Networking All-in-One For Dummies
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Doug Lowe. Networking All-in-One For Dummies
Networking All-in-One For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Networking All-in-One For Dummies Cheat Sheet” in the Search box. Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Getting Started with Networking. Contents at a Glance
Welcome to Networking
Defining a Network
Delving into Network Lingo
Why Bother with a Network?
Accessing the Internet
Sharing files
Sharing resources
Sharing programs
Servers and Clients
Dedicated Servers and Peers
What Makes a Network Tick?
Putting the Pieces Together
Networks Big and Small
It’s Not a Personal Computer Anymore!
The Network Administrator
Network Infrastructure
Introducing Infrastructure
Understanding Network Protocols and Standards
Recognizing Network Topology
Bus topology
Star topology
Expanding stars
Ring topology
Mesh topology
Considering Cable
Twisted-pair cable
RJ45 connectors
Patch panels and patch cables
Repeaters and hubs
Switches
Perusing Ports, Interfaces, and MAC Addresses
Pondering Packets
Contemplating Collisions
Dealing with Broadcast Packets
Examining Wireless Networks
Switches, Routers, and VLANs
Understanding Switches
Learning
Forwarding
Flooding
Looking Deeper into Switches
Collision domains
Bridging
SFP ports and uplinks
Broadcast domains
Managed and unmanaged switches
Understanding Routers
Network address translation
Virtual private network
Understanding VLANs
Cybersecurity
But We’re a Small Business — Do We Need Security?
The Two Pillars of Cybersecurity
Prevention
Recovery
Cybersecurity Frameworks
The NIST Cybersecurity Framework
Servers and Virtualization
Understanding Network Operating Systems
Network services
File-sharing services
Multitasking
Directory services
Security services
What’s Important in a Server
Scalability
Reliability
Availability
Service and support
Components of a Server Computer
Motherboard
Processor
Memory
Hard drives
Network interfaces
Video
Power supply
Considering Server Form Factors
Tower case
Rack mount
Blade servers
SAVING SPACE WITH A KVM SWITCH
Considering Virtualization
Cloud Computing
Introducing Cloud Computing
Looking at the Benefits of Cloud Computing
Detailing the Drawbacks of Cloud Computing
Examining Three Basic Kinds of Cloud Services
Applications
Platforms
Infrastructure
Public Clouds versus Private Clouds
Introducing Some of the Major Cloud Providers
Amazon
Microsoft
Getting Into the Cloud
Understanding Network Protocols. Contents at a Glance
Network Protocols and Standards
Understanding Protocols
Understanding Standards
Seeing the Seven Layers of the OSI Reference Model
The physical layer
The data link layer
The network layer
CSMA/CD IS A MOUTHFUL!
Logical addressing
Routing
The transport layer
The session layer
The presentation layer
The application layer
Following a Packet through the Layers
The Ethernet Protocol
Standard Ethernet
Fast Ethernet
Gigabit Ethernet
Beyond gigabit
The TCP/IP Protocol Suite
10BASE WHAT?
IP
TCP
UDP
THE FASCINATING STORY OF TCP/IP
Other Protocols Worth Knowing About
TCP/IP and the Internet
What Is the Internet?
A Little Internet History
TCP/IP Standards and RFCs
The TCP/IP Protocol Framework
Network interface layer
Network layer
Transport layer
Application layer
IP Addresses
Understanding Binary
Counting by ones
Doing the logic thing
Working with the binary Windows Calculator
Introducing IP Addresses
Networks and hosts
The dotted-decimal dance
Classifying IP Addresses
WHAT ABOUT IPv6?
Class A addresses
Class B addresses
Class C addresses
Subnetting
Subnets
Subnet masks
Network prefix notation
Default subnets
The great subnet roundup
IP block parties
Private and public addresses
Pondering Ports
Understanding Network Address Translation
Routing
Considering the Usefulness of Routers
Connecting to the Internet
Connecting remote locations
Splitting up large networks
Understanding Routing Tables
DHCP
Understanding DHCP
Configuration information provided by DHCP
DHCP servers
How DHCP actually works
Understanding Scopes
Scopes, subnets, and VLANs
Feeling excluded?
Reservations suggested
WHAT ABOUT BootP?
How long to lease?
