WINDOWS SERVER NOTES (Latest)
WINDOWS SERVER NOTES (Latest)
WINDOWS SERVER
Learning Outcome1.1: Choose suitable operating system features and network (server)
services
Overview
A server is a computer program that provides a service to another computer programs (and
its user).
A server operating system, also called a server OS, is an operating system specifically
designed to run on servers, which are specialized computers that operate within a
client/server architecture to serve the requests of client computers on the network.
Some common examples of server OSs include:
• Windows Server
• Red Hat Enterprise Linux
• Mac OS X Server
1
The Standard edition is designed for small-to-medium-sized organizations. It allows
you to run two instances of the server software in a virtual operating system on the
licensed server. If you need to run additional virtual instances, you can acquire
licenses that are more standard.
The Essentials edition is designed for small organizations with up to 25 users and 50
devices. It allows only one instance of the server software to be run in the physical.
The Datacenter edition is optimized for large-scale virtualization; its license allows
one server to run an unlimited number of Windows Server instance
DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request,
and IP lease acknowledgement. These stages are often abbreviated as DORA for
discovery, offer, request, and acknowledgement
➢ DNS Server : A DNS server is a computer server that contains a database of public IP
addresses and their associated hostnames, and in most cases serves to resolve, or translate,
those names to IP addresses as requested.
➢ File Services: file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access the files.
➢ Hyper-V : VM operating system. Hyper-V is the virtualization platform that is included
in Windows
Server
➢ Print Services: is a server role in Windows Server that enables you to share printers and
scanners on a network, set up print servers and scan servers, and centralize
network printer and scanner management tasks.
➢ Streaming Media Services: is transmitted by a server application and received and
displayed in real-time by a client application called a media player.
2
➢ Web Server Internet Information Server (IIS): is an extensible web server created by
Microsoft for use family. IIS supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and
NNTP.
➢ Active Directory Certificate Services: is an Active Directory tool that lets administrators
customize services in order to issue and manage public key certificates..
➢ Windows Server Update Server (WSUS): is a free add-on application offered by
Microsoft that can download and manage updates and patches for Windows Server operating
systems.
➢ Active Directory Rights Management Server: is a Microsoft Windows security tool that
provides persistent data protection by enforcing data access policies
➢ Routing and Remote Access Server, including the following sub-roles
• Licensing: A Windows Server client access license (CAL) is a license that allows
customers to access Windows Server..
• Virtualization: means to create a virtual version of a device or resource, such as a server,
storage device, network or even an operating system where the framework divides the
resource into one or more execution environments.
The Server Core installation eliminates any services and other features that are not
essential for the support of certain commonly used server roles.
Windows Server Features is something that helps a server perform its primary duty
(Windows Backup, network load balancing).
Microsoft Windows Features on Demand is a feature that allows system
administrators to add or remove roles and features in Windows 8 and Windows
Server 2012, and later versions of the client and server operating system to alter the
file size of those operating systems.
RAID configuration
3
RAID 0 (or) Striping
Striping have a excellent performance. Half of the content will be in one disk and another
half will be written to other disk
In this situation if any one of the drive fails we will loose our data, because with half of
data from one of the disk can’t use to rebuilt the raid. High Performance.
Mirroring have a good performance. Mirroring can make a copy of same data what we
have.
If any one of the disk fails in RAID 1, we can get the data from other one as there was a
copy of same content in the other disk. So there is zero data loss.
Good Performance.
Here Half of the Space will be lost in total capacity.
Full Fault Tolerance.
Rebuilt will be faster.
Writing Performance will be slow.
Reading will be good.
Can be used for operating systems and database for small scale.
RAID 5 is mostly used in enterprise levels. RAID 5 works by distributed parity method.
Parity info will be used to rebuild the data. It rebuilds from the information left on the
remaining good drives. This will protect our data from drive failure.
Assume we have 4 drives, if one drive fails and while we replace the failed drive we can
rebuild the replaced drive from equivalence information..
1. Excellent Performance
2. Reading will be extremely very good in speed.
3. Writing will be Average, slow if we won’t use a Hardware RAID Controller.
4. Rebuild from Parity information from all drives.
5. Full Fault Tolerance.
6. 1 Disk Space will be under Parity.
7. Can be used in file servers, web servers, very important backups
4
RAID 6 Two Parity Distributed Disk
RAID 6 is same as RAID 5 with two parity distributed system. Mostly used in a large
number of arrays. We need minimum 4 Drives, even if there 2 Drive fails we can rebuild the
data while replacing new drives.
