Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

RIP V1 W.lilakiatsakun.
RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CMPSC-358 (CCNA 4 ) Spring 2007.
RIP – Routing Information Protocol Syeda Momina Tabish MIT - 7.
Routing and Routing Protocols Introduction to Static Routing.
Module 6: NAT As a Solution for Internet Connectivity.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Module 3: Planning and Troubleshooting Routing and Switching.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
USING ROUTING & REMOTE ACCESS.  When you have only 2 network sites, then only 1 topology is available in which you install a router on each site & connect.
Module 1: Configuring Routing by Using Routing and Remote Access.
Routing and Routing Protocols
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Security fundamentals
Networking for Home and Small Businesses – Chapter 5
Module 3: Enabling Access to Internet Resources
Instructor Materials Chapter 7: Access Control Lists
Networking for Home and Small Businesses – Chapter 5
Planning and Troubleshooting Routing and Switching
Configuring and Troubleshooting Routing and Remote Access
Chapter 6 – Routing.
Networking for Home and Small Businesses – Chapter 5
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Presentation transcript:

Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1

Configuring Routing in 2008 Routing and Remote Access Services (RRAS) –A Server Role service used to configure and manage network routing –Recommended for use in small networks that require simple routing directions –Not recommended for large and complex environments (use Cisco) 2

Configuring RRAS as a Router Routers –Responsible for forwarding packets between subnets, or networks with differing IP addressing schemes 3

Configuring Routers (continued)

Working with Routing Tables Routing tables are composed of routes Routes –Direct data traffic to its destination Routing tables –A list of routes –Can be managed in the RRAS console or from the command line using the route command 5

Configuring Routes Static Routing Limitations: –Requires manual creation and management –Require reconfiguration if the network changes –Used in small network with less than 10 subnet Dynamic protocols –Route traffic based on information they discover about remote networks from other routers Routing Information Protocol version 2 (RIPv2) –Uses partner routers, or RIP neighbors, in determining the dynamic routes it can use for forwarding packets of data –Can force authentication 6

Routing Protocol RIP v2 Can force authentication between routers when announcements are sent Password for authentication is plain text Can configure which incoming and outgoing routes are accepted Split-horizon processing stops information from going back in the direction it was received from Poison-reverse processing marks a network as unreachable if it goes down

Filtering Router Traffic Can control packets allowed to pass between routed networks using packet filters Packet filters are directional Packet filters are used to filter network traffic based on criteria such as: –Protocol –Source address –Destination address –Port number

Filtering Router Traffic (continued)

Configuring Packet Filters

Configuring Dial-on-Demand Routing Demand-dial routing –Allows a server to initiate a connection only when it receives data traffic bound for a remote network –Can use dial-up networks instead of more expensive leased lines 12

Demand-dial Connections Used to establish a connection between two routers only when there is data to send Can also be used to initiate VPN connections between Windows routers and phone Dial-in connection A user account with remote access permission is required to establish a demand-dial connection Avoid sending plain-text passwords At least one static route is required to trigger the demand-dial interface Demand dial filters to control which types of network traffic trigger a demand-dial connection

Configure Demand-dial Settings You can configure security settings and idle timeout You can configure a set of dial-out hours

Demand-dial Filter You can configure security settings and idle timeout You can configure a set of dial-out hours

Configuring a DHCP Relay Agent DHCP relay agent –Manages the communication between a network’s DHCP server and clients on subnets without a DHCP server With RRAS –Network adapters are added and configured to listen for DHCP broadcast messages 16

Network Address Translation Allows you to shield internal IP address ranges from public networks by allowing internal clients to access the Internet through a shared IP address 17

NAT Components Translation – IP router – Static and dynamic address mapping – Proper translation of header fields – NAT editors Addressing – Public: Static IP bought from ISP or InterNIC – Private: Class A – through Class B – through Class C – through Name resolution

Using NAT to Transparently Connect an Intranet to the Internet NAT Components

NAT Processing of Outbound Internet Traffic

NAT Processing of Inbound Internet Traffic

Using IPSec

Troubleshooting Routing Most problems result from an incorrect configuration First place to check for problems is the routing table A remote router may prevent a packet from reaching its destination network Can use the tracert command to see the path a packet takes from one router to another

Troubleshooting Routing (continued)

Troubleshooting NAT Are all interfaces added to Connection Sharing (NAT) protocol? Is translation enabled on Internet interface? Is Connection Sharing enabled on private interface? Is TCP/UDP port translation enabled? Is your range of public addresses set correctly? Is the protocol being used by a program translatable? Is Connection Sharing addressing enabled on the home office network?