MTA: Networking Fundamentals. Download certification skills outline. Learning paths to gain the skills needed to become certified. Learning paths are not yet available for this certification. No current courses available for this certification. Languages: en zh-cn zh-tw fr de it ja ko pt-br ru es es-mx.
Candidates for this exam are familiar with general networking concepts and the technologies. All objectives of the exam are covered in depth so you'll be ready for any question on the exam. Explore all certifications in a concise training and certifications guide.
Check out an overview of fundamentals, role-based and specialty certifications. See two great offers to help boost your odds of success. You can learn more about the Microsoft Global Network at How Microsoft builds its fast and reliable global network.
Optimizing Microsoft network performance doesn't need to be complicated. You can get the best possible performance by following a few key principles:.
For more information on Microsoft network connectivity principles, see Microsoft Network Connectivity Principles.
Also, in many enterprise networks, all outbound Internet connections traverse the corporate network, and egress from a central location. In traditional network architectures, higher latency for generic Internet traffic is a necessary tradeoff in order to maintain network perimeter security, and performance optimization for Internet traffic typically involves upgrading or scaling out the equipment at network egress points.
However, this approach does not address the requirements for optimum network performance of SaaS services such as Microsoft We're making it easier to identify Microsoft network traffic and making it simpler to manage the network identification. The goal of traditional network security is to harden the corporate network perimeter against intrusion and malicious exploits. Most enterprise networks enforce network security for Internet traffic using technologies like proxy servers, firewalls, SSL break and inspect, deep packet inspection, and data loss prevention systems.
These technologies provide important risk mitigation for generic Internet requests but can dramatically reduce performance, scalability, and the quality of end user experience when applied to Microsoft endpoints.
Microsoft helps meet your organization's needs for content security and data usage compliance with built-in security and governance features designed specifically for Microsoft features and workloads. For more information about Microsoft security and compliance, see the Office security roadmap.
Microsoft is designed for optimal performance using endpoint security and encrypted network connections, reducing the need for perimeter security enforcement. Microsoft datacenters are located across the world and the service is designed to use various methods for connecting clients to best available service endpoints.
Privacy policy. Introduction to the Windows Server Core Network. A core network is a collection of network hardware, devices, and software that provides the fundamental services for your organization's information technology IT needs. Manual configuration of IP addresses on all computers on your network is time-consuming and less flexible than dynamically providing computers and other devices with IP address leases from a DHCP server.
DNS allows users, computers, applications, and services to find the IP addresses of computers and devices on the network by using the Fully Qualified Domain Name of the computer or device. A forest, which is one or more Active Directory domains that share the same class and attribute definitions schema , site and replication information configuration , and forest-wide search capabilities global catalog.
A forest root domain, which is the first domain created in a new forest. In Server name , type the name of the DNS computer that clients use for name resolution. For example, type DC1. Click Resolve. In Activate Scope , select Yes, I want to activate this scope now. To create new scopes for additional subnets, repeat this procedure.
Use a different IP address range for each subnet that you plan to deploy, and ensure that DHCP message forwarding is enabled on all routers that lead to other subnets. In Search the web and Windows , type System. In search results, click System Control panel. The System dialog box opens. In System , click Advanced system settings. Click the Computer Name tab.
In Computer Name , click Change. Right-click Start , and then click System. For example, to log on to the domain corp. If you intend to deploy network access servers, such as wireless access points or VPN servers, after installing your core network, it is recommended that you deploy both an NPS and a Web server. For network access deployments, the use of secure certificate-based authentication methods is recommended. You can use NPS to manage network access policies and to deploy secure authentication methods.
You can use a Web server to publish the certificate revocation list CRL of your certification authority CA that provides certificates for secure authentication. You can deploy server certificates and other additional features by using Core Network Companion Guides. For more information, see Additional Technical Resources.
The Network Policy Server NPS server is installed as a preparatory step for deploying other network access technologies, such as virtual private network VPN servers, wireless access points, and NPS is an optional component of a core network, but you should install NPS if any of the following are true:. Before deploying this role service, you must perform the following steps on the computer you are configuring as an NPS.
Planning the deployment of NPS1. Another recommended deployment model is the installation of NPS on a domain controller. If you intend to deploy network access servers, such as wireless access points or VPN servers, after deploying your core network, it is recommended that you deploy NPS. NPS also allows you to centrally configure and manage network policies that determine who can access the network, how they can access the network, and when they can access the network.
