NT Server 4.0 Enterprise

Chapter 2 Domain Models

A single domain can support between 10,000 and 25,000 users; Microsoft is on the High end, experts on low)

Four Types of Domains

1.Single Domain Model - small organization;

A.single regional networks

B.no trust relationships

C.can be scaled into another model, but forethought should be used when choosing it

D.Advantages

i.Works best for limited number of users and resources

ii.Centralized management of users and resources

iii.No trusts involved

E.Disadvantages

i.Performance degradation as domain grows

ii.Users and resources are not grouped by department

iii.Resource browsing is slowed as the number of servers increases

2.Master Domain Model - larger user base but less than 50,000

A.Arrange network into multiple resource domains and yet still gave the benefits of centralized

administration

B.Also called the accounts domain

i.It contains the user accounts for the multiple domain structure reside within it

C.The resource domain trusts the master domain

D.All users are hosted in master domain; all resources are hosted in the lower domains

E.Resources can be grouped by department, geographic location, or any other organizational

scheme

F.Offers centralized management, split into two categories

i.User and group administration is performed in the top or master domain

ii.Resource management is performed within the domain that hosts the particular resource

iii.Gives each department control over its resources without compromising the overall

security structure

G.Advantages

i.A solid solution for moderately sized networks

ii.Departmental control of resources based on subordinate domains

iii.Central user account management

iv.Global groups are defined only once

H.Disadvantages

i.Local groups must be defined within each resource domain

ii.Resource domains must rely on the master domain for current and secure group

management

iii.Trust management is involved

3.Multiple Master Domain Model more than 50,000

A.Larger user base, extended over large geographical regions

B.Extension of the master domain model

C.Has two master domains and they trust each other

D.Provides centralized administration of user accounts

E.Usually set up to hold accounts via geographical region

F.T=M(M-1)+RM

i.T - the number of trust relationship required

ii.M - the number of master domains in the organization

iii.R - the number of resource domains in the organization

G.Advantages

i.Good solution for very large and growing organization

ii.Scaleable to accommodate any number of users

iii.Resources are locally and logically grouped

iv.Departmental-focused management of resources

v.Any one of the master domains can administer all of the user accounts

H.Disadvantages

i.Local and global groups must be defined multiple times

ii.Large number of trust relationships to manage

iii.User accounts are spread across multiple domains

4.Complete Trusts domain Model

A.Organizations of any size

B.Spread over multiple geographic regions do not require centralized administration

C.Universal access to resources, while decentralizing administration of user accounts

D.Users and resources are grouped by department

E.With a two way trust, all users and all resources can be managed from any point in the network

i.A two way trust is actually two one way trusts between the same two nodes

F.Also called a mesh

G.T=N(N-1)

i.N - number of domains in organization

ii.T - number of trust relationships required

H.Advantages

i.Useful for organizations with no MIS

ii.Scaleable for any number of users

iii.Each department has full control over its users and resources

iv.Users and resources are located within the same domain

I.Disadvantages

i.No centralized administration

ii.Many trust relationships to manage

iii.All administrators must trust each other to properly manage users, groups, and resources

5.Global groups

A.can contain only users

B.Groups that apply to all computers within a network

C.Can span across domain lines into trusting domains

6.Local groups

A.can contain global groups and users

B.within the domain in which it was created

 

Chapter 3 Trust Relationships

1.When Domain A trusts Domain B, A is the trusting domain and B is the trusted domain

2.When A trusts B that means that users on B can access resources on A, not vice versa

3.Only two domains may participate in a single trust

4.All trust relationships are one-way; for a two way trust each domain must set up a one way trust to each

other

5.Trusts do not carry through a domain; if A trusts B and B trusts C, A does not automatically trust C; a

trust must be set up between A and C

6.Permissions are not automatic; global groups or specific users must be given rights to the trusted domain

to access resources

7.Establishing and Configuring Trust Relationships

A.The trusted domain should add the domain in the trusting domain sections

B.Supply a password for this trust

C.In the trusting Domain add a trusted domain using the previously created password.

