NT Server 4.0 Enterprise
Chapter 2 Domain Models
A single domain can support between 10,000 and 25,000 users; Microsoft is on the High end, experts on low)
Four Types of Domains
1.Single Domain Model - small organization;
A.single regional networks
B.no trust relationships
C.can be scaled into another model, but forethought should be used when choosing it
D.Advantages
i.Works best for limited number of users and resources
ii.Centralized management of users and resources
iii.No trusts involved
E.Disadvantages
i.Performance degradation as domain grows
ii.Users and resources are not grouped by department
iii.Resource browsing is slowed as the number of servers increases
2.Master Domain Model - larger user base but less than 50,000
A.Arrange network into multiple resource domains and yet still gave the benefits of centralized
administration
B.Also called the accounts domain
i.It contains the user accounts for the multiple domain structure reside within it
C.The resource domain trusts the master domain
D.All users are hosted in master domain; all resources are hosted in the lower domains
E.Resources can be grouped by department, geographic location, or any other organizational
scheme
F.Offers centralized management, split into two categories
i.User and group administration is performed in the top or master domain
ii.Resource management is performed within the domain that hosts the particular resource
iii.Gives each department control over its resources without compromising the overall
security structure
G.Advantages
i.A solid solution for moderately sized networks
ii.Departmental control of resources based on subordinate domains
iii.Central user account management
iv.Global groups are defined only once
H.Disadvantages
i.Local groups must be defined within each resource domain
ii.Resource domains must rely on the master domain for current and secure group
management
iii.Trust management is involved
3.Multiple Master Domain Model more than 50,000
A.Larger user base, extended over large geographical regions
B.Extension of the master domain model
C.Has two master domains and they trust each other
D.Provides centralized administration of user accounts
E.Usually set up to hold accounts via geographical region
F.T=M(M-1)+RM
i.T - the number of trust relationship required
ii.M - the number of master domains in the organization
iii.R - the number of resource domains in the organization
G.Advantages
i.Good solution for very large and growing organization
ii.Scaleable to accommodate any number of users
iii.Resources are locally and logically grouped
iv.Departmental-focused management of resources
v.Any one of the master domains can administer all of the user accounts
H.Disadvantages
i.Local and global groups must be defined multiple times
ii.Large number of trust relationships to manage
iii.User accounts are spread across multiple domains
4.Complete Trusts domain Model
A.Organizations of any size
B.Spread over multiple geographic regions do not require centralized administration
C.Universal access to resources, while decentralizing administration of user accounts
D.Users and resources are grouped by department
E.With a two way trust, all users and all resources can be managed from any point in the network
i.A two way trust is actually two one way trusts between the same two nodes
F.Also called a mesh
G.T=N(N-1)
i.N - number of domains in organization
ii.T - number of trust relationships required
H.Advantages
i.Useful for organizations with no MIS
ii.Scaleable for any number of users
iii.Each department has full control over its users and resources
iv.Users and resources are located within the same domain
I.Disadvantages
i.No centralized administration
ii.Many trust relationships to manage
iii.All administrators must trust each other to properly manage users, groups, and resources
5.Global groups
A.can contain only users
B.Groups that apply to all computers within a network
C.Can span across domain lines into trusting domains
6.Local groups
A.can contain global groups and users
B.within the domain in which it was created
Chapter 3 Trust Relationships
1.When Domain A trusts Domain B, A is the trusting domain and B is the trusted domain
2.When A trusts B that means that users on B can access resources on A, not vice versa
3.Only two domains may participate in a single trust
4.All trust relationships are one-way; for a two way trust each domain must set up a one way trust to each
other
5.Trusts do not carry through a domain; if A trusts B and B trusts C, A does not automatically trust C; a
trust must be set up between A and C
6.Permissions are not automatic; global groups or specific users must be given rights to the trusted domain
to access resources
7.Establishing and Configuring Trust Relationships
A.The trusted domain should add the domain in the trusting domain sections
B.Supply a password for this trust
C.In the trusting Domain add a trusted domain using the previously created password.
