Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure - 6421 Course Outline
This five-day instructor-led course provides students with the knowledge and skills to configure and troubleshoot Windows Server 2008 and Windows Server 2008 R2 Sp1 Network Infrastructures. It will cover networking technologies most commonly used with Windows Server 2008 and Windows Server 2008 R2 Sp1 such as DNS, DHCP, IPv4 and IPv6 network addressing, Network Policy server and Network Access Protection and configuring secure network access. It also covers fault tolerant storage technologies, Network Storage and routing and remote access, monitoring and compliance updates as well as other relevant technologies
This course will be of interest and benefit to attendees with different back grounds and career aspirations. It will be of interest to Network Administrators who currently are, or will be, working with Windows Server 2008 servers. It will also be of interest and benefit to Active Directory technology specialists who aspire to be Enterprise Administrators (Tier 4 day-to-day network operations) or experienced Server Administrators who aspire to be Enterprise Administrators.
Storage Area Network Administrators who need to understand this information to deploy or extend their current storage infrastructure and Operations Managers who need this information to support troubleshooting efforts and business decisions would also benefit from this course
This course also maps directly to the 70-642:TS: Windows Server 2008 Network Infrastructure, Configuring exam objective domain and is part of the MCTS prerequisites for the MCITP: Server Administrator credential. As such people looking to take the 70-642 exam or obtain the MCITP: Server Administrator credential would also benefit from attending this course.
At Course Completion
After completing this course, students will be able to:
Plan and configure an IPv4 network infrastructure.
Implement DHCP within their organization.
Configure and troubleshoot DNS.
Configure, transition to, and troubleshoot IPv6.
Configure and troubleshoot Routing and Remote Access.
Install, configure, and troubleshoot the Network Policy Server Role service.
Implement Network Access Protection.
Implement security features within Windows Server 2008 and Windows Server 2008 R2.
Implement security features within Windows Server 2008 and Windows Server 2008 R2 that help to secure network communications.
Configure and troubleshot file and print services.
Enable and configure services to optimize branch office data access.
Control and monitor network storage.
Recover data on Windows Server 2008 and Windows Server 2008 R2 servers.
Monitor Windows Server 2008 and Windows Server R2 network infrastructure services.
Before attending this course, students must have:
You must have an intermediate understanding of Windows Server operating systems such as Windows Server 2003, Windows Server 2008 or Windows Server 2008 R2 Sp1 and Windows client operating systems such as Windows Vista or Windows 7. Client operating system knowledge equivalent to the below certifications would be of benefit.
Exam 70-680: TS: Windows 7, Configuration
Exam 70-620: TS: Windows Vista, Configuring
You should understand how TCP/IP functions and have a basic understanding of addressing, name resolution (Domain Name System [DNS]/Windows Internet Name Service [WINS]), connection methods (wired, wireless, virtual private network [VPN]).
You should have an awareness of security best practices such as understanding file system permissions, authentication methods, workstation, and server hardening methods, and so forth.
The minimum level of knowledge required in the above three bullet points, excluding the client experience, can be covered by having knowledge equivalent to the MOC course 6420B: Fundamentals of Windows Server 2008
Basic knowledge of Active Directory would also be of benefit.
Module 1: Planning and Configuring IPv4
This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot network-related problems.
Implementing an IPv4 Network Infrastructure
Overview of Name Resolution Services in an IPv4 Network Infrastructure
Configuring and Troubleshooting IPv4
Lab : Planning and Configuring IPv4
Selecting an IPv4 Addressing scheme for branch offices
Implementing and Verifying IPv4 in the branch office
Module 2: Configuring and Troubleshooting DHCP
This module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.
Overview of the DHCP Server Role
Configuring DHCP Scopes
Configuring DHCP Options
Managing a DHCP Database
Monitoring and Troubleshooting DHCP
Configuring DHCP Security
Lab : Configuring and Troubleshooting the DHCP Server Role
Selecting a Suitable DHCP Configuration
Reconfiguring DHCP in the Head Office
Testing the Configuration
Troubleshooting DHCP Issues
Module 3: Configuring and Troubleshooting DNS
This module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.
Installing the DNS Server Role
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
Selecting a DNS Configuration
Deploying and Configuring DNS
Module 4: Configuring and Troubleshooting IPv6 TCP/IP
This module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.