D.Both the trusted and trusting domain must acknowledge trust relationships

E.Using Trust Relationships

i.Once the trust is established the administrators can give access to the domains involved to

either users or global groups from either domain

ii.Global groups can contain users only

iii.Local groups can contain users and global groups

8.Permissions across Trust relationships

A.Assume that when a user accesses resources across two domains that his access is not local

B.NTFS Permissions

i.Compare all rights associated with the share and pick the most inclusive or permissive

rights

ii.Compare all NTFS permissions associated with the object and pick the most inclusive or

permissive rights

iii.Compare the two and pick the less permissive of the two

C.If object is on a FAT partition only share rights apply; pick the most permissive

D.NO ACCESS rules all

E.Users do not have to log into the trusted domain, if they have rights through the share the trusted

domain; if they log onto a domain that is not their home domain then they are a guest

9.Managing Multiple Trusts

A.Can only manage the trust between the 2 domains involved nothing more

B.Rules to live by

i.When users in Domain A need access to resources in Domain B, domain B must trust

domain A. Requires that B be a trusting domain and A to be a trusted domain in a trust

relationship.

ii.When users in both domains require access to resources in each other's domains, a

two-way trust is required. This means two separate trusts; one where A trust B and B

trusts A.

iii.When users in a master domain need access to resources in a resource domain, all resource

domains must trust the master

iv.When multiple master domains exit, each master domain must maintain a two-way trust

with each and every other master domain, permit the entire collection of master domains to

function as a logical unit

v.When multiple mater domains exist, each resource domain must establish a one-way trust

with each master domain, to permit all users to access resources in all resource domains

 

Chapter 4 Rights, Permissions and User Access to Resources

1.Access Control list

A.Comprises a list of services (read, write, delete) and the associated users and groups who can

perform each action

B.When the user attempts to access the object the ACL is read to see what that user is allowed to do

C.ACLs can be changed through the NT GUI or through DOS by using the CACLS command

 

 

3.NTFS Permissions

A.Specific Operations

i.Read (R) - object's data contents can be accessed

ii.Write (W) - objects data contents can be changed

iii.Execute (X) - the object can be executed

iv.Delete (D) - object can be deleted

v.Change Permissions (P) - objects access permissions can be changed

vi.Take Ownership (O) - ownership can be changed

B.Standard Permissions Set for Files and Directories

i.Read (RX) - files can be read or executed

ii.Change (RWXD) - read plus modify and delete

iii.Full Control (RWXDPO) - all access

iv.No access () - no access at all

C.Standard list for Directories (First set of () is for directory itself second () is for the contents

i.List (RX)() - can view the contents

ii.Read (RX)(RX) - users can read and traverse the directory, as well as read and execute

contents

iii.Add (WX)() - users can add files to the directory, but they cannot read or change the

contents

iv.Add and Read (RWX)(RX) - users can add files to and read files from the directory but

they cannot change them

v.Change (RWXD)(RWXD) - users can add, read, execute, modify, and delete the directory

and its contents

vi.Full Control (RWXDPO)(RWXDPO) - users have full control over the directory and its

contents

vii.No Access ()()

viii.SPECIAL ACCESS - can be defined if necessary; very intricate

4.Shares and Permissions

A.Combining Share and NTFS Permissions you take the least restrictive in each category and then

the most restrictive of the two that are left

B.Share permission levels

i.No Access

ii.Read (RX) - read and execute

iii.Change (RWXD) -read, execute, modify, and delete

iv.Full Control (RWXDPO) - full control

v.The Default is Full Control for the Everyone Group

5.User Rights

A.Access computer from network - logon or connect to this computer from a client on the network

(Administrators)

B.Add workstations to domain - none

C.Back up files and directories - administrators, backup operators

D.Change system time - Administrators, backup operators

E.Force remote shutdown - Administrators, server operators

F.Load/unload device drivers - administrators

G.Log on locally - administrators, server operators, backup operators, account operators, print

operators

H.Manage audit and logs - administrators

I.Restore files/directories - administrators, server operators, backup operators

J.Shutdown the system - administrators, server operators, backup operators, account operators,

print operators

K.Take ownership of files or objects - administrators

L.Additional rights available but not assigned to anyone in particular

i.Act as part of an operating system

ii.Bypass traverse checking

iii.Create a pagefile

iv.Create a token object

v.Create permanent shared objects

vi.Debug programs

vii.Generate security audits

viii.Increase quotas

ix.Increase scheduling priority

x.Lock pages in memory

xi.Log on as a service

xii.Modify firmware environment values

xiii.Profile single process

xiv.Profile system performance

xv.Replace process-level tokens

 

