Business Model - Create and Thrustling Group Policy in Windows Vista

Size: px
Start display at page:

Download "Business Model - Create and Thrustling Group Policy in Windows Vista"

Transcription

1 Bandwidth with Policy-Based Quality of Service Page 1 of 11 Managing Windows Vista and Windows Server Longhorn Network Bandwidth with Policy-Based Quality of Service Abstract Policy-based Quality of Service (QoS) in Windows Vista and Windows Server Longhorn enables administrators, via Group Policy, to create flexible rules that can prioritize or throttle outbound network traffic without changes to existing applications and in conjunction with your existing network routing infrastructure. QoS policies can be applied based on any, or all, of the following conditions: sending application, source or destination IP address, protocol, and source or destination port. Additionally, QoS policies can be uniquely defined for sets of user or computer accounts through policy deployment. You will get hands-on experience in creating and managing QoS policies. Note that this lab is built using BETA software. Some steps in this lab document may not function as expected at all times. Objectives At the end of this lab, you will be able to: Adjust the priority of network traffic based on application name, ip address, port and protocol Implement QoS controls using Group Policy Monitor QoS controls to ensure they are functioning Scenario The company is implementing a mission-critical line-of-business application that requires a guaranteed amount of network bandwidth. Large file transfers, however, are starving out all other traffic on the LAN. The application was not originally designed to be QoS aware, and is not capable of reserving bandwidth on its own. Your LAN switches do not have QoS flow-control capabilities, although your routers do. You need to increase the application s priority while lowering the priority of all other traffic. You also need to restrict the flow of file transfer traffic on the LAN so that the application has enough bandwidth to operate. These settings must be applied at the transmitting source, by the client operating system.

2 Bandwidth with Policy-Based Quality of Service Page 2 of 11 Prerequisites You should be familiar with the following products or technologies before you begin this lab: Traffic shaping and quality of service, specifically the use of DSCP (Differentiated Services Code Point) NetBIOS and FTP file transfer protocols Active Directory Group Policy Objects Performance Monitor, Network Monitor, gpresult.exe and gpupdate.exe Duration This lab is 60 minutes in duration. Background Information VistaLabs_DC1: Windows Server 2003 Domain Controller/file server/ftp server, preconfigured with Network Monitor VistaLabs_Client1: Windows Vista client workstation For More Information Microsoft TechNet - Policy-based QoS Architecture in Windows Server "Longhorn" and Windows Vista Microsoft Download Center - Quality of Service in Windows Server "Longhorn" and Windows Vista 807e-97e8a0cb9703&displaylang=en Support Information This lab is built and supported by HynesITe, Inc. See what s possible at

3 Bandwidth with Policy-Based Quality of Service Page 3 of 11 Exercise 1 Throttle File Transfer Traffic with the QoS Policy Wizard In this exercise you will identify how much bandwidth a client NetBIOS file transfer consumes. You will then use the Windows Vista QoS Policy Wizard to create a policy to limit the amount of bandwidth clients can use when uploading to the file server. You will link this policy to an Active Directory organizational unit that contains the client computer account. You will then perform the test upload again and observe the results, verifying that the policy only applies to client NetBIOS file transfers. Prepare the lab In this task you will move the Client1 computer account into the Client Computers organizational unit in Active Directory. Note: Perform this Exercise on DC1. 1. Log on to DC1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, click Run. 3. In the Run dialog box type dsa.msc then click OK. 4. In the Active Directory Users and Computers console, under contoso.com domain, click the Computers container. 5. In the right-hand pane, right click Client1 and then click Move 6. In the Move dialog box, under contoso.com domain, expand the Managed Objects expand Client Computers and select the Desktops organizational unit and then click OK. 7. Close Active Directory Users and Computers. 8. Log off of DC1. Create a custom administrative tool In this task you will add Performance Diagnostic Tools to a customized console to facilitate the lab exercises. Note: Perform this Exercise on Client1. 1. Log on to Client1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, in Start Search type mmc then press ENTER. 3. On the File menu, click Add/Remove Snap-in. 4. Under Available snap-ins: select Performance Diagnostic Console. Click Add and then click OK. 5. In the Console1 window, expand Performance Diagnostics (Local)\Monitoring Tools and select Performance Monitor. 6. In the middle pane, right click the white graph area, and then click Add Counters.

