Networking...Contents at a Glance Introduction ..... 1 Book I: Planning a Network..... 5
Transcript of Networking...Contents at a Glance Introduction ..... 1 Book I: Planning a Network..... 5
NetworkingA L L ‐ I N ‐ O N E
by Doug Lowe
6th Edition
Networking All‐in‐One For Dummies®, 6th EditionPublished by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030‐5774, www.wiley.com
Copyright © 2016 by John Wiley & Sons, Inc., Hoboken, New Jersey
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit-ted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permis-sion of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES REPRESENTATIVES OR WRITTEN SALES MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR YOUR SITUATION. YOU SHOULD CONSULT WITH A PROFESSIONAL WHERE APPROPRIATE. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM.
For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877‐762‐2974, outside the U.S. at 317‐572‐3993, or fax 317‐572‐4002. For technical support, please visit www.wiley.com/techsupport.
Wiley publishes in a variety of print and electronic formats and by print‐on‐demand. Some material included with standard print versions of this book may not be included in e‐books or in print‐on‐demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2015960607
ISBN 978‐1‐119‐15472‐3 (pbk); ISBN 978‐1‐119‐15473‐0 (ebk); ISBN 978‐1‐119‐15474‐7 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Contents at a GlanceIntroduction ................................................................ 1
Book I: Planning a Network .......................................... 5Chapter 1: Understanding Networks ............................................................................... 7Chapter 2: Planning a Network....................................................................................... 23Chapter 3: Installing Network Hardware ....................................................................... 41Chapter 4: Setting Up a Server ....................................................................................... 53Chapter 5: Configuring Windows Clients ...................................................................... 63Chapter 6: Mac Networking ............................................................................................ 73Chapter 7: Configuring Other Network Features ......................................................... 81Chapter 8: Setting Up a Wireless Network .................................................................... 89
Book II: Network Administration ............................... 119Chapter 1: Help Wanted: Job Description for
a Network Administrator ............................................................................................ 121Chapter 2: Security 101 ................................................................................................. 135Chapter 3: Managing User Accounts ........................................................................... 145Chapter 4: Firewalls and Virus Protection .................................................................. 153Chapter 5: Blocking Spam ............................................................................................. 165Chapter 6: Managing Network Software ...................................................................... 177Chapter 7: Solving Network Problems ........................................................................ 189Chapter 8: Backing Up Your Data ................................................................................. 205Chapter 9: Disaster Recovery and Business Continuity Planning ........................... 217
Book III: Protocols ................................................... 225Chapter 1: Understanding Network Protocols and Standards ................................. 227Chapter 2: Introduction to TCP/IP and the Internet .................................................. 249Chapter 3: Understanding IP Addresses ..................................................................... 257Chapter 4: Using DHCP .................................................................................................. 275Chapter 5: Using DNS .................................................................................................... 291Chapter 6: Using FTP ..................................................................................................... 317Chapter 7: TCP/IP Tools and Commands .................................................................... 339
Book IV: Going Virtual ............................................. 365Chapter 1: Introducing Virtualization.......................................................................... 367Chapter 2: Working with Hyper‐V ................................................................................ 377Chapter 3: Working with VMware ................................................................................ 395Chapter 4: Virtualizing Your Desktops ........................................................................ 405
Book V: Remote Networking ..................................... 413Chapter 1: Managing Mobile Devices .......................................................................... 415Chapter 2: Working with VPN for Remote Access ..................................................... 429Chapter 3: Using Remote Desktop Access .................................................................. 435Chapter 4: Using Remote Assistance ........................................................................... 447
Book VI: Cloud Networking ....................................... 455Chapter 1: Cloudy with a Chance of Gigabytes .......................................................... 457Chapter 2: Using Essential Cloud Services ................................................................. 467Chapter 3: Administering Office 365 ............................................................................ 477Chapter 4: Using SharePoint Online ............................................................................ 485
Book VII: Windows Server 2016 Reference ................ 497Chapter 1: Installing and Configuring Windows Server 2016 ................................... 499Chapter 2: Managing Windows Server 2016 ............................................................... 513Chapter 3: Dealing with Active Directory ................................................................... 529Chapter 4: Managing Windows User Accounts .......................................................... 541Chapter 5: Managing a File Server ............................................................................... 563Chapter 6: Using Group Policy ..................................................................................... 577Chapter 7: Troubleshooting.......................................................................................... 589Chapter 8: Windows Commands .................................................................................. 601
Book VIII: Using Other Windows Servers.................... 629Chapter 1: Using Internet Information Services ......................................................... 631Chapter 2: Managing Exchange Server 2016 .............................................................. 641Chapter 3: Using SQL Server 2014 ............................................................................... 659
Book IX: Managing Linux Systems ............................ 675Chapter 1: Installing a Linux Server ............................................................................ 677Chapter 2: Getting Used to Linux ................................................................................. 689Chapter 3: Basic Linux Network Configuration .......................................................... 701Chapter 4: Running DHCP and DNS ............................................................................. 713
Chapter 5: Doing the Samba Dance ............................................................................. 723Chapter 6: Running Apache .......................................................................................... 737Chapter 7: Running Sendmail ....................................................................................... 749Chapter 8: Running FTP ................................................................................................ 759Chapter 9: Linux Commands ........................................................................................ 765
Appendix A: Directory of Useful Websites .................. 793
Appendix B: Glossary ............................................... 801
Index ...................................................................... 829
Table of ContentsIntroduction ................................................................. 1
About This Book .............................................................................................. 2Foolish Assumptions ....................................................................................... 3Icons Used in This Book ................................................................................. 3Beyond the Book ............................................................................................. 4Where to Go from Here ................................................................................... 4
Book I: Planning a Network .......................................... 5
Chapter 1: Understanding Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7Defining a Network .......................................................................................... 7
Network building blocks ....................................................................... 8Seeing the benefits of networking ...................................................... 10
Comparing Clients and Servers ................................................................... 11Understanding Dedicated Servers and Peers ............................................ 12Seeing Networks Big and Small .................................................................... 13Looking Closer at Servers ............................................................................. 13
What’s important in a server .............................................................. 14Components of a server computer .................................................... 15Server form factors .............................................................................. 16Operating systems for server computers ......................................... 18
Chapter 2: Planning a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Making a Network Plan ................................................................................. 23Being Purposeful ............................................................................................ 24Taking Stock ................................................................................................... 25
What you need to know ...................................................................... 25Programs that gather information for you ....................................... 27
To Dedicate or Not to Dedicate: That Is the Question .............................. 28Considering Server Roles ............................................................................. 28
