Workshop on Windows Server 2012

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Workshop on Windows Server 2012"

Transcription

1 Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased fault tolerance and redundancy over using only one DHCP server. This step-by-step guide contains an introduction to using DHCP with a split scope on a secondary server, with delay, and instructions for setting up a test lab using two DHCP servers and one DHCP client. Requirements of DHCP Scope Splitting. You must have Three computers running with Windows Server 2012 Computer1: Promote DC. Computer2 and Computer3: Member of Domain and install DHCP Service. Configure DHCP Scope Splitting: 1. In the DHCP console tree, right-click Scope [ ] SS Scope, and then click Advanced > Split-Scope. 2. The DHCP Split-Scope Configuration wizard is launched.

2 3. On the Percentage of Split page, set the configuration for a ratio of 80:20 by assigning DHCP Server 1 to exclude addresses to , and DHCP Server 2 to exclude to See the example below. 4. Click Next, and then on the Delay in DHCP Offer page, configure DHCP Server 1 with a value of 0 (default) and configure Added DHCP Server (DHCP Server 2) for 1000 milliseconds. This enables DHCP Server 2 to offer DHCP OFFER messages only after a delay of 1000 milliseconds, thereby preventing the exhaustion of IPv4 addresses from the required scope of DHCP Server 2. VM Migration using Hyper-V.

3 Hyper-V role migration involves moving the virtual machines, virtual networks, and all the associated settings from one physical computer to another physical computer in the enterprise. The process supports moving from a server running Hyper-V in Windows Server 2012 to a server running Hyper-V in Windows Server 2012 R2. The Hyper-V role does not depend on any other roles. Installing Hyper-V Role in windows Server 2012 R2 1. Install Windows Server 2012 R2 on the new server hardware. 2. Install the Hyper-V role on the server. 3. Configure the following Hyper-V settings, for example: The default location for virtual hard disks and virtual machine configuration files. Live migration settings. Even if live migration was not previously configured, you must enable and configure live migration on both servers. Virtual switches. Hyper-V Administrators local group membership. 4. Install the latest updates. 5. You must have Three computers running with Windows Server Computer1: Promote DC. 7. Computer2 and Computer3: Member of Domain and install DHCP Service. Perform this procedure on the source server running Hyper-V in Windows Server To move the virtual machine to Hyper-V in Windows Server 2012 R2 1. On the source server running Hyper-V in Windows Server 2012, open the Hyper-V Manager console, and then select the virtual machine that you want to move. 2. From the Actions pane, click Move. This action opens the Move Wizard. 1. On the Choose Move Type page, select Move the virtual machine. 2. On the Specify Destination Computer, specify the name or server that is running Windows Server 2012 R2. 3. On the Choose Move Options page, select Move only the virtual machine. Iscsi Target and Initiator

4 8. iscsi target allows your Windows Server to share block storage remotely. iscsi leverages the Ethernet network and does not require any specialized hardware. iscsi target is a service available in Windows 2012 R2 and can enabled from Add Roles and Features Wizard. Target: Targets are created in order to manage the connections between the iscsi target server and the servers that need to access them. You assign logical unit numbers (LUNs) to a target, and all servers that log on to that target will have access to the LUNs assigned to it. iscsi Target Server: iscsi target server is the server where iscsi target service is running. In Windows 2012 there is a service called iscsi service that you can install to configure iscsi target server. iscsi virtual disk: iscsi virtual disks are created on iscsi target server and associated to the iscsi target. iscsi virtual disk represents an iscsi LUN, which are connect to the clients using iscsi initiator. iscsi initiator: iscsi Initiator enables you to connect a host computer that is running Windows 7 / Windows Server 2008 R2 or higher to an external iscsi-based storage array through an Ethernet network adapter. iscsi initiator service runs on the client and used to make a connection to the iscsi Target by logging on to a Target server. how to configure the iscsi service in Windows 2012 R2. 1. Go to Add Roles and Features Wizard and install the iscsi target server role under file server role. 2. Install the iscsi target server role. 3. Once the iscsi service is installed you can go ahead create the virtual iscsi virtual disks and then connect it to the servers you want. Click on New iscsi virtual Disk: 4. As Windows 2012 R2 allows you to manage other servers, you can select the server where you want to create the iscsi VHD. 5. Provide a name to the iscsi virtual disk. As you would notice now it has support has for.vhdx file. 6. Different options that you can select for your disk including fixed size, dynamically expanding disks and differencing disk. As I do not have a dedicated storage for the disk, I want to select the Dynamically expanding storage.