4 Bandwidth with Policy-Based Quality of Service Page 4 of In the Add Counters dialog box, under Available Counters, expand Network Interface, and then select Bytes Sent/sec. You will have to scroll up to find Network Interface. 8. In the Instances of selected object scroll box, select Intel Based PCI Fast Ethernet Adapter (Emulated), click Add and then click OK. 9. In the Performance Monitor window, in the middle pane at the bottom, select the Bytes Sent/sec counter to highlight it and activate the Last and Maximum statistics boxes. Notice the little scroll buttons to the right of the counters. You may need to scroll down to see the Bytes Sent/sec counter. 10. In the Console1 menu, click File and then click Save As. 11. In the Save As dialog box, in the Save in: drop-down box select Desktop. In the File Name: text box type My Console and then click Save. 12. Leave My Console open and maximized. You should now have a Performance Monitor console shortcut on your desktop. Perform a test upload In this task you will map a drive to the file share on DC1 and perform a netbios test upload, using the monitoring tools to observe network utilization. 1. On the Client1 Start menu, in Start Search type cmd then press ENTER. 2. In the Command Prompt window, type net use x: \\DC1\files /persistent:yes then press ENTER. 3. In the Command Prompt window type copy /y C:\Windows\Media\*.wav x: then press ENTER to start uploading the *.wav files. 4. Quickly toggle back to My Console, and select Performance Monitor to observe the Last and Maximum number of Bytes Sent/sec being reported. 5. In My Console, select Performance Diagnostic (Local). 6. In the Resource Overview pane, observe the moving Network graph, and repeat Step 3 to cross-reference your findings with the Performance Monitor report. In our test lab, Performance Monitor reported a maximum rate of approximately 2 megabytes/sec. Performance Diagnostic Tools reported a peak rate in excess of 10 megabits/sec. Your numbers may be different. 7. Close My Console. If prompted to save changes, click No. 8. Close the Command Prompt. Create and deploy a bandwidth-throttling Group Policy In this task you will use the Group Policy Object Editor to create a policy to throttle netbios file transfer bandwidth. You will then use Group Policy Manager to link the policy to the Active Directory organizational unit that contains the client computer account.

5 Bandwidth with Policy-Based Quality of Service Page 5 of On the Client1 Desktop, launch My Console. 2. In the My Console window, click File, and then click Add/Remove Snap-in. 3. In the Add/Remove Snap-in dialog box, select Group Policy Management, click Add, and then click OK. 4. In the My Console window, expand Group Policy Management, expand Forest: contoso.com, expand Domains, expand contoso.com. 5. Under contoso.com, right click Group Policy Objects and click New. 6. In the New GPO dialog box, type Bandwidth Throttling Policy and click OK. 7. Under contoso.com, expand Group Policy Objects. 8. Right click Bandwidth Throttling Policy and click Edit. 9. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration. 10. Right click Policy based QoS and create a new policy with the following information and then click Finish.: Policy Name: File Transfer Bandwidth Throttling Specify DSCP Value: 0 Specify throttle Rate: 64 KBps This QoS policy applies to: All Applications This QoS policy applies to: Any source IP address Only the following destination IP address: Select the protocol this QoS policy applies to: TCP Specify the source port number: From any source port Specify the destination port number: Close the Group Policy Object Editor. 12. In My Console, under the contoso.com domain, expand the Managed Objects organizational unit, and then expand the Client Computers organizational unit. 13. Right click the Desktops organizational unit, then click Link an Existing GPO. 14. Select Bandwidth Throttling Policy then click OK. 15. Close My Console. If prompted to Save changes, click Yes. Perform a new test In this task you will apply your new bandwidth throttling group policy and perform a new file transfer test, comparing the results to your earlier test. You will also verify the selectiveness of the policy by performing another file transfer using a different protocol. 1. On the Client1 Desktop, on the Start menu, in Start Search type cmd and then press ENTER. 2. In the Command Prompt window type gpupdate /force /target:computer, then press ENTER. Wait for the message that the refresh has completed successfully.

