1. Trang chủ
  2. » Công Nghệ Thông Tin

Networking: A Beginner’s Guide Fifth Edition- P56 doc

5 83 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Contents

  • Acknowledgments

  • Introduction

  • Part I: Networking Ins and Outs

    • 1 The Business of Networking

      • Understanding Networking: The Corporate Perspective

      • Understanding Networking Jobs

      • Sarbanes-Oxley Act of 2002

      • Chapter Summary

    • 2 Laying the Foundation

      • Bits, Nibbles, and Bytes

      • Basic Terminology to Describe Networking Speeds

      • Chapter Summary

    • 3 Understanding Networking

      • Knowing Network Relationship Types

      • Learning Network Features

      • Understanding the OSI Networking Model

      • Learning About Network Hardware Components

      • Chapter Summary

    • 4 Understanding Network Cabling

      • Understanding Cable Topologies

      • Demystifying Network Cabling

      • Installing and Maintaining Network Cabling

      • Chapter Summary

    • 5 Home Networking

      • Benefits from Home Networking

      • Choosing a Home Network Technology

      • Chapter Summary

    • 6 Understanding Network Hardware

      • Directing Network Traffic

      • Protecting a Network with Firewalls

      • Connecting RS-232 Devices with Short-Haul Modems

      • Chapter Summary

    • 7 Making WAN Connections

      • Determining WAN Needs

      • Comparing WAN Connection Types

      • Chapter Summary

    • 8 Understanding Networking Protocols

      • Understanding TCP/IP and UDP

      • Understanding Other Internet Protocols

      • Comparing Important Proprietary Protocols

      • Chapter Summary

    • 9 Exploring Directory Services

      • What Is a Directory Service?

      • Learning About Specific Directory Services

      • Chapter Summary

    • 10 Connections from Afar: Remote Network Access

      • Determining Remote Access Needs

      • Learning Remote Access Technologies

      • Chapter Summary

    • 11 Securing Your Network

      • Understanding Internal Security

      • Understanding External Threats

      • Viruses and Other Malicious Software

      • Chapter Summary

    • 12 Network Disaster Recovery

      • Notes from the Field: The City of Seattle

      • Disaster Recovery Plans

      • Network Backup and Restore Procedures

      • Chapter Summary

    • 13 Network Servers: Everything You Wanted to Know but Were Afraid to Ask

      • What Distinguishes a Server from a Workstation?

