Lab Instructions and Answer Key: Configuring and Troubleshooting A Windows Server® 2008 Network Infrastructure
Lab Instructions and Answer Key: Configuring and Troubleshooting A Windows Server® 2008 Network Infrastructure
6421A
Lab Instructions and Answer Key:
Configuring and Troubleshooting a
Windows Server® 2008 Network
Infrastructure
Information in this document, including URL and other Internet Web site references, is subject to
change without notice. Unless otherwise noted, the example companies, organizations, products,
domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,
and no association with any real company, organization, product, domain name, e-mail address,
logo, person, place or event is intended or should be inferred. Complying with all applicable
copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part
of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted
in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for
any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory,
regarding these manufacturers or the use of the products with any Microsoft technologies. The
inclusion of a manufacturer or product does not imply endorsement of Microsoft of the
manufacturer or product. Links may be provided to third party sites. Such sites are not under the
control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link
contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for
webcasting or any other form of transmission received from any linked site. Microsoft is providing
these links to you only as a convenience, and the inclusion of any link does not imply endorsement
of Microsoft of the site or the products contained therein.
© 2008 Microsoft Corporation. All rights reserved.
Microsoft, Access, Active Directory, ActiveX, BitLocker, ESP, Hyper-V, Internet Explorer, MS-DOS,
Outlook, PowerPoint, SharePoint, SQL Server, Windows, Windows Server and Windows Vista are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.
Released: 05/2008
Lab Instructions: Installing and Configuring Servers 1
Module 1
Lab Instructions: Installing and Configuring
Servers
Contents:
Exercise 1: Identifying Server Types 4
Exercise 2: Installing and Configuring Server Roles
and Features 5
Exercise 3: Configuring Server Core and Performing
Basic Management Tasks 8
2 Lab Instructions: Installing and Configuring Servers
Objectives
After completing this lab, you will be able to:
• Describe the appropriate server type needed for a usage scenario
• Install and configure server roles and features
• Configure Server Core and perform basic management tasks
Lab Instructions: Installing and Configuring Servers 3
Scenario
You must install two new servers for your corporate infrastructure in the
WoodgroveBank.com domain. The new servers are needed to increase DNS name-
resolution services for a newly acquired company, Contoso.com, and to provide
Terminal Services for some line-of-business applications that will be available to
employees from their desktop computers and from their homes after hours. You
also need to install backup capacity for the Terminal Services server in case it is
necessary for disaster recovery purposes.
For security purposes, the DNS service should be available on only one of the new
servers and will be administered completely through remote management tools
after initial configuration. You need to ensure that the firewall configuration on the
DNS server is correct for the ports required to respond to DNS name-resolution
requests and for remote administration.
4 Lab Instructions: Installing and Configuring Servers
Question: After reading the scenario, which installation type, Core or Standard,
would be suitable for Terminal Services? Why?
Question: Would the Core installation be suitable for the DNS server? If so, are
there any shortcomings to configuring the server to host this role?
Question: What benefits would you realize by using the Core installation option
for the DNS server role?
Question: What roles and features are needed on the servers to meet the given
scenario’s requirements?
Lab Instructions: Installing and Configuring Servers 5
f Task 5: Install the Server Backup feature from the Server Manager
console
1. In the Server Manager list pane, right-click Features, and then click Add
Features. The Add Features Wizard appears.
2. Install the Windows Server Backup Features option.
3. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close. Do not close Server Manager.
The Windows Server Backup feature is installed.
Lab Instructions: Installing and Configuring Servers 7
f Task 6: Verify the Terminal Services and Windows Server Backup tools
are installed
1. In the list pane of Server Manager, verify that Server Manager (NYC-SVR1) is
selected.
2. Using the scroll bar in the details pane, scroll down until the Roles Summary
is visible, and verify that Terminal Services is listed.
3. Scroll down to Features Summary, and verify that Windows Server Backup
appears.
4. Close Server Manager.
8 Lab Instructions: Installing and Configuring Servers
f Task 3: Use command line tools to set parameters in the Server Core
virtual machine
• Computername=NYC-DNSSVR2
• IP address=10.10.0.12
• Mask=255.255.0
• Gateway=10.10.0.1
• DNS=10.10.0.10
1. To determine the current default assigned computer name, type set in the
command window.
2. Locate the computer name attribute, and write it down.
3. To change the computer name, type the following command, and then press
ENTER:
Netdom renamecomputer NYC-SVR2 /NewName:NYC-DNSSVR2
4. When prompted, type y for yes, and then press ENTER.
5. In the command window, type the following command to set the static IP
address: Netsh interface ipv4 set address name= “local area connection”
source=static address=10.10.0.12 mask=255.255.0.0 gateway=10.10.0.1
and then press ENTER.
6. In the command window, type the following command to set the primary DNS
server, and then press ENTER:
Netsh interface ip set dns “local area connection” static 10.10.0.10 primary
7. At the command prompt, type ipconfig /all and then press ENTER to verify
the IP address assignment.
8. On the keyboard, press RIGHT-ALT+DELETE.
9. Choose to restart the computer by clicking Shutdown options in the lower
right-hand pane of the window, and then click Restart.
10. In the Shutdown Event Tracker window, click Operating System:
Reconfiguration (Planned), and then click OK. The server restarts.
11. Log on to the server with the user name Administrator and a password of
Pa$$w0rd.
10 Lab Instructions: Installing and Configuring Servers
Note: Your keystrokes will not be reflected on the screen. You will receive a message
that the command completed successfully and that the computer needs to be
restarted.
Note: Notice that the Firewall status shows that the Operational mode is set to
Enable This means that the Windows Firewall is enabled but no specific ports have
been opened.
Lab Instructions: Installing and Configuring Servers 11
Note: Notice that in the Service configuration for Domain profile, File and Printer
Sharing and Remote Desktop services are set to enable, and both TCP and UDP port
53 are open for the DNS server.
12 Lab Instructions: Installing and Configuring Servers
f Task 8: View the current status of roles, and install the DNS server role
1. In the command prompt window, at the command prompt, type the following
command, and then press ENTER:
oclist
2. Use the Ocsetup.exe and oclist commands to install the DNS server. To do
this, type the following at the command prompt, and then press ENTER:
start /w ocsetup DNS-Server-Core-Role
3. At the command prompt, type the following command, and then press
ENTER:
oclist
f Task 10: Close all virtual machines, and discard undo disks
1. For each virtual machine that is running, close the Virtual Machine Remote
Control window.
2. In the Close box, select Turn off machine and discard changes, and then
click OK.
3. Close the 6421A Lab Launcher.
Lab Instructions: Configuring and Troubleshooting DNS 1
Module 2
Lab Instructions: Configuring and
Troubleshooting DNS
Contents:
Exercise 1: Configuring a DNS Infrastructure 3
Exercise 2: Monitoring and Troubleshooting DNS 6
2 Lab Instructions: Configuring and Troubleshooting DNS
Objectives
• Configure a DNS Infrastructure to include a secondary zone, stub zone, and
secure zone transfers
• Monitor DNS
Lab Instructions: Configuring and Troubleshooting DNS 3
Exercise Overview:
In this exercise, you will configure the DNS server role on a member server, and
configure the contoso.msft and nwtraders.msft zones. You then will create
secondary zones for each domain and create a stub zone for Nwtraders.msft.
The main tasks are as follows:
1. Start the virtual machines and log on.
2. Configure the DNS Server role on NYC-SVR1.
3. Configure the Contoso.msft zone on NYC-SVR1.
4. Configure the Nwtraders.msft zone on NYC-DC1.
5. Configure zone transfer security.
6. Configure secondary zones for each domain on NYC-SVR1 and NYC-DC1.
7. Configure a stub zone for Nwtraders.msft on NYC-SVR2.
8. Configure administrative options for the Nwtradters.msft domain.
Exercise Overview
In this exercise, you will perform several tests to ensure the DNS infrastructure is
working properly. You will use several DNS troubleshooting tools to validate DNS
configuration and responses.
The main tasks are as follows:
1. Test simple and recursive queries.
2. Verify SOA records by using Nslookup.
3. Use the Dnslint command to verify name server records.
4. View performance statistics by using the Performance console.
5. Verify DNS replication.
6. Close all virtual machines and discard undo disks.
Note: Do not turn off the virtual machines until you have completed the Lab Review
questions.
1. For each virtual machine that is running, close the Virtual Machine Remote
Control (VMRC) window.
2. In the Close box, select Turn off machine and discard changes, and then
click OK.
3. Close the 6421A Lab Launcher.
Lab Instructions: Configuring and Managing WINS 1
Module 3
Lab Instructions: Configuring and Managing
WINS
Contents:
Exercise 1: Installing WINS 4
Exercise 2: Configuring WINS Burst Handling 6
Exercise 3: Configuring WINS Replication 8
Exercise 4: Migrating from WINS to DNS 9
2 Lab Instructions: Configuring and Managing WINS
Objectives
• Install WINS
• Configure WINS burst handling
• Configure WINS replication
• Migrate from WINS to DNS
Scenario
You are tasked with installing a second WINS server for the Woodgrovebank
domain for fault tolerance and use as a secondary WINS server resolver for domain
clients. The database consistency and convergence speed are of the utmost
importance. Replication must be set up to make sure records replicate on change
vector or time vector, whichever happens to occur first.
