Module 13: Networking Service Designs. Overview Evaluating the Existing Configuration Identifying the Essential Design Decisions Providing Security Enhancing.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Module 12: Strategies for Combining Networking Services.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 5: Configuring Access for Remote Clients and Networks.
Module 1: Microsoft Windows 2000 Networking Services Infrastructure Overview.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Module 6: NAT As a Solution for Internet Connectivity.
Windows Server 2008 Chapter 8 Last Update
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 4: Dynamic Host Configuration Protocol.
Implementing Dynamic Host Configuration Protocol
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Implementing Dynamic Host Configuration Protocol
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Module 5: Planning a DNS Strategy. Overview Planning DNS Servers Planning a Namespace Planning Zones Planning Zone Replication and Delegation Integrating.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Week #3: Configuring and Troubleshooting DHCP
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Overview Managing a DHCP Database Monitoring DHCP
Module 4: Configuring and Troubleshooting DHCP
Module 5: Designing Security for Internal Networks.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Module 10: Windows Firewall and Caching Fundamentals.
Module 4: DNS As a Solution for Name Resolution. Overview Introducing DNS Designing a Functional DNS Solution Securing DNS Enhancing a DNS Design for.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Lab A: Planning an Installation
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Configuring and Troubleshooting Routing and Remote Access
Unit 27: Network Operating Systems
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

Module 13: Networking Service Designs

Overview Evaluating the Existing Configuration Identifying the Essential Design Decisions Providing Security Enhancing the Availability and Performance

The networking services in Microsoft® Windows® 2000 provide the foundation to solve connectivity and protocol requirements for organizations. You can integrate the networking services to be able to design networking solutions that establish a network foundation, provide access to public networks, include connectivity for remote users and locations, and support network-based applications and authentication methods. In this module, you will design a networking solution for an investment firm and address the basic functionality, security, availability, and performance features of the solution. When combined with Microsoft Proxy Server and Internet Information Services (IIS), the networking services in Windows 2000 can provide complete solutions for the investment firm.

At the end of this module, you will be able to: Identify the characteristics of the scenario that influence the design decisions. Describe the essential design decisions required to provide networking services. Describe the design decisions for securing the networking services. Describe the design decisions for improving the availability and performance of the networking services.

 Evaluating the Existing Configuration Current Project Status Design Requirements and Limitations

To design a solution for the investment firm, you must identify the information that influences the design. Based on that information, you make decisions about which networking services to include, along with which specifications to select for each service. To identify the information that influences the design, you must: Examine the current project status. Examine the design requirements and limitations.

Current Project Status New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

Current Project Status … Many investment firms are increasing their presence on the Internet because of electronic trading and online investments. These firms also connect branch offices by using public networks such as the Internet. In addition, many of the brokers and agents within investment firms require remote access to their confidential client information. Networking Service Designs

A well-established investment firm is expanding operations to include a larger online presence, and to provide remote access to broker and client information. The existing connectivity between the New York, Tokyo, and London locations is provided by: Dedicated routers at each location. 56 kilobits per second (Kbps) dedicated lease-lines between locations.

The following table lists the project milestones completed to date, and the reason these milestones were completed. Activity So that the Upgrading the physical networkPrivate network can support additional traffic generated by the broker and trading applications Replacing Routers 1 and 3 with higher- performance routers Routers can support the additional traffic generated by the broker and trading applications Upgrading Internet connections to T1 connections Internet connections can support the traffic between the locations Testing for the approved computer hardware architecture Compatibility and performance of the approved computer hardware architecture is confirmed. Recording performance statistics for the approved computer hardware architecture. Number of computers required to support the networking services can be determined.

Design Requirements and Limitations New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

An investigation of the current network, user traffic patterns, and future network requirements reveals the following additional information that you consider when making your design decisions.

