WINS Proxy Agents

A WINS proxy agent is used to provide NetBIOS name resolution for clients on remote subnets that can’t use WINS. A WINS proxy agent will intercept B-node broadcasts on its local subnet and communicate with a WINS server on behalf of a B-node client. Any Windows Server machine can function as a WINS proxy. Use…

Read More

WINS Replication

WINS replication enables two or more WINS servers to replicate their databases. This is useful because it enables WINS servers on different subnets to share information, thereby enabling local clients to query remote clients. There are three types of replication: Push, Pull, Push/Pull. Use the buttons below to navigate through the lesson Push replication: A…

Read More

Installing WINS

Before installing WINS, ensure that your server has a permanent IP address. WINS is installed using the Add/Remove Windows components wizard. To access the wizard click on Start. Use the buttons below to navigate through the lesson Select Control Panel. Double-click on Add/Remove Programs. Add/Remove programs will appear. Click on Add/Remove Windows Components. A list…

Read More

WINS Overview

The Windows Internet Naming Service (WINS) provides NetBIOS name resolution for clients on a network. NetBIOS names are used by legacy clients such as Windows NT 4.0 and Windows 95. A WINS server stores a database containing NetBIOS name to IP address mappings. A Windows Server 2003 machine can be configured as a WINS Server.…

Read More

Remote Access Overview

Many people work away from their offices, so Windows Server 2008 provides the Routing and Remote Access Service, which lets users connect to their office machines.  The Routing and Remote Access Service (RRAS) allows a client to connect to the network from a remote location either using a standard dial-up connection or via the internet. …

Read More

IPSec and Remote Access

Security is a major concern when using Remote Access since company data has be transferred over the internet. Using the tunnelling protocol L2TP (Layer 2 tunnelling protocol) a tunnel can be created through another network. Any data inside the tunnel can be protected using IPSec. A disadvantage of using L2TP is that only Windows 2000/XP…

Read More

Overview of IPSec

Security is a key part of any network. Companies need to protect their network from eavesdropping and tampering. Windows provides ACLs (Access Control Lists) which can be used to prevent access to data over the network. However, ACLs don’t protect data travelling over the network cable. Use the buttons below to navigate through the lesson…

Read More

DHCP on a Routed Network

Since DHCP uses broadcasts, and routers block broadcasts, clients on remote subnets may be unable to receive TCP/IP information from a DHCP Server. Clients will use Automatic Private IP Addressing (APIPA) if they are unable to locate a DHCP server. Using APIPA a client will assign itself a random address between 169.254.0.1 – 169.254.254.254/16, allowing…

Read More

Configuring a DHCP Server

To access the DHCP server click Administrative Tools> DHCP.  To view DHCP server statistics, right-click on the server. Then select Display Statistics. The Server Statistics box shows general information about the DHCP server such as the number of Acknowledgements and address usage. Use the buttons below to navigate through the lesson To configure the properties…

Read More

Setting up a DHCP Scope

Access DHCP server click Start>Administrative Tools>DHCP. The green arrow next to the server indicates that the DHCP service is running. To create a new scope right-click on the server. Select New Scope. Click Next. Fill in Scope name and description, Click Next to continue. Next, specify the range of IP addresses available. Type the first IP address into the Start IP…

Read More