5 7. If you have an iscsi target created, you can add the iscsi virtual disk to the same iscsi target or created a new iscsi target. Once an iscsi initiator connects to the iscsi target all virtual iscsi virtual disks will be available to the server. 8. Provide a name to the iscsi target. 9. Add the iscsi initiator server which will access the iscsi target. There can be more the one initiator that you can specify here, I have added two servers under iscsi initiator. 10. Add the iscsi initiator that will access this iscsi target. 11. Select an authentication method that is used to connect to the iscsi target. As this is just a lab I didn t select any authentication method. 12. Target is created Connecting iscsi initiator to the iscsi target server The iscsi initiator and iscsi Target are on different machines (physical or virtual). You will need to provide the iscsi Target server IP or hostname to the initiator, and the initiator will be able to do a discovery of the iscsi Target. All the Targets which can be accessed will be presented to the initiator. 1. Once the iscsi target is configured, go to the Windows 2012 R2 server where you want to connect to the iscsi virtual disk. Open the iscsi initiator from server tools and provide the IP address / hostname for the iscsi target server. 2. It displays the targets which are configured on the server. Connect to the iscsi target. Once connected to the iscsi target, it provides you access to all the iscsi virtual disks that are associated to the iscsi target.

6 3. Create new volume Once the connection is established, the iscsi virtual disk will be presented to the initiator as a disk. By default, this disk will be offline,. For typical usage, you want to create a volume, format the volume and assign with a drive letter so it can be used just like a local hard disk. Capture image using WDS How to Create a Capture Image by Using WDS Console

7 "A capture image is created from an existing boot image. You will create a new capture image by right-clicking on an existing boot image and then selecting Create Capture Image option (see the following figure). The Create Capture Image Wizard will start." "The default details in the Image Name and Image Description fields will be derived from those same details in the source boot image. You should customize them to make it clear that this is a capture image rather than a normal boot image. The Location And File Name filed is used to specify where the new WIM file for the capture image will be created. I am going to show you a little shortcut. The wizard will lead you to think that you should create the new WIM file in a temporary location and then add it again in a later step. I feel like that is a bit of wasted effort. Instead, I recommend that you simply create the new capture image file in the image store location for boot images. That will eliminate the additional step. You should create 32-bit images in \Remoteinstall\Boot\x86\Images and 64-bit images in \Remoteinstall\Boot\x64\Images. " Look at the following figure:

8

9 "The source boot image will be used as a template for the new capture image file. The new capture image WIM file will be added in the location that you have specified. The screen in the following figure will appear when the image creation has completed successfully. Clear the Add Image To The Windows Deployment Server Now check box if you have followed my advice on where to create the image. This option is used when you have created the capture image in another location and want to add it to the correct location." Returning to the WDS console, you can right-click on you server and select Refresh. Browse into Boot Images and you should see your new capture image. This is a new WIM file that is independent of the source boot image and consumes disk space. You will need to remember to update this capture image with any new driver packages that you

10 add from this point on. Remember that you may also need to have 32-bit and 64-bit capture images. You will now use this capture image to boot up the reference machine and capture the generalized image. How to Create An Image by Using a Capture Image Power up the reference machine and boot it up on the network. Choose the capture boot image when the PXE client starts.

11 The boot image will download over the network and start. You can skip the welcome screen to get to the Directory To Capture screen, as shown in the following figures:

12

13 You have to enter three pieces of information. You should select the volume letter that you want to capture using WDS. This highlights a limitation of WDS; you can only capture and deploy a single volume. You might notice something odd here. The volume we are capturing is shown as D:, even though it is the C: drive when the reference machine is booted up. There is a handy solution you can use if you are a little confused about the volume that you are capturing. 1. Start command prompt in Windows PE by pressing Shift+F Navigate the volumes (cd) and list their contents to see which volume letter it is that you need to select. You can so this using diskpart and by running the list volume command.