File servers............................................................................................ 29Print servers ......................................................................................... 29Web servers .......................................................................................... 29Mail servers .......................................................................................... 29Database servers.................................................................................. 30Application servers ............................................................................. 30License servers .................................................................................... 30
Networking All-in-One For Dummiesviii
Choosing a Server Operating System .......................................................... 30Considering Cable ......................................................................................... 31Surmising Switches ....................................................................................... 32Planning the Network Topology .................................................................. 35Planning the TCP/IP Implementation .......................................................... 36Drawing Diagrams ......................................................................................... 36More Questions Your Network Plan Should Address ............................... 38
Chapter 3: Installing Network Hardware . . . . . . . . . . . . . . . . . . . . . . . . .41Working with Cable ....................................................................................... 41
Cable categories ................................................................................... 41What’s with the pairs? ......................................................................... 42To shield or not to shield ................................................................... 43When to use plenum cable ................................................................. 43Sometimes solid, sometimes stranded ............................................. 44Installation guidelines ......................................................................... 44Getting the tools that you need ......................................................... 46Pinouts for twisted‐pair cables .......................................................... 47Attaching RJ‐45 connectors ................................................................ 48Wall jacks and patch panels ............................................................... 49
Installing Switches ......................................................................................... 50Daisy‐Chaining Switches ............................................................................... 51
Chapter 4: Setting Up a Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53The Many Ways to Install a Server Operating System .............................. 53
Full install versus upgrade.................................................................. 53Installing over the network ................................................................. 55
Gathering Your Stuff ...................................................................................... 55A capable server computer ................................................................ 55The server OS ....................................................................................... 56Other software ..................................................................................... 56A working Internet connection........................................................... 56A good book .......................................................................................... 57
Making Informed Decisions .......................................................................... 57Final Preparations ......................................................................................... 58Installing a Server Operating System .......................................................... 59
Phase 1: Collecting information ......................................................... 59Phase 2: Installing Windows ............................................................... 60
Configuring Your Server ............................................................................... 60
Chapter 5: Configuring Windows Clients . . . . . . . . . . . . . . . . . . . . . . . . .63Configuring Network Connections .............................................................. 63Joining a Domain ........................................................................................... 69
Table of Contents ix
Chapter 6: Mac Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73Basic Mac Network Settings ......................................................................... 73Joining a Domain ........................................................................................... 77Connecting to a Share ................................................................................... 79
Chapter 7: Configuring Other Network Features . . . . . . . . . . . . . . . . . .81Configuring Network Printers ...................................................................... 81
Adding a network printer .................................................................... 81Accessing a network printer using a web interface ........................ 84
Mapping Network Drives .............................................................................. 85
Chapter 8: Setting Up a Wireless Network . . . . . . . . . . . . . . . . . . . . . . .89Diving into Wireless Networking ................................................................. 90A Little High School Electronics .................................................................. 91
Waves and frequencies ....................................................................... 91Wavelength and antennas ................................................................... 92Spectrums and the FCC ....................................................................... 93
Eight‐Oh‐Two‐Dot‐Eleventy Something? (Or, Understanding Wireless Standards)................................................................................................... 94
Home on the Range ....................................................................................... 95Wireless Network Adapters .......................................................................... 96Wireless Access Points ................................................................................. 97
Infrastructure mode ............................................................................ 98Multifunction WAPs ............................................................................. 99
Roaming .......................................................................................................... 99Wireless bridging ............................................................................... 100Ad‐hoc networks ................................................................................ 100
Configuring a Wireless Access Point ......................................................... 100Basic configuration options .............................................................. 101DHCP configuration ........................................................................... 102
Connecting to a Wireless Network ............................................................ 103Paying Attention to Wireless Network Security ...................................... 105
Understanding wireless security threats ........................................ 105Securing your wireless network ....................................................... 109Troubleshooting a wireless network ............................................... 114
Book II: Network Administration ............................... 119
Chapter 1: Help Wanted: Job Description for a Network Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Knowing What Network Administrators Do ............................................. 121Choosing the Part‐Time Administrator ..................................................... 123Establishing Routine Chores ...................................................................... 124
Networking All-in-One For Dummiesx
Managing Network Users ............................................................................ 125Patching Up Your Operating System and Software ................................. 126Discovering Software Tools for Network Administrators ...................... 126Building a Library ........................................................................................ 128Getting Certified ........................................................................................... 129
CompTIA ............................................................................................. 130Microsoft ............................................................................................. 131Cisco .................................................................................................... 131
Gurus Need Gurus, Too .............................................................................. 132Helpful Bluffs and Excuses ......................................................................... 132
Chapter 2: Security 101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135Do You Need Security? ............................................................................... 136Considering Two Approaches to Security ................................................ 137Physical Security: Locking Your Doors .................................................... 137Securing User Accounts .............................................................................. 139
Obfuscating your usernames ........................................................... 139Using passwords wisely .................................................................... 140A password‐generator For Dummies ............................................... 141Securing the Administrator account ............................................... 142
Hardening Your Network ............................................................................ 142Using a firewall ................................................................................... 142Disabling unnecessary services ....................................................... 143Patching your servers ....................................................................... 143
Securing Your Users .................................................................................... 143
Chapter 3: Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . .145Exploring What User Accounts Consist Of ............................................... 145Looking at Built‐In Accounts ...................................................................... 146
The Administrator account .............................................................. 146The Guest account ............................................................................. 147Service accounts ................................................................................ 147
