprising small business in Fresno can set up two VolP lines with a 415 area code and a 212 area code Your customers will think that you have offices in San Francisco and New York even though both numbers ring phones in sunny Fresno lt Choosing a local area code saves on phone charges Suppose that your office is in Fresno but nearly all your clients are in San Francisco Setting up a 415 VoIP number lets your clients dial your number as a local call Choosing an area code other than your real area code isn t always just for looks VoIP services have more features in the standard package Features such as
291. hapless network user who doesn t give a whit about optimizing network performance but you want to know what the network is and how to get the most out of it The best thing about this part is that it focuses on how to use a network with out getting into the technical details of setting up a network or maintaining a network server In other words this part is aimed at ordinary network users who have to know how to get along with a network Part Il Building Vour Own Network Uh oh The boss just gave you an ultimatum Get a network up and running by Friday or pack your things The chapters in this section cover everything you need to know to build a network from picking the network operating system to installing the cable Part Ill Getting Connected After you get a basic network up and running the chapters in this part show you how to connect it to the world You find out all about safely connecting your network to the Internet setting up an e mail server dealing with mobile devices and connecting your network to computers at home and on the road Part IV Network Management For Dummies I hope that the job of managing the network doesn t fall on your shoulders but in case it does the chapters in this part can help you out You find out all about backup security performance dusting mopping changing the oil and all the other stuff that network managers have to do Introduction Part V Protecting Your Network
292. hapter 2 of your book during this time Saar Figure 7 2 The Initial Configura tion Tasks page eS Chapter 7 Setting Up a Server When Setup finishes installing drivers it displays the Initial Configuration Tasks page as shown in Figure 7 2 You can use this page to perform additional configuration tasks that are required to make your server usable In particular the Initial Configuration Tasks page provides the following capabilities e Set the Administrator password e Set the time zone e Configure networking e Provide the computer name and domain e Enable automatic updating e Download and install updates e Add additional server roles and features e Enable remote desktop access e Configure the Windows Firewall You ll want to work your way through each of these steps The steps are pretty self explanatory and simple wizards help guide you through each task EY Initial Configuration Tasks ii Perform the following tasks to intialy configure this server B Windows Server Code Name Longhorn T Provide Computer Information A Set the Administrator password Administrator Account Administrator Password Not Set m Set time zone Time Zone GMT 08 00 Pacific Time US Canada ES Configure networking Network Adapters A Provido computer name and Full Computer Name LH 36 domain Workgroup WO 2 Update Ihis Server 2 Fnable automatic updating and Updates feedback Feedback ga
293. hared drive Each of the ten users can then access the program from the shared hard drive In most cases however running a shared copy of a program over the net work is unacceptably slow A more common way of using a network to share programs is to copy the program s installation disks or CDs to a shared net work drive Then you can use that copy to install a separate copy of the pro gram on each user s local hard drive For example Microsoft Office enables you to do this if you purchase a license from Microsoft for each computer on which you install Office The advantage of installing Office from a shared network drive is that you don t have to lug around the installation disks or CDs to each user s com puter And the system administrator can customize the network installa tion so that the software is installed the same way on each user s computer However these benefits are significant only for larger networks If your network has fewer than about ten computers you re probably better off installing the program separately on each computer directly from the installation disks or CDs Remember that purchasing a single user copy of a program and then putting it on a shared network drive so that everyone on the network can access it is illegal If five people use the program you need to either purchase five copies of the program or purchase a network license that specifically allows five or more users 14 Part I
294. hat s similar to the way folders are organized hierarchically on a Windows computer Instead of folders however DNS organizes its names into domains Each domain includes all the names that appear directly beneath it in the DNS hierarchy For example Figure 6 5 shows a small portion of the DNS domain tree At the top of the tree is the root domain which is the anchor point for all domains Directly beneath the root domain are four top level domains named edu com org and gov In reality many more top level domains than this exist in the Internet s root domain In fact at the time I wrote this there were more than 87 million of them Beneath the com domain in Figure 6 5 is another domain named LoweWriter which happens to be my own personal domain Pretty clever eh To completely identify this domain you have to combine it with the name of its parent domain in this case com to create the complete domain name LoweWriter com Notice that the parts of the domain name are separated from each other by periods which are pronounced dot As a result when you read this domain name you should pronounce it LoweWriter dot com 125 126 Partit Building Your Own Network SSS Figure 6 5 DNS names LoweWriter com domain server1 LoweWriter com Beneath the LoweWriter node are four host nodes named doug debbie server1 and printer1 These nodes correspond to three computers and a printe
295. hat the same security precautions you use with your company network are in use with any computer that you let connect to the network via a VPN You must therefore ensure that the computer has at minimum adequate antivirus pro tection in place In most networks the VPN is implemented by the firewall router that con nects the network to the Internet Thus if you plan to provide VPN capability for your network users you should make sure that the router you use to con nect to the Internet has VPN support built in The office network side of the VPN is provided by the firewall router The other side of the VPN the remote computers is provided by software that must be installed on the computers themselves Send a copy of this software home with each user who wants to use the VPN along with detailed instructions on how to install and configure it Either that or you ll have to visit each person s home to install and configure the software yourself I wrote instructions for installing VPN software for a user who has a vacation home in Monterey California Unfortunately the instructions were clear enough that he was able to install the VPN software himself so I didn t have to make a house call Next time I m writing the instructions in Latin After a remote user has used a VPN to connect to your network the user can access any of the network s shared resources For example the user can map network drives and access shared
296. he security of the system because other computers aren t shown packets that aren t meant for them Q4 Parti Building Your Own Network Working with switches You need to know only a few details when working with switches Here they are Installing a switch is usually very simple Just plug in the power cord and then plug in patch cables to connect the network Each port on the switch has an RJ 45 jack and a single LED indicator labeled Link that lights up when a connection is made on the port ay If you plug one end of a cable into the port and the other end into a computer or other network device the Link light should come on If it doesn t something is wrong with the cable the hub or switch port or the device on the other end of the cable Each port may have an LED indicator that flashes to indicate network P activity If you stare at a switch for a while you can find out who uses the net work most by noting which activity indicators flash the most The ports may also have a collision indicator that flashes whenever a Rud packet collision occurs on the port It s perfectly acceptable for the collision indicator to flash now and then but if it flashes a lot you may have a problem with the network e Usually the flashing means that the network is overloaded and should be segmented with a switch to improve performance e In some cases the flashing may be caused by a faulty network node that clogs th
297. he Install button to add the needed protocol A dialog box appears asking whether you want to add a network client protocol or service Click Protocol and then click Add A list of available protocols appears Select the one you want to add and then click OK You may be asked to insert a disk or the Windows CD Make sure that the network client that you want to use appears in the list of network resources For a Windows based network make sure that Client for Microsoft Networks is listed For a NetWare network make sure that Client Service for NetWare appears If your network uses both types of servers you can choose both clients If you have NetWare servers use the NetWare client software that comes with NetWare rather than the client supplied by Microsoft with Windows If the client that you need isn t listed click the Install button to add the client that you need click Client and then click Add Then choose the client that you want to add and click OK The client you selected is added to the network connection s Properties dialog box To remove a network item that you don t need such as File and Printer Sharing for Microsoft Networks select the item and click the Uninstall button For security reasons make it a point to remove any clients protocols or services that you don t need To configure TCP IP settings click Internet Protocol TCP IP and then click Properties to display the TCP IP P
298. he Internet and your network with a single minded task preventing them from getting to us The firewall acts as a security guard between the Internet and your local area 338 Part V Protecting Your Network NING Figure 24 1 A firewall router creates a secure link between a network and the Internet PCS network LAN All network traffic into and out of the LAN must pass through the firewall which prevents unauthorized access to the network Some type of firewall is a must have if your network has a connection to the Internet whether that connection is broadband cable modem or DSL T1 or some other high speed connection Without it sooner or later a hacker will discover your unprotected network and tell his friends about it Within a few hours your network will be toast You can set up a firewall using two basic ways The easiest way is to pur chase a firewall appliance which is basically a self contained router with built in firewall features Most firewall appliances include a Web based inter face that enables you to connect to the firewall from any computer on your network using a browser You can then customize the firewall settings to suit your needs Alternatively you can set up a server computer to function as a firewall com puter The server can run just about any network operating system but most dedicated firewall systems run Linux Whether you use a firewall appliance or a firewall computer the firewall
299. he com puter to use DHCP select the Obtain an IP Address Automatically and Obtain DNS Server Address Automatically options Click OK and you re done Internet Protocol Version 4 TCP IPv4 Properties esl General Akernate Configuration Yuu can yet IP settings assigned oulumatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an TP address automatically Use Ure following IP address Obtain DNS server address automatically Use the Following DNS server addresses Ge Chapter 6 Dealing with TCP IP Using DNS DNS which stands for domain name system is the TCP IP facility that lets you use names rather than numbers to refer to host computers Without DNS you d buy books from 207 171 182 16 rather than from www amazon com you d sell your used furniture at 66 135 192 87 rather than on www ebay com and you d search the Web at 216 239 51 100 rather than at www google com Understanding how DNS works and how to set up a DNS server is crucial to setting up and administering a TCP IP network The rest of this chapter intro duces you to the basics of DNS including how the DNS naming system works and how to set up a DNS server Domains and domain names To provide a unique DNS name for every host computer on the Internet DNS uses a time tested technique divide and conquer DNS uses a hierarchical naming system t
300. he document faster is to replace the slow printer with a faster one Here are some other random thoughts about bottlenecks A computer system always has a bottleneck Suppose that you decide that the bottleneck on your file server is a slow 10 000 RPM SCSI disk drive so you replace it with a fast 15 000 RPM drive Now the hard drive is no longer the bottleneck The drive can process information faster than the controller card to which the disk is connected You didn t really eliminate the bottleneck you just moved it from the hard drive to the disk controller No matter what you do the computer will always have a component that limits the overall performance of the system One way to limit the effect of a bottleneck is to avoid waiting for the bottleneck For example print spooling lets you avoid waiting for a slow printer Although spooling doesn t speed up the printer it frees you to do other work while the printer chugs along Similarly disk caching lets you avoid waiting for a slow hard drive One reason that computer geeks switched from Jolt cola to Snapple is that Snapple bottles have wider necks 280 Part IV Network Management For Dummies The Five Most Common Network Bottlenecks Direct from the home office in sunny Fresno California here are the ten oops five most common network bottlenecks in no particular order The hardware inside your servers Your servers should be powerful computers capable of
301. he network But in most cases you can t access the entire drive Instead you can access only certain folders directories in old MS DOS lingo on the network drives Either way the shared drives or folders are known in Windows terminology as shared folders A shared folder is commonly referred to as a network drive because the shared folder can be accessed as though it were a separate drive complete with its own drive letter Shared folders can be set up with restrictions on how you can use them For example you may be granted full access to some shared folders so that you can copy files to or from them delete files on them or create or remove fold ers on them On other shared folders your access may be limited in certain ways For example you may be able to copy files to or from the shared folder but not delete files edit files or create new folders You may also be asked to enter a password before you can access a protected folder The amount of disk space you re allowed to use on a shared folder may also be limited For more information about file sharing restrictions refer to Chapter 18 In addition to accessing shared folders that reside on other people s comput ers you can designate your computer as a server to enable other network users to access folders that you share To find out how to share folders on your computer with other network users see Chapter 3 Four Good Uses for a Shared Folder After you know which shar
302. he network administrator needs Allow enough time for network administration For a small network mo more than 20 or so computers an hour or two each week is enough time to do the job More time is needed upfront while the network administrator settles into the job and discovers the ins and outs of the network After an initial settling in period network administration for a small office network doesn t take more than an hour or two per week Larger networks take more time Give the position some teeth You need to make sure that everyone knows who the network administrator is and that he has the authority to make decisions about the network such as which access rights each user has which files can and can t be stored on the server and how often backups are done Provide backup The network administrator needs an understudy someone who knows almost as much about the network is eager to make a mark and smiles when the worst network jobs are delegated Supply a job title and a job description The network manager should have some sort of official title such as Network Boss Network Czar Vice President in Charge of Network Operations or Dr Net A badge a personalized pocket protector or a set of Spock ears helps too Here are some suggestions for picking a part time network administrator Make sure that the person you choose Is organized Conduct a surprise office inspection and place the person ane with the neat
303. her engineer 1 The network should be intuitive to the users and shouldn t require any extensive upkeep CSS s networking needs can be met with the simple peer to peer network dia grammed in Figure 4 5 Here s what the network requires A Gigabit network adapter card for the Windows XP computer which is the only computer that doesn t support Gigabit networking A better alternative would be to replace this computer with a newer computer that runs Windows 7 and has built in high speed networking 1 A combination DSL router and 4 port 10 100 1000 Mbps switch The company may outgrow this device when it adds a laptop but if and when that happens another 4 or 8 port switch can be added then The firewall features of the DSL router need to be enabled to protect the network from Internet hackers File and Printer Sharing needs to be activated on Erin s computer and the printer needs to be shared PCS Figure 4 5 The California Sport Surface peer to peer network Chapter 4 Planning Your Network 15 Printer DSL router 10 1000Mbps switch DSL modem The Internet Connecting two networks Creative Course Development Inc Creative Course Development Inc CCD is a small educational publisher located in central California that specializes in integrated math and science curriculums for primary and secondary grades The company publishes a variety of course materials including textbooks puz
304. herever So let it be written so let it be done Official CND Insignia Doug Lowe Chairman International Society of Certified Network Dummies Chapter 2 Life on the Network In This Chapter Using local resources and network resources Playing the name game Logging on to a network Using shared folders Going places with networks Mapping your network drives Using a network printer Logging off the network A fter you hook up your PC to a network it s not an island any more separated from the rest of the world like some kind of isolationist fanatic waving a Don t tread on me flag The network connection changes your PC forever Now your computer is part of a system connected to other computers on the network You have to worry about annoying network details such as using local and shared resources logging on and accessing network drives using network printers logging off and who knows what else Oh bother This chapter brings you up to speed on what living with a computer network is like Unfortunately this chapter gets a little technical at times so you may need your pocket protector Distinguishing between Local Resources and Network Resources In case you don t catch this statement in Chapter 1 one of the most impor tant differences between using an isolated computer and using a network computer lies in the distinction between local resources and network resources Local resources are items su
305. hite stripe the blue wire and a white wire with a blue stripe the white blue wire When you attach a twisted pair cable to a modular connector or jack you must match up the right wires to the right pins It s harder than it sounds you can use any of several different standards to wire the connectors To confuse matters further you can use one of the two popular standard ways of hooking up the wires EIA TIA 568A or EIA TIA 568B also known as AT amp T 258A Both of these wiring schemes are shown in Table 5 2 It doesn t matter which of these wiring schemes you use but pick one and stick with it If you use one wiring standard on one end of a cable and the other standard on the other end the cable doesn t work Chapter 5 Cables Adapters and Other Stuff 89 Table 5 2 Pin Connections for Twisted Pair Cable Pin Function EIA TIA 568A EIA TIA568B AT amp T 258A 1 Transmit White Green White orange wire 2 Transmit Green Orange wire 3 Receive White Orange White green wire 4 Unused Blue Blue wire 5 Unused White Blue White blue wire 6 Receive Orange Green wire 7 Unused White Brown White brown wire 8 Unused Brown Brown wire The 10BaseT and 100BaseT standards use only two of the four pairs connected to Pins 1 2 3 and 6 One pair transmits data the other receives data The only difference between the two wiring standards is which pair transmits and which receives In the EIA TIA 568A standard
306. hysical security m amazed when I walk into the reception area of an accounting firm and see an unattended computer sitting on the receptionist s desk Often the receptionist has logged on to the system and then walked away from the desk leaving the computer unattended Physical security is important for workstations but vital for servers Any good hacker can quickly defeat all but the most paranoid security measures if they can gain physical access to a server To protect the server follow these guidelines Lock the computer room 1 Give the key only to people you trust Keep track of who has the keys Mount the servers on cases or racks that have locks Disable the floppy drive on the server A common hacking technique is to boot the server from a floppy thus bypassing the security features of the network operating system Keep atrained guard dog in the computer room and feed it only enough eMBER to keep it hungry and mad Just kidding There s a big difference between a door with a lock and a locked door Locks are worthless if you don t use them Client computers should be physically secure Instruct users to not leave their computers unattended while they re logged on In high traffic areas such as the receptionist s desk users should secure their computers with the keylock if the computer has one Users should lock their office doors when they leave Chapter 23 Securing Your Network 325 Ni RY
307. ial in permissions 330 differential backups 315 316 digital audio tape DAT 310 digital certificates 135 digital linear tape DLT 310 directories 26 directory database 134 directory services 133 134 disk management NOS 132 133 disk space 281 288 disk striping 281 384 385 DLT digital linear tape 310 DNS Domain Name System 125 129 155 156 DNS Client service 296 DNS management console 128 DNS Manager 214 215 documentation network 238 239 documents accessing 18 dollar sign 263 domain account 159 163 245 246 Domain Name System DNS 125 129 155 156 domain names 23 25 120 125 127 143 domain networks 23 25 domains 125 127 159 162 dotted decimal notation 108 109 down computer state 11 drive letters 31 34 353 Driver tab Properties dialog box 154 drivers 142 DSL Internet connections 186 Dynamic Host Configuration Protocol See DHCP efe Edited Record method Access 58 EIA TIA 568A 88 89 EIA TIA 568B 88 89 802 3 79 83 96 99 101 170 171 See also cable 802 11 standards 170 173 electrical outlet 289 e mail 28 70 303 304 344 346 E Mail Accounts Wizard Outlook 198 199 emergency phone calls 220 encryption 135 232 Enterprise version Windows Server 2008 136 entitlement model 323 error messages 291 ESS Extended Service Set 176 Ethereal program 242 Ethernet 79 83 96 99 101 170 171 See also cable Ethernet Device w
308. icular rate or frequency Figure 9 1 shows two frequencies of radio waves The first is one cycle per second the second is two cycles per second Real radio doesn t operate at a frequency that low but I figured one and two cycles per second is easier to draw than 680 000 cycles per second or 2 4 mil lion cycles per second The measure of a frequency is cycles per second which indicates how many complete cycles the wave makes in one second Duh In honor of Heinrich Hertz who did not invent catsup but rather was the first person to successfully send and receive radio waves it happened in the 1880s cycles per second is usually referred to as hertz abbreviated Hz Thus 1 Hz is one cycle per second Incidentally when the prefix k for kilo or 1 000 M for mega 1 million or G for giga 1 billion is added to the front of Hz the His still capitalized Thus 2 4 MHz not 2 4 Mhz is correct The beauty of radio frequencies is that transmitters can be tuned to broadcast radio waves at a precise frequency Likewise receivers can be tuned to receive radio waves at a precise frequency and ignore waves at other frequencies That s why you can tune the radio in your car to listen to dozens of different radio stations Each station broadcasts at its own frequency Wavelength and antennas A term related to frequency is wavelength Radio waves travel at the speed of light The term wavelength refers to how far the radio signal travels
309. if both values are 1 the result is 0 NOT The NOT operation doesn t compare two values Instead it simply changes the value of a single binary value If the original value is 1 NOT returns Q If the original value is 0 NOT returns 1 Logical operations are applied to binary numbers that have more than one binary digit by applying the operation one bit at a time The easiest way to do this manually is to 1 Line one of the two binary numbers on top of the other 2 Write the result of the operation beneath each binary digit The following example shows how you calculate 10010100 AND 11001101 10010100 AND 11001101 10010100 As you can see the result is 10010100 JOS Partili Building Your Own Network Introducing IP Addresses An IP address is a number that uniquely identifies every host on an IP net work IP addresses operate at the Network layer of the TCP IP protocol stack so they re independent of lower level addresses such as MAC addresses MAC stands for Media Access Control IP addresses are 32 bit binary numbers which means that theoretically a maximum of something in the neighborhood of 4 billion unique host addresses can exist throughout the Internet You d think that d be enough but TCP IP places certain restrictions on how IP addresses are allocated These restrictions severely limit the total number of usable IP addresses and about half of the total available IP addresses have already been assi
310. ight Oh Two Dot Eleventy Something Or Understanding Wireless Standards The most popular standards for wireless networks are the IEEE 802 11 stan dards These essential wireless Ethernet standards use many of the same networking techniques that the cabled Ethernet standards in other words 802 3 use Most notably 802 11 networks use the same CSMA CD technique as cabled Ethernet to recover from network collisions The 802 11 standards address the bottom two layers of the IEEE seven layer model the Physical layer and the Media Access Control MAC layer Note that TCP IP protocols apply to higher layers of the model As a result TCP IP runs just fine on 802 11 networks The original 802 11 standard was adopted in 1997 Two additions to the standard 802 11a and 802 11b were adopted in 1999 The latest and greatest version is 802 11n Table 9 2 summarizes the basic characteristics of the three variants of 802 11 Chapter 9 Wireless Networking NING RY Table 9 2 802 11 Variations Standard Speeds Frequency Typical Range Indoors 802 11a Up to 54 Mbps 5 GHz 150 feet 802 11b Up to 11 Mbps 2 4 GHz 300 feet 802 119 Up to 54 Mbps 2 4 GHz 300 feet 802 11n Up to 144 Mbps 5 GHz gt 300 feet Most wireless networks are now based on the 802 11b or the newer 802 11g standard The new 802 11n standard offers faster speeds and greater range but 802 11n devices are more expensive than 802 11b or 802 11g devices 8
311. ights and privileges thus bypassing the secu rity restrictions that you so carefully set up Don t forget the password for the administrator account If a network user forgets his or her password you can log on as the supervisor and change that user s password If you forget the administrator s password though you re stuck Managing User Security User accounts are the backbone of network security administration Through the use of user accounts you can determine who can access your network as well as what network resources each user can and can t access You can restrict access to the network to just specific computers or to certain hours of the day In addition you can lock out users who no longer need to access your network The following sections describe the basics of setting up user security for your network User accounts Every user who accesses a network must have a user account User accounts allow the network administrator to determine who can access the network and what network resources each user can access In addition the user account can be customized to provide many convenience features for users such as a personalized Start menu or a display of recently used documents Every user account is associated with a username sometimes called a user ID which the user must enter when logging on to the network Each account also has other information associated with it In particular The user s password This a
312. ils of HTTP packets As a result it can examine more than just the source and destination addresses and ports to determine whether the pack ets should be allowed to pass through the firewall In addition application gateways work as proxy servers Simply put a proxy server is a server that sits between a client computer and a real server The proxy server intercepts packets that are intended for the real server and pro cesses them The proxy server can examine the packet and decide to pass it on to the real server or it can reject the packet Or the proxy server may be able to respond to the packet itself without involving the real server at all For example Web proxies often store copies of commonly used Web pages in a local cache When a user requests a Web page from a remote Web server the proxy server intercepts the request and checks to see whether it already has a copy of the page in its cache If so the Web proxy returns the page directly to the user If not the proxy passes the request on to the real server Application gateways are aware of the details of how various types of TCP IP servers handle sequences of TCP IP packets so they can make more intelligent decisions about whether an incoming packet is legitimate or is part of an attack As a result application gateways are more secure than simple packet filtering firewalls which can deal with only one packet at a time The improved security of application gateways however
313. in what it can do In particu lar all its pages must be static their content is fixed For dynamic content which users inter act with you need to set up a Web server 7 Select the services you want to configure for IIS If you want you can study this list and try to anticipate which features you think you ll need Or you can just leave the default options selected You can always return to the Add Roles Wizard to add features you leave out here 8 Click Next The Confirm Installation Selections page appears as shown in Figure 12 4 9 Click Install The features you selected are installed This may take a few minutes so now would be a good time to take a walk When the installation finishes the Installation Results page displays as shown in Figure 12 5 Click Close IIS is now installed and ready to use 10 Chapter 12 Creating an Intranet 2 0 9 Figure 12 4 The Confirm Installation Selections page of the Add Roles Wizard PCs Figure 12 5 The Installation Results page of the Add Roles Wizard Windows automatic updating is not enabled To install the latest updates use Windows Update Control Panel to check for updates 2 10 Part Ill Getting Connected How to Create a Simple Intranet Page Initially IIS is configured with a single Web site called the default Web site You can test that IIS is up and running by opening a browser window on the server and typing
314. indaa 342 The Built In Windows Firewall ce ceceesceseeeseeeeceseeeeeeeeeceeeeeeeeneeeneeeanees 342 Virus Prote CUM ce isise srenti e E R RER 343 Whatisa Virus eieiei rE e e e a a 343 Antivirus PFO Sr AIMS a n A ERN EEN E 344 Saf coMPUtNE aneri teaser a EER e ENE EE Er Aan Enin Aass 345 Patching Things Up ai sccssdesstescssvctsdasaatoccaveansvaacbets sveeseasebeettuasedeosereieaacecevees 346 Part VI Beyond Windows ccccccccscccsecessccsscsssccsccsscssees BOY Chapter 25 Networking with Linux 00eee sees 351 Comparing Linux with WindOWS cccccscssccssseseessceseeesseeseseseceseesseeees 351 Choosing a Linux Distribution cc ecccesseseceseeseeeeeseeseeeeeeeeeeeeeesseeaeeaes 354 Installing Vim Ux ccs ccestessccctesesetedssnceesscatevdsesree dies ER eget NEA ENE 355 KU XVI Networking For Dummies 9th Edition Om Again Off Agai eieren iaiia e otaae See 356 Logging on oris that im i ssesssciess ce tascsencdecscncsecharsccea teased cnsedetecs 356 LO GOIN GOFF sien e A EEEE 358 Shutting doweinst aner oe e EEr eE E r a EENES 358 Using GNOME a ssgssccses sti ccndeacecsesateaxased lasdede tats A a E ES 358 Getting toa Command Shells sisne nssnssirniseo eisses inas 360 Managing User ACCOUNTS sieiserrireriies iate ridere aeea neiti Raia anesini eaaa 360 Network Configuratio Narie EEAS 362 Using the Network Configuration Program ssessssssesesesrereresesese 362 Restarting your NetWork c
315. indow 363 364 etiquette 302 ETLA extended three letter acronym 11 event logs 298 299 Event Viewer 147 298 299 Exchange ActiveSync 223 225 Exchange Advanced tab User Properties dialog box 200 Exchange Features tab User Properties dialog box 224 406 Networking For Dummies 9th Edition Exchange Server 2007 mailboxes 193 197 199 202 Outlook configuring for 197 199 overview 193 User Properties dialog box 194 197 exclusions DHCP 119 120 124 expansion slots computer 98 99 expiration time password 327 Extended Service Set ESS 176 extended three letter acronym ETLA 11 efo F8 key 291 fan computer 289 Fast Ethernet 81 89 90 Federal Communications Commission FCC 169 Fedora 354 File and Printer Sharing feature 42 46 File and Printer Sharing for Microsoft Networks 154 File Locations dialog box 56 57 file server role configuring 263 264 file servers folders sharing without wizard 271 273 overview 69 70 259 260 264 permissions granting 273 275 Provision a Shared Folder Wizard 265 271 File Sharing dialog box 48 49 File Sharing option Network and Sharing Center 43 filenames 353 376 files accessing with Microsoft Office 54 55 deleting 18 locking by file server 70 offline 58 60 permissions 261 262 saving 18 sharing 12 132 133 374 storing in shared folders 27 transferring through shared folders 28 firewall router VPN connection 232 firewalls 132 188
316. indow as shown in Figure 8 9 Notice the section that lists the computer name domain and work group settings 2 Click the Change Settings link If a dialog box appears and asks for your permission to continue click Continue The System Properties dialog box then appears as shown in Figure 8 10 Chapter 8 Configuring Windows XP Vista and 7 Clients 6 gt Control Panel System and Security gt System E s Search Control Panel Control Panel Home os View basic information about your computer Device Manager e Remnte settings Windows edition Windows 7 Ultimate e System protection Copyright 2009 Microsoft Corporation All rights reserved Advanced system settings m System Rating m Your Windows Experience Index needs to be refreshed Processor Intel R Pentium R 4 CPU 3 00GHz 3 00 GHz e Installed memory RAM 2 00 GD 3 System type 32 bit Operating System Figure 8 9 Pen and Touch No Pen or Touch Input is available for this Disp Soe en and Touch jo Pen or Touch Input is available for this Display The System Action Center Computer name domain and workgroup settings information ind Windows Update Computer name WIN7 Change settings window Patama Information and Full computer name WIN Windows 7 n Computer description L p Computer Name Hardware Advanced System Protection Remote g Windows uses the following information to identily your comp
317. ing VoIP and GONVEL GENCE es sesesfvgncsics asestcasea lashes cavtanndasthcecasderthe sa E E E E ERE AR 217 Chapter 14 Dealing with Mobile Devices 0 cccecceesseesseeseceseeseeeseesseeeseeeseeeseesseenss 221 Chapter 15 Connecting from Home cccccecsseesseesseeeeeseessecsseeseeeseesseeeseeeseeeaeesseenss 229 Part IV Network Management For Dummies 233 Chapter 16 Welcome to Network Management ccccccssccseesseesseeseeeseceseeeeenseeees 235 Chapter 17 Managing Windows User Accounts cccesceessseseesseeseeeseeeseeeseeeeesseeees 245 Chapter 18 Managing Network Storage cccccccsscsseessesseeeseeeseeseeeseesseeeseceseeeeesseeeas 259 Chapter 19 Network Performance Anxiety cccccsccsseesscesseeseeseeeseeeseeeseesseeeseesseeees 277 Chapter 20 Solving Network Problems c cccsssescesseeeeeeeeceeeeeseeseeeeeeeeeeeeesseeaeeaes 287 Chapter 21 How to Stay on Top of Your Network and Keep Its Users Off Your Back cceccescsssssseesscessesseessecesecsseesesceseeseeeeeeeseeeseees 301 Part V Protecting Vour Network occcccccccccccccsctcccccccccce 307 Chapter 22 Backing Up Your Data sisisi asat iiris 309 Chapter 23 Securing Your Network csscssscsssssssesssessccsessseesscsssessscsseesseesseesaeenes 321 Chapter 24 Hardening Your Network cccccccccsscssscesseeseeeseceseesseeseeseeeeseeeseeeeesseeees 337 Part VI Beyond Window assesses 349 Chapter 25 Networki
318. ing department to access files in the server s ACCTG directory Permissions can also enable some users to read certain files but not modify or delete them Each network operating system manages permissions in a different way Whatever the details the effect is that you can give permission to each user to access certain files folders or drives in certain ways For example you might grant a user full access to some files but grant read only access to other files Any permissions you specify for a folder apply automatically to any of that folder s subfolders unless you explicitly specify different permissions for the subfolder You can use Windows permissions only for files or folders that are created on drives formatted as NTFS volumes If you insist on using FAT or FAT32 for your Windows shared drives you can t protect individual files or folders on the drives This is one of the main reasons for using NTFS for your Windows servers Group therapy A group account is an account that doesn t represent an individual user Instead it represents a group of users who use the network in a similar way Instead of granting access rights to each of these users individually you can grant the rights to the group and then assign individual users to the group When you assign a user to a group that user inherits the rights specified for the group Chapter 23 Securing Your Network 333 Network rights we want to see The networ
319. inistrative Tools gt Internet Information Services CIS Manager The IIS Manager springs to life as shown in Figure 12 8 3 Right click Sites and then choose Add Web Site The Add Web Site dialog box appears as shown in Figure 12 9 Chapter 12 Creating an Intranet 2 13 Internet Infomation Services TIS Manager go gt LSERVEROI gt Sites gt a 1 Fie View Help amons O O pa oF Sites E Add Web site lo Sy AEN ar ages aa TENN a Set Web Site Defaults lt m Name D Web Site St iip B Default Web Site Defadt Web Site 1 Started 80 http Onine Help Sq R j Figure 12 8 The IIS lal nf FEiteotres vien Ji Content vew Manager k Psar a e Ry internet Infor wwnroot Tidefeutthtm Not htto owewriter Ey 1 59PM 4 Enter a name for the Web site in the Web Site Name text box For example use a name like HR if you ve created an Intranet page for the Human Resources department 5 Click the Browse button browse to the folder you created in Step 1 and then click OK For example browse to C HR Web Site Add Web Site 2 xd Web site name Application pool r Content Directory Physical path E Pass through authentication Connect as ee Type 1P address Port h Husie gt foo Host header a Figure 12 9 Examole www contoso com or marketng contoso com The Add Web Site strtwebstemmedtely dialog box concel_
320. inistrator already Certification doesn t guarantee that you really know how to administer a net work That ability comes from real world experience not from exam crams However certification is important in today s competitive job market So you may want to pursue certification not just to improve your skills but also to improve your r sum Certification is an expensive proposition Its tests can cost several hundred dollars each and depending on your technical skills you may need to buy books to study or enroll in training courses before you take the tests You can pursue two basic types of certification vendor specific and vendor neutral The major networking vendors such as Microsoft Novell and Cisco provide certification programs for their own equipment and software Comp TIA a nonprofit industry trade association provides the best known vendor neutral certification Chapter 17 Managing Windows User Accounts In This Chapter Understanding user accounts Creating user accounts Setting account options Resetting passwords Disabling and enabling accounts Deleting users Working with groups Creating a logon script Fees user who accesses a network must have a user account User accounts let you control who can access the network and who can t In addition user accounts let you specify what network resources each user can use Without user accounts all your resources would be open to anyone
321. ious server roles special shared resources are created to support those roles Don t disturb these special shares unless you know what you re doing Table 18 3 lists some of the more common special shares Table 18 3 Special Shares Share Name Description drives The root directory of a drive ADMINS Used for remote administration of a computer and points to the operating system folder usually C Windows IPCs Used by named pipes a programming feature that lets processes communicate with one another NETLOGON Required for domain controllers to function SYSVOL A required domain controller share PRINTS Used for remote administration of printers FAXS Used by fax clients Some special shares end with a dollar sign These hidden shares aren t vis ible to users However you can still access them by typing the complete share name including the dollar sign when the share is needed For example the special share C is created to allow you to connect to the root directory of the C drive from a network client You wouldn t want your users to see this share would you Of course shares such as C are also protected by privileges so that if an ordinary user finds out that C is the root directory of the server s C drive he still can t access it Configuring the File Server Role To use Windows Server 2003 or 2008 as a file server you must first enable the file server role In Windows Server 2003 you