Very slower than RAID 5, because it writes data to all 4 drivers at same time. Will be
average in speed while we using a Hardware RAID Controller. If we have 6 numbers of 1TB
hard-drives 4 drives will be used for data and 2 drives will be used for Parity.
Poor Performance.
Read Performance will be good.
Write Performance will be Poor if we not using a Hardware RAID Controller.
Rebuild from 2 Parity Drives.
Full Fault tolerance.
2 Disks space will be under Parity.
Can be Used in Large Arrays.
Can be use in backup purpose, video streaming, used in large scale.
RAID 10 (or) Mirror & Stripe
RAID 10 can be called as 1+0 or 0+1. This will do both works of Mirror & Striping. Mirror
will be first and stripe will be the second in RAID 10. Stripe will be the first and mirror will
be the second in RAID 01. RAID 10 is better comparing to 01.
Assume, we have 4 Number of drives. While I’m writing some data to my logical volume it
will be saved under All 4 drives using mirror and stripe methods.
If I’m writing a data “TECMINT” in RAID 10 it will save the data as follow. First “T” will
write to both disks and second “E” will write to both disk, this step will be used for all data
write. It will make a copy of every data to other disk too.
Same time it will use the RAID 0 method and write data as follow “T” will write to first disk
and “E” will write to second disk. Again “C” will write to first Disk and “M” to second disk.
Good read and write performance.
Here half of the Space will be lost in total capacity.
Fault Tolerance.
Fast rebuild from copying data.
Can be used in Database storage for high performance and availability
Operating system
Operating system Your existing physical or virtual target server can have any of the
following Windows operating system editions.
5
• Windows Server 2008 or 2008 R2
• Windows Server 2012 or 2012 R2.
System memory The minimum system memory on each server should be 1 GB. The
recommended amount for each server is 2 GB.
Disk space for program files This is the amount of disk space needed for the
Double-Take program files. For Windows 2012, this is approximately 300 MB. For
Windows 2008, this is approximately 375 MB.
Disk space for data files—This is the amount of disk space needed for the source
data files. This will be dependent on the applications you are running and the amount
of data files you have.
Server name. Your server name must still be in ASCII format. If you have the need
to use a server's fully-qualified domain name, your server cannot start with a numeric
character because that will be interpreted as an IP address.
If you are using IPv6 on your servers, your clients must be run from an IPv6
capable machine.
Cloud: "The cloud" refers to servers that are accessed over the Internet, and the
software and databases that run on those servers. Supported configurations
Windows Server Backup (WSB) is a feature that provides backup and recovery options for
Windows server environments.
6
- A full server,
-The system state(Windows system files,)
- Selected storage volumes or specific files or folders, as long as the data volume is less
than 2 terabytes
You can use the Backup Schedule Wizard in Windows Server Backup to schedule backups
that run automatically once or more per day.
An automatic backup will make backing up your information much easier. It eliminates
human error.
You can schedule automatic backups of the data on your company's computers. This can be
done with both an external hard drive and an offsite server.
You can use the Backup Once Wizard in Windows Server Backup to create single
backups of your computer.
You can also create one-time backups using the Wbadmin start backup or
Wbadmin start system state backup commands or the Windows Power Shell
cmdlets for Windows Server Backup.
Catalog Recovery Wizard in Windows Server Backup. This wizard helps you
recover the backup catalog, a file that stores details about your backups. This
wizard is only available if your backup catalog has become corrupted.
7
Windows Server Backup 2012 tools installation
To access backup and recovery tools, you must install the Windows Server Backup
Features and subordinate items that are available in the Add Features Wizard in Server
Manager.
8
Click Next.
Select Install
Types of backup
a. Full backups
A full backup is exactly what the name implies; It is a full copy of your entire data set.
9
Although full backups arguably provide the best protection, most organizations only use
them on a periodic basis because they are time-consuming and often require a lot of disk or
tape capacity.
Because not every organization has the time or storage space for frequent full backups,
other types are often necessary.
b. Incremental backups
Incremental backups only back up the data that has changed since the previous backup.
For example, suppose that you created a full back up on Monday and used incremental
backups for the rest of the week.
Tuesday's scheduled backup would only contain the data that has changed since Monday.
Wednesday's backup would only contain the data that has changed since Tuesday, and so
on.
Incremental backups were introduced as a way to decrease the amount of time and storage
space that it takes to do a full backup.
c. Differential backups
A differential backup is similar to an incremental backup.