Assigning User Rights ................................................................................. 148Controlling User Access with Permissions
(Who Gets What)...................................................................................... 149Assigning Permissions to Groups .............................................................. 150Understanding User Profiles ...................................................................... 150Automating Tasks with Logon Scripts ...................................................... 151
Chapter 4: Firewalls and Virus Protection . . . . . . . . . . . . . . . . . . . . . . .153Firewalls ........................................................................................................ 153The Many Types of Firewalls ..................................................................... 155
Packet filtering ................................................................................... 155Stateful packet inspection (SPI) ....................................................... 157Circuit‐level gateway ......................................................................... 157Application gateway .......................................................................... 157
Table of Contents xi
The Built‐In Windows Firewall ................................................................... 158Virus Protection ........................................................................................... 159
What is a virus? .................................................................................. 159Antivirus programs ............................................................................ 161Safe computing ................................................................................... 162
Using Windows Action Center ................................................................... 162
Chapter 5: Blocking Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165Defining Spam .............................................................................................. 166Sampling the Many Flavors of Spam ......................................................... 167Using Antispam Software ............................................................................ 168Understanding Spam Filters ....................................................................... 169Looking at Three Types of Antispam Software ........................................ 172
On‐premises antispam ...................................................................... 172Antispam appliances ......................................................................... 173Cloud‐based antispam services ....................................................... 174
Minimizing Spam .......................................................................................... 175
Chapter 6: Managing Network Software . . . . . . . . . . . . . . . . . . . . . . . .177Understanding Software Licenses ............................................................. 178Using a License Server ................................................................................ 180Options for Deploying Network Software ................................................. 182
Deploying software manually ........................................................... 182Running Setup from a network share .............................................. 182Installing silently ................................................................................ 183Creating an administrative installation image ............................... 185Pushing out software with group policy ......................................... 185
Keeping Software Up to Date ..................................................................... 186
Chapter 7: Solving Network Problems . . . . . . . . . . . . . . . . . . . . . . . . . .189When Bad Things Happen to Good Computers ....................................... 190Fixing Dead Computers ............................................................................... 191Ways to Check a Network Connection ...................................................... 192A Bunch of Error Messages Just Flew By! ................................................. 193Double‐Checking Your Network Settings ................................................. 193Using the Windows Networking Troubleshooter .................................... 194Time to Experiment ..................................................................................... 195Who’s on First? ............................................................................................ 196Restarting a Client Computer ..................................................................... 196Booting in Safe Mode .................................................................................. 198Using System Restore ................................................................................. 198Restarting Network Services ...................................................................... 200Restarting a Network Server ...................................................................... 202Looking at Event Logs ................................................................................. 203Documenting Your Trials and Tribulations ............................................. 204
Networking All-in-One For Dummiesxii
Chapter 8: Backing Up Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205Backing Up Your Data ................................................................................. 205Where to Back Up Your Data ..................................................................... 206Backing Up to Tape ..................................................................................... 206Backup Software .......................................................................................... 207Types of Backups ........................................................................................ 208
Normal backups ................................................................................. 209Copy backups ..................................................................................... 210Daily backups ..................................................................................... 210Incremental backups ......................................................................... 210Differential backups ........................................................................... 211
Local versus Network Backups .................................................................. 212How Many Sets of Backups Should You Keep? ........................................ 213A Word about Tape Reliability ................................................................... 215About Cleaning the Heads .......................................................................... 216Backup Security ........................................................................................... 216
Chapter 9: Disaster Recovery and Business Continuity Planning . . .217Assessing Different Types of Disasters ..................................................... 218
Environmental disasters ................................................................... 218Deliberate disasters ........................................................................... 219Disruption of services ....................................................................... 219Equipment failure .............................................................................. 220Other disasters ................................................................................... 220
Analyzing the Impact of a Disaster ............................................................ 220Developing a Business Continuity Plan .................................................... 221Holding a Fire Drill ....................................................................................... 222
Book III: Protocols .................................................... 225
Chapter 1: Understanding Network Protocols and Standards . . . . . .227Understanding Protocols ............................................................................ 227Understanding Standards ........................................................................... 229Seeing the Seven Layers of the OSI Reference Model ............................. 229
The Physical layer ............................................................................. 231The Data Link layer ............................................................................ 232The Network layer ............................................................................. 233The Transport layer .......................................................................... 236The Session layer ............................................................................... 238The Presentation layer ...................................................................... 238The Application layer ........................................................................ 239
Following a Packet through the Layers .................................................... 239
Table of Contents xiii
The Ethernet Protocol ................................................................................ 240Standard Ethernet .............................................................................. 242Fast Ethernet ...................................................................................... 242Gigabit Ethernet ................................................................................. 243
The TCP/IP Protocol Suite .......................................................................... 244IP .......................................................................................................... 245TCP ...................................................................................................... 246UDP ...................................................................................................... 247
Other Protocols Worth Knowing About ................................................... 247
Chapter 2: Introduction to TCP/IP and the Internet . . . . . . . . . . . . . . .249What Is the Internet? ................................................................................... 249A Little Internet History .............................................................................. 251TCP/IP Standards and RFCs ....................................................................... 252The TCP/IP Protocol Framework ............................................................... 254
Network Interface layer ..................................................................... 254Network layer ..................................................................................... 255Transport layer .................................................................................. 255Application layer ................................................................................ 256
Chapter 3: Understanding IP Addresses . . . . . . . . . . . . . . . . . . . . . . . .257Understanding Binary ................................................................................. 257
