图书介绍
MCSE Windows 2000 Directory Services Design考前辅导PDF|Epub|txt|kindle电子书版本网盘下载
![MCSE Windows 2000 Directory Services Design考前辅导](https://www.shukui.net/cover/31/31483829.jpg)
- (美)J.Peter Bruzzese等 著
- 出版社: 北京:中国水利水电出版社
- ISBN:7980044584
- 出版时间:2001
- 标注页数:675页
- 文件大小:69MB
- 文件页数:744页
- 主题词:
PDF下载
下载说明
MCSE Windows 2000 Directory Services Design考前辅导PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
CHAPTER 1 WHAT IS A DIRECTORY SERVICE?1
A Directory2
Objects3
Attributes3
The Way Things Were3
Advantages of a Directory Service5
Example 16
Without a Directory Service6
With a Directory Service6
Example 26
Without a Directory Service6
With a Directory Service6
With a Directory Service7
The Building Blocks of a Directory Service7
Without a Directory Service7
Example 37
Why Has It Not Been Done Sooner?9
Banyan Systems Street Talk9
Novell Directory Services(NDS)9
What about Now?10
Microsoft s Active Directory Service10
Let s Get Technical11
Chapter Summary12
CHAPTER 2 ALL ROADS LEAD TO X.50013
One Standard for All14
The History of X.50014
How It All Began15
X.500-The Service, the Myth,the Legend17
What Is a Hierarchical Structure?18
Application Relationships21
Container and Noncontainer Objects22
Client Access Protocols:DAP and LDAP24
Directory Access Protocol(DAP)24
LDAP26
The Innards of LDAP28
How Does LDAP Really Work?29
DSAs,DUAs,and DITs,Okay?29
LDAp and Active Directory30
Chapter Summary31
Review Questions31
Real-World Project35
CHAPTER 3 THE FUNDAMENTALS OF ACTIVE DIRECTORY37
Active Directory Strengths38
The Way It Was38
Simplified Administration39
Security40
Scalability40
Extensibility40
Open Standard Support40
Interoperability41
The Nitty Gritty on Addressing41
Objects41
Groups42
Organizational Units42
Domains42
Trees43
Sites44
Forest44
Global Catalog46
Schema46
Naming Conventions46
Active Directory Services Interface48
Chapter Summary48
Review Questions49
Real-World Project53
CHAPTER 4 TCP/IP,WINS,AND DHCP65
TCP/IP67
A Bit of History67
The Four Layers of TCP/IP68
Transport Layer70
TCP/IP Addressing Scheme72
Application Layer72
Assigning the TCP/IP Address76
TCP/IP Utilities76
Testing Your Configuration77
DHCP78
How DHCP Works78
Step One:DHCPDISCOVER80
Step Two:DHCPOFFER81
Step Three:DHCPREQUEST81
Step Four:DHCPACK81
What If Something Goes Wrong81
Automatic Private Addressing81
Renewing and Releasing the Lease82
Backing Up the DHCP Database82
How Does WINS Work83
Restoring the DHCP Database83
WINS83
WINS Name Registration Process84
Renewing Your Registration85
When the Client Is Done with the IP Address86
Looking for Somebody on the Network86
WINS Proxy Agent86
Configuring WINS with the WINS Snap-In87
Chapter Summary88
Review Questions90
Real-World Projects93
CHAPTER 5 DEVELOPING A DOMAIN NAME SERVICE(DNS) NAMESPACE STRATEGY99
What Existed before DNS?100
Why Do We Use Uniform Resource Locators?101
What Is DNS?101
How Does DNS Functions?102
The Root and Top Levels102
DNS Naming Conventions104
Zones104
Name Servers105
Types of Name Servers105
Name Resolution106
Recursive107
Iterative108
Caching108
Forward and Reverse Lookup Zones109
DNS Database Files109
Start of Authority(SOA)110
The Mail Exchange Record112
The Host Record(A)112
The Name Server(NS)Record112
The CNAME Record113
Other Important Files for DNS113
Dynamic DNS!114
DHCP and DDNS115
The Internals of DDNS116
Planning Your DNS Implementation118
What s In a Name?118
The Root of your Name120
Are You In or Are You Out?121
Two Distinct Namespaces122
Single Namespace Implementation123
Server Implementation124
Creating Your Zones and Handling Replication126
Chapter Summary127
Review Questions127
Real-World Projects132
CHAPTER 6 DESIGNING AN ACTIVE EIRECTORY DOMAIN137
Domains139
Organizational Units140
Designing an Organizational Unit Structure142
Strategy143
The Number of Levels144
Domains or Organizational Units145
Security146
Security Identifier147
Security Descriptor147
Groups148
International Company149
Implementing a Domain Structure149
Nationwide Company151
A Small Company152
Delegation of Administration153
Centralized Administration Model154
Distributed Administration Model154
Combination154
Common Organizational Unit Models155
Geographic Model155
Object Model156
Cost Center Model157
Project Model157
Division or Business Unit Model158
Administration Model158
Hybrid Model159
