Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Objectives Outline

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Objectives Outline Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Page 1 of 36 Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Objectives This chapter helps you prepare for the Windows 2000 Professional component of MCP Exam 70-240, "Microsoft Windows 2000 Accelerated Exam for MCPs Certified on Microsoft Windows NT 4.0," by covering the following objectives: Configure and troubleshoot the TCP/IP protocol. l To effectively access network resources, you must understand how to install and configure the TCP/IP client and use the services available on TCP/IP networks. Connect to computers by using dial-up networking: l Connect to computers by using a virtual private network (VPN) connection. l Create a dial-up connection to connect to a remote access server. l Connect to the Internet by using dial-up networking. l Configure and troubleshoot Internet Connection Sharing. l Connectivity between LANs where a persistent connection is not needed can be provided by dial-up network connections. To accomplish this, you must be able to install and configure dial-up components in various configurations. Connect to shared resources on a Microsoft network. l The availability of networking technology means resources need not be centralized in a few large servers. File shares and printers can be distributed across the entire network, and applications can involve many remote computers as system components. Outline Introduction The Windows 2000 Professional Networking Model Windows 2000 Networking Versus the OSI Reference Model l NDIS-Compatible Network Adapter Card Drivers l NDIS 5.0 l Network Protocols TCP/IP file://J:\NewRiders\chapters\ze394.html 7/12/01 Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Page 2 of 36 NWLink IPX/SPXs Compatible Transport NetBIOS Extended User Interface (NetBEUI) l Transport Driver Interface/li> l Network Application Programming Interfaces l Interprocess Communication l Basic Network Services Server Service Workstation Service Windows 2000 Redirectors l Interoperating with Other Networks Providers and the Provider-Interface Layer Network Resource Access Multiple Universal Naming Convention Provider Universal Naming Convention Names Multi-Provider Router Adding and Configuring the Network Components of Windows 2000 l Identification Options l Network Connection Properties l Protocol Options l Service Options l Client Options l Advanced Options Provider Order Adapters and Bindings Configuring the TCP/IP Protocol l IP Addressing l Subnet Mask l Default Gateway (Router) l Windows Internet Name Service (WINS) l Domain Network Systems (DNS) Server Address Assigning IP Addresses to Clients l Using DHCP l Manually Configuring TCP/IP Connecting to Computers by Using Dial-Up Networking l Line Protocols Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) l Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) over IPSec l Internet Connection Sharing file://J:\NewRiders\chapters\ze394.html 7/12/01 Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Page 3 of 36 Internet Connection Sharing Settings Internet Connection Sharing for Applications Installing a Dial-Up Networking Connection l Dial-Up to Private Network l Dial-Up to the Internet l Connect to a Private Network Through the Internet l Accept Incoming Connections l Connect Directly to Another Computer Connecting to Shared Resources on a Microsoft Network l Browsing Browsing Other Domains Browsing a Wide Area Network l Universal Naming Convention l My Network Places l The NET VIEW Command l The NET USE Command Troubleshooting TCP/IP Connections l Configuration Errors l Troubleshooting TCP/IP Configuration Errors Packet Internet Groper (PING) Trace Route (Tracert) Address Resolution Protocol (ARP) Route l Resolving Logical Names to IP Addresses Resolving a NetBIOS Name to an IP Address Troubleshooting NetBIOS Name Resolution Problems Resolving a Hostname to an IP Address Troubleshooting Hostname Resolution Problems l Additional Troubleshooting Tools Case Study Chapter Summary Apply Your Knowledge Introduction A local area network (LAN) is a collection of computers in a specific area that are connected by a high-speed communications network. This can range from just two computers to hundreds or thousands. LANs in geographically separate areas can be connected in a wide area network (WAN). Generally, the speed at which computers connect within a LAN is greater than what is available between LANs (across the WAN). file://J:\NewRiders\chapters\ze394.html 7/12/01 Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Page 4 of 36 The Windows 2000 Professional Networking Model Before reviewing how to configure the networking components of Windows 2000 Professional, it is important to examine the underlying components that make up the network architecture. These components are put together as layers from interfacing with an application program down to interfacing with the physical connection to the network. Each layer interacts only with the layers directly above and directly below through a well-defined interface. Knowing the actual layers helps you understand how the Windows 2000 network architecture works. All the networking components in Windows 2000 Professional are built in to the operating system, although some of them are not automatically installed. Any Windows 2000 computer can participate as the following: l A client or a server in a