Lab Instructions: Configuring and Managing WINS 3
f Task 3: From the Server Manager console, install the WINS feature
1. In Server Manager, use the Add Features Wizard to install the WINS feature
on 6421A-NYC-SVR1.
2. On the Installation Results page, verify that the installation succeeded before
closing the wizard.
Important: Do not log off or shut down the virtual machines at this point.
6 Lab Instructions: Configuring and Managing WINS
f Task 2: Create the Alias record for the single-label name resource
1. In the DNS Manager console, create a New Alias (CNAME) record in the
GlobalNames forward lookup zone with an alias name of HRWEB and a
FQDN of NYC-DC1.Woodgrovebank.com.
2. Close the DNS Manager console.
10 Lab Instructions: Configuring and Managing WINS
Module 4
Lab Instructions: Configuring and
Troubleshooting DHCP
Contents:
Exercise 1: Installing and Authorizing the DHCP Server Role 3
Exercise 2: Configuring a DHCP Scope 5
Exercise 3: Troubleshooting Common DHCP Issues 7
2 Lab Instructions: Configuring and Troubleshooting DHCP
Exercise Overview
In this exercise, you will install the DHCP role and then authorize the server in the
woodgrovebank.com domain.
The main tasks are as follows:
1. Start the 6421A-NYC-DC1 and 6421A-NYC-CL1 Virtual Machines, and log on
as Administrator.
2. Configure the DHCP Server role on NYC-DC1.
3. Authorize the DHCP Server role on NYC-DC1.
Exercise Overview
In this exercise, you will configure a new DHCP scope, activate the scope, and
configure scope options so that clients receive the correct information when they
lease an IP address.
The main tasks are as follows:
1. Configure a DHCP scope.
2. Configure DHCP scope options.
3. Test the scope using a client workstation.
Question: Why does the DHCP-configured Local Area Connection not have a
default gateway?
Note: Make sure to configure the scope options and not the server options.
Exercise Overview
You will run a script that will configure the DHCP server so that it will not work
properly. Using the available information, you then will fix the configuration
problems that the script caused.
The main tasks are as follows:
1. Verify DHCP lease information.
2. Modify DHCP Server configuration using scripts to simulate configuration
issues.
3. Check the client’s ability to lease an IP address.
4. Determine why the DHCP server is not allocating IP addresses.
5. Identify information that has been changed.
6. Configure the DHCP server with the correct router information.
7. Configure the DHCP server with the correct DNS server information.
8. Configure the DHCP with the proper lease period.
9. Verify the information being leased to the client.
10. Close all virtual machines and discard undo disks.
f Task 6: Configure the DHCP server with the correct router information
• On NYC-DC1, verify the router information configured in the scope options.
f Task 7: Configure the DHCP server with the correct DNS server
information
• On NYC-DC1, verify the DNS server information configured in the scope
options.
f Task 10: Close all virtual machines, and discard undo disks
1. For each virtual machine that is running, close the Virtual Machine Remote
Control (VMRC) window.
2. In the Close box, select Turn off machine and discard changes, and then
click OK.
3. Close the 6421A Lab Launcher.
Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP 1
Module 5
Lab Instructions: Configuring and
Troubleshooting IPv6 TCP/IP
Contents:
Lab A: Configuring an ISATAP Router
Exercise 1: Configuring a New IPv6 Network and Client 4
Exercise 2: Configuring an ISATAP Router to
Enable Communications Between an IPv4 Network and an
IPv6 Network 7
Lab B: Converting the Network
Exercise 1: Transitioning to an IPv6-Only Network 10
2 Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP
Objectives
• Configure a new IPv6 network and client
• Configure an ISATAP router to enable communications between the IPv4
network and the IPv6 network
Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP 3
Logon Information
For this lab, you will log on to the 6421A-NYC-DC1, 6421A-NYC-SVR1, and
6421A-NYC-CL1 virtual machines using the following information:
• User Name: Administrator
• Password: Pa$$w0rd
4 Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP
Exercise Overview
In this exercise, you will prepare the current environment to work with IPv6, and
deploy an IPv6 client and IPv6 subnet.
The main tasks are as follows:
1. Start the 6421A-NYC-DC1, 6421A-NYC-SVR1, and 6421A-NYC-CL1 virtual
machines.
2. Configure IPv4 routing.
3. Enable IP Routing on NYC-SVR1 and confirm IPv4 Connectivity.
4. Disable IPv6 on NYC-DC1.
5. Disable IPv4 on NYC-CL1.
6. Check the IP configuration on NYC-CL1, and ensure that it is not configured
with an IPv4 IP address.
7. Configure an IPv6 router advertisement for the global address
2001:db8:0:1::/64 network on NYC-SVR1.
8. Check the IP configuration on NYC-CL1 to ensure it is configured with an IPv6
global address in the 2001:db8:0:1::/64 network.
Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP 5
Note: At this point, only IPv4 traffic is routed through the IPv4 routing
infrastructure.
Exercise Overview
In this exercise, you will enable and configure an ISATAP router interface that will
allow two-way communications between the IPv4 and IPv6 networks.
The main tasks are as follows:
1. Add the ISATAP entry in the DNS zone.
2. Configure the ISATAP router on NYC-SVR1.
3. Enable the ISATAP interface on NYC-DC1.
4. Test connectivity with the IPv6 client.
Note: Notice that the tunnel adapter Local Area Connection 8 (which is the ISATAP
adapter) has received an IPv6 address automatically from the ISATAP router.
Note: If the IP addresses do not resolve, reboot the servers, starting with NYC-DC1,
NYC-SVR1, and then NYC-CL1.
Important: Do not turn off the virtual machines at this time because you need them
to complete the next lab.
Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP 9
Objective
• Transition the network into an IPv6-only network.
Scenario
You are responsible for testing the IPv6 transition plan. To accomplish this, you
will transition the computers from the previous network that uses both IPv4 and
IPv6, and transition them to an IPv6-only network.
10 Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP
Note: If the IP addresses do not resolve, reboot the servers starting with NYC-DC1,
NYC-SVR1, and then NYC-CL1.
Lab Instructions: Configuring and Troubleshooting IPv6 TCP/IP 11
Module 6
Lab Instructions: Configuring and
Troubleshooting Routing and Remote Access
Contents:
Exercise 1: Configuring Routing and Remote Access
as a VPN Remote Access Solution 4
Exercise 2: Configuring a Custom Network Policy 7
Exercise 3: Configuring Logging 8
Exercise 4: Configuring a Connection Profile 10
2 Lab Instructions: Configuring and Troubleshooting Routing and Remote Access
Objectives
After completing this lab, you will be able to:
• Configure the Routing and Remote Access service as a VPN remote access
solution.
• Configure a custom Network Policy.
• Configure logging.
• Configure a connection profile.
Lab Instructions: Configuring and Troubleshooting Routing and Remote Access 3
Scenario
Woodgrove Bank would like to implement a remote access solution for its
employees so they can connect to the corporate network while away from the
office. Woodgrove Bank requires a network policy that mandates that VPN
connections are encrypted for security reasons.
The IT department of Woodgrove Bank does not want the Remote Access solution
to cause a dramatic increase in support calls to the Help Desk for configuration
issues regarding VPN connection objects that need to be created on the client
computer.
4 Lab Instructions: Configuring and Troubleshooting Routing and Remote Access
f Task 2: Install the Network Policy and Access Services role on 6421A-
NYC-SVR1
1. Open Server Manager on NYC-SVR1, and click Add Roles.
2. In Server Manager, on the Server Roles page, scroll down, select Network
Policy and Access Services, and then click Next.
3. On the Select Role Services page, select Network Policy Server and Routing
and Remote Access Services, and then click Next.
4. On the Confirm Installation Selections page, click Install.
5. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close.
The Network Policy and Routing and Remote Access Services roles are
installed on NYC-SVR1.
Note: Do not log off or shut down the virtual machines at this point.
f Task 2: Create a new network policy for Routing and Remote Access
Service clients
1. In the list pane of the Network Policy Server administrative tool, expand
Policies, right-click Network Policies, and then click New.
2. In the New Network Policy wizard, specify the following settings, and accept
the default values for all other settings:
• Network Policy Name: Secure VPN
• Type of network access server: Remote Access Server (VPN-Dial up)
• Specify Conditions: Tunnel Type: PPTP and L2TP
• Configure Authentication Methods: Deselect MS-CHAP
• Configure Constraints: Day and Time: deny access Mon thru Fri 11PM to
6AM
• Configure Settings: Under Encryption, clear all settings except Strongest
encryption
3. Close the Network Policy Server administrative tool.
8 Lab Instructions: Configuring and Troubleshooting Routing and Remote Access
• In Add Support for VPN Connections, select Phone book from this
profile, and specify to always use the same VPN server with an IP
address of 10.10.0.24.