322. ir ACLs to be inher ited by the objects they contain As a result if you specify permissions for a folder those permissions extend to the files and child folders that appear within it Table 18 1 describes the six types of permissions that can be applied to files and folders on an NTFS volume Table 18 1 File and Folder Permissions Permission Description Full control Grants unrestricted access to the file or folder Modify Grants the right to read the file or folder delete the file or folder change the contents of the file or folder or change the attributes of the file or folder Allows you to create new files or subfolders within the folder Read amp Execute Grants the right to read or execute the file and grants the right to list the contents of the folder or to read or execute any of the files in the folder List Folder Contents Applies only to folders and grants the right to list the con tents of the folder Write Grants the right to change the contents of a file or its attri butes Grants the right to create new files and subfolders within the folder Read Grants the right to read the contents of a file or folder 262 Part IV Network Management For Dummies a The six file and folder permissions are composed of various combina tions of special permissions that grant more detailed access to files or folders Table 18 2 lists the special permissions that apply to each of the six file and folder per
323. ir own user accounts under which to run The following sections describe the characteristics of these accounts The Administrator account The Administrator account is the King of the Network This user account isn t subject to any of the account restrictions to which mere mortal accounts must succumb If you log on as the administrator you can do anything For this reason avoid using the Administrator account for routine tasks Log in as the Administrator only when you really need to Because the Administrator account has unlimited access to your net work it s imperative that you secure it immediately after you install the server When the NOS Setup program asks for a password for the Administrator account start with a good random mix of uppercase and lowercase letters numbers and symbols Don t pick some easy to remember password to get started thinking you ll change it to some thing more cryptic later You ll forget and in the meantime someone will break in and reformat the server s C drive or steal your customer s credit card numbers Chapter 23 Securing Your Network 33 ar 4 The Guest account Another commonly created default account is the Guest account This account is set up with a blank password and if any access rights The Guest account is designed to allow anyone to step up to a computer and log on but after they do it then prevents them from doing anything Sounds like a waste of time to me
324. ir viruses Typically a virus masquerades as a useful or interesting e mail attachment such as instructions on how to make 1 000 000 in your spare time pictures of naked celebrities or a Valentine s Day greeting from your long lost sweetheart When a curious but unsuspecting user double clicks the attachment the virus springs to life copying itself onto the user s computer and in some cases sending copies of itself to all the names in the user s address book After the virus has worked its way onto a networked computer the virus can then figure out how to spread itself to other computers on the network Here are some more tidbits about protecting your network from virus attacks The term virus is often used to refer not only to true virus programs which can replicate themselves but also to any other type of program that s designed to harm your computer These programs include so called Trojan horse programs that usually look like games but are in reality hard drive formatters 1 A worm is similar to a virus but it doesn t actually infect other files Instead it just copies itself onto other computers on a network After a worm has copied itself onto your computer there s no telling what it may do there For example a worm may scan your hard drive for inter esting information such as passwords or credit card numbers and then e mail them to the worm s author Computer virus experts have identified several thou
325. ired two tapes After we removed this data from the cycle of nightly backups the backups could squeeze onto a single tape again 3 4 Part V Protecting Your Network If you remove static data from the nightly backup make sure that you have a secure backup of the static data either on tape CD RW or some other media Copy backups A copy backup is similar to a normal backup except that the archive bit isn t reset when each file is copied As a result copy backups don t disrupt the cycle of normal and incremental or differential backups Copy backups are usually not incorporated into regular scheduled backups Instead you use a copy backup when you want to do an occasional one shot backup For example if you re about to perform an operating system upgrade you should back up the server before proceeding If you do a full backup the archive bits are reset and your regular backups are disrupted However if you do a copy backup the archive bits of any modified files remain unchanged As a result your regular normal and incremental or differ ential backups are unaffected If you don t incorporate incremental or differential backups into your backup routine the difference between a copy backup and a normal backup is moot Daily backups A daily backup backs up just those files that have been changed the same day that the backup is performed A daily backup examines the modification date stored with each file s direc
326. ity for Mobile Devices As a network administrator one of your main responsibilities regarding mobile devices is to keep them secure Unfortunately this is a significant challenge Here are some of the reasons why Mobile devices connect to your network via other networks that are out of your control You can go to great lengths to set up firewalls encryp tion and a host of other security features But mobile devices connect via public networks whose administrators may not be as conscientious as you 1 Mobile devices are easy to lose A user might leave his or her BlackBerry at a restaurant or hotel or it might fall out of his pocket on the subway Chapter 14 Dealing with Mobile Devices 22 7 Mobile devices run operating systems that aren t as security conscious as Windows Users who wouldn t dare install renegade software on their desktop computers will think nothing of downloading free games or ring tones to their handhelds Who knows what kinds of viruses or Trojans these downloads carry Inevitably someone will buy his own handheld device and connect it to your network without your knowledge or permission Here are some recommendations for beefing up security for your mobile devices Establish clear and consistent policies for mobile devices and enforce them 4 Make sure employees understand that they are not allowed to bring their own devices into your network Allow only company owned devices to connect Trai
327. ives in the RAID system fails no data is lost The disk drive that failed can be removed and repaired and the data that was on it can be reconstructed from the other drives Most of this chapter is devoted to showing you how to configure Windows Server 2008 to run as a file server Storage appliances A storage appliance is a device specifically designed for providing shared network storage Also known as NAS or Network Attached Storage it s a self contained file server that s preconfigured and ready to run All you have to do to set it up is take it out of the box plug it in and turn it on Storage appli ances are easy to set up and configure easy to maintain and less expensive than traditional file servers A typical entry level storage appliance is the Dell PowerVault NF500 This self contained file server is built into a small rack mount chassis It supports up to six hard drives with a total capacity of up to six terabytes or 6 000GB The NF500 has a dual processor motherboard that can hold up to 8GB of memory and up to four gigabit network ports The Dell NF500 runs a special version of Windows Server called Windows Storage Server This version of Windows designed specifically for NAS devices allows you to configure the network storage from any computer on the network by using a Web browser Note that some storage appliances use customized versions of Linux rather than Windows Storage Server Also in some systems the
328. job is to provide training so the network users know how to use the network X Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone Network documentation should be written down If you cross the River Jordan who else will know diddly squat about the network if you don t write it down somewhere Write down everything put it in an official binder labeled Network Bible and protect the binder as if it were sacred Your hope should be that 2 000 years from now when archeologists are exploring caves in your area they find your network documentation hidden in a jar and marvel at how meticulously the people of our time recorded their network configurations They ll probably draw ridiculous conclusions such as we offered sacrifices of burnt data packets to a deity named TCP IP and confessed our transgres sions in a ritual known as logging but that makes it all the more fun Chapter 29 Ten Things You Should Keep in Your Closet In This Chapter Duct tape Tools Patch cables Cable ties Twinkies An extra network card A few cheap network switches Complete documentation of the network on tablets of stone The network manuals and disks Ten copies of this book W you first network your office computers you need to find a closet where you can stash some network goodies If you can t find a whole closet shoot for a shelf a drawer or at least a sturdy cardboard box Here s a list of what stuff to keep o
329. k and recording in performance logs the activity it sees You can then review those performance logs to see how your network is doing For large networks you can purchase sophisticated monitoring programs that run on their own dedicated servers For small and medium size net works you can probably use the built in monitoring facilities that come with the network operating system For example Figure 19 1 shows the Performance Monitor tool that comes with Windows Server Other operating systems come with similar tools B Computer Management Action View Help a 5 GG gt So Computer Management Local m Actions System T Resource Overview 4 System Tools a Relisbility and Performance lt Task Scheduler cpu 100 Disk 100 KB Network 5 Kbps Memory 100 Hard ak e Event Viewer More Actions RO Shared Folders B Local Users and Groups Rehabeity and Performs gt Device Manager a E3 Storage jaf Disk Management Seconds _O 9 o fly Services and Applications cpu mio J 100 Maximum Frequency ie Disk mM 2 kosec HB 1 Highest Active Time e Network Mop E 0 Network Utilization amp Memory BB O Hard Faumts sec MB 31 Used Physical Memory gt zl Learn More SH Resource View Help Create a Data Collector Set and Diagnosis Report Performance Monitor Help Monitor System Activity with Performance Monitor Data Collection Help Schedule and Manage
330. k interface card Inside any computer attached to a network is a special electronic circuit card the network interface card The TLA for network interface card is NIC Using your network late into the evening isn t the same as watching NIC at night If the network is set up to use that time to update soft ware and back up data the NIC has to be robust enough to handle all day all night use Although you can also use an external network interface that connects to the computer by using the computer s USB port most networked computers use a built in network interface card Nearly all computers built these days have a network interface built into the computer s motherboard the main circuit board that is home to the computer s processor memory and other vital components This network interface is still commonly called the NIC even though it isn t technically a separate card Network cable The network cable physically connects the computers It plugs into the network interface card on the back of your computer Nearly all networks now use a type of cable that looks something like telephone cable However appearances can be deceiving Most phone systems are wired using a lower grade of cable that doesn t work for net works For a computer network each pair of wires in the cable must be twisted in a certain way That s why this type of cable is called twisted pair cable Standard phone cable doesn t do the twist
331. k rights allowed by most network Set pay Grants you special access to the operating systems are pretty boring Here are payroll system so that you can give yourself a few rights wish would be allowed a pay raise Cheat Provides a special option that Sue In America everyone has the right to enables you to see what cards the other sue So this right should be granted auto players are holding when you re playing matically to all users REINS Fire Wouldn t it be great if the network 1 Spy Eavesdrops on other users Internet could grant you the right to play Donald sessions so you can find out what Web Trump and fire your annoying co workers sites they re viewing Complain Automatically sends e mail mes sages to other users that explain how busy tired or upset you are For example suppose that you create a group named Accounting for the accounting staff and then allow members of the Accounting group access to the network s accounting files and applications Then instead of granting each accounting user access to those files and applications you simply make each accounting user a member of the Accounting group Here are a few additional details about groups Groups are one of the keys to network management nirvana As much as possible avoid managing network users individually Instead clump them into groups and manage the groups When all 50 users in the accounting department need access to a new file share w
332. ke before you proceed any further in building your network is to decide which network operating system NOS to use as the foundation for your network This chapter begins with a description of several important features found in all network operat ing systems Next it provides an overview of the advantages and disadvan tages of the most popular network operating systems Of course your work doesn t end with the selection of an NOS You must then install and configure the operating system to get it working This chap ter provides an overview of what s involved with installing and configuring the most popular network operating system choice Windows Server 2008 Network Operating System Features All network operating systems must provide certain core functions such as connecting to other computers on the network sharing files and other resources and providing for security In the following sections I describe some core NOS features in general terms 132 Part it Building Your Own Network ar Network support It goes without saying that a network operating system should support net works I can picture Mike Myers in his classic Saturday Night Live role as Linda Richman host of Coffee Talk saying I m getting a little verklempt talk amongst yourselves I ll give you a topic Network operating systems do not network nor do they operate Discuss That requires a range of technical capabilities Anetwork
333. l address is baMiller Mydomain com do not use baMiller as the user s account name Use a more obscure name Do not rely on obfuscation to keep people out of your network Security by obfuscation doesn t work A resourceful hacker can discover the most obscure names Obfuscation can s ow intruders not stop them If you slow intruders down you re more likely to discover them before they crack your network Using passwords wisely One of the most important aspects of network security is the use of passwords Usernames aren t usually considered secret Even if you use obscure names even casual hackers will eventually figure them out Passwords on the other hand are top secret Your network password is the one thing that keeps an impostor from logging on to the network by using your username and therefore receiving the same access rights that you ordi narily have Guard your password with your life Here are some tips for creating good passwords 1 Don t use obvious passwords such as your last name your kid s name or your dog s name Don t pick passwords based on your hobbies A friend of mine is a boater and his password is the name of his boat Anyone who knows him can quickly guess his password Five lashes for naming your pass word after your boat NING NING RY 1 Store your password in your head not on paper Especially bad Writing your password down on a sticky note and stick ing it on
334. l analyzer 242 protocols network 66 132 143 154 155 281 292 371 372 Provision a Shared Folder Wizard 265 271 proxy server 342 PTR pointer record 128 Public folder 49 50 public IP address 116 117 public switched telephone network PSTN 218 publishing applications 204 205 Purge Print Documents command 39 PVC cable 85 ede QuickTime Streaming Server 372 Index 409 eRe radio waves 167 169 RAID Redundant Array of Inexpensive Disks system 260 range 171 172 Read amp Execute permission 261 Read permission 261 reader permission level 49 read only files 55 real time data 285 rebooting 293 294 Reconnect at Logon option 32 34 records locking in Access 58 Recycle Bin 381 Redundant Array of Inexpensive Disks RAID system 260 refresh rate Access 58 relative names 127 remote connections Windows Server 2008 remote installation NOS 139 140 Remote Installation Services RIS 140 repeaters 99 101 396 reports scheduling 286 reservations DHCP 119 121 124 Reset button 295 residential gateway 175 resources 21 22 See also sharing Resources tab Properties dialog box 154 restarting 288 297 298 363 365 restoring backups 332 restrictions 26 330 RG 58 cable 82 ring topology 80 RIS Remote Installation Services 140 RJ 45 connectors 89 90 roaming 175 176 252 Role Services page 148 150 root domain 125 root partition 355 rotation tape
335. l have the new share as a folder target NTFS Permissions Share Protocols r SMB Settings Publish the SMB share to a DFS namespace SMB Pennissions Parent folder in namespace DFS Nameepace Publiching Dee Example Domairi Name Folder Review Settings and Create Share Confirmation New folder name OEE Example Name or NewFulder Name Preview of namespace path Figure 18 7 Joining a Distributed File System network ey For more information about creating namespace see Create a Namespace cPevaus Nees Cored _ 2 70 Part IV Network Management For Dummies Figure 18 8 The Review Settings dialog box 9 If you have set up a Distributed File System DFS namespace and want to connect this share to it select the Publish the SMB Share to a DFS Namespace check box DFS is a system that lets you combine two or more separate file shares under a single name Its purpose is to simplify the management of large file server networks so it is typically used only on networks that have a large number of file servers If you ve never heard of DFS until now skip this step 10 Click Next The dialog box as shown in Figure 18 8 appears 11 Verify that all the settings are correct and then click Create The share is created and a final confirmation dialog box is displayed as shown in Figure 18 9 E Provision a Shared Folder Wizard _ 5 x fal Review Sethngs and Cr
336. l out the slot protector c Put the slot protector in a box with all your other old slot ar protectors After a while you collect a whole bunch of slot protectors Keep them as souvenirs or use them as Christmas tree ornaments NING RY Chapter 5 Cables Adapters and Other Stuff 99 5 Insert the network interface card into the slot Line up the connectors on the bottom of the card with the connectors in the expansion slot and then press the card straight down Sometimes you have to press uncomfortably hard to get the card to slide into the slot 6 Secure the network interface card with the screw you remove in Step 4 7 Put the computer s case back together Watch out for the loose cables inside the computer You don t want to pinch them with the case as you slide it back on Secure the case with the screws you remove in Step 2 8 Turn the computer back on If you re using a Plug and Play card with Windows the card is configured automatically after you start the computer again If you re working with an older computer or an older network interface card you may need to run an additional software installation program See the installation instructions that come with the network interface card for details Other Network Devices In addition to network interface cards cables and hubs or switches some networks may require one or more of the devices described in the following sections Repeaters A repeat
337. lder Chapter 26 Macintosh Networking 3 15 Accessing shared files To access files on another Macintosh follow this procedure 1 2 3 7 Choose the Chooser from the Apple menu Click the AppleShare icon from the Chooser window Click the name of the computer you want to access If your network has zones you must first click the zone you want to access Click OK A logon screen appears If you have a user account on the computer click the Registered User button and enter your username and password Otherwise click the Guest button and then click OK A list of shared folders and disks appears Click the folders and disks you want to access A check box appears next to each item If you check this box you con nect to the corresponding folder or disk automatically when you start your computer Click OK i With Mac OS 8 5 and later you can also use the Network Browser found in the Apple menu to access network drives or folders Just open the Network Browser from the Apple menu double click the server that contains the shared disk or folder and then double click the drive or folder you want to use What Vou Need to Know to Network Macintoshes with PCs Life would be too boring if Macs really lived on one side of the tracks and PCs lived on the other If your organization has a mix of both Macs and PCs odds are you eventually want to network them together Fortunately you have several way
338. les even if he does break down the door All modern network operating systems have security features that are more than adequate for all but the most paranoid users When I say more than adequate I mean it Most networks have security features that would make even Maxwell Smart happy Using all these security features is kind of like Smart insisting that the Chief lower the Cone of Silence The Cone of Silence worked so well that Max and the Chief couldn t hear each other Don t make your system so secure that even the good guys can t get their work done 322 Part V Protecting Your Network NING RY If any of the computers on your network are connected to the Internet you must harden your network against intrusion via the Internet For more infor mation see Chapter 24 Also if your network supports wireless devices you have wireless security issues For information about security for wireless net works see Chapter 9 Do Vou Need Security Most small networks are in small businesses or departments where everyone knows and trusts everyone else Folks don t lock up their desks when they take a coffee break and although everyone knows where the petty cash box is money never disappears Network security isn t necessary in an idyllic setting like this one is it You bet it is Here s why any network should be set up with at least some concern for security Even in the friendliest office environment some inf
339. lete may restart your computer If Ctrl Alt Delete doesn t do anything you reached the last resort The only thing left to do is press the Reset button on your computer Pressing the Reset button is a drastic action that you should take only after your computer becomes completely unresponsive Any work you haven t saved to disk is lost Sniff If your computer doesn t have a Reset button turn off the computer wait a few moments and then turn on the computer again If at all possible save your work before restarting your computer Any work you haven t saved is lost Unfortunately if your computer is totally tied up in knots you probably can t save your work In that case you have no choice other than to push your computer off the digital cliff How to Restart Network Services Once in a while the network operating system NOS service which supports the task that s causing you trouble inexplicably stops or gets stuck If users can t access a server it may be because one of the key network services has stopped or is stuck You can review the status of services by using the Services tool as shown in Figure 20 1 To display it choose Services from the Administrative Tools menu Review this list to make sure that all key services are running If a key service is paused or stopped restart it Which service qualifies as a Rey service depends on which roles you defined for the server Table 20 1 lists a few key service
340. lick Advanced This action brings up a dialog box that lets you search for users by name 6 Check the appropriate Allow or Deny check boxes to specify which permissions to allow for the user or group Chapter 18 Managing Network Storage 2 15 ax Select thia object type un Uses Gowns or Ban sccutyomceds Oea ipes Figure 18 14 tromthis oration The Select lwsWiterps Locations Users Enterthe object names to select examples Computers or Groups dialog box e mk coun 7 Repeat Steps 3 6 for any other permissions that you want to add ae 8 When you re done click OK Here are a few other thoughts to ponder concerning adding permissions If you want to grant full access to everyone for this folder don t bother adding another permission Instead select the Everyone group and then check the Allow box for each permission type You can remove a permission by selecting the permission and then clicking Remove 1 If you d rather not fuss with the Share and Storage Management console you can set the permissions from My Computer Right click the shared folder choose Sharing and Security and then click Permissions You can then follow the preceding procedure picking up at Step 4 MBER 1 The permissions assigned in this procedure apply only to the share itself The underlying folder can also have permissions assigned to it If that s the case whichever of the restricti
341. lls you that his brother in law will be attending the meeting so won t you please print an extra copy of the proposal for him Oh and a photocopy won t do Originals only please You decide to take lunch so you don t want the output to print until you get back Fortunately your print job isn t totally beyond your control just because you already sent it to the network printer You can easily change the status of jobs that you already sent You can change the order in which jobs print hold a job so that it doesn t print until you say so or cancel a job You can probably make your network print jobs do other tricks too such as shake hands roll over and play dead But the basic tricks hold cancel and change the print order are enough to get you started To play with the printer queue open the Control Panel choose Start Control Panel and click Printers Then double click the icon for the printer that you want to manage A window similar to the one shown in Figure 2 11 appears You can see that just one document has been sent to the printer Xerox Phaser 6200N on SERVERO1 Printer Document View Document Name Status Owner Pages Size Sul E Important Report Spooling dlowe 4 149 KB 8 3 4 document s in qucuc To manipulate the print jobs that appear in the print queue or in the printer itself use these tricks To temporarily stop a job from printing Select the job and choose Document
342. localhost in the address bar You can also reach this page by entering your local domain name in the address bar For example lowewriter pri Figure 12 6 shows the standard welcome page that appears when you browse to the default site The actual files that make up the default Web site are stored on the server s C drive in a folder named inetpub wwwroot When you browse to the default Web site without requesting a specific file for example by entering simply localhost in the address bar IIS looks for the following files in this order 1 default htm 1 default asp 1 index htm 7 gt a Page internet information services E Figure 12 6 The default Web site Chapter 12 Creating an Intranet 21 1 index html 1 iisstart htm 1 default aspx Initially c inetpub wwwroot contains just two files iisstart htm and welcome png The iisstart htm file is the file that s displayed when you browse to the Web site it contains the HTML markup necessary to display the image contained in the welcome png file which is the image you actu ally see on the page You can preempt the standard page for the default Web site by providing your own file with one of the preceding names For example you can follow these steps to create a simple default htm file that displays the words Hello World as the start page for the default Web site 1 Open an Explorer window and browse to c inetpub w
343. logon scripts creating 258 NOS 1 overview 245 passwords resetting 253 254 properties 246 249 253 Samba 368 369 security 329 330 User Initiated Synchronization 195 User Manager 361 362 User Properties dialog box 193 196 249 253 User Templates folder 56 57 useradd command 361 username 22 25 246 325 326 329 361 users 240 241 301 302 331 332 334 See also user accounts UTP unshielded twisted pair cable 82 84 o o virtual memory 281 virtual private network VPN 135 231 232 viruses 18 189 232 343 347 Visio Microsoft 72 73 238 Voice over Internet Protocol VoIP 217 220 Vonage 218 220 VPN virtual private network 135 231 232 412 Networking For Dummies 9th Edition ee wall jacks 91 92 WAP wireless access point 166 173 179 wavelength 167 168 Web servers 70 205 207 Web sites 210 216 WebObjects 372 WEP wired equivalent privacy 178 Wi Fi 166 Windows See also specific entries beginning with Windows versus Linux 351 353 networking Macs with 375 376 Windows 7 Add Printer Wizard 35 36 browsing network 29 computer identification 160 162 connections configuring 156 158 domain name 25 File and Printer Sharing feature 45 46 Firewall settings 191 192 mapping network 31 33 offline files 59 Public folder 49 50 sharing folders in 48 49 sharing printer in 52 53 wireless networking 181 182 Windows 95 30 31 Windows 98 30 31 Windows clients confi
344. lso includes the password policy such as how often the user has to change his or her password how complicated the password must be and so on 330 Part V Protecting Your Network ar ar The user s contact information This includes full name phone number e mail address mailing address and other related information Account restrictions This includes restrictions that allow the user to log on only during certain times of the day This feature can restrict your users to normal working hours so that they can t sneak in at 2 a m to do unauthorized work This feature also discourages your users from work ing overtime because they can t access the network after hours so use it judiciously You can also specify that the user can log on only at certain computers Account status You can temporarily disable a user account so the user can t log on 1 Home directory This specifies a shared network folder where the user can store documents Dial in permissions These authorize the user to access the network remotely via a dialup connection Group memberships These grant the user certain rights based on groups to which she belongs For more information see the section Group therapy later in this chapter Guilt in accounts Most network operating systems come preconfigured with two built in accounts Administrator and Guest In addition some server services such as Web or database servers create the
345. lthough multiboot installation may sound like a good idea it s fraught y with peril I suggest that you avoid the multiboot option unless you have a specific reason to use it For more information about multiboot setups see the nearby sidebar Giving multiboot the boot You can t upgrade a client version of Windows to a server version Instead you must perform either e A full installation which deletes the existing Windows operating system e A multiboot installation which leaves the existing client Windows intact Either way you can preserve existing data on the Windows computer when you install the server version Installation over the network Normally you install the NOS directly from the distribution discs on the serv er s CD ROM drive However you can also install the operating system from a shared drive located on another computer if the server computer already has access to the network You can either use a shared CD ROM drive or copy the entire contents of the distribution disc onto a shared hard drive Obviously the server computer must have network access for this technique to work If the server already has an operating system installed it probably already has access to the network If not you can boot the computer from a floppy that has basic network support ar Chapter 7 Setting Up a Server 139 Giving multiboot the boot Multiboot installations enable you to have more than one operating
346. lumbing to pick up the phone for a price check Network printing can be like that If someone sends a two hour print job to the printer before you send your half page memo you have to wait Sa Figure 2 8 The Add Printer Wizard comes to life PCS Chapter 2 Life on the Network 35 You may have access to a local printer and several network printers Before you were forced to use the network your computer probably had just one printer attached to it You may want to print some documents on your cheap oops I mean local inkjet printer but use the network laser printer for important stuff To do that you have to find out how to use your programs functions for switching printers Adding a network printer Before you can print to a network printer you have to configure your com puter to access the network printer that you want to use From the Start menu open the Control Panel and then double click the Printers icon If your computer is already configured to work with a network printer an icon for the network printer appears in the Printers folder You can tell a network printer from a local printer by the shape of the printer icon Network printer icons have a pipe attached to the bottom of the printer If you don t have a network printer configured for your computer you can add one by using the Add Printer Wizard Just follow these steps for Windows Vista or Windows 7 1 Choose Start Control Panel and then double click the
347. m you choose to use for your network servers you can use any of several common ways to install the NOS software on the server computer The following sections describe these alternatives Full installation versus upgrade One of your basic NOS installation choices is whether you want to perform a full installation or an upgrade installation In some cases you may be better off performing a full installation even if you re installing the NOS on a com puter that already has an earlier version of the NOS installed Here are your choices 138 Parti Building Your Own Network 1 If you re installing the NOS on a brand new server you re performing a full installation that installs the operating system and configures it with default settings 1 If you re installing the NOS on a server computer that already has a server operating system installed you can perform an upgrade installa tion that replaces the existing operating system with the new one but retains as many of the settings as possible from the existing operating system You can also perform a full installation on a computer that already has an operating system installed In that case you have these two options e Delete the existing operating system e Perform a multiboot installation which installs the new server oper ating system alongside the existing operating system When you restart the computer you can choose which operating system you want to run NING A
348. mands without accidentally deleting or corrupting a needed system file On Again Off Again Any user who accesses a Linux system whether locally or over a network must be authenticated by a valid user account on the system The following sections lay out the whys hows and wherefores of logging on and logging off a Linux system and how to shut down the system Logging on and logging off is the same thing as respectively logging in and logging out Nobody has decided which term should dominate so lots of people still argue about whether they re logging in or MBER et amp Logging on or is that in When Linux boots up it displays a series of startup messages while it starts the various services that comprise a working Linux system Assuming you selected X server when you installed Linux you re eventually greeted by the screen as shown in Figure 25 1 To log on to Linux click your user ID if it is Chapter 25 Networking with Linux 357 D Figure 25 1 Logging in on whatever to Linux pi EN displayed If your user ID isn t displayed click Other and then enter your user ID Then when prompted type your password and press Enter localhost localdomain A Doug Lowe Restart Shut Down As a part of the installation process the Setup Agent created a user account for you Use this user account rather than the root user account whenever possible Use the root acco
349. missions You should assign permissions to groups rather than to individual users Then if a particular user needs access to a particular resource add that user to a group that has permission to use the resource Table 18 2 Special Permissions Special Full Modify Read amp ListFolder Read Write Permission Control Execute Contents Traverse Folder w vw wv 1A Execute File ListFolder Read vy v v o o Data Read Extended w 1A 1 wv yA Attributes Create Files Write vw vw w Data Create Folders wv vw wv Append Data Write Attributes Write Extended Attributes Delete Subfolders vw and Files Delete IN IN YX IN Read Permissions VINX Change Permissions Take Ownership Synchronize Understanding Shares A share is simply a folder that s made available to other users using the net work Each share has the following elements ar Chapter 18 Managing Network Storage 263 1 Share name The name by which the share is known over the network To make the names compatible on older computers stick to eight character share names whenever possible Path The path to the folder on the local computer that s being shared such as C Accounting Description A one line description of the share Permissions A list of users or groups that have been granted access to the share When you install Windows and configure var
350. mited storage space If you copy a 600MB database file to a server s drive you may get calls later from angry co workers complaining that no room is left on the server s drive for their important files Your files can become infected from viruses given to you by some one over the network You may then accidentally infect other network users You have to be careful about saving sensitive files on the server If you write an angry note about your boss and save it on the server s hard drive your boss may find the memo and read it The server computer must be up and running at all times For example if you turn Ward s computer into a server computer Ward can t turn his computer off when he s out of the office If he does you can t access the files stored on his computer If your computer is a server you can t just turn it off when you re fin ished using it Someone else may be accessing a file on your hard drive or printing on your printer Chapter 1 Networks Will Not Take Over the World and Other Network Basics 9 Why does Ward always get the best printer If Leave It to Beaver were made today I d bet that the good printer would be on June s computer The Network Administrator Because so much can go wrong even with a simple network designating one person as the network administrator is important This way someone is responsible for making sure that the network doesn t fall apart or get out of cont
351. mple can hold 2 values Because 2 is 256 an 8 bit number can have any of 256 different values which is why a byte which is eight bits can have 256 different values are Chapter 6 Dealing with TCP IP 0 7 1 This powers of two concept is why computers don t use nice even round numbers in measuring such values as memory or disk space A value of 1K for example isn t an even 1 000 bytes it s 1 024 bytes because 1 024 is 2 Similarly 1MB isn t an even 1 000 000 bytes but rather is 1 048 576 bytes which happens to be 2 Doing the logic thing One of the great things about binary is that it s very efficient at handling spe cial operations called logical operations Four basic logical operations exist although additional operations are derived from the basic four operations Three of the operations AND OR and XOR compare two binary digits bits The fourth NOT works on just a single bit The following list summarizes the basic logical operations 1 AND An AND operation compares two binary values If both values are 1 the result of the AND operation is 1 If one or both of the values are 0 the result is 0 or An OR operation compares two binary values If at least one of the values is 1 the result of the OR operation is 1 If both values are 0 the result is 0 XOR An XOR operation compares two binary values If exactly one of them is 1 the result is 1 If both values are 0 or
352. mputer that s on the other side 1Q2 Part it Building Your Own Network ar This key feature enables bridges to partition a large network into two smaller more efficient networks Bridges work best in networks that are highly seg regated For example your network may consist of two distinct groups of users the Marketing department and the Accounting department each with its own servers A bridge lets you partition this network so that the Marketing side of the net work isn t bogged down by Accounting and vice versa The bridge automati cally learns which computers are on each side of the bridge and forwards messages from the one side to the other only when necessary The overall performance of both networks improves although the performance of any network operation that has to travel over the bridge slows down a bit Here are a few additional thoughts to consider about bridges Some bridges can translate the messages from one format to another For example if the Marketing folks build their network with Ethernet and the accountants use Token Ring a bridge can tie the two together You can get a basic bridge to partition two Ethernet networks for about 500 More sophisticated bridges can cost 5 000 or more Routers A router is like a bridge but with a key difference Bridges use actual hard ware addresses known as MAC addresses to tell which network node each message is sent to so that it can forward the message