The difference is that while an incremental backup only includes the data that has changed
since the previous backup, a differential backup contains all of the data that has changed
since the last full backup.
d. Local back-up
Local backup is probably familiar to many. It simply refers to back up that is stored at close
proximity. In most cases of local backup, the storage device is connected directly to the
source or through a network.
e. Offsite backup
Provided that the backup is stored in a geographically separate location, the type of backup
is offsite.
10
And yes, the backup may be done locally and stored in an external hard disk.
If the storage medium is taken to a different location, then it is an offsite backup.
It could mean that you have taken the drive home, to your safe deposit box and to another
building.
f. Cloud backup
The location of cloud backup is online servers. It is one of the most effective and preferred
types of backup. Cloud backup can be accessed from anywhere even in the most remote of
places. All that you will be expected to have are login credentials.
g. File Transfer Protocol (FTP) backup
What is basically means is that the backup operation is done through a file transfer protocol
and the data is stored in an FTP server through the internet.
h. Mirror Backup
Mirror backups are as the name suggests a mirror of the source being backed up. With
mirror backups, when a file in the source is deleted, that file is eventually also deleted in the
mirror backup
k. Remote Backup
Remote backups are a form of offsite backup with a difference being that you can access,
restore or administer the backups while located at your source location or other location.
11
After you have installed your windows server backup to backup your server follow the
following steps. You have to connect a backup media or device before doing the steps below
Server manager
Administration tools
Windows server backup
Backup once (if it is a manual backup) or backup scheduler (if you want automatic
backup)
Next
Full server backup
Next
Specify the time if it is a scheduler backup
Specify the destination disk(Hard disk)
Next
Wait until the backup will be successifull
Finish or close
Homework: Write steps to schedule some selected items of a server (steps to schedule
incremental backup)on windows server 2012.
The Windows Server Backup Microsoft Management Console (MMC) snap-in contains the
following wizards to help you schedule and create backups, and perform recoveries:
Backup Schedule Wizard
Backup Once
Wizard Recovery Wizard
Catalog Recovery Wizard
o Optimizing of Backup and Server Performance
You can use the Optimize Backup Performance dialog box to improve the
performance of backups for full volumes, which can improve server performance.
you can use the backups you have created with Windows Server Backup to recover your
operating system, system state, volumes, applications and application data, backup catalog,
and local files and folders.
12
Recovery Wizard (in Windows Server Files, folders, volumes, system state,
Backup) applications, and application data
Windows Setup disc or a separate installation Operating system (critical volumes)
of the Windows Recovery Environment and full server (all volumes)
Catalog Recovery Wizard (in Windows Backup catalog
Server Backup)
Is completely free software that can be used to manually or automatically back up the
important
data on your computer hard drive to somewhere safe like a disc, flash drive, network drive,
etc.
Learning Outcome 2.1: Install network operating system (NOS) and update the NOS
with all required patches.
Installation Methods
Microsoft distributes Windows Server 2012 on optical media and in an .iso (ISO) image
format. ISO format is becoming more common as organizations acquire software over the
Internet rather than by obtaining physical removable media.
You can install Windows Server 2012 by using a variety of methods, including the
following:
Optical Media
Advantages include:
13
Disadvantages include:
USB Media
o Advantages include:
All computers with USB drives allow boot from USB media.
The image can be updated as new software updates and drivers become available.
The answer file can be stored on a USB drive, minimizing the amount of interaction
that the administrator must perform.
o Disadvantages include:
Requires the administrator to perform special steps to prepare USB media from an
ISO file.
Mounted ISO image o Advantages include:
With virtualization software, you can mount the ISO image directly and install
Windows Server 2012 on the virtual machine.
Network Share
o Advantages include:
It is possible to boot a server off a boot device (DVD or USB drive) and install from
installation files that are hosted on a network share.
o Disadvantages include: This method is much slower than using Windows Deployment
Services.
You can deploy Windows Server 2012 from .wim image files or specially prepared virtual
hard disk
(.vhd) files.
You can use the Windows® Automated Installation Kit (AIK) to configure lite-touch
deployment.
Deployment Services server, and the operating system image is transmitted to the
server over the network.
14
Installation Types
The three types are as follows:
1. Clean installation: one where there is no existing operating system on the computer or
you do not want to preserve the existing installation.
The biggest advantage of a clean installation is knowing that nothing remains from a
previous installation, leading to improved performance and stability..
2. Upgrade installation: one in which Windows server is installed over a previous version of
Windows. The biggest advantage of an upgrade is that you can retain application installations
and user settings.
However, this can also be a disadvantage if you would be better off without these
applications and settings.
3.Multiple boot installation: one in which several operating systems are installed on the
same computer and the user can choose which operating system to boot during system
startup.