• In Add a custom Phone Book, deselect Automatically download phone
book updates.
3. On the Your Connection Manager Profile is Complete and Ready to
Distribute page, click Finish.
4. From NYC-SVR1, copy the CORP_VPN folder from the C:\Program
Files\CMAK\Profiles\Vista\ location to the \\NYC-DC1\Module6 location.
Module 7
Lab Instructions: Installing, Configuring, and
Troubleshooting the Network Policy Server Role
Service
Contents:
Exercise 1: Installing and Configuring the Network
Policy Server Role Service 4
Exercise 2: Configuring a RADIUS Client 6
Exercise 3: Configuring Certificate Auto-Enrollment 8
2 Lab Instructions: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
Objectives
After completing this lab, you will be able to:
• Install the Network Policy Server role service and configure Network Policy
Server settings
• Configure a RADIUS client
• Configure certificate autoenrollment
Lab Instructions: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service 3
Scenario
Woodgrove Bank is expanding its remote-access solution to all its branch office
employees. This will require multiple Routing and Remote Access servers located
at different points to provide connectivity for its employees. You will use RADIUS
to centralize authentication and accounting for the remote-access solution.
The Windows Infrastructure Services Technology Specialist has been tasked with
installing and configuring Network Policy Server into an existing infrastructure to
be used for NAP, Wireless and Wired access, RADIUS, and RADIUS Proxy.
4 Lab Instructions: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
f Task 2: Install the Routing and Remote Access Services role on 6421A-
NYC-SVR1
1. Using Server Manager, install the Network Policy and Access Services role
with the role service of Routing and Remote Access.
2. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close.
The Routing and Remote Access Services role is installed on 6421A-NYC-
SVR1.
3. Do not log off or shut down the virtual PCs at this point.
Lab Instructions: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service 7
Module 8
Lab Instructions: Configuring Network Access
Protection
Contents:
Exercise 1: Configuring NAP for DHCP Clients 3
Exercise 2: Configuring NAP for VPN Clients 11
2 Lab Instructions: Configuring Network Access Protection
Objectives
• Configure NAP for DHCP clients
• Configure NAP for VPN clients
Scenario
As the Woodgrove Bank technology specialist, you need to establish a way to bring
client computers automatically into compliance. You will do this by using Network
Policy Server, creating client compliance policies, and configuring a NAP server to
check the current health of computers.
Lab Instructions: Configuring Network Access Protection 3
Important: A setting of Access granted does not mean that noncompliant clients
are granted full network access. It specifies that clients matching these conditions
will be granted an access level that the policy determines.
Important: A setting of Access granted does not mean that noncompliant clients
are granted full network access. It specifies that the policy should continue to
evaluate clients matching these conditions.
j. Click OK to close the Add IP Filter dialog box, and then select Permit
only the packets listed below in the Inbound Filters dialog box.
k. Under IPv4, create a new outbound filter with the following source
network values:
• IP address: 10.10.0.10
• Subnet mask: 255.255.255.255
l. Click OK to close the Add IP Filter dialog box, and then select Permit
only the packets listed below in the Outbound Filters dialog box. This
ensures that only traffic from DC1 can be sent to noncompliant clients.
m. In the Completing New Network Policy window, click Finish.
8. Configure connection request policies:
a. Click Connection Request Policies.
b. Disable the default Connection Request policy found under Policy Name.
c. Create a new Connection Request policy called VPN connections.
d. Under Type of network access server, select Remote Access Server
(VPN-Dial up).
e. In the Specify Conditions window, click Add.
f. In the Select Condition window, double-click Tunnel Type, select PPTP
and L2TP, and then click OK.
g. In the Specify Connection Request Forwarding window, verify that
Authenticate requests on this server is selected.
h. In the Specify Authentication Methods window, select Override network
policy authentication settings.
i. Under EAP Types, click Add. In the Add EAP dialog box, under
Authentication methods, click Microsoft: Protected EAP (PEAP).
j. Under EAP Types, click Add. In the Add EAP dialog box, under
Authentication methods, click Microsoft: Secured password (EAP-
MSCHAP v2).
k. Under EAP Types, click Microsoft: Protected EAP (PEAP), and then click
Edit.
l. Verify that Enable Quarantine checks is selected, and then click OK.
m. Click Next twice, and then click Finish.
16 Lab Instructions: Configuring Network Access Protection
i. Click Properties.
j. Select the Validate server certificate check box. Clear the Connect to
these servers check box, and then select Secured Password (EAP-
MSCHAP v2) under Select Authentication Method. Clear the Enable
Fast Reconnect check box, and then select the Enable Quarantine
checks check box.
k. Click OK three times to accept these settings.
7. Test the VPN connection:
a. In the Network Connections window, use the Woodgrovebank
connection object to initiate the VPN connection.
b. Verify that administrator account credentials are entered and that the Save
this user name and password for future use check box is selected, and
then click OK.
c. You are presented with a Validate Server Certificate window the first
time this VPN connection is used. Click View Server Certificate, and
verify Certificate Information states that the certificate was issued to
NYC-SVR1.Woodgrovebank.com by Root CA. Click OK to close the
Certificate window, and then click OK again.
d. Wait for the VPN connection to be made. Because NYC-CL1 is compliant,
it should have unlimited access to the intranet subnet.
e. Open a command prompt and type ipconfig /all to view the
configuration.
f. View the IP configuration. System Quarantine State should be Not
Restricted.
The client now meets the requirement for VPN full connectivity.
g. Disconnect from the Woodgrovebank VPN.
8. Configure Windows Security Health Validator to require an antivirus
application:
a. On NYC-SVR1, open Network Policy Server.
b. Expand Network Access Protection, and then click System Health
Validators.
20 Lab Instructions: Configuring Network Access Protection
Module 9
Lab Instructions: Configuring IPsec
Contents:
Exercise 1: Preparing the Network Environment
for IPsec NAP Enforcement 3
Exercise 2: Configuring and Testing IPsec NAP
Enforcement 9
2 Lab Instructions: Configuring IPsec
Objectives:
• Prepare the network environment for IPsec NAP enforcement
• Configure and test IPsec enforcement
Scenario
Due to recent security related incidents on the internal network, Woodgrove Bank
wants to implement IPsec policies to mitigate security risks through encryption,
and use Network Access Protection to verify the health of communicating parties
prior to data transmission. The Woodgrove Bank Information Services (IS)
Manager wants you to configure an IPsec Network Access Protection enforcement
environment to mitigate any related future network security issues.
Lab Instructions: Configuring IPsec 3
5. On the Define NAP Health Policy page, verify that the Windows Security
Health Validator and Enable auto-remediation of client computers check
boxes are selected, and then click Finish on the Completing New Network
Access Protection Policies and RADIUS clients page.
6. Leave the NPS console open for the following task.
f Task 10: Enable the IPsec enforcement client and configure client
health registration settings
1. On NYC-CL1, open the NAP Client Configuration console by typing
napclcfg.msc in the Start Search text box.
2. Enable IPsec Relying Party in the Enforcement Clients details pane.
3. In the NAP Client Configuration console tree, double-click Health
Registration Settings.
4. Add two new Trusted Server Groups, select do not require server
verification, and then click New.
8 Lab Instructions: Configuring IPsec
5. Under Add URLs of the health registration authority that you want the
client to trust, type http://nyc-
dc1.woodgrovebank.com/domainhra/hcsrvext.dll, and then click Add. Type
http://nyc-dc1.woodgrovebank.com /nondomainhra/hcsrvext.dll, click
Add, and then Finish.
6. In the console tree, click Trusted Server Groups, and verify that the URLs are
entered correctly.
7. Close the NAP Client Configuration window.
8. Repeat steps 1 through 7 on NYC-CL2.
3. Edit the Secure Policy to create IPsec policies for all profile states.
a. Open Secure Policy [nyc-dc1.woodgrovebank.com] Policy\Computer
Configuration\Policies\Windows Settings\Security Settings\Windows
Firewall with Advanced Security, and open the properties of Windows
Firewall with Advanced Security – LDAP.
b. On the Domain Profile tab, next to Firewall state, select On
(recommended). Next to Inbound connections, select Block (default).
Next to Outbound connections, select Allow (default). The same settings
will be used for the private and public profiles.
4. In the Group Policy Management Editor console tree, under Windows
Firewall with Advanced Security - LDAP, right-click Connection Security
Rules, and create a new rule that has Isolation and Require authentication
for inbound connections and request authentication for outbound
connections selected.
5. On the Authentication Method page, select Computer certificate, select the
Only accept health certificates check box, and specify WoodgroveBank-
RootCA.
6. On the Profile page, verify that the Private, Public, and Domain check boxes
are selected. On the Name page type Secure Rule, and then click Finish.
7. Right-click Inbound Rules, and then create a new rule using the predefined
File and Printer Sharing rule with only the Allow the connection if it is
secure option.