353. mputers on your network see the Linux server as if it were a Windows server Like a Windows server Samba works by creating and designating certain directories as shares A share is simply a directory that s made available to other users via the network Each share has the following elements 1 Share name The name by which the share is known over the network Share names should be eight characters whenever possible Path The path to the directory on the Linux computer that s being shared such as Users Doug Description A one line description of the share Access A list of users or groups that have been granted access to the share Samba includes a client program that lets a Linux computer access Windows files servers Why did Samba s developers choose to call their program Samba Simply because the protocol that Windows file and print servers use to communicate with one another is called SMB which stands for Server Message Block Add a couple of vowels to SMB and you get Samba Installing Samba If you didn t install Samba when you installed Linux you have to install it now The easiest way to do that is to use Fedora s GNOME based package management tool to install Samba Just insert the Fedora distribution CD Chapter 25 Networking with Linux 36 7 NING RY in the CD drive and then click Yes when you re asked whether you want to run the autorun program Then when the Package Management window appear
354. n 2 million networks The problem with Class C networks is that they re too small Although few organizations need the tens of thousands of host addresses provided by a Class B address many organizations need more than a few hundred The large discrepancy between Class B networks and Class C networks led to the devel opment of subnetting which I describe in the next section 1 2 Partit Building Your Own Network What about IPv6 Most of the current Internetis based on version 4 of the Internet Protocol also known as Pv4 IPv4 has served the Internet well for more than 20 years However the growth of the Internet has put a lot of pressure on IPv4 s limited 32 bit address space This chapter describes how IPv4 has evolved to make the best possible use of 32 bit addresses but eventually all the addresses will be assigned the IPv4 address space will be filled to capacity When that hap pens the Internet will have to migrate to the next version of IP known as IPv6 IPv6 is also called P next generation or IPng in honor of the favorite television show of most Internet gurus Star Trek The Next Generation IPv6 offers several advantages over Pv4 but the most important is that it uses 128 bits for Internet addresses rather than 32 bits The number of host addresses possible with 128 Subnetting bits is a number so large that it would make Carl Sagan proud It doesn t just double or triple the number of
355. n and use a Linux computer at the same time e Two or more users can log on to a Linux computer from the same keyboard and monitor by using virtual consoles which let you switch from one user session to another with a special key combination e Users can log on to the Linux computer from a terminal window running on another computer on the network Most versions of Windows are single user systems Only one user at a time can log on to a Windows computer and run commands Windows 2003 can be configured as a multiuser system with terminal services Linux doesn t have a built in graphical user interface GUI as Windows does Instead the GUI in Linux is provided by an optional component called X Window System You can run Linux without X Window in which case you interact with Linux by typing commands If you prefer to use a GUI you must install and run X Window X Window is split into two parts e A server component X server manages multiple windows and provides graphics services for application programs e A user interface component window manager provides user inter face features such as menus buttons toolbars and a taskbar Several window managers are available each with a different look and feel With Windows you re stuck with the user interface that Microsoft designed With Linux you can use the user interface of your choosing Linux can t run Windows programs Therefore you can t run Microsoft Office on a
356. n cave iesdeden ce e N iiae einai 146 WOO GING OM cencciedee eee R e S EEE Eea EV EE rS EERE 146 Activating WINdOWSorssscriprnert en ir a teins esir ia aerea SEE SEES 146 Downloading service Packs ecescessesseeeseceeeeeeceseceaeseneeeeeenneesaes 146 Testing the installati n f siccedssiceeddarcessatecsesslocecescavedshidveds ieeseavdeseesvess 147 Configuring Server Roles ccccsccesseseesseseeseeeceeeeeeeeeesesseeeeeseeeeeeeaeeaeeaes 147 Chapter 8 Configuring Windows XP Vista and 7 Clients 151 Configuring Network Connections ccceceseeeeseeeeseeeeeeeeeeeeseeaeeseeneeaes 151 Configuring Windows XP network connections cceseeee 152 Configuring Windows Vista and Windows 7 network CONNECTIONS ecceceeceeseeseeseeceeceeeeesceseeseceeeeeeeneeeseeaeens 156 Configuring Client Computer Identification 0 0 0 eeeeeeseeseeseeteeteeteeees 158 Configuring Windows XP computer identification 6 159 Configuring Windows Vista and Windows 7 computer identification nenni ereere isseire 160 Configuring N etWOrK LOSON niesi ae a a T EEE Er EEEIEE 162 Chapter 9 Wireless Networking 00cceeeeeeees 165 Diving into Wireless Networking cccsceseeseeseeseeseeeeseceeeeseeseeseeseeaeees 165 A Little High School Electronics esssessersorsciresssisresirscrororecrerorosssrsresases 166 Waves and frequencies ic cessceescsdissevecaseseesesecaued esre enn a 167 Wavel
357. n hand Duct Tape Duct tape helped get the crew of Apollo 13 back from their near disastrous moon voyage You won t actually use it much to maintain your network but it serves the symbolic purpose of demonstrating that you realize things sometimes go wrong and you re willing to improvise to get your network up and running If you don t like duct tape a little baling wire and some chewing gum serve the same symbolic purpose 392 PartVil The Part of Tens Tools Make sure that you have at least a basic computer toolkit the kind you can pick up for 15 from just about any office supply store You also should have wire cut ters wire strippers and cable crimpers for assembling RJ 45 connectors Patch Cables ar Keep a good supply of patch cables on hand You ll use them often when you move users around from one office to another when you add computers to your network or when you need to rearrange things at the patch panels assuming you wired your network using patch panels When you buy patch cables buy them in a variety of lengths and colors One good way to quickly make a mess of your patch panels is to use 15 cables when 3 cables will do the job And having a variety of colors can help you sort out a mass of cables The last place you should buy patch cables is from one of those big box office supply or consumer electronics stores Instead get them online Cables that sell for 15 or 20 each at chain stores
358. n used to handle some chores that used to require separate devices Some routers are nothing more than computers with delusions of gran deur along with several network interface cards and special software to perform the router functions 1 Routers can also connect networks that are geographically distant from each other by using a phone line using modems or ISDN One of the main reasons for using routers is to connect a LAN to the Internet Figure 5 8 shows a router used for this purpose SEE Figure 5 8 Using a router to connect a LAN to the Internet es Router 104 Partit Building Your Own Network Chapter 6 Dealing with TCP IP In This Chapter Getting a handle or two on the binary system Digging into IP addresses Finding out how subnetting works Understanding private and public IP addresses Looking at network address translation Finding out how DHCP works Understanding how DNS works ING RY i CP IP is the basic protocol by which computers on a network talk to each other Without TCP IP networks wouldn t work In this chapter I intro duce you to the most important concepts of TCP IP This chapter is far and away the most technical chapter in this book It helps you examine the binary system the details of how IP addresses are con structed how subnetting works and how two of the most important TCP IP services DHCP and DNS work Y
359. n your users in the security risks associated with using mobile devices Implement antivirus protection for your mobile devices 228 Part Ill Getting Connected Chapter 15 Connecting from Home In This Chapter Accessing your e mail with Outlook Web Access Using a virtual private network A typical computer user takes work home to work on in the evening or over the weekend and bring back to the office the following weekday This arrangement can work okay except that exchanging information between your home computer and your office computer isn t easy One way to exchange files is to mark them for offline access as described in Chapter 3 However this approach has its drawbacks What if someone goes to the office on Saturday and modifies the same file you re working on at home What if you get home and discover that the file you need is on a folder you didn t mark for offline access What about e mail Offline access doesn t give you access to your company e mail account so you can t check whether you have mail in your Inbox or send mail from your company e mail account This chapter introduces two features that can alleviate these problems The first is Internet based access to your e mail via Outlook Web Access OWA in Microsoft Exchange The second is the virtual private network VPN which lets you connect to your network from home as though you were at work so that you can safely access all your network resou
360. name and your computer has a computer name You can log on to the network by using your username from any com puter that s attached to the network Other users can log on at your computer by using their own usernames When others log on at your computer by using their own usernames they can t access any of your network files that are protected by your password However they can access any local files that you haven t pro tected Be careful which people you allow to use your computer If you re logging on to a domain network the Windows XP Logon dialog box has a field in which you can enter the domain name you want to log Chapter 2 Life on the Network 25 on to Normally a suitable default value appears for the domain name so you can safely ignore this field If not your network administrator will be happy to tell you how to enter this information 1 Windows Vista and Windows 7 don t include a field in which you can enter the domain name Instead you must type the domain name before your username separated from it by a backslash For example lowewriter dlowe Here the domain name is lowewriter and the username is dlowe Note that Windows Vista and Windows 7 remember the domain and username from your last login so all you have to enter is your pass word To log on to a different domain or as a different user you must click Switch User Then you can click the Other User icon and enter a different domain name a
361. names For example a network server may have two printers named laser and inkjet to indicate the type of printer and two shared disk folders named AccountingData and MarketingData Server based networks have a username for the network administrator If you log on using the administrator s username you can do anything you want add new users define new network resources change Wally s password anything The administrator s username is usually some thing clever such as Administrator The network itself has a name The Windows world has two basic types of networks e Domain networks are the norm for large corporate environments that have dedicated servers with IT staff to maintain them e Workgroup networks are more common in homes or in small offices that don t have dedicated servers or IT staff A domain network is known by you guessed it a domain name And a workgroup network is identified by drum roll please a workgroup name Regardless of which type of network you use you need to know this name to gain access to the network 2 4 Part I Let s Network Logging On to the Network ar To use network resources you must connect your computer to the network and you must go through the supersecret process of logging on The purpose of logging on is to let the network know who you are so that it can decide whether you re one of the good guys Logging on is a little bit like cashing a ch
362. ncere but also resourceful Groan Sorry this is yet another in a tireless series of bad computer nerd puns What s in a Name Just about everything on a computer network has a name The computers themselves have names the people that use the computers have names the hard drives and printers that can be shared on the network have names and the network itself has a name Knowing all the names used on your network isn t essential but you do need to know some of them Here are some additional details about network names Every person who can use the network has a username sometimes called a user ID You need to know your username to log on to the net work You also need to know the usernames of your buddies especially if you want to steal their files or send them nasty notes You can find more information about usernames and logging on in the section Logging On to the Network later in this chapter Letting folks on the network use their first names as their usernames is tempting but not a good idea Even in a small office you eventually run into a conflict And what about Mrs McCave made famous by Dr Seuss who had 23 children and named them all Dave ar MBER D ar SMEER Re Chapter 2 Life on the Network Create a consistent way of creating usernames For example you may use your first name plus the first two letters of your last name Then Wally s username is wallycl and Beaver s is b
363. nd that requirement annoying just be thankful that you don t have to restart the entire computer Simply restarting the network services is sufficient You can restart the network services from a GNOME desktop Follow these steps 1 From the desktop choose Main Menu System Settings Server Settings Services The Service Configuration window appears as shown in Figure 25 7 364 Parti Beyond Windows Figure 25 6 The Ethernet Device window is where you configure basic TCP IP settings Figure 25 7 The Service Configur ation window pe Ethernet Device Boute H Nickname D Controlled by NetworkManager O Activate device when computer starts O Allow all users to enable and disable the device O Enable IPv6 configuration for this interface Automatically obtain IP address settings with dhcp DHCP Settings Hostname optional a M Automatically obtain DNS information from provider D Statically set IP addresses O set MTU fo 1500 2 Applications Places system o Service Configuration Program service Help ie Disable Customize Stop Restart Help Name Remarks The NetworkManager service is started once usually when the system is booted runs in the background and wakes up when needed This service is enabled d NetworkManager start and stop Netwo anacron run left over cron jobs ma atd Starts stop the at de lt l
364. nd username along with the password for the user you want to log on as Your computer may be set up so that it logs you on automatically when ever you turn it on In that case you don t have to type your username and password This setup makes the task of logging on more convenient but takes the sport out of it And it s a terrible idea if you re the least bit worried about bad guys getting into your network or personal files Y Guard your password with your life I d tell you mine but then I d have to shoot you E j Figure 2 1 You have to enter your user ID and Switch User password to access the network i Windows 7 Ultimate 2 6 Part I Let s Network Understanding Shared Folders ar Long ago in the days Before Network B N your computer probably had just one hard drive known as C drive Maybe it had two C and D The second drive might be another hard disk or possibly a CD ROM or DVD ROM drive Even to this day the descendants of those drives are physically located inside your PC They re your local drives Now that you re on a network however you probably have access to drives that aren t located inside your PC but are located instead in one of the other computers on the network These network drives can be located on a dedi cated server computer or in the case of a peer to peer network on another client computer In some cases you can access an entire network drive over t
365. ndows creates a separate network profile for cach network you use You can choose specific options for each profile Home vr Work v Public v Domain current profile A 1 Network discovery When network discovery is on this computer can see other network computers and devices and is visible to other network computers What s network discovery Tum on network discovery Tum off network discovery File and printer sharing When file and printer sharing is on files and printers that you have shared from this computer can be accessed by people on the network Turn on file end printer sharing Turn off file and printer sharing Public folder shanng When Public folder shanng ts on people on the network including homegroup members can arr ess Giles in the Publir folders What are the Disblir frstrlers Cancel 4 6 Part I Let s Network 3 Select the Turn On File and Printer Sharing option 4 Click Save Changes This action saves your changes and closes the Advanced Sharing Settings page Sharing a Folder To enable other network users to access files that reside on your hard drive you must designate a folder on the drive as a shared folder Note that you can also share an entire drive if you so desire If you share an entire drive other network users can access all the files and folders on the drive If you share a folder network users can access only those files that reside in the folder you share If
366. ndows displays a pop up reminder in the notification area in the right corner of the taskbar Just click this bubble to start the Activation Wizard Downloading service packs Service packs are maintenance updates to an operating system that con tain minor enhancements and bug fixes Most of the fixes in a service pack address security problems that have been discovered since the operating system was first released The usual way to get service packs is by download ing them from the operating system vendor s Web site Depending on the operating system version you installed you may or may not need to apply a service pack immediately after installing the operating Chapter 7 Setting Up a Server 14 7 system The Windows Server 2008 Setup program automatically checks for updates before it installs the operating system so you shouldn t normally have to install a service pack after running Setup However you may need to do so with other operating systems Unfortunately applying service packs is something you have to do through out the life of the server Microsoft and other operating system vendors periodically release new service packs to correct problems as they arise Testing the installation After Setup finishes check to make sure that your server is up and running Here are some simple checks you can perform to make sure that your server has been installed properly Check the Event Viewer to see whether it contains any err
367. network folders and can also use network printers And she can use Outlook to access her e mail Part IV Network Management For Dummies The 5th Wave By Rich Tennant RNS FWY We found where the security breach in the WLAN was originating It was coming in through another rogue robot vac This is the third one this month Must have gotten away from its owner like all the rest In this part ou discover that there s more to networking than installing the hardware and software After you get your network up and running you have to keep it up and running That s called network management The chapters in this part show you how to set up your network s security system improve your network s per formance and protect your network from disaster At times things may get a bit technical but no one said that life is easy Chapter 16 Welcome to Network Management In This Chapter Exploring the many jobs of the network administrator Documenting the network Dusting vacuuming and mopping Managing network users Choosing the right tools Building your library Getting certified He wanted Network administrator to help small business get control of a network run amok Must have sound organizational and management skills Only moderate computer experience required Part time only Does this sound like an ad that your company should run Every network needs a network administrator whether the ne
368. network life all users are created equal but some users are more equal than others The Preamble to the Declaration of Network Independence contains the statement We hold these truths to be self evident that some users are endowed by the network administrator with certain inalienable rights The rights that you can assign to network users depend on which network operating system you use These are some of the possible user rights for Windows servers Log on locally The user can log on to the server computer directly from the server s keyboard Change system time The user can change the time and date registered by the server 332 Part V Protecting Your Network ar Shut down the system The user can perform an orderly shutdown of the server Back up files and directories The user can perform a backup of files and directories on the server Restore files and directories The user can restore backed up files Take ownership of files and other objects The user can take over files and other network resources that belong to other users NetWare has a similar set of user rights Permissions who gets what User rights control what a user can do on a network wide basis Permissions enable you to fine tune your network security by controlling access to spe cific network resources such as files or printers for individual users or groups For example you can set up permissions to allow users into the account
369. nformation To join a domain select the Domain radio button and type the domain name into the appropriate text box To join a workgroup select the Workgroup radio button and type the workgroup name in the corre sponding text box 5 Click OK 6 If you re prompted enter the username and password for an Administrator account JOQ Partit Building Your Own Network You re asked to provide this information only if a computer account hasn t already been created for the client computer 7 When a dialog box appears informing you that you need to restart the computer click OK and then restart the computer You re done Computer Name Changes we You can change the name and the membership of this computer Changes may affect access to network resources Computer name DOUGES10 Full computer name DOUGES510 office Jowewriter com ees Figure 8 8 The Member of Domain omputer C P office lowewriter com Name Changes O Workgroup dialog box Windows XP Configuring Windows Vista and Windows 7 computer identification The procedure for changing the computer identification is the same in both Windows Vista and Windows 7 The figures in this section are taken from a Windows 7 system but the screens in Windows Vista are almost identical Here are the steps 1 Choose the Start button and then right click Computer and choose Properties This step displays the System information w
370. ng Your Network to the Internet In This Chapter Looking at DSL and cable Examining T1 and T3 connections Using a router Securing your connection with a firewall Using the firewall that comes with Windows Ss you decided to connect your network to the Internet All you have to do is run to the local computer discount store buy a cable modem and plug it in right Wrong Unfortunately connecting to the Internet involves more than just installing a modem For starters you have to make sure that a modem is the right way to connect other methods are faster but more expensive Then you have to select and configure the software you use to access the Internet Finally you have to lie awake at night worrying whether hackers are breaking into your network via its Internet connection Connecting to the Internet Connecting to the Internet isn t free For starters you have to purchase the computer equipment necessary to make the connection Then you have to obtain a connection from an Internet Service Provider or ISP The ISP charges you a monthly fee that depends on the speed and capacity of the connection The following sections describe the most commonly used methods of con necting network users to the Internet 86 Part Ill Getting Connected Connecting with cable or DSL For small and home offices the two most popular methods of connecting to the Internet are cable and DSL Cable and DSL connections are often called broa
371. ng a firewall A firewall is a security conscious router that sits between the Internet and your network with a single minded task preventing them from getting to us The firewall acts as a security guard between the Internet and your LAN All network traffic into and out of the LAN must pass through the firewall which prevents unauthorized access to the network Some type of firewall is a must have if your network has a connection to the Internet whether that connection is broadband cable modem or DSL T1 or some other high speed connection Without it sooner or later a hacker will discover your unprotected network and tell his friends about it and within a few hours your network will be toast You can set up a firewall in two basic ways Firewall appliance The easiest way It s basically a self contained router with built in firewall features Most firewall appliances include Web based interfaces that enable you to connect to the firewall from any computer on your network by using a browser You can then customize the firewall settings to suit your needs 1 Server computer Can be set up to function as a firewall computer The server can run just about any network operating system but most dedicated firewall systems run Linux Chapter 10 Connecting Your Network to the Internet 89 Figure 10 1 A firewall router creates a secure link between a network and the Internet rj Whether you use a firewall appliance
372. ng cabled network For example you may work at an office with 15 computers all cabled up nicely and you just want to add a couple of wireless notebook computers to the network Or suppose that you have two computers in your den connected to each other with net work cable but you want to link up a computer in your bedroom without pull ing cable through the attic That s where a wireless access point or WAP comes in A WAP performs two functions The WAP acts as a central connection point for all your computers Ra that have wireless network adapters lt In effect the WAP performs essentially the same function that a hub or switch performs for a wired network 1 74 Partit Building Your Own Network ar a Figure 9 3 A wireless access point connects a wireless network to a cabled network The WAP links your wireless network to your existing wired network so that your wired computer and your wireless computers get along like one big happy family Sounds like the makings of a Dr Seuss story Now the wireless sneetches had hubs without wires But the twisted pair sneetches had cables to thires Wireless access points are sometimes just called access points or APs An access point is a box that has an antenna or often a pair of antennae and an RJ 45 Ethernet port You just plug the access point into a network cable and then plug the other end of the cable into a hub or switch and your wireless
373. ng printer in 51 52 wireless networking 179 181 wire cutters 87 wire stripper 87 wired equivalent privacy WEP 178 wireless access point WAP 166 173 179 wireless bridging 176 wireless local area network WLAN 166 wireless networking adapters 172 173 antennas 167 168 FCC 169 frequencies 167 overview 10 165 166 radio waves 167 range 171 172 roaming 175 176 spectrums 169 Index 4 13 standards 170 171 wavelength 167 168 Windows Vista or Windows 7 181 182 Windows XP configuring for 179 181 wireless access points 173 179 wiring schemes 88 89 WLAN wireless local area network 166 Word Options dialog box 56 workgroup networks 23 159 162 workgroup templates 55 57 Workstation service 296 worms 344 Write permission 261 eXe X Window System 352 X 400 standard 196 197 XOR operation 107 eV e Yosemite Backup BarracudaWare 311 4 14 Networking For Dummies 9th Edition Computers Networking General Need to build a network or use one No idea where to start Start here Open the book and find So you want to use a network or worse someone wants you to set up one Here s just what you need to know in a language you can understand even if you don t own a pocket protector Find out what a network is how to take advantage of what it offers what you need to build and manage one and how to keep your network and the stuff on it safe e Just the facts for
374. ng set of steps starting at Step 3 Assigning a drive letter to a network drive is called mapping the drive or linking the drive by network nerds Drive H is mapped to a network drive they say Network drive letters don t have to be assigned the same way for every computer on the network For example a network drive that s assigned drive letter H on your computer may be assigned drive letter Q on someone else s computer In that case your drive H and the other computer s drive Q refer to the same data This arrangement can be confusing If your network is set up this way put pepper in your network administrator s coffee 3 4 Part I Let s Network Accessing a shared network folder through a mapped network drive is much faster than accessing the same folder by browsing the net work That s because Windows has to browse the entire network to list all available computers whenever you browse the network In contrast Windows doesn t have to browse the network to access a mapped net work drive If you select the Reconnect at Logon option for a mapped drive you receive a warning message if the drive isn t available when you log on In most cases the problem is that the server computer isn t turned on Sometimes however this message is caused by a broken network connection For more information about fixing network problems such as this one refer to Chapter 20 Using a Network Printer Using a network prin
375. ng with LinuX s ssessessesoesoesessossessessessessessessessesoessesoeseesessesse 351 Chapter 26 Macintosh Networking s src niisiis 371 Part VII The Part of Tens cccccccccccccsccscccsscctccccseccscece 377 Chapter 27 More Than Ten Big Network Mistakes ccccsccssessessteesseesseeseesseeees 379 Chapter 28 Ten Networking Commandments ccccsccssscsseesseesseeseeeseeeseeeeesseeess 387 Chapter 29 Ten Things You Should Keep in Your Closet ccccssesseeseeseeeseeees 391 Chapter 30 Layers of the OSI Model c csccsssssssssssessecssecsscesscessessecsssesseesseesaeenes 395 ndeg x csccissitessiacucwsstssAdsseaateccastesuebatsieuceascuosesddasearcersnacclO Table of Contents ntroduction ccccccccccccccccccccccccccccccccccccccccccececccccccccccececee i About This BOOK osni cestiss siooeesteceoss ie RRE EE ER 1 How to Use This BOOK iseinean tanar an E T 2 What You Don t N d to Redd urnsas onssas E E 3 Foolish AssS UMmPtioNS oshere eeaeee rrer E A E E TEETE ETNE EEEE 3 How This Book Is Organized cccsscssscsssesscessesssesscesceeseeesseensessnesssesseeees 3 Part I Let s Network ic ciscesesescesdelisecivecsvis secvanesuisssccasuaeaes n 4 Part II Building Your Own Network c ccccccesscseesseesseeseeeeeeseensees 4 Part III Getting Connected cccssssccsscesseessessscsssesseessessaeeseeeseeessees 4 Part IV Network Management For Dummies esc
376. nge 3 White Orange White green 4 Blue Blue 5 White Blue White blue 6 Orange Green 7 White Brown White brown 8 Brown Brown Wall jacks and patch panels If you want you can run a single length of cable from a network hub or switch in a wiring closet through a hole in the wall up the wall to the space above the ceiling through the ceiling space to the wall in an office down the wall through a hole and all the way to a desktop computer That s not a good idea For example every time someone moves the computer or even cleans J2 Part Il Building Your Own Network rey Figure 5 4 Using wall jacks and patch panels ar behind it the cable will get moved a little bit Eventually the connection will fail and the RJ 45 plug will have to be replaced Then the cables in the wiring closet will quickly become a tangled mess The alternative is to put a wall jack in the wall at the user s end of the cable and connect the other end of the cable to a patch panel Then the cable itself is completely contained within the walls and ceiling spaces To connect a computer to the network you plug one end of a patch cable properly called a station cable into the wall jack and plug the other end into the computer s network interface In the wiring closet you use a patch cable to connect the wall jack to the network hubs or switches Figure 5 4 shows how this arrange ment works Patch panel E
377. nmbd daemons are running To configure Samba to start automatically when you start Linux use this command chkconfig level 35 smb on 368 Part VI Beyond Windows To make sure the chkconfig command worked right enter this command chkconfig list smb You should see output similar to the following Smb QSO Leowe Agorc Jsem AJO Seon OLORE Services can be independently configured to start automatically for each of the six boot levels of Linux Boot level 3 is normal operation without an X server level 5 is normal operation with an X server Thus setting smb to start for levels 3 and 5 makes smb available whether or not you re using a graphical user interface You can also start and stop Samba with the Service Configuration tool as shown in Figure 25 6 Scroll down the list of services until you find the smb service You can use the three buttons in the toolbar at the top of the window to start stop or restart a service Using the Samba Server Configuration tool Fedora includes a handy GNOME based configuration tool that simplifies the task of configuring Samba To start it go to the desktop and choose Main Menu System Settings Server Settings Samba Server When you do the Samba Server Configuration window appears as shown in Figure 25 8 This tool lets you configure basic server settings and manage shares To make your Samba server visible on the network choose Preferences Server Settings This brings up a dialog
378. nt to log out Click OK In a command shell you can log out in three ways Enter the logout command 1 Enter the exit command Press Ctrl D Shutting down Like any operating system you shouldn t turn off the power to a Linux server without shutting down the system There are three ways to shut down Linux Press Ctrl Alt Delete 1 From GNOME click the main menu and choose Log Out When the con firmation dialog box appears select Shut Down or Restart and then click OK vy From a command shell enter the halt command Using GNOME Although you can do all your Linux configuration chores from the command line Fedora includes a number of GNOME based configuration tools for many configuration tasks Although you can do most of your Linux configuration from GNOME you do need to use a command line once in a while Figure 25 2 shows a typical GNOME desktop with the Text Editor applica tion open As you can see the GNOME desktop looks a lot like Microsoft Windows In fact many of the basic skills for working with Windows such Chapter 25 Networking with Linux 359 as moving or resizing windows minimizing or maximizing windows and using drag and drop to move items between windows work almost exactly the same in GNOME So you should feel right at home The following list describes some key features of the GNOME desktop On the desktop itself you ll find several icons that let you access common features Th
379. ntarmation 5 29 2005 10 35 78 Service Ce D Information 5 79 2003 10 35 78 Service Ci A warning 5 29 2005 10 36 03 LeaSrv D Information 5 29 2005 10 36 35 Service Ce Figure 20 2 Dinformation 5 29 2005 10 36 36 Service Ci 5 29 2005 10 39 21 W3SVC Event Viewer ee Document Vour Trials and Tribulations For a large network consider investing in problem management software that tracks each problem through the entire process of troubleshooting from ini tial report to final resolution For small and medium size networks compiling preprinted forms in a three ring binder is probably sufficient Or record your log in a Word document or Excel spreadsheet Regardless of how you track your network problems the tracking log should include this information 1 The real name and the network username of the person reporting the problem 1 The date the problem was first reported 1 An indication of the severity of the problem Is it merely an inconve nience or is a user unable to complete her work because of the prob lem Does a workaround exist 1 The name of the person assigned to resolve the problem 1 A description of the problem 300 Part IV Network Management For Dummies A list of the software involved including version numbers A description of the steps taken to solve the problem A description of any intermediate steps that were taken to try to solve th
380. number you multiply each bit by its corre sponding power of two and then add the results The decimal value of binary 10101 for example is calculated as follows ix seix ie il 2 Ox 2eOx Qe 0 i B ie as 4 Ox P O0x Be 0 amp x De il x 1G G 21 Fortunately a computer is good at converting a number between binary and decimal so good in fact that you re unlikely ever to need to do any conversions yourself The point of knowing binary isn t to be able to look at a number such as 1110110110110 and say instantly Ah Decimal 7 606 lf you could do that Barbara Walters would probably interview you and they would even make a movie about you starring Dustin Hoffman and a vintage Buick Instead the point is to have a basic understanding of how computers store information and most important to understand how the hexadecimal counting system works which I describe in the following section Here are some of the more interesting characteristics of binary and how the system is similar to and differs from the decimal system The number of bits allotted for a binary number determines how large that number can be If you allot eight bits the largest value that number can store is 11111111 which happens to be 255 in decimal ay To quickly determine how many different values you can store ina binary number of a given length use the number of bits as an exponent of two An eight bit binary number for exa
381. o create computer interfaces that are intuitively easy to use Configuring Exchange for iPhone and Windows Mobile Devices Many mobile devices run a special version of Windows known as Windows Mobile Windows Mobile includes a mobile version of Outlook known as Outlook Mobile that has the ability to synchronize in real time with Exchange The features that accomplish this synchronization are called Outlook Mobile Access and Exchange ActiveSync and they are easy to configure iPhones also use Exchange ActiveSync to connect to e mail accounts So whether you re using a Windows Mobile device or an iPhone you can follow these steps to enable e mail access 1 Log in to the Exchange server with an Exchange administrator account 2 Choose Start gt Administrative Tools gt Exchange System Manager 3 In the navigation pane expand the Global Settings node 4 Right click Mobile Services then choose Properties The dialog box shown in Figure 14 1 appears 5 Select all of the check boxes on the General tab This enables all the capabilities of Outlook Mobile Access and Exchange ActiveSync 6 Click OK 7 Close Exchange System Manager 8 Choose Start Administrative Tools Active Directory Users and Computers The Active Directory Users and Computers console opens 224 Part Ill Getting Connected Mohile Services Properties thxd General Details a Mobile Services Exchange ActiveSync IV Enable user jniti I Ena
382. o this address is 197 168 136 23 Here 192 represents the first eight bits 11000000 168 the second set of eight bits 10101000 136 the third set of eight bits 10001000 and 28 the last set of eight bits 00011100 This is the format in which you usually see IP addresses represented Classifying IP Addresses When the original designers of the IP protocol created the IP addressing scheme they could have assigned an arbitrary number of IP address bits for the network ID The remaining bits would then be used for the host ID For example the designers may have decided that half of the address 16 bits would be used for the network and the remaining 16 bits would be used for the host ID The result of that scheme would be that the Internet could have a total of 65 536 networks and each of those networks could have 65 536 hosts In the early days of the Internet this scheme probably seemed like several orders of magnitude more than would ever be needed However the IP designers realized from the start that few networks would actually have tens of thousands of hosts Suppose that a network of 1 000 computers joins the Internet and is assigned one of these hypothetical network IDs Because that network uses only 1 000 of its 65 536 host addresses more than 64 000 IP addresses would be wasted As a solution to this problem the idea of IP address classes was introduced The IP protocol defines five different address classes A B C D
383. oblem it s often useful to find out who is logged on to a network server For example if a user cannot access a file on the server you can check to see whether he is logged on If so you know that the user s account is valid although he may not have permission to access the particular file or folder he wants On the other hand if the user isn t logged on the problem may lie in the account itself or in the way the user is attempting to connect to the server Another useful technique is to find out who s logged on if you need to restart the server For more information about restarting a server see the section How to Restart a Network Server later in this chapter To find out who is logged on to a Windows Server 2008 server follow these steps 1 Open the Computer Management window by choosing Start Administrative Tools Computer Management 2 Open System Tools in the tree list open Shared Folders and select Sessions A list of users who are logged on appears You can select Open Files to find out which files are being used by net work users How to Restart a Client Computer Sometimes trouble gets a computer so tied up in knots that the only thing you can do is reboot In some cases the computer just starts acting weird 294 Part IV Network Management For Dummies ar Strange characters appear on the screen or Windows goes haywire and doesn t let you close programs Sometimes the computer gets so