D.Both the trusted and trusting domain must acknowledge trust relationships
E.Using Trust Relationships
i.Once the trust is established the administrators can give access to the domains involved to
either users or global groups from either domain
ii.Global groups can contain users only
iii.Local groups can contain users and global groups
8.Permissions across Trust relationships
A.Assume that when a user accesses resources across two domains that his access is not local
B.NTFS Permissions
i.Compare all rights associated with the share and pick the most inclusive or permissive
rights
ii.Compare all NTFS permissions associated with the object and pick the most inclusive or
permissive rights
iii.Compare the two and pick the less permissive of the two
C.If object is on a FAT partition only share rights apply; pick the most permissive
D.NO ACCESS rules all
E.Users do not have to log into the trusted domain, if they have rights through the share the trusted
domain; if they log onto a domain that is not their home domain then they are a guest
9.Managing Multiple Trusts
A.Can only manage the trust between the 2 domains involved nothing more
B.Rules to live by
i.When users in Domain A need access to resources in Domain B, domain B must trust
domain A. Requires that B be a trusting domain and A to be a trusted domain in a trust
relationship.
ii.When users in both domains require access to resources in each other's domains, a
two-way trust is required. This means two separate trusts; one where A trust B and B
trusts A.
iii.When users in a master domain need access to resources in a resource domain, all resource
domains must trust the master
iv.When multiple master domains exit, each master domain must maintain a two-way trust
with each and every other master domain, permit the entire collection of master domains to
function as a logical unit
v.When multiple mater domains exist, each resource domain must establish a one-way trust
with each master domain, to permit all users to access resources in all resource domains
Chapter 4 Rights, Permissions and User Access to Resources
1.Access Control list
A.Comprises a list of services (read, write, delete) and the associated users and groups who can
perform each action
B.When the user attempts to access the object the ACL is read to see what that user is allowed to do
C.ACLs can be changed through the NT GUI or through DOS by using the CACLS command
3.NTFS Permissions
A.Specific Operations
i.Read (R) - object's data contents can be accessed
ii.Write (W) - objects data contents can be changed
iii.Execute (X) - the object can be executed
iv.Delete (D) - object can be deleted
v.Change Permissions (P) - objects access permissions can be changed
vi.Take Ownership (O) - ownership can be changed
B.Standard Permissions Set for Files and Directories
i.Read (RX) - files can be read or executed
ii.Change (RWXD) - read plus modify and delete
iii.Full Control (RWXDPO) - all access
iv.No access () - no access at all
C.Standard list for Directories (First set of () is for directory itself second () is for the contents
i.List (RX)() - can view the contents
ii.Read (RX)(RX) - users can read and traverse the directory, as well as read and execute
contents
iii.Add (WX)() - users can add files to the directory, but they cannot read or change the
contents
iv.Add and Read (RWX)(RX) - users can add files to and read files from the directory but
they cannot change them
v.Change (RWXD)(RWXD) - users can add, read, execute, modify, and delete the directory
and its contents
vi.Full Control (RWXDPO)(RWXDPO) - users have full control over the directory and its
contents
vii.No Access ()()
viii.SPECIAL ACCESS - can be defined if necessary; very intricate
4.Shares and Permissions
A.Combining Share and NTFS Permissions you take the least restrictive in each category and then
the most restrictive of the two that are left
B.Share permission levels
i.No Access
ii.Read (RX) - read and execute
iii.Change (RWXD) -read, execute, modify, and delete
iv.Full Control (RWXDPO) - full control
v.The Default is Full Control for the Everyone Group
5.User Rights
A.Access computer from network - logon or connect to this computer from a client on the network
(Administrators)
B.Add workstations to domain - none
C.Back up files and directories - administrators, backup operators
D.Change system time - Administrators, backup operators
E.Force remote shutdown - Administrators, server operators
F.Load/unload device drivers - administrators
G.Log on locally - administrators, server operators, backup operators, account operators, print
operators
H.Manage audit and logs - administrators
I.Restore files/directories - administrators, server operators, backup operators
J.Shutdown the system - administrators, server operators, backup operators, account operators,
print operators
K.Take ownership of files or objects - administrators
L.Additional rights available but not assigned to anyone in particular
i.Act as part of an operating system
ii.Bypass traverse checking
iii.Create a pagefile
iv.Create a token object
v.Create permanent shared objects
