Introduction |
|
1 | (4) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
PART 1 GETTING STARTED WITH NETWORKING |
|
|
5 | (68) |
|
|
7 | (14) |
|
|
8 | (3) |
|
Why Bother with a Network? |
|
|
11 | (2) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Dedicated Servers and Peers |
|
|
13 | (2) |
|
What Makes a Network Tick? |
|
|
15 | (1) |
|
It's Not a Personal Computer Anymore! |
|
|
16 | (1) |
|
The Network Administrator |
|
|
17 | (1) |
|
What Have They Got That You Don't Got? |
|
|
18 | (3) |
|
Chapter 2 Configuring Windows and Mac Clients |
|
|
21 | (16) |
|
Configuring Windows Network Connections |
|
|
22 | (5) |
|
Joining a Windows Computer to a Domain |
|
|
27 | (2) |
|
Configuring Mac Network Settings |
|
|
29 | (4) |
|
Joining a Mac Computer to a Domain |
|
|
33 | (4) |
|
Chapter 3 Life on the Network |
|
|
37 | (20) |
|
Distinguishing between Local Resources and Network Resources |
|
|
38 | (1) |
|
|
38 | (2) |
|
Logging on to the Network |
|
|
40 | (2) |
|
Understanding Shared Folders |
|
|
42 | (1) |
|
Four Good Uses for a Shared Folder |
|
|
43 | (2) |
|
Store files that everybody needs |
|
|
43 | (1) |
|
|
44 | (1) |
|
Make a temporary resting place for files on their way to other users |
|
|
44 | (1) |
|
Back up your local hard drive |
|
|
45 | (1) |
|
Oh, the Network Places You'll Go |
|
|
45 | (2) |
|
|
47 | (3) |
|
|
50 | (5) |
|
|
51 | (1) |
|
Printing to a network printer |
|
|
52 | (1) |
|
Playing with the print queue |
|
|
53 | (2) |
|
|
55 | (2) |
|
Chapter 4 More Ways to Use Your Network |
|
|
57 | (16) |
|
|
57 | (1) |
|
Enabling File and Printer Sharing |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (2) |
|
Using Microsoft Office on a Network |
|
|
64 | (4) |
|
|
64 | (1) |
|
Using workgroup templates |
|
|
65 | (2) |
|
Networking an Access database |
|
|
67 | (1) |
|
Working with Offline Files |
|
|
68 | (5) |
|
PART 2 DESIGNING YOUR NETWORK |
|
|
73 | (92) |
|
Chapter 5 Planning a Network |
|
|
75 | (12) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (3) |
|
|
77 | (2) |
|
Programs that gather information for you |
|
|
79 | (1) |
|
To Dedicate or Not to Dedicate: That Is the Question |
|
|
80 | (3) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Choosing a Server Operating System |
|
|
83 | (1) |
|
Planning the Infrastructure |
|
|
84 | (1) |
|
|
84 | (3) |
|
Chapter 6 Dealing with TCP/IP |
|
|
87 | (24) |
|
|
88 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (3) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (4) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
Private and public addresses |
|
|
98 | (1) |
|
Understanding Network Address Translation |
|
|
98 | (1) |
|
Configuring Your Network for DHCP |
|
|
99 | (5) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Managing a Windows Server 2019 DHCP Server |
|
|
104 | (1) |
|
Configuring a Windows DHCP Client |
|
|
105 | (1) |
|
|
106 | (3) |
|
|
106 | (2) |
|
Fully qualified domain names |
|
|
108 | (1) |
|
Working with the Windows DNS Server |
|
|
109 | (1) |
|
Configuring a Windows DNS Client |
|
|
110 | (1) |
|
Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches |
|
|
111 | (22) |
|
|
112 | (2) |
|
|
114 | (12) |
|
|
116 | (1) |
|
|
117 | (1) |
|
To shield or not to shield |
|
|
117 | (1) |
|
|
118 | (1) |
|
Sometimes solid, sometimes stranded |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
Pinouts for twisted-pair cables |
|
|
121 | (1) |
|
|
122 | (2) |
|
|
124 | (1) |
|
Wall jacks and patch panels |
|
|
124 | (2) |
|
|
126 | (4) |
|
Comparing managed and unmanaged switches |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Looking at distribution switches and access switches |
|
|
129 | (1) |
|
Powering Up with Power over Ethernet |
|
|
130 | (1) |
|
Looking at Three Types of Network Rooms |
|
|
131 | (2) |
|
Chapter 8 Setting Up a Wireless Network |