Counting by ones ............................................................................... 257Doing the logic thing ......................................................................... 259Working with the binary Windows Calculator ............................... 260
Introducing IP Addresses ........................................................................... 262Networks and hosts ........................................................................... 262The dotted‐decimal dance ................................................................ 262
Classifying IP Addresses ............................................................................. 263Class A addresses .............................................................................. 265Class B addresses .............................................................................. 267Class C addresses .............................................................................. 267
Subnetting ..................................................................................................... 267Subnets ................................................................................................ 268Subnet masks...................................................................................... 269Network prefix notation .................................................................... 270Default subnets .................................................................................. 271The great subnet roundup ................................................................ 271IP block parties .................................................................................. 272Private and public addresses ........................................................... 273
Network Address Translation .................................................................... 273
Chapter 4: Using DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275Understanding DHCP .................................................................................. 275
Configuration information provided by DHCP ............................... 275DHCP servers ...................................................................................... 276How DHCP actually works ................................................................ 276
Networking All-in-One For Dummiesxiv
Understanding Scopes ................................................................................ 278Feeling excluded? ............................................................................... 279Reservations suggested .................................................................... 279How long to lease? ............................................................................. 280
Working with a DHCP Server ...................................................................... 281Installing a Windows Server 2016 DHCP server ............................. 281Configuring a new scope ................................................................... 282
How to Configure a Windows DHCP Client ............................................... 287Automatic private IP addressing ..................................................... 287Renewing and releasing leases ......................................................... 288
Chapter 5: Using DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .291Understanding DNS Names ........................................................................ 291
Domains and domain names ............................................................ 292Fully qualified domain names........................................................... 294
Top‐Level Domains ...................................................................................... 294Generic domains ................................................................................ 294Geographic domains.......................................................................... 295
The Hosts File .............................................................................................. 297Understanding DNS Servers and Zones .................................................... 300
Zones ................................................................................................... 300Primary and secondary servers ....................................................... 302Root servers ....................................................................................... 303Caching ................................................................................................ 305
Understanding DNS Queries ....................................................................... 306A real‐life DNS example ..................................................................... 307
Zone Files and Resource Records ............................................................. 308SOA records ........................................................................................ 309NS records .......................................................................................... 310A records............................................................................................. 311CNAME records .................................................................................. 311PTR records ........................................................................................ 312MX records ......................................................................................... 312
Reverse Lookup Zones ................................................................................ 313Working with the Windows DNS Server .................................................... 314How to Configure a Windows DNS Client ................................................. 315
Chapter 6: Using FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317Discovering FTP ........................................................................................... 317Configuring an FTP Server .......................................................................... 318
Installing FTP ...................................................................................... 318Creating an FTP site ........................................................................... 318Changing the FTP site properties .................................................... 321Adding content to your FTP site ...................................................... 323
Accessing an FTP Site with a Browser ...................................................... 324
Table of Contents xv
Using an FTP Command Line Client .......................................................... 325FTP Command and Subcommand Reference ........................................... 328
The FTP command ............................................................................. 328! (Escape) ............................................................................................ 329? (Help) ................................................................................................ 329append................................................................................................. 329ascii ...................................................................................................... 329bell ....................................................................................................... 329binary .................................................................................................. 330bye ....................................................................................................... 330cd ......................................................................................................... 330close..................................................................................................... 330debug ................................................................................................... 330delete ................................................................................................... 331dir ......................................................................................................... 331disconnect .......................................................................................... 331get ........................................................................................................ 331glob ...................................................................................................... 332hash ..................................................................................................... 332help ...................................................................................................... 332lcd ........................................................................................................ 332literal ................................................................................................... 333ls ........................................................................................................... 333mdelete ................................................................................................ 333mdir ..................................................................................................... 333mget ..................................................................................................... 334mkdir ................................................................................................... 334mls ....................................................................................................... 334mput .................................................................................................... 334open ..................................................................................................... 335prompt................................................................................................. 335put ........................................................................................................ 335pwd ...................................................................................................... 335quit ....................................................................................................... 336quote.................................................................................................... 336recv ...................................................................................................... 336remotehelp ......................................................................................... 336rename................................................................................................. 337rmdir .................................................................................................... 337send ..................................................................................................... 337status ................................................................................................... 337trace ..................................................................................................... 338type ...................................................................................................... 338user ...................................................................................................... 338verbose ................................................................................................ 338