Applications The investment firm uses a number of applications to conduct the day-to-day operations. To create a solution for the investment firm, your design must provide: Support for a mission-critical Web-based application that manages investment firm customers and their stock portfolios. Support for a mission-critical Web-based application that allows customers to check their stock portfolios and to perform investment trading over the Internet. Private network access to all shared folders and Web-based applications from the New York, Tokyo, and London offices. Performance response times to allow a stock trade transaction to occur within three seconds. Administration of private network resources by using a directory services infrastructure. Authentication of users by using a directory services infrastructure. Support for all mission-critical applications to be available 24-hours-a-day, 7- days-a-week.

Connectivity The applications used by the investment firm require connectivity between the offices. When creating the design for the investment firm, remember that your design must provide: Simultaneous access to private network resources for approximately 200 brokers connecting through the Internet by using a variety of operating systems. Simultaneous access to Web-based applications for approximately 1,500 brokers and customers who are connecting through the Internet by using a variety of operating systems. Access to management aspects of the Web-based applications that are restricted to brokers and administrative staff. Access to the Internet from all locations for all private network users. Control of Internet access through a single path of connectivity through the New York headquarters. Isolation of the firm's network from the Internet.

 Identifying the Essential Design Decisions Identifying the Appropriate Networking Services Providing Networking Services at the New York Location Providing Networking Services at the Tokyo Location Providing Networking Services at the London Location

As you begin designing the networking solution for the investment firm, you must identify which networking services to include in the network design. Based on the networking services, you must identify where to place servers to provide essential support for the solution. You can select the networking services for your network design based on the types of clients, applications, connectivity between locations, and connectivity for remote users. You must place the servers within the organization based on the number of clients, the geographic locations, and the amount of traffic between network segments.

To provide the essential networking services for the investment firm, you must: Identify the networking services that are required at each location. Determine the networking server placement and design options for New York. Determine the networking server placement and design options for Tokyo. Determine the networking server placement and design options for London.

Identifying the Appropriate Networking Services New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

You must identify the networking services for a network design to ensure that the appropriate foundation exists for supporting the users and applications. In addition, you must also identify any networking services that can provide the capabilities for future growth.

The following table lists the networking services that you need to include in the network design, and the reason you must include them. Include this service To provide Transmission Control Protocol/ Internet Protocol (TCP/IP) A common protocol between clients and Internet connectivity. DHCPAutomatic IP configuration for clients. DNSName resolution for Web-based applications. Support for the Active Directory™ directory service. WINSName resolution for Microsoft Windows 95, Microsoft Windows 98, and Microsoft Windows NT® version 4.0 clients. Microsoft Proxy ServerIsolation between the private network and the Internet. Different levels of security by creating screened subnets. Caching of Internet requests. Routing and Remote Access Connectivity between the various geographic locations within the organization. Connectivity for the brokers who connect to private network resources through a virtual private network (VPN) connection over the Internet. Isolation between the private network and the Internet.

Providing Networking Services at the New York Location Router 1 Router 3 WINS DHCP DNS Proxy Server Router 2 Internet Subnet A 175 Hosts Subnet C 250 Hosts Subnet E 3 Hosts Subnet B 7 Hosts Firewall VPN Remote Access Subnet D 2 Hosts

For the New York location, determine where to place the servers and the options necessary to support your design.

Placing Servers That Run the Networking Services The following table lists the placement criteria for servers at the New York location. Place On Subnet(s) So that DHCPBDHCP traffic travels across the minimum number of network segments while protecting the server. DNSBDNS traffic travels across the minimum number of network segments while protecting the server. WINSBDNS traffic travels across the minimum number of network segments while protecting the server. RouterB, EPackets are routed between the screened subnet and the private network while protecting private network resources. VPN remote access DRemote access is provided while protecting private network resources. Proxy Server B, EHTML and FTP traffic is filtered through the Proxy Server while protecting private network resources.

Specifying Networking Services Design Options There are several options that you need to specify in your network design for each of the servers in the New York location.

Providing Networking Services at the Tokyo Location Subnet F 100 Hosts Internet WINS DHCP DNS Subnet G 75 Hosts Firewall Router 4

After the New York location design is completed, you need to decide where to place the servers within the Tokyo location. For each networking service that you place in the Tokyo location, you must determine the networking service design options to include in your design.