14 3. Enter the image name and description as you want them appear in the WDS console and to users when they are deploying images to their machines. You can change the name and description later in the console. 4. The New Image Location screen is where you configure the location of the new image that is to be created and if and how you want the image to be uploaded to the WDS server. 5. Click Browse to select a location to create the new installation image in and to name the file. You can create the new image on the same volume that you are capturing if there is sufficient space. You will need an additional local (not network-based) volume if there is not enough space. 6. Optionally select the option to upload the new image to the WDS server. If you do want to do this, click the Connect button to authenticate with the WDS server. Once you have entered valid credentials, you can select an Image Group to add the new image to. This will use Single Instance Storage (SIS) to reduce the amount of disk space that is needed to store the image. Make sure you choose an image group that matches the operating system, edition, and architecture of your new image.

15

16 The image is captured and will be uploaded to your WDS server if configured. The image will then be available for further configuration (such as access permissions) and deployment to other machines.

17

18 Note --> Remember that you will need to refresh the WDS console (if it was open already) to see the new installation image.

19 VPN with RADIUS Authentication and Digital Certificates. VPN: Virtual private networks (VPNs) are point-to-point connections across a private or public network, such as the Internet. The remote access server answers the call, authenticates the caller, and transfers data between the VPN client and the organization s private network. Properties of VPN connections VPN connections that use PPTP, L2TP/IPsec, and SSTP have the following properties: Encapsulation Authentication Data encryption Encapsulation With VPN technology, private data is encapsulated with a header that contains routing information that allows the data to traverse the transit network. For examples of encapsulation. Authentication Authentication for VPN connections takes three different forms: 1. User-level authentication by using PPP authentication 2. To establish the VPN connection, the VPN server authenticates the VPN client that is attempting the connection by using a Point-to-Point Protocol (PPP) user-level authentication method and verifies that the VPN client has the appropriate authorization. If mutual authentication is used, the VPN client also authenticates the VPN server, which provides protection against computers that are masquerading as VPN servers. 3. Computer-level authentication by using Internet Key Exchange (IKE) 4. To establish an Internet Protocol security (IPsec) security association, the VPN client and the VPN server use the IKE protocol to exchange either computer certificates or a preshared key. In either case, the VPN client and server authenticate each other at the computer level. Computer certificate authentication is highly recommended because it is a much stronger authentication method. Computer-level authentication is only performed for L2TP/IPsec connections. 5. Data origin authentication and data integrity 6. To verify that the data sent on the VPN connection originated at the other end of the connection and was not modified in transit, the data contains a cryptographic checksum based on an encryption key known only to the sender and the receiver.

20 Data origin authentication and data integrity are only available for L2TP/IPsec connections. Data encryption 7. To ensure confidentiality of the data as it traverses the shared or public transit network, the data is encrypted by the sender and decrypted by the receiver. The encryption and decryption processes depend on both the sender and the receiver using a common encryption key. 8. Intercepted packets sent along the VPN connection in the transit network are unintelligible to anyone who does not have the common encryption key. The length of the encryption key is an important security parameter. You can use computational techniques to determine the encryption key. However, such techniques require more computing power and computational time as the encryption keys get larger. Therefore, it is important to use the largest possible key size to ensure data confidentiality. RADIUS After the Routing and Remote Access and Demand-Dial Interface wizards complete, Windows authentication and Windows accounting are selected by default. You can change these defaults from Windows authentication and Windows accounting to Remote Authentication Dial-In User Service (RADIUS) authentication and RADIUS accounting, or you can choose separate providers for authentication and accounting. For a deployment that supports only a site-to-site connection, use Windows authentication and Windows accounting. However, you can change these defaults if the same answering router will support both the site-to-site connection and remote access users, and you want to use RADIUS as either the authentication provider or the accounting provider. Use the following procedures to accomplish these tasks: Configure the authentication provider on the answering router Configure the accounting provider on the answering router Configure the authentication provider on the answering router Configure either Windows authentication or RADIUS authentication. If you select RADIUS authentication, add the answering router as a RADIUS client on the Network Policy Server (NPS) server. For information about how to add the answering router as a RADIUS client. To use Windows Authentication 1. Open the Routing and Remote Access MMC snap-in.