8. Close the Group Policy Management Editor console.
Note: Automatic updates will be required for NAP compliance by enabling this
system health check in the Windows Security Health Validator.
Note: Do not close the Security control panel on NYC-CL2. You will use it to
reenable Windows Update in a future step.
Lab Instructions: Configuring IPsec 13
9. On NYC-CL1, verify that the response in the command window has changed
to Request timed out.
10. On NYC-CL1, click Start, and in the Start Search text box, type \\NYC-CL2\
and verify the share is inaccessible.
11. On NYC-CL2, in the Security control panel under Windows Update, click
Turn automatic updating on or off, select Install updates automatically
(recommended), and then click OK. This setting will cause NYC-CL2 to send
a new SoH that indicates it is compliant with network health requirements,
and NYC-CL2 will be granted full network access.
12. On NYC-CL1, verify that the response in the command window changes to
Reply from 10.10.0.60. It might take a minute before you see the change in
status.
13. Verify that you can browse the share of NYC-CL2 (\\NYC-CL2\).
14. Close all open windows.
Module 10
Lab Instructions: Monitoring and
Troubleshooting IPSec
Contents:
Exercise 1: Monitoring IPSec Connectivity 3
Exercise 2: Configuring Connection Security 5
Exercise 3: Troubleshooting IPSec 7
2 Lab Instructions: Monitoring and Troubleshooting IPSec
Objectives
• Monitor IPsec connectivity
• Configure connection security
• Troubleshoot IPsec
Scenario:
The Windows Infrastructure Services Technology Specialist has been tasked with
extending an existing network infrastructure to include the IPsec functionality.
Using the IP Security Monitor and Windows Firewall with Advanced Security snap-
ins, you can view IP security statistics and policies, determine if IPsec is failing
negotiations, and monitor IPsec statistics. Troubleshooting escalations are being
sent to you.
Lab Instructions: Monitoring and Troubleshooting IPSec 3
f Task 1: Disable the IP Security Policy that you created in the previous
exercise
1. Disable the IP Security Policy on NYC-DC1.
2. Disable the IP Security Policy on NYC-SVR1.
Scenario 1
An administrator is attempting to connect to a remote computer and monitor its
IPsec connectivity. The administrator reports that he is unable to monitor the
remote server. You ask him use the Event Viewer to identify the problem, and in
doing so, the administrator notes the following error: “The IPsec server is
unavailable or incompatible with the IPsec monitor.”
Scenario 2
An administrator has configured and enabled an IPsec Security policy on a file
server that stores sensitive data files. The administrator also has created an Active
Directory-based policy and applied it to the organizational unit (OU) of clients that
are permitted access to the secure server. The next day, the Backup Administrator,
who must back up the secure server, reports that he was unable to access the
secure server from the backup server. The backup server’s computer account is
stored in an administrative OU separate from the client’s OU.
Question: Based on the information provided, why is the backup server unable to
access the secure server?
Lab Instructions: Configuring and Managing Distributed File System 1
Module 11
Lab Instructions: Configuring and Managing
Distributed File System
Contents:
Exercise 1: Installing the Distributed File
System Role Service 4
Exercise 2: Creating a DFS Namespace 6
Exercise 3: Configuring Folder Targets and Folder
Replication 8
Exercise 4: Viewing Diagnostic Reports for
Replicated Folders 12
2 Lab Instructions: Configuring and Managing Distributed File System
Objectives
• Install the Distributed File System Role Service
• Create a DFS Namespace
• Configure Folder Targets and Folder Replication
• View Diagnostic Reports
Logon Information
• Virtual Machines: 6421A-NYC-DC1 and 6421A-NYC-SVR1
• User Name: WoodgroveBank\Administrator
• Password: Pa$$w0rd
Lab Instructions: Configuring and Managing Distributed File System 3
Scenario
You are a Windows Infrastructure Services Technology Specialist for Woodgrove
Bank. To simplify file access for users and provide high availability and
redundancy, you will implement a DFS solution for a number of disparate file
shares. For this project, you must complete the following tasks:
• Install the Distributed Files System role service to include DFS namespaces
and DFS replication.
• Create a domain-based DFS namespace called CorpDocs with NYC-DC1 and
NYC-SVR1 as host namespace servers.
• Add the following Folders to the CorpDocs namespace:
• HRTemplates - folder target located on NYC-DC1
• PolicyFiles - folder target located on NYC-SVR1
• Configure availability and redundancy by adding additional folder targets and
replicating the folder targets in the CorpDocs namespace.
• Provide reports on the health of the CorpDocs folder replication.
4 Lab Instructions: Configuring and Managing Distributed File System
f Task 5: Create additional folder targets for the PolicyFiles folder, and
then configure folder replication
1. On NYC-DC1, in the DFS Management console, add a folder target with the
following options:
• Path to folder target: \\NYC-DC1\PolicyFiles
• Create share: Yes
• Local Path of shared folder: C:\PolicyFiles
• Shared folder permissions: Administrators have full access; other users
have read-only permissions
• Replication group: Yes
• Replication Group name: woodgrovebank.com\corpdocs\policyfiles
• Replicated folder name: PolicyFiles
• Primary member: NYC-SVR1
• Topology: Full mesh
• Replication schedule: default
2. In the console tree, expand the Replication node, and then click
woodgrovebank.com\corpdocs\PolicyFiles.
3. In the details pane, on the Memberships tab, verify that both NYC-DC1 and
NYC-SVR1 are listed and enabled.
12 Lab Instructions: Configuring and Managing Distributed File System
Module 12
Lab Instructions: Configuring and Managing
Storage Technologies
Contents:
Exercise 1: Installing the FSRM Role Service 4
Exercise 2: Configuring Storage Quotas 5
Exercise 3: Configuring File Screening 7
Exercise 4: Generating Storage Reports 8
2 Lab Instructions: Configuring and Managing Storage Technologies
Objectives
• Install the FSRM role service
• Configure storage quotas
• Configure file screening
• Generate storage reports using FSRM
Lab Instructions: Configuring and Managing Storage Technologies 3
Logon Information
• Virtual Machines: 6421A-NYC-DC1 and 6421A-NYC-SVR1
• User Name: Administrator
• Password: Pa$$w0rd
Scenario
As the Windows Infrastructure Services (WIS) Technology Specialist, you have
been tasked with configuring storage on a server to comply with corporate
standards. You must create the storage with minimal long-term management by
utilizing file screening and quota management.
4 Lab Instructions: Configuring and Managing Storage Technologies
f Task 3: Test that the Quota is working by generating several large files
1. Open a command prompt and use the fsutil file createnew file1.txt
89400000 command to create a file in the
D:\Labfiles\Module12\Users\User1 folder.
2. Check the Event Viewer for an Event ID of 12325.
3. Test that the quota works by attempting to create a file that is 16,400,000
bytes, and then press ENTER.
4. Enable NTFS folder compression for the D:\Labfiles\Module12\Users folder.
Check to see what effect this has in the Quota console. Try again to create a
file that is 16,400,000 bytes.
Lab Instructions: Configuring and Managing Storage Technologies 7
Module 13
Lab Instructions: Configuring Availability of
Network Resources and Content
Contents:
Exercise 1: Configuring Windows Server Backup and
Restore 3
Exercise 2: Configuring Shadow Copying 6
Exercise 3: Configuring Network Load Balancing 8
2 Lab Instructions: Configuring Availability of Network Resources and Content
Objectives
• Configure Windows Server Backup and Restore
• Configure shadow copies
• Configure and test Network Load Balancing
Scenario
The Windows Infrastructure Services (WIS) Technology Specialist has been tasked
with configuring disaster recovery restore and availability for all critical services.
Lab Instructions: Configuring Availability of Network Resources and Content 3
8. On the Specify VSS backup type page, select VSS full backup, and then click
Next.
9. On the Confirmation page, click Backup.
10. On the Backup Progress page, verify the status is Backup Completed, and
then click Close.
5. In the New Cluster: Cluster IP Addresses dialog box, click Add, and specify
an IPv4 cluster IP of 10.10.0.100 with a Subnet Mask of 255.255.0.0, and
then click OK.
6. In the New Cluster: Cluster Parameters dialog box, type a Full Internet
Name of printSVR.woodgrovebank.com. Specify a cluster operation mode of
Multicast, and then click Next.
7. In the New Cluster: Port Rules dialog box, click Finish.
8. In the Network Load Balancing Manager console list pane, right-click
printSVR.woodgroovebank.com, and then click Add Host to Cluster from
the context menu.
9. In the Add Host to Cluster: Connect dialog box, specify the host as NYC-
SVR1, and then click Connect.
10. In the Interfaces available for configuring the cluster, click Local Area
Connection, and then click Next.
11. In the Add Host to Cluster: Host Parameters dialog box, accept the default
settings, and then click Next.
12. In the Add Host to Cluster: Port Rules, accept the default settings, and then
click Finish.
13. Close the Network Load Balancing Manager console window.
6. In the Type a printer name dialog box, accept the default settings, and then
click Next.
7. In the Printer Sharing dialog box, accept the default name, and then click
Next.