|
|
133 | (22) |
|
Diving into Wireless Networking |
|
|
134 | (1) |
|
A Little High School Electronics |
|
|
135 | (4) |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
137 | (2) |
|
Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards |
|
|
139 | (1) |
|
|
140 | (1) |
|
Using Wireless Network Adapters |
|
|
141 | (1) |
|
Setting Wireless Access Points |
|
|
142 | (2) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Configuring a Wireless Access Point |
|
|
145 | (2) |
|
Basic configuration options |
|
|
146 | (1) |
|
|
146 | (1) |
|
Connecting to a Wireless Network |
|
|
147 | (2) |
|
Paying Attention to Wireless Network Security |
|
|
149 | (6) |
|
Chapter 9 Connecting to the Internet |
|
|
155 | (10) |
|
Connecting to the Internet |
|
|
155 | (4) |
|
Connecting with cable or DSL |
|
|
156 | (1) |
|
Connecting with high-speed private lines |
|
|
157 | (1) |
|
Sharing an Internet connection |
|
|
158 | (1) |
|
Securing Your Connection with a Firewall |
|
|
159 | (4) |
|
|
159 | (2) |
|
Comparing residential gateways to firewall routers |
|
|
161 | (1) |
|
Looking at the built-in Windows firewall |
|
|
161 | (2) |
|
Providing a Backup Internet Connection |
|
|
163 | (2) |
|
PART 3 WORKING WITH SERVERS |
|
|
165 | (86) |
|
Chapter 10 Virtualizing Your Network |
|
|
167 | (28) |
|
Understanding Virtualization |
|
|
167 | (2) |
|
Understanding Hypervisors |
|
|
169 | (2) |
|
Understanding Virtual Disks |
|
|
171 | (2) |
|
Understanding Network Virtualization |
|
|
173 | (1) |
|
Looking at the Benefits of Virtualization |
|
|
174 | (2) |
|
Choosing Virtualization Hosts |
|
|
176 | (1) |
|
Understanding Windows Server 2019 Licensing |
|
|
176 | (2) |
|
|
178 | (2) |
|
Understanding the Hyper-V hypervisor |
|
|
178 | (1) |
|
Understanding virtual disks |
|
|
179 | (1) |
|
|
180 | (1) |
|
Getting Familiar with Hyper-V |
|
|
181 | (1) |
|
Creating a Virtual Switch |
|
|
182 | (2) |
|
|
184 | (4) |
|
Creating a Virtual Machine |
|
|
188 | (4) |
|
Installing an Operating System |
|
|
192 | (3) |
|
Chapter 11 Setting Up a Windows Server |
|
|
195 | (18) |
|
Planning a Windows Server Installation |
|
|
196 | (2) |
|
Checking system requirements |
|
|
196 | (1) |
|
Reading the release notes |
|
|
196 | (1) |
|
Considering your licensing options |
|
|
196 | (1) |
|
Deciding your TCP/IP configuration |
|
|
197 | (1) |
|
Choosing workgroups or domains |
|
|
197 | (1) |
|
|
198 | (5) |
|
Adding Server Roles and Features |
|
|
203 | (5) |
|
|
208 | (5) |
|
Chapter 12 Managing Windows User Accounts |
|
|
213 | (18) |
|
Understanding How Active Directory Is Organized |
|
|
214 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
Understanding Windows User Accounts |
|
|
216 | (1) |
|
Local accounts versus domain accounts |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (3) |
|
|
220 | (5) |
|
Changing the user's contact information |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
223 | (1) |
|
Restricting access to certain computers |
|
|
223 | (1) |
|
Setting the user's profile information |
|
|
224 | (1) |
|
|
225 | (1) |
|
Disabling and Enabling User Accounts |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (3) |
|
|
227 | (1) |
|
Adding a member to a group |
|
|
228 | (2) |
|
|
230 | (1) |
|
Chapter 13 Managing Network Storage |
|
|
231 | (20) |
|
Understanding Disk Storage |
|
|
231 | (6) |
|
|
231 | (3) |
|
Solid state drives to the rescue! |
|
|
234 | (1) |
|
|
234 | (2) |
|
Three ways to attach disks to your servers |
|
|
236 | (1) |
|
|
237 | (3) |
|
Understanding permissions |
|
|
237 | (2) |
|
|
239 | (1) |
|
Managing Your File Server |
|
|
240 | (11) |
|
Using the New Share Wizard |
|
|
241 | (4) |
|
Sharing a folder without the wizard |
|
|
245 | (2) |
|
|
247 | (4) |
|
PART 4 MANAGING YOUR NETWORK |
|
|
251 | (66) |
|
Chapter 14 Welcome to Network Management |