Chapter 5 Optimizing Domain Use

1.You can not change a PDC or BDC from domain to domain due to SIDs of each machine

2.Synchronization of Domain Controllers

A.Sends updates to the SAM regularly to the BDCs

B.Registry controls of Synchronization

i.HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters

a.Pulse - (60 - 3,600) defines the typical pulse frequency. Default=300

a.Number of seconds between synchronization's

b.PulseConcurrency - (1 -500) maximum number of BDCs that the PDC pulses

simultaneously; Default = 20

a.Number of BDCs synchronizing simultaneously

c.PulseMaximum - (60 - 86,400) sends every BDC a pulse at this interval; default =

7,200

d.PulseTimeout1 - (1 - 120) defines the amount of time a PDC will wait for BDC to

respond to a pulse; default =5

e.PulseTimeout2 - (60 - 3,600) defines how long the PDC waits for a BDC to

complete partial synchronization; default = 300

f.Randomize - (0 - 120) defines a backoff period for the BDC; should always be less

than the PulseTimeout1; defualt = 1

g.ReplicationGovenor - (0 -100) ; defines the packet size used in the synch process;

default = 100

3.Domain Database Info

A.Not exceed 40MB

i.User accounts = 1K

ii.Computer accounts = .5k

iii.Groups = 4k

4.User Profiles

A.*.man is mandatory

B.*.dat is a standard profile data file

C.\\PDC1\NetLogon\%username% in the user profile button

 

Chapter 6 NT Redundancy and Fault Tolerance

1.Directory Replication

A.Disseminate often-used data and regularly updated data to multiple computer to speed file access

and improve reliability

B.Any NT server can export data

C.Any NT server, workstation or LAN Manager server can import

D.By default the export directory is \%wintnroot%\system32\repl\export\

E.By default the import directory is \%winntroot%\system32\repl\import\

F.All files and directories beneath these directories are kept identical

G.Installing Replication

i.Create a user account that is a member of the replicator group

ii.Configure the Directory Replicator Service to start automatically with this users logon

iii.Configure Directory Replication through Server manager; import or export depending on

the system

iv.Restart the machines involved

v.Check to see if it worked

H.Doesn't work if the files are being accessed

I.Status of replication can be found in Server Manager\Manage (the computer name)

i.OK - replication successful

ii.No Master - the import server is not receiving updates from the export server, or the

replication service may not be running

iii.NO Sync - no replication has been attempted

iv.[blank] - no replication has been attempted

v.Event Viewer - type net helpmsg (error number) from command prompt to decipher code

J.Export must be from an NTFS partition

K.Replication can only occur between system that have system clocks that are no more than 59

minutes apart, time zones do not work

L.all applications should point to the import directory only

M.Only replicate small amounts of data

N.Always export to the import directory on the export server to establish functionality

2.Additional Configuration through the Registry

A.KKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Replicator\Parameters

i.Interval - (1-60) how often broadcast are sent from the export server;

ii.GuardTime - (0- half Interval) - number of minutes the export server will wait after a

directory becomes stable before attempting to replicate; default = 2

3.Fault Tolerance

A.Disk Mirroring

i.Slow Performance

ii.Increased cost

iii.No protection from Controoller Failure

iv.2 Disks 1 controller

B.Disk Duplexing

i.Disk mirroring with two controllers

ii.No degradation of system performance

iii.More expensive because it requires the additional controller

C.Disk Stripping

i.No parity

ii.No fault tolerance

iii.Can be done with 2 Disks

iv.NTFS or FAT

v.Boot and System partitions can not be part of the stripe set

D.Disk Stripping with Parity

i.3 Disks required

ii.Fault tolerant

iii.NTFS only

iv.T = P*(n-1)

a.T= total capacity

b.P= the size of the partition

c.N = number of partitions

v.All partitions must be of equal size

vi.Neither Boot nor System partitions can be part of the stripe set

E.RAID

i.Can implement RAID 0, 1, 5

ii.Software RAID is performed by NT and requires more system overhead

iii.Hardware RAID is faster and can include the system and boot partitions

F.Recovery

i.Fixing Broken Mirror or Duplexes

a.Use Disk administrator

Break the mirror

Delete the bad partition

Assign the drive letter to the good partition

Create a mirror set using a new partition and the old one

If the original disk has failed you must use a boot disk to get in

b.The boot disk must contain: Boot.ini; NTLDR; ntdetect.com; ntboottdd.sys;

bootsect.dos

c.Restoring With Parity information

a.It is done automatically but is CPU intensive and will cause the system to

slow drastically.