Server migration is a technique in which data is positioned from one server to another. The
reasons behind server migration are security concerns, equipment is being replaced and many
other factors.
15
Hardware requirement for windows server 2012 R2
1- Insert the Windows Server 2012 DVD, and once you get the following message press
Enter to boot from the setup
16
2- Wait for a while till the setup loads all necessary files (Depending on your machine, it will
take couple of minutes)
3- Once the setup files are loaded, the setup will start with the following screen. You can
change these to meet your needs (the default values should be fine for now)
17
4- Once you click Next, you can start the installation, click "Install now"
5- You will see the following screen, wait until it finishes loading
18
6- In the following setup screen, you will see four options. Select Windows Server 2012
DataCenter Evaluation (Server With GUI=Full installation).
7- After you click Next from previous screen, Read the License terms, tick the "I accept the
license terms" and click Next
19
8-Click Custom: Install Windows only (advanced)
9- Now It will ask you for the drive (or partition) you want to install Windows on. Here I'm
installing it on the one partition I have here. NOTE: This will remove the content of the
partition. Either you create a partition to install windows on, or you can test this on a testing
machine
20
10- Now once we picked our partition, clicking on next from previous screen will start the
setup. This process might take a while.
11- Once the setup is done, it will restart and start your Windows Server 2012 for the first
time. It will set up a password for the Administrator user ask you then to
21
12- The setup will finalize your settings, might take a couple of minutes
13- Once the setup is done, you can log in for the first time to your Windows Server, as the
screen says, press Ctrl+Alt+Delete to log in, and use the password you set in the setup
process
22
14 - once you log in, windows server 2012 will show the server manager
For this we launch Server Manager and on the dashboard select Manage and choose Add
Roles & Feature.
Data migration is simply the process of moving data from a source system to a target
system.
Companies have many different reasons for migrating data. You may want to migrate
data when you acquire another company and you need to integrate that company’s data
.
There are three primary types of data migration tools to consider when migrating your
data:
23
On-premise tools. Designed to migrate data within the network of a large or medium
Enterprise installation.
Open Source tools. Community-supported and developed data migration tools that can
be free or very low cost.
Cloud-based tools. Designed to move data to the cloud from various sources and
streams, including on- premise and cloud-based data stores, applications, services, etc.
The biggest difference between On-premise tools and Cloud-based tools systems is
how they are deployed. Cloud-based software is hosted on the vendor's servers and
accessed through a web browser. On-premise software is installed locally, on a
company's own computers and servers
Here are a few questions to help you choose the right tool for you.
Location. Do you want to migrate data on-premise (in the same environment)? Or, do you
want to move data from on-premise to the cloud? Or from one cloud store to another cloud
store?
Cost. Using open source tools can be free or significantly cheaper than commercial solutions,
assuming you have the right expertise in place. Using a cloud-based data migration tool can
save you significantly on infrastructure and manpower costs, freeing up resources for other
projects.
Data model. Do you need to change your data model? You may be moving from an on-
premise data warehouse to a cloud-based data warehouse.
Data transformation. Because you will be adding or changing data sources. All migration
tools can transform data, but cloud- based systems tend to be the most flexible, supporting
the widest range of data types.
Click Next
25
Click Install
26
Learning Outcome 2.2: Post-Install and Configure the Server
27
Click Network and Sharing Center.
28
Right-click the network connection and select Properties.
29
Highlight Internet Protocol Version 4 (TCP/IPv4) and click Properties
30
The Internet Protocol Version 4 (TCP/IPv4) Properties screen appears
31
The Internet Protocol Version 4 (TCP/IPv4) Properties screen appears.
IP Address: Pick an address within the same subnet as the router. For example, if your
router is
192.168.8.1 (subnet 255.255.255.0), you could go with anything between 192.168.8.2 and
192.168.8.255
Subnet Mask: This would be the same as your router, probably 255.255.255.0.
Preferred DNS: You can either enter a DNS server's IP address, if you know it, or simply
enter your router's IP address.
32
a. Using GUI
vii. In the Computer name field, type the new computer name you want your server to
have and click OK
33
b. Rename Windows Server 2016 from Powershell
Open Powershell with Administrator privileges. Here, we will use the Rename-Computer
cmdlet that will have the following format.
That is, in our case, it will be something like that. Rename-Computer -NewName SRV01 -
Restart
Join a domain
What is Domain?
Is a collection of computers & servers that are part of the same centralized database in
general, a domain is an area of control.
One or more servers known as domain controllers have control over the domain and
the computers on it.