384. of network performance problems is a server over loaded with too many duties Just because a modern network operating system comes equipped with dozens of different types of services doesn t mean that you should enable and use them all on a single server If a single server is bogged down because of too much work add a second server to relieve the first server of some of its chores Remember the old saying Many hands make light work For example if your network needs more disk space consider adding a second file server rather than adding another drive to the server that already has four nearly full drives Better yet purchase a file server appliance dedi cated to the task of serving files As a side benefit your network will be easier to administer and more reliable if you place separate functions on separate servers For example if a single server doubles as a file server and a mail server you lose both services if you have to take down the server to perform an upgrade or repair a failed 282 Part IV Network Management For Dummies MBER EN component However if you have separate file and mail server computers only one of the services is interrupted if you have to take down one of the servers The network infrastructure The infrastructure consists of the cables and any switches hubs routers and other components that sit between your clients and your servers The following network infrastructure items can slow
385. ok once in a while Problem is they don t always tell you when they re not working A tape drive especially the less expensive Travan Chapter 22 Backing Up Your Data 3 9 drives can spin along for hours pretending to back up your data when in reality your data isn t being written reliably to the tape In other words a tape drive can trick you into thinking that your backups are working just fine but when disaster strikes and you need your backup tapes you may just discover that the tapes are worthless ay Don t panic You have a simple way to assure yourself that your tape drive is working Just activate the compare after backup feature of your backup soft ware Then as soon as your backup program finishes backing up your data it rewinds the tape reads each backed up file and compares it with the original version on the hard drive If all files compare you know your backups are trustworthy Here are some additional thoughts about the reliability of tapes 1 The compare after backup feature doubles the time required to doa backup but that doesn t matter if your entire backup fits on one tape You can just run the backup after hours Whether the backup and repair operation takes one hour or ten doesn t matter as long as it s finished by the time the network users arrive at work the next morning If your backups require more than one tape you may not want to run the compare after back
386. on 17 Apple Computer Inc 48 Prudential Securities Inc 18 MIT 54 Merck and Co Inc 19 Ford Motor Company 56 U S Postal Service Class B addresses In a Class B address the first two octets of the IP address are used as the network ID and the second two octets are used as the host ID Thus a Class B address comes close to my hypothetical scheme of splitting the address down the middle using half for the network ID and half for the host ID It isn t identical to this scheme however because the first two bits of the first octet are required to be 10 to indicate that the address is a Class B address Thus a total of 16 384 Class B networks can exist All Class B addresses fall within the range 128 x y zto191 x y z Each Class B address can accommo date more than 65 000 hosts The problem with Class B networks is that even though they re much smaller than Class A networks they still allocate far too many host IDs Very few net works have tens of thousands of hosts Thus the careless assignment of Class B addresses can lead to a large percentage of the available host addresses being wasted on organizations that don t need them Class C addresses In a Class C address the first three octets are used for the network ID and the fourth octet is used for the host ID With only eight bits for the host ID each Class C network can accommodate only 254 hosts However with 24 network ID bits Class C addresses allow for more tha
387. on t want to designate an entire mapped drive for offline access you can designate individual folders within a mapped drive by using the same technique Right click the folder and then choose Always Available Offline Windows Vista or Windows 7 or Make Available Offline Windows XP When you first designate a drive or folder as available offline Windows copies all the files on the drive or folder to local storage Depending on how many files are involved this process can take awhile so plan accordingly 6 0 Part I Let s Network After you designate a drive as available offline Windows takes care of the rest Each time you log on or off the network Windows synchronizes your offline files Windows compares the time stamp on each file on both the server and the local copy and then copies any files that have changed Here are a few other thoughts to consider about offline files If you want you can force Windows to synchronize your offline files by right clicking the drive or folder and choosing Sync 4 Make sure that no files in the folder are currently open at the time you set the Make Available Offline option If any files are open you ll receive an error message You ll have to close the open files before you can des ignate the folder for offline access The Properties dialog box for mapped drives includes an Offline Files tab as shown in Figure 3 12 iy Project 1 Z Properties Project Location SER
388. on you must notify your VoIP provider of your location for 911 to work If you take your VoIP ATA with you on a trip and then forget to notify your provider of your new location before dialing 911 you re connected to emergency services in your hometown not in your present location Popular VoIP Providers If you re thinking of switching to VoIP investigate these services 1 Vonage One of the oldest and most popular VoIP providers A residential customer can get unlimited access for 24 99 per month Or you can get a 500 minute plan for 17 99 per month See www vonage com Comcast Digital Voice If Comcast has cable service in your area you can subscribe to its VoIP plan for about 20 per month Time Warner Cable Digital Phone Time Warner provides digital phone service for about 20 per month For more information check out www buytimewarnercable com telephone aspx Chapter 14 Dealing with Mobile Devices In This Chapter Looking at mobile devices Configuring Windows Mobile devices for Exchange access Examining BlackBerrys and BlackBerry Enterprise Server BES Considering security implications n August 2003 a computer consultant purchased a used BlackBerry device on eBay for 15 50 When he put in a new battery and turned the device on he discovered that it contained confidential e mails and personal contact information for executives of a well known financial institution Oops It turns out that a former
389. on which radio can operate In the United States the Federal Communications Commission FCC regulates not only how much of Janet Jackson can be shown at the Super Bowl but also how various portions of the radio spectrum can be used Essentially the FCC has divided the radio spectrum into dozens of small ranges called bands and restricted certain uses to certain bands For example AM radio operates in the band from 535 kHz to 1 700 kHz Table 9 1 lists some of the most popular bands Note that some of these bands are wide for example UHF television begins at 470 MHz and ends at 806 MHz but other bands are restricted to a specific frequency The difference between the lowest and highest frequency within a band is the bandwidth Table 9 1 Popular Bands of the Radio Spectrum Band What It s Used For 535 kHz 1 700 kHz AM radio 5 9 MHz 26 1 MHz Short wave radio 26 96 MHz 27 41 MHz Citizens Band CB radio 54 MHz 88 MHz Television VHF channels 2 through 6 88 MHz 108 MHz FM radio 174 MHz 220 MHz Television VHF channels 7 through 13 470 MHz 806 MHz Television UHF channels 806 MHz 890 MHz Cellular networks 900 MHz Cordless phones 1850 MHz 1990 MHz PCS Cellular 2 4 GHz 2 4835 GHz Cordless phones and wireless networks 802 11b and 802 11g 4 GHz 5 GHz Large dish satellite TV 5 GHz Wireless networks 802 11a 11 7 GHz 12 7 GHz Small disk satellite TV Two of the bands in
390. onday 4 Now tack up a calendar on the wall near the computer and number all the Mondays in the year 1 2 3 4 1 2 3 4 and so on On Tuesday through Friday you use the appropriate daily backup tape When you do a full backup on Monday you consult the calendar to decide which Monday tape to use With this scheme you always have four weeks worth of Monday backup tapes plus individual backup tapes for the rest of the week If bookkeeping data lives on the network make a backup copy of all your files or at least all your accounting files immediately before closing the books each month then retain those backups for each month of the year Does that mean you should purchase 12 additional tapes Not necessarily If you back up just your accounting files you can probably fit all 12 months on a single tape Just make sure that you back up with the append to tape option rather than the erase tape option so that the previous con tents of the tape aren t destroyed Also treat this accounting backup as completely separate from your normal daily backup routine You should also keep at least one recent full backup at another location That way if your office should fall victim to an errant Scud missile or a rogue asteroid you can re create your data from the backup copy that you stored off site A Word about Tape Reliability From experience I ve found that although tape drives are very reliable they do run am
391. onnect hubs to each other with no more than 100 meters of cable Figure 5 7 shows how you can use a repeater to connect two groups of com puters that are too far apart to be strung on a single segment When you use a repeater like this the repeater divides the cable into two segments The cable length limit still applies to the cable on each side of the repeater BSS A Hub Repeater Chapter 5 Cables Adapters and Other Stuff 0 Ponder these points when you lie awake tonight thinking about repeaters 1 Repeaters are used only with Ethernet networks wired with coaxial cable twisted pair networks don t use repeaters Actually that s not quite true twisted pair does use repeaters It s just that the repeater isn t a separate device In a twisted pair network the switch is a multiport repeater That s why the cable used to attach each computer to the switch is considered a separate segment Some 10 100BaseT switches have a BNC connector on the back This BNC connector is a Thinnet repeater that enables you to attach a full 185 meter Thinnet segment The segment can attach other computers 10BaseT hubs or a combination of both A basic rule of Ethernet life is that a signal can t pass through more than three repeaters on its way from one node to another You can have more than three repeaters or switches If y
392. ons dialog box You return to the Word Options dialog box 7 Click OK again The Word Options dialog box is dismissed Although the User Templates and Workgroup Templates settings affect Word Excel and PowerPoint you can change these settings only from Word The Options dialog boxes in Excel and PowerPoint don t show the User Templates or Workgroup Templates options When you install Office the standard templates that come with Office are copied into a folder on the computer s local disk drive and the User Templates option is set to this folder The Workgroup Templates option is left blank You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates clicking the Modify button and speci fying a shared network folder that contains your workgroup templates Networking an Access database If you want to share a Microsoft Access database among several network users be aware of a few special considerations Here are the more important ones 5 8 Part I Let s Network 1 When you share a database more than one user may try to access the same record at the same time This situation can lead to problems if two or more users try to update the record To handle this potential traffic snarl Access locks the record so that only one user at a time can update it Access uses one of three methods to lock records e Edited Record This method locks a record whenever a user begins to edit a recor
393. ons ee Server Roles page of the More about server roles Add Roles Wizard T Figure 12 2 The Web Server IIS page of the Add Roles Wizard j Figure 12 3 The Select Role Services page of the Add Roles Wizard O E naa roire pean iii x eg Web Server IIS Before You Begin Introduction to Web Server IIS Select Server Roles The Web Server IIS role enables sharing of information on the Internet an intranet or an extranet Itis a unified Web platform that integrates IIS 7 0 ASP NET Windows Communication and Windows eb Server II SharePoint Services IIS 7 0 aiso features enhanced security simplified dagnostics and delegated Role Services Confirm Installation Selections Things to Note I fon Pronress i_ Using Windows System Resource Management WSRM can help ensure equitable servicing of web server eee ld traffic especialy when there are multiple roles or workloads on this computer Installation Results lt Previous Ora Insia Carel Add Roles Wizard x Description Web Server provides support for HIML Web sites and optional support for ASP NET ASP and Web server extensions You con use the Web Server to host an internal or external Web site or to provide an environment for developers to create Web based applications 5 E peor AAS i Installation Results Bu repctonDevlepman ASP NET a INET Extensibility ASP CGI C ISAPI Extensions C ISAPI Faters C se
394. ons is more restrictive always applies For example if the Share Permissions grant a user Full Control permission but the folder permission grants the user only Read permis sion the user has only Read permission for the folder 2 76 Part IV Network Management For Dummies Chapter 19 Network Performance Anxiety In This Chapter Understanding performance problems Looking at bottlenecks Developing a procedure for solving performance problems Monitoring performance Implementing other tips for speeding up your network J term network performance refers to how efficiently the network responds to users needs Obviously any access to resources that involves the network is slower than similar access that doesn t involve the network For example opening a Word document that resides on a network file server takes longer than opening a similar document that resides on the user s local hard drive However it shouldn t take much longer If it does you have a network performance problem This chapter is a general introduction to the practice of tuning your network so that it performs as well as possible Keep in mind that many specific bits of network tuning advice are scattered throughout this book In this chapter you can find some specific techniques for analyzing your network s perfor mance taking corrective action when a performance problem develops and charting your progress Why Administrators Hate Performance Problems
395. operating system resides on a separate hard drive that s isolated from the shared disks so users are prevented from inadvertently damaging the operating system Understanding Permissions One key concept for managing network storage is permissions Permissions allow users to access shared resources on a network Simply sharing a disk doesn t guarantee that a given user can access the data it contains Windows makes this decision based on the permissions that have been assigned to various groups for the resource and group memberships of the user If Chapter 18 Managing Network Storage 26 the user belongs to a group that s been granted permission to access the resource the access is allowed If not access is denied In theory the permissions concept sounds simple In practice however it can get quite complicated This list explains some of the nuances of how access control and permissions work 1 Every object that is every file and folder on an NTFS volume has a set of permissions called the Access Control List or ACL associated with it 1 The ACL identifies the users and groups that can access the object and specifies which level of access each user or group has For example a folder s ACL may specify that one group of users can read files in the folder another group can read and write files in the folder and a third group is denied access to the folder Container objects files and volumes allow the
396. operating systems on a lot of servers RIS can also install client operat ing systems Gathering Vour Stuff ING Before you install a network operating system gather up everything you need so that you don t have to look for something in the middle of the setup The following sections describe the items you re most likely to need A capable server computer Obviously you have to have a server computer on which to install the NOS Each NOS has a list of the minimum hardware requirements supported by the operating system Table 7 1 lists two kinds of minimum requirements for Windows Server 2008 Standard Microsoft s extremely inadequate published requirements Your author s realistic recommendations for acceptable performance Table 7 1 Windows Server 2008 Hardware Requirements Hardware Microsoft s Published Doug s Realistic Minimum Minimum CPU 1 GHz single core x86 pro 2 GHz dual core x86 cessor for example Intel processor for example Pentium Intel Core 2 Duo RAM 512MB 4GB Free disk space 10GB 80GB Computer components are inexpensive enough that you shouldn t scrimp on hardware costs Also check your server hardware against the list of compatible hardware published by the maker of your NOS For example Microsoft publishes a Chapter 7 Setting Up a Server 14 list of hardware that it has tested and certified as compatible with Windows servers This list is the Hardware Compatibility List or
397. opology 80 82 83 StarOffice 352 startup diskette NOS 141 stateful packet inspection SPJ 341 static data 313 314 static IP address 118 120 121 station cable 85 92 stencils Visio 73 storage 18 194 259 264 See also file servers STP shielded twisted pair cable 84 85 stranded cable 85 86 striped volumes 281 subdomain 126 subnet masks 114 115 119 subnets 113 114 subnetting 112 116 surge protector 289 290 SuSE 354 swap partition 355 switches 17 82 83 93 96 286 291 325 397 Sync command 60 System Information program 68 160 161 238 239 242 System Properties dialog box 159 161 system time 331 System window 66 67 o fo T1 lines 187 T3 lines 187 taking computer down 11 tape 310 318 320 See also backups tasks scheduled 286 TCP IP Transmission Control Protocol Internet Protocol binary system 105 107 commands 241 242 DHCP 117 124 DNS 125 129 IP addresses 108 111 ipconfig all command 147 network address translation 116 117 NOS setup configuration for 143 Index 4 overview 105 ports 339 340 settings checking 292 subnetting 112 116 o dialog box 124 129 156 telephones cordless 171 Telephones tab User Properties dialog box 250 Telnet circuit level gateway 341 10 100 1000 Mbps components 82 97 10Base2 cable 96 10Base5 cable 96 10BaseT 89 90 96 99 100 Terminal window Linux 360 theft data 322 thick coaxial cable
398. or example experiment to narrow the possibilities Design your experiments to answer one basic question Is it a network problem or a local computer problem Here are some ways you can narrow the cause of the problem Try performing the same operation on someone else s computer If no one on the network can access a network drive or printer something is probably wrong with the network On the other hand if the error occurs on only one computer the problem is likely on that computer The way ward computer may not be communicating reliably with the network or configured properly for the network or the problem may have nothing to do with the network Chapter 20 Solving Network Problems 293 If you can perform the operation on another computer without prob lems try using your own username to log on to the network on another computer Then see whether you can perform the operation without error If you can the problem is probably on your computer If you can t the problem may be with the way your user account is configured If you can t log on at another computer try waiting for a bit Your account may be temporarily locked out This problem can happen for a variety of reasons the most common of which is trying to log on with the wrong password several times in a row If you re still locked out an hour later call the network administrator and offer a doughnut Who s on First ar When you troubleshoot a networking pr
399. or messages related to installation or startup Depending on the Windows server version you re using you can open the Event Viewer by choosing Start Administrative ToolsEvent Viewer or Start Program Files Administrative ToolsEvent Viewer Non Windows server operating systems have similar features that allow you to view event logs Check your TCP IP settings by running the command ipconfig all from a command prompt This command tells you whether TCP IP is running and shows you the host name IP address and other useful TCP IP information To make sure that you can reach the server over the network open a command prompt at a client computer and attempt to ping the server by entering the command ping hostname where hostname is the name displayed by the ipconfig command for the server Configuring Server Roles Server roles refer to the roles that your server can play on your network roles such as a file server a Web server or a DHCP or DNS server Features refer to additional capabilities of the Windows operating system itself such as the NET Framework or the Windows Backup Truthfully the distinctions between roles and features are a bit arbitrary For example the Web server is considered a role but the telnet server is a feature Go figure The Initial Configuration Tasks page shown in Figure 7 2 lets you add additional roles or features to your server After you ve finished with the initial configu ration of your
400. ormal backup with an incremental backup or a differential backup no files will be selected for backup by the incremental or differential backup because no files will have their archive bits set The easiest backup scheme is to simply schedule a normal backup every night That way all your data is backed up on a daily basis So if the need arises you can restore files from a single tape or set of tapes Restoring files is more complicated when other types of backups are involved Do normal backups nightly if you have the tape capacity to do them unattended that is without having to swap tapes If you can t do an unattended normal backup because the amount of data to be backed up is greater than the capacity of your tape drive or drives you ll have to use other types of backups in combination with normal backups If you can t get a normal backup on a single tape and you can t afford a second tape drive or a tape changer take a hard look at the data that s being included in the backup selection I recently worked on a network that was having trou ble backing up onto a single tape When I examined the data that was being backed up I discovered a large amount of static data that was essentially an online archive of old projects This data was necessary because network users needed it for research purposes but the data was read only Even though the data never changed it was being backed up to tape every night and the back ups requ
401. ormation is and should be confidential If this information is stored on the network you want to store it in a directory that s available only to authorized users Not all security breaches are malicious A network user may be rou tinely scanning through his or her files and come across a filename that isn t familiar The user may then call up the file only to discover that it contains confidential personnel information juicy office gossip or your r sum Curiosity rather than malice is often the source of security breaches Sure everyone at the office is trustworthy now However what if some one becomes disgruntled a screw pops loose and he or she decides to trash the network files before jumping out the window What if someone decides to print a few 1 000 checks before packing off to Tahiti Sometimes the mere opportunity for fraud or theft can be too much for some people to resist Give people free access to the payroll files and they may decide to vote themselves a raise when no one is looking If you think that your network doesn t contain any data that s worth stealing think again For example your personnel records probably contain more than enough information for an identity thief names addresses phone numbers social security numbers and so on Also your customer files may contain your customers credit card numbers Hackers who break into your network may be looking to plant a Trojan horse program on y
402. ou can also disable the device if it s preventing other components of the computer from working properly e Advanced This tab lets you set a variety of device specific param eters that affect the operation of the NIC For example some cards allow you to set the speed parameter typically at 10 Mbps or 100 Mbps or the number of buffers the card should use 154 Partit Building Your Own Network MBER KO amp ar ar Consult the manual that came with the card before you play around with any of those settings e Driver This tab displays information about the device driver that s bound to the NIC and lets you update the driver to a newer ver sion roll back the driver to a previously working version or unin stall the driver e Resources With this tab you can use manual settings to limit the system resources used by the card including the memory range I O range IRQ and DMA channels In the old days before Plug and Play cards you had to configure these settings whenever you installed a card and it was easy to create resource conflicts Windows configures these settings auto matically so that you rarely need to fiddle with them e Power Management This tab lets you set power management options You can specify that the network card be shut down whenever the computer goes into sleep mode and that the computer wakes up periodically to refresh its network state When you click OK to dismiss the network
403. ou can click Browse This action calls up a dialog box that lets you search the server s hard drive for a folder to share You can also create a new folder from this dialog box if the folder that you want to share doesn t yet exist After you ve selected or created the folder to share click OK to return to the wizard The dialog box as shown in Figure 18 3 appears Change the NTFS Permissions if you want and then click Next The NTFS permissions are the permissions that are applied to the folder that you re sharing not to the share itself If you want to change the underlying NTFS permissions for the folder you re sharing select the Yes Change NTFS Permissions radio button click the Edit Permissions button and set the permissions the way you want Otherwise click Next to proceed to the next step The wizard displays the dialog box as shown in Figure 18 4 which lets you set the name this share will be known by ez NIES Permissions 22 Steps Specify NTFS pemissons to control how individual users and groups access this folder Shared Folder Location locally For network access to a shared folder the more restrictive of the NTTS permissions and the share permissions configured for the share protocol determine the NTFS Permissions level of access granted to users and groups Share Protocole Review Settings and Create Share Path Confemation CNDataShares Marketing Do you want to change the N TES permissions for
404. ou do you have to carefully plan the network cabling so that the three repeater rule isn t violated 1 Atwo port 10Base2 repeater costs about 200 Sheesh I guess that s one of the reasons few people use coaxial cable anymore Repeaters are legitimate components of a by the book Ethernet network They don t extend the maximum length of a single segment they just enable you to tie two segments together WING Beware of the little black boxes that claim to extend the segment limit beyond the 185 meter limit for Thinnet or the 100 meter limit for 10 100BaseT cable These products usually work but playing by the rules is better e Bridges A bridge is a device that connects two networks Bridges are used to partition one large network into two smaller networks for performance reasons lt Think of a bridge as a kind of smart repeater Repeaters listen to signals coming down one network cable amplify them and send them down the other cable They do this blindly paying no attention to the content of the messages they repeat In contrast a bridge is a little smarter about the messages that come down the pike For starters most bridges can listen to the network and automati cally figure out the address of each computer on both sides of the bridge Then the bridge can inspect each message that comes from one side of the bridge and broadcast it on the other side of the bridge but only if the mes sage is intended for a co
405. ou don t need to understand every detail in this chapter to set up a simple TCP IP network However the more you understand the information in this chapter the more TCP IP will start to make sense Be brave Understanding Binary Before you can understand the details of how TCP IP in particular IP addressing works you need to understand how the binary numbering system works because binary is the basis of IP addressing If you already understand binary please skip right over this section to the next main sec tion Introducing IP Addresses I don t want to bore you with stuff that s too basic 106 Partit Building Your Own Network Counting by ones The binary counting system uses only two numerals 0 and 1 In the deci mal system to which most people are accustomed you use ten numerals 0 through 9 In an ordinary decimal number such as 3 482 the rightmost digit represents ones the next digit to the left tens the next hundreds the next thousands and so on These digits represent powers of ten first 10 which is 1 next 10 10 then 10 100 then 10 1 000 and so on In binary you have only two numerals rather than ten which is why binary numbers look somewhat monotonous as in 110011 101111 and 100001 The positions in a binary number called bits rather than digits represent powers of two rather than powers of ten 1 2 4 8 16 32 and so on To figure the decimal value of a binary
406. ou probably know networks consist of two types of computers client computers and server computers In the economy of computer networks client computers are the consumers the ones that use network resources such as shared printers and disk drives Servers are the providers the ones that offer their own printers and hard drives to the network so that the client computers can use them This chapter shows you how to turn your humble Windows client computer into a server computer so that other computers on your network can use your printer and any folders that you decide you want to share In effect your computer functions as both a client and a server at the same time A couple of examples show how 42 Part I Let s Network It s aclient when you send a print job to a network printer or when you access a file stored on another server s hard drive It s a server when someone else sends a print job to your printer or accesses a file stored on your computer s hard drive Enabling File and Printer Shaving Windows XP Before you can share your files or your printer with other network users you must set up a Windows File and Printer Sharing feature Without this feature installed your computer can be a network client but not a server This section shows you how to enable this feature for Windows XP For Windows Vista refer to the next section Enabling File and Printer Sharing Windows Vista If you re lucky
407. ou want to start Be bold Be courageous Be adventurous Above all have fun PartI Lets Network The 5th Wave By Rich Tennant Oh look this must be one of those PCs that are assembled by prison inmates It came bundled with a homemade shank in the mousepad In this part ne day the Network Thugs barge into your office and shove a gun in your face Don t move until we hook you up to the network one of them says while the other one connects one end of a suspicious looking cable to the back of your computer and shoves the other end into a hole in the wall It s done they say as they start to leave Now don t you say nuttin to nobody or we ll be back If this has happened to you you ll appreciate the chapters in this part They provide a gentle introduction to com puter networks written especially for the reluctant net work user What if you don t have a network yet and you re the one who s supposed to do the installing Then the chapters in this part clue you in to what a network is all about That way youre prepared for the unfortunately more techni cal chapters in Parts II and beyond Chapter 1 Networks Will Not Take Over the World and Other Network Basics In This Chapter Getting a handle on networks Considering why networking is useful and is everywhere Telling the difference between servers and clients Looking under the hood at the network operating
408. ould you rather update 50 user accounts or just 1 group account Auser can belong to more than one group Then the user inherits the rights of each group For example you can have groups set up for Accounting Sales Marketing and Finance A user who needs to access both Accounting and Finance information can be made a member of both groups Likewise a user who needs access to both Sales and Marketing information can be made a member of both the Sales and Marketing groups You can grant or revoke specific rights to individual users to override the group settings For example you may grant a few extra permissions for the manager of the accounting department You may also impose a few extra restrictions on certain users 334 Part V Protecting Your Network User profiles User profiles are a Windows feature that keeps track of an individual user s preferences for his or her Windows configuration For a non networked com puter profiles enable two or more users to use the same computer each with his or her own desktop settings such as wallpaper colors Start menu options and so on The real benefit of user profiles becomes apparent when profiles are used on a network A user s profile can be stored on a server computer and accessed whenever that user logs on to the network from any Windows computer on the network The following are some of the elements of Windows that are governed by settings in the user profile Deskto
409. oup you want to add users to This brings up the Group Properties dialog box Click the Group Users tab and then check off the users you want to belong to the group 362 Part Vi Beyond Windows Mm Figure 25 4 The User Manager ESS User Manager File Edit Help ox ae Ry t Add User Add Group Refresh Help Search filter Apply titer Users Groups UserName UseriDv Primary Group Full Name Login Shell Home Directory Doug 500 Doug Doug Lowe bin bash nome Doug Network Configuration ar In many cases configuring a Linux server for networking is a snap When you install Linux the Installation program automatically detects your network adapters and installs the appropriate drivers Then you re prompted for basic network configuration information such as the computer s IP address hostname and so on However you may need to manually change your network settings after installation Or you may need to configure advanced networking features that aren t configured during installation In the following sections you get a look at the basic procedures for configuring Linux networking services Using the Network Configuration Program Before you can use a network interface to access a network you have to con figure the interface s basic TCP IP options such as its IP address hostname DNS servers and so on In this section I show you how to do that by using Fedora s Network Configuration program You can acces
410. our net work plan Don t rush the plan The most costly networking mistakes are the ones you make before you install the network Think things through and con sider alternatives Write down the network plan The plan doesn t have to be a fancy 500 page document If you want to make it look good pick up a inch three ring binder big enough to hold your network plan with room to spare Ask someone else to read your network plan before you buy anything Preferably ask someone who knows more about computers than you do Keep the plan up to date If you add to the network dig up the plan dust it off and update it ay The best laid schemes of mice and men gang oft agley and leave us not but grief and pain for promised joy Robert Burns lived a couple hundred years before computer networks but his famous words ring true A network plan isn t chiseled in stone If you discover that something doesn t work the way you thought it would that s okay You can always adjust your plan for unfore seen circumstances Being Purposeful One of the first steps in planning your network is making sure that you under stand why you want the network in the first place Here are some of the more common reasons for needing a network all of them quite valid 1 My co worker and I exchange files using a flash drive just about every day With a network we could trade files without using the flash drive don t want to bu
411. our server which enables them to use your server for their own purposes For example someone may use your server to Chapter 23 Securing Your Network 323 send thousands of unsolicited spam e mail messages The spam won t be traced back to the hackers it ll be traced back to you Not everyone on the network knows enough about how Windows and the network work to be trusted with full access to your network s data and systems A careless mouse click can wipe out a directory of network files One of the best reasons for activating your network s security fea tures is to protect the network from mistakes made by users who don t know what they re doing Two Approaches to Security When you re planning how to implement security on your network first con sider which of two basic approaches to security you ll take An open door type of security in which you grant everyone access to everything by default and then place restrictions just on those resources to which you want to limit access A closed door type of security in which you begin by denying access to everything and then grant specific users access to the specific resources that they need In most cases the open door policy is easier to implement Typically only a small portion of the data on a network really needs security such as confi dential employee records or secrets such as the Coke recipe The rest of the information on a network can be safely made availabl
412. ox how to do that with Outlook 2007 the procedure for other versions of Outlook is similar 1 Start Outlook on the user s computer There s usually an icon for Outlook near the top of the Start menu Choose Tools Account Settings The Account Settings dialog box appears as shown in Figure 11 5 Click the New button An Add E mail Account dialog box appears Do not enter your e mail address as prompted in this dialog box Instead proceed to Step 4 Click the Manually Configure Server Settings or Additional Server Types option and then click Next This brings up a dialog box that asks you what type of e mail account you want to create The choices are Internet E mail Microsoft Exchange and Other Select the Microsoft Exchange option and then click Next The dialog box shown in Figure 11 6 appears Chapter 11 Managing E Mail with Exchange 2007 99 Figure 11 6 You must identify the Exchange server and provide a username re 6 Enter the name of the Exchange server and the username in the appropriate text boxes and then click Next The dialog box with the following message appears The E Mail account you have just added will not start until you choose Exit from the File menu and then restart Microsoft Outlook 7 Click OK The message dialog box disappears and the last page of the E Mail Accounts Wizard appears 8 Click the Finish button The wizard is dismissed
413. p settings from the Display Properties dialog box including wall paper screen savers and color schemes Start menu programs and Windows toolbar options Favorites which provide easy access to the files and folders that the user accesses often Network settings including drive mappings network printers and recently visited network locations Application settings such as option settings for Microsoft Word The My Documents folder Logon scripts A logon script is a batch file that runs automatically whenever a user logs on Logon scripts can perform several important logon tasks for you such as mapping network drives starting applications synchronizing the client computer s time of day clock and so on Logon scripts reside on the server Each user account can specify whether to use a logon script and which script to use This sample logon script maps a few network drives and synchronizes the time net use m MYSERVER Acct net use n MYSERVER Admin net use o MYSERVER Dev net time MYSERVER set yes Chapter 23 Securing Your Network 335 Logon scripts are a little out of vogue because most of what a logon script does can be done via user profiles Still many administrators prefer the sim plicity of logon scripts so they re still used even on Windows Server 2003 systems Securing Vour Users Security techniques such as physical security user account security server security and locking down
414. ped with a special wireless network adapter that has little rabbit ear antennas Thus the com puters can communicate with each other without the need for cables Figure 1 1 shows a typical network with four computers You can see that all four computers are connected by a network cable to a central network device the hub You can also see that Ward s computer has a fancy laser printer attached to it Because of the network June Wally and the Beaver can also use this laser printer Also you can see that the Beaver stuck yes terday s bubble gum to the back of his computer Although the bubble gum isn t recommended it shouldn t adversely affect the network Chapter 1 Networks Will Not Take Over the World and Other Network Basics June s computer Wally s computer Beaver s gum SSS Figure 1 1 Atypical network n Ward s laser printer Computer networking has its own strange vocabulary Although you don t have to know every esoteric networking term it helps to be acquainted with a few of the basic buzzwords 1 LAN Networks are often called LANs The acronym LAN stands for local area network It s the first TLA or three letter acronym that you see in this book You don t really need to remember it or any of the many TLAs that follow In fact the only three letter acronym you need to remember is TLA FLA You may guess that a four letter acronym is an FLA Wrong A four letter acronym is an E