Working with a DHCP Server
Installing a Windows Server 2019 DHCP server
Configuring a new scope
How to Configure a Windows DHCP Client
Automatic private IP addressing
Renewing and releasing leases
DNS
Understanding DNS Names
Domains and domain names
Fully qualified domain names
DNS AND URLs
Top-Level Domains
Generic domains
Geographic domains
The Hosts File
Understanding DNS Servers and Zones
Zones
THE OLD PHONY HOSTS FILE TRICK
Primary and secondary servers
Root servers
Caching
Understanding DNS Queries
A real-life DNS example
Zone Files and Resource Records
SOA records
NS records
A records
CNAME records
PTR records
MX records
Reverse Lookup Zones
Working with the Windows DNS Server
Creating a new zone
Creating a new host record
How to Configure a Windows DNS Client
TCP/IP Tools and Commands
Using the arp Command
Using the hostname Command
Using the ipconfig Command
Displaying basic IP configuration
Displaying detailed configuration information
Renewing an IP lease
Releasing an IP lease
Flushing the local DNS cache
Using the nbtstat Command
Using the netstat Command
Displaying connections
Displaying interface statistics
Using the nslookup Command
Looking up an IP address
Using nslookup subcommands
GET ME OUT OF HERE!
Displaying DNS records
Locating the mail server for an email address
Taking a ride through DNS-Land
Using the pathping Command
Using the ping Command
Using the route Command
Displaying the routing table
Modifying the routing table
Using the tracert Command
UNDERSTANDING HOW TRACERT WORKS
Planning a Network. Contents at a Glance
Local Area Networks
Making a Network Plan
Being Purposeful
Taking Stock
What you need to know
Programs that gather information for you
Considering Cable
Surmising Switches
Planning the Network Topology
Planning the TCP/IP Implementation
Drawing Diagrams
More Questions Your Network Plan Should Address
Wide Area Networks
Connecting to the Internet
Connecting with cable or DSL
Connecting with T1 lines
Connecting with fiber
Connecting with a cellular network
Choosing a Router
Choosing a small office router
Choosing an enterprise router
Choosing a cellular router
Securing Your Connection with a Firewall
Providing Redundancy for Your Internet Connection
Securing Connections to Remote Locations and Remote Users
Connecting Remote Offices with an Ethernet Private Line
Server Architecture
Deciding How Many Servers You Need
Deciding Which Servers You Need
Domain controllers
DHCP servers
Mail servers
File servers
Print servers
Web servers
Database servers
Application servers
Backup servers
License servers
Deployment servers
Update servers
Virtualization management platform
Connecting Your Servers
Virtualization Architecture
Understanding Virtualization
Understanding Hypervisors
Understanding Virtual Disks
Understanding Network Virtualization
Considering the Benefits of Virtualization
Choosing Virtualization Hosts
Understanding Windows Server 2019 Licensing
Storage Architecture
Planning Disk Capacity
Considering Disk Drive Types
Hard disk drives
Solid state drives
FORM FACTORS
Considering Drive Interfaces
SATA
SAS
Considering RAID
RAID 10
RAID 5
RAID 6
Considering Attachment Types
Direct attached storage
Storage area networks
Network-attached storage
Backup Architecture
Backup Basics
Considering Three Basic Types of Backup
Where to Back Up Your Data
Backing Up to Tape
Looking closer at LTO
Hardware for tape backup
A word about tape reliability
About cleaning the heads
Backing Up to NAS
Using a Backup Appliance
Understanding File-Based Backup
Types of file-based backups
Normal backups
Copy backups
Daily backups
Incremental backups
Differential backups
Understanding Image-Based Backups and Virtualization
Backup Security
Hyperconverged Infrastructure
Considering the Headaches of Traditional IT Architecture
Defining Hyperconverged Infrastructure
Discerning Deduplication
Understanding How Deduplication Works
HASHING FOR FUN AND PROFIT
Considering Backup
Digging into HCI Clusters
Incorporating HCI Into Your Plan
Implementing a Network. Contents at a Glance
Network Hardware
Working with Cable
Cable categories
CAT GOT YOUR TONGUE?
What’s with the pairs?
To shield or not to shield
When to use plenum cable
PLENUM SPACE
Sometimes solid, sometimes stranded
Installation guidelines
Getting the tools that you need
Pinouts for twisted-pair cables
Attaching RJ-45 connectors
Wall jacks and patch panels
Server rooms and distribution frames
Installing Switches
Wireless Networks
Installing a Wireless Access Point
Configuring a Wireless Access Point
Basic configuration options
DHCP configuration
Connecting to a Wireless Network
Paying Attention to Wireless Network Security
Understanding wireless security threats
Intruders
Freeloaders
Eavesdroppers
Spoilers
Rogue access points
Securing your wireless network
Changing the password
Securing the SSID
Enabling WEP
Using WPA and WPA2
Using MAC address filtering
DON’T NEGLECT THE BASICS
Placing your access points outside the firewall
Troubleshooting a wireless network
Checking for obvious problems
Pinpointing the problem
Changing channels
Fiddling with the antennas
Adding another access point
Help! I forgot my router’s password!