8. In the You’ve successfully added HP LaserJet 6MP dialog box, click Finish.
9. Close the Printers control panel applet.
10. Repeat steps 1 through 9 on NYC-SVR1.
Module 14
Lab Instructions: Configuring Server Security
Compliance
Contents:
Exercise 1: Configuring and Analyzing Security 3
Exercise 2: Analyzing Security Templates 5
Exercise 3: Configuring Windows Software Update
Services 7
2 Lab Instructions: Configuring Server Security Compliance
Objectives
• Configure and analyze security using the Security Configuration Wizard
(SCW).
• Use the Security Configuration and Analysis Wizard to analyze security
templates.
• Configure Windows Software Update Services (WSUS).
Scenario
As the Windows Infrastructure Services Technology Specialist, you have been
tasked with configuring and managing server and client security patch compliance.
You must ensure systems maintain compliance with corporate standards.
Lab Instructions: Configuring Server Security Compliance 3
f Task 1: Use the Group Policy Management Console to create and link
a GPO to the domain to configure client updates
1. On NYC-DC1, open Group Policy Management from the Administrative
Tools menu.
2. In the list pane, right-click WoodGroveBank.com, click Create a GPO in this
domain, and Link it here, and name the GPO WSUS.
3. Right-click the WSUS GPO link under WoodGroveBank.com, and then click
Edit.
4. In the Group Policy Management Editor window, expand Computer
Configuration, expand Policies, expand Administrative Templates, expand
Windows Components, and then click Windows Update.
5. In the details pane, double-click Configure Automatic Updates.
6. In the Configure Automatic Updates Properties dialog box, on the Settings
tab, select Enabled. In the Configure automatic updating drop-down list,
click 4 - Auto download and schedule the install, and then click Next
Setting.
7. On the Specify intranet Microsoft update service location Properties page,
on the Settings tab, select Enabled. Under Set the intranet update service for
detecting updates and under Set the intranet statistics server, type
http://NYC-SVR1 in the text boxes, and then click Next Setting.
8. On the Automatic Updates detection frequency Properties page, select
Enabled, and then click OK.
8 Lab Instructions: Configuring Server Security Compliance
9. Close the Group Policy Management Editor, and then close the Group Policy
Management tool.
10. On NYC-CL2, open a command prompt.
11. At the command prompt, type gpupdate /force, and then press ENTER.
12. At the command prompt, type wuauclt /detectnow, and then press ENTER.
13. Close the command window on NYC-CL2.
f Task 3: Create a computer group, and add NYC-CL2 to the new group
1. In the list pane, expand Computers, and then select All Computers.
2. In the Actions pane, click Add Computer Group, and name the group HO
Computers.
3. Change membership of the nyc-cl2.woodgrovebank.com computer object so
that it is a part of the HO Computers group.
Lab Instructions: Configuring Server Security Compliance 9
Note: Notice that a message appears stating that the update is approved, but must
be downloaded to complete.
Module 1
Lab Answer Key: Installing and Configuring
Servers
Contents:
Exercise 1: Identifying Server Types 2
Exercise 2: Installing and Configuring Server Roles
and Features 3
Exercise 3: Configuring Server Core and Performing
Basic Management Tasks 5
2 Lab Answer Key: Installing and Configuring Servers
Note: You also must configure the server for remote administration and open the
ports necessary for the installed Roles and Features.
Lab Answer Key: Installing and Configuring Servers 3
9. On the Select User Groups Allowed Access To This Terminal Server, click
Next.
10. On the Confirm Installation Selections page, click Install.
The Terminal Services Role installation begins.
11. On the Installation Results page, click Close, and then click Yes in the Do
you want to restart now? dialog box.
f Task 5: Install the Server Backup feature from the Server Manager
console
1. In the Server Manager list pane, right-click Features, and then click Add
Features. The Add Features Wizard appears.
2. On the Select Features page, select the Windows Server Backup Features
check box, and then click Next.
3. On the Confirm Installation Selections page of the wizard, click Install.
Installation of the chosen feature begins.
4. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close. Do not close Server Manager.
The Windows Server Backup feature is installed.
Lab Answer Key: Installing and Configuring Servers 5
f Task 6: Verify the Terminal Services and Windows Server Backup tools
are installed by using the Roles Summary and Features Summary in
Server Manager
1. In the list pane of Server Manager, verify that Server Manager (NYC-SVR1) is
selected.
2. Using the scroll bar in the details pane, scroll down until the Roles Summary
is visible, and verify that Terminal Services is listed.
3. Scroll down to Features Summary, and verify that Windows Server Backup
appears.
4. Close Server Manager.
1. To determine the current default assigned computer name, type set in the
command window.
2. Locate the computer name attribute, and write it down.
3. To change the computer name, type the following command, and then press
ENTER: Netdom renamecomputer NYC-SVR2 /NewName:NYC-DNSSVR2
4. When prompted, type y for yes, and then press ENTER.
5. In the command window, type the following command to set the static IP
address: Netsh interface ipv4 set address name= “local area connection”
source=static address=10.10.0.12 mask=255.255.0.0 gateway=10.10.0.1,
and then press ENTER.
6. In the command window, type the following command to set the primary DNS
server, and then press ENTER: Netsh interface ip set dns “local area
connection” static 10.10.0.10 primary.
7. At the command prompt, type ipconfig /all, and then press ENTER to verify
the IP address assignment.
8. On the keyboard press RIGHT-ALT+DELETE
9. Choose to restart the computer by clicking Shutdown options in the lower
right-hand pane of the window, and click Restart.
10. In the Shutdown Event Tracker window, click Operating System:
Reconfiguration (Planned), and then click OK. The server restarts.
11. Log on to the server with the user name Administrator and a password of
Pa$$w0rd.
Note: Your keystrokes will not be reflected on the screen. You will receive a
message that the command completed successfully and that you need to restart
the computer.
Lab Answer Key: Installing and Configuring Servers 7
Note: Notice that the Firewall status shows that the Operational mode is set to
Enable. This means that the Windows Firewall is enabled, but no specific ports are
open.
5. At the command prompt, type the following command, and then press
ENTER: netsh firewall add portopening TCP 139 netbios-ssn
6. At the command prompt, type the following command, and then press
ENTER: netsh firewall add portopening TCP 445 netbios-ns
7. At the command prompt, type the following command, and then press
ENTER: netsh firewall show config
Note: Notice that in the Service configuration for Domain profile, File and Printer
Sharing and Remote Desktop services are set to enable, and both TCP and UDP
port 53 are open for the DNS server.
f Task 8: View the current status of roles, and install the DNS server role
1. In the command prompt window, at the command prompt, type the following
command, and then press ENTER: oclist
2. Use the Ocsetup.exe and oclist commands to install the DNS server by typing
the following at the command prompt and then press ENTER: start /w
ocsetup DNS-Server-Core-Role
3. At the command prompt, type the following command, and then press
ENTER: oclist
f Task 10: Close all virtual machines, and discard undo disks
1. For each virtual machine that is running, close the Virtual Machine Remote
Control (VMRC) window.
2. In the Close box, select Turn off machine and discard changes, and then
click OK.
3. Close the 6421A Lab Launcher.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Troubleshooting DNS 1
Module 2
Lab Answer Key: Configuring and
Troubleshooting DNS
Contents:
Exercise 1: Configuring a DNS Infrastructure 2
Exercise 2: Monitoring and Troubleshooting DNS 6
2 Lab Answer Key: Configuring and Troubleshooting DNS
8. In the left pane, ensure NYC-SVR1 is expanded, and then expand Forward
Lookup Zones.
9. Click the nwtraders.msft secondary zone. Verify that the new A record has
been replicated.
10. If the record does not appear, right-click nwtraders.msft, and then click
Refresh.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Managing WINS 1
Module 3
Lab Answer Key: Configuring and Managing
WINS
Contents:
Exercise 1: Installing WINS 2
Exercise 2: Configuring WINS Burst Handling 3
Exercise 3: Configuring WINS Replication 5
Exercise 4: Migrating from WINS to DNS 6
2 Lab Answer Key: Configuring and Managing WINS
f Task 3: From the Server Manager console, install the WINS feature
1. In the Server Manager list pane, right-click Features, and then click Add
Features on the context menu. The Add Features Wizard opens.
2. On the Select Features page, scroll down and click the check box next to
WINS Server, and then click Next.
3. On the Confirm Installation Selections page, click Install.
Lab Answer Key: Configuring and Managing WINS 3
Important: Do not log off or shut down the virtual machines at this point.
f Task 2: Create the Alias record for the single-label name resource
1. In the DNS Manager console, ensure NYC-DC1 is expanded, expand Forward
Lookup Zones, and then select GlobalNames from the list.
2. Right-click GlobalNames, and select New Alias (CNAME) from the context
menu.
3. In the New Resource Record dialog box, specify an Alias name of HRWEB
and fully qualified domain name (FQDN) for target host of
NYC-DC1.Woodgrovebank.com, and then click OK.