415. printer If you don t your Mac is tied up until the printer finishes your job that can be a long time if someone else sent a 500 page report to the printer just before you When you enable Background Printing your printer output is captured to a disk file and then sent to the printer later while you con tinue with other work To enable Background Printing 1 Choose Apple Chooser desk accessory 2 Select the printer you want to use from the Chooser 3 Click the Background Printing On button Don t enable Background Printing if a dedicated print server has been set up In that case print data is spooled automatically to the print server s disk so your Mac doesn t have to wait for the printer to become available Shaving files with other users To share files on your Mac with other network users you set up a shared resource You can share a disk or just individual folders and restrict access to certain users Before you can share files with other users you must activate the AppleTalk file sharing feature Here s how 1 Choose the File Sharing control panel from the Apple Menu 2 Click the Start button in the File Sharing section of the control panel 3 Click the Close button To share a file or folder click the file or folder once Then open the File menu choose Get Info and choose Sharing from the submenu that appears You can also use the Sharing section of the Info window to restrict access to the file or fo
416. produced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise except as permit ted under Sections 107 or 108 of the 1976 United States Copyright Act without either the prior written permission of the Publisher or authorization through payment of the appropriate per copy fee to the Copyright Clearance Center 222 Rosewood Drive Danvers MA 01923 978 750 8400 fax 978 646 8600 Requests to the Publisher for permission should be addressed to the Permissions Department John Wiley amp Sons Inc 111 River Street Hoboken NJ 07030 201 748 6011 fax 201 748 6008 or online at http www wiley com go permissions Trademarks Wiley the Wiley Publishing logo For Dummies the Dummies Man logo A Reference for the Rest of Us The Dummies Way Dummies Daily The Fun and Easy Way Dummies com Making Everything Easier and related trade dress are trademarks or registered trademarks of John Wiley amp Sons Inc and or its affiliates in the United States and other countries and may not be used without written permission All other trademarks are the property of their respective owners Wiley Publishing Inc is not associated with any product or vendor mentioned in this book LIMIT OF LIABILITY DISCLAIMER OF WARRANTY THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTA TIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF T
417. purpose Taking stock of your computer stock Making sure that you know why you need a network Looking at different server types Choosing your server operating system Planning the infrastructure and drawing diagrams Looking at a sample network O so you re convinced that you need to network your computers What now Do you stop by Computers R Us on the way to work install the network before morning coffee and expect the network to be fully opera tional by noon I don t think so Networking your computers is just like any other worthwhile endeavor To do it right requires a bit of planning This chapter helps you think through your network before you start spending money It shows you how to come up with a networking plan that s every bit as good as the plan that a network consultant would charge 1 000 for This book is already saving you money Making a Network Plan Before you begin any networking project whether it s a new network instal lation or an upgrade of an existing network first make a detailed plan If you make technical decisions too quickly before studying all the issues that affect the project you ll regret it You ll discover too late that a key applica tion doesn t run over the network that the network has unacceptably slow performance or that key components of the network don t work together O Partit Building Your Own Network Here are some general thoughts to keep in mind while you create y
418. puter with as little as 4MB of RAM and a few hundred MB of disk space can t see my C drive Well no but that s normal Linux and Windows have completely different ways of referring to your computer s disk drives and partitions The differences can take some getting used to for experienced Windows users Windows uses a separate letter for each drive and partition on your system For example if you have a single drive formatted into three partitions Windows identifies the partitions as drives C D and E Each of these drives has its own root directory which can in turn contain additional directories used to organize your files As far as Windows is concerned drives C D and E are completely separate drives even though the drives are actually just partitions on a single drive Linux doesn t use drive letters Instead Linux combines all the drives and partitions into a single directory hierarchy In Linux one of the partitions is designated as the root partition The root is roughly analogous to the C drive on a Windows system Then the other parti tions can be mounted on the root partition and treated as if they were directories on the root partition For example you might des ignate the first partition as the root partition and then mount the second partition as user and the third partition as var Then any files stored in the user directory would actu ally be stored in the second partition and files store
419. puter the correct printer driver for the network printer You may be prompted to confirm that you want to add the driver If so click Install Driver to proceed The Add Printer Wizard displays a screen that shows the printer s name and asks whether you want to designate the printer as your default printer 6 Optional Designate the printer as your default printer 7 Click Next to continue A final confirmation dialog box is displayed 8 Click Finish You re done ar ey Figure 2 10 Atypical Print dialog box Sa Chapter 2 Life on the Network 3 7 Many network printers especially newer ones are connected directly to the network by using a built in Ethernet card Setting up these printers can be tricky You may need to ask the network administrator for help in setting up this type of printer Some printers that are connected directly to the network have their own Web addresses such as Printer CleaverFamily com If that s the case you can often set up the printer in a click or two Use your Web browser to go to the printer s Web page and then click a link that enables you to install the printer Printing to a network printer After you install the network printer in Windows printing to the network printer is a snap You can print to the network printer from any Windows program by using the Print command to summon the Print dialog box found under the File menu in Office 2003 or the Office button in Office 2007
420. puters The Mac OS X Server includes the following features Apache Web server which also runs on Windows and Linux systems NetBoot a feature that simplifies the task of managing network client computers File services using AFP WebObjects a high end tool for creating Web sites QuickTime Streaming Server which lets the server broadcast multimedia programs over the network What Vou Need to Know to Use a Macintosh Network The following questions often come up after you install the network cable Note that the following sections assume that you re working with AppleTalk networking using Mac OS X The procedures may vary somewhat if you re using Open Transport networking or an earlier version of the Macintosh operating system Chapter 26 Macintosh Networking 3 13 Who s winning in the AFP West AFP is not a division of the NFL but an abbrevia Windows 95 use AFP to support Macintoshes tion for AppleTalk Filing Protocol It s the part in their networks of AppleTalk that governs how files are stored and accessed on the network AFP allows files to be shared with non Macintosh computers You can integrate Macintoshes into any net work operating system that recognizes AFP NetWare and all versions of Windows since In case you re interested and you shouldn t be AFP is a Presentation Layer protocol See Chapter 30 if you don t have a clue what l m talking about Configuring a Mac for networking B
421. r 2 The Data Link Layer cccecsessseesseesseceesneeesseeceseeeseeeeseneensnees 396 Layer 3 The Network Layer senserint eE E NS 398 Layer 4 The Transport Layer omiensa ie ra ar neir As 398 Layer 4a The Lemon Pudding Layer cccccceseesesseeteeeeeeeeeeeeseeeeeseeaeens 399 Layer 5 The Session Layer ccccsccssessseseesesseeseceseeseeseeseeaeceeeeeeseeseeseeaeens 399 Layer 6 The Presentation Layer cccccccccsssecesseeeeteceseecseeesseeessesesaees 399 Layer 7 The Application Layer ics iiss cccceicse civ cetecaedeas cdeseteseecacistetessis bode 400 lido cee eT eT NE ee a 7 XVIII Networking For Dummies 9th Edition Introduction Uo to the ninth edition of Networking For Dummies the book that s written especially for people who have this nagging feeling in the back of their minds that they should network their computers but haven t a clue about how to start or where to begin Do you often burn a spreadsheet file to a CD R disc just so you can give it to someone else in your office Are you frustrated because you can t use the fancy color laser printer that s on the financial secretary s computer Do you wait in line to use the computer that has the customer database You need a network Or maybe you already have a network but you have just one problem They promised that the network would make your life easier but instead it has turned your computing life upside down Just when you ha
422. r Network 0 eeeeeeeaee 63 Making a Network Plan oncion i eei aiid nmin ds 63 Being PUrpOs Chl sssrini anr a aie 64 Taking StOCK seses eie nars ern sas sn aii aas loves 65 What you need to kN W ccsccssesssessesscessccssesssessseseessseseeeseeesaeens 65 Programs that gather information fOr YOU eeeeseeseeeeeeteeeeeeees 68 To Dedicate or Not to Dedicate That Is the Question eeeeee 69 Looking at Different Types of Servers ccccccessseessceeeeseeseeeeeeeseeeeeneeeaes 69 FIE SEV ONS sccccs5edeczsessdetencteevsGeseestdexeasedesbenasevseades 0h saeesdoeedes esdeestonaaess 69 Print SOF VETS nanana EE seis seed ease esate 70 Table of Contents WED Server Serene e Mes oxcbans ede re E EEE EE ERE EE 70 WENES aa e S E A E ieeicanieieunc 70 Database SErVer Soie aeae EEEE 71 Choosing a Server Operating SySteM ccccccsccsecsseeseeesseeseeeseeeseeeseesnees 71 Planning the Infrastructure cccccccsscesscecesseeeseeeesneeeseeecsseeeseeseneeeeseeees 71 Drawing Diagrams onise aporioita EEE EP E E EAV E EEE hee T2 Sample Network Plah Su iiseonieerrneriiearisanossce nieste ieies raS E EEPE EEES Eea i 73 Building a small network California Sport Surface Inc 73 Connecting two networks Creative Course Development Inc 75 Improving network performance DCH Accounting ee 77 Chapter 5 Oh What a Tangled Web We Weave Cables Adapters and Othe
423. r Stuff 0 cee eee eaee 79 What Is Ethernet sscs fccstes sicecavctess ocicaeteenaiteeea i daastitial canon eotis 79 PAM ABOUT CAD Css 230s isessesscesadecbastetevevedest cp usesereideroesadestoukstasaeetestavutesvendsieeetecs 82 CaDle CatedorieS aaraa e a E eee 83 What s with the Pairs 3 sesisiesadeisearsctts sitesi cederioeneceivencavisacavivGoeseiesei 84 To shield or not to Shield oo cece cecceseesseesseeseeeseceecseceeceseeseeeseeenes 84 When to use plenum Cable ccccscessccsscessccssesssesssesssesssesseeseeesasens 85 Sometimes solid sometimes stranded ccccceesscscesesssceeesseeseeees 85 Installation guidelines s src ission eai 86 The tools yOu need oopis iie oeaean eto oeras dev eencie hae fssceasees dns 87 Pinouts for twisted pair cables c 0 cc0 sies ceissceeacic austen 88 RJ 45 connetto Sours cackcssassedediesacesscaaccseueaedseenivaasessssouseavianssasindsavsvevets 89 Crossover CADE Snte Na TR 9 Wall jacks and patch panels cccccccsscessseeeseeeseeeeeeesseeeseeeenseeees 91 Hups and SWEET 93 H bsSOrsSwWitCNeS Aee EEEE A E EEE 93 Working with switches sosesc anera i 94 D isy ch aining switcheS crsninceniiinssninernen ri ninn 94 Network Interface Card ccccccscsssesssescecsseesecesecesecsseeeseesseeseesseeeseeeeesaees 96 Picking a network interface Card ccccccccceesseesseeeesceeeseeesseeesseennes 97 Installing a network Card eccccccicsec eiccdccecess coveecvese
424. r Templates folder may contain templates named Blank Document and Web Page and the Workgroup Templates folder may contain a template named Company Letterhead In this case three templates appear in the New dialog box in this order Blank Document Company Letterhead and Web Page To set the location of the User Templates and Workgroup Templates folders follow these steps in Microsoft Word 1 Click the Office button and then click Word Options The Word Options dialog box opens 2 Click the Advanced tab The Advanced options appear 3 Scroll down to the General section and then click the File Locations button The File Locations dialog box appears as shown in Figure 3 11 4 Double click the Workgroup Templates item This step opens a dialog box that lets you browse to the location of your template files 5 Browse to the template files and then click OK You return to the File Locations dialog box Figure 3 11 Setting the file loca tions in Word 2007 Chapter 3 More Ways to Use Your Network 5 7 File Locations Lo File Locations Fie types Location ocuments C Users diowe Documents Clipart pictures User templates C Roaming Microsoft Templates Workgroup templates LSERVERO1 Templates AutoRecover files C Roaming Microsott Word Tools C Wecrosoft Office ffice 12 Startup C2 Waerosoft Word s1 AR TL loa flae 6 Click OK to dismiss the File Locati
425. r a small network can be had for under 100 Routers suitable for larger networks will naturally cost a bit more Because all communications between your network and the Internet must go through the router the router is a natural place to provide the security measures necessary to keep your network safe from the many perils of the Internet As a result a router used for Internet connections often doubles as a firewall as described in the section Using a firewall later in this chapter SS Part Ill Getting Connected Securing Vour Connection with a Firewall NG on If your network is connected to the Internet a whole host of security issues bubble to the surface You probably connected your network to the Internet so that your network s users could get out to the Internet Unfortunately however your Internet connection is a two way street It not only enables your network s users to step outside the bounds of your network to access the Internet but it also enables others to step in and access your network And step in they will The world is filled with hackers who are looking for networks like yours to break into They may do it just for the fun of it or they may do it to steal your customers credit card numbers or to coerce your mail server into sending thousands of spam messages on behalf of the bad guys Whatever their motive rest assured that your network will be broken into if you leave it unprotected Usi
426. r how to config ure Windows Server 2008 to operate as a file server Understanding Network Storage Many network servers exist solely for the purpose of making disk space avail able to network users As networks grow to support more users and as users require more disk space network administrators are continually finding ways to add more storage to their networks The following sections describe some key concepts for providing network storage File servers A file server is simply a network server whose primary role is to share its disk drives It s the most common way to provide shared network storage A file server can be anything from a simple desktop computer that has been pressed into service as a file server to an expensive 25 000 or more server with redundant components so that the server can continue to run when a component fails A file server can even consist of advanced disk subsystems with racks of disk drives that can be replaced without shutting down the server 260 Part IV Network Management For Dummies One of the most common advanced disk subsystems for file servers is RAID or Redundant Array of Inexpensive Disks A RAID system which is a type of disk storage that hardly ever fails works by lumping together several disk drives and treating them as though they re a single humongous drive RAID uses some fancy techniques devised by computer nerds at Berkeley These techniques ensure that if one of the disk dr
427. r it before they finally gave up and admit ted failure Here s the procedure to reset the password for a user domain account 1 Log on as an administrator You must have administrator privileges in order to perform this procedure 2 Choose Start gt Administrative Tools Active Directory Users and Computers The Active Directory Users and Computers management console appears 3 Click Users in the console tree 4 In the Details pane right click the user who forgot his password and choose Reset Password 5 Type the new password in both password boxes You have to type the password twice to ensure that you type it correctly 254 Part IV Network Management For Dummies 6 Optional Select the User Must Change Password at Next Logon option If you select this option the password that you assign will work for only one logon As soon as the user logs on he ll be required to change the password 7 Click OK That s all there is to it The user s password is now reset Disabling and Enabling User Accounts If you want to temporarily prevent a user from accessing the network you can disable her account Then you can enable the account later when you re ready to restore the user to full access Here s the procedure 1 Log on as an administrator You must have administrator privileges to perform this procedure 2 Choose Start gt Administrative Tools Active Directory Users and Computers The A
428. r on my home network You can combine the host name with the domain name to get the complete DNS name for each of my network s hosts For example the complete DNS name for my server is server1 LoweWriter com Likewise my printer is printerl LoweWriter com Here are a few additional details that you need to remember about DNS names DNS names aren t case sensitive As a result LoweWriter and Lowewriter are treated as the same name as are LOWEWRITER LOWEwriter and LoWeWrItEr When you use a domain name you can use Capitalization to make the name easier to read but DNS ignores the difference between capital and lowercase letters 1 The name of each DNS node can be up to 63 characters long not includ ing the dot and can include letters numbers and hyphens No other special characters are allowed A subdomain is a domain that s beneath an existing domain For exam ple the com domain is a subdomain of the root domain Likewise LoweWriter is a subdomain of the com domain Chapter 6 Dealing with TCP IP 2 7 ar 1 DNS is a hierarchical naming system that s similar to the hierarchical folder system used by Windows However one crucial difference exists between DNS and the Windows naming convention When you construct a complete DNS name you start at the bottom of the tree and work your way up to the root Thus doug is the lowest node in the name doug LoweWriter com In contrast Windows paths are the opposite They s
429. ransport Layer The Transport Layer is the basic layer at which one network computer commu nicates with another network computer The Transport Layer is where you ll find one of the most popular networking protocols TCP The main purpose of the Transport Layer is to ensure that packets move over the network reliably Chapter 30 Layers of the OSI Model 399 and without errors The Transport Layer does this by establishing connections between network devices acknowledging the receipt of packets and resending packets that aren t received or are corrupted when they arrive In many cases the Transport Layer protocol divides large messages into smaller packets that can be sent over the network efficiently The Transport Layer proto col reassembles the message on the receiving end making sure that all packets contained in a single transmission are received and no data is lost Layer ha The Lemon Pudding Layer The Lemon Pudding Layer is squeezed in between the rather dry and taste less Transport and Session Layers to add flavor and moistness Layer 5 The Session Layer The Session Layer establishes sessions instances of communication and data exchange between network nodes A session must be established before data can be transmitted over the network The Session Layer makes sure that these sessions are properly established and maintained Layer 6 The Presentation Layer The Presentation Layer is responsible for converting the d
430. rces as though you were locally connected to the network Using Outlook Web Access Most people who connect to their office networks from home really just need their e mail If the only reason for accessing the office network is to get e mail Outlook Web Access is a simple easy tool Outlook Web Access OWA is a Microsoft Exchange Server feature that can access your company e mail from any computer that has an Internet 230 Part Ill Getting Connected Figure 15 1 OWA looks a lot like Outlook connection The remote computer just needs a Web browser and an Internet connection no VPN or other special configuration is required The best part is that you don t have to do anything special to enable OWA it s enabled by default when you install Microsoft Exchange Although you can configure plenty of options to improve its use OWA is functional right out of the box To access OWA from any Web browser just browse to the address that s des ignated for your organization s OWA The default address is the DNS name of your mail server followed by exchange For example for the mail server smtp lowewriter com the OWA address is smtp lowewriter com exchange The connection must use the secure version of the normal HTTP Web protocol You must type https before the OWA address The complete address will be something like https smtp lowewriter com exchange When you browse to your OWA address you re prompted
431. rd drive can be shared it isn t commonly done Instead individual folders are shared The administrator can control which users are allowed to access each shared folder Chapter 7 Setting Up a Server 133 Because file sharing is the reason many network servers exist network oper ating systems have more sophisticated disk management features than are found in desktop operating systems For example most network operating systems can manage two or more hard drives as though they were a single drive In addition most can create a mirror an automatic backup copy of a drive on a second drive Multitasking Only one user at a time uses a desktop computer however multiple users simultaneously use server computers As a result a network operating system must provide support for multiple users who access the server remotely via the network At the heart of multiuser support is multitasking a technique that slices processing time microthin and juggles the pieces lightning fast among run ning programs It s how an operating system can execute more than one program a fask or a process at a time Multitasking operating systems are like the guy who used to spin plates balanced on sticks on the old Ed Sullivan Show He d run from plate to plate trying to keep them all spinning so that they wouldn t fall off the sticks To make it challenging he d do it blindfolded or riding on a unicycle Substitute programs for the plates an
432. rdware Resources Components or Software Environment If you want you can print this infor mation and include it with your network notes Pix Saia File Edit View Help y y Item Hardware Resources OS Name Camponents Version D Software Cnvironment Other OS Description OS Manufacturer System Name System Manufacturer System Model System Type Processor BIOS Version Date SMBIOS Version Windows Directory System Directory Boot Device Find what Search selected category only Value Microsoft Windows 7 Ultimate 6 1 7100 Build 7100 Not Available Microsoft Corporation WIN VMware Inc VMware Virtual Platform X86 based PC Intel R Pentium R 4 CPU 3 00GHz 299 Phoenix Technologies LTD 6 00 4 17 2 2 31 C Windows C Windows system32 Device larddiskVolume1 X r Find Cluse Find Search category names only Chapter 4 Planning Your Network 69 To Dedicate or Not to Dedicate That Is the Question One of the most basic questions that a network plan must answer is whether the network will have one or more dedicated servers or whether it will rely completely on peer to peer networking with no single computer acting as a dedicated server If the only reason for purchasing your network is to share a printer and exchange an occasional file you may not need a dedicated server computer In that case you can create a peer to peer network by using the computers you already have However all but
433. re 3 2 The Network and Sharing Center SSS E Figure 3 3 Activating the file shar ing feature M t gt o 5 Network and Internet Network and Sharing Center X s Search Control Panet o Gv l Panel Hi i i j j oetik Panel ani View your basic network information and set up connections Change adapter settings A Jo te See full map Seat ard etait WKO9 001 lowewnter com Internet settin s ss This computer View your active networks Connect or disconnect lowewriter com Access type Internet Domain network Connections Local Area Connection Change your networking settings Set up a new connection or network Set up a wireless broadband dial up ad hoc or VPN connection or set up a router or access point Connect to a network Connect or reconnect to a wireless wired dial up or VPN network connection Choose homegroup end sharing options Access tiles and printers located on other network computers or change sharing settings See also Troubleshoot problems HomeGroup Diaynose and repair network problems of get troubleshooting information Internet Options Windows Firewall gt Control Panel Network and Sharing Center Network and Sharing Center A F WwKo7 001 office lowewniter com This computer Vrew full map ES olficeJowewriter com Domain network Customize Access Local and Internet Connection Local Area Connection B Sharing and Discovery Network discovery On
434. re 6 1 in which the network ID consists of the 16 bit network ID plus an additional 4 bit subnet ID would look like this WAIL LALLA iL ILA OOOO COOCMOOOC In other words the first 20 bits are ones the remaining 12 bits are zeros Thus the complete network ID is 20 bits in length and the actual host ID por tion of the subnetted address is 12 bits in length To determine the network ID of an IP address the router must have both the IP address and the subnet mask The router then performs a bitwise operation called a logical AND on the IP address to extract the network ID To perform a logical AND each bit in the IP address is compared to the cor responding bit in the subnet mask If both bits are 1 the resulting bit in the network ID is set to 1 If either of the bits is 0 the resulting bit is set to 0 For example here s how the network address is extracted from an IP address using the 20 bit subnet mask from the previous example 144 AS le 17y IP address 10010000 00011100 00100000 00001001 Subnet mask 11111111 11111111 11110000 00000000 Network ID 10010000 00011100 00100000 00000000 144 AS E s 0 Thus the network ID for this subnet is 144 28 16 0 Chapter 6 Dealing with TCP IP The subnet mask itself is usually represented in dotted decimal notation As a result the 20 bit subnet mask used in the previous example would be repre sented as 255 255 240 0 SuUbnercimask IAAL ALL LALLA LAE LL ae LLL aL a
435. responsible trustwor thy network manager They don t give out merit badges for this stuff but they should Backing Up Vour Data EMBER D Having data backed up is the cornerstone of any disaster recovery plan Without backups a simple hard drive failure can set your company back days or even weeks while it tries to reconstruct lost data In fact without backups your company s very existence is in jeopardy The main goal of backups is simple Keep a spare copy of your network s critical data so that no matter what happens you never lose more than one day s work The stock market may crash hanging chads may factor into another presidential election and George Lucas may decide to make a pre prequel However you never lose more than one day s work if you stay on top of your backups 3 0 Part V Protecting Your Network The way to do this naturally is to make sure that data is backed up ona daily basis In many networks it s feasible to back up all the network hard drives every night However even if full nightly backups aren t possible you can still use techniques that can ensure that every file on the network has a backup copy that s no more than one day old All about Tapes and Tape Drives ar If you plan on backing up the data on your network server s hard drives you need something to back up the data to You can copy the data onto CDs but a 500GB hard drive would need more than 750 CDs to do a
436. rk drive often Click OK You return to the Computer folder as shown in Figure 2 7 Here you can see the newly mapped network drive A Figure 2 7 The Computer folder shows a mapped net work drive e Chapter 2 Life on the Network 33 fa loes GO W Computer X Search Computer p Organize v Properties System properties Uninstall or change a program Map network drive a Of Tr Favorites 4 Hard Disk Drives 1 EE Desktop Local Disk C J Downloads _ 90 GH free of 158 GB E Recent Places 4 Devices with Removable Storage 2 Dy Libraries M CD Drive D D Docuit al Floppy Disk Drive A GRCLCULFRER_EN_DVD 0 bytes free of 235 GB Music be Pictures 4 Network Location 1 E Videos Project SERVERO1 Z Sf 243 GB free of 31 9 GB j Computer Ge Network Project SERVERO1 Z Space used Sl Total size 31 9 GB Network Drive Space free 24 3 GB File systern NTFS Your network administrator may have already set up your computer with one or more mapped network drives If so you can ask her to tell you which net work drives have been mapped Or you can just open the Computer folder My Computer on Windows XP and have a look Here are a few additional tips If you re using Windows XP the procedure for mapping a network drive is similar to the one for Windows Vista Start by opening My Computer and choosing Tools Map Network Drive Then follow the pre cedi
437. rkgroup can use disk space on a file server to store their Microsoft Office documents 10 Part Il Building Your Own Network File servers must ensure that two users don t try to update the same file at the same time The file servers do this by locking a file while a user updates the file so that other users can t access the file until the first user finishes For document files for example word processing or spreadsheet files the whole file is locked For database files the lock can be applied just to the por tion of the file that contains the record or records being updated Print servers Sharing printers is one of the main reasons that many small networks exist Although it isn t often necessary to do so you can dedicate a server com puter for use as a print server whose sole purpose is to collect information being sent to a shared printer by client computers and print it in an orderly fashion A single computer may double as both a file server and a print server but performance is better if you use separate print and file server computers 1 With an inexpensive inkjet printer running about 100 or less just giving each user his own printer is tempting However you get what you pay for Rather than buy a cheap inkjet printer for each user you may be better off buying one good laser printer and sharing it Web servers A Web server is a server computer that runs software that enables the computer to host an In
438. rmance Anxiety 2 19 that the tapered shape of a bottle of Jolt cola limited the rate at which they could consume the beverage Hey a computer geek said one day the gently tapered narrowness of this bottle s neck imposes a distinct limiting effect upon the rate at which I can consume the tasty caffeine laden beverage contained within This observation draws to mind a hitherto undiscovered yet obvious analogy to the limiting effect that a single slow component of a computer system can have upon the performance of the system as a whole Fascinating replied all the other computer geeks who were fortunate enough to be present at that historic moment The term stuck and is used to this day to draw attention to the simple fact that a computer system is only as fast as its slowest component It s the computer equivalent of the old truism that a chain is only as strong as its weakest link For a simple demonstration of this concept consider what happens when you print a word processing document on a slow printer Your word processing program reads the data from disk and sends it to the printer Then you sit and wait while the printer prints the document Would buying a faster CPU or adding more memory make the document print faster No The CPU is already much faster than the printer and your computer already has more than enough memory to print the document The printer itself is the bottleneck so the only way to print t
439. rnet server See www slackware com for more information All distributions of Linux include the same core components the Linux kernel an X server popular windows managers such as GNOME and KDE compilers and Internet programs such as Apache and Sendmail However not all Linux distributions are created equal The manufacturer of each distribution creates its own installation and configuration programs to install and configure Linux The installation program is what makes or breaks a Linux distribution All the distributions I list in this section have easy to use installation programs that automatically detect the hardware present on your computer and con figure Linux to work with that hardware eliminating most if not all manual Chapter 25 Networking with Linux 355 configuration chores The installation programs also let you select the Linux packages you want to install and let you set up one or more user accounts besides the root account Installing Linux ar ar All the Linux distributions I describe in the section Choosing a Linux Distribution earlier in this chapter include an installation program that simplifies the task of installing Linux on your computer The installation pro gram asks you a series of questions about your hardware what components of Linux you want to install and how you want to configure certain features Then it copies the appropriate files to your hard drive and configures your Lin
440. rol The network administrator doesn t have to be a technical genius In fact some of the best network administrators are complete idiots when it comes to technical stuff What s important is that the administrator is organized That person s job is to make sure that plenty of space is available on the file server that the file server is backed up regularly that new employees can access the network and other tasks The network administrator s job also includes solving basic problems that the users themselves can t solve and knowing when to call in an expert when something really bad happens It s a tough job but somebody s got to do it Here are a few tips that might help Part IV of this book is devoted entirely to the hapless network adminis trator So if you re nominated read the chapters in that part If you re lucky enough that someone else is nominated celebrate by buying her a copy of this book In small companies picking the network administrator by drawing straws is common The person who draws the shortest straw loses and becomes administrator 1 Of course the network administrator can t be a complete technical idiot I was lying about that For those of you in Congress the word is testify ing exaggerated to make the point that organizational skills are more important than technical skills The network administrator needs to know how to do various maintenance tasks Although this knowledge r
441. roperties dialog box for a hard drive shows the drive s total capac ity and the amount of free space available on the drive PC ss Figure 4 2 The System window for a computer running Windows 7 with 2GB of RAM TE Chapter 4 Planning Your Network 1 Which software is used on the computer Microsoft Office QuickBooks AutoCAD Make a complete list and include version numbers Type Local Disk File system NTFS Drive I Compress this drive to save disk space IF Allow files on this drive to have content file properties Ey Used space 74771001124 bytes BGE E Sree space 9 000 909 12 bytes 0 94 GD Capacity 17 072 910 335 byles 15 8 GB Disk Cleanup s indexed in adcition to aK tonat Control Panel Home Device Manager 3 Remote settings System protection Advanced system settings See alco Action Center Windows Update Performance Information and Tools Control Panel System and Security System View basic information about your computer Windows edition Windows 7 Ultimate Copyright 2009 Microsoft Corporation All rights reserved System Rating 0 Windows Experience Index Processor Intel R Pentium R 4 CPU 4 00GH7 3 00 GHz Installed memory RAM 2 00 GB System type 32 bit Operating System Pen and Touch No Pen or Touch Input is available tor this Display Computer name domain and workgroup
442. roperties dialog box Adjust the settings and then click OK The TCP IP Properties dialog box as shown in Figure 8 4 lets you choose from these options e Obtain an IP Address Automatically Choose this option if your network has a DHCP server that assigns IP addresses automati cally Choosing this option drastically simplifies the administering of TCP IP on your network See Chapter 6 for more information about DHCP Use the Following IP Address If your computer must have a specific IP address choose this option and then type the computer s IP address subnet mask and default gateway address For more information about these settings see Chapter 6 Obtain DNS Server Address Automatically The DHCP server can also provide the address of the Domain Name System DNS server that the computer should use Choose this option if your network has a DHCP server See Chapter 6 for more information about DNS 155 56 Partit Building Your Own Network aay Figure 8 4 Configuring TCP IP Ee e Use the Following DNS Server Addresses Choose this option if a DNS server isn t available Then type the IP address of the primary and secondary DNS servers internet Protocol CPAP Properties wey General Atemate Configuration You can get IP settings assigned aitomaticaly it your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Dbtoin an IP
443. router and you can t remember the IP address run the IP CONFIG command at a command prompt from any computer on the network The default gateway IP address should be the IP address of the access point Basic configuration options Figure 9 4 shows the main configuration screen for a typical wireless access point router I called up this configuration page by entering 192 168 1 1 in the address bar of a Web browser and then supplying the logon password when I was prompted This configuration page offers the following configuration options that are related to the wireless access point functions of the device Although these options are specific to this particular device most access points have similar configuration options Enable Disable Enables or disables the device s wireless access point functions 1 SSID The Service Set Identifier used to identify the network Most access points have well known defaults You can talk yourself into thinking that your network is more secure by changing the SSID from the default to something more obscure but in reality that protects you only from first grade hackers By the time most hackers get into the second grade they know that even the most obscure SSID is easy to get around I recommend that you leave the SSID at the default and apply better security measures as described in Chapter 10 178 Partit Building Your Own Network o 5 Le hepp 1192 168 1 1 Windows Internet
444. rs and other devices on your network This is where the concept of logical addressing comes in a logical address gives a network device a place where it can be accessed on the network using an address that you assign Logical addresses are created and used by Network Layer protocols such as IP or IPX The Network Layer protocol translates logical addresses to MAC addresses For example if you use IP as the Network Layer protocol devices on the network are assigned IP addresses such as 207 120 67 30 Because the IP pro tocol must use a Data Link Layer protocol to actually send packets to devices IP must know how to translate the IP address of a device into the correct MAC address for the device You can use the ipconfig command to see the IP address of your computer The IP address shown in that figure is 192 168 1 100 Another important function of the Network layer is routing finding an appropriate path through the network Routing comes into play when a computer on one network needs to send a packet to a computer on another network In this case a Network Layer device called a router forwards the packet to the destination network An important feature of routers is that they can be used to connect networks that use different Layer 2 protocols For example a router can be used to connect a local area network that uses Ethernet to a wide area network that runs on a different set of low level pro tocols such as T1 Layer 4 The T
445. rs lel x Action View Help ep Alm FORKED cslibRiSearae Active Directory Users and Comput Name Type Description l E D Saved Queries SB Account Ope Security Group Members can administer d E Fj LoweWriter pri Rauminisuators Seusity Group Admin strators have compl ag uit R Backup Oper Security Group Backup Operators can ov ic GR Certificate S Security Group Members of this group are Ss Sa teen Contes SR cryptographi Secunty Group Members are authorized t a PEA R bismibuted C seaunty Group Members are allowed to la i z K Fvent log Re Searity Group Members of this group ca amp Guests Senrity Group Guests have the same arr Sns_tusrs Security Group Built in group used by Int BR Incoming For Security Group Members of this group ca SR Network Con Security Group Members in thie group can BR Performance Security Group Members of this group ma BR Performance Security Group Members of this group ca BR Pre Windows Security Group A backward compatibility B2 Print Operators Security Group Members can administer d BW Remote Desk Seusity Group Members in this group are BR Repicator Seusily Group Supports file replication in BA server Oper Security Group Members can administer d Terminal Ser Security Group Members of this group ca a S users seasity Group Users are prevente
446. rt venies e Z internet Protected Mode On Rix gt SS Using a Virtual Private Network The term virtual private network or VPN refers to several different types of secure forms of Internet communication In this chapter a VPN is a secure channel between a remote computer and a local network This type of VPN enables you to log on to your company network from your home computer Then you can access any resource on your company network as though 232 Part Ill Getting Connected you were using a computer that s physically connected to the company net work In other words the VPN extends the reach of the company network to include your home computer The security mechanism that makes this magic work is the Internet protocol known as IPSec The details of how IPSec works are way beyond the scope of this humble little book Suffice it to say that IPSec encrypts all the Internet traffic related to the VPN This encryption effectively creates a secret tunnel between the office network and your home computer Thus the VPN connec tion is secure Although the VPN connection itself is secure the computer that the VPN con nects to may not be Using a VPN with your home computer is analogous to taking your computer to work and plugging it in to the network If your com puter is already infected with a virus you run the very real risk of letting that virus loose on your corporate network As a result you must be certain t