distributed application environment l A client in a peer-to-peer networking environment The built-in networking components allow Windows 2000 Professional systems to share printers, files, and applications with other networked computers. Windows 2000 Networking Versus the OSI Reference Model The Open Systems Interconnection (OSI) model is one system that can help you understand the networking architecture used in Windows 2000 Professional. The OSI model was developed by the International Standards Organization (ISO) and is a layered model that defines how computers participating in a network communicate and how the network data is exchanged between layers from the application to the network media. The OSI model divides the network protocol stack into seven layers to which software systems must adhere to communicate over the network. In the case of Windows 2000, the system does not implement each layer separately; however, the result complies with the overall OSI model. Figure 6.1 compares the Windows 2000 network architecture with the OSI network model. Figure 6.1 Windows 2000 networking architecture versus the OSI model. NDIS-Compatible Network Adapter Card Drivers The bottom layers of the Windows 2000 network architecture include the network adapter card driver and the network interface card (NIC). These must be 32 bit and compliant with Network Device Interface Specification (NDIS) 3.0, 4.0, or 5.0. The mechanism that NDIS uses to bridge these two layers is the miniport driver specification. The miniport drivers directly access the network adapters while providing common code where possible. This allows hardware vendors to create drivers that can call the underlying NDIS drivers, rather than code the functionality into their drivers. NDIS 5.0 file://J:\NewRiders\chapters\ze394.html 7/12/01 Chapter 6: Implementing, Managing, and Troubleshooting Network Protocols and Services Page 5 of 36 NDIS 5.0 extends the previous versions of NDIS that define the interaction of network protocols and network card adapters. NDIS allows multiple protocols and multiple network adapters to exist within a computer. If you have more than one network adapter in your computer, each adapter card’s protocol stack can be configured individually. The only limit on the number of network adapter cards you can install is the capacity of your computer hardware. Windows 2000 Professional and NDIS 5.0 provide the following new features in addition to those of the NDIS 4.0 specification: l Power management and network wake-up. NDIS power management can power down network adapters at the request of the user or the system or when a network cable is disconnected. l NDIS Plug and Play. Installs, loads, and binds miniports when a new adapter card is introduced. l Support for Web-Based Enterprise Management (WBEM) and Windows Management Instrumentation (WMI). Supplies device information to management services. WMI is used by management applications (such as SMS) to query and set device status and retrieve configuration information directly from hardware devices. l Task offload. Available if the network adapter card has the capability of supporting checksums and forwarding. This results in performance gains for processes such as IPSec encryption. l Support for Quality of Service (QoS) and connection-oriented media, such as ATM and ISDN. These improvements extend the functionality of Windows 2000 Professional even further. Most of the new features in NDIS 5.0 are accessible only by using the miniport driver model and are therefore not supported for MAC drivers or older miniport drivers. Note - Backward Compatibility Windows 2000 Professional can also use drivers written to be compliant with the NDIS 3.0 and 4.0 specifications that were used by Windows NT 3.x and Windows 4.0. Network Protocols The network protocols referred to in Figure 6.1 control the communications between computers on the network. Different network protocols
Recommended publications
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • Importance of DNS Suffixes and Netbios
    Importance of DNS Suffixes and NetBIOS Priasoft DNS Suffixes? What are DNS Suffixes, and why are they important? DNS Suffixes are text that are appended to a host name in order to query DNS for an IP address. DNS works by use of “Domains”, equitable to namespaces and usually are a textual value that may or may not be “dotted” with other domains. “Support.microsoft.com” could be considers a domain or namespace for which there are likely many web servers that can respond to requests to that domain. There could be a server named SUPREDWA.support.microsoft.com, for example. The DNS suffix in this case is the domain “support.microsoft.com”. When an IP address is needed for a host name, DNS can only respond based on hosts that it knows about based on domains. DNS does not currently employ a “null” domain that can contain just server names. As such, if the IP address of a server named “Server1” is needed, more detail must be added to that name before querying DNS. A suffix can be appended to that name so that the DNS sever can look at the records of the domain, looking for “Server1”. A client host can be configured with multiple DNS suffixes so that there is a “best chance” of discovery for a host name. NetBIOS? NetBIOS is an older Microsoft technology from a time before popularity of DNS. WINS, for those who remember, was the Microsoft service that kept a table of names (NetBIOS names) for which IP address info could be returned.