Networking All-in-One For Dummiesxvi
Chapter 7: TCP/IP Tools and Commands . . . . . . . . . . . . . . . . . . . . . . . .339Using the arp Command ............................................................................. 339Using the hostname Command .................................................................. 340Using the ipconfig Command ..................................................................... 340
Displaying basic IP configuration .................................................... 341Displaying detailed configuration information .............................. 342Renewing an IP lease ......................................................................... 342Releasing an IP lease ......................................................................... 343Flushing the local DNS cache ........................................................... 343
Using the nbtstat Command ....................................................................... 344Using the netstat Command ....................................................................... 345
Displaying connections ..................................................................... 345Displaying interface statistics .......................................................... 346
Using the nslookup Command ................................................................... 349Looking up an IP address .................................................................. 349Using nslookup subcommands ........................................................ 350Displaying DNS records .................................................................... 350Locating the mail server for an email address ............................... 352Taking a ride through DNS‐Land ...................................................... 352
Using the pathping Command ................................................................... 355Using the ping Command ........................................................................... 357Using the route Command .......................................................................... 358
Displaying the routing table ............................................................. 358Modifying the routing table .............................................................. 361
Using the tracert Command ....................................................................... 362
Book IV: Going Virtual .............................................. 365
Chapter 1: Introducing Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . .367Understanding Virtualization ..................................................................... 367Understanding Hypervisors ....................................................................... 368Understanding Virtual Disks ...................................................................... 370Understanding Network Virtualization ..................................................... 373Considering the Benefits of Virtualization ............................................... 373
Chapter 2: Working with Hyper‐V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377Understanding the Hyper‐V Hypervisor ................................................... 377Understanding Hyper‐V Virtual Disks ....................................................... 378Enabling Hyper‐V ......................................................................................... 379Getting Familiar with Hyper‐V .................................................................... 380Creating a Virtual Switch ............................................................................ 381Creating a Virtual Disk ................................................................................ 384Creating a Virtual Machine ......................................................................... 387Installing an Operating System .................................................................. 391
Table of Contents xvii
Chapter 3: Working with VMware . . . . . . . . . . . . . . . . . . . . . . . . . . . . .395Looking at vSphere ...................................................................................... 395Getting Started with VMware Player ......................................................... 396Creating a Virtual Machine ......................................................................... 398Installing VMware Tools ............................................................................. 402
Chapter 4: Virtualizing Your Desktops . . . . . . . . . . . . . . . . . . . . . . . . . .405Introducing Desktop Virtualization ........................................................... 405Considering Two Approaches to Desktop Virtualization ....................... 407Looking at VMware’s Horizon View .......................................................... 408Looking at Citrix XenApp ............................................................................ 409
Book V: Remote Networking ...................................... 413
Chapter 1: Managing Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . .415The Many Types of Mobile Devices .......................................................... 416Considering Security for Mobile Devices ................................................. 417Managing iOS Devices ................................................................................. 418
Understanding the iPhone ................................................................ 418Understanding the iPad .................................................................... 419Integrating iOS devices with Exchange ........................................... 419
Managing Android Devices ......................................................................... 425Looking at the Android OS................................................................ 426Perusing Android’s core applications ............................................. 427Integrating Android with Exchange ................................................. 427
Chapter 2: Working with VPN for Remote Access . . . . . . . . . . . . . . . .429Understanding VPN ..................................................................................... 429Looking at VPN Security ............................................................................. 431Understanding VPN Servers and Clients .................................................. 432
Chapter 3: Using Remote Desktop Access . . . . . . . . . . . . . . . . . . . . . .435Enabling Remote Desktop Connection ..................................................... 435Connecting Remotely .................................................................................. 436Using Keyboard Shortcuts for Remote Desktop ...................................... 439Configuring Remote Desktop Options ...................................................... 440
Setting the Display options ............................................................... 441Setting the Local Resources options ............................................... 442Setting the Programs options ........................................................... 443Setting the Experience options ........................................................ 444Setting the Advanced options .......................................................... 444
Networking All-in-One For Dummiesxviii
Chapter 4: Using Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . .447Enabling Remote Assistance ...................................................................... 447Inviting Someone to Help You via a Remote
Assistance Session ................................................................................... 449Responding to a Remote Assistance Invitation ....................................... 452
Book VI: Cloud Networking ....................................... 455
Chapter 1: Cloudy with a Chance of Gigabytes . . . . . . . . . . . . . . . . . . .457Introducing Cloud Computing ................................................................... 457Looking at the Benefits of Cloud Computing ........................................... 458Detailing the Drawbacks of Cloud Computing ......................................... 460Examining Three Basic Kinds of Cloud Services ..................................... 461
Applications ........................................................................................ 461Platforms ............................................................................................. 462Infrastructure ..................................................................................... 462
Public Clouds versus Private Clouds ........................................................ 462Introducing Some of the Major Cloud Providers ..................................... 463
Amazon................................................................................................ 463Google.................................................................................................. 464Microsoft ............................................................................................. 465
Getting into the Cloud ................................................................................. 465
Chapter 2: Using Essential Cloud Services . . . . . . . . . . . . . . . . . . . . . .467Sharing Files in the Cloud ........................................................................... 467
Google Drive ....................................................................................... 468Microsoft OneDrive ........................................................................... 469Dropbox .............................................................................................. 469Box ....................................................................................................... 470
Hosting Meetings in the Cloud ................................................................... 470GoToMeeting ...................................................................................... 471WebEx .................................................................................................. 471
Creating a Company Social Network ......................................................... 472Yammer ............................................................................................... 473Socialcast ............................................................................................ 474
Chapter 3: Administering Office 365 . . . . . . . . . . . . . . . . . . . . . . . . . . . .477Looking at the Features Provided by Office 365 ...................................... 477Using the Admin Center .............................................................................. 479Creating a New User .................................................................................... 480Editing a User Account ............................................................................... 482Considering Other Important Administrative Tasks ............................... 483