Plan the user accounts database. A dialog box opens asking if it should add features that are required for Network Policy and Access Services.
Click Add Features , and then click Next. In Select features , click Next , and in Network Policy and Access Services , review the information that is provided, and then click Next. In Select role services , click Network Policy Server. When the process completes, the message "Installation succeeded on ComputerName " is displayed, where ComputerName is the name of the computer upon which you installed Network Policy Server.
Click Close. NPSs must be registered in Active Directory so that they have permission to read the dial-in properties of user accounts during the authorization process.
The Network Policy Server dialog box opens. The Web Server IIS role in Windows Server provides a secure, easy-to-manage, modular and extensible platform for reliably hosting web sites, services, and applications. IIS also provides the following benefits:. Achieve application isolation by giving worker processes a unique identity and sandboxed configuration by default, further reducing security risks. Easily add, remove, and even replace built-in IIS components with custom modules, suited for customer needs.
On the Select destination server page, ensure that the local computer is selected, and then click Next. Click Next until you have accepted all of the default web server settings, and then click Install. The following sections contain additional configuration information for computers that are running operating systems other than Windows Server , Windows 10, Windows Server , and Windows 8.
In addition, a network preparation worksheet is provided to assist you with your deployment. You can use the procedures in this section to provide computers running Windows Server R2, Windows 7, Windows Server , and Windows Vista with a different computer name. Windows Server R2 and Windows 7. Windows Server and Windows Vista.
Click Start , right-click Computer , and then click Properties. In Computer name, domain, and workgroup settings , click Change settings. On computers running Windows 7, before the System Properties dialog box opens, the User Account Control dialog box opens, requesting permission to continue.
Click Continue to proceed. In Computer Name , type the name for your computer. On computers running Windows Vista, before the System Properties dialog box opens, the User Account Control dialog box opens, requesting permission to continue.
This topic provides procedures for configuring static IP addresses on computers running the following operating systems:. Membership in Administrators , or equivalent, is the minimum required to perform this procedure.
In Control Panel , click Network and Internet. Network and Internet opens. Network and Sharing Center opens. Network Connections opens. In Network Connections , right-click the network connection that you want to configure, and then click Properties. To join a computer to a domain, you must be logged on to the computer with the local Administrator account or, if you are logged on to the computer with a user account that does not have local computer administrative credentials, you must provide the credentials for the local Administrator account during the process of joining the computer to the domain.
In addition, you must have a user account in the domain to which you want to join the computer. During the process of joining the computer to the domain, you will be prompted for your domain account credentials user name and password. Membership in Domain Users , or equivalent, is the minimum required to perform this procedure.
In Computer Name , in Member of , select Domain , and then type the name of the domain you want to join. You can use these procedures to log on to the domain using computers running Windows Server R2, Windows 7, Windows Server , and Windows Vista. You can use this Network Planning Preparation Sheet to gather the information required to install a core network.
This topic provides tables that contain the individual configuration items for each server computer for which you must supply information or specific values during the installation or configuration process.
Example values are provided for each configuration item. For planning and tracking purposes, spaces are provided in each table for you to enter the values used for your deployment. If you log security-related values in these tables, you should store the information in a secure location. The following links lead to the sections in this topic that provide configuration items and example values that are associated with the deployment procedures presented in this guide.
Creating an exclusion range in DHCP. Creating a new DHCP scope. Installing Network Policy Server optional. The following tables list pre-installation configuration items as described in Configuring All Servers :.
Or accept the default location. Start IP address The following three tables list pre-installation configuration items as described in Configuring All Servers :. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Is this page helpful? Please rate your experience Yes No. Any additional feedback? Important After you select the IP address ranges that you want to use for each subnet, ensure that you configure your routers with an IP address from the same IP address range as that used on the subnet where the router is installed.
Important When using private IP addresses, you must use some type of proxy or network address translation NAT server to convert the private IP address ranges on your local network to a public IP address that can be routed on the Internet. Important After the forest functional level is raised, domain controllers that are running earlier operating systems cannot be introduced into the forest.
Note Individual computers that are running Windows have a local users and groups user account database that is called the Security Accounts Manager SAM user accounts database. Note Equivalent Windows PowerShell commands are provided for most procedures in this guide. Before running these cmdlets in Windows PowerShell, replace example values with values that are appropriate for your network deployment. In addition, you must enter each cmdlet on a single line in Windows PowerShell.
0コメント