Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Microsoft Windows XP Networking Inside Out

.pdf
Скачиваний:
21
Добавлен:
15.03.2015
Размер:
19.49 Mб
Скачать

Table of Contents

 

Planning for the Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 291

Installing the Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 291

Setting Up the Workgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 294

Configuring Other Windows XP Computers . . . . . . . . . . . . . . . . .

. 298

Configuring Computers Running Earlier Windows Versions . . . . .

. 298

Configuring Network Clients Manually . . . . . . . . . . . . . . . . . . . .

. 299

Changing the IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 300

Using Internet Connection Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 301

How ICS Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 302

Managing ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 303

Changing ICS Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 307

Common Workgroup Problems and Solutions . . . . . . . . . . . . . . . . . . . .

. 308

Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 308

Windows 95 Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . .

. 309

Manually Assigned Static IP

 

Addresses Cause Conflicts or Access Problems . . . . . . . . . . . . . .

. 309

The ICS Host Does Not Work . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 309

Internet Usage with ICS Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . .

. 310

A Client Can Connect to Other Network

 

Clients, But None Can Connect to Him . . . . . . . . . . . . . . . . . . . .

. 310

ICS Clients Cannot Autodial an AOL Connection . . . . . . . . . . . .

. 310

Chapter 11

 

Understanding Domain Connectivity

311

Understanding Active Directory Domains . . . . . . . . . . . . . . . . . . . . . . .

. 311

Running Windows XP Professional in a Domain Environment . . . . . . . .

. 321

Joining a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 322

Joining a Domain with Wizard Help . . . . . . . . . . . . . . . . . . . . . . .

. 323

Joining a Domain Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 327

Logging On to a Windows Domain . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 328

Ensuring That You Have Logged On to the Domain . . . . . . . . . . . . . . .

. 330

Surveying Windows XP Changes in a Domain Setting . . . . . . . . . . . . .

. 330

Start Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 330

Ctrl+Alt+Delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 331

User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 331

Internet Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 335

Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 335

Finding Domain Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 336

Browsing for Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 337

Searching Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 337

Creating a Network Place or Mapping a Network Drive . . . . . . .

. 339

Using the UNC Path or HTTP Address . . . . . . . . . . . . . . . . . . . . .

. 343

Leaving a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 344

Accessing Domain Resources from Windows XP Home Edition . . . . . .

. 344

x

Table of Contents

 

Chapter 12

 

Solving Connectivity Problems

345

Using Command-line Tools Included in Windows XP . . . . . . . . . . . . .

. . 345

Using Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 346

Using Tracert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 351

Using PathPing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 352

Using Ipconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 354

Using Netstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 355

Using Nbtstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 356

Running Additional Network Support Tools . . . . . . . . . . . . . . . . . . . . .

. . 356

Running Network Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 356

Using Windows Support Tools . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 359

Finding Helpful Utilities on the Internet . . . . . . . . . . . . . . . . . . . . . . .

. . 363

Ping Plotter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 363

VisualRoute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 364

NetPerSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 364

Troubleshooting Network Connections . . . . . . . . . . . . . . . . . . . . . . . .

. . 366

A Philosophy of Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . .

. . 366

Solving Common Network Connection Problems . . . . . . . . . . . .

. . 367

Part 4

 

Network Resources

371

Chapter 13

 

Selecting a File System

373

Understanding FAT32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 373

Understanding NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 376

newfeature!

 

New NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 378

Exploring NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . .

. . 380

Dynamic Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 380

Change Journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 383

NTFS Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 383

File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 384

File and Folder Access Control List . . . . . . . . . . . . . . . . . . . . . .

. . 385

Indexing Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 385

Sparse File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 386

Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 386

Volume Mount Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 387

Distributed Link Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 387

Multiple Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 387

Selecting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 388

Configuring NTFS Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 389

Converting a Disk to NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 389

xi

Table of Contents

Enabling Disk Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

Enabling Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392

Enabling Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

Mounting a Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394

Chapter 14

 

Understanding Resource

 

Sharing and NTFS Security

397

Understanding Network Resource Access . . . . . . . . . . . . . . . . . . . . . .

. . 398

Sharing Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 400

Sharing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 400

Sharing the Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 400

Assigning Printer Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 402

Connecting to a Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . .

. 406

Managing the Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 407

Sharing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 419

Sharing Resources with Simple File Sharing Enabled . . . . . . . . . .

. 419

Managing Permissions with Simple File Sharing Disabled . . . . . .

. 426

Removing Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 426

Assigning Share and NTFS Permissions . . . . . . . . . . . . . . . . . . . .

. 427

Managing Shares with Network Tools . . . . . . . . . . . . . . . . . . . . .

. 429

Solving Common Problems with Network Shares . . . . . . . . . . . . .

. 433

Configuring NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 433

Setting Advanced NTFS Permissions . . . . . . . . . . . . . . . . . . . . . .

. 437

Checking an Account’s Effective Permissions . . . . . . . . . . . . . . . .