21 2. Right-click the server name for which you want to configure authentication, and then click Properties. 3. On the Security tab, in Authentication provider, click Windows Authentication. To use RADIUS Authentication 1. Open the Routing and Remote Access MMC snap-in. 2. Right-click the server name for which you want to configure RADIUS authentication, and then click Properties. 3. On the Security tab, in Authentication provider, click RADIUS Authentication, and then click Configure. 4. In the RADIUS Authentication dialog box, click Add. 5. In the Add RADIUS Server dialog box, configure the settings for your RADIUS authentication server, and then click OK. Configure the accounting provider on the answering router Configure either Windows accounting or RADIUS accounting. If you select RADIUS accounting, add the answering router as a RADIUS client on the NPS server. For information about how to add the answering router as a RADIUS client. To use Windows Accounting 1. Open the Routing and Remote Access MMC snap-in. 2. Right-click the server name for which you want to configure Windows Accounting, and then click Properties. 3. On the Security tab, in Accounting provider, click Windows Accounting, and then click OK. To use RADIUS Accounting 1. Open the Routing and Remote Access MMC snap-in. 2. Right-click the server name for which you want to configure RADIUS accounting, and then click Properties. 3. On the Security tab, in Accounting provider, click RADIUS Accounting, and then click Configure. 4. In the RADIUS Accounting dialog box, click Add. 5. In the Add RADIUS Server dialog box, configure the settings for your RADIUS accounting server, and then click OK. Certificate-based Authentication Protocols

22 Certificates are digital documents that are issued by certification authorities (CAs), such as Active Directory Certificate Services (AD CS) or the VeriSign public CA. Certificates are used for network access authentication because they provide strong security for authenticating users and computers and eliminate the need for less secure password-based authentication methods. In this section Certificate types When you use certificate-based authentication methods, it is important to understand the following types of certificates and how they are used: CA certificate When present on client and server computers, tells the client or server that it can trust other certificates, such as certificates used for client or server authentication, that are issued by this CA. This certificate is required for all deployments of certificate-based authentication methods. Client computer certificate Issued to client computers by a CA and used when the client computer needs to prove its identity to a server running NPS during the authentication process. Server certificate Issued to NPS servers by a CA and used when the NPS server needs to prove its identity to client computers during the authentication process. User certificate Issued to individuals by a CA and typically distributed as a certificate that is embedded on a smart card. The certificate on the smart card is used, along with a smart card reader that is attached to the client computer, when individuals need to prove their identity to NPS servers during the authentication process.

INF204x Module 1, Lab 3 - Configure Windows 10 VPN

INF204x Module 1, Lab 3 - Configure Windows 10 VPN INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the

More information

Module 9. Configuring IPsec. Contents:

Module 9. Configuring IPsec. Contents: Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls

Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8 David LePage - Enterprise Solutions Architect, Firewalls Overview: Microsoft Windows version 7 introduced a

More information

20411D D Enayat Meer

20411D D Enayat Meer Lab A Module 8: Implementing Direct Access by Using the Getting Started Wizard Scenario: Recommended lab time is 240 Minutes {a complete class session is dedicated for this lab} Many users at A. Datum

More information

Course No. MCSA Days Instructor-led, Hands-on

Course No. MCSA Days Instructor-led, Hands-on MCSA: Windows Server 2012 Course No. MCSA2012 9 Days Instructor-led, Hands-on Introduction In this accelerated course nine day course, students will gain the skills and knowledge necessary to administer

More information

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15 APSCN VPN Settings for Windows 7 2 1. Creating a VPN Connection 2 2. Disconnecting the VPN 6 3. Connecting to an existing VPN Connection 7 APSCN VPN Settings for Windows XP 8 1. Creating a VPN Connection

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Managing and Maintaining Windows 8

Managing and Maintaining Windows 8 Managing and Maintaining Windows 8 Number: 070-688 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ All questions are taken from demo PDF files at: - Test4Actual - PassFine

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011 S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: November 10, 2011 Installing the Online Responder service... 1 Preparing the environment...

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

How to Integrate SmartDeploy with Windows Deployment Services

How to Integrate SmartDeploy with Windows Deployment Services How to Integrate SmartDeploy with Windows Deployment Services SmartDeploy Revised: March 2017 Integrating custom Windows Imaging Format (WIM) images into Windows Deployment Services (WDS) lets you take

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Hands-on lab In this experience, you will configure a

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise 70-643: Windows Server 2008 Applications Infrastructure Course 01 - Deploying Windows in the Enterprise Slide 1 Deploying Windows in the Enterprise How to deploy Windows in the 2008 Server Environment

More information

Copyright

Copyright This video will look at creating a relying party trust in Active Directory Federation Services. A relying party trust is required in order to create claims that will be used by the resource partner. In