Placing Servers That Run the Networking Services The following table lists the servers that are placed within the Tokyo location, the subnets on which the servers are placed, and why the servers are placed on the respective subnet within your design. Place On Subnet(s) So that DHCPFDHCP traffic travels across the minimum number of network segments while protecting the server. DNSFDNS traffic travels across the minimum number of network segments while protecting the server. WINSFDNS traffic travels across the minimum number of network segments while protecting the server. RouterF, GPackets are routed between the screened subnet and the private network while protecting private network resources. Note: The DHCP, DNS, and WINS servers were placed on Subnet F because Subnet F contains the majority of client computers at the Tokyo location.

Specifying Networking Services Design Options For each of the networking services servers that you place within the Tokyo location, you must specify the design options for the service.

The following tables list the related design options by networking service, and the reason for specifying the options in your design. DHCP SpecifyTo DHCP scope for Subnets F and G Provide automatic IP configuration for the DHCP clients on Subnets F and G. DHCP Relay Agent on Router 4 Enable the forwarding of DHCP packets between Subnets F and G. DNS updatesRegister new DHCP clients with DNS.

DNS SpecifyTo Active Directory integrated zone Use the existing Active Directory infrastructure, and to act as the repository for the DNS zone information. Dynamic updates from the DHCP server Authorize the DHCP server to perform updates within the DNS zone.

WINS SpecifyTo Burst handlingRespond to a large number of simultaneous WINS registration requests. Replication with the New York server Ensure WINS resolution and registration between locations.

Router SpecifyTo Static RoutingProvide routing between locations. OSPFAutomatically update routing table information with existing routers. IPSec tunnelEncrypt data between locations and to authenticate the router

Providing Networking Services at the London Location Subnet H 200 Hosts Internet WINS DHCP DNS Subnet I 150 Hosts Firewall Router 5

After the designs for the New York and Tokyo locations are completed, you need to decide where to place the servers within the London location. For each networking service that you place in the London location, you must determine the networking service design options to include in your design.

Placing Servers That Run the Networking Services The following table lists the servers that are placed within the London location, the subnets on which the servers are placed, and why the servers are placed on the respective subnet within your design. Place On Subnet(s) So that DHCPHDHCP traffic travels across the minimum number of network segments while protecting the server. DNSHDNS traffic travels across the minimum number of network segments while protecting the server. WINSHDNS traffic travels across the minimum number of network segments while protecting the server. RouterH, IPackets are routed between the screened subnet and the private network while protecting private network resources. Note: The DHCP, DNS, and WINS servers were placed on Subnet H because Subnet H contains the majority of client computers at the London location.

Specifying Networking Services Design Options For each of the networking services servers that you place within the London location, you must specify the design options for the service.

The following tables list the related design options by networking service, and the reason for specifying the options in your design. DHCP SpecifyTo DHCP scope for Subnets H and I Provide automatic IP configuration for the DHCP clients on Subnets H and I. DHCP Relay Agent on Router 5 Enable the forwarding of DHCP packets between Subnets H and I. DNS updatesRegister new DHCP clients with DNS.

DNS SpecifyTo Active Directory integrated zone Use the existing Active Directory infrastructure, and to act as the repository for the DNS zone information. Dynamic updates from the DHCP server Authorize the DHCP server to perform updates within the DNS zone.

WINS SpecifyTo Burst handlingUse the existing Active Directory infrastructure, and to act as the repository for the DNS zone information. Dynamic updates from the DHCP server Authorize the DHCP server to perform updates within the DNS zone.

Router SpecifyTo Static RoutingProvide routing between locations. OSPFAutomatically update routing table information with existing routers. IPSec tunnelEncrypt data between locations and to authenticate the router

 Providing Security Identifying Potential Security Risks Preventing Potential Security Risks

To secure the networking solution, you must identify the potential security risks and how to prevent those risks from occurring. You identify the security risks based on the confidentiality of the data and the number of users that have access to the data. You prevent unauthorized access to confidential data by encrypting the data, and authenticating users or devices that transmit the data.