Domains are generally made up of computers on the same local network. However,
computers
joined to a domain can continue communicating with their domain controller over
VPN or
34
Internet connection. This allows businesses and schools to remotely manage laptops
they provide to their employees and students.
In a domain:
2. Network administrators use servers to control the security and permissions for all
computers on the domain.
3.This makes it easy to make changes because the changes are automatically made to all
computers.
4. If you have a user account on the domain, you can log on to any computer on the domain
without needing an account on that computer.
1. All computers are peers; no computer has control over another computer.
2 .Each computer has a set of user accounts.
3. To use any computer in the workgroup, you must have an account on that computer..
4. All computers must be on the same local network or subnet.
Many domains are available like: Single Domain, Parent Domain, Child Domain,
Domain tree, and Forest domain.
35
Parent domain - One domain above another in a domain tree.
Child domain - One domain below another in a domain tree. The child inherits the domain
name of its parent in a DNS hierarchical naming convention. Example:
"sales.cohowinery.com
A domain tree exists when one domain is the child of another domain that we called Domain
tree. A domain tree must have a contiguous names rate.
A child domain name always includes the complete parent domainname. A child domain
and its parent share a two-way transitive trust.
36
A forest is a collection of trees that don’t necessarily form a contiguous namespace
(although
each tree must be closest)
click System.
Under Computer name, domain, and workgroup settings, click Change settings.
37
Importance of Correct Computer Date & Time
1. Scheduled Tasks
An incorrectly set computer clock effectively prevents your system from knowing when to
do its work.
2. File Information
Your computer uses its system clock to apply a date and time stamp to every file you
create and edit, including the documents you save from your applications and the email
messages you send or receive.
If your computer clock strays too far from the correct time, software that relies on Internet-
based authorization schemes and Web-based services that require access information may
reject your attempts to use these resources.
4. Set time, date, and time zone settings from the graphical interface
The process is very simple. Right-click the time field in the lower right corner and then click
the Adjust date/time option
In the settings window, you can change the time, date, and time zones of each Windows
Server. I do not think there is a need for further guidance as it is a simple process.
38
Add roles and features
A server role is a set of software programs that, when they are installed and properly
configured, lets a computer perform a specific function for multiple users or other computers
within a network.
2.They supply users during an organization access to resources managed by other computers,
such as Web sites, printers, or files that are stored on different computers.
3. They typically include their own databases that can line user or computer requests, or
record information about network users and computers that relates to the role.
39
4.Role services
Role services are software programs that provide the functionality of a role. When you install
a role, you can choose which role services the role provides for other users and computers in
your enterprise.
Installing the role means installing one or more of its role services.
5.Features
Features are software programs that, although they are not directly parts of roles, can
support or augment the functionality of one or more roles, or improve the functionality of the
server, regardless of which roles are installed.
Remote Desktop Services (RDS), is one of the components of Microsoft Windows that
allow a user to take control of a remote computer or virtual machine over a network
connection.
Types of Firewalls
There are many different types of firewall you can implement in order to control various
activities in different places and operating systems.
A. Host-based firewall.
This type of firewall runs on individual systems, physical or virtual.
It is a piece of software installed on an operating system which stands between the host and
other network devices.
Same as any other firewall, it controls and filters incoming and outgoing network traffic, but
only for a single host.
40
The benefit of this type
B. Network-based firewalls.
These are network devices built into the IT infrastructure and they stand between
public and internal networks.
Most modern routers have this firewall built into them and it can range from basic to
a firewall with advanced security settings.
The benefit is that every network device behind it is protected, not only a single host.
Step 1
Open your firewall, you will see the firewall overview, this shows what the current settings
are for each profile (Domain, Private and Public).
Domain
Traffic to and from a network on which it can detect a domain controller of the
domain to which the computer is joined.
Private
Traffic to and from the local server or the local network to which it is attached.
Public
Traffic to and from non-local sources such as the World Wide Web.
Step2 2
To check your Inbound or Outbound rules select either one from the left hand pane.
41
Rules with a green tick next to them are active, if they are greyed out this means they are
inactive rules.An inactive rule does not mean that a service is blocked.
Reduced maintenance: Because the Server Core installation option installs only
what is required to have a manageable server less maintenance is required than a full
Windows Server installation with a graphical interface.
Reduced attack surface: Because Server Core installations are minimal, there are
fewer applications running on the server, which decreases the attack surface.
Less disk space required: A Server Core installation requires only about 1 GB of
disk space to install and approximately 2 GB for operations after the installation
42
Active Directory Domain Services (AD DS)
DHCP Server
DNS Server
File Services
Print Services
1. Step 1: Click Start, All Programs, Accessories. Right-click Command Prompt and
choose Run As Administrator.