    [Show full text]
  • Operator's Guide
    MILITARY POWER SUPPLY Operator’s Guide Ethernet & SNMP MPS-4000-1U MPPS-4000-1U Made in USA 1.888.567.9596 (USA only) | SynQor Headquarters 155 Swanson Road, Boxborough, MA 01719-1316 USA | www.synqor.com QMS: 006-0006748 Rev. E 01\19\2021 MPS with Ethernet Interface Contents 1 Overview ............................................................................................................................................... 2 2 Initial Configuration .............................................................................................................................. 2 2.1 DHCP Server .................................................................................................................................. 2 2.2 NetBIOS Hostname ....................................................................................................................... 2 2.3 Local Connection ........................................................................................................................... 2 3 Web Interface ....................................................................................................................................... 3 3.1 MONITOR Page ............................................................................................................................. 4 3.2 CONTROL Page .............................................................................................................................. 5 3.3 NETWORK Page ............................................................................................................................
    [Show full text]
  • The Networker's Guide to Appletalk, IPX, and Netbios
    03 9777 CH03 5/21/01 3:42 PM Page 85 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS UNTIL THE EARLY 1990S,TCP/IP WAS REALLY ONLY PREVALENT in large govern- ment and research facilities where UNIX and other supercomputing operating systems used it as a common network communications protocol.When PCs came into the picture, they were not networked. Rather, they were used either as front-ends to big micro or mainframe systems (IBM was a big fan of this approach) or as standalone sys- tems. In the early 1980s, as PCs grew in number and in performance, three strategies emerged to provide PCs with networking services:AppleTalk, Novell NetWare, and IBM’s NetBIOS. The goal of this chapter is to give you an understanding of the various protocols that make up the protocol suites and the roles they perform. It is not intended to explain how to design, set up, and manage a network. Chapter 7,“Introduction to Cisco Routers,” and Chapter 10,“Configuring IP Routing Protocols on Cisco Routers,” discuss configuration issues for these protocols. Because NetBIOS is a ses- sion layer protocol rather than a protocol suite, it will be described in the context of its operational behaviors at the end of this chapter. 03 9777 CH03 5/21/01 3:42 PM Page 86 86 Chapter 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS AppleTalk AppleTalk was an outgrowth of the Apple Macintosh computing platform. First intro- duced in 1984 and updated in 1989, it was designed to provide the Macintosh with a cohesive distributed client/server networking environment.AppleTalk,
    [Show full text]
  • Recycling Ipv4 Attacks in Ipv6
    RReeccyycclliinngg IIPPvv44 aattttaacckkss iinn IIPPvv66 Francisco Jesús Monserrat Coll RedIRIS / Red.es Jornadas de Seguridad Buenos Aires, 4 de Octubre de 2005 Index •Why we need to care about IPv6 ? • Brief introduction to IPv6 •IPv6, it’s more secure ? •Problems recycling . •Solutions and future About RedIRIS Since 1988 provides Internet connection to Academic and Research centres in Spain. Pioneers in the launch of Internet services in Spain, (DNS, news, CSIRT, ...). Based in point of presence (POA) in each region that interconnects all the centres 250 organizations connected Since January 2004 , RedIRIS is part of red.es , a government agency to promote Information society Same backbone for normal and experimental (internet2) connections, Using Internet2 in the backbone Use of the backbone for advanced applications: Opera Oberta: High quality Live Opera transmission at fast speed > 10 Mbs. Use of multicast to distribute the contents Since May 2005 , testing of multicast over IPv6 for the transmission of the videos. • Couldld thisis inincrease the use of IPv6 ? Use of IPv6 Some of the Spanish Universities are starting to use IPv6: http://www.uv.es/siuv/cas/zxarxa/ipv6.wiki IPv6 Security ? We are NOT going to talk about:: IPSEC and all the cryptographic stuff .. Traffic labelling, IP headers, etc. Why IPv6 is more secure than IPv4? Etc, etc, etc. ... For this you can: Search in google CISCO: http://www.cisco.com/security_services/ciag/documents/v6-v4-threats.pdf Michael H. Warfield’s (ISS) presentation at FIRST Conference 2004, http://www.first.org IPv6 Security ? We are NOT going to talk about:: IPSEC and all the cryptographic stuff .