Replace the drive and create a new partition of the same size and

select rebuild

b.ARC Naming

i."mult(#)disk(#)rdisk(#)partition(#)\Text

ii."scsi(#)disk(#)rdisk(#)partition(#)\Text

a.SCSI or Multi = type of controller;

b.SCSI = means that the controller doesn't support BIOS

translation; the NTBOOTTDD.SYS file must be in the boot

partition;

c.MULTI = any controller that supports BIOS translation; can

be IDE or SCSI

d.The number after the controller is the number for the

physical controllers (0 for the first, 1 for the second and so

on)

e.DISK = appears in all but is only used if SCSI appears in the

ARC name; the physical number of the drive (0 for the first, 1

for the second and so on); if multi than it is set to 0

f.RDISK = appears in all but only used if multi is the

controller; if SCSI is used it is set to 0 and ignored; the

physical number of the drive; 0 is the first, 1 is the second

and so on

g.PARTITION = identifies the partition; this one 1 is the first, 2

is the second and so on

h.\PATH = the directory where the system resides

iii.The boot files are stored on the system partition; where the default

WinNT directory is; and the system files are stored on the boot

partition

 

Chapter 7 Auditing Resources and Access

1.Auditing

A.Informs the administrator if someone attempts to access secured resources

or how often a particular resources is accessed

B.By default set to not audit, the master switch

C.Seven event types and descriptions that can be audited from the second

level once the master switch is turned on

i.Logon and Logoff

ii.File and Object Access

iii.Use of user rights

iv.User and group management

v.Security policy changes

vi.Restart, shutdown, and system

vii.Process tracking

D.The third level of audit switches is on the object level

i.Read, write and execute for files and directories

a.Directories can also replace auditing on existing files or

subdirectories or both

ii.Print instead for printers

iii.Otherwise

a.Delete, change permissions, take ownership

E.Does effect the system performance

2.Account Policy

A.Maximum and minimum password age

B.Password length

C.Password uniqueness

D.Account lockout after specified failed attempts

E.Failed counter reset

F.Lockout duration

G.Force users off when hours expire

H.Require logon before password change

 

Chapter 8 Network Protocols, Routing and Relaying

1.TCP/IP utilities

A.Arp - address resolution protocol; displays IP address mapped to a MAC

node address

B.Hostname - displays the name of the current computer host

C.IPconfig - display IP configuration details

D.LPQ - displays the status of a print queue only on a computer running DLC

E.NBTSTAT - displays NetBIOS of TCP/IP status

F.NETSTAT - displays TCP/IP status and statistics

G.PING

H.ROUTE - interacts with routing tables

I.TRACERT - details the route used by TCP/IP

2.Routing with Windows NT

A.Multiprotocol Router (MPR) - requires two NICs; multiple segments

i.RIP - routing information protocol for TCP/IP

a.Share routing information dynamically

b.Or can be a static router with manually configured routing

tables

To enable you must remove ROP for IP from the

computer

i.Manually configure the routing tables

1.Route and then switches

a.-f - removes all gateway

entries from the routing table;

clears the tables

b.-p - implements persistent

routes by automatically

sustaining routing changes

through computer reboots

c.command

i.print - prints a route

ii.add - adds a route

iii.delete - deletes a route

iv.change - modifies an

existing route

d.destination - indicates the

host or network to which you

want to route

e.MASK - specifies that the

next parameter is to be

interpreted as the netmask

parameter

f.Netmask - specifies the

subnet mask value to be

associated with this route

entry

g.Gateway - specifies the

default gateway

h.Metric - specifies that the next

parameter be interpreted as the

metric parameter

i.Metric - defines the hop

count for the specified

destination

B.RIP for IPX

a.Automatically installs the SAP agent for IPX

C.DHCP Relay Agent

a.Allows a small set of IP addresses to support a larger number of

computers

b.A single DHCP server can support multiple subnets connected by

the NT Server

c.Installed through the services section of the Network Applet

D.AppleTalk Routing

a.A function of the Services for Macintosh

 

