Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
o Multimedia: The Role of DHCP in the Network Infrastructure
o Adding and Authorizing a DHCP Server Service
o Configuring a DHCP Scope
o Configuring DHCP Reservations and Options
o Configuring a DHCP Relay Agent
Managing and Monitoring Dynamic Host Configuration Protocol (DHCP)
o Managing a DHCP Database
o Monitoring DHCP
o Applying Security Guidelines for DHCP
Resolving Names
o Multimedia: Introduction to the Name Resolution Process
o Viewing Names on a Client
o Configuring Host Name Resolution
o Configuring NetBIOS Name Resolution
Resolving Host Names by Using Domain Name System (DNS)
o Multimedia: The Role of DNS in the Network Infrastructure
o Installing the DNS Server Service
o Configuring the DNS Server Service
o Configuring the DNS Zones
o Configuring DNS Zone Transfers
o Configuring a DNS Client
Integrating Domain Name System and Active Directory
o Configuring Active Directory Integrated Zones
o Configuring DNS Dynamic Updates
o Understanding How Active Directory Uses DNS
Managing and Monitoring Domain Name System (DNS)
o Managing DNS Records
o Testing the DNS Server Configuration
o Monitoring DNS Server Performance
Resolving NetBIOS Names by Using Windows Internet Name Service (WINS)
o Multimedia: The Role of WINS in the Network Infrastructure
o Installing and Configuring a WINS Server
o Managing Records in WINS
o Configuring WINS Replication
o Managing the WINS database
Configuring Routing by Using Routing and Remote Access
o Multimedia: The Role of Routing in the Network Infrastructure
o Enabling and Configuring the Routing and Remote Access Service
o Configuring Packet Filters
Securing Network Traffic by Using IPSec and Certificates
o Implementing IPSec
o Understanding IPSec Deployment Scenarios
o Monitoring IPSec
Configuring Network Access
o Introduction to a Network Access Infrastructure
o Configuring VPN Access
o Configuring Dial-up Access
o Configuring Wireless Access
o Controlling User Access to a Network
o Centralizing Network Access Authentication by Using IAS
o Protecting Remote Access by Using Network Access Quarantine
Managing and Monitoring Network Access
o Managing the Network Access Services
o Configuring Logging on a Network Access Server
o Collecting and Monitoring Network Access Data