447. rtitions and indicate the mount point for each partition For more information about disk partitions see the sidebar I can t see my C drive earlier in this chapter 356 Part VI Beyond Windows ar Linux is happy to share your hard drive with another operating system such as Windows However you may have to repartition your disk to install Linux without erasing your existing operating system If you need to repartition your hard drive I recommend you pick up a copy of PowerQuest s PartitionMagic www symantec com norton partition magic or a similar partitioning program which will allow you to juggle your partitions without losing your existing operating system Decide which optional Linux packages to install along with the Linux kernel ay e If you have enough drive space install all the packages that come with your distribution That way if you decide you need to use a package you won t have to figure out how to install the package outside of the installation program e If you re tight on space make sure that you at least install the basic network and Internet server packages including Apache Sendmail FTP and Samba Set the password for the root account In most distributions you choose whether to create at least one user account ay Create at least one user account during installation so you can log on to Linux as a user not with the root account As a user you can experi ment with Linux com
448. run cable across the floor where people walk cover the cable so no one trips over it Cable protectors are available at most hardware stores When running cables through walls label each cable at both ends Most electrical supply stores carry pads of cable labels that are perfect for the job These pads contain 50 sheets or so of precut labels with letters and numbers They look much more professional than wrapping a loop of masking tape around the cable and writing on the tape with a marker Alternatively you can just write directly on the label with a permanent marker Chapter 5 Cables Adapters and Other Stuff 8 7 ar If you re installing cable in new construction label each end of the cable at least three times leaving about a foot of space between the labels The drywallers or painters will probably spray mud or paint all over your cables making the labels difficult to find 1 When several cables come together tie them with plastic cable ties Avoid masking tape if you can the tape doesn t last but the sticky glue stuff does It s a mess a year later Cable ties are available at electrical supply stores ay Cable ties have all sorts of useful purposes Once on a backpacking trip I used a pair of cable ties to attach an unsuspecting buddy s hat toa high tree limb He wasn t impressed with my innovative use of the cable ties but my other hiking companions were 1 When you run cable above suspended ceiling p
449. runs in Open a command shell directly in GNOME by choosing Main Menu System ToolsTerminal This opens a command shell in a window on the GNOME desktop as shown in Figure 25 3 Because this shell runs within the user account GNOME is logged in as you don t have to log on You just start typing commands When you re done type Exit to close the window Doug localhost File Edit View Terminal Tabs Help Doug localhost F Figure 25 3 Using a Terminal window to run Linux commands Managing User Accounts One of the most common network administration tasks is adding a user account The Setup program may create a single user account for you when you first install Linux But you ll probably need to create more Linux user accounts Chapter 25 Networking with Linux 36 Each Linux user account has the following information associated with it 1 Username The name the user types to log on to the Linux system Full name The user s full name Home directory The directory in which the user will be placed when he or she logs in In Fedora Linux the default home directory is home username For example if the username is blowe the home directory is home blowe Shell The program used to process Linux commands Several shell programs are available In most distributions the default shell is bin bash Group You can create group accounts which make it easy to apply identical access rights to groups of
450. rver side indudes i E Health and Diagnostics V HTTP Logana Logaing Tools V Request Monitor C Trading Custom Logging 08 Loagna zi Chapter 12 Creating an Intranet 20 7 208 Part Ill Getting Connected are A Webless intranet The correct way to set up a proper intranet is to set up a Windows based server running IIS or a Linux based server running Apache or some other Web server However you can create a rudimentary intranet without going to the trouble of setting up an actual Web server Here s how 1 Setup a share on a file server that will hold the HTML files that make up your intranet 2 Create an HTML file for the home page of your intranet and save the file in the loca tion you create in Step 1 recommend that you name it index html 3 Create any other HTML files that your intranet needs The index html file should include links to these pages 4 Point your Web browser to the index htm1 file at the shared network location For example if the server is named iserver and the share is named intranet enter this information into your browser s address box Viserver intranet index html Voil you have an instant intranet without the fuss of a Web server This rudimentary intranet works without a Web server because a Web browser can display HTML files directly without the need for a Web server However without a Web server your intranet is limited
451. s 1 If your network has an OS X Server you can use the Windows client soft ware that comes with OS X Server to connect any version of Windows to the server Doing so enables Windows users to access the files and printers on the Macintosh server 3 76 Part VI Beyond Windows ING s ar The server versions of Windows include a feature called Services for Macintosh that allows Macintosh computers to access files and printers managed by the Windows servers without installing special client software on the Macintosh computers If you use NetWare you must purchase separate NetWare client software for your Macintosh computers After you install this client software the Macs can access files and printers managed by your NetWare servers The biggest complication that occurs when you mix Macintosh and Windows computers on the same network is that the Mac OS and Windows have slightly different rules for naming files For example Macintosh filenames are limited to 31 characters but Windows file names can be up to 255 characters Although a Macintosh filename can include any characters other than a colon Windows filenames can t include backslashes greater than or less than signs and a few other oddball characters The best way to avoid filename problems is to stick with short names under 31 characters and limit your filenames to letters numbers and common symbols such as the hyphen or pound sign Although you can transl
452. s These addresses aren t assigned to clients For more information see the section Feeling excluded later in this chapter One or more reserved addresses These addresses are always assigned to particular host devices For more information see the section Reservations suggested later in this chapter 1 The lease duration which indicates how long the host is allowed to use the IP address The client attempts to renew the lease when half of the lease duration has elapsed For example if you specify a lease duration of eight days the client attempts to renew the lease after four days have passed The host then has plenty of time to renew the lease before the address is reassigned to some other host 120 Part it Building Your Own Network ar The router address for the subnet This value is also known as the default gateway address The domain name and the IP address of the network s DNS servers and WINS servers Feeling excluded Everyone feels excluded once in a while With a wife and three daughters I know how that feels Sometimes however being excluded is a good thing In the case of DHCP scopes exclusions can help you to prevent IP address conflicts and can enable you to divide the DHCP workload for a single subnet among two or more DHCP servers An exclusion is a range of addresses not included in a scope but falling within the range of the scope s starting and ending addresses In effect
453. s c c escesscsesns essdedecaveevsneseseeedeevanasceseneeaneeveee 363 Doing th Samba Dance c e2s scvcssaderscseacessdes cguecea r AE Ene EE rI Erast 365 Understanding Sam D ri oriin EERE RS ASEE EENE 365 Installing Samba sisien a a a n es 366 Starting and stopping Samba ccceccecsseescesseesseeseceseeeseeeeeesseesees 367 Using the Samba Server Configuration toOl cccccseeseeseeeteeeees 368 Chapter 26 Macintosh Networking 00eee eee 371 What You Need to Know to Hook Up a Macintosh Network 371 Mac networking protocols ss cise sciccciiiestssetiedscetaescseas ecascdeoscatienscavae 371 Mac OS X Servet seiorn oeeo sieeaisactuiveseecvtelexevavisxecteictens 372 What You Need to Know to Use a Macintosh Network ce eeeeeeeees 372 Configuring a Mac for networking cecceceeseeseeseeeeeeeeeeeeeeeseeseens 373 ACCeSSing a NetWork PViNteN eis ce stevescsocssiccdseeseseseeeseieeveessnciecteceree s 374 Sharing files with other US YS c ccscssccssesseeseeeeeceeeeeceseeeeeseeaeens 374 Accessing shared files i 3 ciescscseteseiticatetcseavteneseeteons eticssceseavtaeseavs 375 What You Need to Know to Network Macintoshes with PCs 375 Part VII The Part of Tens ccccccccccccccccssctscccseeccseccseece 377 Chapter 27 More Than Ten Big Network Mistakes 379 SKIMPIN GON CADIS miraire ae aaee E E E a EE EEEIEE ERAS 380 Turning Off or Restarting a Ser
454. s select the Windows File Server group which installs the Samba packages for you One sure way to render a Samba installation absolutely useless is to enable the default Linux firewall settings on the computer that runs Samba The Linux firewall is designed to prevent users from accessing network services such as Samba It s designed to be used between the Internet and your local net work not between Samba and your local network Although it s possible to configure the firewall to allow access to Samba only to your Internal network a much better option is to run the firewall on a separate computer That way the firewall computer can concentrate on being a firewall and the file server computer can concentrate on serving up files Starting and stopping Samba Before you can use Samba you must start its two daemons smbd and nmbd Both can be started at once by starting the smb service Daemon is a Linux term that s equivalent to a Windows service From a command shell use this command service smb start Whenever you make a configuration change such as adding a new share or a creating a new Samba user you should stop and restart the service with these commands service smb restart If you prefer you can stop and start the service with separate commands service smb stop service smb start If you re not sure that Samba is running enter this command service smb status You ll get a message indicating whether the smbd and
455. s Networking 13 ANG O To install this type of card you need to take your computer apart so use this type of card only if you have the expertise and the nerves to dig into your computer s guts 1 A wireless USB adapter is a separate box that plugs into a USB port on your computer Because the USB adapter is a separate device it takes up extra desk space However you can install it without taking apart your computer 1 A wireless PC card is designed to slide into the PC card slot found in MBER RY most notebook computers x This card is the type to get if you want to network your notebook You can purchase a combination 802 11b g PCI adapter for under 50 USB versions cost about 10 more ay At first you may think that wireless network adapters are prohibitively expensive After all you can buy a regular Ethernet adapter for as little as 20 However when you consider that you don t have to purchase and install cable to use a wireless adapter the price of wireless networking becomes more pal atable And if you shop around you can sometimes find wireless adapters for as little as 19 95 Wireless Access Points Unlike cabled networks wireless networks don t need a hub or switch If all you want to do is network a group of wireless computers you just purchase a wireless adapter for each computer put them all within 300 feet of each other and voila instant network What if you already have an existi
456. s Web serv ers or e mail servers Linux can also be used as a firewall or as a file and print server on your local area network Linux was created in 1991 by Linus Torvalds who was at the time an under graduate student at the University of Helsinki in Finland Linus thought it d be fun to create his own operating system based on Unix for his brand new PC In the nearly two decades since Linux was first conceived Linux has become a full featured operating system that is fast and reliable This chapter shows the basics of setting up a Linux server on your network and using it as a file server as a Web server for the Internet or an intranet as an e mail server and as a router and firewall to help connect your network to the Internet Linux is a complicated operating system Understanding how to use it can be a daunting task especially if your only prior computer experience is with Windows Wiley Publishing Inc has For Dummies books that make Linux less painful Check out Linux For Dummies 9th Edition by Richard Blum Wiley Comparing Linux with Windows If your only computer experience is with Windows you re in for a steep learning curve when you first get into Linux There are many fundamental differences between the Linux operating system and Windows Here are some of the more important differences 352 Part VI Beyond Windows 1 Linux is a multiuser operating system Therefore more than one user can log o
457. s done the tape s ejected The whole thing takes about 30 seconds Because the maintenance requirements of each drive differ check the drive s user s manual to find out how and how often to clean the drive As a general rule clean the drives once a week The most annoying aspect of tape drive cleaning is that the cleaning cartridges have a limited lifespan Unfortunately if you insert a used up cleaning car tridge the drive accepts it and pretends to clean the drive For this reason keep track of the number of times you ve used the cleaning cartridge and replace it when you ve exceeded the number of uses recommended by the manufacturer Backup Security Backups create an often overlooked security exposure for your network No matter how carefully you set up user accounts and enforce password policies if any user including a guest can perform a backup of the system that user may make an unauthorized backup In addition your backup tapes themselves are vulnerable to theft As a result you should make sure that your backup policies and procedures are secure by taking the following measures Set up a user account for the user who does backups Because this user account has backup permission for the entire server guard its password carefully Anyone who knows the username and password of the backup account can log on and bypass any security restrictions that you place on that user s normal user ID You can counter pot
458. s double as Ethernet hubs or switches In that case the access point will have more than one RJ 45 port In addition some access points include broadband cable or DSL firewall routers that enable you to connect to the Internet An 802 11b wireless access point that lets me connect a notebook com puter and a computer located on the other side of the house because I didn t want to run cable through the attic A 4port 10 100 MHz switch to which I can connect up to four computers by using twisted pair cable 1 A DSL cable router that I connect to my cable modem This enables all the computers on the network cabled and wireless to access the Internet w A multifunction access point that s designed to serve as an Internet gateway for home networks sometimes is a residential gateway Roaming You can use two or more wireless access points to create a large wireless network in which computer users can roam from area to area and stay con nected to the wireless network As the user moves out of the range of one access point another access point automatically picks up the user and takes over without interrupting the user s network service To set up two or more access points for roaming you must carefully place the WAPs so that all areas of the office or building that are being networked are in range of at least one of the WAPs Then just make sure that all the com puters and the access points use the same SSID and channel 176 Parti
459. s have better built in network ing features than older Macintosh computers The newest Macs include built in gigabit Ethernet adapters and sophisticated networking support built in to the operating system similar to the networking features that come with Windows Network support is built in so you don t have to fuss with installing and configuring the network 3 72 Part VI Beyond Windows Originally Macintosh computers used a set of networking protocols collec tively known as AppleTalk In the mid 1990 s AppleTalk was supplanted by a networking scheme called Open Transport The current generation of Macintosh computers use industry standard TCP IP networking The only protocol left over from the AppleTalk days that is still in widespread use is AFP used to enable file sharing For a brief explana tion of this protocol see the sidebar Who s winning in the AFP West Mac OS X Server Apple offers a dedicated network operating system known as Mac OS X Server the X is pronounced Ten not Ex which is designed for PowerMac G3 or later computers Mac OS X Server is based on a Unix operating system kernel known as Mach Mac OS X Server can handle many network server tasks as efficiently as any other network operating system including Windows 2000 NetWare and Unix Mac OS X Server is the server version of the Mac OS X operating system which is the current operating system version for client Macintosh com
460. s probably just about as hard to guess I probably wouldn t want the folks at the Los Alamos Nuclear Laboratory using this scheme but it s good enough for most of us Here are additional thoughts on concocting passwords from your favorite book If the words end up being the same pick another word And pick different words if the combination seems too commonplace such as WestWind or FootBall For an interesting variation insert a couple of numerals or special char acters between the words You end up with passwords like into cat bal13 and or tree47wing If you want use the page number of the second word as a separator For example if the words are know and click and the second word comes from page 435 use know435click To further confuse your friends and enemies use medieval passwords by picking words from Chaucer s Canterbury Tales Chaucer is a great source for passwords because he lived before the days of word processors with spell checkers He wrote seyd instead of said gret instead of great welk instead of walked litel instead of little And he used lots of seven letter and eight letter words suitable for passwords such as glofenye gluttony benygne benign and opynyoun opinion And he got A s in English If you use any of these password schemes and someone breaks into your network don t blame me You re the one who s too lazy to memorize D ScSh4 bb3xaz5 If you do decide to go with passwords such as K
461. s such as contact lists appointment calendars and e mail A typical PDA has a full albeit small QWERTY keyboard and a relatively large display PDAs can also have phone capabilities PocketPC A PocketPC is a very specific type of handheld that meets a set of specifications published by Microsoft PocketPCs use a touch screen so they often do not include a separate keyboard PocketPCs run the mobile version of Windows known as Windows Mobile BlackBerry BlackBerry devices are sophisticated PDAs made by Research In Motion RIM with cellphone capabilities The most distinctive feature of BlackBerrys is their ability to synchronize with Exchange e mail servers to provide instant access to your corporate e mail Typically this synchro nization requires a special server called BlackBerry Enterprise Server BES running on the corporate network BlackBerry devices use a proprietary operating system developed by RIM Chapter 14 Dealing with Mobile Devices 223 iPhone iPhone devices are made by Apple and at least for now oper ate only with ATT wireless networks Like a BlackBerry an iPhone is an advanced PDA device However iPhones have two distinguishing fea tures that set them apart from other mobile devices First they have no keyboard Instead they rely on a touch sensitive screen for input And second the iPhone has a remarkably easy to use interface designed by the gurus at Apple who seem to know better than anyone else how t
462. s that are common to most Windows network operating systems However many servers require other services 296 Part IV Network Management For Dummies File Action View Help 9 cs hm gt gt aun Sh Services Local Services Local Select an item to view its descriptinn Name s Description Status Startup Type LogOnAs ActiveX Installer Provides Us Manual Local Syste _ lt Adaptive Brightness Monitors a Manual Local Service Gh Application Experi Processes a Started Manual Local Syste Application Identity Determines Manual Local Service Application Intor Facilitates t Started Manual Local Syste 4 Application Layer Provides su Manual Local Service Application Mana Processes in Manuel Local Syste Background Intelli Transfers fil Manual Local Syste Base Filtering Engi The Base Fil Started Automatic Local Service BitLocker Drive En BDESVC hos Manual Local Syste Sh Block Level Backu The WBENG Manual Local Syste Bluetooth Support The Bluetoo Manual Local Service BranchCache This service w Manual Network S Certificate Propag Copies user Manual Local Syste s CNG Key kolation The CNG ke Manual Local Syste COM Event Syst Supports Sy Started Automatic Local Service es O COM gt System Ap Manages th Manual Local Syste Computer Browser Maintains a Started Manual Local Syste Figure 20
463. s this program by choosing Main Menu System Settings Network Most other Linux distributions have similar programs Chapter 25 Networking with Linux 363 The Network Configuration program lets you configure the basic TCP IP settings for a network interface by pointing and clicking your way through tabbed windows You can call up this program by choosing System Administration Network Figure 25 5 shows the Network Configuration program in action S Network Configuration fle Profle Help Q dy New tdit Copy Activate Deactivate Devices Hardware DNS Hosts J4 You may configure network devices associated with a physical hardware here Multiple logical devices can be associated with a single piece of hardware Profile Status Device Nickname Type n amp Inactive W pano pano Ethernet Figure 25 5 The Network Configur ation program m AC UVE Profile Common Notice that the main window of the Network Configuration lists all the network interfaces installed in your computer You can select any of the interfaces and click Edit to bring up a window similar to the one shown in Figure 25 6 This window lets you set the configuration options for the network interface such as its IP address and other TCP IP configuration information Restarting your network Whenever you make a configuration change to your network you must restart the Linux networking services before the change can take effect If you fi
464. s to justify the expense of an entire T1 or T3 line you can lease just a portion of the line With a fractional TI line you can get connections with speeds of 128 Kbps to 768 Kbps and with a fractional T3 line you can choose speeds ranging from 4 6 Mbps to 32 Mbps Setting up a T1 or T3 connection to the Internet is stuff best left to profes sionals Getting this type of connection to work is far more complicated than setting up a basic LAN local area network You may be wondering whether T1 or T3 lines are really any faster than cable or DSL connections After all T1 runs at 1 544 Mbps and T3 runs at 44 184 Mbps and cable and DSL claim to run at comparable speeds But there are many dif ferences that justify the substantial extra cost of a T1 or T3 line In particular a T1 or T3 line is a dedicated line not shared by any other users T1 and T3 are higher quality connections so you actually get the 1 544 or 44 184 connection speeds In contrast both cable and DSL connections usually run at substantially less than their advertised maximum speeds because of poor quality connections and because the connections are often shared with other users Shaving an Internet connection After you choose a method to connect to the Internet you can turn your attention to setting up the connection so that more than one user on your network can share it The best way to do that is by using a separate device called a router An inexpensive router fo
465. s writers are constantly developing new viruses your antivirus software is next to worthless unless you keep it up to date by downloading the latest updates The following are several approaches to deploying antivirus protection on your network You can install antivirus software on each network user s computer This technique would be the most effective if you could count on all your users to keep their antivirus software up to date Because that s an unlikely proposition you may want to adopt a more reliable approach to virus protection Managed antivirus services place antivirus client software on each client computer in your network Then an antivirus server automatically updates the clients on a regular basis to make sure that they re kept up to date 1 Server based antivirus software protects your network servers from viruses For example you can install antivirus software on your mail server to scan all incoming mail for viruses and remove them before your network users ever see them Some firewall appliances include antivirus enforcement checks that don t allow your users to access the Internet unless their antivirus software is up to date This type of firewall provides the best antivirus protection available Safe computing Besides using an antivirus program you can take a few additional precau tions to ensure virus free computing If you haven t talked to your kids about these safe computing practices you had
466. sand strains of viruses Many of them have colorful names such as the I Love You virus the Stoned virus and the Michelangelo virus Antivirus programs can recognize known viruses and remove them from your system and they can spot the telltale signs of unknown viruses Unfortunately the idiots who write viruses aren t idiots in the intellectual sense so they re constantly developing new techniques to evade detection by antivirus programs New viruses are frequently discovered and anti virus programs are periodically updated to detect and remove them Antivirus programs The best way to protect your network from virus infection is to use an anti virus program These programs have a catalog of several thousand known viruses that they can detect and remove In addition they can spot the types of changes that viruses typically make to your computer s files thus decreas ing the likelihood that some previously unknown virus will go undetected Chapter 24 Hardening Your Network 345 Itd be nice if Windows came with built in antivirus software but alas it does not So you have to purchase a program on your own The three best known antivirus programs for Windows are Norton AntiVirus by Symantec McAfee s VirusScan and Trend Micro s OfficeScan The people who make antivirus programs have their fingers on the pulse of the virus world and often release updates to their software to combat the latest viruses Because viru
467. seful information comes from the logs You can schedule logging to occur at certain times of the day and for certain intervals For example you may schedule the log to gather data every 15 seconds from 9 00 to 9 30 every morning and then again from 3 00 to 3 30 every afternoon Even if you don t have a performance problem now you should set up performance logging and let it run for a few weeks to gather baseline data If you develop a problem this baseline data will prove invaluable while you research the problem Don t leave performance logging on all the time Gathering perfor mance data slows down your server Use it only occasionally to gather baseline data or when you re experiencing a performance problem 286 Part IV Network Management For Dummies More Performance Tips Here are a few last minute performance tips that barely made it in You can often find the source of a slow network by staring at the net work hubs or switches for a few minutes These devices have colorful arrays of green and red lights The green lights flash whenever data is transmitted the red lights flash when a collision occurs An occasional red flash is normal but if one or more of the red lights is flashing repeatedly the network interface card NIC connected to that port may be faulty Check for scheduled tasks such as backups batched database updates or report jobs If at all possible schedule these tasks to run after normal busin
468. server you can choose Start Administrative Tools Server Manager to bring up the Server Manager page as shown in Figure 7 3 As you can see this page also provides links that let you add roles or features 148 Partit Building Your Own Network T Figure 7 3 The Server Manager page Eserver manager n e acion view Hep 1 esmu DES g Features E ja Discnostcs A Vien the health of the roles installed on your server and add or remove roles and features gid Configuration d m E3 storace Roles Summary 2l Roles Summer y Help A Roles 0 of 17 installed B Add Roles iS Remove Roles 4 mal C Last Refresh 12 10 2007 8 45 47 PM Configure refresh The following procedure describes how to install server roles The procedure for installing server features is similar 1 Click the Add Roles link either on the Server Manager page or the Initial Server Configuration Tasks page Either way the Add Roles Wizard appears 2 Click Next The Select Server Roles page as shown in Figure 7 4 appears This page lets you select one or more roles to add to your server 3 Select one or more roles to install You can click each role to display a brief description of the role For exam ple if you click the File Services role the following text is displayed File Services provides technologies that help you manage storage enable file replication manage shared folders ensure fast file searching an
469. server is a client You have to remember this term too Write it on the back of your right hand Only two kinds of computers are on a network servers and clients Look at your left hand and then look at your right hand Don t wash your hands until you memorize these terms The distinction between servers and clients in a network has parallels in sociology in effect a sort of class distinction between the haves and have nots of computer resources Usually the most powerful and expensive computers in a network are the servers There s a good technical reason Every user on the network shares the server s resources The cheaper and less powerful computers in a network are the clients Clients are the computers used by individual users for everyday work Because clients resources don t have to be shared they don t have to be as fancy Most networks have more clients than servers For example a network with ten clients can probably get by with one server Chapter 1 Networks Will Not Take Over the World and Other Network Basics In many networks a clean line of demarcation exists between servers and clients In other words a computer functions as either a server or a client and not both For the sake of an efficient network a server can t become a client nor can a client become a server Other usually smaller networks can be more evenhanded by allowing any computer in the network to be a server and
470. settings Computer name WINT Full computer name WIN7 Computer description ss seor Control Panet pl m Change settings 68 Part Il Building Your Own Network e Figure 4 3 Displaying system information EE Programs that gather information for you Gathering information about your computers is a lot of work if you have more than a few computers to network Fortunately several available software programs can automatically gather the information for you These programs inspect various aspects of a computer such as the CPU type and speed amount of RAM and size of the computer s hard drives Then they show the information on the screen and give you the option of saving the information to a hard drive file or printing it Windows comes with just such a program Microsoft System Information This program gathers and prints information about your computer You can start Microsoft System Information by choosing Start All Programs Accessories System Tools System Information When you fire up Microsoft System Information you see the window shown in Figure 4 3 which displays basic information about your computer such as your version of Microsoft Windows the processor type the amount of memory on the computer and the free space on each of the computer s hard drives You can obtain more detailed information by clicking any of the following options on the left side of the window Ha
471. sn t seem to fix the problem you may need to turn your computer off all the way and then turn it on again To do so follow Steps 1 3 in the previous steps Choose the Shut Down option rather than the Restart option and then click OK Depending on your computer Windows either turns off your computer or displays a message stating that you can now Safely turn off your computer If Windows doesn t turn off the computer for you flip the On Off switch to turn off your computer Wait a minute or so and then turn the computer back on Most newer computers don t immediately shut themselves off when you press the power button Instead you must hold down the power button for a few seconds to turn off the power This precaution is designed to prevent you from accidentally powering down your computer NING RY RY NING Chapter 20 Solving Network Problems 295 Here are a few techniques to try if you have trouble restarting your computer If your computer refuses to respond to the Start Shut Down command try pressing Ctrl Alt Delete the three finger salute It s appropriate to say Queueue while you do it When you press Ctrl Alt Delete Windows 9x and later versions attempt to display a dialog box from which you can close any running pro grams or shut down your computer entirely Unfortunately sometimes Windows 9x becomes so confused that it can t display the Restart dialog box in which case pressing Ctrl Alt De
472. sssiicasonsessteasesvetioe 286 Chapter 20 Solving Network Problems 0055 287 When Bad Things Happen to Good ComputeVS scesseeceeseeteeteereeeees 288 How to Fix De d Computers sristi rae r ina rii er e raia 289 Ways to Check a Network Connection cccecscesseeseeeeeeeeseesseeseeeeees 290 A Bunch of Error Messages Just Flew By 0 eeceseeseceteceteeeteeeeeeeneeanees 291 Double Check Your Network Settings cccccccssesssesssesseceseeseeseeeseeeeees 292 Time to Experiments e 0 s fesdadscdacecssicanciysieter dle setae erti dedi due sednade aereas 292 WHO S Oni PUTS oe ccccc vege tazc dada ce shee E a 293 How to Restart a Client Computer eee eeceseceseeseeeeeenseeseeeseeeseeeseees 293 How to Restart Network Services ccscsssssesseeseeseeseeseeseceeeeeseeseeaeeaeens 295 How to Restart a Network Server c ccscessesseeeeeseeseeseeseceeeeceseeeeeseeaeeas 297 Looking at Event LOGS 35 seesinane eei i i eris 298 Document Your Trials and Tribulations cccesceesseceseesseeeeeessnees 299 Chapter 21 How to Stay on Top of Your Network and Keep Its Users Off Your Back 00ee eee eee 301 Train Your Users oerinoar EE TEASE E TEE 301 Organize a LIDLArY oriire eE EE R 302 Keep Up with the Computer INdUSI Y iesiisesiisrrisiraisrin rrisni 303 Remember That the Guru Needs a Guru ssssssssseesssesesesersrsssersrsessrsssrssse 304 Spew Helpful Bluffs and EXCUSES si
473. sssissiosiisasscrnisissrsrrsirirrirns 304 Part V Protecting Vour NetWork 3OT Chapter 22 Backing Up Your Data 0 20eeeeeeeee 309 Backing Up Y Our Data eacee esinen an Eein aa EE 309 All about Tapes and Tape Drive 00 eeeceeseeseeseeseeeeeeeeeceseeteeeeeeenneeaeees 310 BACKUP SOL Wal Serien toen n E A AT COTAS oud Soe 311 Wy P srOb BaCk ups assisterenden a aae R E E E Eni a RiR 312 Normal ackups seeria ccceessagaae eeaeee aaea EARE EKRE REEERE RE 313 Copy DACKUPS iasi csses scesdeessceiesyseics rniii teiner ns ieir ERSS 314 Daly Dackups errien ea epee o PESE neeesa 314 Incremental DACKUpS eisecss54550554 onone n N R 314 Differential DACKUPS ccsccssccsscssesssesssesseseesesessaessaeessessneessessnes 315 Table of Contents Local versus Network Backup6 cccccccsseesseeeeseeeeseeeeseeceseeesseeesssessnees 316 How Many Sets of Backups Should You Keep ccccccesesseesseeseeseees 317 A Word about Tape Reliability ccc ccececeessceeeseeeesneeeseeeseessseeesaes 318 About Cleaning the Heads si sicessecssecissvescessdedeeeescdueassasveredsteavecsdeedacesaeeetives 319 Backup SQCUrity sser E E ET n S Eea Seliokoteaveetass 320 Chapter 23 Securing Your Network 0 00 eeeeeeee 321 Do You Need Security erian nar EE E E EENE 322 Two Approaches to S CUYLILY cc ccssssscsssseeseesseesseesscessecsscssnesseesseeesness 323 Physical Security Locking Your Doors c
474. t Control Panel The Control Panel appears 2 Double click the Network Connections icon The Network Connections folder appears as shown in Figure 8 1 W Network Connections ggg File Edit View Favorites Tools Advanced Help ae Q P Ph roses Fy Address network Connections vy Eo E A Name Type Status Device Name 8 LAN or High Speed Internet haat bh 1394 Connecton LAN of High speed Inter Connected Hrewaled 1394 Net Adapter Change Windows bloc Area Connection LAN or High Speed Inter Connected Frewaled Intel R PRO 100 VE Net Firewall settings See Also a D i Network v Troubleshooter Figure 8 1 Other Places a The g Control Panel Network E My Network Places Connections nets yg My Computer folder 3 vig Bi n 2 3 Right click the connection that you want to configure and then choose a Properties from the menu that appears You can also select the network connection and click Change Settings of This Connection in the task pane Either way the Properties dialog box for the network connection appears as shown in Figure 8 2 4 To configure the network adapter card settings click Configure This action summons the Properties dialog box for the network adapter as shown in Figure 8 3 This dialog box has five tabs that let you config ure the network interface card NIC e General This tab shows basic information about the NIC such as the device type and status For example the devi
475. t Building Your Own Network Two or more access points joined for the purposes of roaming along with all the wireless computers connected to any of the access points form an Extended Service Set or ESS The access points in the ESS are usually con nected to a wired network One current limitation of roaming is that each access point in an ESS must be on the same TCP IP subnet That way a computer that roams from one access point to another within the ESS retains the same IP address If the access points had a different subnet a roaming computer would have to change IP addresses when it moved from one access point to another Wireless bridging Another use for wireless access points is to bridge separate subnets that can t easily be connected by cable For example two office buildings may be only about 50 feet apart To run cable from one building to the other you d have to bury conduit a potentially expensive job Because the buildings are so close though you can probably connect them with a pair of wireless access points that function as a wireless bridge between the two networks Connect one of the access points to the first network and the other access point to the second network Then configure both access points to use the same SSID and channel Ad hoc networks A wireless access point isn t necessary to set up a wireless network Anytime two or more wireless devices come within range of each other they can link
476. t IV Network Management For Dummies Double Check Vour Network Settings Time I swear that little green men sneak into offices at night turn on computers and mess up TCP IP configuration settings just for kicks These little green men are affectionately known as networchons Remarkably network configuration settings sometimes get inadvertently changed so that a computer which enjoyed the network for months or even years one day can t access the network One of the first things you do after making sure that the computers are turned on and that the cables aren t broken is a basic review of the computer s network settings Check these items TCP IP settings At a command prompt run ipconfig to make sure that TCP IP is up and running on the computer and that the IP addresses subnet masks and default gateway settings look right Protocols Call up the network connection s Properties dialog box and make sure that the necessary protocols are installed correctly Computer name Open the System Properties dialog box double click the System icon in the Control Panel and check the Computer Name tab Make sure that the computer name is unique and that the domain or workgroup name is spelled properly Permissions Double check the user account to make sure that the user has permission to access the resources she needs to Experiment If you can t find an obvious explanation for your troubles the computer is unplugged f
477. t according to a set of rules that you set up If the packet passes the test it s allowed to pass If the packet doesn t pass it s rejected Packet filters are the least expensive type of firewall As a result packet filtering firewalls are very common However packet filtering has a number of flaws that knowledgeable hackers can exploit As a result packet filtering by itself doesn t make for a fully effective firewall Packet filters work by inspecting the source and destination IP and port addresses contained in each TCP IP packet TCP IP ports are numbers that are assigned to specific services that help to identify for which service each packet is intended For example the port number for the HTTP protocol is 80 As a result any incoming packets headed for an HTTP server will specify port 80 as the destination port Port numbers are often specified with a colon following an IP address For example the HTTP service on a server whose IP address is 192 168 10 133 would be 192 168 10 133 80 Literally thousands of established ports are in use Table 24 1 lists a few of the most popular ports 34 0 Part V Protecting Your Network Table 24 1 Some Well Known TCP IP Ports Port Description 20 File Transfer Protocol FTP 21 File Transfer Protocol FTP 22 Secure Shell Protocol SSH 23 Telnet 25 Simple Mail Transfer Protocol SMTP 53 Domain Name Server DNS 8
