Sie sind auf Seite 1von 10

1.

INTRODUCTION

A VPN (Virtual Private Network) is a concept which helps enterprise companies with distributed
offices to connect to each other securely over the Internet .
Enterprise network setup with VPN is a solution strategy that a large scale company can
employ and gain benefits from it.
With this map if there is an IP based blocking in some place (specific ISP, etc.) one of the most
suitable solution is VPN tunnelling in order to overcome such problems.
This enterprise network solution comes with other configured features that include, DHCP, DNS,
Software Deployment over the network, Remote Access etc.
To implement this mapping into ones business, one needs the knowledge of server handling
and how components in a network work.
This configuration along with providing a communication channel via VPN, but also provides a
security mechanism through NAT , with NPS and also manages all the client machines
connected to the server machine with DHCP and managing Active directory users.

1
2. OBJECTIVE

The main objective of this is to create a safe and encrypted connection over a less secure
network, such as the internet. VPN technology was developed as a way to allow remote users
and branch offices to securely access corporate applications and other resources. To ensure
safety, data travels through secure tunnels and VPN users must use authentication methods --
including passwords, tokens and other unique identification methods -- to gain access to the
VPN.

FUNCTIONS

Functions that are available for the user:

Register and get Username and Password from the server


Login/Logout.
Connect to the companys virtual private network and access resources

Functions that are available for the ADMIN:

Managing the server and all its services


Setting up the VPN Server
Authority to add and remove any user.
Maintain the whole security requirements for the setup etc.

2
3. MODULES AND THEIR DESCRIPTION

1. VPN(Virtual Private Network) with NPS(Network Policy Server)


2. DHCP(Dynamic Host Configuration Protocol)
3. DNS(Domain Name Server)
4. Software Deployment Services
5. Group Policy Object

1. VPN with NPS:-

A virtual private network (VPN) extends a private network across a public network, and
enables users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network. Applications running across the VPN
may therefore benefit from the functionality, security, and management of the private
network.
Network Policy Server (NPS) uses network policies and the dial-in properties of user
accounts to determine whether a connection request is authorized to connect to the network.
You can use this procedure to configure a new network policy in either the NPS console or
the Remote Access console.

2. DHCP:-
Every device on a TCP/IP-based network must have a unique unicast IP address to access
the network and its resources. Without DHCP, IP addresses for new computers or
computers that are moved from one subnet to another must be configured manually; IP
addresses for computers that are removed from the network must be manually reclaimed.
With DHCP, this entire process is automated and managed centrally. The DHCP server
maintains a pool of IP addresses and leases an address to any DHCP-enabled client when
it starts up on the network. Because the IP addresses are dynamic (leased) rather than
static (permanently assigned), addresses no longer in use are automatically returned to the
pool for reallocation.

3
3. DNS:-
The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating
entities. Most prominently, it translates more readily memorized domain names to the
numerical IP addresses needed for locating and identifying computer services and devices
with the underlying network protocols.

4. Software Deployment Services:-


Windows Server 2012 R2 includes a feature called Software Installation and
Maintenance that ADDS, Group Policy, and the Windows Installer service use to install,
maintain, and remove software from your organizations computers.

5. Group Policy Object:-


Group Policy is an infrastructure that enables you to specify managed configurations for
users and computers through Group Policy settings and Group Policy Preferences. For
Group Policy settings that affect only a local computer or user, you can use the Local
Group Policy Editor. You can manage Group Policy settings and Group Policy
Preferences in an Active Directory Domain Services (AD DS) environment through the
Group Policy Management Console (GPMC). Group Policy management tools also are
included in the Remote Server Administration Tools, which provides a way for you to
administer Group Policy settings from your desktop.

4
4. HARDWARE & SOFTWARE REQUIREMENTS

Hardware: Hardware is the physical part of the computer system like mouse, keyboard, monitor
etc.

Hardware requirements:-

1. Atleast 1 dedicated core processor(in virtual environment)


2. 1024 mb RAM(in virtual environment) and 4gb in production environment
3. Keyboard ,mouse
4. Internet Connection
5. 2 NICs

Software: Software is a set of applications which is used to run the operating system.

Software requirements:

1. Software Windows server 2012 R2,Windows 7, VMWARE 9.0 or above


2. Database Hard disk partition for storage

5
5. TOOLS/PLATFORM USED

Operating system Windows server 2012 and windows 7


Front End GUI
Back End Powershell, CMD
Software VMWARE 9.0

What is VMware?

VMware is a virtualization and cloud computing software provider based in Palo Alto,
California. Founded in 1998, VMware is a subsidiary of Dell Technologies. EMC Corporation
originally acquired VMware in 2004; EMC was later acquired by Dell Technologies in 2016.
VMware bases its virtualization technologies on its bare-metal hypervisor ESX/ESXi in x86
architecture. With VMware server virtualization, a hypervisor is installed on the physical
server to allow for multiple virtual machines (VMs) to run on the same physical server. Each
VM can run its own operating system (OS), which means multiple OSes can run on one
physical server. All of the VMs on the same physical server share resources, such as
networking and RAM. VMware products include virtualization, networking and security
management tools, software-defined data center software and storage software.