Chapter 9 Windows NT Names and Name Service, Plus IIS

1.NetBIOS names

A.15 characters or less

B.mandatory piece of networking

C.NetBEAUI uses it to resolve names

D.IPX can use it to resolve names

2.IP Name Resolution

A.DHCP

i.Until a client receives its leased IP address it uses its MAC address to

connect to the server

B.DNS

i.Domain Name Service

ii.Resolve FQDN(fully qualified domain names) through IP addresses

iii.Used to use HOST files

iv.Allows machines to find the proper location of a system without knowing

the IP address

C.WINS

i.Maps NetBIOS names to IP addresses

ii.Recognizing NetBIOS names on all subnets

iii.Enabling internetwork browsing

iv.Used to use an LMHOST file

WINS

DNS

Maps IP addresses to

NetBIOS names

Maps IP address to FQDNs

Automatic client data

registration

Manual configuration

Flat database name space

Uses FQDNs hierarchical

structure

Used on MS clients and

networks

Used on TCP/IP based host and

networks

Only on entry per client

Each host can have multiple

aliases

Enables domain functions

such as logon and browsing

N/A

3.Internet Information Server

A.Web - allows for HTTP access

i.Anonymous access

ii.NT user account restricted access

iii.Activity login

iv.IP or domain name restricted/granted access

v.Virtual server configuration

vi.Virtual directories

vii.If IIS is used with Internet Connectivity InterNIC will handle the DNS

viii.If IIS is used within a private network DNS and WINS are necessary

B.FTP

C.Gopher

 

Chapter 10 Windows NT Network Monitor

1.Must be installed; added through Services tab of Network applet

2.Not as fully featured as SMS

3.Doesn't require as much system overhead

4.NIC doesn't need to be in promiscuous mode

A.All the supported frame types are captured by the card due to the support for NDIS