6 Bandwidth with Policy-Based Quality of Service Page 6 of Type gpresult then press ENTER to verify that the policy has been applied. 4. Scroll through the results. Under COMPUTER SETTINGS, under Applied Group Policy Objects you should see the policies listed in this order: 1. Bandwidth Throttling Policy 2. Default Domain Policy 5. In the Command Prompt window, type copy /y C:\Windows\Media\*.wav x: then press ENTER to start uploading the *.wav files. 6. On the Desktop quickly launch My Console and select Performance Monitor to observe the results. Has the bandwidth been throttled back to approximately 64 Kilobytes per second? 7. The answer should be yes. 8. In My Console select Performance Diagnostics (Local). 9. In the Resource Overview pane, observe the moving Network graph. Crossreference your findings with the Performance Monitor report. If necessary, repeat Step 3 to re-capture statistics. Wait until the file transfer is complete. 10. Verify that the bandwidth throttling policy does not apply to other kinds of traffic. In the Command Prompt window, type ftp When prompted for a username, type anonymous. When prompted for a password, press ENTER. 12. Type bin then press ENTER. 13. Type prompt then press ENTER. 14. Type mput c:\windows\media\*.wav then press ENTER 15. If Windows Security Alert asks if you want to keep blocking this program click Unblock. 16. Quickly switch to My Console, Performance Monitor, and then to Performance Diagnostics (Local) to observe the results. If necessary, repeat Steps 7 11 to recapture statistics. 17. Does the Bandwidth Throttling Policy also apply to an ftp upload? 18. The answer should be no, because ftp uses tcp port 20 to transfer data. 19. Close all windows. If prompted to Save My Console, click No. 20. Log off of Client1.

7 Bandwidth with Policy-Based Quality of Service Page 7 of 11 Exercise 2 Set the DSCP Value of a Line-Of-Business Application Using the QoS Policy Wizard Windows Vista QoS Policy Wizard gives the administrator new flexibility to manage traffic from the source. In this exercise, you will capture network traffic generated by a non-qos aware application named Newapp.exe to observe its default IP Type of Service priority setting. You will then create a group policy changing the differentiated services code point (DSCP) value of Newapp.exe to a high priority value. The local router can then use this value to place Newapp.exe s traffic in a high-priority queue. You will also create a new group policy setting the priority of all other traffic to a low best effort value. You will link these policies to the Client Computers organizational unit where the client computer account resides. You will then use Network Monitor to verify the results. Measure the default QoS setting for Newapp.exe traffic In this task you will use Network Monitor on DC1 to capture traffic generated by a line-ofbusiness application named Newapp.exe. You will examine the packets to determine the default priority value in the IP header s Type of Service field. Note: Perform these steps on DC1. 1. Log on to DC1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, click Administrative Tools, and then click Network Monitor. Note: If a message box pops up asking for a specific network, click OK. 3. In the Select a Network dialog box, expand Local Computer, click Internal, and then click OK. 4. In the Network Monitor window click Capture, and then click Start. 5. Leave Network Monitor running. Note: Perform these steps on Client1. 6. Log on to Client1 as administrator@contoso.com with a password of P@ssw0rd. 7. On the Start menu, in Start Search type cmd then press ENTER. 8. In the Command Prompt window type c:\testnewapp.cmd then press ENTER. For the purposes of our lab, testnewapp.cmd is a batch file that runs newapp.exe (a renamed copy of ftp.exe) 9. If Windows Security Alert notifies you that it is blocking this program, click Unblock. 10. The batch file tells you that newapp is running. When prompted, press any key. Wait until newapp is finished. Note: Perform these steps on DC1.

8 Bandwidth with Policy-Based Quality of Service Page 8 of On DC1 in the Network Monitor window, click Capture, and then click Stop and View. 12. In the Capture: 1 (Summary) Window, scroll down and double click any frame where: Dst Mac Address = LOCAL, Protocol = FTP, Description = Data Transfer to Server 13. In the middle pane, expand IP: Protocol = TCP. 14. Expand IP: Type of Service. 15. What is the IP Precedence? 16. The answer should be Routine, with a value that looks like this: IP: 000. = Precedence Routine 17. Close Network Monitor. If you are prompted to Save the capture, click No. Create and deploy the DSCP policies In this task you will use the Group Policy Object Editor to create a policy that will change the DSCP value of Newapp s traffic from a low best effort to a high priority. You will also create a new policy setting all other traffic to best effort. You will link both policies to the Active Directory organizational unit that contains the client computer account. You will then refresh the policy on the client. Note: Perform these steps on Client1. 1. On the Client1 Desktop launch My Console. 2. In the My Console window, expand Group Policy Management, expand Forest: contoso.com, expand Domains, and then expand contoso.com. 3. Under contoso.com right click Group Policy Objects, and then click New. 4. In the New GPO dialog box, type Newapp DSCP Policy, and then click OK. 5. Under contoso.com, expand Group Policy Objects, right click Newapp DSCP Policy, and then click Edit. 6. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration. 7. Under Windows Settings, right click Policy-based QoS and create a new policy with the following information and then click Finish: Policy Name: DSCP for Newapp Specify DSCP Value: 18 Specify Throttle Rate: unselected Only applications with this executable name: newapp.exe This QoS policy applies to: Any source IP address This QoS policy applies to: Any Destination IP Address Specify the protocol this QoS policy applies to: TCP