Windows Clients
Configuring Network Connections
Joining a Domain
Mac Networking
Basic Mac Network Settings
Joining a Domain
Connecting to a Share
Network Printers
Configuring Network Printers
Adding a network printer
Accessing a network printer using a web interface
Virtual Private Networks
Understanding VPN
ACCESSING YOUR COMPUTER REMOTELY
Looking at VPN Security
Understanding VPN Servers and Clients
Implementing Virtualization. Contents at a Glance
Hyper-V
Understanding the Hyper-V Hypervisor
Understanding Hyper-V Virtual Disks
Enabling Hyper-V
Getting Familiar with Hyper-V
Creating a Virtual Switch
Creating a Virtual Disk
Creating a Virtual Machine
Installing an Operating System
VMware
Looking at vSphere
Getting Started with VMware Workstation Pro
Creating a Virtual Machine
Installing VMware Tools
Azure
Looking at Azure Services
Creating an Azure Account
Examining the Azure Portal
Creating a Windows Virtual Machine
Managing an Azure Virtual Machine
Connecting to an Azure Virtual Machine
Amazon Web Services
Looking at What Amazon Web Services Can Do
Creating an Amazon Web Services Account
Examining the Amazon Web Services Console
Creating a Windows Virtual Machine
Managing an Amazon Web Services Virtual Machine
Connecting to an Amazon Web Services Virtual Machine
Desktop Virtualization
Introducing Desktop Virtualization
Considering Two Approaches to Desktop Virtualization
Looking at VMware’s Horizon View
Looking at Citrix XenApp
Implementing Windows Server 2019. Contents at a Glance
Installing Windows Server 2019
Planning a Windows Server Installation
Checking system requirements
Reading the release notes
Deciding whether to upgrade or install
Considering your licensing options
Thinking about multiboot
Planning your partitions
Deciding your TCP/IP configuration
Choosing workgroups or domains
Before You Install …
Backing up
Checking the event logs
Applying updates
Disconnecting UPS devices
Running Setup
Considering Your Next Steps
Adding Server Roles and Features
Configuring Windows Server 2019
Using the Administrator Account
Using Remote Desktop Connection
Enabling remote access
Connecting remotely
Using Microsoft Management Console
Working with MMC
Taking an overview of the MMC consoles
Customizing MMC
Configuring Active Directory
What Directories Do
Remembering the Good Ol’ Days of NT Domains
PDCs and BDCs
Trusts
NetBIOS names
Active Directory to the Rescue
Understanding How Active Directory Is Structured
Objects
Domains
Organizational units
Trees
Forests
Creating a New Domain
Creating an Organizational Unit
Configuring User Accounts
Understanding Windows User Accounts
Local accounts versus domain accounts
User account properties
Creating a New User
Setting User Properties
Changing the user’s contact information
Setting account options
Specifying logon hours
Restricting access to certain computers
Setting the user’s profile information
Resetting User Passwords
Disabling and Enabling User Accounts
Deleting a User
Working with Groups
Group types
Group scope
Default groups
Creating a group
Adding a member to a group
Working with User Profiles
Types of user profiles
Roaming profiles
Creating a Logon Script
Configuring a File Server
Understanding Permissions
Understanding Shares
Considering Best Practices for Setting Up Shares
Managing Your File Server
Using the New Share Wizard
Sharing a folder without the wizard
Granting permissions
Using Group Policy
Understanding Group Policy
Enabling Group Policy Management on Windows Server 2019
Creating Group Policy Objects
Filtering Group Policy Objects
Typing Windows Commands
Using a Command Window
Opening and closing a command window
Editing commands
Using the Control menu
Special Command Tricks
Wildcards
Chaining commands
Redirection and piping
Environment variables
Batch files
The EventCreate Command
Net Commands
The Net Accounts command
The Net Computer command
The Net Config command
The Net Continue command
The Net File command
The Net Group command
The Net Help command
The Net Helpmsg command
The Net Localgroup command
The Net Pause command
The Net Session command
The Net Share command
The Net Start command
The Net Statistics command
The Net Stop command
The Net Time command
The Net Use command
The Net User command
The Net View command
The RunAs Command
Using PowerShell
Using PowerShell
Understanding PowerShell Commands
Using Cmdlets
Using Parameters
Getting Help
Using Aliases
Using the Pipeline
Using Providers
Using Scripts
Administering Microsoft Office 365. Contents at a Glance
Getting Started with Office 365 Administration
Introducing Office 365
WAIT, IS IT OFFICE 365 OR MICROSOFT 365?