vi.Debug programs
vii.Generate security audits
viii.Increase quotas
ix.Increase scheduling priority
x.Lock pages in memory
xi.Log on as a service
xii.Modify firmware environment values
xiii.Profile single process
xiv.Profile system performance
xv.Replace process-level tokens
Chapter 5 Optimizing Domain Use
1.You can not change a PDC or BDC from domain to domain due to SIDs of each machine
2.Synchronization of Domain Controllers
A.Sends updates to the SAM regularly to the BDCs
B.Registry controls of Synchronization
i.HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
a.Pulse - (60 - 3,600) defines the typical pulse frequency. Default=300
a.Number of seconds between synchronization's
b.PulseConcurrency - (1 -500) maximum number of BDCs that the PDC pulses
simultaneously; Default = 20
a.Number of BDCs synchronizing simultaneously
c.PulseMaximum - (60 - 86,400) sends every BDC a pulse at this interval; default =
7,200
d.PulseTimeout1 - (1 - 120) defines the amount of time a PDC will wait for BDC to
respond to a pulse; default =5
e.PulseTimeout2 - (60 - 3,600) defines how long the PDC waits for a BDC to
complete partial synchronization; default = 300
f.Randomize - (0 - 120) defines a backoff period for the BDC; should always be less
than the PulseTimeout1; defualt = 1
g.ReplicationGovenor - (0 -100) ; defines the packet size used in the synch process;
default = 100
3.Domain Database Info
A.Not exceed 40MB
i.User accounts = 1K
ii.Computer accounts = .5k
iii.Groups = 4k
4.User Profiles
A.*.man is mandatory
B.*.dat is a standard profile data file
C.\\PDC1\NetLogon\%username% in the user profile button
Chapter 6 NT Redundancy and Fault Tolerance
1.Directory Replication
A.Disseminate often-used data and regularly updated data to multiple computer to speed file access
and improve reliability
B.Any NT server can export data
C.Any NT server, workstation or LAN Manager server can import
D.By default the export directory is \%wintnroot%\system32\repl\export\
E.By default the import directory is \%winntroot%\system32\repl\import\
F.All files and directories beneath these directories are kept identical
G.Installing Replication
i.Create a user account that is a member of the replicator group
ii.Configure the Directory Replicator Service to start automatically with this users logon
iii.Configure Directory Replication through Server manager; import or export depending on
the system
iv.Restart the machines involved
v.Check to see if it worked
H.Doesn't work if the files are being accessed
I.Status of replication can be found in Server Manager\Manage (the computer name)
i.OK - replication successful
ii.No Master - the import server is not receiving updates from the export server, or the
replication service may not be running
iii.NO Sync - no replication has been attempted
iv.[blank] - no replication has been attempted
v.Event Viewer - type net helpmsg (error number) from command prompt to decipher code
J.Export must be from an NTFS partition
K.Replication can only occur between system that have system clocks that are no more than 59
minutes apart, time zones do not work
L.all applications should point to the import directory only
M.Only replicate small amounts of data
N.Always export to the import directory on the export server to establish functionality
2.Additional Configuration through the Registry
A.KKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Replicator\Parameters
i.Interval - (1-60) how often broadcast are sent from the export server;
ii.GuardTime - (0- half Interval) - number of minutes the export server will wait after a
directory becomes stable before attempting to replicate; default = 2
3.Fault Tolerance
A.Disk Mirroring
i.Slow Performance
ii.Increased cost
iii.No protection from Controoller Failure
iv.2 Disks 1 controller
B.Disk Duplexing
i.Disk mirroring with two controllers
ii.No degradation of system performance
iii.More expensive because it requires the additional controller
C.Disk Stripping
i.No parity
ii.No fault tolerance
iii.Can be done with 2 Disks
iv.NTFS or FAT
v.Boot and System partitions can not be part of the stripe set
D.Disk Stripping with Parity
i.3 Disks required
ii.Fault tolerant
iii.NTFS only
iv.T = P*(n-1)
a.T= total capacity
b.P= the size of the partition
c.N = number of partitions
v.All partitions must be of equal size
vi.Neither Boot nor System partitions can be part of the stripe set
E.RAID
i.Can implement RAID 0, 1, 5
ii.Software RAID is performed by NT and requires more system overhead
iii.Hardware RAID is faster and can include the system and boot partitions
F.Recovery
i.Fixing Broken Mirror or Duplexes
a.Use Disk administrator
Break the mirror
Delete the bad partition
Assign the drive letter to the good partition
Create a mirror set using a new partition and the old one
If the original disk has failed you must use a boot disk to get in
b.The boot disk must contain: Boot.ini; NTLDR; ntdetect.com; ntboottdd.sys;
bootsect.dos
c.Restoring With Parity information
a.It is done automatically but is CPU intensive and will cause the system to
slow drastically.