478. t nearly as popular as they once were Networks are changing everything all over again In a way it s a change back to the mainframe computer way of thinking central location distributed resources True the network isn t housed in the basement and doesn t have to be installed by a plumber But you can no longer think of your PC as your own You re part of a network and like the mainframe the network has to be carefully managed Here are several ways in which a network robs you of your independence You can t just indiscriminately delete files from the network They may not be yours You re forced to be concerned about network security For example a server computer has to know who you are before it allows you to access its files So you have to know your user ID and password to access the network This precaution prevents some 15 year old kid from hacking his way into your office network by using its Internet connection and stealing all your computer games You may have to wait for shared resources Just because Wally sends something to Ward s printer doesn t mean that it immediately starts to print The Beav may have sent a two hour print job before that Wally just has to wait You may have to wait for access to documents You may try to retrieve an Excel spreadsheet file from a network drive only to discover that someone else is using it Like Wally you just have to wait You don t have unli
479. t other network users can t access it follow Steps 1 3 in the preceding set of steps to open the Printer Properties dialog box Select the Do Not Share This Printer option and then click OK The hand disappears from the printer icon to indicate that the printer is no longer shared Shaving a printer in Windows Vista or Windows 7 To share a printer in Windows Vista or Windows 7 follow these steps 1 Click the Start button type Printers and press Enter The Printers folder appears Right click the printer that you want to share and choose Printer Properties The Properties dialog box for the printer appears Click the Sharing tab The Sharing tab appears as shown in Figure 3 9 Notice that the options for sharing the printer are disabled 4 Select the Share This Printer option 5 Optional Change the share name if you don t like the name sug gested by Windows Because other computers will use the share name to identify the shared printer pick a descriptive name Click OK You return to the Printers folder The icon for the printer is modified to indicate that it has been shared To take your shared printer off the network so that other network users can t access it follow Steps 1 7 in the preceding set of steps Deselect the Share This Printer check box and then click OK Chapter 3 More Ways to Use Your Network 53 6 lis wT Pinte amp eee General Shamo Pote Advanced Color
480. t to develop a naming scheme that identifies the computer s location For example a name such as C 305 1 may be assigned to the first computer in Room 305 of Building C Or MKTGO10 may be a computer in the Marketing department If the computer will join a domain you need to have access to an Administrator account on the domain unless the administrator has already created a com puter account on the domain Note that only Windows 2000 Windows XP and Windows Server NT 2000 and 2003 computers can join a domain Windows 98 or 95 users can access the domain s resources by logging on to the domain as users but domain computer accounts for Windows 9x clients aren t required When you install Windows on the client system the Setup program asks for the computer name and workstation or domain information You can change this information later if you want The procedure varies depending on whether you re using Windows XP Windows Vista or Windows 7 Configuring Windows XP computer identification To change the computer identification in Windows XP follow these steps 1 Open the Control Panel and double click the System icon to open the System Properties dialog box 2 Click the Computer Name tab The computer identification information is displayed 3 Click the Change button This step displays the Computer Name Changes dialog box as shown in Figure 8 8 4 Type the new computer name and then specify the workgroup or domain i
481. t your computer you have to log on again Logging off the network is a good idea if you re going to leave your computer unattended for a while As long as your computer is logged in to the network anyone can use it to access the network And because unauthorized users can access it under your user ID you get the blame for any damage they do In Windows you can log off the network by clicking the Start button and choosing the Log Off command This process logs you off the network without restarting Windows e In Windows XP you can reach this command directly from the Start menu e In Windows Vista click Start and then click the right facing arrow that appears next to the little padlock icon 4 0 Part I Let s Network Chapter 3 More Ways to Use Your Network In This Chapter Transforming your computer into a network server Sharing folders with network users Working in the Public Folder in Windows Vista and Windows 7 Sharing your printer Using Office on a network Working with files offline hapter 2 introduces you to the basics of using a network logging on accessing data on shared network folders printing and logging off In this chapter I go beyond these basics You ll find out how to turn your computer into a server that shares its own files and printers how to use one of the most popular network computer applications e mail and how to work with Office on a network Sharing Vour Stuff As y
482. talling network cable is the physical task of pulling the cable through ceilings walls and floors This job is just tricky enough that I recommend you don t attempt it yourself except for small offices For large jobs hire a professional cable installer You may even want to hire a profes sional for small jobs if the ceiling and wall spaces are difficult to access Keep these pointers in mind if you install cable yourself You can purchase twisted pair cable in prefabricated lengths such as 50 feet 75 feet and 100 feet You can also special order prefabricated cables in any length you need But attaching connectors to bulk cable isn t very difficult Use prefabricated cables only for very small networks and only when you don t need to route the cable through walls or ceilings Always use a bit more cable than you need especially if you re running cable through walls For example when you run a cable up a wall leave a few feet of slack in the ceiling above the wall That way you have plenty of cable if you need to make a repair later 1 When running cable avoid sources of interference such as fluorescent lights big motors and X ray machines Fluorescent lights are the most common source of interference for cables behind ceiling panels Give light fixtures a wide berth Three feet should do it 1 The maximum allowable cable length between the hub and the com puter is 100 meters about 328 feet If you must
483. tart at the root and work their way down For example in the path Windows System32 dns dns is the lowest node 1 The DNS tree can be up to 127 levels deep However in practice the DNS tree is pretty shallow Most DNS names have just three levels not counting the root and although you sometimes see names with four or five levels you rarely see more levels than that Although the DNS tree is shallow it s very broad In other words each of the top level domains has a huge number of second level domains imme diately beneath it For example at the time I wrote this book the com domain had more than two million second level domains beneath it Fully qualified domain names If a domain name ends with a trailing dot that trailing dot represents the root domain and the domain name is said to be a fully qualified domain name also known as an FQDN A fully qualified domain name is also called an absolute name A fully qualified domain name is unambiguous because it iden tifies itself all the way back to the root domain In contrast if a domain name doesn t end with a trailing dot the name may be interpreted in the context of some other domain Thus DNS names that don t end with a trailing dot are relative names This concept is similar to the way relative and absolute paths work in Windows For example if a path begins with a backslash such as Windows System32 dns the path is absolute However a path that doesn t be
484. ted pair cable also known as STP Because STP can be as much as three times more expensive than regular UTP you don t want to use STP unless you have to With a little care UTP can withstand the amount of electrical interference found in a normal office environment NING RY ar Chapter 5 Cables Adapters and Other Stuff 85 Most STP cable is shielded by a layer of aluminum foil For buildings with unusually high amounts of electrical interference the more expensive braided copper shielding offers even more protection When to use plenum cable The outer sheath of shielded and unshielded twisted pair cable comes in two kinds 1 PVC cable is the most common and least expensive type Plenum cable is a special type of fire retardant cable designed for use in the plenum space definition coming right up of a building Plenum cable has a special Teflon coating that not only resists heat but also gives off fewer toxic fumes if it does burn Unfortunately plenum cable costs more than twice as much as ordinary PVC cable Most local building codes require plenum cable when the wiring is installed in the building s plenum space a compartment that s part of the building s air distribution system usually the space above a suspended ceiling or under a raised floor The area above a suspended ceiling is not a plenum space if both the deliv ery and return lines of the air conditioning and heating systems are ducted Pl
485. ter is much like using a network hard drive You can print to a network printer from any Windows program by choosing the Print command to call up a Print dialog box from any program and choosing a net work printer from the list of available printers In Office XP this command is under the File menu In Office 2007 you can reach it by clicking the Office button Keep in mind however that printing on a network printer isn t exactly the same as printing on a local printer you have to take turns When you print on a local printer you re the only one using it When you print to a network printer however you are in effect standing in line behind other network users waiting to share the printer This line complicates the situation in several ways If several users print to the network printer at the same time the net work has to keep the print jobs separate from one another If it didn t the result would be a jumbled mess with your 168 page report getting mixed in with the payroll checks That would be bad Fortunately the network takes care of this situation by using the fancy print spooling feature Network printing works on a first come first served basis unless you know some of the tricks that I discuss in Chapter 3 Invariably when I get in line at the hardware store the person in front of me is trying to buy something that doesn t have a product code on it I end up standing there for hours waiting for someone in P
486. ternet Web site The two most popular Web server programs are Microsoft IIS Internet Information Services and Apache an open source Web server program managed by the Apache Software Foundation Mail servers A mail server is a server computer that handles the network s e mail needs It s configured with e mail server software such as Microsoft Exchange Server Your mail server software must be compatible with your e mail program Exchange Server for example is designed to work with Microsoft Outlook the e mail client software that comes with Microsoft Office Chapter 4 Planning Your Network 7 Database servers A database server is a server computer that runs database software such as Microsoft SQL Server 2005 Database servers are usually used along with cus tomized business applications such as accounting or marketing systems Choosing a Server Operating System If you determine that your network needs one or more dedicated servers the next step is to determine what network operating system NOS those servers should use If possible all the servers should use the same NOS so you don t find yourself awash in the conflicting requirements of different operating systems Although you can choose from many network operating systems from a practical point of view your choices are limited to the following 1 Windows Server 2008 Novell NetWare Linux or another version of Unix For more information see Chapter
487. the File and Printer Sharing feature is already set up on your computer To find out double click the My Computer icon on your desktop Select the icon for your C drive and then click File on the menu bar to reveal the File menu If the menu includes a Sharing command File and Printer Sharing is already set up so you can skip the rest of this section If you can t find a Sharing command on the File menu you have to install File and Printer Sharing before you can share a file or printer with other network users To enable File and Printer Sharing on a Windows XP system follow these steps This action summons the File and Print Sharing dialog box 1 From the Start menu choose Settings Control Panel The Control Panel comes to life 2 Double click the Network Connections icon The Network Connections window appears 3 Right click Local Area Connection and choose Properties The Local Area Connection properties dialog box appears as shown in Figure 3 1 4 Make sure the File and Print Sharing for Microsoft Networks option is checked 5 Click OK While you re working in the Network dialog box don t mess around with any of the other network settings You can safely change the File and Print Sharing options but leave the rest of the settings in the Network dialog box alone Chapter 3 More Ways to Use Your Network 43 4 Local Area Connection Properties General Authentication Advanced Connect using Ep Intel R PR
488. the green pair is used for transmit and the orange pair is used for receive In the EIA TIA 568B and AT amp T 258A stan dards the orange pair is used for transmit and the green pair for receive If you want you can get away with connecting only Pins 1 2 3 and 6 However I suggest that you connect all four pairs as indicated in Table 5 2 RJ 45 connectors RJ 45 connectors for twisted pair cables aren t too difficult to attach if you have the right crimping tool The only trick is making sure that you attach each wire to the correct pin and then press the tool hard enough to ensure a good connection Here s the procedure for attaching an RJ 45 connector 1 Cut the end of the cable to the desired length Make sure that you make a square cut not a diagonal cut 2 Insert the cable into the stripper portion of the crimp tool so that the end of the cable is against the stop Squeeze the handles and slowly pull out the cable keeping it square This strips off the correct length of outer insulation without puncturing the insulation on the inner wires 3 Arrange the wires so that they lie flat and line up according to Table 5 2 90 Part Il Building Your Own Network ar eu Figure 5 3 Attaching an RJ 45 connector to twisted pair cable as You have to play with the wires a little bit to get them to lay out in the right sequence Slide the wires into the pinholes on the connector Double check to mak
489. the pane on the left side of the Open dialog box to browse the network as shown in Figure 2 4 ooe OW Gu Network X 4 Search Network p Organize v Search Active Directory Network and Sharing Center Adda printer z OF W Favorites 4 Computer 3 E Desktop B Downloads DOUGES10 f A SERVEROL Recent Places JJ libranes A Van Documents 4 Network Intrastructure 1 J Music fee Pictures EA z WI E Videos 7 j Computer Ge Network 4 items 3 0 Part I Let s Network E Figure 2 3 The resources available on a server computer EEE E Figure 2 4 Browsing the network in Office 2007 E EN Organize v Search active directory Tr Favorites E Desktop a Downloads W Recent Places J DW Libranes Documents a Music E Pictures H Videos L Computer Ge Network i l 4 items GOs gt Network SERVEROL 4 Search SERVEROL Network and Sharing Center View remote printers phasser sysvol Share Favorite Links W Templates IE Documents E Desktop IB Videos b Ji Public i Computer a Ca Network b p LSERVEROL paa WKO7 001 GR Content Vanal J File name F If yov re using Windows 95 or Windows 98 My Network Places is referred to as Network Neighborhood When you call up the Network Neighborhood in Windows 95 or Windows 98 you re immediately greeted by a list of computers More J netiogen
490. the spectrum are allocated for use by wireless networks 2 4 GHz and 5 GHz Note that these bands aren t devoted exclusively to wire less networks In particular the 2 4 GHz band shares its space with cordless phones As a result cordless phones can sometimes interfere with wireless networks 170 Partit Building Your Own Network And now a word from the irony department was an English literature major in college so like to use literary devices such as irony Of course irony doesn t come up much in com puter books So when it does like to jump on it like a hog out of the water Here s my juicy bit of irony for today The first Ethernet system was a wireless network Ethernet traces its roots back to a network developed at the University of Hawaii in 1970 the Alohanet This network transmitted its data by using small radios If two computers tried to broadcast data at the same time the computers detected the collision and tried again after a short random delay This technique was the inspiration for the basic technique of Ethernet now called carrier sense multiple access with collision detection CSMA CD The wireless Alohanet network inspired Robert Metcalfe to develop his cabled network Ethernet as his doctoral thesis at Harvard in 1973 For the next 20 years or so Ethernet was pretty much a cable only network It wasn t until the mid 1990s that Ethernet finally returned to its wireless roots E
491. then you restore the most recent differential backup For example suppose that you do a normal backup on Monday and dif ferential backups on Tuesday Wednesday and Thursday and your hard drive crashes Friday morning Friday afternoon you install a new hard drive Then to restore the data you first restore the normal backup from Monday Then you restore the differential backup from Thursday The Tuesday and Wednesday differential backups aren t needed The main difference between incremental and differential backups is that Incremental backups result in smaller and faster backups Differential backups are easier to restore If your users often ask you to restore individual files consider differential backups Local versus Network Backups When you back up network data you have two basic approaches to running the backup software You can perform a local backup in which the backup software runs on the file server itself and backs up data to a tape drive that s installed in the server or you can perform a network backup in which you use one network computer to back up data from another network computer In a network backup the data has to travel over the network to get to the com puter that s running the backup If you run the backups from the file server you ll tie up the server while the backup is running Your users will complain that their access to the server has slowed to a snail s pace On the other hand if you run
492. ther Ro SS Put the manuals and disks for all the software you use on your network where they belong in the closet with all the other network tools and artifacts Ten Copies of This Book Obviously you want to keep an adequate supply of this book on hand to dis tribute to all your network users The more they know the more they stay off your back Sheesh 10 copies may not be enough 20 may be closer to what you need Chapter 30 Layers of the OSI Model In This Chapter The Physical Layer The Data Link Layer The Network Layer The Transport Layer The Session Layer The Presentation Layer The Application Layer 0 SI sounds like the name of a top secret government agency you hear about only in Tom Clancy novels What it really stands for as far as this book is concerned is Open System Interconnection as in the Open System Interconnection Reference Model also known as the OSI Reference Model or OSI Model depending on how pressed for time you are The OSI Model breaks the various aspects of a computer network into seven distinct layers These layers are kind of like the layers of an onion Each suc cessive layer envelops the layer beneath it hiding its details from the levels above The OSI Model is also like an onion in that if you start to peel it apart to have a look inside you re bound to shed a few tears The OSI Model isn t itself a networking standard in the same sense that Ethernet and TCP IP
493. ther network users to change the files in this folder select the Allow Network Users to Change My Files check box If you leave this option deselected other network users can open your files but they can t save any changes they make 4 8 Part I Let s Network D Figure 3 6 The File Sharing dialog box Windows Vista and Windows 7 EE 7 Click OK The Properties dialog box vanishes and a hand is added to the icon for the folder to show that the folder is shared If you change your mind and decide that you want to stop sharing a folder double click the My Computer icon select the folder or drive that you want to stop sharing and choose File Sharing to summon the Properties dialog box Deselect the Share This Folder on the Network check box and then click OK Sharing a folder in Windows Vista or Windows 7 To share a folder in Windows Vista or Windows 7 follow these steps 1 Choose Start gt Computer The Computer folder comes to center stage 2 Navigate to the folder you want to share 3 Right click the folder you want to share and choose Properties The Properties dialog box appears 4 Click the Sharing tab and then click the Share button The File Sharing dialog box appears as shown in Figure 3 6 teaa P tw a File Sharing Choose people on your network to share with Type a name and then click Add or click the arrow to find someone Name Permission Level Doug Lowe Owner
494. thout a price For starters you can expect to pay a higher monthly access fee for cable or DSL In most areas of the United States cable runs about 50 per month for residential users business users can expect to pay more especially if more than one user will be connected to the Internet via the cable The cost for DSL service depends on the access speed you choose In some areas residential users can get a relatively slow DSL connection for as little as 30 per month For higher access speeds or for business users DSL can cost substantially more Cable and DSL access aren t available everywhere If you live in an area where cable or DSL isn t available you can still get high speed Internet access by using a satellite hookup Chapter 10 Connecting Your Network to the Internet 8 7 Connecting with high speed private lines T1 and T3 If your network is large and high speed Internet access is a high priority contact your local phone company or companies about installing a dedi cated high speed digital line These lines can cost you plenty on the order of hundreds of dollars per month so they re best suited for large networks in which 20 or more users are accessing the Internet simultaneously A T1 line has a connection speed of up to 1 544 Mbps A T3 line is faster yet It transmits data at an amazing 44 184 Mbps Of course T3 lines are also con siderably more expensive than T1 lines If you don t have enough user
495. through e mail Chapter 23 describes this task in more detail Cleanup Users think that the network server is like the attic They want to throw files up there and leave them forever No matter how much disk storage your network has your users will fill it up sooner than you think so the network manager gets the fun job of cleaning up the attic once in a while The best advice I can offer is to continually complain about how messy it is up there and warn your users that spring cleaning is on the to do list Managing Network Users Managing network technology is the easiest part of network management Computer technology can be confusing at first but computers aren t as con fusing as people The real challenge of managing a network is managing the network s users The difference between managing technology and managing users is obvious You can figure out computers but who can ever really figure out people The people who use the network are much less predictable than the network itself Here are some tips for dealing with users Make user training a key part of the network manager s job Make sure that everyone who uses the network understands how it works and how to use it If the network users don t understand how the network works they may unintentionally do all kinds of weird things to it Treat network users respectfully If users don t understand how to use the network it s not their fault Explain it to them Offer
496. tination address in the reply is 208 23 110 22 the address of the firewall To determine to whom to forward the reply the firewall checks its records to see who s waiting for a reply from 216 239 57 99 It discovers that 192 168 1 100 is waiting for that reply so it changes the destination address to 192 168 1 100 and sends the packet on Actually the process is a little more complicated than that because it s very likely that two or more users may have pending requests from the same public IP In that case the NAT device uses other techniques to figure out to which user each incoming packet should be delivered Configuring Vour Network for DHCP Every host on a TCP IP network must have a unique IP address Each host must be properly configured so that it knows its IP address When a new host comes online it must be assigned an IP address within the correct range of addresses for the subnet one that s not already in use Although you can manually assign IP addresses to each computer on your network that task quickly becomes overwhelming if the network has more than a few computers That s where DHCP the Dynamic Host Configuration Protocol comes into play DHCP automatically configures the IP address for every host on a net work thus ensuring that each host has a valid unique IP address DHCP even automatically reconfigures IP addresses as hosts come and go As you can imagine DHCP can save a network administrator many hours
497. tions see the section Setting account options later in this chapter 9 Click Next You re taken to the final page of the New Object User Wizard as shown in Figure 17 4 New Object User eS xj NA Create in LoweWnter pri Users When you click Finish the following object will be created a Figure 17 4 Verifying the user account information Cancel 10 Verify that the information is correct and then click Finish to create the account If the account information isn t correct click the Back button and cor rect the error You re done Now you can customize the user s account settings At a mini mum you ll probably want to add the user to one or more groups You may also want to add contact information for the user or set up other account options Setting User Properties After you ve created a user account you can set additional properties for the user by right clicking the new user and choosing Properties This brings up the User Properties dialog box which has about a million tabs that you can use to set various properties for the user Figure 17 5 shows the General tab which lists basic information about the user such as the user s name office location phone number and so on 250 Part IV Network Management For Dummies Sa Figure 17 5 The General tab SaaS theatre Cleaver Properties TES MemberOF Dihin Environment Sessons Remote control
498. to enter a name and password Use your regular network logon name and password OWA will appear in the browser window as in Figure 15 1 I Microsoft Outlook Web Access Windows Intenet Explores 5 2 Sea 60 Se A Microrott Outiook Web Access M Do rh Bge G Toos 4 Outlook Web Access BF Inbox rs iNew ai A bid MA gt Help Ljtogot OOO E S l Y r Patchlink Update Server Not PLUS Notification from buiphet New Vulnerability A Sun 2 11 2007 1 40 PM 7 Yitadmingbcf engr com Yosemite Backup Activity Log for Friday Diferential Fri 2 9 2007 11 24 PM 17 O webservicerequests ikon c_ Online Equipment Service Request WSR12261538 Fri 2 9 2007 4 48 PM SKB B knSchedt RE Merge letters Fri 2 9 2007 3 18 PM 138 ste AutoCAD Error Aborting Fri 2 9 2007 2 13 PM Ra B PetchUnk Update Server Notifika PLUS Notification from befir New Vuln ability Announce Fri 2 9 2007 1 40 PM 338 A Offlceusers org A Very Cool Use of Paste Special with Excel Feb 9 2007 Fri 2 9 2007 7 26 AM 78 J YBadmingbct engr com Yosemite Backup Activity Log for Thursday Diere The 2 8 2007 11 22 PM 17w J Patchlink Update Server Not PLUS Notification from bcfplnk New Vulnerability A Thu 2 8 2007 1 40 PH 17 i Swanmy31272 cs com Men s Reweat 2007 Thu 2 8 2007 10 47 AM 15 A bclex010bcf engr com NIC Agents NIC Connectivity Restored Tho 2 8 2007 9 47 AM 1 a bdex0iebd engr com NIC Agents NIC Connectivity Restored Thu 2 8 2007 9 35 AM axe d Offc
499. tory entry to determine whether a file should be backed up Daily backups don t reset the archive bit I m not a big fan of this option because of the small possibility that some files may slip through the cracks Someone may be working late one night and modify a file after the evening s backups have completed but before midnight Those files won t be included in the following night s backups Incremental or differential backups which rely on the archive bit rather than the modification date are more reliable Incremental backups An incremental backup backs up only those files that you ve modified since the last time you did a backup Incremental backups are a lot faster than full backups because your network users probably modify only a small portion Chapter 22 Backing Up Your Data 3 15 ar of the files on the server in any given day As a result if a full backup takes three tapes you can probably fit an entire week s worth of incremental back ups on a single tape When an incremental backup copies each file it resets the file s archive bit That way the file will be backed up again before your next normal backup only when a user modifies the file again Here are some thoughts about using incremental backups 1 The easiest way to use incremental backups is e A normal backup every Monday If your full backup takes more than 12 hours you may want to do it on Friday so that it can run over the weeken
500. try 303 library organizing 302 303 overview 19 235 part time selecting 237 238 password 143 recommended reading for 243 244 resources 237 238 responsibilities of 235 236 routine chores performing 239 240 software tools acquiring 241 242 training users 301 302 username 23 users managing 240 241 Network and Sharing Center 43 44 156 158 Network Attached Storage NAS 260 Network Browser 375 network cable See cable Network Configuration program 362 363 Network Connections folder 42 152 156 158 180 Network dialog box 42 network drive 26 31 34 network envy 389 network hardening firewalls 337 343 overview 337 patches 346 347 virus protection 343 346 network ID in IP address 108 112 114 115 Network Installation Wizard Office 54 network interface 10 66 network interface card NIC 16 96 99 280 Network Layer OSI model 398 Network Monitor program 242 Network Neighborhood 30 31 network operating system NOS See also Windows Server 2008 Apple Mac OS X Server 137 choosing 71 configuration decisions 142 143 dedicated servers 15 16 directory services 133 134 file sharing services 132 133 Index 40 7 final setup preparations 143 installing 137 142 Linux 137 multitasking 133 network support 132 overview 71 131 136 post installation chores 146 147 security services 134 135 server roles configuring 147 150 Network Places 29 31 Network Properties dialog box 1
501. ts servers to be configured Most of these decisions aren t cast in stone so don t worry if you re not 100 percent sure how you want everything configured You can always go back and reconfig ure things However you can save yourself time if you make the right deci sions up front rather than just guess when the Setup program starts asking you questions The following list details most of the decisions that you need to make The existing operating system If you want to retain the existing oper ating system the installation program can perform a multiboot setup which allows you to choose which operating system to boot to each time you start the computer This is rarely a good idea for server computers I recommend that you delete the existing operating system Partition structure Most of the time you want to treat the entire server disk as a single partition However if you want to divide the disk into two or more partitions do so during setup Unlike most of the other setup decisions this one is hard to change later So Chapter 7 Setting Up a Server 143 Computer name During the operating system setup you re asked to provide the computer name used to identify the server on the network p If your network has only a few servers you can just pick a name such as Server01 or MyServer If your network has more than a few servers follow an established guideline for creating server names Administrator password Okay
502. tvcasiecanteheeaessscaseeys 97 Other Network Devices wis isisciisetisccdicssaievnceseceadesusieietevacbsseenaecesceseceouteescevands 99 Rep t f S secere e e Ea E AEE Ao E EEES EE 99 IBYLA GOS sas cea suthacsasatevsasdayiesvetueesaeeveeat ENARA SE TNE EEE ANE 101 ROTET S 55051205002 ses307s eaa e R AE E EERS 102 Chapter 6 Dealing with TCP IP ccc cece eee eee 105 Understanding Biman yc cscisieces c ctesctseess igssbsessaeceesansthestannvecsaacastivassyuneveeeniass 105 COUNTING Dy OMES 4 c0cccessascseesessresnedeerssesesanseerdoncesesaeneivsavscdoaeesesvoness 106 DOING the logic thing ssseeiess cedesacescdaseesaschecscoseess a evesstaecetpreeeedvnecceetess 107 Introducing IP AGAreSSES eri ciecasevessidesceonseseesaneavedesessestseseasaueavsanseseaoasesventie 108 IN tWOrks and NOSIS narisee E eE E E S 108 The dotted decimal dance ccessesccessssscceessnsccessssccesseesecesseeees 108 IX x Networking For Dummies 9th Edition Classifying IP Addresses ccccesscsssessseessceseeeseceseceseesseeeseeseseseeeseeeneeeneeses 109 Class A Addresses criin ninrin n fassecteaeeeeeeds 110 Class B ddi SSES iirinn decries celessedvieaes adeateenees 111 Class C AAdrESSES ii snn enin aieiaa 111 RO 01510 1 0 Fee eames Se ne ge 112 UDMOES siirsin n E EES AEE deviescenanevees ES 113 S pnet maskSnrane iraan a AEE ENAR SEEE EEA 114 The great subnet round D psaseon enenu enir 115 Private and public addresses
503. twork After you identify the faulty component replacing it restores the network to its original speed Chapter 19 Network Performance Anxiety 283 Tune Vour Network the Compulsive Way You can tune your network in one of two ways The first is to think about it a bit take a guess at an approach that may improve performance try that approach and see whether the network seems to run faster This strategy is the way most people go about tuning the network You can also try the compulsive way which is suitable for people who orga nize their sock drawers by color and their food cupboards alphabetically by food group The compulsive approach to tuning a network goes something like this 1 Establish a method for objectively testing the performance of some aspect of the network In this method you create a benchmark The result of your benchmark is a baseline 2 Change one variable of your network configuration and rerun the test For example you may think that increasing the size of the disk cache can improve performance Change the cache size restart the server and run the benchmark test Note whether performance improves stays the same or becomes worse 3 Repeat Step 2 for each variable that you want to test Here are some salient points to keep in mind if you decide to tune your net work the compulsive way If possible test each variable separately In other words before pro ceeding reverse the changes you made
504. twork has 2 computers or 2 000 Of course managing a 2 000 computer network is a full time job whereas managing a 2 computer network isn t At least it shouldn t be This chapter introduces you to the boring job of network administration Oops you re probably reading this chapter because you ve been elected to be the network manager so I d better rephrase that This chapter introduces you to the wonderful exciting world of network manage ment Oh boy This is going to be fun What a Network Administrator Does A network administrator administers a network Installing configuring expanding protecting upgrading tuning and repairing the network 236 Part IV Network Management For Dummies MBER KV amp A network administrator takes care of the network hardware such as cables hubs switches routers servers and clients and the network software such as network operating systems e mail servers backup software database servers and application software Most important the administrator takes care of network users by answering their questions listening to their trou bles and solving their problems On a big network these responsibilities constitute a full time job Large networks tend to be volatile Users come and go equipment fails software chokes and life in general seems to be one crisis after another Smaller networks are much more stable After you get your network up and running yo
505. twork itself As the net work manager you should read through the manuals that come with your network software to see which management tools are available For example Windows includes anet diag command that you can use to make sure that all the computers on a network can communicate with each other You can run net diag from an MS DOS prompt For TCP IP networks you can use the TCP IP diagnostic commands that I summa rize in Table 16 2 Table 16 2 TCP IP Diagnostic Commands Command What It Displays arp Address resolution information used by the Address Resolution Protocol ARP hostname Your computer s host name ipconfig Current TCP IP settings nbtstat The status of NetBIOS over TCP IP connections continued 24 2 Part IV Network Management For Dummies ANG RS ar Table 16 2 continued Command What It Displays netstat Statistics for TCP IP nslookup DNS information ping Verification that a specified computer can be reached route The PC s routing tables tracert The route from your computer to a specified host 1 System Information This program which comes with Windows is a useful utility for network managers Hotfix Checker This handy tool from Microsoft scans your computers to see which patches need to be applied You can download the Hotfix Checker for free from the Microsoft Web site Just go to www micro soft com and search for hfnetchk exe Baseline Security
506. u can use these subfolders if you want or you can create your own subfolders to help organize the data in your Public folder To access the Public folder of another computer use the techniques that I describe in Chapter 2 to either browse to the Public folder or map it to a net work drive Sharing a Printer Sharing a printer is much more traumatic than sharing a hard drive When you share a hard drive other network users access your files from time to time When they do you hear your drive click a few times and your com puter may hesitate for a half second or so The interruptions caused by other users accessing your drive are sometimes noticeable but rarely annoying When you share a printer you get to see Murphy s Law in action Your co worker down the hall is liable to send a 140 page report to your printer just moments before you try to print a 1 page memo that has to be on the boss s desk in two minutes The printer may run out of paper or worse jam during someone else s print job and you re expected to attend to the problem SSS Figure 3 8 The Printers and Faxes folder PC Chapter 3 More Ways to Use Your Network 5 Although these interruptions can be annoying sharing your printer makes a lot of sense in some situations If you have the only decent printer in your office or workgroup everyone will bug you to let them use it anyway You may as well share the printer on the network At least this way th
507. u probably won t have to spend much time managing its hardware and software An occasional problem may pop up but with only a few com puters on the network problems should be few and far between Regardless of the network s size the administrator attends to common chores Get involved in every decision to purchase new computers printers or other equipment Put on the pocket protector whenever a new computer is added to the network The network administrator s job includes considering changes in the cabling configuration assigning a computer name to the new computer integrating the new user into the security system and granting user rights 1 Whenever a software vendor releases a new version of its software read about the new version and decide whether its new features war rant an upgrade In most cases the hardest part of upgrading to new software is determining the migration path that is upgrading your entire network to the new version while disrupting the network and its users as little as possible This statement is especially true if the soft ware in question happens to be your network operating system because any change to the network operating system can potentially impact the entire network Between upgrades software vendors periodically release patches and service packs that fix minor problems For more information see Chapter 24 Perform routine chores such as backing up the servers archiving old data
508. ume that the computer is turned off press the power button wonder why nothing happened and then press the power button and hold it down hoping that something will happen If you hold down the power button long enough the com puter will turn itself off Then when you turn the computer back on you see a message saying that the computer wasn t shut down properly Arghhh The moral of the story is to jiggle the mouse if the computer seems to have nodded off ay The fan If you think that the computer isn t plugged in but it looks like it is listen for the fan If the fan is running the computer is getting power and the problem is more serious than an unplugged power cord If the fan isn t running but the computer is plugged in and the power is on the fan may be out to lunch 1 The electrical outlet If the computer is plugged in turned on and still not running plug a lamp into the outlet to make sure that power is getting to the outlet You may need to reset a tripped circuit breaker or replace a bad surge protector Or you may need to call the power company If you live in California don t bother It probably won t do any good 290 Part IV Network Management For Dummies ar Surge protectors have a limited life span After a few years of use many surge protectors continue to provide electrical power for your com puter but the components that protect your computer from power surges no longer work If you r