Chapter Summary160
Review Questions165
Real-World Projects168
CHAPTER 7 DESIGNING A MULTIPLE DOMAIN STRUCTURE173
Review of Single Domain Options174
The Need for a Larger Tree175
What Is a Domain Tree?176
Transitive Trusts177
Empty Root Domains178
Forests179
To Forest or Not to Forest?179
Shortcut Trusts180
Forest Points to Remember181
Multiple Forests181
The First Level183
Design Considerations for Domain Architecture183
The Root183
The Second Level184
Scenario Review192
Scenario One192
Scenario Two193
Scenario Three193
Scenario Four194
Scenario Five194
Chapter Summary194
Review Questions196
Real-World Projects200
CHAPTER 8 GROUP POLICY IMPLEMENTATION205
The User206
Groups206
Groups of NT 4207
Types of Groups207
Mixed Mode:The Slow Integration Process209
Windows 2000 Security Groups in “Native Mode”210
Domain Local Groups210
Global Groups within Windows2000211
Universal Groups211
Group Conversions212
Illustrating Local,Global,and Universal Groups212
Groups and the Global Catalog214
Planning Your Group Strategy215
Group Placement215
Name that Group216
Delegate Administrative Control216
Scenario One218
Implementation Options Reviewed218
Scenario Two219
Group Policies219
Profiles vs.Policies220
System Policies of NT 4221
GPOs,GPCs,and GPTs222
How Group Policies Are Applied225
The Default Application of Policy226
Overriding and Blocking of Inheritance226
Filtering Group Policies228
Inner Workings of a Group Policy229
Planning:The Key to Global Policies233
Method of Group Policy Application233
How Many Policies for the GPO?235
Organizing Your Organizational Units236
Minimize Block Policy and Override Features237
Are You Counting Time,or Making Your Time Count?238
Chapter Summary238
Review Questions239
Real-World Projects244
CHAPTER 9 ACTIVE DIRECTORY REPLICATION249
Multi-master vs.Singlemaster Replication250
Replication or Synchronization?252
LDAP Data Interchange Format(LDIF)253
Comma Separated Variable Import/Export Utility(CSVDE.EXE)253
Into the Heart of Replication254
Automatic and Manual Topologies256
Active Directory Architecture257
Extensible Storage Engine(ESE)258
From the Top,Down258
Database Layer259
The Directory Service Agent259
Update Requests260
Deleted Objects-Where Do They Go?260
From Origination to Replication261
Sequence Numbers:The Nightmare Begins261
Preventing Unnecessary Replication264
Up-To-Date Vector(UTD Vector)264
High Watermark Vector266
Collisions:They Will Occur266
Replication Partitions268
Special Masters269
Inter-and Intra-Site Replication270
Intra-Site Replication271
Inter-Site Replication272
Manual Modifications273
Monitoring Your Replication Traffic274
Network Monitor274
Performance Monitor275
Chapter Summary277
Review Questions279
Real-World Projects283
CHAPTER 10 MANAGING SITE BOUNDARIES285
Active Directory Sites287
Logon Traffic287
Distributed File System(DFS)Topology288
File Replication Service(FRS)288
Replication Traffic288
Site Aware Applications289
Replication Latency290
Replication Efficiency290
Replication Cost290
The Different Types of Replication291
Intra-Site Replication291
Inter-Site Replication293
Seeing If Active Directory Sites Are Necessary294
Placing the Domain Controllers(DC)295
Connectivity296
Available Bandwidth297
Replication Traffic298
Transport299
Site links299
Member Sites300
Cost300
Frequency300
Schedule300
Site Link Bridges301
Planning Inter-Site Replication Topology302
Transports303
Bridgehead Servers304
Inter-Site Topology Generator304
Least-Cost Spanning Tree305
Placing Servers in Sites305
Placing the Global Catalog(GC)Server306
Placing the Operation Masters307
Chapter Summary310
Review Questions313
Real-World Projects316
CHAPTER 11 DESIGNING YOUR ACTIVE DIRECTORY INFRASTRUCTURE323
A Functional Team324
What Will the Team Handle?325
What Roles Will the Team Members Play?326
The Vision and the Scope328
Vision329
Scope329
The Vision/Scope Document329
Address Your Risks330
Your Current Physical Infrastructure330
Hardware and Software331
Network Details332
The Users within the Organization333
Design Your Naming Strategy334
Design Your Directory Service Infrastructure334
The Goal334
Design Your Domain(or Multiple Domain)Strategy335
Design a Group Policy337
Design Your Site Topology337
Designing Your Schema338
Planning for Growth338
Delegation of Authority339
Chapter Summary341
Review Questions343