To provide security for the investment firm solution, you must: Identify the potential security risks for the confidential data. Identify the strategies for preventing the potential security risks at each location.

Identifying Potential Security Risks Internet New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

When your network design includes confidential data that is transmitted on a private network or over public networks, the data is at risk. Therefore, your network design must ensure that each user who requires access to the confidential data is authenticated.

The following table lists the security risks and why the data is at risk. Data is at risk Because there is a possibility that Within each locationBrokers can access other brokers' clients. Customers may connect to the network while in the branch office and access others' accounts. Network administrative staff can access any of the firm's accounts and records. Between locationsConfidential data is transmitted between locations over public networks. From the Web-based application Brokers and customers can transmit confidential data over the Internet. Servers that host the Web-based applications are accessible from the Internet. From brokers accessing the private network remotely Brokers can transmit confidential data over public networks.

Preventing Potential Security Risks Internet New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

After you identify the security risks, you need to decide how to prevent the security risks from occurring at any location. For each location where there is a security risk, you must prescribe a response that prevents access to the confidential data.

Within Each Location You can prevent the security risks within each location by: Encrypting (by using IPSec) all confidential data transmitted within the private network. Authenticating all brokers by using Active Directory authentication. Authenticating all customers when they access the Web-based application while connecting to the network within each location. Requiring HyperText Transmission Protocol Secure (HTTPS) for all transactions on the Web-based application.

Between Locations You can prevent the security risks between locations by: Requiring the routers that connect locations transmit all data through a VPN tunnel. Encrypting the data by using 56-bit Data Encryption Standard (DES), which is the strongest level of encryption that can be exported outside the U.S. and Canada. Authenticating the routers by using MS-CHAP v2 and IPSec.

Web-based Application You can prevent the security risks for the Web-based application by: Authenticating all customers when they access the Web- based application. Requiring HTTPS for all transactions on the Web-based application. Placing the Web-based application servers on screened subnets within the location.

Remote Access by Brokers You can prevent the security risks when the brokers remotely access the private network by: Encrypting all confidential data transmitted within the private network by using VPN tunnels with Microsoft Point-to-Point Encryption(MPPE). Authenticating all brokers by using Active Directory authentication.

 Enhancing the Availability and Performance Identifying the Essential Networking Services Enhancing the Availability and Performance at the New York Location Enhancing the Availability and Performance at the Tokyo Location Enhancing the Availability and Performance at the London Location

After you improve the availability and performance at the New York location, you must prevent outages and improve the performance of the networking services in the Tokyo location. In most instances, the same method that you implement will also improve the availability and performance of a networking service. Note: In many instances, the existing networking service is sufficient for the number of users in the Tokyo location. However, the additional server has the added benefit of improving performance for the networking service.

Identifying the Essential Networking Services Internet New York Router 4 London Tokyo 200 Hosts 150 Hosts 100 Hosts 75 Hosts 175 Hosts Router 1Router 3 Router 2 Router 5 3 Hosts 250 Hosts

In your design, any mission-critical applications that are dependent upon networking services require these services be highly available and perform within specifications. When these networking services are offline, your mission-critical applications fail. When these networking services respond slowly, your mission-critical applications perform below specifications.

Support for Web-based Trading The following table lists the networking services that are required to support the Web-based trading applications in the investment firm. Web-based trading applications require To provide DHCPAutomatic IP configuration for brokers who connect through VPN remote access. DNSName resolution for servers that host the application. Proxy ServerPrivate network isolation. Screened subnets to protect the servers that host the application. Routing and Remote Access Private network isolation. VPN remote access for brokers. Routing between private network locations.