2. Enter your administrator password.
3. Step 2: Type the following command and press Enter: slmgr -rearm (note the space
after slmgr and the hyphen in front of rearm.)
4. Step 3: Restart Windows
Note: You can rearm the period 6 times. (180 days * 6 = 3 years). When the period comes
to an end, run slmgr -rearm to extend it by another 180 days.
43
ate Windows Server 2012, either offline by calling Microsoft Call Center or online by activating Windows through Internet.
ver 2012, you are given a grace period to test it and then to activate it. As you can see, the wallpaper of Windows Server 201
44
45
Learning unit 3 : Configure and administer the server
Microsoft Windows Server Event Viewer is a monitoring tool that shows a log
of events that can be used to troubleshoot issues on a Windows-based system. ...
The event log displays information such as the source or the software or service that
generated the log event, the event ID and the level or severity of the event.
46
8. New Device Attachment.
9. New Processes or Services Created
10. Powershell Logging
Overview of AD DS
Active Directory (AD) is a Microsoft technology used to manage computers and other
devices on a network. As a network grows, Active Directory provides a way to organize a
large number of users into logical groups and subgroups, while providing access control at
each level
Domain Services: Stores data and manages communications between the users and
the DC. This is the primary functionality of AD DS.
Certificate Services: Allows your DC to serve digital certificates, signatures, and
public key cryptography.
Lightweight Directory Services: Supports LDAP for cross platform domain
services, like any Linux computers in your network.
Directory Federation Services: Provides SSO authentication for multiple
applications in the same session, so users don’t have to keep providing the same
credentials.
Rights Management: Controls information rights and data access policies. For
example, Rights.
47
Domain Controllers (DC) are the servers in your network that host AD DS.
It is a server on a Microsoft Windows or Windows NT network that is responsible
for allowing host access to Windows domain resources.
DCs respond to authentication requests and store AD DS data.
DCs host other services that are complementary to AD DS as well. Those are:
The domain controller keeps all of that data organized and secured.
1. Server Manager
2. Manage
48
5. select the server from the server pool
All server need static Ip address if it hasn’t it you have to set it.
7 .Next
9. Add features
10. Next
11. Next
12. Restart destination server automatically
13. Install
14 .Promote this server to a domain controller
15. Add a new forest
16. Root domain name E g: giheketvet.com
20. Next
21. Next
22. Next
23. Next
24. Install
25. Close
1. Tools
2. Active Directory user and computers
3. GIHEKETVET.COM expand it
4. Users
5. Right click users
49
6. New
7. Users
8. First name eg: L5NET
9. User logon name L5NET
11. Next
12. Password: GIHEKE@12
13. Confirm password: GIHEKE@12
16.Next
17. Finish
50
9. OK
13. Username
51
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (that is, a
scope) configured for a given network.
DHCP Server is a network server that automatically provides and assigns IP addresses,
default
gateways and other network parameters to client devices.
The DHCP lease generation process is the process by which the DHCP client
receives IP addressing configuration data from the DHCP server
D O R A process. It’s
very simple and easy to understand. Let’s see how this DHCP Lease generation process
works.
D- Discover
O- Offer
R- Request
A- Acknowledge
Discover
OFFER
2. On Receiving DHCP Discover, Server sends a DHCP OFFER message to the client. The
DHCPOFFER is a proposed configuration that may include IP address, DNS server
52
address, and lease time. This message will be unicast and have the destination mac address
of DHCP client's mac address. The source mac address will be that of the DHCP
server.[S.Mac - Mac address of Server , D.Mac - Mac address of Host]
REQUEST
3. If the Client finds the Offer agreeable, it sends DHCP REQUEST Message requesting
those particular IP parameters. This message will be a Broadcast message. [Source Mac -
Mac address of Host, Destination Mac - FF:FF:FF:FF:FF:FF]
ACKNOWLEDGMENT
4. The Server on receiving the DHCP REQUEST makes the configuration official by sending
a unicast DHCP acknowledgment [Source Mac - Mac address of Server, Destination Mac -
Mac address of Host]
• IP address
• Subnet mask
• Default gateway
• Domain Name Server
• WINS information
DHCP Scope
A DHCP scope is a collection of IP address settings that are configured for devices such as a
computer to use. You can create multiple scopes for different device types and subnets. For
example, I have a scope for computers and different scopes for IP phones.
When you setup a scope, you will need to configure the following:
Scope name – This is the name of the scope. Give it a descriptive name so it is easy
to identify which devices it is for.