Considering Office 365 Plans
Understanding Tenants
Creating an Office 365 Tenant
Creating a New User
Resetting a User’s Password
Disabling a User
Configuring Exchange Online
Looking at Exchange Online Recipient Types
Examining the Exchange Admin Center
Managing Mailboxes
Creating an email alias
Delegating a mailbox
Converting a standard mailbox to a shared mailbox
Enabling or disabling mailbox apps
Creating a forwarder
Creating a Shared Mailbox
Administering Teams
What Is Teams?
A Brief Look at How Teams Works
Microsoft 365 Group
SharePoint
OneDrive for Business
Using the Teams Admin Center
Managing Teams
Implementing Linux. Contents at a Glance
Installing a Linux Server
Planning a Linux Server Installation
Checking system requirements
Choosing a distribution
Going virtual
Deciding on your TCP/IP configuration
Installing Fedora Server
VIRTUAL CONSOLES AND THE INSTALLATION PROGRAM
Linux Administration
On Again, Off Again
Logging in
Logging out
Shutting down
Wait, Where’s the Desktop?
Playing the Shell Game
Getting into Virtual Consoles
Using a Remote Console
Enabling the root User
Using the sudo Command
Understanding the file system
Looking at top-level directories
Browsing the file system
Using the RPM Package Manager
Listing packages
Installing packages
Removing packages
Updating packages
Editing Text Files with Vi
Starting vi
Saving changes and quitting Vi
Understanding Vi's operating modes
Moving around in a file
Inserting text
Deleting text
Changing text
Copying and pasting text
Repeating commands
Other useful Vi commands
Using Cockpit
Managing User Accounts
Basic Linux Network Configuration
Using Cockpit to Configure Network Interfaces
Working with Network Configuration Files
The Network file
The ifcfg files
The Hosts file
The resolv.conf file
Displaying Your Network Configuration with the ifconfig Command
Running DHCP and DNS
Running a DHCP Server
Installing DHCP
Configuring DHCP
Starting DHCP
Running a DNS Server
Installing BIND
Editing BIND configuration files
named.conf
named.ca
Zone files
Restarting BIND
Doing the Samba Dance
Understanding Samba
Installing Samba
Starting and Stopping Samba
Editing the smb.conf File
Configuring global settings
Creating a share
Using the Samba Client
Running Apache
Installing Apache
Starting and Stopping Apache
Opening the Firewall for Apache
Confirming That Apache Is Running
Looking at the httpd.config File
Understanding Access Rules
Configuring Virtual Hosts
Running Postfix
Understanding Email
Installing Postfix
Modifying main.cf
Using SpamAssassin
Installing SpamAssassin
Customizing SpamAssassin
Block listing and friends listing email addresses
Using the Mail Console Client
Linux Commands
Command Shell Basics
Getting to a shell
Editing commands
Wildcards
Redirection and piping
Environment variables
Shell scripts
Running a command with root-level privileges
Directory- and File-Handling Commands
The pwd command
The cd command
The mkdir command
The rmdir command
The ls command
The cp command
The rm command
The mv command
The touch command
The cat command
Commands for Working with Packages and Services
The service command
The yum and dnf commands
Commands for Administering Users
The useradd command
The usermod command
The userdel command
The chage command
The passwd command
The newusers command
The groupadd command
The groupdel command
The gpasswd command
Commands for Managing Ownership and Permissions
The chown command
The chgrp command
The chmod command
Networking Commands
The hostname command
The ifconfig command
The netstat command
The ping command
The route command
The traceroute command
Managing a Network. Contents at a Glance
Welcome to Network Administration
Knowing What Network Administrators Do
Choosing the Part-Time Administrator
Establishing Routine Chores
Managing Network Users
Patching Up Your Operating System and Software
Discovering Software Tools for Network Administrators
Building a Library
Getting Certified
CompTIA
Microsoft
Cisco
Gurus Need Gurus, Too
Helpful Bluffs and Excuses
Managing Remotely
Enabling Remote Desktop Connection
Connecting Remotely
Using Keyboard Shortcuts for Remote Desktop
Configuring Remote Desktop Options
Setting the Display options
Setting the Local Resources options
Setting the Experience options
Setting the Advanced options
Using Remote Assistance
Enabling Remote Assistance
Inviting Someone to Help You via a Remote Assistance Session
Responding to a Remote Assistance Invitation
Managing Network Assets
Introducing IT Asset Management
Why Bother?