. 438

Exploring Scenarios to Troubleshoot NTFS Permissions . . . . . . . . .

. 441

Chapter 15

 

Making Files Available Offline

449

Enabling the Offline Files Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 450

Configuring Offline Files Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 452

Making a File or Folder Available Offline . . . . . . . . . . . . . . . . . . . . . . .

. 453

Using Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 455

Synchronizing Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . .

. 457

Setting Synchronization Options . . . . . . . . . . . . . . . . . . . . . . . . .

. 459

Stop Using an Offline File or Folder . . . . . . . . . . . . . . . . . . . . . . .

. 463

Managing Caching Options on the Server . . . . . . . . . . . . . . . . . . . . . .

. 463

Handling Network Disconnections . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 464

Troubleshooting Offline Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 466

Using Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 467

Creating a Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 467

Synchronizing Files with Briefcase . . . . . . . . . . . . . . . . . . . . . . . .

. 469

Choosing Between Briefcase and Offline Files . . . . . . . . . . . . . . . . . . .

. 469

xii

Table of Contents

 

Part 5

 

Advanced Networking

471

Chapter 16

 

Remote Desktop and Remote Assistance

473

newfeature!

 

Exploring Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 473

Enabling Remote Desktop on the Host Computer . . . . . . . . . . .

. . 475

Using Remote Desktop over a Dial-up Connection . . . . . . . . . .

. . 477

Using Remote Desktop over the Internet/Firewall . . . . . . . . . . .

. . 477

Using Remote Desktop Through a Remote Access Server . . . . .

. . 479

Configuring the Client Computer . . . . . . . . . . . . . . . . . . . . . . . .

. . 480

Logging On Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 486

Generating a Remote Desktop

 

Session with Microsoft Internet Explorer . . . . . . . . . . . . . . . . . .

. . 487

Choosing Remote Desktop Options . . . . . . . . . . . . . . . . . . . . . .

. . 490

Remote Desktop and Group Policy . . . . . . . . . . . . . . . . . . . . . . .

. . 494

newfeature!

Exploring Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 Using Remote Assistance Through Firewalls . . . . . . . . . . . . . . . . . . 496 Enabling Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Requesting Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Using Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

Chapter 17

 

Remote Access and

 

Virtual Private Networking

503

Using Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 504

Configuring Remote Access Connections . . . . . . . . . . . . . . . . . .

. . 504

Configuring Remote Access Security . . . . . . . . . . . . . . . . . . . . .

. . 506

Allowing Clients to Dial in to Your Computer . . . . . . . . . . . . . . . .

. 510

Understanding Virtual Private Networking . . . . . . . . . . . . . . . . . . . . . .

. 513

Creating a Connection to a VPN Server . . . . . . . . . . . . . . . . . . . .

. 515

Configuring Windows XP to Act as a VPN Server . . . . . . . . . . . .

. 516

Chapter 18

 

Interconnectivity with Other Systems

519

Connecting with Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 Supported Networking Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Supported Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 Connecting Windows XP and Novell NetWare . . . . . . . . . . . . . . . . . . . . 523 Configuring Client Service for NetWare . . . . . . . . . . . . . . . . . . . . . 525 Interconnecting Windows XP and UNIX/Linux . . . . . . . . . . . . . . . . . . . . 526

xiii

Table of Contents

 

Installing Print Services for UNIX . . . . . . . . . . . . . . . . . . . . . . .

. . . 526

Microsoft Windows Services for UNIX . . . . . . . . . . . . . . . . . . .

. . . 527

Connecting Windows XP to Apple Macintosh Systems . . . . . . . . . . . .

. . 529

Connecting Windows and Mac OS X Using Samba . . . . . . . . . .

. . 529

Macintosh File Services for Windows 2000 Server . . . . . . . . . . .

. . 530

Chapter 19

 

Wireless Networking

531

Getting to Know Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . .

. . 531

Why Wireless Networks Are Important . . . . . . . . . . . . . . . . . . .

. . 532

Types of Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 533

Wireless Networks Supported by Windows XP . . . . . . . . . . . . . .

. . 535

How Infrared and Wi-Fi Work . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 536

Wireless Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . .

. . 539

Selecting a Wireless Network Topology . . . . . . . . . . . . . . . . . . .

. . 540

Understanding Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 542

Setting Up Your Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 544

Setting Up an Infrared Wireless Network . . . . . . . . . . . . . . . . . .

. . 544

Setting Up a Wi-Fi Network . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 551

Chapter 20

 

Maintaining Network Security

557

Examining Windows Security History . . . . . . . . . . . . . . . . . . . . . . . . .

. . 558

Understanding Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 560

Understanding Network-initiated Threats . . . . . . . . . . . . . . . . . .

. . 560

Understanding Local Security Threats . . . . . . . . . . . . . . . . . . . .

. . 564

Protecting Windows XP from Security Threats . . . . . . . . . . . . . . . . . .