4. Close the DNS Manager console.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Troubleshooting DHCP 1
Module 4
Lab Answer Key: Configuring and
Troubleshooting DHCP
Contents:
Exercise 1: Installing and Authorizing the DHCP Server Role 2
Exercise 2: Configuring a DHCP Scope 3
Exercise 3: Troubleshooting Common DHCP Issues 6
2 Lab Answer Key: Configuring and Troubleshooting DHCP
8. In the Select Network Connection Bindings dialog box, make sure that the
static IP address 10.10.0.10 is selected, and then click Next.
9. In the Specify IPv4 DNS Server Settings dialog box, accept the default values,
and click Next.
10. In the Specify IPv4 WINS Server Settings, ensure WINS is not required for
applications on this network is selected and then click Next.
11. In Add or Edit DHCP Scopes, click Next.
12. In Configure DHCPv6 Stateless Mode, select Disable DHCPv6 stateless
mode for this server, and then click Next.
13. In Authorize DHCP Server, select Skip authorization of this DHCP server in
AD DS.
14. Click Next, and then click Install.
15. After the installation procedure is complete, click Close.
16. Close Server Manager on NYC-DC1.
5. In the Scope Name dialog box, type a name and description for the scope. For
example, Name: Head Office Network Scope and Description: WoodGrove
Bank employee scope. Click Next.
6. In the IP Address Range dialog box, type 10.10.0.1 for the Start IP address
and type 10.10.0.254 for the End IP address. Type 16 in the Length text box.
This will cause the Subnet mask text box to display 255.255.0.0.
7. Click Next.
8. In the Add Exclusions dialog box, type 10.10.0.1 for the Start IP address and
type 10.10.0.30 for the End IP address, click Add, and then click Next.
9. In the Lease Duration dialog box, change the value to 1 hour, and then click
Next.
10. In the Configure DHCP Scope Options dialog box, select No, I will configure
these options later, and then click Next.
11. Click Finish.
12. A new scope will appear under IPv4. The scope appears with a red “down”
arrow. Select and then right-click [10.10.0.0] Head Office Network Scope,
and then click Activate.
13. Close the DHCP console.
14. On NYC-CL1, click Start, right-click Network, and then click Properties. The
Network and Sharing Center window appears.
15. Under Tasks, click Manage network connections. The Network Connections
window appears.
16. Right-click Local Area Connection, and choose Properties from the context
menu.
17. In the Local Area Connection Properties dialog box, click Internet Protocol
Version 4 (TCP/IPv4), and click Properties.
18. In the Internet Protocol Version 4(TCP/IPv4) Properties box, select Obtain
an IP address automatically and Obtain DNS server address automatically,
and then click OK.
19. In the Local Area Connection Properties dialog box, click Close.
20. Close the Network Connections window, and then close the Network and
Sharing Center window.
21. Restart NYC-CL1. After the computer is restarted, log on as Administrator
with the password of Pa$$w0rd.
Lab Answer Key: Configuring and Troubleshooting DHCP 5
22. On NYC-CL1, click Start, point to All Programs, point to Accessories, right-
click Command Prompt, and then click Run as Administrator.
23. At the command prompt, type ipconfig, and then press ENTER.
24. At the command prompt, type ipconfig /release, and then press ENTER
25. At the command prompt, type ipconfig /renew, and then press ENTER.
26. At the command prompt, type ipconfig /all, and then press ENTER. Notice
that along with other information, the IP address of the DHCP Server is
displayed.
27. Under Ethernet adapter Local Area Connection, notice that the connection
does not have a default gateway.
Question: Why does the DHCP configured Local Area Connection not have a
default gateway?
Answer: Because the ROUTER DHCP option has not been configured on the
DHCP server. There is no default gateway option in DHCP..
.
28. Close the command prompt.
f Task 6: Configure the DHCP server with the correct router information
1. On NYC-DC1, verify the router information that is configured in the scope
options.
2. Expand the nyc-dc1.woodgrovebank.com node, expand the IPv4 node,
expand the 10.10.0.0 scope node, click Scope Options, and then in the right
pane, double-click 003 Router.
3. In the Scope Options dialog box, click the invalid router address
192.168.10.3, and then click Remove.
4. In the Scope Options dialog box, click in the IP address text box. Replace
192.168.10.3 with 10.10.0.1, click Add, and then click OK
f Task 7: Configure the DHCP server with the correct DNS server
information
1. On NYC-DC1, verify the DNS information that is configured in the scope
options.
2. Expand the nyc-dc1.woodgrovebank.com node, expand the IPv4 node,
expand the 10.10.0.0 scope node, right-click Scope Options, and then click
Configure Options.
3. In the Available Options window, select 006 DNS Servers.
4. In the Scope Options dialog box, click in the IP address text box, type
10.10.0.10, and then click Add. Again, in the IP address text box, type
10.10.0.21, click Add, and then click OK.
f Task 10: Close all virtual machines, and discard undo disks
1. For each virtual machine that is running, close the Virtual Machine Remote
Control (VMRC) window.
2. In the Close box, select Turn off machine and discard changes, and then
click OK.
3. Close the 6421A Lab Launcher.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Troubleshooting IPv6 TCP/IP 1
Module 5
Lab Answer Key: Configuring and
Troubleshooting IPv6 TCP/IP
Contents:
Lab A: Configuring an ISATAP Router
Exercise 1: Configuring a New IPv6 Network and Client 3
Exercise 2: Configuring an ISATAP Router to
Enable Communications Between an IPv4 Network and an
IPv6 Network 7
Lab B: Converting the Network
Exercise 1: Transitioning to an IPv6-Only Network 10
2 Lab Answer Key: Configuring and Troubleshooting IPv6 TCP/IP
Logon Information:
• Virtual Machines: 6421A-NYC-DC1, 6421A-NYC-SVR1, and 6421A-NYC-CL1
• User Name: Administrator
• Password: Pa$$w0rd
Exercise Overview
In this exercise, you will prepare the current environment to work with IPv6, and
deploy an IPv6 client and an IPv6 subnet.
Note: At this point, only IPv4 traffic is routed through the IPv4 routing
infrastructure.
Exercise Overview
In this exercise, you will enable and configure an ISATAP router interface that will
allow two-way communication between the IPv4 and IPv6 networks.
Note: If the IP addresses do not resolve, reboot the servers starting with NYC-
DC1, NYC-SVR1, and then NYC-CL1.
Important: Do not turn off the virtual machines at this time because you will
need them to complete the next lab.
Exercise Overview
In this exercise, you will migrate the IPv4 network to be fully IPv6 capable.
Note: If the IP addresses do not resolve, reboot the servers starting with NYC-
DC1, NYC-SVR1, and then NYC-CL1.
Lab Answer Key: Configuring and Troubleshooting IPv6 TCP/IP 13
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Troubleshooting Routing and Remote Access 1
Module 6
Lab Answer Key: Configuring and
Troubleshooting Routing and Remote Access
Contents:
Exercise 1: Configuring Routing and Remote Access
as a VPN Remote Access Solution 2
Exercise 2: Configuring a Custom Network Policy 4
Exercise 3: Configuring Logging 6
Exercise 4: Configuring a Connection Profile 7
2 Lab Answer Key: Configuring and Troubleshooting Routing and Remote Access
f Task 2: Install the Network Policy and Access Services role on 6421A-
NYC-SVR1
1. On NYC-SVR1, click Start, and then click Administrative Tools.
2. From the Administrative Tools menu, click Server Manager. The Server
Manager opens.
3. In the Server Manager (NYC-SVR1) list pane, right-click Roles and click Add
Roles from the context menu. The Add Roles Wizard appears. Click Next.
4. On the Select Server Roles page, select Network Policy and Access Services
and then click Next.
5. On the Network Policy and Access Service introduction page, click Next.
Lab Answer Key: Configuring and Troubleshooting Routing and Remote Access 3
6. On the Select Role Services page, select Network Policy Server and Routing
and Remote Access Services, and then click Next.
7. On the Confirm Installation Selections page, click Install.
8. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close.
9. Close the Server Manager. The Network Policy and Routing and Remote
Access Services roles are installed on 6421A-NYC-SVR1.
Important: Do not log off or shut down the virtual machines at this point.
11. In the Routing and Remote Access dialog box, click OK.
12. In the Routing and Remote Access dialog box regarding the DHCP Relay
agent, click OK. The Routing and Remote Access service starts.
10. On the Network Connections page, under Virtual Private Network, right-
click WoodgroveBank VPN, and then click Connect.
11. Use the following information in the Connect Woodgrovebank VPN text
boxes, and then click Connect:
• User name: Administrator
• Password: Pa$$w0rd
• Domain: Woodgrovebank
The VPN connects successfully.
12. Right-click Woodgrovebank VPN, and click Disconnect. The VPN
disconnects.
13. Close all open windows on NYC-CL1.
14. On NYC-SVR1, click Start, point to Administrative Tools, and then click
Event Viewer.
15. In Event Viewer, expand Windows Logs, and select System from the list pane.
Review the entries from the source RemoteAccess to see the logged data.