Replace the drive and create a new partition of the same size and
select rebuild
b.ARC Naming
i."mult(#)disk(#)rdisk(#)partition(#)\Text
ii."scsi(#)disk(#)rdisk(#)partition(#)\Text
a.SCSI or Multi = type of controller;
b.SCSI = means that the controller doesn't support BIOS
translation; the NTBOOTTDD.SYS file must be in the boot
partition;
c.MULTI = any controller that supports BIOS translation; can
be IDE or SCSI
d.The number after the controller is the number for the
physical controllers (0 for the first, 1 for the second and so
on)
e.DISK = appears in all but is only used if SCSI appears in the
ARC name; the physical number of the drive (0 for the first, 1
for the second and so on); if multi than it is set to 0
f.RDISK = appears in all but only used if multi is the
controller; if SCSI is used it is set to 0 and ignored; the
physical number of the drive; 0 is the first, 1 is the second
and so on
g.PARTITION = identifies the partition; this one 1 is the first, 2
is the second and so on
h.\PATH = the directory where the system resides
iii.The boot files are stored on the system partition; where the default
WinNT directory is; and the system files are stored on the boot
partition
Chapter 7 Auditing Resources and Access
1.Auditing
A.Informs the administrator if someone attempts to access secured resources
or how often a particular resources is accessed
B.By default set to not audit, the master switch
C.Seven event types and descriptions that can be audited from the second
level once the master switch is turned on
i.Logon and Logoff
ii.File and Object Access
iii.Use of user rights
iv.User and group management
v.Security policy changes
vi.Restart, shutdown, and system
vii.Process tracking
D.The third level of audit switches is on the object level
i.Read, write and execute for files and directories
a.Directories can also replace auditing on existing files or
subdirectories or both
ii.Print instead for printers
iii.Otherwise
a.Delete, change permissions, take ownership
E.Does effect the system performance
2.Account Policy
A.Maximum and minimum password age
B.Password length
C.Password uniqueness
D.Account lockout after specified failed attempts
E.Failed counter reset
F.Lockout duration
G.Force users off when hours expire
H.Require logon before password change
Chapter 8 Network Protocols, Routing and Relaying
1.TCP/IP utilities
A.Arp - address resolution protocol; displays IP address mapped to a MAC
node address
B.Hostname - displays the name of the current computer host
C.IPconfig - display IP configuration details
D.LPQ - displays the status of a print queue only on a computer running DLC
E.NBTSTAT - displays NetBIOS of TCP/IP status
F.NETSTAT - displays TCP/IP status and statistics
G.PING
H.ROUTE - interacts with routing tables
I.TRACERT - details the route used by TCP/IP
2.Routing with Windows NT
A.Multiprotocol Router (MPR) - requires two NICs; multiple segments
i.RIP - routing information protocol for TCP/IP
a.Share routing information dynamically
b.Or can be a static router with manually configured routing
tables
To enable you must remove ROP for IP from the
computer
i.Manually configure the routing tables
1.Route and then switches
a.-f - removes all gateway
entries from the routing table;
clears the tables
b.-p - implements persistent
routes by automatically
sustaining routing changes
through computer reboots
c.command
i.print - prints a route
ii.add - adds a route
iii.delete - deletes a route
iv.change - modifies an
existing route
d.destination - indicates the
host or network to which you
want to route
e.MASK - specifies that the
next parameter is to be
interpreted as the netmask
parameter
f.Netmask - specifies the
subnet mask value to be
associated with this route
entry
g.Gateway - specifies the
default gateway
h.Metric - specifies that the next
parameter be interpreted as the
metric parameter
i.Metric - defines the hop
count for the specified
destination
B.RIP for IPX
a.Automatically installs the SAP agent for IPX
C.DHCP Relay Agent
a.Allows a small set of IP addresses to support a larger number of
computers
b.A single DHCP server can support multiple subnets connected by
the NT Server
c.Installed through the services section of the Network Applet
D.AppleTalk Routing
a.A function of the Services for Macintosh
Chapter 9 Windows NT Names and Name Service, Plus IIS
1.NetBIOS names