509. unt only when you re making major changes to the system s configuration When you re doing routine work log on as an ordi nary user to avoid accidentally corrupting your system When you log ah in Linux grinds its gears for a moment and then displays the GNOME desktop which I describe later in this chapter If you didn t install X server you see a text mode login prompt that resem bles this Fedora release 10 Cambridge Kernel 2 6 27 5 117 fc10 0686 on an i686 localhost login The login prompt displays the Linux version Fedora release 10 the kernel version it s based on 2 6 27 bla bla bla the CPU architecture i686 and the server s hostname localhost To log in type your user ID press Enter type the password and press Enter again When you ve successfully logged in you re greeted by a semifriendly prompt similar to this LAS logims Swa gull 5 20 00 56 oa s0 doug localhost doug 358 Part VI Beyond Windows The prompt character in the standard Linux shell is a dollar sign rather than a greater than sign gt as it is in MS DOS or Windows Also notice that prompt indicates your username and server doug LSERVER as well as the name of the current directory doug Logging off After you log on you probably want to know how to log off If you logged on to GNOME you can log off by clicking the main menu and choosing the Log Out command A dialog box asks whether you re sure you wa
510. up feature every day However be sure to run it periodically to check that your tape drive is working If your backup program reports errors throw away the tape and use a new tape Actually you should ignore that last comment about waiting for your backup program to report errors You should discard tapes before your backup program reports errors Most experts recommend that you should use a tape only about 20 times before discarding it If you use the same tape every day replace it monthly If you have tapes for each day of the week replace them twice a year If you have more tapes than that figure out a cycle that replaces tapes after about 20 uses About Cleaning the Heads An important aspect of backup reliability is proper maintenance of your tape drives Every time you back up to tape little bits and specks of the tape rub off onto the read and write heads inside the tape drive Eventually the heads become too dirty to reliably read or write data To counteract this problem clean the tape heads regularly The easiest way to clean them is to use a special tape cleaning cartridge To clean the heads with a tape cleaning cartridge insert the cartridge into the tape drive The 320 Part V Protecting Your Network drive automatically recognizes that you ve inserted a cleaning cartridge and performs a special routine that wipes the special cleaning tape back and forth over the heads to clean them When the cleaning routine i
511. up Microsoft Exchange server data 3 2 Part V Protecting Your Network Types of Backups You can perform five different types of backups Many backup schemes rely on full backups daily but for some networks it s more practical to use a scheme that relies on two or more of these backup types The differences among the fives types of backup involve a little technical detail known as the archive bit The archive bit indicates whether a file has been modified since the last time it was backed up The archive bit is a little flag that s stored along with the filename creation date and other directory information Any time that a program modifies a file the archive bit is set to the On position That way backup programs know that the file has been modified and needs to be backed up The differences among the various types of backups center around whether they use the archive bit to determine which files to back up and whether they flip the archive bit to the Off position after they back up a file Table 22 1 sum marizes these differences and they re explained in the following sections Backup programs allow you to select any combination of drives and folders to back up As a result you can customize the file selection for a backup opera tion to suit your needs For example you can set up one backup plan that backs up all a server s shared folders and drives plus its mail server stores but leaves out folders that rarely change
512. up tape If you have only one tape that s reused every day you re outta luck The safest scheme is to use a new backup tape every day and keep all your old tapes in a vault Pretty soon though your tape vault can start looking like the warehouse where they stored the Ark of the Covenant at the end of Raiders of the Lost Ark 3 8 Part V Protecting Your Network ar As a compromise between these two extremes most users purchase several tapes and rotate them That way you always have several backup tapes to fall back on just in case the file you need isn t on the most recent backup tape This technique is fape rotation and several variations are commonly used 1 The simplest approach is to purchase three tapes and label them A B and C You use the tapes on a daily basis in sequence A the first day B the second day C the third day then A the fourth day B the fifth day C the sixth day and so on On any given day you have three generations of backups today s yesterday s and the day before yesterday s Computer geeks like to call these the grandfather father and son tapes Another simple approach is to purchase five tapes and use one each day of the workweek A variation of this scheme is to buy eight tapes Take four of them and write Tuesday on one label Wednesday on the second Thursday on the third and Friday on the fourth label On the other four tapes write Monday 1 Monday 2 Monday 3 and M
513. ur Network 41 Sharing Your Stuffer eers e Ea Ep EEEE IE ES 41 Enabling File and Printer Sharing Windows XP s ssseesessseseesee 42 Enabling File and Printer Sharing Windows Vista 008 43 Enabling File and Printer Sharing Windows 7 csseeseeeereerees 45 Sharing a Folder eocen nA s E tens E arire Er SEa sini 46 Sharing a folder in Windows XP cccccscesssssseesseesscesseessceseeseeesseenes 46 Sharing a folder in Windows Vista or Windows 7 cceseserees 48 Using the Public Folder in Windows Vista and Windows 7 cc08 49 Sharing a Printer sornione rera EE A EE EO a ER IN 50 Sharing a printer in Windows XP ccsesesceeeeeseeeeeseeeeseeeeeeeeeeeesees 51 Sharing a printer in Windows Vista or Windows 7 sssseseseseseeeee 52 Using Microsoft Office on a Network sssssssesssesssssessrsesrrsrsesrrsrssernssssesresee 53 Installing Office on a network some options sssssssssssessesesesee 54 Accessing network file cccccsccsscsssecsscessccssecsscsssesseesseesseeseeesaeens 54 Using workgroup templates ccsscssscssscessessseseesesseesseeseeesseeees 55 Networking an Access database ccccccssccessessseeeeseeeeseeesseeesseesnes 57 Working with Offline Files cccccscssscssscsssessessscsssesseesseeseeeseessneeseessneeees 58 Part I Building Vour Own Network cccccccccsccccseccesceeee 67 Chapter 4 Planning You
514. used port on a hub or a switch represents an open door to your network The hubs and switches should be secured just like the servers Securing User Accounts Next to physical security the careful use of user accounts is the most impor tant type of security for your network Properly configured user accounts can prevent unauthorized users from accessing the network even if they gain physical access to the network The following sections describe some of the steps that you can take to strengthen your network s use of user accounts Obfuscating your usernames Huh When it comes to security obfuscation simply means picking obscure usernames For example most network administrators assign usernames based on some combination of the user s first and last name such as BarnyM 326 Part V Protecting Your Network ANG O MBER N or baMiller However a hacker can easily guess such a user ID if he or she knows the name of at least one employee After the hacker knows a user name he or she can focus on breaking the password You can slow down a hacker by using names that are more obscure Here are some suggestions on how to do that 1 Add a random three digit number to the end of the name For example BarnyM320 or baMiller977 1 Throw a number or two into the middle of the name For example Bar6nyM or ba9Miller2 1 Make sure that usernames are different from e mail addresses For example if a user s e mai
515. users User ID The internal identifier for the user You can add a new user by using the useradd command For example to create a user account named slowe and use default values for the other account information open a Terminal window or switch to a virtual console and type this command useradd slowe The useradd command has many optional parameters you can use to set account information such as the user s home directory and shell Fortunately most Linux distributions come with special programs that sim plify routine system management tasks Fedora is no exception It comes with a program called User Manager as shown in Figure 25 4 To start this pro gram choose System Administration Users and Groups To create a user account with User Manager click the Add User button This brings up a dialog box that asks for the username password and other infor mation Fill out this dialog box and then click OK The User Manager also lets you create groups You can simplify the task of administering users by applying access rights to groups rather than individual users Then when a user needs access to a resource you can add the user to the group that has the needed access To create a group click the Add Group button A dialog box appears asking for the name of the new group Type the name you want and then click OK To add a user to a group click the Groups tab in the User Manager Then double click the name of the gr
516. users you want to enable mobile access for 15 Close Active Directory Users and Computer That s all there is to it After you have enabled these features any users run ning Windows Mobile can synchronize their handhelds with their Exchange mailboxes Configuring BlackBerry Devices Unfortunately configuring BlackBerry devices is considerably more difficult than configuring Windows Mobile devices That s because Microsoft includes support for Windows Mobile devices in Exchange server but you must use additional software to support BlackBerry devices If you have just a few BlackBerry users you can synchronize their hand helds with Exchange by using a service called BlackBerry Internet Service or BIS BIS is a Web site you log in to and to which you provide the Exchange account information for each of your BlackBerry users BIS then handles the synchronization for you In a nutshell BIS masquerades as an Office Web Access OWA user to access the user s Exchange data It then forwards the data it retrieves via OWA to the BlackBerry Your service provider such as AT amp T Sprint Verizon and so on will give you the correct address of the BIS Web site that will work with your BlackBerry BIS works surprisingly well but it isn t instantaneous The delay between when an e mail appears in the user s Exchange inbox and when it shows up on the BlackBerry is often 15 minutes or more For more timely access you should
517. ut Considering Security Issues ANG ar If you connect a non networked computer to the Internet and then pick up a virus or get yourself hacked into only that one computer is affected But if you connect a networked computer to the Internet the entire network becomes vulnerable Beware Never connect a networked computer to the Internet without first considering the security issues How will you protect yourself and the network from viruses 1 How will you ensure that the sensitive files located on your file server don t suddenly become accessible to the entire world How can you prevent evil hackers from sneaking into your network stealing your customer file and selling your customer s credit card data on the black market For answers to these and other Internet security questions see Chapter 23 Plugging In a Wireless Access Point without Asking For that matter plugging any device into your network without first getting permission from the network administrator is a big no no But wireless access points WAPs are particularly insidious Many users fall for the mar keting line that wireless networking is as easy as plugging in one of these devices to the network Then your wireless notebook PC or handheld device can instantly join the network 384 Part vi The Part of Tens The trouble is so can anyone else within about one quarter mile of the WAP Therefore you must employ extra security measures to make sur
518. uter on the network Computer desenphor For example Kitchen Computer or Mary s Computer Full computer name WIN Workgroup WORKGROUP To use a wizard to jon a doman or workgroup click N D Network ID T this computer or change ite doman Teens ot s o Change Figure 8 10 The System Properties dialog box Windows 7 3 Click the Change button This step displays the Computer Name Domain Changes dialog box as shown in Figure 8 11 162 Partit Building Your Own Network E Figure 8 11 The Computer Name Domain Changes dialog box Windows 7 gt a Pecmputer Name Dumain Changes You can change the name and the membership ot ther computer Changes might affect eocess tu network resuurces More information Computer name WK09 001 Full computer name WKO3 001 More Member of Damar lowewnter com Workgroup WORKGROUP Co ance 4 Enter the computer name and the workgroup or domain name If you want to join a domain choose the Domain option button and type the domain name To join a workgroup choose the Workgroup option and type the workgroup name 5 Click OK 6 Enter the username and password for an Administrator account when prompted You re asked to provide this information only if a computer account hasn t already been created for the client computer 7 When a dialog box appears informing you that you
519. ux system If the thought of installing Linux gives you hives you can buy computers with Linux preinstalled just as you can buy computers with Windows already installed Before you begin to install Linux I recommend several planning steps Make a list of all the hardware components on your computer and how they re configured Be as specific as you can Write down each component s manufacturer and model number as well as configuration information such as the component s IRQ and I O address if appropriate 1 Decide how you want to partition your hard drive for Linux Although Windows is usually installed into a single disk partition Linux installations typically require at least three hard drive partitions e A boot partition This should be small 16MB is recommended The boot partition contains the operating system kernel and is required to start Linux properly on some computers e A swap partition This should be about twice the size of your com puter s RAM For example if the computer has 2GB of RAM allo cate a 4GB swap partition Linux uses this partition as an extension of your computer s RAM e A root partition This in most cases uses up the remaining free space on the disk The root partition contains all the files and data used by your Linux system You can also create additional partitions if you wish The installation program includes a disk partitioning feature that lets you set up your disk pa
520. ve granted permission for the folder When you select a user or group from the list the check boxes at the bottom of the list change to indicate which specific permissions you ve assigned to each user or group Click Add The dialog box as shown in Figure 18 14 appears Type the name of the user or group to whom you want to grant permission and then click OK You return to the Share Permissions tab with the new user or group added 2 14 Part IV Network Management For Dummies D Figure 18 12 Setting permissions Figure 18 13 Setting the Share Permissions j ar Admin Properties xi Share pemissions provide a level of access control for a shared folder NTFS permissions control local access to files and folders For network eovess lo a shared folder the more restrictive of the share and NTFS permiezione determine the level of access granted to usere and groupe To set share permissions for users who access this folder over the network click Share Permissions Share Permissions To set NTFS permissions for users who access this folder locally chck NTFS Permissions NTFS Permissions For more information about sharing and permissions see Managing Permissions for Sh 2 coo __ Tvermssonsforadmn eT Securty Group or user namea Permissions for Everyone Aow Deny Full Control o o Read a o C e acc _ If you re not sure of the name c
521. ver Computer While Users Are Logged OD n ccscesceseeseesseseceeesseeseeeeesessceseeeseeeesaeeneeaes 380 Deleting Important Files on the Server ccccceceeseesseseeeeeeeeeeeeeeeeeeseeaeens 381 Copying a File from the Server Changing It and Then Copying It BaCk esner r aii 382 Sending Something to the Printer Again Just Because It Didn t Print Che First TIME serrie era e E AE TEE ENE EEE EEE ERS 382 Assuming That the Server Is Safely Backed Up ccccscecssesseeeeeseeeseees 382 Connecting to the Internet without Considering Security Issues 383 Plugging In a Wireless Access Point without Asking cee eeeeeeenees 383 Thinking You Can t Work Just Because the Network Is Down 384 Running Out of Space on a Server oisein eioen A 384 Always Blaming the Network cccccescesesseeseeseeeeceeeeseeseeaeeaeceeeeeeeaeeneeaees 385 Table of Contents xvii Chapter 28 Ten Networking Commandments 387 I Thou Shalt Back Up Thy Hard Drive Religiously cceseseeeeeee 387 II Thou Shalt Protect Thy Network from Infidels ccececeseseteees 388 II Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files ccscsssssssessseseesseesscessesssessseessesseeseeeees 388 IV Thou Shalt Not Tinker with Thine Network Configuration Unless Thou Knowest What Thou Art Doing 388 V Thou Shalt Not Covet Thy Neighbor s Network
522. ware used for intranets than for the Internet On the other hand other industry pundits think that the intranet phe nomenon is merely a fad that some other promising new technology such as pet rocks or hula hoops will replace in a few years Only time will tell What Do Vou Use an Intranet For Intranets can distribute just about any type of information within a company Intranets use two basic types of applications Publishing application Information is posted in the form of pages that you can view from any computer with access to the intranet This type of intranet application is commonly used for company newsletters policy manuals and price lists for example y Publishing applications are simple to set up In fact you may be able to set up one without a lot of outside help from highly paid computer consultants Transaction application Information is gathered from users of the intranet who file online expense reports report problems to the help gn desk or enroll in employee benefit programs for example Expect to spend big bucks on computer consulting to get an intranet transaction application set up Chapter 12 Creating an Intranet 205 Here s the key difference between these two types of intranet applications Ina publishing application information flows in one direction It flows from the intranet to the user The user requests some information and the intranet system delivers it Ina transaction applic
523. who casually dropped by your network Understanding Windows User Accounts User accounts are one of the basic tools for managing a Windows server As a network administrator you ll spend a large percentage of your time deal ing with user accounts creating new ones deleting expired ones resetting passwords for forgetful users granting new access rights and so on Before I get into the specific procedures of creating and managing user accounts this section presents an overview of user accounts and how they work Local accounts versus domain accounts A local account is a user account that s stored on a particular computer and applies only to that computer Typically each computer on your network will have a local account for each person that uses that computer 24 6 Part IV Network Management For Dummies In contrast a domain account is a user account that s stored by Active Directory and can be accessed from any computer that s a part of the domain Domain accounts are centrally managed This chapter deals primar ily with setting up and maintaining domain accounts User account properties Every user account has a number of important account properties that specify the characteristics of the account The three most important account proper ties are Username A unique name that identifies the account The user must enter the username when logging onto the network The username is public information In other words
524. with each cycle For example because the speed of light is roughly 300 million meters per second the wavelength of a 1 Hz radio wave is about 300 million meters The wavelength of a 2 Hz signal is about 150 million meters As you can see the wavelength decreases as the frequency increases The wave length of a typical AM radio station broadcasting at 580 kHz is about 500 meters For a TV station broadcasting at 100 MHz it s about 3 meters For a wireless net work broadcasting at 2 4 GHz the wavelength is about 12 centimeters 168 Part Il Building Your Own Network It turns out that the shorter the wavelength the smaller the antenna needs to be in order to adequately receive the signal As a result higher frequency transmissions need smaller antennas You may have noticed that AM radio sta tions usually have huge antennas mounted on top of tall towers but cellphone transmitters are much smaller and their towers aren t nearly as tall That s because cellphones operate on a higher frequency than AM radio stations do So who decides what type of radio gets to use specific frequencies That s where spectrums and the FCC come in Cycles per second 1 Time gt 0 0 1 0 Cycles per second 2 a3 Figure 9 1 Radio waves frequently have frequency Time gt es l 1 0 Chapter 9 Wireless Networking 1 6 9 Spectrums and the FCC The term spectrum refers to a continuous range of frequencies
525. within one minute If 60 seconds is too long or too short an interval you can change the refresh rate by using the Advanced tab in the Options dialog box Working with Offline Files Desktop computers are by nature stationary beasts As a result they re almost always connected to their networks Notebook computers however are more transitory If you have a notebook computer you re likely to tote it around from place to place If you have a network at work you probably connect to the network when you re at work But then you take the notebook computer home for the weekend where you aren t connected to your network Chapter 3 More Ways to Use Your Network 59 Of course your boss wants you to spend your weekends working so you need a way to access your important network files while you re away from the office and disconnected from the network That s where the offline files feature comes in It lets you access your network files even while you re dis connected from the network It sounds like magic but it isn t really Imagine how you d work away from the network without this feature You simply copy the files you need to work on to your notebook computer s local hard disk Then when you take the computer home you work on the local copies When you get back to the office you connect to the network and copy the modified files back to the network server That s essentially how the offline files feature works exc
526. work Management For Dummies Figure 18 5 Enter a description for the share TE Figure 18 6 Setting the share permissions E Steps Shared Folder Location NTFS Permissions Share Protocole SMB Settings SMB Permissions DFS Namespace Publishing Review Settings and Create Share Contiemati fi Provishen a Shared Folder Wizard pe SMB Settings Steps Specify how this shared folder is to be used by clients accessing t over the SMB Shared Folder Location protocol You can use the description to add comments about how the shared folder is used You can also control advanced SMB settings including the madmum NTFS Permissions connections allowed access based enumeration and offline avatabitty Share Protocole SMB Settings Sue pett SMB Permissions NISERVEROI Marketing DFS Namespace Publishing Description Review Settings and Create Share Confirmation Advanced settings User limt Maximum allowed Access based enumeration Enabied Offine settings Saanaa fies and pengraens avaliable atine Ta change these settings click Advanced Ad j Ecsite Aa exes a SMB Permissions Specify share permissions for SMB based access to the shared folder For network access to a shared folder the more restrictive of the share permissions and NTFS permissions determine the level of access granted to users or groups Share path ACSERVERDI Marketing Select one ot the following basic share permissions or cr
527. wrong Networks cause problems of their own but they aren t the root of all evil If your monitor displays only capital letters it s probably because you pressed the Caps Lock key Don t blame the network If you spill coffee on the keyboard well that s your fault Don t blame the network If your toddler sticks Play Doh in the floppy drive kids will be kids Don t blame the network Get the point 386 Part VII The Part of Tens Chapter 28 Ten Networking Commandments In This Chapter Backing up and cleaning up hard drives Scheduling downtime for maintenance Keeping spare parts Training users Recording your network configuration Blessed is the network manager who walks not in the council of the ignorant nor stands in the way of the oblivious nor sits in the seat of the greenhorn but delights in the Law of the Network and meditates on this Law day and night Networks 1 1 A nd so it came to pass that these Ten Networking Commandments were handed down from generation to generation to be worn as frontlets between the computer geeks eyes taped on the bridges of their broken glasses and written upon their doorposts with Sharpie markers Obey these commandments and it shall go well with you with your users and with your users users I Thou Shalt Back Up Thy Hard Drive Religiously Prayer is a good thing and I heartily recommend it But when it comes to pro tecting the data on your
528. ws 2000 and Windows XP as well as Windows 2000 Server and Windows Server 2003 include this program it pro vides basic protocol analysis and can often help solve pesky network problems Chapter 16 Welcome to Network Management 243 Building a Library Scotty delivered one of his best lines in the original Star Trek series when he refused to take shore leave so that he could get caught up on his technical journals Don t you ever relax asked Kirk I am relaxing Scotty replied To bea good network administrator you need to read computer books lots of them And you need to enjoy doing it If you re the type who takes computer books with you to the beach you ll make a great network administrator Read books on a variety of topics I don t recommend specific titles but I do recommend that you get a good comprehensive book on each of these topics Network cabling and hardware Ethernet Windows Server 2003 Windows Server 2008 Windows XP Professional Windows Vista Windows 7 Exchange Linux TCP IP 1 DNS and BIND SendMail 1 Exchange Server Security and hacking Wireless networking In addition to reading books you may also want to subscribe to some maga zines to keep up with what s happening in the networking industry Here are a few you probably should consider along with their Web addresses InformationWeek www informationweek com InfoWorld www infoworld com Network Computing
529. ws 7 earlier in this chapter but choose the Turn On Sharing option in the Public Sharing Settings section For Windows Vista follow the steps in the earlier section Enabling File and Printer Sharing Windows Vista but choose the Public Sharing option instead of the File Sharing and Printer Sharing options After you enable Public folder sharing you can access the Public folder on your own computer in Windows Vista by choosing Start Computer and then clicking the Public icon in the pane on the left side of the window To open the Public folder in Windows 7 choose Start gt Computer expand the Libraries item in the left pane and then expand the Documents Music Pictures or Videos items Figure 3 7 shows an example of a Public folder in Windows 7 50 Part I Let s Network pa Figure 3 7 A Public folder in Windows 7 e ar i GO Libraries Documents Public Documents 4 earch Public Document P Organize v Share with New folder r D 4 Favorites Documents library E Desktop Public Documents B Downloads Recent Places Arrange by Folder v Name Date modified Type s empty 4 libranes a Documents J My Documents Public Documents J Music ba Pictures E Videos Computer Ga Network h OQ items State B Shared As you can see the Public folder includes several predefined subfolders designed for sharing documents downloaded files music pictures and videos Yo
530. wwroot 2 Choose File gt New Text Document type default htm for the filename and press Enter 3 Right click the default htm file you just created and choose Open With gt Notepad 4 Enter the following text in the Notepad window lt HTML gt lt BODY gt lt H1 gt Hello World lt H1 gt lt BODY gt lt HTML gt 5 Choose FileSave to save the file and then choose FileExit to quit Notepad 6 Open a browser window 7 Type localhost in the address bar and press Enter The page shown in Figure 12 7 appears 2 12 Part Ill Getting Connected http locathost Windows Internet Explorer Hello world j Figure 12 7 4 Hello World pae io EE localintranet Protected mode GFF Kime e A User 5 E TE eee Pe Decfostiin n TEBE zs Creating Web Sites IIS has the ability to host multiple Web sites This is an extremely useful fea ture not only for Web servers that host public sites but also for Web servers that host internal intranet sites For example you might create a separate intranet Web site for Human Resources and assign it the Web site name hr Then assuming the domain name is lowewriter pri users can browse to the Web site by using the address hr lowewriter pri Here are the steps 1 In Windows Explorer create a folder in which you ll save the files for the new Web site For this example I created a folder named c HR Web Site 2 Choose Start Adm
531. www networkcomputing com Windows IT Pro www windowsitpro com 1 2600 www 2600 com a great magazine on computer hacking and security 24 4 Part IV Network Management For Dummies ar The Internet is one of the best sources of technical information for network administrators Stock your browser s Favorites menu with plenty of Web sites that contain useful networking information Many Web sites have online news letters you can subscribe to so that you regularly get fresh information by e mail Pursuing Certification Remember the scene near the end of The Wizard of Oz when the Wizard grants the Scarecrow a diploma the Cowardly Lion a medal and the Tin Man a testimonial Network certifications are kind of like that I can picture the scene now The Wizard And as for you my network burdened friend any geek with thick glasses can administer a network Back where I come from there are people who do nothing but configure Cisco routers all day long And they don t have any more brains than you do But they have one thing you don t have certification And so by the authority vested in me by the Universita Committeeatum E Pluribus Unum I hereby confer upon you the coveted certification of CND You CND The Wizard Yes that s uh Certified Network Dummy You The Seven Layers of the OSI Reference Model are equal to the Sum of the Layers on the Opposite Side Oh rapture I feel like a network adm
532. y the wizard asks which edition of the operating system you want to install The options here depend on which version you ve purchased For the Standard Edition you can choose to install the full Standard Edition server operating system or the Core edition 4 Select the edition you want to install and then click Next The Setup Wizard displays the License Agreement information Read it if you enjoy legalese 5 Click I Accept the License Terms and then click Next The Setup Wizard then asks whether you want to perform an upgrade installation or a full installation 6 Click the installation option you want to use Setup continues by displaying the computer s current partition infor mation Here you can select the partition that you want to use for the installation If necessary you can reconfigure your partitions from this screen by deleting existing partitions or creating new ones I assume here that you want to create a single partition that uses all available space on the drive 7 Select the partition on which you want to install Windows and then click Next Setup now formats the drive and then copies files to the newly format ted drive This step usually takes awhile I suggest you bring along your favorite book Start reading at Chapter 1 After all the files have been copied Setup reboots your computer Then Setup examines all the devices on the computer and installs any neces sary device drivers You can read C
533. y eight bits are allocated to the network ID and the first of these bits is used to indicate that the address is a Class A address only 126 Class A networks can exist in the entire Internet However each Class A network can accommodate more than 16 million hosts Only about 40 Class A addresses are assigned to companies or organizations The rest are either reserved for use by the IANA Internet Assigned Numbers Authority or are assigned to organizations that manage IP assignments for geographic regions such as Europe Asia and Latin America Just for fun Table 6 2 lists some of the better known Class A networks You probably recognize many of them In case you re interested you can find a complete list of all the Class A address assignments at www iana org assignments ipv4 address space Table 6 2 Some Well Known Class A Networks Net Description Net Description 3 General Electric Company 20 Computer Sciences Corporation 6 Army Information Systems 22 26 Defense Information Center 29 30 Systems Agency 9 IBM 34 Halliburton Company 11 DoD Intel Information 38 Performance Systems Systems International Chapter 6 Dealing with TCP IP Net Description Net Description 12 AT amp T Bell Laboratories 40 Eli Lilly and Company 13 Xerox Corporation 43 Administered by APNIC 15 Hewlett Packard Company 45 Interop Show Network 16 Digital Equipment 4 Bell Northern Research Corporati
534. y everyone a printer when I know that the one we have now just sits there taking up space most of the day Wouldn t buying a network be better than buying a printer for every computer 1 want to provide an Internet connection for all my computers Many net works especially smaller ones exist solely for the purpose of sharing an Internet connection Someone figured out that we re destroying seven trees a day by printing interoffice memos on paper so we want to give the rainforest a break by one setting up an e mail system and trying to print less of the routine stuff D It won t work One of the inescapable laws of business is that the more you try to eliminate paperwork the more paperwork you end up creating ar Chapter 4 Planning Your Network 65 Business is so good that one person typing in orders eight hours each day can t keep up With a network I can have two people entering orders and I don t have to pay overtime to either person 4 My brother in law just put in a network at his office and I don t want him to think that I m behind the times Make sure that you identify all the reasons why you think you need a network and then write them down Don t worry about winning the Pulitzer Prize for your stunning prose Just make sure that you write down what you expect a network to do for you If you were making a 500 page networking proposal you d place the descrip tion of why a network is needed in a ta
535. you to be abreast of all the latest trends and developments They ask What do you think about the new version of SkyWriter Should we upgrade or stick with Version 23 We need an Intranet Web site What s the best Web page editor for under 200 My kid wants video editing software Which is better VideoPro or MovieNow The only way to give halfway intelligent answers to questions like these is to read about the industry Visit your local newsstand and pick out a few com puter magazines that appeal to you Here are some more tips for keeping up Subscribe to at least one general interest computer magazine and one magazine specifically written for network users That way you can keep abreast of general trends and the specific stuff that applies just to networks Subscribe to e mail newsletters that cover the systems you use Look for magazines that have a mix of good how to articles and reviews of new products Don t overlook the value of the advertisements in many of the larger computer magazines Some people I m one of em subscribe to certain magazines to read the ads as much as to read the articles Most computer magazines are quite technical Look for magazines written to your current level of expertise You may discover that you outgrow one magazine and are ready to replace it with one that s more technical 304 Part IV Network Management For Dummies Remember That the Guru Needs a Guru
536. your servers are child s play compared to the most difficult job of network security securing your network s users All the best laid security plans will go for naught if your users write their passwords on sticky notes and post them on their computers The key to securing your network users is to create a written network secu rity policy and to stick to it Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules Also make sure to have consequences when violations occur Here are some suggestions for some basic security rules that can be incorpo rated into your security policy Never write down your password or give it to someone else Accounts shouldn t be shared Never use someone else s account to access a resource that you can t access under your own account If you need access to some network resource that isn t available to you for mally request access under your own account Likewise never give your account information to a co worker so that he or she can access a needed resource Your co worker should instead for mally request access under his or her own account Don t install any software or hardware on your computer without first obtaining permission This especially includes wireless access devices or modems Don t enable file and printer sharing on workstations without first getting permission 1 Never attempt to disable or bypass the network
537. ys going up in the attic poking his or her head up through ceiling panels and wiping fiberglass insula tion out of his or her hair or fishing cables through walls If you re going to do it do it right so you don t have to do it again in just a few years Build your cable installation to last Your network users may be satisfied with 100 Mbps networking now but it won t be long before they demand gigahertz speed And who knows how fast the next wave of networking will be If you cut costs by using plain Cat5 cable instead of more expensive Cat6 cable you ll have to replace it later 1 You might be tempted to skip the modular wall jacks and patch cables and instead just run the cable down the wall out through a hole and then directly to the computer or hub That s a bad idea because the connectors are the point at which cables are most likely to fail If a connector fails you have to replace the entire cable all the way up the wall through the ceiling and back to the switch By wiring in a wall jack and using a patch cable you have to replace only the patch cable when a connector fails For more information about professional touches for installing cable see Chapter 5 Turning Off or Restarting a Server Computer While Users Are Logged On The fastest way to blow your network users accounts to kingdom come is to turn off a server computer while users are logged on Restarting it by press ing its reset button can have th
538. ze of the hard drive and the arrangement of its partitions In Windows you can find out the size of your computer s hard drive by 66 Part Il Building Your Own Network ar opening the My Computer window right clicking the drive icon and choosing the Properties command from the shortcut menu that appears Figure 4 1 shows the Properties dialog box for a 15 8GB hard drive that has 8 94GB of free space If your computer has more than one hard drive or partition Windows lists an icon for each drive or partition in the My Computer window Jot down the size and amount of free space available on each of the drives A partition is a section of a hard drive that s treated as though it were a separate drive But that won t be on the test The amount of memory In Windows you can find out this informa tion easily enough by right clicking the My Computer desktop icon and choosing the Properties command The amount of memory on your computer appears in the dialog box that appears For example Figure 4 2 shows the System window for a computer running Windows 7 with 2GB of RAM The version of the operating system that s installed You can determine the version by checking the System dialog box For example Figure 4 2 shows the System window for a computer running Windows 7 Ultimate It s important that all computers on your network are updated with the latest service pack The type of network interface installed in the computer
539. zle books and CD ROM software CCD leases two adjacent office buildings separated only by a small court yard The creative staff which consists of a dozen writers and educators works in Building A The sales marketing and administrative staff all six employees of it works in Building B The product development and marketing staff has 14 relatively new personal computers all running Windows Vista Business and a server computer run ning Windows 2003 Server These computers are networked by a 100 Mbps UTP network which utilizes a single 24 port 100 Mbps switch A fractional T1 line that s connected to the network through a small Cisco router provides Internet access 76 _ Partil Building Your Own Network The administrative staff has a hodgepodge of computers some running Windows Vista some running Windows XP and one still running Windows 98 The staff has a small Windows 2000 Server that meets everyone s needs but is pretty old The older computers have 10 100 network cards the newer ones have gigabit built in networking However the computers are all con nected to a fairly old 10 100 Mbps Ethernet switch with 12 ports so the over all network speed is limited to 100 Mbps Internet access is provided by a DSL connection Both groups are happy with their computers and networks The problem is that the networks can t communicate with each other For example the marketing team in Building A relies on daily printe
Download Pdf Manuals
Related Search
Related Contents
Samsung WA75U3WEC User Manual DOMINO 48 XT DOMINO 96 XT - Vals-près 担 架架 SERVO-DRIVE - KOCH Group AG PINNACLE" - INYOPools.com Silicon Pyranometer Smart Sensor (Part # S-LIB-M003) MBS598154 - MyBioSource Philips Multigroom Grooming kit QG3342/23 Trisa Electronics 9330-44 space heater Frigidaire FAC085M7A Air Conditioner Copyright © All rights reserved.
Failed to retrieve file