图书介绍

MCSE Windows 2000 Directory Services Design考前辅导PDF|Epub|txt|kindle电子书版本网盘下载

MCSE Windows 2000 Directory Services Design考前辅导
  • (美)J.Peter Bruzzese等 著
  • 出版社: 北京:中国水利水电出版社
  • ISBN:7980044584
  • 出版时间:2001
  • 标注页数:675页
  • 文件大小:69MB
  • 文件页数:744页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

MCSE Windows 2000 Directory Services Design考前辅导PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 WHAT IS A DIRECTORY SERVICE?1

A Directory2

Objects3

Attributes3

The Way Things Were3

Advantages of a Directory Service5

Example 16

Without a Directory Service6

With a Directory Service6

Example 26

Without a Directory Service6

With a Directory Service6

With a Directory Service7

The Building Blocks of a Directory Service7

Without a Directory Service7

Example 37

Why Has It Not Been Done Sooner?9

Banyan Systems Street Talk9

Novell Directory Services(NDS)9

What about Now?10

Microsoft s Active Directory Service10

Let s Get Technical11

Chapter Summary12

CHAPTER 2 ALL ROADS LEAD TO X.50013

One Standard for All14

The History of X.50014

How It All Began15

X.500-The Service, the Myth,the Legend17

What Is a Hierarchical Structure?18

Application Relationships21

Container and Noncontainer Objects22

Client Access Protocols:DAP and LDAP24

Directory Access Protocol(DAP)24

LDAP26

The Innards of LDAP28

How Does LDAP Really Work?29

DSAs,DUAs,and DITs,Okay?29

LDAp and Active Directory30

Chapter Summary31

Review Questions31

Real-World Project35

CHAPTER 3 THE FUNDAMENTALS OF ACTIVE DIRECTORY37

Active Directory Strengths38

The Way It Was38

Simplified Administration39

Security40

Scalability40

Extensibility40

Open Standard Support40

Interoperability41

The Nitty Gritty on Addressing41

Objects41

Groups42

Organizational Units42

Domains42

Trees43

Sites44

Forest44

Global Catalog46

Schema46

Naming Conventions46

Active Directory Services Interface48

Chapter Summary48

Review Questions49

Real-World Project53

CHAPTER 4 TCP/IP,WINS,AND DHCP65

TCP/IP67

A Bit of History67

The Four Layers of TCP/IP68

Transport Layer70

TCP/IP Addressing Scheme72

Application Layer72

Assigning the TCP/IP Address76

TCP/IP Utilities76

Testing Your Configuration77

DHCP78

How DHCP Works78

Step One:DHCPDISCOVER80

Step Two:DHCPOFFER81

Step Three:DHCPREQUEST81

Step Four:DHCPACK81

What If Something Goes Wrong81

Automatic Private Addressing81

Renewing and Releasing the Lease82

Backing Up the DHCP Database82

How Does WINS Work83

Restoring the DHCP Database83

WINS83

WINS Name Registration Process84

Renewing Your Registration85

When the Client Is Done with the IP Address86

Looking for Somebody on the Network86

WINS Proxy Agent86

Configuring WINS with the WINS Snap-In87

Chapter Summary88

Review Questions90

Real-World Projects93

CHAPTER 5 DEVELOPING A DOMAIN NAME SERVICE(DNS) NAMESPACE STRATEGY99

What Existed before DNS?100

Why Do We Use Uniform Resource Locators?101

What Is DNS?101

How Does DNS Functions?102

The Root and Top Levels102

DNS Naming Conventions104

Zones104

Name Servers105

Types of Name Servers105

Name Resolution106

Recursive107

Iterative108

Caching108

Forward and Reverse Lookup Zones109

DNS Database Files109

Start of Authority(SOA)110

The Mail Exchange Record112

The Host Record(A)112

The Name Server(NS)Record112

The CNAME Record113

Other Important Files for DNS113

Dynamic DNS!114

DHCP and DDNS115

The Internals of DDNS116

Planning Your DNS Implementation118

What s In a Name?118

The Root of your Name120

Are You In or Are You Out?121

Two Distinct Namespaces122

Single Namespace Implementation123

Server Implementation124

Creating Your Zones and Handling Replication126

Chapter Summary127

Review Questions127

Real-World Projects132

CHAPTER 6 DESIGNING AN ACTIVE EIRECTORY DOMAIN137

Domains139

Organizational Units140

Designing an Organizational Unit Structure142

Strategy143

The Number of Levels144

Domains or Organizational Units145

Security146

Security Identifier147

Security Descriptor147

Groups148

International Company149

Implementing a Domain Structure149

Nationwide Company151

A Small Company152

Delegation of Administration153

Centralized Administration Model154

Distributed Administration Model154

Combination154

Common Organizational Unit Models155

Geographic Model155

Object Model156

Cost Center Model157

Project Model157

Division or Business Unit Model158

Administration Model158

Hybrid Model159

