70-293_FORE.QXD 9/10/03 6

255_70-293_Fore.qxd 9/10/03 6:55 PM Page xlv

Foreword

xlv

for forwarding and how DNS interacts with DHCP on a Server 2003 network.We’ll discuss Server 2003 DNS server interoperability with BIND and other non-Windows DNS implementations.You’ll learn about zone transfers between Server2003 DNS servers and BIND servers, and we’ll discuss supporting Active Directorywith BIND.You’ll learn about split DNS configurations and how interoperabilityrelates to other services such as WINS and DHCP. Next, we address DNS securityissues, including common DNS threats such as footprinting, redirection and DNSDoS attacks.You’ll learn how to best secure your DNS deployment, using a splitnamespace and using packet filtering.We’ll discuss how to determine the best DNSsecurity level for your network. Next, we look at DNS performance issues.Weshow you how to monitor DNS server performance and how to analyze DNSserver tests. In the next section, we’ll address NetBIOS name resolution and pro-vide an overview of how NetBIOS names are resolved using lmhosts files andNetBIOS Name Servers such as WINS servers.You’ll find out what’s new forWINS in Server 2003, and we’ll show you how to plan WINS server deploymentand how to plan for WINS replication.We’ll walk you through the process of con-figuring WINS replication partnerships, including Push Only, Pull Only andPush/Pull configurations.We’ll also discuss common WINS issues, including con-figuration issues, performance issues and security issues.We’ll show you how toplan for WINS database backup, and how to troubleshoot name resolution prob-lems related to both host names and NetBIOS names.

Planning, implementing and maintaining a remote access strategy Weexamine the issues and procedures involved in devising a remote access strategy,including planning tasks such as analyzing organizational needs, analyzing userneeds, and selecting the remote access types that will be allowed (dial-in,VPN,and/or wireless).We’ll discuss design considerations related to dial-in access, such asthe allocation of IP addresses, how to determine incoming port needs, and how toselect the best administrative model based on your organizational needs and thefunctional level of your domain. Next, we’ll talk about design considerations relatedto VPN access.You’ll learn how to select the VPN protocols to be allowed, basedon client support, PKI requirements and the need for data integrity and senderauthentication.You’ll learn how to install machine certificates, how to configurefirewall filters, and how to create access policies governing VPN connections. In thenext section, you’ll learn about the design considerations that relate to wirelessremote access.We’ll discuss the use of IAS for wireless connections, and how toconfigure remote access policies for wireless connections.We’ll address the use ofmultiple wireless access points, and the advantages of placing a certificationauthority on a Virtual LAN (VLAN) for new wireless clients.We’ll also show youhow to configure wire access points (WAPs) as RADIUS clients. Next, we moveon to planning overall security strategies for remote access connections.We’ll dis-https://traloihay.net