A.15 characters or less
B.mandatory piece of networking
C.NetBEAUI uses it to resolve names
D.IPX can use it to resolve names
2.IP Name Resolution
A.DHCP
i.Until a client receives its leased IP address it uses its MAC address to
connect to the server
B.DNS
i.Domain Name Service
ii.Resolve FQDN(fully qualified domain names) through IP addresses
iii.Used to use HOST files
iv.Allows machines to find the proper location of a system without knowing
the IP address
C.WINS
i.Maps NetBIOS names to IP addresses
ii.Recognizing NetBIOS names on all subnets
iii.Enabling internetwork browsing
iv.Used to use an LMHOST file
WINS
DNS
Maps IP addresses to
NetBIOS names
Maps IP address to FQDNs
Automatic client data
registration
Manual configuration
Flat database name space
Uses FQDNs hierarchical
structure
Used on MS clients and
networks
Used on TCP/IP based host and
networks
Only on entry per client
Each host can have multiple
aliases
Enables domain functions
such as logon and browsing
N/A
3.Internet Information Server
A.Web - allows for HTTP access
i.Anonymous access
ii.NT user account restricted access
iii.Activity login
iv.IP or domain name restricted/granted access
v.Virtual server configuration
vi.Virtual directories
vii.If IIS is used with Internet Connectivity InterNIC will handle the DNS
viii.If IIS is used within a private network DNS and WINS are necessary
B.FTP
C.Gopher
Chapter 10 Windows NT Network Monitor
1.Must be installed; added through Services tab of Network applet
2.Not as fully featured as SMS
3.Doesn't require as much system overhead
4.NIC doesn't need to be in promiscuous mode
A.All the supported frame types are captured by the card due to the support for NDIS
4
B.Save up to 30% in CPU performance
C.Monitors on 4 type of data
i.Frames sent from the server
ii.Frames sent to the server
iii.Broadcast frames
iv.Multicast frames
5.To capture data simply use the Start command in the Capture pull down menu
A.At any time it can be stopped or paused
i.Then the contents of the frame can be viewed
B.During and after the capture session you can view
i.Bar graphs
a.Real time display
b.Percent network utilization
How traffic to and from the server is affecting overall
network performance
c.Frames per second
d.Bytes per second
e.Broadcasts per second
f.Multicasts per second
ii.Session statistics
a.Detail the conversations going on over the network
b.Realtime, cumulative during each capture session
iii.Station statistics
a.Cumulative data on the dynamics of each network conversation
b.MAC or network address
c.Sent frames
d.Received frames
e.Bytes sent
f.Bytes received
g.Directed frames sent
h.Multicasts sent
i.Broadcasts sent
iv.Summary statistics
a.Cumulative data sets
b.Network
c.Captured
d.Per second
e.MAC
f.MAC errors
C.During the capture session all frames are stored in system memory; they can be
saved for later investigation
6.Capture Filters
A.Set by Capture-> filter command
B.Captures information can only be as large as the system memory will allow
C.Gather data based on protocol, address pairs, and data patterns
D.Capturing by Protocol
i.Sap/type = {protocol} is the filter line
ii.See page 211 for list of supported protocols
E.Capturing by Address
i.Communication between the server and specific computer can be tracked
using an address pair capture filter
ii.Up to four pairs can monitors simultaneously
iii.Consists of
a.The MAC address of the two computers
b.An arrow to specify which way to monitor traffic
- - >, < - - , <-->
c.include or exclude keyword to instruct the Network Monitor to track
the frame or to ignore it
d.order doesn't matter
e.exclude commands are accessed first
f.if a pair is represented by an exclude and include then it is ignored
g.if no address pair is specified then the default pair is used: <your
computer> � > ANY
iv.Capturing by Data Pattern
a.Limits a capture to frames that contain a specific ASCII or
hexadecimal pattern that occurs within the entire frame or specified
depth into the frame (offset) in bytes
b.Two logical operations can be used with this OR or NOT
c.Enable you to identify multiple patterns to capture and ignore
F.Capture Triggers
i.Set of conditions that initiates an action when the conditions are met
ii.Allow automation of some tasks associated with gathering network
communication data
iii.Can stop or start the application
iv.Custom Triggers