More information

Exam Questions Demo Microsoft. Exam Questions

Exam Questions Demo   Microsoft. Exam Questions Microsoft Exam Questions 70-413 Designing and Implementing a Server Infrastructure Version:Demo 1. Your network contains an Active Directory domain. All servers run Windows Server 2012 R2. The domain contains

More information

Best Practices for Security Certificates w/ Connect

Best Practices for Security Certificates w/ Connect Application Note AN17038 MT AppNote 17038 (AN 17038) September 2017 Best Practices for Security Certificates w/ Connect Description: This Application Note describes the process and best practices for using

More information

Install and Configure FindIT Network Manager and FindIT Network Probe on Microsoft Hyper-V Manager

Install and Configure FindIT Network Manager and FindIT Network Probe on Microsoft Hyper-V Manager Install and Configure FindIT Network Manager and FindIT Network Probe on Microsoft Hyper-V Manager Objective The Cisco FindIT Network Management provides tools that help you easily monitor, manage, and

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Microsoft Certified Solutions Associate (MCSA)

Microsoft Certified Solutions Associate (MCSA) Microsoft Certified Solutions Associate (MCSA) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows

More information

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Course Content of MCSA ( Microsoft Certified Solutions Associate ) Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

MCSA Windows Server 2012

MCSA Windows Server 2012 MCSA Windows Server 2012 This course is developed for IT professionals who need to design, plan, implement, manage and support Microsoft Windows 2012 networks or who plan to take the related MCSE and MCSA

More information

How to Integrate SmartDeploy Enterprise with System Center Configuration Manager

How to Integrate SmartDeploy Enterprise with System Center Configuration Manager How to Integrate SmartDeploy Enterprise with System Center Configuration Manager SmartDeploy Revised: March 2017 Integrating SmartDeploy Enterprise with Microsoft System Center Configuration Manager expands

More information

MCSA Windows Server 2012

MCSA Windows Server 2012 MCSA Windows Server 2012 This Training Program prepares and enables learners to Pass Microsoft MCSA: Windows Server 2012 exams 1. MCSA: Windows Server 2012 / 70-410 Exam (Installing and Configuring Windows

More information

BitLocker: How to enable Network Unlock

BitLocker: How to enable Network Unlock BitLocker: How to enable Network Unlock 7 out of 9 rated this helpful - Rate this topic Published: August 15, 2012 Updated: August 15, 2012 Applies To: Windows Server 2012 Windows 8 and Windows Server

More information

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to

More information

Brocade Vyatta Network OS Remote Access IPsec VPN Configuration Guide, 5.2R1

Brocade Vyatta Network OS Remote Access IPsec VPN Configuration Guide, 5.2R1 CONFIGURATION GUIDE Brocade Vyatta Network OS Remote Access IPsec VPN Configuration Guide, 5.2R1 Supporting Brocade 5600 vrouter, VNF Platform, and Distributed Services Platform 53-1004736-01 24 October

More information

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Domain Verification for LCS Servers, page 1 Enable Port 5060 on LCS Server, page 1 Configure a LCS Static Route

More information

Module 4 Network Controller Estimated Time: 90 minutes

Module 4 Network Controller Estimated Time: 90 minutes Module 4 Network Controller Estimated Time: 90 minutes A. Datum Corporation intends to deploy and use Network Controller to manage network services and devices. You need to test a deployment of Network

More information

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810 Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH You can find the most up-to-date technical documentation

More information

What s in Installing and Configuring Windows Server 2012 (70-410):

What s in Installing and Configuring Windows Server 2012 (70-410): What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

More information

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.

More information

Managing Site-to-Site VPNs

Managing Site-to-Site VPNs CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide

Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager 2016 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps

More information

Installation, Storage, and Compute with Windows Server

Installation, Storage, and Compute with Windows Server Installation, Storage, and Compute with Windows Server 2016-740 Module 1: Installing, upgrading, and migrating servers and workloadst Introducing Windows Server 2016 Preparing and installing Nano Server

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

6421A: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

6421A: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure www.peaksolutions.com 6421A: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course 6421A: Five days; Instructor-Led Introduction This five-day instructor-led course provides

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Implementing Messaging Security for Exchange Server Clients

Implementing Messaging Security for Exchange Server Clients Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Client VPN OS Configuration. Android

Client VPN OS Configuration. Android Client VPN OS Configuration This article outlines instructions to configure a client VPN connection on commonly-used operating systems. For more information about client VPN, please refer to our documentation.