Table of Contents xix
Chapter 4: Using SharePoint Online . . . . . . . . . . . . . . . . . . . . . . . . . . . .485What Is SharePoint? .................................................................................... 485Connecting to SharePoint Online .............................................................. 486Adding a Part ................................................................................................ 487Adding and Removing Announcements .................................................... 491Adding Apps ................................................................................................. 492
Book VII: Windows Server 2016 Reference ................. 497
Chapter 1: Installing and Configuring Windows Server 2016 . . . . . . .499Planning a Windows Server Installation ................................................... 499
Checking system requirements........................................................ 499Reading the release notes ................................................................. 500Deciding whether to upgrade or install .......................................... 500Considering your licensing options ................................................. 501Thinking about multiboot ................................................................. 501Planning your partitions ................................................................... 501Deciding your TCP/IP configuration ................................................ 502Choosing workgroups or domains .................................................. 503
Before You Install . . . .................................................................................. 503Backing up .......................................................................................... 504Checking the event logs .................................................................... 504Disconnecting UPS devices............................................................... 504
Running Setup .............................................................................................. 504Adding Server Roles and Features ............................................................ 509
Chapter 2: Managing Windows Server 2016 . . . . . . . . . . . . . . . . . . . . .513Using the Administrator Account .............................................................. 513Using Remote Desktop Connection ........................................................... 514
Enabling remote access .................................................................... 514Connecting remotely ......................................................................... 515
Using Microsoft Management Console ..................................................... 517Working with MMC ............................................................................ 517Taking an overview of the MMC consoles ...................................... 518
Customizing MMC ........................................................................................ 520Adding snap‐ins .................................................................................. 521Adding taskpads................................................................................. 521
Chapter 3: Dealing with Active Directory . . . . . . . . . . . . . . . . . . . . . . .529What Directories Do .................................................................................... 529Remembering the Good Ol’ Days of NT Domains .................................... 530
PDCs and BDCs................................................................................... 530Trusts .................................................................................................. 531NetBIOS names ................................................................................... 531
Networking All-in-One For Dummiesxx
Active Directory to the Rescue .................................................................. 532Understanding How Active Directory Is Structured ............................... 532
Objects ................................................................................................ 532Domains .............................................................................................. 533Organizational units .......................................................................... 534Trees .................................................................................................... 535Forests ................................................................................................. 535
Creating a New Domain ............................................................................... 536Creating an Organizational Unit ................................................................ 537
Chapter 4: Managing Windows User Accounts . . . . . . . . . . . . . . . . . .541Understanding Windows User Accounts .................................................. 541
Local accounts versus domain accounts ........................................ 541User account properties ................................................................... 542
Creating a New User .................................................................................... 542Setting User Properties ............................................................................... 545
Changing the user’s contact information ....................................... 546Setting account options .................................................................... 546Specifying logon hours ...................................................................... 548Restricting access to certain computers ........................................ 549Setting the user’s profile information ............................................. 549
Resetting User Passwords .......................................................................... 550Disabling and Enabling User Accounts ..................................................... 551Deleting a User ............................................................................................. 552Working with Groups .................................................................................. 552
Group types ........................................................................................ 553Group scope ....................................................................................... 553Default groups .................................................................................... 554Creating a group................................................................................. 556Adding a member to a group ............................................................ 557
Working with User Profiles ......................................................................... 558Types of user profiles ........................................................................ 559Roaming profiles ................................................................................ 559
Creating a Logon Script .............................................................................. 561
Chapter 5: Managing a File Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .563Understanding Permissions ....................................................................... 563Understanding Shares ................................................................................. 565Managing Your File Server ......................................................................... 566
Using the New Share Wizard ............................................................ 566Sharing a folder without the wizard ................................................ 572Granting permissions ........................................................................ 573
Chapter 6: Using Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .577Understanding Group Policy ...................................................................... 577Enabling Group Policy Management on Windows Server 2016 ............. 578
Table of Contents xxi
Creating Group Policy Objects .................................................................. 579Filtering Group Policy Objects ................................................................... 585
Chapter 7: Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .589Working with the Event Viewer ................................................................. 589
Using the Event Viewer ..................................................................... 589Setting event log policies .................................................................. 591
Monitoring Performance ............................................................................. 592Using the Reliability and Performance Monitor............................. 592Creating performance logs ............................................................... 595
Using the Computer Management Console .............................................. 598Working with Services ................................................................................ 599
Chapter 8: Windows Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .601Using a Command Window ........................................................................ 601
Opening and closing a command window ...................................... 602Editing commands ............................................................................. 602Using the Control menu .................................................................... 603
Special Command Tricks ............................................................................ 603Wildcards ............................................................................................ 603Chaining commands .......................................................................... 604Redirection and piping ...................................................................... 605Environment variables ...................................................................... 606Batch files ........................................................................................... 607
The EventCreate Command ....................................................................... 608Net Commands ............................................................................................. 609
The Net Accounts command ............................................................ 610The Net Computer command ........................................................... 611The Net Config command ................................................................. 611The Net Continue command ............................................................. 612The Net File command ...................................................................... 612The Net Group command ................................................................. 613The Net Help command .................................................................... 615The Net Helpmsg command ............................................................. 615The Net Localgroup command ......................................................... 615The Net Name command .................................................................. 617The Net Pause command .................................................................. 617The Net Print command .................................................................... 618The Net Send command .................................................................... 619The Net Session command ............................................................... 620The Net Share command................................................................... 620The Net Start command .................................................................... 621The Net Statistics command ............................................................ 622The Net Stop command..................................................................... 623The Net Time command .................................................................... 623