a.Nothing - default setting of no trigger
b.Pattern match - a matched pattern within a frame; same settings as
those present in the pattern match filter
c.Buffer Space - percentage level of used buffer space
d.Pattern match then buffer space
e.Buffer space then pattern match
v.Trigger Actions
a.No action
b.Stop capture
c.Execute command line
G.Dedicated Mode Captures
i.Reduces load on CPU
ii.Prevents the Network Monitor from updating and displaying capture
window statistics
iii.Only shows the total number of captured frames
iv.4 buttons
a.stop
b.stop and view
c.pause
d.Normal mode
7.Addressing Security Issues
A.If no password is set, any user using SMS can access the data
B.Identify Network Monitor Users command shows computer name, user name, state
of the Network monitor, version number, and network adapter address
8.Miscellaneous
A.All addresses intercepted can be viewed
i.Edit entries to alter type, address, name, or comment
ii.Manually add or delete entries
iii.This is used to associate MAC addresses with user friendly names
B.Buffer Settings
i.Size of the buffer used to store captured frames
ii.Default is 1 MB
iii.Maximum is 8 MB less than total ram installed
iv.Once the buffer is full it throws away old frames
v.Size of each individual frames form 64-65,000 bytes
C.Track multiple segments attached to different NICs in the server
D.Find all Names
i.Search each captured frame for a NetBIOS name
ii.All names found are added to the database
E.Find Routers and Resolve Addresses from Names are only available with SMS
Chapter 11 Managing Windows NT Performance
1.Task Manager
A.Identifying non-responsive applications, terminating them
B.Identifying runaway processes, and terminating them
C.Ascertaining the memory use levels
2.Performance Monitor
A.Chart View
B.Alert View
C.Log View
D.Report View
E.Add to Command
i.Computer - which machine
ii.Objects - processor, memory, physical disk etc.
iii.Instances - identifies which instance of an object should be monitored
iv.Counters - available counters for a specific instance of an object on a
chosen computer
F.Common Objects and Counters
i.Processor: %processor time - if 80 or more should increase processor
power
ii.System: Processor Queue length - greater than 2 could need more
processor power
iii.Processor: Interrupts/Sec - malfunctioning hardware, if # increases and
processor time doesn't locate faulty hardware
iv.Memory: Cache faults, page fault, page/sec - may need more ram, if # is
high
v.PhysicalDisk/LogicalDisk: %Disk time - if disk is using a large amount of
processor time HD maybe a bottleneck
vi.PhysicalDisk/LogicalDisk: %Disk Bytes/transfer - how fast HD are
transferring data
vii.PhysicalDisk/LogicalDisk: Current disk queue length - may need upgraded
HD, is queue is long
3.Monitoring Disk Performance
A.To turn on disk monitors execute diskperf -y; then reboot
B.Using Charts - alter maximum value of vertical axis, histogram or graph view, add
grid lines, change update intervals
C.Configuring Alerts
D.Logs -
E.Reports
F.Miscellaneous Commands
i.File|Save [View] settings as - save views settings to used another time
ii.File|Save Workspace - saves a view settings in a single file
iii.File|Export - saves the current views captured data in a tab - or comma
delaminated file
iv.Add|Edit - edits the counter parameters or settings
v.Add|Delete - removes the counter
vi.Options|Data From - displays data from the active network or from a log file
G.Baselining - establish a baseline with no users attached, and then throughout a
normal workday to understand when something is going wrong
H.NT Paging File
i.Disk striping automatically spreads it across multiple disks
ii.On a separate disk from the system files
iii.Mirroring will hurt the config
iv.Smallest is 12 MB more than the RAM
4.Optimizing Server Settings
A.Minimize memory used - better performance for less than 10 users
B.Balance - best performance for 10 to 64 users
C.Maximize throughput for file sharing - best performance for more than 64 users;
default
D.Maximize throughput for network applications - supports distributed applications
(SQL Server)
Chapter 12 Advanced NetWare Topics
1.Protocols and Compatibility Issues
A.By default sees 802.2 for 3.12, 4.x or later
B.Before that 802.3
C.802.2, 802.3, 802.3 SNAP, 802.5, 802.5 SNAP
D.correct frame type is essential for connectivity