More information

Install and Manage Windows Nano Server 2016 Step by Step

Install and Manage Windows Nano Server 2016 Step by Step Complete Lab (V2.0) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Table of Contents Lab Objective... 3 Windows Nano Server 2016 overview... 3 Current infrastructure environment...

More information

L2TP IPsec Support for NAT and PAT Windows Clients

L2TP IPsec Support for NAT and PAT Windows Clients L2TP IPsec Support for NAT and PAT Windows Clients The L2TP IPsec Support for NAT and PAT Windows Clients feature allows mulitple Windows client to connect to an IPsec-enabled Cisco IOS Layer 2 Tunneling

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Brocade 5600 vrouter Remote Access IPsec VPN Configuration Guide, 5.0R1

Brocade 5600 vrouter Remote Access IPsec VPN Configuration Guide, 5.0R1 CONFIGURATION GUIDE Brocade 5600 vrouter Remote Access IPsec VPN Configuration Guide, 5.0R1 Supporting Brocade 5600 vrouter 5.0R1 53-1004509-01 15 August 2016 2016, Brocade Communications Systems, Inc.

More information

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

Hyper-V Rapid Recovery - Recovery in Place

Hyper-V Rapid Recovery - Recovery in Place Applicable Products These instructions apply to the following products: Barracuda Intronis Backup - MSP Hyper-V Rapid Recovery Restore Tabs The following table provides a description of the page features.

More information

Configure DHCP for Failover Step-by-Step.

Configure DHCP for Failover Step-by-Step. Configure DHCP for Failover Step-by-Step https://technet.microsoft.com/en-us/library/hh831385.aspx Dynamic Host Configuration Protocol (DHCP) failover in Windows Server 2012 is a new method for ensuring

More information

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide VPN Solutions for Zerto Virtual Replication to Azure IPSec Configuration Guide VERSION 1.0 AUGUST 2017 Table of Contents 1. Overview... 2 1.1 Use Cases... 2 2. Proofs of Concept and Lab Usage... 2 2.1

More information

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan Administering Windows Server 2012 R2 Exam 70-411 Patrick Regan Wiley Contents j Lesson 1: Deploying and Managing Server Images 1 Using Windows Deployment Services 2 Installing the Windows Deployment Services

More information

Windows Server 2016 MCSA Bootcamp

Windows Server 2016 MCSA Bootcamp Course Overview This course will provide experienced IT professionals who wish to either upgrade their skills for the purpose of certifying on Microsoft Windows Server 2016 or who wish to gain information

More information

Configuring Microsoft SCVMM

Configuring Microsoft SCVMM This chapter includes the following sections: About Microsoft SCVMM Dependencies, page 1 Installing Cisco Provider Plugin in SCVMM, page 2 Creating a VSEM Instance, page 2 Creating a Logical Switch in

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

MCSA Guide to Networking with Windows Server 2016, Exam

MCSA Guide to Networking with Windows Server 2016, Exam MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 7 Implementing Network Policy Server 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Microsoft Pro: Windows Server 2008, Server Administrator. Practice Test. Updated: Jan 19, 2010 Version

Microsoft Pro: Windows Server 2008, Server Administrator. Practice Test. Updated: Jan 19, 2010 Version Microsoft 70-646 70-646 Pro: Windows Server 2008, Server Administrator Practice Test Updated: Jan 19, 2010 Version QUESTION NO: 1 Microsoft 70-646: Practice Exam consists of 200 Windows Server 2008 servers.

More information

Secure Access Configuration Guide For Wireless Clients

Secure Access Configuration Guide For Wireless Clients ProCurve Networking Secure Access Configuration Guide For Wireless Clients Secure Access Configuration Guide For Wireless Clients Introduction... 2 Configuration Scenarios... 2 Required Network Services...