9 Bandwidth with Policy-Based Quality of Service Page 9 of 11 Specify the source port number: From any source port Specify the destination port number: To any destination port 8. Close the Group Policy Object Editor. 9. In the My Console window under Group Policy Management, under contoso.com right click Group Policy Objects and then click New. 10. In the New GPO dialog box, type Default DSCP Policy, and then click OK. 11. Under Group Policy Objects, right click Default DSCP Policy, and then click Edit. 12. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration 13. Under Windows Settings, right click Policy-based QoS and create a new policy with the following information and then click Finish: Policy Name: DSCP for All Other Traffic Specify DSCP Value: 0 Specify throttle Rate: unselected This QoS policy applies to: All applications This QoS policy applies to: Any source IP address This QoS policy applies to: Any Destination IP Address Select the protocol this QoS policy applies to: TCP Specify the source port number: From any source port Specify the destination port number: To any destination port 14. Close the Group Policy Object Editor. 15. In the My Console window, under Group Policy Management, under the contoso.com domain, expand the Managed Objects organizational unit, and then expand the Client Computers organizational unit. 16. Right click the Desktops organizational unit, then click Link an Existing GPO. 17. Select Newapp DSCP Policy then click OK. 18. Right click the Desktops organizational unit again and click Link an Existing GPO. 19. Select the Default DSCP Policy then click OK. 20. Click the Desktops organizational unit to highlight it. 21. In the middle Desktops pane, in the Linked Group Policy Objects tab, use the up/down arrow buttons to the left of the list to arrange the policies in the following Link Order: 1. Newapp DSCP Policy 2. Bandwidth Throttling Policy (created in the previous exercise) 3. Default DSCP Policy It is very important that the Newapp DSCP Policy be at the top of the list, with the Default DSCP Policy at the bottom. If they are not in this order, the test will not work as expected. If you no longer have the Bandwidth Throttling Policy, that s ok.

10 Bandwidth with Policy-Based Quality of Service Page 10 of Open the Command Prompt. 23. Type gpupdate /force /target:computer, then press ENTER. Wait for the message that the refresh has completed successfully 24. Type gpresult then press ENTER to verify that the policies have been applied. 25. Scroll through the results. Under COMPUTER SETTINGS, under Applied Group Policy Objects you should see the policies listed in this order: 1. Newapp DSCP Policy 2. Bandwidth Throttling Policy (created in the previous exercise) 3. Default DSCP Policy 4. Default Domain Policy 26. Close all windows Perform a new test In this task you will perform a new file transfer test, comparing the results to your earlier test. You will then verify the selectiveness of the policy by performing another file transfer using a different protocol. Note: Perform these steps on DC1. 1. On the DC1 open Network Monitor. 2. In the Microsoft Network Monitor window click Capture, and then click Networks. 3. If the Select a Network dialog box opens, expand Local Computer. Click Internal, and then click OK. 4. In the Network Monitor window click Capture, and then click Start. 5. Leave the Network Monitor packet capture running. Note: Perform these steps on Client1. 6. On Client1, open a Command Prompt. 7. Type c:\testnewapp.cmd then press ENTER. 8. If Windows Security Alert notifies you that it is blocking this program, click Unblock. 9. The batch file tells you that newapp is running. When prompted, press any key. Wait until newapp is finished. Note: Perform these steps on DC In DC1 s Network Monitor window click Capture, and then click Stop and View. 11. In the Capture: 1 (Summary) Window, scroll down and double click any frame where: Dst Mac Address = LOCAL, Protocol = FTP, Description = Data Transfer to Server 12. In the middle pane, expand IP: Protocol = TCP.