      • Choosing Servers for Windows and NetWare

      • Maintaining and Troubleshooting Servers

      • Chapter Summary

    • 14 Purchasing and Managing Client Computers

      • Choosing Desktop Computers

      • Understanding Network Workstation Requirements

      • Chapter Summary

  • Part II: Hands-on Knowledge

    • 15 Designing a Network

      • The Network Design Process

      • Assessing Network Needs

      • Meeting Network Needs

      • Chapter Summary

    • 16 Installing and Setting Up Windows Server 2008

      • Understanding Windows Server 2008 Editions

      • Preparing for Installation

      • Installing Windows Server 2008

      • Chapter Summary

    • 17 Administering Windows Server 2008: The Basics

      • Thinking About Network Security

      • Working with User Accounts

      • Working with Active Directory Security Groups

      • Working with Shares

      • Working with Printers

      • Chapter Summary

    • 18 Introducing Exchange Server 2010

      • Exchange Server 2010 Features

      • Installing Exchange Server 2010

      • Setting Up Mailboxes

      • Chapter Summary

    • 19 Understanding Other Windows Server 2008 Services

      • Exploring DHCP

      • Investigating DNS

      • Understanding RRAS

      • Exploring IIS

      • Understanding Windows Terminal Services

      • Chapter Summary

    • 20 Installing Linux

      • Configuring Computer Hardware for Linux

      • Installing Fedora Linux

      • Chapter Summary

    • 21 Introduction to Linux Systems Administration

      • Managing Fedora Linux with Graphical Tools

      • Mastering Linux Command-Line Basics

      • Chapter Summary

    • 22 Setting Up a Linux Web Server with Apache

      • Overview of Apache Web Server

      • Activating Apache Web Server Under Fedora

      • Downloading and Installing Apache Web Server

      • Administering Apache Web Server

      • Chapter Summary

    • 23 Introduction to Virtualization

      • Benefits of Virtualization

      • Introducing Windows Server 2008 Hyper-V

      • Using VMware Virtualization Products

      • Backing Up Virtual Machine Data

      • Chapter Summary

  • Appendix: Understanding the Sarbanes-Oxley Act

    • Sarbanes-Oxley Act Summary

      • Title I: Public Company Accounting Oversight Board

      • Title II: Auditor Independence

      • Title III: Corporate Responsibility

      • Title IV: Enhanced Financial Disclosures

      • Titles V, VI, and VII

      • Titles VIII, IX, X, and XI

    • About Internal Controls

    • Key Procedures for an IT Internal Control System

      • IT Department Narrative

      • Disaster Recovery Plan

      • Access Management

      • System Maintenance

      • Change Control

    • SOX Compliance Testing

      • Auditing Internal Controls

      • Deviations from Internal Controls

    • Sample SOPs

      • Disaster Recovery Plan

      • Server Maintenance

      • System Account Management

      • Change Control

  • Index

    • A

    • B

    • C

    • D

    • E

    • F

    • G

    • H

    • I

    • J

    • K

    • L

    • M

    • N

    • O

    • P

    • Q

    • R

    • S

    • T

    • U

    • V

    • W

    • X

    • Y

    • Z

Nội dung

257 Chapter 17: Administering Windows Server 2008: The Basics In the second dialog box, shown in Figure 17-3, you enter the initial password that the account will use. You also select several options that apply to the account, as follows: N User Must Change Password at Next Logon Selecting this checkbox forces users to choose their own password when they first log in to the system. N User Cannot Change Password You might select this option for resource accounts if you do not want to allow users to change their passwords. (For instance, you might have a specific user account established for a particular computer that performs a particular function that many people employ.) Generally, however, you should not select this option; most sites allow users to change their own passwords, and you want to permit them to do so if you’ve also set passwords to automatically expire. N Password Never Expires Choose this option to allow the password to remain viable for as long as the user chooses to use it. Activating this option for most users is generally considered a poor security practice. N Account Is Disabled Selecting this option disables the new account. The administrator can enable the account when needed by clearing the checkbox. Figure 17-2. Use the New Object – User dialog box to add a new user. 258 Networking: A Beginner’s Guide After entering the password and selecting the options you want, click Next to continue. You will then see a confirmation screen. Click Next a final time to create the account, or click Back to return to either dialog box to make changes. Modifying a User Account The dialog box in which you modify the information about a user account contains many other fields than the ones to create the account. You can use these to document the account and to set some other security options. To modify an existing user account, right-click the user object you wish to modify and choose Properties from the pop-up menu. You then see the tabbed dialog box shown in Figure 17-4. In the first two tabs, General and Address, you can enter some additional information about the user, such as job title, mailing address, telephone number, e-mail account, and so forth. Because Active Directory also integrates with Exchange Server, this information might be important to enter for your network. In the Account tab, shown in Figure 17-5, you can set some important user account options. At the top of the tab, you can see the user’s logon name, as well as the Windows domain in which the user has primary membership. Below that is the user’s Windows NT Figure 17-3. Setting the user’s password 259 Chapter 17: Administering Windows Server 2008: The Basics logon name (called the pre-Windows 2000 logon name), which the user can optionally use to log in to the domain from a Windows NT computer or to use an application that doesn’t yet support Active Directory logins. (Although you can set these two logon names to be different, doing so rarely is a good idea.) Clicking the Logon Hours button displays the dialog box shown in Figure 17-6. In this dialog box, you select different blocks of time within a standard week, and then click the appropriate option button to permit or deny access to the network for that time period. In Figure 17-6, the settings permit logon times for a normal workday, with some cushion before and after those times to allow for slightly different work hours. By default, users are permitted to log on to the network at any time, any day of the week. For most networks, particularly smaller networks, permitting users to log on at any time is generally acceptable. Figure 17-4. Setting properties for a user’s account 260 Networking: A Beginner’s Guide Clicking the Log On To button on the Account tab opens the Logon Workstations dialog box, as shown in Figure 17-7. By default, users can log on to any workstation in the domain, and the domain authenticates them. In some cases, a system might require stricter security, where you specify the computers to which a user account can log on. For example, you might set up a network backup account that you use to back up the network, and then leave this account logged on all the time in your locked computer room. Because the backup account has access to all files on the network (necessary to do its job), a good idea is to limit that account to log on only to the computer designated for this purpose in the computer room. You use the Log On To feature to set up this type of Figure 17-5. The Account tab of a user’s Properties dialog box lets you set some important user account options. 261 Chapter 17: Administering Windows Server 2008: The Basics Figure 17-6. Setting logon time restrictions for a user Figure 17-7. Restricting the computers to which a user can log on . either dialog box to make changes. Modifying a User Account The dialog box in which you modify the information about a user account contains many other fields than the ones to create the account account. The administrator can enable the account when needed by clearing the checkbox. Figure 17-2. Use the New Object – User dialog box to add a new user. 258 Networking: A Beginner’s Guide After. passwords, and you want to permit them to do so if you’ve also set passwords to automatically expire. N Password Never Expires Choose this option to allow the password to remain viable for as

Ngày đăng: 05/07/2014, 04:20