E.If multiple frame types are necessary, manual detection must be chosen and the
frame types used must be entered
2.Gateway Services for NetWare
A.Install the service and restart the server
B.Create a group on the NetWare server called NTGATEWAY
C.User account on the NetWare server with file system rights
D.A share that will be used
E.Add printers through the printers applet
i.NetWare compatible print server
F.Called Client Services for NetWare on NT Workstation
3.File and Print Services for NetWare - makes NT resources available to NetWare clients
4.NetWare Migration
A.Duplicate Accounts - default is to skip and not migrate any additional data to the
NT Server
i.Can permit duplicates to be created with a Prefix
ii.When migrating multiple NetWare servers, with multiple identical accounts,
create a mapping file, can maintain passwords,
Chapter 13 Advanced NT Printing
1.Windows NT printer applet
A.Client Application - a network program that originates print jobs, client or server
based
B.Connecting to a printer - process of attaching to a network share that resides on
the computer on which the logical printer was created
C.Creating a Printer - process of naming, defining settings for, installing drivers for,
and linking a printing device to the network; performed by the "Add Printer
Wizard"
D.Network interface Printers - built-in network interface cards for print devices that
are directly attached to the network; (unless specified as TCP/IP it is defaulting to
DLC)
E.Print Client - a computer on a network that transmits the print jobs to be produced
by the physical device
F.Print Device - the print device itself
G.Print Job - the code that defines the print processing commands as well as the
actual file to be printed;
H.Print Resolution - the measurement of pixel density that is responsible for the
smoothness of any image or text being printed; measured in DPI( Dots per inch)
I.Print Server - the computer that links physical print device to the network;
manages sharing
J.Print Server Services - software components located on the print server that
accepts print jobs and sends them to the print spooler for execution
K.Print Spooler - the collection of DLLs that acquires, processes, catalogues, and
disburses print jobs
L.Print Driver - programs that enable communication between applications and
devices
M.Printer/Logical printer - the logical printer is the software interface that
communicates between the operating system and the physical device
N.Queue/Print Queue - list of files waiting to be printed
O.Rendering -
2.Printing With NT Server
A.GDI - graphics device interface;
B.Print Device - the physical device
C.Print Driver - software driver
D.Print Monitor
E.Print processor
F.Print Router
G.Print Spooler
i.You can change the location of the Spool file to reserve space on a drive
3.Printing Clients
A.Printing from Windows NT Clients - when adding the printer it automatically take
the driver from server
B.Printing from Windows 95 - as long as print driver is installed on the server it is
automatically added
C.Printing from MS-DOS or Windows 3.11 - must install the driver separately and
then attach to the printer
4.Spooling
A.Print Priorities - 1 - 99; 1 being the lowest
i.Can create two shared printers to the same physical printer with different
priorities
B.Separate Spool Files - it may be necessary to create separate spool files for
different printers
i.Done through the registry
ii.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Printers
C.Changing the location of the spool file
i.Default - \%winntroot%\system32\spool
ii.Properties sheet of the printer
a.Advanced tab
b.Enter the path for the directory
5.Logical Printers and printer pools
A.Logical printer - software interface to the printer
B.Physical Printer
C.Printer Pool - multiple devices attached to one logical printer
i.Printers must all be the same type
ii.Prints to which ever device is free
6.Advanced Printing
A.Print Commands
i.New driver - installs or replaces existing printer driver
ii.Print processor - change the data type used by the print system
iii.Separator page - defines a document to be inserted between print jobs
iv.Enable printer pooling - assists in configuring identical printers to share a
single queue
v.Available - defines the time frame when a printer is active; if a job is sent
when the printer is not available then the job is stored and spooled when if