Advantages of Virtualization:-

Virtualization can increase IT agility, flexibility, and scalability while creating significant cost
savings. Workloads get deployed faster, performance and availability increases and operations
become automated, resulting in IT that's simpler to manage and less costly to own and operate.
Additional benefits include:
Reduce capital and operating costs.
Minimize or eliminate downtime.
Increase IT productivity, efficiency, agility and responsiveness.
Provision applications and resources faster.
Enable business continuity and disaster recovery.

6
Simplify data center management.
Build a true Software-Defined Data Center

Features OF VMware:-

Partitioning
Run multiple operating systems on one physical machine
Divide system resources between virtual machines
Isolation
Provide fault and security isolation at the hardware level
Preserve performance with advanced resource controls
Encapsulation
Save the entire state of a virtual machine to files
Move and copy virtual machines as easily as moving and copying files
Hardware Independence
Provision or migrate any virtual machine to any physical server

7
What is a Server?

A server is a computer designed to process requests and deliver data to other (client) computers
over a local network or the internet. Although any computer running special software can
function as a server, the most typical use of the word references the very large, high-powered
machines that function as the pumps pushing and pulling data across the internet.
Most computer networks support one or more servers that handle specialized tasks.
As a rule, the larger the network in terms of clients that connect to it or the amount of data that
it moves the more likely it is that several servers play a role, each dedicated to a specific
purpose.
The server is the software that handles a task. However, the powerful hardware that supports this
software is also usually called a server because server software coordinating a network of
hundreds or thousands of clients requires hardware much more robust than what you'd buy for
ordinary consumer use.

Common Types of Servers


A large, general-purpose network supporting a medium-sized company will likely deploy several
different types of servers:
Web servers, to show pages and run apps in connecting Web browsers
Email servers, to facilitate the sending and receiving of messages
FTP servers, to support the moving of files through File Transfer Protocol tools
Identity servers, to support logins and security roles for authorized users
Hundreds of different types of specialized server types support computer networks. Apart from
the common corporate types, home users often interface with online game servers, chat servers
and even streaming-audio services.

8
What is Window Server 2012?

Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows
Server. The successor of Windows Server 2008 R2, its improvements include overall upgrades
in cloud computing and storage infrastructure. Windows Server 2012 include enhancements to
the following:
Graphical user interface (GUI) - Windows Server 2012 was created with the Metro design
language so it has the same look and feel as Windows 8 unless installed in Server Coremode.
Administrators can switch between Server Core and the Server with a GUI options without a full
reinstallation.
Address management - Windows Server 2012 has an IP address management (IPAM) role for
discovering, monitoring, auditing and managing the network's IP address space.
Hyper-V- Hyper-V 3.0 offers a scalable, virtual extensible switch that allows a virtual network
to extend its functionality in ways that were difficult or impossible to achieve in previous
versions.
Active Directory - Several changes have been made to Active Directory. The PowerShell-based
Deployment Wizard can work remotely, allowing administrators to promote cloud-based servers
to domain controllers without the Wizard running on the server itself. Following the completion
of this process, PowerShell scripts containing copies of commands used in the process can assist
with the automation of additional domain controllers, allowing for large-scale Active Directory
deployments.
File System - Addition of ReFS (Resilient File System) for file servers.
Storage migration - Live storage migration is permitted and shared storage will no longer be
required for virtual machine (VM) migration when using Hyper-V Replica.
Clustering- Cluster-aware updating will be automated, which will allow the entire cluster to stay
online during the updating process with little to no loss in availability.
NIC teaming- This is the first version of Windows Server with built-in network interface
card (NIC) teaming. This feature allows administrators to team together NICs for failover and
bandwidth aggregation, creating server resiliency built into the operating system.

9
6. BIBLOGRAPHY

BOOKS REFERED
Installing and Configuring Windows Server 2012 R2 (MCSA)
Book by Craig Zacker

Windows Server 2012


https://www.microsoft.com/en-in/evalcenter/evaluate-windows-server-2012-r2,
Prerequisites
https://technet.microsoft.com, Configuration Support
http://techgenix.com
https://www.thomasmaurer.ch/
BTNHD, https://www.youtube.com/channel/UCQI6M3qcTuz-iXfG1loE9lQ
MSFT Web Cast, https://www.youtube.com/channel/UCWTAzBlHWOf17F8zN8HNJXg
UMYHacker, https://www.youtube.com/channel/UCfzJt14kLSHHH-jqFu8pxNw
VMWARE
https://www.youtube.com/user
https://www.youtube.com/watch?v=zLJbP6vBk2M , ELI The Computer Guy

10

Das könnte Ihnen auch gefallen