Support for Private Network-based Applications The following table lists the networking services that are required to support the private network-based applications in the investment firm. Web-based trading applications require To provide DHCPAutomatic IP configuration for users within the private network. DNSName resolution for servers that host the applications. WINSName resolution for servers that host the applications from Windows 95, Windows 98, and Windows NT clients. Routing and Remote Access Private network isolation. VPN remote access for brokers. Routing between private network locations.

Enhancing the Availability and Performance at the New York Location Router 1 Router 3 DHCP Proxy Array Internet Subnet A 175 Hosts Subnet C 250 Hosts Subnet E 5 Hosts Subnet B 12 Hosts Firewall VPN Remote Access Subnet D 4 Hosts WINS DNS Router 2 Router 6

After you have identified the essential networking services for the solution, you must prevent outages and improve the performance of these services in the New York location. In most instances, the same method that you implement will also improve the availability and performance of a networking service. Note: In many instances, the existing networking service is sufficient for the number of users in the New York location. However, the additional server has the added benefit of improving performance for the networking service.

DHCP Improve the availability of DHCP within the New York location by: Specifying that the existing DHCP server belongs to a server cluster. Adding another server to the server cluster, to act as a backup in the event of a server failure. Note: Because only one instance of DHCP is running within the cluster, DHCP performance is not improved.

DNS Improve the availability and performance of DNS within the New York location by: Placing an additional DNS server with an Active Directory integrated zone on Subnet B. Specifying that the clients on Subnet A use the original DNS server and the clients on Subnet B use the additional DNS server to distribute DNS queries between the two DNS servers.

WINS Improve the availability of WINS within the New York location by: Specifying that the existing WINS server belongs to a server cluster. Adding another server to the server cluster, to act as a backup in the event of a server failure. Note: Because only one instance of WINS is running within the cluster, WINS performance is not improved.

Routing Improve the availability and performance of routing within the New York location by: Placing an additional router between Subnets B and E. Specifying that the original router is the lowest cost path to the Tokyo location and the highest cost path to the London location. Specifying that the additional router is the lowest cost path to the London location and the highest cost path to the Tokyo location

Proxy Server Improve the availability and performance of Proxy Server within the New York location by: Specifying that the existing proxy server belongs to a proxy array. Adding another proxy server to the proxy array to act as a backup in the event of a server failure. Specifying that both proxy servers use Network Load Balancing to distribute traffic between the servers.

VPN Remote Access Server Improve the availability and performance of VPN remote access within the New York location by: Adding another VPN remote access server on Subnet D. Specifying that both VPN remote access servers use Network Load Balancing to distribute traffic between the servers.

Enhancing the Availability and Performance at the Tokyo Location Subnet F 100 Hosts Internet Firewall DHCP Router 4 Router 7 DNS WINS Subnet G 75 Hosts DNS

After you improve the availability and performance at the New York location, you must prevent outages and improve the performance of the networking services in the Tokyo location. In most instances, the same method that you implement will also improve the availability and performance of a networking service. Note: In many instances, the existing networking service is sufficient for the number of users in the Tokyo location. However, the additional server has the added benefit of improving performance for the networking service.

DHCP Improve the availability of DHCP within the Tokyo location by: Specifying that the existing DHCP server belongs to a server cluster. Adding another server to the server cluster, to act as a backup in the event of a server failure. Note: Because only one instance of DHCP is running within the cluster, DHCP performance is not improved.

DNS Improve the availability and performance of DNS within the Tokyo location by: Placing an additional DNS server with an Active Directory integrated zone on Subnet G. Specifying that the clients on Subnet F use the original DNS server, and the clients on Subnet G use the additional DNS server, to distribute DNS queries between the two DNS servers.

WINS Improve the availability of WINS within the Tokyo location by: Specifying that the existing WINS server belongs to a server cluster. Adding another server to the server cluster, to act as a backup in the event of a server failure. Note: Because only one instance of WINS is running within the cluster, WINS performance is not improved.

Routing Improve the availability and performance of routing within the Tokyo location by: Placing an additional router between Subnet F, Subnet G, and the Internet. Specifying that the original router is the lowest cost path to the New York location and the highest cost path to the London location. Specifying that the additional router is the lowest cost path to the London location and the highest cost path to the New York location.