Overview of IPv6
Coexistence with IPv6
IPv6 Transition Technologies
Transitioning from IPv4 to IPv6
Lab : Configuring an ISATAP Router
Configuring a New IPv6 Network and Client
Configuring an ISATAP Router to Enable Communication Between an IPv4 Network and an IPv6 Network
Lab : Converting the Network to Native IPv6
Transitioning to a Native IPv6 Network
Module 5: Configuring and Troubleshooting Routing and Remote Access
To support your organizations distributed workforce, you must become familiar with technologies that enable remote users to connect to your organizations network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.
Configuring Network Access
Configuring VPN Access
Overview of Network Policies
Overview of the Connection Manager Administration Kit
Troubleshooting Routing and Remote Access
Lab : Configuring and Managing Network Access
Configuring Routing and Remote Access as a VPN Remote Access Solution
Configuring a Custom Network Policy
Create and distribute a CMAK Profile
Lab : Configuring and Managing DirectAccess
Configure the AD DS Domain Controller and DNS
Configure the PKI Environment
Configure the DirectAccess Clients and Test Intranet Access
Configure the DirectAccess Server
Verify DirectAccess Functionality
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
NPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.
Installing and Configuring a Network Policy Server
Configuring RADIUS Clients and Servers
NPS Authentication Methods
Monitoring and Troubleshooting a Network Policy Server
Lab : Configuring and Managing Network Policy Server
Installing and Configuring the Network Policy Server Role Service
Configuring a RADIUS Client
Configuring Certificate Auto-Enrollment
Configuring and Testing the VPN
Module 7: Implementing Network Access Protection
In this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.
Overview of Network Access Protection
How NAP Works
Monitoring and Troubleshooting NAP
Lab : Implementing NAP into a VPN Remote Access Solution
Configuring NAP Components
Configuring Client Settings to Support NAP
Module 8: Increasing Security for Windows Servers
Security is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.
Windows Security Overview
Configuring Windows Firewall with Advanced Security
Deploying Updates with Windows Server Update Services
Lab : Increasing Security for Windows Servers
Deploying a Windows Firewall Rule
Module 9: Increasing Security for Network Communication
Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.
Overview of IPsec
Configuring Connection Security Rules
Configuring NAP with IPsec Enforcement
Monitoring and Troubleshooting IPsec
Lab : Increasing Security for Network Communication
Selecting a Network Security Configuration
Configuring IPsec to Authenticate Computers
Testing IPsec Authentication
Module 10: Configuring and Troubleshooting Network File and Print Services
File and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.
Configuring and Troubleshooting File Shares
Encrypting Network Files with EFS
Encrypting Partitions with BitLocker
Configuring and Troubleshooting Network Printing
Lab : Configuring and Troubleshooting Network File and Print Services
Creating and Configuring a File Share
Encrypting and Recovering Files
Creating and Configuring a Printer Pool
Module 11: Optimizing Data Access for Branch Offices
Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.
Branch Office Data Access
Overview of DFS Namespaces
Configuring DFS Replication
Lab : Implementing DFS
Installing the DFS Role Service
Configuring the Required Namespace
Configuring DFS Replication
Lab : Implementing BranchCache
Performing Initial Configuration Tasks for BranchCache
Configuring BranchCache Clients
Configuring BranchCache on the Branch Server
Module 12: Controlling and Monitoring Network Storage
Network storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.
Monitoring Network Storage
Controlling Network Storage Utilization
Managing File Types on Network Storage
Lab : Controlling and Monitoring Network Storage
Configuring FSRM Quotas
Configuring File Screening
Configuring File Classification and File Management
Module 13: Recovering Network Data and Servers
This module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.
Recovering Network Data with Volume Shadow Copies
Recovering Network Data and Servers with Windows Server Backup
Lab : Recovering Network Data and Servers
Configuring Shadow Copies
Configuring a Scheduled Backup
Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers
When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.
Using Performance Monitor
Monitoring Event Logs
Lab : Monitoring Windows Server 2008 Network Infrastructure Servers
Establishing a Performance Baseline
Identifying the Source of a Performance Problem
Centralizing Events Logs
View outline in Word