Sie sind auf Seite 1von 8

Lesson 1

Lesson 7
Popular Windows Network Services and Applications
Learning Objectives
Students will learn about:
Web Servers
Remote Access
Remote Administration
Server Virtualization

ODN Skills

Understand web services


Understand server virtualization

2.2
2.5

Lesson Summary Lecture Notes


This lesson picks up where Lesson 6 left off by discussing network services, including
web services, terminal services, and server virtualization. Therefore, review quickly what
the Internet is and that fact that users access a web page, they are accessing the web page
from a web server. Of course, this is a good time to discuss the standard web protocols,
including HTTP, HTTPS, FTP and SMTP and the ports that these protocols use.
Now that the students have a general understanding of the Internet, introduce Microsofts
web server, Internet Information Services (IIS). When users access web sites, they access
folders. Some of those folders may be located separately (virtual directories) so that they
can be reused by multiple websites or accessed from a different server. Next, discuss web
applications and application pools as a method to isolate one web site from another
website. The last part that deals with discussing Microsofts web servers includes a
discussion of security. Therefore, you should discuss URL authorization rules, available
methods of authentication, SSL, and digital certificates. The next part of the discussion
covers providing FTP services with IIS. Again, review which ports FTP users.
The next part of the lesson deals with Remote Access. Students need to understand the
benefits that remote access can offer an organization and the challenges that it represents.
You can then define a virtual private network (VPN) and list the different types of
tunneling available with Windows Server 2008, including PPTP, L2TP, and SSTP. Along
with discussing the encryption that VPNs offer, discuss the different methods of
authentication available for VPN. Lastly, discuss split tunneling with an emphasis on why
you should not do it.

1-1

Lesson 1

Since many organizations could be large or spread out, you may have a need to connect
to a server remotely. Therefore, you will be discussing Remote Desktop Services. You
should emphasize that before Windows Server 2008 R2, Remote Desktop Services was
known as Terminal Services. You should also compare and contrast Remote Desktop
Connections and Remote Assistance. You should demonstrate using Remote Desktop
Connections to connect to another computer.
The last part of the lesson is server virtualization with an emphasis on Hyper-V. Of
course, you should start out with a discussion of what a virtual machine is and how it is
used by different organizations. When discussing Hyper-V, you should cover the system
requirements, including 64-bit Windows, 64-bit processors and BIOS that support
virtualization and Hardware Data Execution Prevention (DEP). Next, discuss how to
create virtual machines and the files that make up a virtual machine and how snapshots
are used with virtual machines. The last part of the discussion covers managing virtual
networks and network cards.

Key Terms
Application A grouping of content on a Web site that is defined at the root level or in a
separate folder that has specific properties, such as the application pool in which the
application runs and the permissions that are granted on the folder.
application pool A set of resources (a worker process or a set of worker processes)
used by a Web site or application that defines the memory boundaries for the Web site.
digital certificate A electronic document that can contain an encryption key to encrypt
data.
File Transfer Protocol (FTP) A standard network protocol used to transfer a file from
one host to another over a TCP/IP-based network.
HyperText Markup Language (HTML) The predominant markup language
interpreted by browsers for web pages.
hypervisor The component that is installed between the hardware and the operating
system and is the main component that manages the virtual computers.
Internet Information Services (IIS) Microsofts web server.
physical-to-virtual (P2V) conversion A process that allows you to convert a physical
computer to a virtual computer.
Remote Assistance Technology used to connect and interact with a users session on
another computer.
Remote Desktop Services Formerly known as Terminal Services, this is a Microsoft
Windows component that allows a user to access applications and data on a remote
computer over a network.
Secure Sockets Layer (SSL) A supplemental protocol used with HTTP to secure traffic
with a digital certificate.

1-2

Lesson 1

Simple Mail Transfer Protocol (SMTP) A protocol used to transfer emails over the
Internet.
snapshot A point-in-time image of a virtual machine that you can return to.
virtual directory A directory used in a Web site that corresponds to a physical
directory elsewhere on the server, on another server, or on a Web site.
virtual machine Technology that allows you to run multiple operating systems
concurrently on a single machine, which allows separation of services while keeping cost
to a minimum.
virtual private network (VPN) Technology that links two computers through a widearea network such as the Internet. To keep the connection secure, the data sent between
the two computers is encapsulated and encrypted.
web server A server that provides web pages to clients using TCP port 80.
World Wide Web (WWW) A system of interlinked hypertext documents known as
Web pages that can be viewed with a Web browser such as Internet Explorer

1-3

Lesson 1

Lesson 7
Popular Windows Network
Services and Applications
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in
the blanks provided.
1.

The World Wide Web is a system of interlinked hypertext documents


known as web pages that are browsed with a web browser.

2.

The predominant markup language for web pages is HyperText Markup


Lagnuage.

3.

Microsofts web server is known as Internet Information Server (IIS).

4.

In IIS, a virtual directory is a directory used in a Web site that corresponds


to a physical directory elsewhere on the server, on another server, or on a
Web site.

5.

HTTPS uses port 443.

6.

X.509 is the most widely used digital certificate.

7.

Microsofts newest virtual machine technology is Hyper-V.

8.

A snapshot is a point in time image of a virtual machine that you can return
to.

9.

You typically use remote desktop to remotely connect and manage a


server, which allows you to run programs directly on the desktop.

10. RemoteApp is a special mode of Remote Desktop Services that allows you
to run an application in its own window.

Multiple Choice
Circle the letter that corresponds to the best answer.
1.

2.

Which protocol is used to transfer files between computers?


a.

DNS

b.

HTTP

c.

FTP

d.

Telnet

Which port does SMTP use?


a.