    [Show full text]
  • SMB Analysis
    NAP-3 Microsoft SMB Troubleshooting Rolf Leutert, Leutert NetServices, Switzerland © Leutert NetServices 2013 www.wireshark.ch Server Message Block (SMB) Protokoll SMB History Server Message Block (SMB) is Microsoft's client-server protocol and is most commonly used in networked environments where Windows® operating systems are in place. Invented by IBM in 1983, SMB has become Microsoft’s core protocol for shared services like files, printers etc. Initially SMB was running on top of non routable NetBIOS/NetBEUI API and was designed to work in small to medium size workgroups. 1996 Microsoft renamed SMB to Common Internet File System (CIFS) and added more features like larger file sizes, Windows RPC, the NT domain service and many more. Samba is the open source SMB/CIFS implementation for Unix and Linux systems 2 © Leutert NetServices 2013 www.wireshark.ch Server Message Block (SMB) Protokoll SMB over TCP/UDP/IP SMB over NetBIOS over UDP/TCP SMB / NetBIOS was made routable by running Application over TCP/IP (NBT) using encapsulation over 137/138 139 TCP/UDP-Ports 137–139 .. Port 137 = NetBIOS Name Service (NS) Port 138 = NetBIOS Datagram Service (DGM) Port 139 = NetBIOS Session Service (SS) Data Link Ethernet, WLAN etc. Since Windows 2000, SMB runs, by default, with a thin layer, the NBT's Session Service, on SMB “naked” over TCP top of TCP-Port 445. Application 445 DNS and LLMNR (Link Local Multicast Name . Resolution) is used for name resolution. Port 445 = Microsoft Directory Services (DS) SMB File Sharing, Windows Shares, Data Link Ethernet, WLAN etc. Printer Sharing, Active Directory 3 © Leutert NetServices 2013 www.wireshark.ch Server Message Block (SMB) Protokoll NetBIOS / SMB History NetBIOS Name Service (UDP Port 137) Application • Using NetBIOS names for clients and services.
    [Show full text]
  • Troubleshooting Novell IPX
    CHAPTER 8 Troubleshooting Novell IPX NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc., and introduced to the market in the early 1980s. Then, networks were small and predominantly homogeneous, local-area network (LAN) workgroup communication was new, and the idea of a personal computer (PC) was just becoming popular. Much of NetWare’s networking technology was derived from Xerox Network Systems (XNS), a networking system created by Xerox Corporation in the late 1970s. By the early 1990s, NetWare’s NOS market share had risen to between 50 percent and 75 percent. With more than 500,000 NetWare networks installed worldwide and an accelerating movement to connect networks to other networks, NetWare and its supporting protocols often coexisted on the same physical channel with many other popular protocols, including TCP/IP, DECnet, and AppleTalk. Although networks today are predominately IP, there are some legacy Novel IPX traffic. Novell Technology Basics As an NOS environment, NetWare specifies the upper five layers of the OSI reference model. The parts of NetWare that occupy the upper five layers of the OSI model are as follows: • NetWare Core Protocol (NCP) • Service Advertisement Protocol (SAP) • Routing Information Protocol (RIP) NetWare provides file and printer sharing, support for various applications such as electronic mail transfer and database access, and other services. Like other NOSs, such as the network file system (NFS) from Sun Microsystems, Inc., and Windows NT from Microsoft Corporation, NetWare is based on a client/server architecture. In such architectures, clients (sometimes called workstations) request certain services such as file and printer access from servers.
    [Show full text]
  • Purpose Scope Standard Statement Revision History
    State of Michigan Department of Information Technology TECHNICAL POLICY MANUAL SUBJECT Global Windows Internet Naming Service (WINS) Standard Type NUMBER DATE ISSUED REVISION DATE REVISION NUMBER Standard 1410.26 11-04-05 Purpose Windows Internet Name Service (WINS) provides a dynamic replicated database service that can register and resolve NetBIOS names to IP addresses used on your network. Windows 2003 Server provides WINS, which enables the server computer to act as a NetBIOS name server and register and resolve names for WINS-enabled client computers on a network as described in the NetBIOS over TCP/IP standards. The purpose of this standard is to provide the necessary guidelines for the use of the Microsoft Windows Internet Naming Service (WINS) protocol within the SOM Network. Scope This standard applies to any group using WINS in the SOM to resolve NetBIOS names and addresses. Standard Statement The development of new applications and name resolution must be based on the Domain Name Service (DNS) protocol that remains in line with the direction of Michigan/1. Existing implementations of WINS, which are disparate, will move to the centralized implementation of WINS servers as defined in the State of Michigan Active Directory Design. Revision History Revision Effective Description of Enhancements Level Date 11-04-05 Initial Release Standard_M1WI08_Wins.doc 1 Printed 11/4/2005 @ 1:53 PM State of Michigan Department of Information Technology TECHNICAL POLICY MANUAL SUBJECT Global Windows Internet Naming Service (WINS) Standard Type NUMBER DATE ISSUED REVISION DATE REVISION NUMBER Standard 1410.26 11-04-05 Terms and Definitions NetBIOS Network Basic Input/Output System is a program that allows applications on different computers to communicate within a local area network.