Chapter Summary160

Review Questions165

Real-World Projects168

CHAPTER 7 DESIGNING A MULTIPLE DOMAIN STRUCTURE173

Review of Single Domain Options174

The Need for a Larger Tree175

What Is a Domain Tree?176

Transitive Trusts177

Empty Root Domains178

Forests179

To Forest or Not to Forest?179

Shortcut Trusts180

Forest Points to Remember181

Multiple Forests181

The First Level183

Design Considerations for Domain Architecture183

The Root183

The Second Level184

Scenario Review192

Scenario One192

Scenario Two193

Scenario Three193

Scenario Four194

Scenario Five194

Chapter Summary194

Review Questions196

Real-World Projects200

CHAPTER 8 GROUP POLICY IMPLEMENTATION205

The User206

Groups206

Groups of NT 4207

Types of Groups207

Mixed Mode:The Slow Integration Process209

Windows 2000 Security Groups in “Native Mode”210

Domain Local Groups210

Global Groups within Windows2000211

Universal Groups211

Group Conversions212

Illustrating Local,Global,and Universal Groups212

Groups and the Global Catalog214

Planning Your Group Strategy215

Group Placement215

Name that Group216

Delegate Administrative Control216

Scenario One218

Implementation Options Reviewed218

Scenario Two219

Group Policies219

Profiles vs.Policies220

System Policies of NT 4221

GPOs,GPCs,and GPTs222

How Group Policies Are Applied225

The Default Application of Policy226

Overriding and Blocking of Inheritance226

Filtering Group Policies228

Inner Workings of a Group Policy229

Planning:The Key to Global Policies233

Method of Group Policy Application233

How Many Policies for the GPO?235

Organizing Your Organizational Units236

Minimize Block Policy and Override Features237

Are You Counting Time,or Making Your Time Count?238

Chapter Summary238

Review Questions239

Real-World Projects244

CHAPTER 9 ACTIVE DIRECTORY REPLICATION249

Multi-master vs.Singlemaster Replication250

Replication or Synchronization?252

LDAP Data Interchange Format(LDIF)253

Comma Separated Variable Import/Export Utility(CSVDE.EXE)253

Into the Heart of Replication254

Automatic and Manual Topologies256

Active Directory Architecture257

Extensible Storage Engine(ESE)258

From the Top,Down258

Database Layer259

The Directory Service Agent259

Update Requests260

Deleted Objects-Where Do They Go?260

From Origination to Replication261

Sequence Numbers:The Nightmare Begins261

Preventing Unnecessary Replication264

Up-To-Date Vector(UTD Vector)264

High Watermark Vector266

Collisions:They Will Occur266

Replication Partitions268

Special Masters269

Inter-and Intra-Site Replication270

Intra-Site Replication271

Inter-Site Replication272

Manual Modifications273

Monitoring Your Replication Traffic274

Network Monitor274

Performance Monitor275

Chapter Summary277

Review Questions279

Real-World Projects283

CHAPTER 10 MANAGING SITE BOUNDARIES285

Active Directory Sites287

Logon Traffic287

Distributed File System(DFS)Topology288

File Replication Service(FRS)288

Replication Traffic288

Site Aware Applications289

Replication Latency290

Replication Efficiency290

Replication Cost290

The Different Types of Replication291

Intra-Site Replication291

Inter-Site Replication293

Seeing If Active Directory Sites Are Necessary294

Placing the Domain Controllers(DC)295

Connectivity296

Available Bandwidth297

Replication Traffic298

Transport299

Site links299

Member Sites300

Cost300

Frequency300

Schedule300

Site Link Bridges301

Planning Inter-Site Replication Topology302

Transports303

Bridgehead Servers304

Inter-Site Topology Generator304

Least-Cost Spanning Tree305

Placing Servers in Sites305

Placing the Global Catalog(GC)Server306

Placing the Operation Masters307

Chapter Summary310

Review Questions313

Real-World Projects316

CHAPTER 11 DESIGNING YOUR ACTIVE DIRECTORY INFRASTRUCTURE323

A Functional Team324

What Will the Team Handle?325

What Roles Will the Team Members Play?326

The Vision and the Scope328

Vision329

Scope329

The Vision/Scope Document329

Address Your Risks330

Your Current Physical Infrastructure330

Hardware and Software331

Network Details332

The Users within the Organization333

Design Your Naming Strategy334

Design Your Directory Service Infrastructure334

The Goal334

Design Your Domain(or Multiple Domain)Strategy335

Design a Group Policy337

Design Your Site Topology337

Designing Your Schema338

Planning for Growth338

Delegation of Authority339

Chapter Summary341

Review Questions343