IP address range – This is the IP range that you want the devices to use. For
example
10.2.2.0/24
IP address exclusions – You can specify to exclude IP address from the scope. This
is useful if
you have devices on the subnet that need a static IP like a router or server.
53
Lease duration – The lease specifies how long a client has an IP address before
returning it to the pool.
DHCP options – There are a number of different options you can include when
DHCP assigns an IP address. More on this below
DHCP options
There are many DCHP options, below are the most commonly used options in a
Windows domain.
Super scopes
A super scope is a collection of individual DHCP scopes. This can be used when you
want to join to scopes together. Honestly, I’ve never used this.
Split Scopes
This is a method of providing fault tolerance for a DHCP scope. Using DHCP
failover is not thepreferred method for fault tolerance.
DHCP Failover: DCHP failover was a new feature starting in server version 2012. It
allows two DHCP servers to share lease information providing high availability for
DCHP services. If one server becomes unavailable the other server takes over.
DHCP INSTALLATION
1. Manage
2. Add role and feature
3. Next
4. Next
5. Next
6. Next
7. Next
8. Next
9. Restart
10. Install
11. Complete DHCP configuration
54
12. Next
13. Commit
14. Close
Configuring of DHCP
Tools
DHCP
Click IPV4
New scope
Next
Next
Add
Next
Lease duration
0 24 0
h
Next
Yes
55
Router default gataway
IP address 192.168.8.1
Next
Next
Finish
Note: To view the IP address which the DHCP has given to the computer Expand IPV4
and Scope, Address scope
Notice that the server node and scope node still has a red arrow pointing down. These
red arrows pointing down mean that the server and scope are not “turned on”.
The concept of “turning on” the scope is called “activating” and the concept of
“turning on” the server for DHCP service is called “authorizing”.
The DHCP database is a dynamic database that is updated when DHCP clients are assigned
or as they release their Transmission Control Protocol/Internet Protocol (TCP/IP) address
leases. The DHCP database contains the DHCP configuration data (such as information
about scopes, reservations, options, leases, etc.).
Managing a DHCP server database involves backing up the database, restoring the database
and reconciling the database. You can do all of these from within the DHCP manager by
right-clicking on the DHCP server (see below) or they can be done from the command line.
56
Backing up the database manually is as simple as right-clicking on the server and selecting
backup. You will be prompted for the location for storing the backup file. The default is
\windows\system32\dhcp\backup.
Restoring the DHCP database is as straightforward as backing it up. If the DHCP server is
already running, you need to stop the DHCP Server Service, restore the database and then
restart the DHCP Server Service.
The DHCP server role is responsible for dynamically assigning IP addresses to DHCP
clients, and for assigning additional TCP/IP configuration information to DHCP clients as
well. This includes subnet mask information, default gateway IP addresses, Domain Name
System (DNS) server IP addresses, and Windows Internet Naming Service (WINS) server IP
addresses.
57
The common threats to DHCP servers are listed here:
2. An unauthorized user could use a rogue DHCP server to provide incorrect IP addresses to
your DHCP clients.
3. Assigning DNS IP addresses and WINS IP addresses through the DHCP server increases
the likelihood of an unauthorized user accessing this information and then using it to attack
your DNS servers and WINS servers
Before installing and configuring DNS on our server we have to perform some
preliminary tasks. Specifically, we have to configure the server with a static IP address
and a DNS suffix. The suffix will be used to fully-qualify the server name. To begin:
1. Go to Start > Control Panel > Network and sharing center , Change adapter
settings right-click Local Area Connection or Ethernet and choose Properties .
2. When the Local Area Connection Properties window comes up, select Internet
Protocol (TCP/IP) and click Properties . When the Internet Protocol (TCP/IP) window
58
comes up, enter an IP address , subnet mask and default gateway IP addresses that are
all compatible with your LAN.
5. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This tells the
server to
use its own DNS server service for name resolution, rather than using a separate
server. After filling out those fields , click the Advanced button.
4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter
firewall.test on the DNS suffix for this connection text field, check Register this
connection's address in DNS , check Use this connection's DNS suffix in DNS
registration , and click OK , OK , and then Close:
59
Now that we have configured our server with a static IP address and a DNS suffix.
Tools
DNS
Expand the Name of the server: eg: giheke ( This is the name that you have given your
server=computer name of the server)
Click zone
Next
Primary zone
Next
60
To all server
Next
Next
Finish
New host
Name:www
Done then
New Zone
Next
Primary zone
Next
Next
IPV4
Network IP: 192.168.8 (here you write ony 3 numbers separated by dot)
Next
Finish
61
New pointer(PTR)
HostName:www.giheketvet.com
Primary zone: Creates a copy of a zone that can be updated directly on this server. This zone
information is stored in.dns text file.