|
|
253 | (10) |
|
What a Network Administrator Does |
|
|
254 | (1) |
|
Choosing the Part-Time Administrator |
|
|
255 | (1) |
|
The Three "Ups" of Network Management |
|
|
256 | (1) |
|
|
257 | (1) |
|
Acquiring Software Tools for Network Administrators |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Helpful Bluffs and Excuses |
|
|
261 | (2) |
|
Chapter 15 Supporting Your Users |
|
|
263 | (18) |
|
Establishing the Help Desk's Charter |
|
|
264 | (1) |
|
|
265 | (2) |
|
Deciding How to Communicate with Users |
|
|
267 | (1) |
|
|
268 | (7) |
|
Enabling Remote Assistance |
|
|
269 | (1) |
|
Inviting someone to help you via a Remote Assistance session |
|
|
270 | (3) |
|
Responding to a Remote Assistance invitation |
|
|
273 | (2) |
|
Creating a Knowledge Base |
|
|
275 | (1) |
|
Creating a Self-Service Help Portal |
|
|
275 | (1) |
|
Using Satisfaction Surveys |
|
|
276 | (2) |
|
Tracking Help Desk Performance |
|
|
278 | (1) |
|
Using Help Desk Management Software |
|
|
279 | (2) |
|
Chapter 16 Using Group Policy |
|
|
281 | (12) |
|
Understanding Group Policy |
|
|
281 | (1) |
|
Enabling Group Policy Management on Windows Server 2019 |
|
|
282 | (1) |
|
Creating Group Policy Objects |
|
|
283 | (6) |
|
Filtering Group Policy Objects |
|
|
289 | (3) |
|
Forcing Group Policy Updates |
|
|
292 | (1) |
|
Chapter 17 Managing Software Deployment |
|
|
293 | (12) |
|
Understanding Software Licenses |
|
|
294 | (3) |
|
|
297 | (1) |
|
Deploying Network Software |
|
|
298 | (4) |
|
Deploying software manually |
|
|
298 | (1) |
|
Running Setup from a network share |
|
|
299 | (1) |
|
|
300 | (1) |
|
Creating an administrative installation image |
|
|
301 | (1) |
|
Pushing out software with Group Policy |
|
|
302 | (1) |
|
Keeping Software Up to Date |
|
|
302 | (3) |
|
Chapter 18 Managing Mobile Devices |
|
|
305 | (12) |
|
The Many Types of Mobile Devices |
|
|
306 | (1) |
|
Considering Security for Mobile Devices |
|
|
307 | (1) |
|
|
308 | (6) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Integrating iOS devices with Exchange |
|
|
309 | (2) |
|
Configuring an iOS device for Exchange email |
|
|
311 | (3) |
|
|
314 | (3) |
|
Looking at the Android OS |
|
|
314 | (1) |
|
Perusing Android's core applications |
|
|
315 | (1) |
|
Integrating Android with Exchange |
|
|
316 | (1) |
|
PART 5 SECURING YOUR NETWORK |
|
|
317 | (68) |
|
Chapter 19 Welcome to Cybersecurity Network |
|
|
319 | (18) |
|
|
320 | (1) |
|
The Three Pillars of Cybersecurity |
|
|
321 | (1) |
|
Two Approaches to Security |
|
|
322 | (1) |
|
Physical Security: Locking Your Doors |
|
|
323 | (1) |
|
|
324 | (4) |
|
Obfuscating your usernames |
|
|
324 | (1) |
|
|
325 | (1) |
|
Generating passwords For Dummies |
|
|
326 | (2) |
|
Secure the Administrator account |
|
|
328 | (1) |
|
|
328 | (6) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
Permissions (who gets what) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Securing the Human Firewall |
|
|
334 | (3) |
|
Chapter 20 Hardening Your Network |
|
|
337 | (12) |
|
|
337 | (2) |
|
The Many Types of Firewalls |
|
|
339 | (4) |
|
|
339 | (2) |
|
Stateful packet inspection (SPI) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (3) |
|
|
343 | (2) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (3) |
|
Chapter 21 Securing Your Email |
|
|
349 | (12) |
|
|
350 | (1) |
|
Sampling the Many Flavors of Spam |
|
|
351 | (1) |
|
|
352 | (1) |
|
Understanding Spam Filters |
|
|
353 | (3) |
|
Looking at Three Types of Antispam Software |
|
|
356 | (3) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Cloud-based antispam services |
|
|
358 | (1) |
|
|
359 | (2) |
|
Chapter 22 Backing Up Your Data |
|
|
361 | (16) |
|
3-2-1: The Golden Rule of Backups |
|
|
361 | (2) |
|
How Often Should You Back Up Your Data? |
|
|
363 | (1) |
|
Choosing Where to Back Up Your Data |