4

B.Save up to 30% in CPU performance

C.Monitors on 4 type of data

i.Frames sent from the server

ii.Frames sent to the server

iii.Broadcast frames

iv.Multicast frames

5.To capture data simply use the Start command in the Capture pull down menu

A.At any time it can be stopped or paused

i.Then the contents of the frame can be viewed

B.During and after the capture session you can view

i.Bar graphs

a.Real time display

b.Percent network utilization

How traffic to and from the server is affecting overall

network performance

c.Frames per second

d.Bytes per second

e.Broadcasts per second

f.Multicasts per second

ii.Session statistics

a.Detail the conversations going on over the network

b.Realtime, cumulative during each capture session

iii.Station statistics

a.Cumulative data on the dynamics of each network conversation

b.MAC or network address

c.Sent frames

d.Received frames

e.Bytes sent

f.Bytes received

g.Directed frames sent

h.Multicasts sent

i.Broadcasts sent

iv.Summary statistics

a.Cumulative data sets

b.Network

c.Captured

d.Per second

e.MAC

f.MAC errors

C.During the capture session all frames are stored in system memory; they can be

saved for later investigation

6.Capture Filters

A.Set by Capture-> filter command

B.Captures information can only be as large as the system memory will allow

C.Gather data based on protocol, address pairs, and data patterns

D.Capturing by Protocol

i.Sap/type = {protocol} is the filter line

ii.See page 211 for list of supported protocols

E.Capturing by Address

i.Communication between the server and specific computer can be tracked

using an address pair capture filter

ii.Up to four pairs can monitors simultaneously

iii.Consists of

a.The MAC address of the two computers

b.An arrow to specify which way to monitor traffic

- - >, < - - , <-->

c.include or exclude keyword to instruct the Network Monitor to track

the frame or to ignore it

d.order doesn't matter

e.exclude commands are accessed first

f.if a pair is represented by an exclude and include then it is ignored

g.if no address pair is specified then the default pair is used: <your

computer> � > ANY

iv.Capturing by Data Pattern

a.Limits a capture to frames that contain a specific ASCII or

hexadecimal pattern that occurs within the entire frame or specified

depth into the frame (offset) in bytes

b.Two logical operations can be used with this OR or NOT

c.Enable you to identify multiple patterns to capture and ignore

F.Capture Triggers

i.Set of conditions that initiates an action when the conditions are met

ii.Allow automation of some tasks associated with gathering network

communication data

iii.Can stop or start the application

iv.Custom Triggers

a.Nothing - default setting of no trigger

b.Pattern match - a matched pattern within a frame; same settings as

those present in the pattern match filter

c.Buffer Space - percentage level of used buffer space

d.Pattern match then buffer space

e.Buffer space then pattern match

v.Trigger Actions

a.No action

b.Stop capture

c.Execute command line

G.Dedicated Mode Captures

i.Reduces load on CPU

ii.Prevents the Network Monitor from updating and displaying capture

window statistics

iii.Only shows the total number of captured frames

iv.4 buttons

a.stop

b.stop and view

c.pause

d.Normal mode

7.Addressing Security Issues

A.If no password is set, any user using SMS can access the data

B.Identify Network Monitor Users command shows computer name, user name, state

of the Network monitor, version number, and network adapter address

8.Miscellaneous

A.All addresses intercepted can be viewed

i.Edit entries to alter type, address, name, or comment

ii.Manually add or delete entries

iii.This is used to associate MAC addresses with user friendly names

B.Buffer Settings

i.Size of the buffer used to store captured frames

ii.Default is 1 MB

iii.Maximum is 8 MB less than total ram installed

iv.Once the buffer is full it throws away old frames

v.Size of each individual frames form 64-65,000 bytes

C.Track multiple segments attached to different NICs in the server

D.Find all Names

i.Search each captured frame for a NetBIOS name

ii.All names found are added to the database

E.Find Routers and Resolve Addresses from Names are only available with SMS

 

Chapter 11 Managing Windows NT Performance

1.Task Manager

A.Identifying non-responsive applications, terminating them

B.Identifying runaway processes, and terminating them

C.Ascertaining the memory use levels

2.Performance Monitor

A.Chart View

B.Alert View

C.Log View

D.Report View

E.Add to Command

i.Computer - which machine

ii.Objects - processor, memory, physical disk etc.

iii.Instances - identifies which instance of an object should be monitored

iv.Counters - available counters for a specific instance of an object on a

chosen computer

F.Common Objects and Counters

i.Processor: %processor time - if 80 or more should increase processor

power

ii.System: Processor Queue length - greater than 2 could need more

processor power

iii.Processor: Interrupts/Sec - malfunctioning hardware, if # increases and

processor time doesn't locate faulty hardware

iv.Memory: Cache faults, page fault, page/sec - may need more ram, if # is

high

v.PhysicalDisk/LogicalDisk: %Disk time - if disk is using a large amount of

processor time HD maybe a bottleneck

vi.PhysicalDisk/LogicalDisk: %Disk Bytes/transfer - how fast HD are

transferring data

vii.PhysicalDisk/LogicalDisk: Current disk queue length - may need upgraded

HD, is queue is long

3.Monitoring Disk Performance

A.To turn on disk monitors execute diskperf -y; then reboot

B.Using Charts - alter maximum value of vertical axis, histogram or graph view, add

grid lines, change update intervals

C.Configuring Alerts

D.Logs -

E.Reports

F.Miscellaneous Commands

i.File|Save [View] settings as - save views settings to used another time

ii.File|Save Workspace - saves a view settings in a single file

iii.File|Export - saves the current views captured data in a tab - or comma

delaminated file

iv.Add|Edit - edits the counter parameters or settings

v.Add|Delete - removes the counter

vi.Options|Data From - displays data from the active network or from a log file

G.Baselining - establish a baseline with no users attached, and then throughout a

normal workday to understand when something is going wrong

H.NT Paging File

i.Disk striping automatically spreads it across multiple disks

ii.On a separate disk from the system files

iii.Mirroring will hurt the config

iv.Smallest is 12 MB more than the RAM

4.Optimizing Server Settings

A.Minimize memory used - better performance for less than 10 users

B.Balance - best performance for 10 to 64 users

C.Maximize throughput for file sharing - best performance for more than 64 users;

default

D.Maximize throughput for network applications - supports distributed applications

(SQL Server)

 