11 Bandwidth with Policy-Based Quality of Service Page 11 of Expand IP: Type of Service. 14. What is the IP Precedence this time? 15. The answer should be Immediate, with a value that looks like this: IP: 010. = Precedence Immediate 16. On the Network Monitor menu click File, and then click Close. 17. On the Network Monitor menu, click Capture, and then click Start. 18. If Network Monitor prompts you to save the previous capture, click No. It is important that you start a separate packet capture for the next file upload. In this beta version, trying to capture both uploads in a single packet capture does not work properly. 19. Leave the Network Monitor packet capture running. Note: Perform these steps on Client On Client1, open a Command Prompt. 21. Type copy /y c:\windows\media\*.wav x: then press ENTER. 22. As the files are uploading, check the packet capture on DC You need not wait for the entire upload to complete before moving on to the next step. Note: Perform these steps on DC In DC1 s Network Monitor window click Capture, and then click Stop and View. 25. In the Capture: 1 (Summary) Window, scroll down and double-click any frame where: Dst Mac Address = LOCAL, Protocol = SMB, Description = C Write & X 26. Is the IP: Type of Service now Precedence Routine? 27. The answer should be yes, with a value that looks like this: IP: 000. = Precedence Routine. 28. Close all Windows. If prompted to Save My Console, click No. 29. Log off of DC Log off of Client1.

Install the Production Treasury Root Certificate (Vista / Win 7)

Install the Production Treasury Root Certificate (Vista / Win 7) Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.

More information

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

Lab A: Deploying and Managing Software by Using Group Policy Answer Key Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

SafeWord Domain Login Agent Step-by-Step Guide

SafeWord Domain Login Agent Step-by-Step Guide SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

LAB 1: Installing Active Directory Federation Services

LAB 1: Installing Active Directory Federation Services LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Migrating Active Directory to Windows Server 2012 R2

Migrating Active Directory to Windows Server 2012 R2 Migrating Active Directory to Windows Server 2012 R2 Windows Server 2012 R2 Hands-on lab In this lab, you will complete a migration of a Windows Server 2008 R2 domain environment to Windows Server 2012

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291)

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291) Course: WIN310 Student Lab Setup Guide Summer 2010 Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 Published by Wiley & Sons 1 STUDENT COMPUTER SETUP Hardware Requirements

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:

More information

Introduction to DirectAccess in Windows Server 2012

Introduction to DirectAccess in Windows Server 2012 Introduction to DirectAccess in Windows Server 2012 Windows Server 2012 Hands-on lab In this lab, you will configure a Windows 8 workgroup client to access the corporate network using DirectAccess technology,

More information

NETWRIX CHANGE NOTIFIER

NETWRIX CHANGE NOTIFIER NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

SCCM Client Checklist for Windows 7

SCCM Client Checklist for Windows 7 SCCM Client Checklist for Windows 7 1. The client workstation must have a supported operating system. Supported operating systems include Windows 7. To view information about the operating system version:

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure

More information

Connection and Printer Setup Guide

Connection and Printer Setup Guide Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4

More information

Alpha High Level Description

Alpha High Level Description Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

How to configure MAC authentication on a ProCurve switch

How to configure MAC authentication on a ProCurve switch An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

QoS (Quality of Service)

QoS (Quality of Service) QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality

More information

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we

More information

Installing and Configuring Login PI

Installing and Configuring Login PI Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Using LifeSize systems with Microsoft Office Communications Server 2007. Server Setup

Using LifeSize systems with Microsoft Office Communications Server 2007. Server Setup Using LifeSize systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

ENABLE LOGON/LOGOFF AUDITING

ENABLE LOGON/LOGOFF AUDITING Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Configuring the Windows XP SP2/Vista Firewall for UserLock

Configuring the Windows XP SP2/Vista Firewall for UserLock Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network

More information

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP

More information

Microsoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement

Microsoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement Microsoft OCS with IPC-R: SIP (M)TLS Trunking directpacket Product Supplement directpacket Research www.directpacket.com 2 Contents Prepare DNS... 6 Prepare Certificate Template for MTLS... 6 1 Create

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

Deploying Software Updates Using Windows Server Update Services

Deploying Software Updates Using Windows Server Update Services Deploying Software Updates Using Windows Server Update Services Learning Objectives Overview Prerequisites For more information Scenario After completing this lab, you will have learned: How to configure

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3

More information

APNS Certificate generating and installation

APNS Certificate generating and installation APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

etoken Enterprise For: SSL SSL with etoken

etoken Enterprise For: SSL SSL with etoken etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the

More information

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need

More information

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3. Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

12 NETWORK MANAGEMENT

12 NETWORK MANAGEMENT 12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1)

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1) NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1) NB6 Series and Quality of Service (QoS) The following Quality of Service (QoS) settings offer a basic setup example, setting up 3 devices

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS 8 NETWORK SERVERS AND SERVICES FUNDAMENTALS PROJECTS Project 8.1 Project 8.2 Project 8.3 Project 8.4 Project 8.5 Understanding Key Concepts Comparing Network Operating Systems Understanding Basic Services

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...

More information

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task. Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...

More information

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014 S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information