Networking All-in-One For Dummiesxxii
The Net Use command ...................................................................... 624The Net User command .................................................................... 625The Net View command .................................................................... 627
The RunAs Command ................................................................................. 627
Book VIII: Using Other Windows Servers .................... 629
Chapter 1: Using Internet Information Services . . . . . . . . . . . . . . . . . .631Installing IIS .................................................................................................. 631Understanding the Default Website .......................................................... 634Creating Websites ........................................................................................ 636
Chapter 2: Managing Exchange Server 2016 . . . . . . . . . . . . . . . . . . . . .641Creating a Mailbox ....................................................................................... 641Managing Mailboxes .................................................................................... 644
Enabling mailbox features ................................................................ 644Creating a forwarder ......................................................................... 645Setting mailbox storage limits .......................................................... 647
Configuring Outlook for Exchange ............................................................ 651Viewing Another Mailbox ........................................................................... 654
Chapter 3: Using SQL Server 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .659What Is a Database? .................................................................................... 659What Is a Relational Database? .................................................................. 660What Is SQL? ................................................................................................. 661
SQL dialects ........................................................................................ 661SQL statements .................................................................................. 662Using the select statement ............................................................... 662
Using SQL Server 2014 Management Studio ............................................. 664Creating a New Database ............................................................................ 665Creating Tables ............................................................................................ 667Editing Tables .............................................................................................. 670Working with Queries ................................................................................. 671Working with Scripts ................................................................................... 672
Book IX: Managing Linux Systems ............................. 675
Chapter 1: Installing a Linux Server . . . . . . . . . . . . . . . . . . . . . . . . . . . .677Planning a Linux Server Installation .......................................................... 677
Checking system requirements........................................................ 677Choosing a distribution..................................................................... 678Going virtual ....................................................................................... 680Deciding on your TCP/IP configuration .......................................... 680
Installing Fedora 22 ..................................................................................... 680
Table of Contents xxiii
Chapter 2: Getting Used to Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .689Linux: It Isn’t Windows ................................................................................ 689
X Window ............................................................................................ 689Virtual consoles ................................................................................. 690Understanding the file system ......................................................... 690
On Again, Off Again ..................................................................................... 692Logging on........................................................................................... 692Logging off .......................................................................................... 693Shutting down .................................................................................... 693
Using GNOME ............................................................................................... 693Getting to a Command Shell ....................................................................... 694Enabling the SUDO Command .................................................................... 695Managing User Accounts ............................................................................ 697
Chapter 3: Basic Linux Network Configuration . . . . . . . . . . . . . . . . . .701Using the Network Configuration Program .............................................. 701Restarting Your Network ............................................................................ 704Working with Network Configuration Files .............................................. 704
The Network file ................................................................................. 705The ifcfg files ...................................................................................... 706The Hosts file ...................................................................................... 707The resolv.conf file ............................................................................ 708The nsswitch.conf file ....................................................................... 708The xinetd.conf file ............................................................................ 710
Displaying Your Network Configuration with the ifconfig Command ..................................................................... 711
Chapter 4: Running DHCP and DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .713Running a DHCP Server ............................................................................... 713
Installing DHCP ................................................................................... 714Configuring DHCP .............................................................................. 714Starting DHCP ..................................................................................... 716
Running a DNS Server ................................................................................. 716Installing BIND .................................................................................... 716Looking at BIND configuration files ................................................. 717Restarting BIND .................................................................................. 721
Chapter 5: Doing the Samba Dance . . . . . . . . . . . . . . . . . . . . . . . . . . . .723Understanding Samba ................................................................................. 723Installing Samba ........................................................................................... 724Starting and Stopping Samba ..................................................................... 725Using the Samba Server Configuration Tool ............................................ 726
Configuring server settings............................................................... 727Configuring Samba users .................................................................. 729Creating a share ................................................................................. 730
Editing the smb.conf File ............................................................................ 732Using the Samba Client ............................................................................... 734
Networking All-in-One For Dummiesxxiv
Chapter 6: Running Apache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .737Installing Apache ......................................................................................... 737Starting and Stopping Apache ................................................................... 737Confirming That Apache Is Running ......................................................... 738Using the HTTP Configuration Tool .......................................................... 740Allowing or Restricting Access to an Apache Server .............................. 741Configuring Virtual Hosts ........................................................................... 742
Configuring the default host ............................................................. 743Creating a virtual host ....................................................................... 745
Manually Editing Apache’s Configuration Files ....................................... 746Creating Web Pages ..................................................................................... 747
Chapter 7: Running Sendmail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .749Understanding Email ................................................................................... 749Installing Sendmail ...................................................................................... 750Modifying sendmail.mc ............................................................................... 751
Enabling connections ........................................................................ 752Enabling masquerading ..................................................................... 752Setting up aliases ............................................................................... 753
Using SpamAssassin .................................................................................... 753Installing SpamAssassin .................................................................... 753Customizing SpamAssassin .............................................................. 754Blacklisting and whitelisting email addresses ............................... 755
Using the Mail Console Client .................................................................... 755Using Evolution ............................................................................................ 757