Real-World Projects348

CHAPTER 12 ACTIVE DIRECTORY SECURITY FEATURES353

Kerberos354

A Kerberos Transaction355

Kerberos Vocabulary356

Kerberos and Transitive Trusts357

File Access Permissions360

NT 4 Permissions360

File Permissions under Windows 2000363

Encrypting File System(EFS)368

How Does EFS Work?369

Security Policies370

Password Policy371

Account Lockout Policy371

Audit Policy372

User Rights Assignment373

Security Options374

Smart Cards374

How Do Smart Cards Word?375

IP Security(IPSec)376

The IPSec Monitor377

Active Directory Design and Security378

Chapter Summary379

Review Questions381

Real-World Projects384

CHAPTER 13 MONITORING,OPTIMIZING,AND TROUBLESHOOTING ACTIVE DIRECTORY387

Performance Console388

Performance Console and Replication389

Task Manager390

Network Monitor390

Replication Monitor391

NTDSUTIL393

SECEDIT394

NETDOM395

DNSCMD396

DSASTAT396

Miscellaneous Tools396

NETSVC396

MOVETREE397

The Right Tool for the Job397

Advanced Startup Options397

Recovery Console399

Backup and Restore Active Directory400

Active Directory Restoration402

Chapter Summary402

Review Questions405

Real-World Projects409

CHAPTER 14 SCHEMA:DESIGN AND MODIFICATION413

What Is the Schema?414

Objects416

Object Classes416

Attributes417

Syntax418

Object Identifiers(OIDs)419

Object Classes and Attributes Defined in the Schema419

Before Modifying the Schema421

Static422

Low-Latency422

Transient422

Modifying the Schema422

Installing Software Applications423

Scripting423

Using the Active Directory Schema Manager423

Who Can Modify the Schema?424

Modifying a Class425

Items in the Schema that Can Be Modified425

Creating a New Class426

Modifying an Attribute427

Creating a New Attribute428

Deactivating a Class or and Attribute429

Indexing an Attribute429

Replicating an Attribute to the Global Catalog429

Once the Modification Is Made430

System Checks on the Schema430

Time Interval Before Changes Take Effect431

Schema Replication432

Chapter Summary433

Review Questions436

Real-World Projects440

CHAPTER 15 DEPLOYING WINDOWS 2000 ACTIVE DIRECTORY443

Evaluating the Organization445

The Planning Team445

The Vision and the Scope447

Managing Risks449

The Administrative Delegation Model450

Physical Locations453

The Current Business Practices454

The Security Requirements455

Future Growth of the Company456

Existing Network Connections457

Designing an Active Directory Structure458

Delegation of Administrative Authority458

Group Policies459

The Domain Structure460

Schema Policy461

Site Topology462

The Naming Strategy462

Chapter Summary463

Review Questions466

Real-World Projects470

CHAPTER 16 MIGRATING FROM WINDOWS NT 4 TO ACTIVE DIRECTORY473

The Different Planning Phases of Migration474

Designing the Active Directory Structure475

Choose a Migration Path475

Develop a Domain Upgrade or a Restructure Strategy476

Plan the Deployment of the Migration Strategy476

The Migration Path477

Defining the Existing Domain Arrangement477

What Will Be Achieved from the Migration?481

The Active Directory Design482

Evaluating the Migration Paths482

The Domain Upgrade Strategy485

How Many Forests Are in the Design?486

What Is the Site Topology of the Design?487

What Are the Security and Administration Plans in the Design?489

The Current Operating System490

The Recovery Plan491

Domain Upgrade Order492

Upgrading Domain Controllers493

Mixed Mode or Native Mode?494

Post-Upgrade Tasks495

Restructuring Domains497

Inter-Forest Restructuring497

Intra-Forest Restructuring501

Domain Restructure Tools503

Chapter Summary503

Review Questions506

Real-World Projects510

CHAPTER 17 ACTIVE DIRECTORY AND EXCHANGE SERVERS513

Replication vs. Synchronization Revisited514

The Active Directory Connector515

Installing the Active Directory Connector516

Connection Agreements with the ADC517

Creating Connection Agreements519

Putting Active Directory Connector to Work530

Manage Your Objects Centrally531

Troubleshoot Your Connector533

Do You Need the ADC?535

Planning Your ADC535

Some Questions You Need to Resolve536

A Review of the Scenario Models538

Final Issues541

Exchange 2000541

Chapter Summary542

Review Questions543

Real-World Projects547

CHAPTER 18 SAMPLE TEST551

CHAPTER 19 ANSWER KEY577

APPENDIX A ANSWERS TO REVIEW QUESTIONS595

APPENDIX B RFCS FOR TCP/IP FOR WINDOWS 2000629

APPENDIX C EXAM OBJECTIVES631

GLOSSARY635

INDEX649

热门推荐