Secondary zone: A standard secondary zone copies all of the information from its master
DNS server. A master DNS server can be an Active Directory, primary, or secondary zone
that is configured for zone transfers. Note that you cannot modify the zone data on a
secondary DNS server. All of its data is copied from its master DNS server.
Stub zone: A Stub zone contains only those resource records that are necessary to identify
the authoritative DNS servers for that zone. Those resource records include Name Server
(NS), Start of Authority (SOA), and possibly glue Host (A) records.
Note: The name of the zone must be the same as the name of the Active Directory-based
domain, or be a logical DNS container for that name. For example, if the Active Directory-
based domain is named"support.microsoft.com", valid zone names are
"support.microsoft.com" only
A forward lookup zone is a DNS zone in which hostname to IP address relations are stored.
When a computer asks the IP address of a specific hostname, the forward lookup zone is
checked and the desired result is returned
62
Learning Outcome 3.3: Configure the server roles and features : file and share access
services
click Copy
Click OK.
Shadow Copy (also known as Volume Snapshot Service, Volume Shadow Copy Service or
VSS)
is a technology included in Microsoft Windows that allows taking manual or automatic
backup copies or snapshots of computer files or volumes, even when they are in use.
2. Click Start,
3. right-click My Computer,
63
4. and then click Manage.
Right-click Shared Folders point to All Tasks,
5. Click Configure Shadow Copies.
In the Select a volume list, click the drive that contains the file share resource that
you want to create a shadow copy for. For example, click drive R.
6. Click Settings, and then click the destination drive for the shadow copy in the
Located on this volume list.
7. click No limit.
8. Click OK, and then click Enable.
9. Click Yes to enable shadow copies.
Work Folders is a feature in Windows Server 2012 R2 that allows Windows users to store
and access work files on personal PCs and Windows devices as well as corporate PCs.
Work Folders can be deployed alongside existing deployments of Folder Redirection, Offline
Files and home folders.
A print server is a computer that can process print-related jobs on a network of computers.
Print servers are connected to a computer network in order to serve the need for printing jobs
in a network that may contain more than one printer
Open Server Manager, by clicking on the Start button and selecting Server Manager
Click on Dashboard,
Next.
Next.
Print and Document Services
Next
64
Next
Next.
Select the Print Server and Internet Printing options from Role Services.
Install
When the Print Server role has been installed, you can access the Print Management
console from the tools tab on Server Manager.
Monitoring of Server
CPU Usage
Task Manager: This tab provides details about processor usage such as Name, PID,
Description, Status, Threads, CPU, and Average CPU.
Use the Performance tab in Task Manager to view how your computer's central processing
unit (CPU) is
65
being used by Windows and other programs running on your computer
1. Open Task Manager
Hard drive
A hard disk drive (sometimes abbreviated as hard drive, HD, or HDD) is a non-volatile
memory hardware device that permanently stores and retrieves data on a computer.
Non-volatile means data is retained when the computer is turned off. A hard drive is also
known as a hard disk drive.
Memory Consumption
The lower graph on the left side of the window shows the Page File usage. This value will
increase along with your RAM usage.
66
If your Available Physical Memory value is very low, you may also notice your Page File
increasing
I/O Network
Network monitoring is a critical IT process where all networking components like routers,
switches, firewalls, servers, and VMs are monitored for fault and performance and evaluated
continuously to maintain and optimize their availability.
.
So why is it important to monitor networks?
The network is the life line of the IT infrastructure. When networks fail, the flow of
information required by applications and business operations .Network Admins are
continually asked to add new users,technologies and applications to their networks. These
changes can impact their ability to deliver consistent, expected network performance.
Response Time
If your server response time is slow, then your whole site will be slow, no matter how
optimized
your other resources are. According to Google and other speed test tools such as GTmetrix,
you
should aim for a server response time of less than 200ms.
Why Monitor Response Time?
1) If a webpage is slow the experience for the visitor is usually bad. Many users simply leave
a site if it doesn't respond within a few seconds.
2) When a site has a high response time it is usually an indication that the server is
struggling.
Slow response times are really common when servers are overloaded, and the information
can be used to identify server problems or to explain that there is a problem when contacting
a web host.
3) Slow response times and high levels of downtime are linked. A site that has a high
response time is more likely to suffer from downtime than a site that is running quickly.
Learning Outcome 4.4: install, configure and maintain the antivirus for the proper
67
protection of the systems
68