Getting Organized
ISO/IEC 19770
What to Track
Taking Pictures
Picking a Number
Making Labels
DEVELOPING AN EQUIPMENT LOSS POLICY
Tracking Software
Using Asset-Tracking Software
Other Sources of Asset-Tracking Information
Solving Network Problems
When Bad Things Happen to Good Computers
Fixing Dead Computers
Ways to Check a Network Connection
A Bunch of Error Messages Just Flew By!
Double-Checking Your Network Settings
Time to Experiment
Who’s on First?
Restarting a Client Computer
Booting in Safe Mode
Using System Restore
Restarting Network Services
Restarting a Network Server
Looking at Event Logs
Documenting Your Trials and Tribulations
Managing Software Deployment
Understanding Software Licenses
Using a License Server
Options for Deploying Network Software
Deploying software manually
Running Setup from a network share
Installing silently
Creating an administrative installation image
Pushing out software with group policy
Keeping Software Up to Date
Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Understanding the iPhone
Understanding the iPad
Integrating iOS devices with Exchange
Managing Android Devices
Looking at the Android OS
Perusing Android’s core applications
Integrating Android with Exchange
Dealing with Cybersecurity. Contents at a Glance
Securing Your Users
Knowing the Difference between Authentication and Authorization
Following Password Best Practices
COMING UP WITH A GREAT PASSWORD
Securing the Administrator Account
Understanding Multifactor Authentication
Securing the Human Firewall
Establishing cybersecurity policies
Training
Phish testing
Managing Firewalls and Virus Protection
Firewalls
The Many Types of Firewalls
Packet filtering
Stateful packet inspection (SPI)
Circuit-level gateway
Application gateway
Firewall Best Practices
The Built-In Windows Firewall
Configuring Windows Defender Firewall with Group Policy
Virus Protection
What is a virus?
Antivirus programs
Safe computing
Dealing with Spam
Defining Spam
Sampling the Many Flavors of Spam
Using Antispam Software
Understanding Spam Filters
Looking at Three Types of Antispam Software
On-premises antispam
Antispam appliances
Cloud-based antispam services
Minimizing Spam
Managing Disaster Recovery and Business Continuity Planning
Assessing Different Types of Disasters
Environmental disasters
Deliberate disasters
Disruption of services
Equipment failure
Other disasters
Analyzing the Impact of a Disaster
Developing a Business Continuity Plan
Holding a Fire Drill
Appendixes. Contents at a Glance
Directory of Useful Websites
Certification
Hardware
Home and Small-Business Networking
Linux
Magazines
Microsoft
Network Standards Organizations
Reference
TCP/IP and the Internet
Wireless Networking
Smartphones
Glossary
Index. Symbols and Numerics
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
About the Author
Dedication
Author’s Acknowledgments
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Welcome to the eighth edition of Networking All-in-One For Dummies, the one networking book that’s designed to replace an entire shelf full of the dull and tedious networking books you’d otherwise have to buy. This book contains all the basic and not-so-basic information you need to know to get a network up and running and to stay on top of the network as it grows, develops problems, and encounters trouble.
If you’re just getting started as a network administrator, this book is ideal. As a network administrator, you have to know about a lot of different topics: installing and configuring network hardware and software, planning a network, working with TCP/IP, securing your network, working with mobile devices, virtualizing your servers, backing up your data, managing cloud services, and many others.
.....
That’s the second most important thing to know. The first most important thing to know about hubs is that they’re almost never used anymore. That’s because simply repeating all incoming signals on all ports is an incredibly bad idea, for reasons that will become apparent later in this chapter and in Chapter 3 of this minibook. If your network still has hubs, you should seriously consider replacing them with switches, which are described in the next section and further explained in the next chapter.
A switch is a layer-2 device that is similar to a hub in that it allows you to connect more than one device, and packets received on one port are relayed to other ports. The difference, however, is that a switch is able to examine the actual contents of the data that it receives. As I explain in the “Pondering Packets” section, later in this chapter, data is sent in units called packets that contain a destination address. A switch looks at this destination address and repeats the incoming packet only on the port that can deliver the packet to the intended destination.
.....