Enhancing the Availability and Performance at the London Location Subnet H 200 Hosts Internet DHCP DNS Subnet I 150 Hosts Firewall DNS Router 8Router 5 WINS

After you improve the availability and performance at the New York and Tokyo locations, you must prevent outages and improve the performance of the networking services in the London location. In most instances, the same method that you implement will improve the availability and performance of a networking service. Note: In many instances, the existing networking service is sufficient for the number of users in the London location. However, the additional server has the added benefit of improving performance for the networking service.

DHCP Improve the availability of DHCP within the London location by: Specifying that the existing DHCP server belongs to a server cluster. Adding another server to the server cluster, to act as a backup in the event of a server failure. Note: Because only one instance of DHCP is running within the cluster, DHCP performance is not improved.

DNS Improve the availability and performance of DNS within the London location by: Placing an additional DNS server with an Active Directory integrated zone on Subnet I. Specifying that the clients on Subnet H use the original DNS server and the clients on Subnet I use the additional DNS server to distribute DNS queries between the two DNS servers.

WINS Improve the availability of WINS within the London location by: Specifying that the existing WINS server belongs to a server cluster. Adding another server to the server cluster to act as a backup in the event of a server failure. Note: Because only one instance of WINS is running within the cluster, WINS performance is not improved.

Routing Improve the availability and performance of routing within the London location by: Placing an additional router between Subnet H, Subnet I, and the Internet. Specifying that the original router is the lowest cost path to the New York location and the highest cost path to the Tokyo location. Specifying that the additional router is the lowest cost path to the Tokyo location and the highest cost path to the New York location.

Lab A: Creating Networking Solutions

Objectives After completing this lab, you will be able to: Evaluate an existing scenario to design a networking services solution. Design a networking services solution for the given scenarios.

Prerequisites Before working on this lab, you must have: Knowledge of the design decisions required to create a networking services design. Knowledge of strategies to enhance the security, availability, and performance of a networking services solution.

Exercise 1: Designing an Insurance Firm Solution In this exercise, you are presented with the task of designing a networking services solution for an insurance firm. This insurance firm has a central office, six regional offices, and two types of insurance agent offices. Review the scenario, the design requirements, and the diagram for your assigned location. Follow the instructions to complete the exercise.

Scenario An insurance firm is evaluating their existing network in preparation for the deployment of Windows As a consultant to the firm, you have been assigned the task of evaluating and redesigning the current network. The insurance firm has a central office that handles billing and accounting for the firm. In addition, the firm has six regional offices that support the insurance agents within each region. The insurance agent offices are independently owned and operated. The agent offices consist of an individual agent or a group of agents working at a single location.

Design Limitations and Requirements An investigation of the current network, user traffic patterns, and future network requirements, reveals additional information that must be considered when making your design decisions.

Applications The insurance firm uses a number of applications to conduct the day-to-day operations. To create a solution for the insurance firm, your design must provide: Support for a mission-critical Web-based application that manages customers and their policies. Support for a mission-critical Web-based application that allows customers to check the status of claims and historical claim payment information over the Internet. Private network access to all shared folders and Web-based applications from the central office and regional offices. Internet access from the central office and the regional offices. Support for all mission-critical applications to be available 24-hours- a-day, 7-days-a-week.

Connectivity The applications used by the insurance firm require connectivity between the central office, regional offices, and agent offices. When creating the DNS design for the insurance firm, remember that your design must provide: Support for the regional offices to connect to the central office by using dedicated connections over the Internet. Support for the agent offices that consist of multiple agents to connect to the regional offices by using dedicated connections over the Internet. Support for the agent offices that consist of an individual agent to connect to the regional offices by using dial-up connections over the Internet. Isolation of the central office, the regional offices, and the agent offices from the Internet.

Review Evaluating the Existing Configuration Identifying the Essential Design Decisions Providing Security Enhancing the Availability and Performance