    [Show full text]
  • TCP/IP Fundamentals for Microsoft Windows
    TCP/IP Fundamentals for Microsoft Windows Microsoft Corporation Published: May 21, 2006 Updated: Jan 9, 2012 Author: Joseph Davies Editor: Anne Taussig Abstract This online book is a structured, introductory approach to the basic concepts and principles of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, how the most important protocols function, and their basic configuration in the Microsoft® Windows Vista™, Windows Server® 2008, Windows® XP, and Windows Server 2003 families of operating systems. This book is primarily a discussion of concepts and principles to lay a conceptual foundation for the TCP/IP protocol suite and provides an integrated discussion of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This content is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. The terms of use of this document can be found at http://www.microsoft.com/info/cpyright.mspx. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Windows Server 2003 Security Guide
    Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide April 26, 2006 © 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Table of Contents iii Contents Chapter 1: Introduction to the Windows Server 2003 Security Guide ............. 1 Overview....................................................................................................1 Executive Summary .....................................................................................1 Who Should Read This Guide.........................................................................2 Scope of this Guide......................................................................................2 Chapter Summaries .....................................................................................3 Chapter 1: Introduction to the Windows Server 2003 Security Guide .............4 Chapter 2: Windows Server 2003 Hardening Mechanisms ............................4 Chapter 3: The Domain Policy..................................................................4 Chapter 4: The Member Server Baseline Policy ...........................................4 Chapter 5: The Domain Controller Baseline Policy .......................................5 Chapter 6: The Infrastructure Server Role .................................................5
    [Show full text]
  • Management Through Firewalls in Relation to Microsoft NT and Windows 2000
    Management through firewalls in relation to Microsoft NT and Windows 2000 Claus Jespersen Hewlett-Packard A/S Vestre Kongevej 4-6 DK-8260 Viby J Denmark Direct: (45) 4599 1829 Fax: (45) 8733 1888 e-mail: Mobile: (45) 4060 1829 [email protected] Solution Architect OpenView/Internet specialist Prepared by: Claus Jespersen Solution Architect Openview/Internet specialist Date Prepared: Februar 2000 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ Document Information Project Name: Management through firewalls in relation to Windows 2000 Project Manager: Document Version No: 1.0 FocusPM Phase: Document Version Date: 17. February 2000 Quality Review Method: Prepared By: Claus Jespersen Preparation Date: 17. February 2000 Reviewed By: Review Date: Distribution List From Date Phone/Fax Claus Jespersen, Hewlett-Packard Denmark, 17. February +4545991829 [email protected] 2000 To Action* Due Date Phone/Fax * Action Types: Approve, Review, Inform, File, Action Required, Attend Meeting, Other (please specify) Version History Ver. No. Ver. Date Revised By Description Filename 1.0 17. First finished version after a few drafts win2kfwmgt-v1.0.doc February 2000 FocusPM White paper by Claus Jespersen, HP Denmark Page2of2 Template (3 /2-Apr-1999) win2kfwmgt-v1.0 Last printed 16-Feb-00 21:58 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ 1. Proprietary Notice..............................................................................................................................................7
    [Show full text]
  • DPS7000/XTA User's Guide Security on the DIANE System
    A Security of the DIANE System ASCALE 7000 DPS7000/XT NOV Security REFERENCE 47 A2 02EL 01 DPS7000/XTA NOVASCALE 7000 Security of the DIANE System Security September 2004 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 47 A2 02EL 01 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull SAS 2004 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. Intel® and Itanium® are registered trademarks of Intel Corporation. Windows® and Microsoft® software are registered trademarks of Microsoft Corporation. UNIX® is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux® is a registered trademark of Linus Torvalds. The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Preface Preface Purpose This document targets customers requiring information about security issues on the Diane system (DPS7000/XTA). Several aspects of security are dealt with: NTFS permissions, essential services for the smooth running of the system and its maintenance, user groups and accounts, the NetBios share, the use of an antivirus software and the Windows updates.
    [Show full text]