become available
vi.Priority -
vii.Spool print documents so program finishes printing
7.Printer Shares
A.No access
B.Print
C.Manage documents
D.Full Control
E.Default Settings
i.Full control - administrators; server operators; print operators
ii.Manage documents - creator owner
iii.Print - everyone
8.Multiple Printers
A.A single physical printer can be served by multiple logical printers
B.A single logical printer can server multiple physical printers
C.Multiple logical printers can server multiple physical printers
9.Print Auditing
A.Print
B.Full Control
C.Delete
D.Change permissions
E.Take ownership
10.TCP/IP Printing
A.LPR ports are used for the TCP printing
B.UNIX clients use LPR and LPD servers
Chapter 14 Advanced RAS Topics
1.Supports IPX, NetBEAUI, TCP/IP
2.SLIP - only supports TCP/IP with static addresses
A.Does not support encrypted passwords
3.PPP - supports ApplTalk, TCP/IP, IPX, NetBEAUI
A.Supports DHCP, and encrypted passwords
4.RAS Server
A.Only supports PPP
B.A NetBIOS gateway is established
C.Supports both IP and IPX routing
D.Supports NetBIOS and windows sockets applications
E.PPTP
F.Multilink PPP
5.RAS setup
A.Modems involved
i.Dial out
ii.Receive
iii.Both
B.DCHP, for the computer or network
C.What protocols
D.Encryption settings
E.IPX numbering automatic or configurable
6.RAS Routing, Gateway, Firewall
A.Routing - full access to network
B.Gateway - NetBEAUI, access to a network
C.Firewall - limitations placed on RAS clients
7.RAS Security
A.RASS Encryption
i.Security tab of phonebook entries
ii.Or, Network configuration dialog box
iii.Allow any authentication including clear text - most permissive, uses PAP,
connecting to a none Microsoft Server
iv.Require encrypted authentication - uses CHAP or SPA, connecting to a
non Microsoft Server
v.Require Microsoft encrypted authentication - MS-CHAP, a Microsoft
server, data encryption
B.RAS Callback
i.No Call Back - when user establishes a RAS connection, they will not be
called back
ii.Set By Caller - user inputs the call back number, saves on long distance,
iii.Preset To - configure the number on the server, user must always call form
that number
C.Autodial occurs when resources are accessed that come from the RAS connection
D.Logging can be activated and stored in the device.log file
i.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters
= 1
E.Null Modem cables can be used to test RAS
F.Name resolution can be aided with the use of DNS or WINS
Chapter 15 Advanced Troubleshooting
1.Installation Failures
A.Media Failures
B.Domain controller communication difficulties
C.Stop message errors or halt on blue screen
D.Hardware problems
E.Dependency failures
2.Boot Failures
A.NTLDR Error Message - use ERD to repair or replace the files
B.NTOSKRNL Missing error Message - user ERD
C.Boot.INI missing error message - restore file from Backup or ERD
D.BOOTSECT.DOS missing error message - ERD
E.NTDETECT.COM missing error message - ERD
3.Repair Tools
A.Event Viewer
B.Last Known good Configuration
C.The Registry
D.Emergency Repair Disk (ERD)
i.Updated versions by running RDISK.EXE
a.System._ HKEY_LOCAL_MACHINE\SYSTEM compressed
b.Software._ HKEY_LOCAL_MACHINE\SOFTWARE compressed
c.Security._ HKEY_LOCAL_MACHINE\SECURITY compressed
d.SAM._ HKEY_LOCAL_MACHINE\SAM compressed
e.NTUSER.DA_ default profile compressed
f.AUTOEXEC.NT
g.CONFIG.NT
h.SETUP.LOG list of installed files and their checksums
i.DEFAULT._ HKEY_USER\DEFAULT compressed
ii.Reboot the computer with the first 2 disks for NT setup
iii.Choose R for repair
iv.Select the appropriate options
v.Inert disk 3 and the ERD disk when prompted
4.Printing Solutions
A.Disk space on dirve hosting the spool files
B.Stop and restart the spooler service
5.BOOT.INI Switches -
A./BASEVIDEO - boots to standard VGA video
B./BAUDRATE=n - sets the debugging communication baud rate when using the
Kernel Debugger
C./CRASHBUG - loads the debugger into memory; remains inactive unless a kernelerror occurs
D./DEBUG - loads the debugger into memory to be activated by a host debugger
E./DEBUGPORT=COMx - sets the debugging com port
F./MAXMEM:n - sets the maximum amount of RAM that NT can us
G./NODEBUG - no debugging information is being used
H./NOSERIALMICE=COMx - disables serial mouse detection on the specified port
I./SOS - each driver name is displayed when it is loaded