16. Close Event Viewer on NYC-SVR1.
21. On the Install Additional Files with the Connection Manager profile page,
click Next.
22. On the Build the Connection Manager Profile and its Installation Program
page, click Next.
23. On the Your Connection Manager Profile is Complete and Ready to
Distribute page, click Finish.
24. On NYC-SVR1, copy the CORP_VPN folder from the
C:\Program Files\CMAK\Profiles\Vista\ location to the \\NYC-
DC1\Module6 location.
To do this On NYC‐SVR1 goto, Start/Computer/Local Disk (C:)/
Program Files/CMAK/Profiles/Vista/ CORP_VPN and select
CORP_VPN folder, and right‐click select copy and then Click Start, in
the Start Search box type \\NYC‐DC1\Module6 and press Enter. In the
Module6(\\NYC‐DC1) page right‐click and select paste
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service 1
Module 7
Lab Answer Key: Installing, Configuring, and
Troubleshooting the Network Policy Server Role
Service
Contents:
Exercise 1: Installing and Configuring the Network
Policy Server Role Service 2
Exercise 2: Configuring a RADIUS Client 4
Exercise 3: Configuring Certificate Auto-Enrollment 6
2 Lab Answer Key: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
8. Do not log off or shut down the virtual PCs at this point.
f Task 2: Install the Routing and Remote Access Services (RRAS) role
1. In the Server Manager list pane, click Roles, and then click Add Roles. The
Add Roles Wizard appears.
2. On the Before You Begin page, click Next.
3. On the Select Server Roles page, select Network Policy and Access Services,
and then click Next.
4. On the Network Policy and Access Services page, click Next.
5. On the Select Role Services page, select Routing and Remote Access
Services, and then click Next.
6. On the Confirm Installation Selections page, click Install.
7. On the Installation Results page, verify Installation succeeded appears in the
details pane, and then click Close. The Routing and Remote Access Services
role is installed on NYC-SVR1.
8. Close the Server Manager window.
9. Do not log off or shut down the virtual PCs at this point.
Lab Answer Key: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service 5
21. In the Computer Properties dialog box, click the Security tab, and then select
Authenticated Users.
22. In the Permissions for Authenticated Users, select the Allow check box for
the Enroll permission, and then click OK.
23. Close the Certificate Template console, and then close the certsrv
management console.
Module 8
Lab Answer Key: Configuring Network Access
Protection
Contents:
Exercise 1: Configuring NAP for DHCP Clients 2
Exercise 2: Configuring NAP for VPN Clients 10
2 Lab Answer Key: Configuring Network Access Protection
f Task 3: Install the Network Policy Server (NPS) and Dynamic Host
Configuration Protocol (DHCP) server roles
1. On NYC-SVR1, in Server Manager, right-click Roles, and then select Add Roles
from the context menu.
2. On the Before you Begin page, click Next.
3. On the Select Server Roles page, select the DHCP Server and Network Policy
and Access Services check boxes, and then click Next twice.
Lab Answer Key: Configuring Network Access Protection 3
4. On the Select Role Services page, select the Network Policy Server check
box, and then click Next twice.
5. On the Select Network Connection Bindings page, verify that 10.10.0.24 is
selected, remove the check mark next to 192.168.1.10, and then click Next.
6. On the Specify DNS Server Settings page, verify that WoodGroveBank.com is
listed under Parent domain.
7. Type 10.10.0.10 under Preferred DNS server IP address, and then click
Validate. Verify that the result returned is Valid, and then click Next.
8. On the Specify IPv4 WINS Server Settingspage, accept the default setting of
WINS is not required for applications on this network, and then click Next.
9. On the Add or Edit DHCP Scopes page, click Add.
10. In the Add Scope dialog box, type NAP Scope next to Scope Name. Next to
Starting IP Address, type 10.10.0.50; next to Ending IP Address, type
10.10.0.199; and next to Subnet Mask, type 255.255.0.0.
11. Select the Activate this scope check box, click OK, and then click Next.
12. On the Configure DHCPv6 Stateless Mode page, select Disable DHCPv6
stateless mode for this server, and then click Next.
13. On the Authorize DHCP Server page, select Use current credentials. Verify
that WOODGROVEBANK\Administrator is displayed next to Username,
and then click Next.
14. On the Confirm Installation Selections page, click Install.
15. Verify the installation was successful, and then click Close.
16. Close the Server Manager window.
b. Disable the two default policies under Policy Name by right-clicking the
policies, and then clicking Disable for each.
c. Right-click Network Policies, and then click New.
d. In the Specify Network Policy Name and Connection Type window,
under Policy name, type Compliant-Full-Access, and then click Next.
e. In the Specify Conditions window, click Add.
f. In the Select condition dialog box, double-click Health Policies.
g. In the Health Policies dialog box, under Health Policies, select
Compliant, and then click OK.
h. In the Specify Conditions window, verify that Health Policy is specified
under Conditions with a value of Compliant, and then click Next.
i. In the Specify Access Permission window, verify that Access granted is
selected, and then click Next.
j. In the Configure Authentication Methods window, select Perform
machine health check only. Clear all other check boxes, and then click
Next.
k. In the Configure Constraints window, click Next.
l. In the Configure Settings window, click NAP Enforcement. Verify that
Allow full network access is selected, and then click Next.
m. In the Completing New Network Policy window, click Finish to
complete configuration of your network policy for compliant client
computers.
6. Configure a network policy for noncompliant computers:
a. Right-click Network Policies, and then click New.
b. In the Specify Network Policy Name and Connection Type window,
under Policy name, type Noncompliant-Restricted, and then click Next.
c. In the Specify Conditions window, click Add.
d. In the Select condition dialog box, double-click Health Policies.
e. In the Health Policies dialog box, under Health policies, select
Noncompliant, and then click OK.
6 Lab Answer Key: Configuring Network Access Protection
Note: A setting of Access granted does not mean that noncompliant clients
are granted full network access. It specifies that clients matching these
conditions will be granted an access level that the policy determines.
7. Under Available Options, select the 003 Router check box, type 10.10.0.1 in
IP Address, and then click Add.
8. Select the 015 DNS Domain Name check box, type Woodgrovebank.com in
String value, and then click OK. The Woodgrovebank.com domain is a full-
access network assigned to compliant NAP clients.
9. In the DHCP console, right-click Scope Options, and then click Configure
Options.
10. On the Advanced tab, next to User class, select Default Network Access
Protection Class.
11. Select the 006 DNS Servers check box, type 10.10.0.10 in IP Address, and
then click Add.
12. Select the 015 DNS Domain Name check box, type
restricted.Woodgrovebank.com in String value, and then click OK. The
restricted.woodgrovebank.com domain is a restricted-access network assigned
to noncompliant NAP clients.
13. Close the DHCP console.
Note: Click the Reset button before starting Exercise 2 and Log on to each
virtual machine as Woodgrovebank\Administrator with the password
Pa$$w0rd
Note: A setting of Access granted does not mean that noncompliant clients
are granted full network access. It specifies that the policy should continue to
evaluate the clients matching these conditions.
Subnet mask. This step ensures that traffic from noncompliant clients can
reach only NYC-DC1.
m. Click OK to close the Add IP Filter dialog box, and then select Permit
only the packets listed below in the Inbound Filters dialog box.
n. Click OK to close the Inbound Filters dialog box.
o. Under IPv4, click Output Filters, and then click New.
p. In the Add IP Filter dialog box, select Source network. Type 10.10.0.10
next to IP address, and then type 255.255.255.255 next to Subnet mask.
q. Click OK to close the Add IP Filter dialog box, and then select Permit
only the packets listed below in the Outbound Filters dialog box. This
step ensures that only traffic from NYC-DC1 can be sent to noncompliant
clients.
r. Click OK to close the Outbound Filters dialog box.
s. In the Configure Settings window, click Next.
t. In the Completing New Network Policy window, click Finish.
8. Configure connection request policies:
a. Click Connection Request Policies.
b. Disable the default Connection Request policy found under Policy Name
by right-clicking the policy, and then clicking Disable.
c. Right-click Connection Request Policies, and then click New.
d. In the Specify Connection Request Policy Name and Connection Type
window, under Policy name, type VPN connections.
e. Under Type of network access server, select Remote Access Server
(VPN-Dial up), and then click Next.
f. In the Specify Conditions window, click Add.
g. In the Select condition window, double-click Tunnel Type, select PPTP
and L2TP, click OK, and then click Next.
h. In the Specify Connection Request Forwarding window, verify that
Authenticate requests on this server is selected, and then click Next.
i. In the Specify Authentication Methods window, select Override network
policy authentication settings.
16 Lab Answer Key: Configuring Network Access Protection
j. Under EAP Types, click Add. In the Add EAP dialog box, under
Authentication methods, click Microsoft: Protected EAP (PEAP), and
then click OK.
k. Under EAP Types, click Add. In the Add EAP dialog box, under
Authentication methods, click Microsoft: Secured password (EAP-
MSCHAP v2), and then click OK.
l. Under EAP Types, click Microsoft: Protected EAP (PEAP), and then click
Edit.
m. Verify that Enable Quarantine checks is selected, and then click OK.
n. Click Next twice, and then click Finish.