|
|
364 | (1) |
|
Establishing Two Key Backup Objectives |
|
|
365 | (1) |
|
|
366 | (1) |
|
Understanding Backup Software |
|
|
367 | (1) |
|
Examining File-Based Backups |
|
|
368 | (3) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
Backup and Virtualization |
|
|
371 | (2) |
|
Verifying Tape Reliability |
|
|
373 | (1) |
|
Keeping Backup Equipment Clean and Reliable |
|
|
374 | (1) |
|
|
375 | (2) |
|
Chapter 23 Planning for Disaster |
|
|
377 | (8) |
|
Assessing Different Types of Disasters |
|
|
378 | (3) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Analyzing the Impact of a Disaster |
|
|
381 | (1) |
|
Developing a Business Continuity Plan |
|
|
382 | (1) |
|
|
383 | (2) |
|
PART 6 MORE WAYS TO NETWORK |
|
|
385 | (34) |
|
Chapter 24 Accommodating Remote Users |
|
|
387 | (12) |
|
|
388 | (1) |
|
Using a Virtual Private Network |
|
|
389 | (4) |
|
|
390 | (1) |
|
Understanding VPN servers and clients |
|
|
391 | (2) |
|
Connecting with Remote Desktop Connection |
|
|
393 | (6) |
|
Enabling Remote Desktop Connection |
|
|
394 | (1) |
|
|
395 | (2) |
|
Using keyboard shortcuts for Remote Desktop |
|
|
397 | (2) |
|
Chapter 25 Life in Cloud City |
|
|
399 | (10) |
|
Introducing Cloud Computing |
|
|
400 | (1) |
|
Looking at the Benefits of Cloud Computing |
|
|
401 | (1) |
|
Detailing the Drawbacks of Cloud Computing |
|
|
402 | (1) |
|
Examining Three Basic Kinds of Cloud Services |
|
|
403 | (2) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
Public Clouds versus Private Clouds |
|
|
405 | (1) |
|
Introducing Some of the Major Cloud Providers |
|
|
406 | (2) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (10) |
|
|
409 | (2) |
|
What Are the Benefits of Hybrid Cloud? |
|
|
411 | (2) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (3) |
|
|
413 | (1) |
|
|
414 | (2) |
|
Looking at Hybrid Cloud Virtualization Platforms |
|
|
416 | (3) |
|
|
419 | (22) |
|
Chapter 27 Ten Networking Commandments |
|
|
421 | (6) |
|
I Thou Shalt Back Up Thy Data Religiously |
|
|
421 | (1) |
|
II Thou Shalt Protect Thy Network from Infidels |
|
|
422 | (1) |
|
III Thou Shalt Train Up Thy Users in the Ways of Safe Computing |
|
|
422 | (1) |
|
IV Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files |
|
|
423 | (1) |
|
V Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing |
|
|
423 | (1) |
|
VI Thou Shalt Not Covet Thy Neighbor's Network |
|
|
423 | (1) |
|
VII Thou Shalt Not Take Down Thy Network without Proper Notification |
|
|
424 | (1) |
|
VIII Thou Shalt Keep an Adequate Supply of Spare Parts |
|
|
424 | (1) |
|
IX Thou Shalt Not Steal Thy Neighbor's Program without a License |
|
|
424 | (1) |
|
X Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone |
|
|
425 | (2) |
|
Chapter 28 Ten Big Network Mistakes |
|
|
427 | (8) |
|
|
427 | (1) |
|
Turning Off or Restarting a Server Computer While Users Are Logged On |
|
|
428 | (1) |
|
Deleting Important Files on the Server |
|
|
429 | (1) |
|
Copying a File from the Server, Changing It, and Then Copying It Back |
|
|
429 | (1) |
|
Sending Something to the Printer Again Just Because It Didn't Print the First Time |
|
|
430 | (1) |
|
Assuming That the Server Is Safely Backed Up |
|
|
430 | (1) |
|
Connecting to the Internet without Considering Security Issues |
|
|
430 | (1) |
|
Plugging in a Wireless Access Point without Asking |
|
|
431 | (1) |
|
Thinking You Can't Work Just Because the Network Is Down |
|
|
431 | (1) |
|
Running Out of Space on a Server |
|
|
432 | (1) |
|
Always Blaming the Network |
|
|
433 | (2) |
|
Chapter 29 Ten Things You Should Keep in Your Closet |
|
|
435 | (6) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
The Complete Documentation of the Network on Tablets of Stone |
|
|
438 | (1) |
|
The Network Manuals and Disks |
|
|
438 | (1) |
|
|
439 | (2) |
Index |
|
441 | |