Chapter 12 Advanced NetWare Topics

1.Protocols and Compatibility Issues

A.By default sees 802.2 for 3.12, 4.x or later

B.Before that 802.3

C.802.2, 802.3, 802.3 SNAP, 802.5, 802.5 SNAP

D.correct frame type is essential for connectivity

E.If multiple frame types are necessary, manual detection must be chosen and the

frame types used must be entered

2.Gateway Services for NetWare

A.Install the service and restart the server

B.Create a group on the NetWare server called NTGATEWAY

C.User account on the NetWare server with file system rights

D.A share that will be used

E.Add printers through the printers applet

i.NetWare compatible print server

F.Called Client Services for NetWare on NT Workstation

3.File and Print Services for NetWare - makes NT resources available to NetWare clients

4.NetWare Migration

A.Duplicate Accounts - default is to skip and not migrate any additional data to the

NT Server

i.Can permit duplicates to be created with a Prefix

ii.When migrating multiple NetWare servers, with multiple identical accounts,

create a mapping file, can maintain passwords,

 

Chapter 13 Advanced NT Printing

1.Windows NT printer applet

A.Client Application - a network program that originates print jobs, client or server

based

B.Connecting to a printer - process of attaching to a network share that resides on

the computer on which the logical printer was created

C.Creating a Printer - process of naming, defining settings for, installing drivers for,

and linking a printing device to the network; performed by the "Add Printer

Wizard"

D.Network interface Printers - built-in network interface cards for print devices that

are directly attached to the network; (unless specified as TCP/IP it is defaulting to

DLC)

E.Print Client - a computer on a network that transmits the print jobs to be produced

by the physical device

F.Print Device - the print device itself

G.Print Job - the code that defines the print processing commands as well as the

actual file to be printed;

H.Print Resolution - the measurement of pixel density that is responsible for the

smoothness of any image or text being printed; measured in DPI( Dots per inch)

I.Print Server - the computer that links physical print device to the network;

manages sharing

J.Print Server Services - software components located on the print server that

accepts print jobs and sends them to the print spooler for execution

K.Print Spooler - the collection of DLLs that acquires, processes, catalogues, and

disburses print jobs

L.Print Driver - programs that enable communication between applications and

devices

M.Printer/Logical printer - the logical printer is the software interface that

communicates between the operating system and the physical device

N.Queue/Print Queue - list of files waiting to be printed

O.Rendering -

2.Printing With NT Server

A.GDI - graphics device interface;

B.Print Device - the physical device

C.Print Driver - software driver

D.Print Monitor

E.Print processor

F.Print Router

G.Print Spooler

i.You can change the location of the Spool file to reserve space on a drive

3.Printing Clients

A.Printing from Windows NT Clients - when adding the printer it automatically take

the driver from server

B.Printing from Windows 95 - as long as print driver is installed on the server it is

automatically added

C.Printing from MS-DOS or Windows 3.11 - must install the driver separately and

then attach to the printer

4.Spooling

A.Print Priorities - 1 - 99; 1 being the lowest

i.Can create two shared printers to the same physical printer with different

priorities

B.Separate Spool Files - it may be necessary to create separate spool files for

different printers

i.Done through the registry

ii.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Printers

C.Changing the location of the spool file

i.Default - \%winntroot%\system32\spool

ii.Properties sheet of the printer

a.Advanced tab

b.Enter the path for the directory

5.Logical Printers and printer pools

A.Logical printer - software interface to the printer

B.Physical Printer

C.Printer Pool - multiple devices attached to one logical printer

i.Printers must all be the same type

ii.Prints to which ever device is free

6.Advanced Printing

A.Print Commands

i.New driver - installs or replaces existing printer driver

ii.Print processor - change the data type used by the print system

iii.Separator page - defines a document to be inserted between print jobs

iv.Enable printer pooling - assists in configuring identical printers to share a

single queue

v.Available - defines the time frame when a printer is active; if a job is sent

when the printer is not available then the job is stored and spooled when if

become available

vi.Priority -

vii.Spool print documents so program finishes printing

7.Printer Shares

A.No access

B.Print

C.Manage documents

D.Full Control

E.Default Settings

i.Full control - administrators; server operators; print operators

ii.Manage documents - creator owner

iii.Print - everyone

8.Multiple Printers

A.A single physical printer can be served by multiple logical printers

B.A single logical printer can server multiple physical printers

C.Multiple logical printers can server multiple physical printers

9.Print Auditing

A.Print

B.Full Control

C.Delete

D.Change permissions

E.Take ownership

10.TCP/IP Printing

A.LPR ports are used for the TCP printing

B.UNIX clients use LPR and LPD servers

 