More information

Cisco ASA 5500 LAB Guide

Cisco ASA 5500 LAB Guide INGRAM MICRO Cisco ASA 5500 LAB Guide Ingram Micro 4/1/2009 The following LAB Guide will provide you with the basic steps involved in performing some fundamental configurations on a Cisco ASA 5500 series

More information

Microsoft Exam Designing and Implementing a Server Infrastructure Version: 19.0 [ Total Questions: 206 ]

Microsoft Exam Designing and Implementing a Server Infrastructure Version: 19.0 [ Total Questions: 206 ] s@lm@n Microsoft Exam 70-413 Designing and Implementing a Server Infrastructure Version: 19.0 [ Total Questions: 206 ] Topic break down Topic No. of Questions Topic 1: Contoso Ltd Case A 13 Topic 2: Proseware,

More information

App Orchestration 2.6

App Orchestration 2.6 Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To

More information

Deploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013

Deploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013 Deploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013 Windows 8.1 Hands-on lab In this lab, you will learn how to deploy a Windows 8.1 image with ConfigMgr 2012 R2 and MDT 2013. Produced by Deployment

More information

etoken Integration Guide etoken and ISA Server 2006

etoken Integration Guide etoken and ISA Server 2006 etoken Integration Guide etoken and ISA Server 2006 March 2007 Contact Information Support If you have any questions regarding this package, its documentation and content or how to obtain a valid software

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Q&A. DEMO Version

Q&A. DEMO Version Managing and Maintaining Windows 8 Q&A DEMO Version Copyright (c) 2013 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

Lab: Deploying Operating System Images Using SMS 2003

Lab: Deploying Operating System Images Using SMS 2003 Lab: Deploying Operating System Images Using SMS 2003 Objectives After completing this lab, you will be able to: Install the OS Deployment Feature Pack. Install USMT 2.6 to capture and restore user state

More information

Secure Mobile Access Module

Secure Mobile Access Module Secure Mobile Access Module Administration Guide Version 1.0 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800)

More information

Using vrealize Operations Tenant App as a Service Provider

Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:

More information

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator)

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator) Application Note 11 Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator) November 2015 Contents 1 Introduction... 5 1.1 Outline... 5 2 Assumptions... 6 2.1 Corrections...

More information

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Introduction Preparing the 3.2.X system for the upgrade Installing the BIG-IP version 9.2.3 software Licensing the software using

More information

3.0. Manual and. Application note. USB Adapter

3.0. Manual and. Application note. USB Adapter 3.0 USB Adapter Manual and Application note Index INTRODUCTION 1 CHAPTER 1 Package 2 Features 2 Bluetooth profile support 2 Drivers support 3 CHAPTER 2 Setup for Windows 98SE/ME/2000/XP 4 CHAPTER 3 Application

More information

Parallels Virtuozzo Containers 4.6 for Windows

Parallels Virtuozzo Containers 4.6 for Windows Parallels Parallels Virtuozzo Containers 4.6 for Windows Deploying Microsoft Clusters Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o

More information

How to Integrate SmartDeploy Enterprise with Windows Deployment Services

How to Integrate SmartDeploy Enterprise with Windows Deployment Services How to Integrate SmartDeploy Enterprise with Windows Deployment Services Prowess Consulting, LLC Published: March, 2010 Abstract Integrating custom Windows Imaging Format (WIM) images into Windows Deployment

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Installation Guide. Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3

Installation Guide. Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3 Installation Guide Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3 Contents Preface.......................................................................v About this guide..............................................................

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

EML10 Best Practces for Implementing Deployment Solution Hands-On Lab

EML10 Best Practces for Implementing Deployment Solution Hands-On Lab EML10 Best Practces for Implementing Deployment Solution Hands-On Lab Description This hands-on lab demonstrates the steps necessary to configure and use the latest version of Deployment Solution. You

More information

Extend On-Premises Windows Server 2016 Active Directory to Azure VM Complete Lab (V1.1)

Extend On-Premises Windows Server 2016 Active Directory to Azure VM Complete Lab (V1.1) Extend On-Premises Windows Server 2016 Active Directory to Azure VM Complete Lab (V1.1) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Contents Lab Objective... 3 Existing Active

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

The information in this document is based on these software and hardware versions:

The information in this document is based on these software and hardware versions: Contents Introduction Prerequisites Requirements Components Used Configure Generate Certificate Signed Request Sign the Certificate on the Certificate Authority Install the Certificate Copy the certificate

More information

Configuring the VPN Client

Configuring the VPN Client Configuring the VPN Client This chapter explains how to configure the VPN Client. To configure the VPN Client, you enter values for a set of parameters known as a connection entry. The VPN Client uses

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information