. . 566

Using a Firewall for Protection from Network-initiated Threats

. . . 566

Inbound vs. Outbound Firewalls . . . . . . . . . . . . . . . . . . . . . . . .

. . 568

TCP/IP Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 569

Detecting Windows XP Security Issues . . . . . . . . . . . . . . . . . . . .

. . 572

Keeping Software Up to Date . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 573

Removing Unneeded Services . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 574

Securing IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 577

Using Netstat to Observe IP Connections . . . . . . . . . . . . . . . . .

. . 584

Configuring Network Shares . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 585

Securing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 585

Securing Remote Access Connections . . . . . . . . . . . . . . . . . . . .

. . 586

Securing Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 588

Protecting Windows XP from Viruses . . . . . . . . . . . . . . . . . . . . .

. . 590

Coping with E-mail Security Threats . . . . . . . . . . . . . . . . . . . . .

. . 591

Detecting Trojan Horse Applications . . . . . . . . . . . . . . . . . . . . . .

. . 591

Using Internet Explorer Safely . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 592

xiv

Table of Contents

 

Using Administrative Privileges . . . . . . . . . . . . . . . . . . . . . . . . .

. . 593

Protecting Files Using NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 593

Auditing Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 593

Auditing File System Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 594

Managing EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 595

Chapter 21

 

Monitoring Windows XP

 

Network Performance

597

Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Understanding Bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Detecting Bottlenecks with Windows XP Command-line Tools . . . . 599 Using Windows Task Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Using the Performance Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

Part 6

 

Appendix

611

Appendix A

 

Windows XP Service Pack 1

613

Default Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 613

Glossary

617

Index to Troubleshooting Topics

629

Index

631

xv

This page intentionally left blank

Acknowledgments

I would like to thank Alex Blanton for giving me the opportunity to write this book, and a big thanks also goes to Aileen Wrothwell for her guidance. A special thanks goes to David Dalan for his extra help and Jim Causey for bringing it all together. Thanks to Curtis Philips for a great technical review. Also, thanks to my agent, Margot Maley Hutchison, for her work on my behalf. Lastly and as always, thanks to my wife and children for their support.

— Curt Simmons

First and foremost, I’d like to thank Aileen Wrothwell and Curtis Philips for being such a fantastic team to work with. With a flair for both technical issues and the written word, Curt is the most amazing technical editor I’ve ever had the pleasure of working with.

Aileen is a complete joy to work for — fun, intelligent, and supportive. I’ve never had so much fun while writing. Thanks also to Alex Blanton and to Danielle Bird for giving me the opportunity to work on this project.

I’d also like to make a special mention of my friend and boss, Mark Lynch. If he hadn’t given me a shot all those years ago, my life and career would be nothing like they are today. Thanks for the continued support, and for everything.

Thanks also to my good friends Steve Hood, Ken Rawlings, Daniel Orrego, Ryan Hartman, Tina Golini, and especially Jennifer Dover for being there for me always, through thick and thin. Thanks to my mom, dad, and brother David for always being there too, and for everything else. My cat Miranda has also been supportive, understanding, and loving throughout this period, knowing when I needed a lap cat and when I just needed to be left to my thoughts. Meow. A final thanks to Stew, Chad, Joe (and Joe), Mary, Fitz, Brent, Kenny, P. Kevin, Matt, Art, Erica, Julie, Tom, Greg, Stacey, and everyone else who makes my life so pleasant.

— James F. Causey

The following members of the Microsoft community contributed their knowledge and expertise to reviewing the book’s content:

Tom Fout, Joseph Davies, Dennis Morgan, Ethan Zoller, Igor Kostic, Kenny Richards, Anton Krantz, Rob Trace, Ricardo Stern, Matt Powell, Jason Garms, Josh Rice, Ross Carter, Greg Gille, Sanjay Anand, Stewart Tansley, Avronil Bhattacharjee, Mihai Costea, Brian Aust, Brian Dewey, Jeffrey Saathoff, and Leon Braginski.

xvii

This page intentionally left blank

We’d Like to Hear from You!

Our goal at Microsoft Press is to create books that help you find the information you need to get the most out of your software.

The INSIDE OUT series was created with you in mind. As part of an effort to ensure that we’re creating the best, most useful books we can, we talked to our customers and asked them to tell us what they need from a Microsoft Press series. Help us continue to help you. Let us know what you like about this book and what we can do to make it better. When you write, please include the title and author of this book in your e-mail, as well as your name and contact information. We look forward to hearing from you.

How to Reach Us

E-mail: nsideout@microsoft.com

Mail: Inside Out Series Editor

Microsoft Press

One Microsoft Way

Redmond, WA 98052

Note: Unfortunately, we can’t provide support for any software problems you might experience. Please go to http://support.microsoft.com for help with any software issues.

xix

Соседние файлы в предмете Операционные системы