21

b. 25

1-4

Lesson 1

3.

4.

5.

c.

80

d.

443

Which port does HTTP use?


a.

21

b.

25

c.

80

d.

443

A(n) ___________ defines a set of resources used by a Web site or


application that defines the memory boundaries of a Web site.
a.

Virtual directory

b.

Root directory

c.

Application pool

d.

Port forwarder

Which authentication sends username and password that is not encrypted?


a.

Anonymous

b. Basic authentication

6.

c.

Digest authentication

d.

Windows authentication

When configuring VPN, L2TP uses ______ for encryption.


a.

SSTP

b.

PPTP

c.

MPE

d. IPSec
7.

Which authentication method used with VPN clients can be used with
retinal scan and fingerprint identifications?
a.

PAP

b.

CHAP

c.

MS-CHAPv2

d. EAP-MS-CHAPv2
8.

9.

By using _____________ technology, you can run multiple operating


systems concurrently on one machine.
a.

Virtual machine

b.

Virtual directory

c.

Terminal server

d.

Remote access

After you create a virtual server in Hyper-V and install the operating
system, you then need to install _____________ so that the virtual server
can run more efficiently.
a.

VMWare client tools

b.

Remote Desktop tools

c.

Integration Services Setup

1-5

Lesson 1
d.

P2V Disk tools

10. Which protocol is used to send out email?


a.

POP2

b.

IMAP

c.

HTTP

d. SMTP

True / False
Circle T if the statement is true or F if the statement is false.
T

1.

When typing in a URL that does not specify a directory, your


browser will always return a 404 error.

2.

If you are using Basic Authentication, you should use digital


certificates to encrypt.

3.

To copy a digital certificate that includes the public and private key
pair, use CSR.

4.

Today, PTTP is the recommended VPN tunneling protocol.

5.

The .vhd file holds the virtual machine configuration information.

Competency Assessment
Scenario 7-1: Allowing Work from Home
You just started working as a system administrator for the Acme Corporation. Your
company decides that as a benefit to its employees, some employees can work from home
one day a week. Explain what can you do to help make this happen, what key technology
you would use, and how would you configure it.
The primary technology you will need to use is to VPN. Therefore, you will need to
install a remote access server on a computer running Windows Server 2008. You
should configure L2TP with IPSec for the best security. You will then have to
configure the client computers to access the remote access server. In addition,
depending on the applications that the user needs to access, he will use the
applications on his laptop computer or he will have to use remote desktop to access
servers or client computers within the organization.
Scenario 7-2: Isolating Server Applications
You have two network applicationsa network accounting application and a network HR
applicationthat are not processor hungry. Both of these applications must be kept
totally isolated, and both will access a centralized database server. What do you
recommend?
Some advantages of using virtual servers include isolating server applications and
utilizing computer resource more efficiently. Therefore, you should use create two
virtual servers on a single physical server. Although the applications will access a

1-6

Lesson 1

centralized database server, the applications themselves will run on the individual
servers, keeping them totally isolated.

Proficiency Assessment
Scenario 7-3: Create a Web Site
1. Install IIS.
2. Create a Web site that responds to contoso.com and
www.contoso.com using port 80 that points to
c:\Inetpub\wwwroot\contoso.
3. Add an entry in the host file that points contoso.com to the IP
address of your server.
4. Create a folder called virtual in the c:\inetpub folder.
5. Create a virtual directory that points to c:\inetpub\virtual.
6. Create an application pool called contoso.
7. Change the contoso Web site to use the contoso application pool.

No answer is needed. This can be demonstrated.


To install IIS:
1.

Click Start, point to Administrative Tools, and then


click Server Manager.

2.

In Roles Summary, click Add Roles.

3.

Use the Add Roles Wizard to add the web server role.

4.

To open IIS Manager, click the Start button. Then select


All programs, select Administrative Tools, and click
Internet Information Services (IIS) Manager.

To create additional Web sites:


1.

Open IIS Manager.

2.

In the Connections pane, right-click the Sites node in


the tree and then click Add Web Site.

3.

In the Add Web Site dialog box, type a friendly name


for your Web site in the Web site name box.

4.

Click Select if you want to select a different


application pool than the one listed in the Application
Pool box. In the Select Application Pool dialog box,
select an application pool from the Application Pool
list and then click OK.

5.

5. In the Physical path box, type the physical path of


the Web sites folder, or click the browse button (. . .)
to navigate to the file system to find the folder.

1-7

Lesson 1

6.

If the physical path that you entered in Step 5 is to a


remote share, click Connect to specify credentials that
have permission to access the path. If you do not use
specific credentials, select the Application user (passthru authentication) option in the Connect As dialog
box.

7.

Select the protocol for the Web site from the Type list.

8.

The default value in the IP address box is All


Unassigned. If you must specify a static IP address for
the Web site, type the IP address in the IP address
box.

9.

Type a port number in the Port text box.

10.

Optionally, type a host header name for the Web site


in the Host Header box.

11.

If you do not have to make any changes to the site,


and you want the Web site to be immediately
available, select the Start Web site immediately check
box.

12.

Click OK.

Scenario 7-4: Using Remote Desktop


1. Make sure remote desktop is enabled on your computer.
2. Connect to another windows computer using Remote Desktop.

No answer is needed. This can be demonstrated.


To make sure remote desktop is enabled, click the Start button,
right-click Computer, and select Properties. Select Remote settings.
Make sure that one of the Allow connections options is selected under
Remote Desktop and click OK.
To connect to another computer, click the Start button, click
All Programs, select Accessories, and then select Remote Desktop
Connection. Type the name or IP address of the host you want to
connect to and click the Connect button.

1-8

Das könnte Ihnen auch gefallen