Chapter 14 Advanced RAS Topics

1.Supports IPX, NetBEAUI, TCP/IP

2.SLIP - only supports TCP/IP with static addresses

A.Does not support encrypted passwords

3.PPP - supports ApplTalk, TCP/IP, IPX, NetBEAUI

A.Supports DHCP, and encrypted passwords

4.RAS Server

A.Only supports PPP

B.A NetBIOS gateway is established

C.Supports both IP and IPX routing

D.Supports NetBIOS and windows sockets applications

E.PPTP

F.Multilink PPP

5.RAS setup

A.Modems involved

i.Dial out

ii.Receive

iii.Both

B.DCHP, for the computer or network

C.What protocols

D.Encryption settings

E.IPX numbering automatic or configurable

6.RAS Routing, Gateway, Firewall

A.Routing - full access to network

B.Gateway - NetBEAUI, access to a network

C.Firewall - limitations placed on RAS clients

7.RAS Security

A.RASS Encryption

i.Security tab of phonebook entries

ii.Or, Network configuration dialog box

iii.Allow any authentication including clear text - most permissive, uses PAP,

connecting to a none Microsoft Server

iv.Require encrypted authentication - uses CHAP or SPA, connecting to a

non Microsoft Server

v.Require Microsoft encrypted authentication - MS-CHAP, a Microsoft

server, data encryption

B.RAS Callback

i.No Call Back - when user establishes a RAS connection, they will not be

called back

ii.Set By Caller - user inputs the call back number, saves on long distance,

iii.Preset To - configure the number on the server, user must always call form

that number

C.Autodial occurs when resources are accessed that come from the RAS connection

D.Logging can be activated and stored in the device.log file

i.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters

= 1

E.Null Modem cables can be used to test RAS

F.Name resolution can be aided with the use of DNS or WINS

 

Chapter 15 Advanced Troubleshooting

1.Installation Failures

A.Media Failures

B.Domain controller communication difficulties

C.Stop message errors or halt on blue screen

D.Hardware problems

E.Dependency failures

2.Boot Failures

A.NTLDR Error Message - use ERD to repair or replace the files

B.NTOSKRNL Missing error Message - user ERD

C.Boot.INI missing error message - restore file from Backup or ERD

D.BOOTSECT.DOS missing error message - ERD

E.NTDETECT.COM missing error message - ERD

3.Repair Tools

A.Event Viewer

B.Last Known good Configuration

C.The Registry

D.Emergency Repair Disk (ERD)

i.Updated versions by running RDISK.EXE

a.System._ HKEY_LOCAL_MACHINE\SYSTEM compressed

b.Software._ HKEY_LOCAL_MACHINE\SOFTWARE compressed

c.Security._ HKEY_LOCAL_MACHINE\SECURITY compressed

d.SAM._ HKEY_LOCAL_MACHINE\SAM compressed

e.NTUSER.DA_ default profile compressed

f.AUTOEXEC.NT

g.CONFIG.NT

h.SETUP.LOG list of installed files and their checksums

i.DEFAULT._ HKEY_USER\DEFAULT compressed

ii.Reboot the computer with the first 2 disks for NT setup

iii.Choose R for repair

iv.Select the appropriate options

v.Inert disk 3 and the ERD disk when prompted

4.Printing Solutions

A.Disk space on dirve hosting the spool files

B.Stop and restart the spooler service

5.BOOT.INI Switches -

A./BASEVIDEO - boots to standard VGA video

B./BAUDRATE=n - sets the debugging communication baud rate when using the

Kernel Debugger

C./CRASHBUG - loads the debugger into memory; remains inactive unless a kernelerror occurs

D./DEBUG - loads the debugger into memory to be activated by a host debugger

E./DEBUGPORT=COMx - sets the debugging com port

F./MAXMEM:n - sets the maximum amount of RAM that NT can us

G./NODEBUG - no debugging information is being used

H./NOSERIALMICE=COMx - disables serial mouse detection on the specified port

I./SOS - each driver name is displayed when it is loaded