Chapter 8: Running FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .759Installing vsftpd ........................................................................................... 759Starting the vsftpd Service ......................................................................... 759Configuring FTP ........................................................................................... 760
Chapter 9: Linux Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .765Command Shell Basics ................................................................................ 765
Getting to a shell ................................................................................ 766Editing commands ............................................................................. 767Wildcards ............................................................................................ 767Redirection and piping ...................................................................... 768Environment variables ...................................................................... 768Shell scripts ........................................................................................ 769Running a command with root‐level privileges ............................. 770
Directory‐ and File‐Handling Commands .................................................. 770The pwd command ............................................................................ 771The cd command ............................................................................... 771
Table of Contents xxv
The mkdir command ......................................................................... 771The rmdir command .......................................................................... 772The ls command ................................................................................. 772The cp command ............................................................................... 773The rm command ............................................................................... 774The mv command .............................................................................. 775The touch command ......................................................................... 775The cat command .............................................................................. 776
Commands for Working with Packages and Services ............................. 777The service command ....................................................................... 777The yum and dnf commands ............................................................ 779
Commands for Administering Users ......................................................... 779The useradd command ..................................................................... 779The usermod command .................................................................... 781The userdel command ...................................................................... 781The chage command ......................................................................... 781The passwd command ...................................................................... 782The newusers command ................................................................... 782The groupadd command................................................................... 783The groupdel command .................................................................... 783The gpasswd command .................................................................... 783
Commands for Managing Ownership and Permissions .......................... 784The chown command ........................................................................ 784The chgrp command ......................................................................... 785The chmod command ....................................................................... 785
Networking Commands ............................................................................... 786The hostname command .................................................................. 787The ifconfig command ....................................................................... 787The netstat command ....................................................................... 788The ping command ............................................................................ 789The route command .......................................................................... 790The traceroute command ................................................................. 791
Appendix A: Directory of Useful Websites ................... 793Certification .................................................................................................. 793Hardware ...................................................................................................... 793Home and Small‐Business Networking ..................................................... 794Linux .............................................................................................................. 794Magazines ..................................................................................................... 795Microsoft ....................................................................................................... 795Network Standards Organizations ............................................................ 796
Networking All-in-One For Dummiesxxvi
Reference ...................................................................................................... 797Search ........................................................................................................... 797TCP/IP and the Internet .............................................................................. 798Wireless Networking ................................................................................... 799Smartphones ................................................................................................ 799
Appendix B: Glossary ................................................ 801
Index ....................................................................... 829
Introduction
W elcome to the sixth edition of Networking All‐in‐One For Dummies, the one networking book that’s designed to replace an entire shelf full
of the dull and tedious networking books you’d otherwise have to buy. This book contains all the basic and not‐so‐basic information you need to know to get a network up and running and to stay on top of the network as it grows, develops problems, and encounters trouble.
If you’re just getting started as a network administrator, this book is ideal. As a network administrator, you have to know about a lot of different topics: installing and configuring network hardware and software, planning a network, working with TCP/IP, securing your network, working with mobile devices, virtualizing your servers, backing up your data, managing cloud services, and many others.
You can, and probably eventually will, buy separate books on each of these topics. It won’t take long before your bookshelf is bulging with 10,000 or more pages of detailed information about every imaginable nuance of networking. But before you’re ready to tackle each of those topics in depth, you need to get a bird’s‐eye picture. This book is the ideal way to do that.
And if you already own 10,000 pages or more of network information, you may be overwhelmed by the amount of detail and wonder, “Do I really need to read 1,000 pages about Bind to set up a simple DNS server?” or “Do I really need a six‐pound book to show me how to install Linux?” Truth is, most 1,000‐page networking books have about 100 or so pages of really useful information — the kind you use every day — and about 900 pages of excruci-ating details that apply mostly to networks at places like NASA and the CIA.
The basic idea of this book is that I’ve tried to wring out the 100 or so most useful pages of information on nine different networking topics: network basics, building a network, network administration and security, trouble-shooting and disaster planning, working with TCP/IP, home networking, wireless networking, Windows server operating systems, and Linux.
So whether you’ve just been put in charge of your first network or you’re a seasoned pro, you’ve found the right book.
About This Book2
About This BookNetworking All‐in‐One For Dummies, 6th Edition, is intended to be a reference for all the great things (and maybe a few not‐so‐great things) that you may need to know when you’re setting up and managing a network. You can, of course, buy a huge 1,000‐page book on each of the networking topics cov-ered in this book. But then, who would you get to carry them home from the bookstore for you? And where would you find the shelf space to store them? In this book, you get the information you need all conveniently packaged for you in between one set of covers.
This book doesn’t pretend to be a comprehensive reference for every detail of these topics. Instead, this book shows you how to get up and running fast so that you have more time to do the things you really want to do. Designed using the easy‐to‐follow For Dummies format, this book helps you get the information you need without laboring to find it.
Networking All‐in‐One For Dummies, 6th Edition, is a big book made up of several smaller books — minibooks, if you will. Each of these minibooks covers the basics of one key element of network management, such as setting up network hardware, installing a network operating system, or troubleshooting network problems. Whenever one big thing is made up of several smaller things, confusion is always a possibility. That’s why Networking All‐in‐One For Dummies, 6th Edition, is designed to have mul-tiple access points (I hear an acronym coming on — MAP!) to help you find what you want. At the beginning of the book is a detailed table of contents that covers the entire book. Then each minibook begins with a minitable of contents that shows you at a glance what chapters are included in that mini-book. Useful running heads appear at the top of each page to point out the topic discussed on that page. And handy thumb tabs run down the side of the pages to help you find each minibook quickly. Finally, a comprehensive index lets you find information anywhere in the entire book.
This isn’t the kind of book you pick up and read from start to finish, as though it were a cheap novel. (If I ever see you reading it at the beach, I’ll kick sand in your face.) This book is more like a reference — the kind of book you can pick up, turn to just about any page, and start reading. You don’t have to memorize anything in this book. It’s a need‐to‐know book: You pick it up when you need to know something. Need to know how to set up a DHCP server in Windows? Pick up the book. Need to know how to create a user account in Linux? Pick up the book. Otherwise, put it down, and get on with your life.
Within this book, you may note that some web addresses break across two lines of text. If you’re reading this book in print and want to visit one of these web pages, simply key in the web address exactly as it’s noted in the text,