Real-World Projects348
CHAPTER 12 ACTIVE DIRECTORY SECURITY FEATURES353
Kerberos354
A Kerberos Transaction355
Kerberos Vocabulary356
Kerberos and Transitive Trusts357
File Access Permissions360
NT 4 Permissions360
File Permissions under Windows 2000363
Encrypting File System(EFS)368
How Does EFS Work?369
Security Policies370
Password Policy371
Account Lockout Policy371
Audit Policy372
User Rights Assignment373
Security Options374
Smart Cards374
How Do Smart Cards Word?375
IP Security(IPSec)376
The IPSec Monitor377
Active Directory Design and Security378
Chapter Summary379
Review Questions381
Real-World Projects384
CHAPTER 13 MONITORING,OPTIMIZING,AND TROUBLESHOOTING ACTIVE DIRECTORY387
Performance Console388
Performance Console and Replication389
Task Manager390
Network Monitor390
Replication Monitor391
NTDSUTIL393
SECEDIT394
NETDOM395
DNSCMD396
DSASTAT396
Miscellaneous Tools396
NETSVC396
MOVETREE397
The Right Tool for the Job397
Advanced Startup Options397
Recovery Console399
Backup and Restore Active Directory400
Active Directory Restoration402
Chapter Summary402
Review Questions405
Real-World Projects409
CHAPTER 14 SCHEMA:DESIGN AND MODIFICATION413
What Is the Schema?414
Objects416
Object Classes416
Attributes417
Syntax418
Object Identifiers(OIDs)419
Object Classes and Attributes Defined in the Schema419
Before Modifying the Schema421
Static422
Low-Latency422
Transient422
Modifying the Schema422
Installing Software Applications423
Scripting423
Using the Active Directory Schema Manager423
Who Can Modify the Schema?424
Modifying a Class425
Items in the Schema that Can Be Modified425
Creating a New Class426
Modifying an Attribute427
Creating a New Attribute428
Deactivating a Class or and Attribute429
Indexing an Attribute429
Replicating an Attribute to the Global Catalog429
Once the Modification Is Made430
System Checks on the Schema430
Time Interval Before Changes Take Effect431
Schema Replication432
Chapter Summary433
Review Questions436
Real-World Projects440
CHAPTER 15 DEPLOYING WINDOWS 2000 ACTIVE DIRECTORY443
Evaluating the Organization445
The Planning Team445
The Vision and the Scope447
Managing Risks449
The Administrative Delegation Model450
Physical Locations453
The Current Business Practices454
The Security Requirements455
Future Growth of the Company456
Existing Network Connections457
Designing an Active Directory Structure458
Delegation of Administrative Authority458
Group Policies459
The Domain Structure460
Schema Policy461
Site Topology462
The Naming Strategy462
Chapter Summary463
Review Questions466
Real-World Projects470
CHAPTER 16 MIGRATING FROM WINDOWS NT 4 TO ACTIVE DIRECTORY473
The Different Planning Phases of Migration474
Designing the Active Directory Structure475
Choose a Migration Path475
Develop a Domain Upgrade or a Restructure Strategy476
Plan the Deployment of the Migration Strategy476
The Migration Path477
Defining the Existing Domain Arrangement477
What Will Be Achieved from the Migration?481
The Active Directory Design482
Evaluating the Migration Paths482
The Domain Upgrade Strategy485
How Many Forests Are in the Design?486
What Is the Site Topology of the Design?487
What Are the Security and Administration Plans in the Design?489
The Current Operating System490
The Recovery Plan491
Domain Upgrade Order492
Upgrading Domain Controllers493
Mixed Mode or Native Mode?494
Post-Upgrade Tasks495
Restructuring Domains497
Inter-Forest Restructuring497
Intra-Forest Restructuring501
Domain Restructure Tools503
Chapter Summary503
Review Questions506
Real-World Projects510
CHAPTER 17 ACTIVE DIRECTORY AND EXCHANGE SERVERS513
Replication vs. Synchronization Revisited514
The Active Directory Connector515
Installing the Active Directory Connector516
Connection Agreements with the ADC517
Creating Connection Agreements519
Putting Active Directory Connector to Work530
Manage Your Objects Centrally531
Troubleshoot Your Connector533
Do You Need the ADC?535
Planning Your ADC535
Some Questions You Need to Resolve536
A Review of the Scenario Models538
Final Issues541
Exchange 2000541
Chapter Summary542
Review Questions543
Real-World Projects547
CHAPTER 18 SAMPLE TEST551
CHAPTER 19 ANSWER KEY577
APPENDIX A ANSWERS TO REVIEW QUESTIONS595
APPENDIX B RFCS FOR TCP/IP FOR WINDOWS 2000629
APPENDIX C EXAM OBJECTIVES631
GLOSSARY635
INDEX649