9. Close the Network Policy Server console.
8. On the Managing Multiple Remote Access Servers page, ensure No, use
Routing and Remote Access to authenticate connection requests is already
selected and then click Next.
9. And then click Finish.
10. Click OK twice, and wait for the Routing and Remote Access Service to start.
11. Open the Network Policy Server console from the Administrative Tools
menu, ensure Policies is expanded select Connection Request Policies, and
then disable the Microsoft Routing and Remote Access Service Policy by
right-clicking the policy and choosing Disable.
12. Close the Network Policy Server management console.
13. Close Routing and Remote Access.
g. On the Type your user name and password page, type administrator
next to User name, and type Pa$$w0rd next to Password. Select the
Remember this password check box, type Woodgrovebank next to
Domain (optional), and then click Create.
h. On The connection is ready to use page, click Close.
i. In the Network and Sharing Center window, click Manage Network
Connections.
j. Under Virtual Private Network, right-click the WoodGroveBank
connection, click Properties, and then click the Security tab.
k. Select Advanced (custom settings), and then click Settings.
l. Under Logon security, select Use Extensible Authentication Protocol
(EAP), and then select Protected EAP (PEAP) (encryption enabled).
m. Click Properties.
n. Ensure that Validate server certificate check box is already selected.
Clear the Connect to these servers check box, and then Ensure that
Secured Password (EAP-MSCHAP v2) is already selected, under Select
Authentication Method. Clear the Enable Fast Reconnect check box, and
then select the Enable Quarantine checks check box.
o. Click OK three times to accept these settings.
7. Test the VPN connection:
a. In the Network Connections window, right-click the Woodgrovebank
connection, and then click Connect.
b. In the Connect Woodgrovebank window, click Connect.
c. Verify that the administrator account credentials are entered and that the
Save this user name and password for future use check box is selected,
and then click OK.
d. You are presented with a Validate Server Certificate window the first
time this VPN connection is used. Click View Server Certificate, and
verify that Certificate Information states that the certificate was issued to
NYC-SVR1.Woodgrovebank.com by Root CA. Click OK to close the
Certificate window, and then click OK.
e. Wait for the VPN connection to be made. Because NYC-CL1 is compliant,
it should have unlimited access to the intranet subnet.
Lab Answer Key: Configuring Network Access Protection 21
f. Click Start, click All Programs, click Accessories, and then click
Command Prompt.
g. Type ipconfig /all, and view the IP configuration. System Quarantine
State should be Not Restricted.
h. In the Command window, type ping 10.10.0.10. This should be
successful. Type ping 10.10.0.24. This also should be successful. The
client now meets the requirement for VPN full connectivity.
i. Disconnect from the Woodgrovebank VPN.
8. Configure Windows Security Health Validator to require an antivirus
application:
a. On NYC-SVR1, open Network Policy Server.
b. Expand Network Access Protection, and then click System Health
Validators.
c. Double-click Windows Security Health Validator, and then click
Configure.
d. In the Windows Security Health Validator dialog box, under Virus
Protection, select the An antivirus application is on check box.
e. Click OK, and then click OK again to close the Windows Security Health
Validator Properties window.
9. Verify the client is placed on the restricted network:
a. On NYC-CL1, in the Network Connections window, right-click the
WoodGroveBank connection, and then click Connect.
b. Click Connect, and then click OK.
c. Wait for the VPN connection to be made. You might see a message in the
notification area that indicates the computer does not meet health
requirements. This message is displayed because antivirus software has
not been installed.
d. Click Start, click All Programs, click Accessories, and then click
Command Prompt.
22 Lab Answer Key: Configuring Network Access Protection
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring IPsec 1
Module 9
Lab Answer Key: Configuring IPsec
Contents:
Exercise 1: Preparing the Network Environment
for IPsec NAP Enforcement 2
Exercise 2: Configuring and Testing IPsec NAP
Enforcement 9
2 Lab Answer Key: Configuring IPsec
2. Click Next on the Before you Begin page, and on the Select Server Roles
page, select the Network Policy and Access Services check box. Then click
Next twice.
3. On the Select Role Services page, select the Health Registration Authority
check box, click Add Required Role Services in the Add Roles Wizard
window that appears, and then click Next.
4. Select Install a local CA to issue health certificates for this HRA server, and
then click Next.
5. Select No, allow anonymous requests for health certificates, and then click
Next. This choice allows computers to be enrolled with health certificates in a
workgroup environment.
6. Select Don’t use SSL or Choose a certificate for SSL encryption later, and
then click Next twice. We recommend Secure Sockets Layer (SSL), but it is not
required for HRA to function.
7. On the Select Role Services page, verify that only the Certification Authority
check box is selected, and then click Next.
8. On the Specify Setup Type page, select Standalone, and then click Next.
9. On the Specify CA Type page, select Root CA, and then click Next.
10. Click Next twice to accept the default private key and cryptographic settings.
11. On the Configure CA Name page, under Common name for this CA, type
Woodgrovebank-RootCA, and then click Next.
12. On the Set Validity Period page, click Next.
13. In the Configure Certificate Database window, click Next twice.
14. On the Select Role Services page for the Web Server, click Next.
15. On the Confirm Installation Selections page, click Install.
16. On the Installation Results page, notice that the Network Policy and Access
Services installation succeeded with errors. This is because you installed the
CA after the HRA role, so it could not be reached. Verify that all other
installations were successful, and then click Close.
17. Close Server Manager.
4 Lab Answer Key: Configuring IPsec
2. Click Start and in the Search text box, type gpedit.msc, and then press
ENTER.
3. In the Local Group Policy Object Editor console tree, expand Local
Computer Policy/Computer Configuration/Administrative
Templates/Windows Components/Security Center.
4. In the details pane, double-click Turn on Security Center (Domain PCs
only), click Enabled, and then click OK.
5. Close the Local Group Policy Object Editor console.
6. Repeat steps 1 through 5 on NYC-CL2.
f Task 10: Enable the IPsec enforcement client, and configure client
health-registration settings
1. On NYC-CL1, click Start and in the Start Search text box, type napclcfg.msc,
and then press ENTER.
2. In the NAP Client Configuration console tree, click Enforcement Clients.
3. In the details pane, right-click IPsec Relying Party, and then click Enable.
4. In the NAP Client Configuration console tree, double-click Health
Registration Settings.
5. Right-click Trusted Server Groups, and then click New.
6. Under Group Name, type Trusted HRA Servers, and then click Next.
7. Clear the Require server verification (https) for all servers in this group
check box.
8. Under Add URLs of the health registration authority that you want the
client to trust, type http://nyc-
dc1.woodgrovebank.com/domainhra/hcsrvext.dll, and then click Add.
9. Under Add URLs of the health registration authority that you want the
client to trust, type http://nyc-dc1.woodgrovebank.com
/nondomainhra/hcsrvext.dll, and then click Add.
10. Click Finish to complete the process of adding HRA trusted server groups.
11. In the console tree, click Trusted Server Groups, and then in the details pane,
click Trusted HRA Servers.
8 Lab Answer Key: Configuring IPsec
12. Verify that the URLs you typed are entered correctly in the details pane under
Properties. You must enter the URLs correctly or the client computer will be
unable to obtain a health certificate, and it will be denied access to the IPsec-
protected network.
13. Close the NAP Client Configuration window.
14. Repeat steps 1 through 13 on NYC-CL2.
8. Right-click Windows Firewall with Advanced Security - LDAP, and then click
Properties.
9. On the Domain Profile tab, next to Firewall state, select On
(recommended). Next to Inbound connections, select Block (default). Next
to Outbound connections, select Allow (default). The private and public
profiles will use the same settings.
10. Click the Private Profile tab. Next to Firewall state, select On
(recommended). Next to Inbound connections, select Block (default). Next
to Outbound connections, select Allow (default).
11. Click the Public Profile tab. Next to Firewall state, select On
(recommended). Next to Inbound connections, select Block (default). Next
to Outbound connections, select Allow (default), and then click OK.
12. In the Group Policy Management Editor console tree, under Windows
Firewall with Advanced Security - LDAP, select and then right-click
Connection Security Rules, and then click New Rule.
13. In the New Connection Security Rule Wizard, on the Rule Type page, verify
that Isolation is selected, and then click Next.
14. On the Requirements page, select Require authentication for inbound
connections and request authentication for outbound connections, and
then click Next.
15. On the Authentication Method page, select Computer certificate, select the
Only accept health certificates check box, and then click Browse.
16. Click WoodGroveBank-RootCA, click OK, and then click Next.
17. On the Profile page, verify that the Private, Public, and Domain check boxes
are selected, and then click Next.
18. On the Name page, under Name, type Secure Rule, and then click Finish.
19. In the Group Policy Management Editor console tree, under Windows
Firewall with Advanced Security - LDAP, select and then right-click Inbound
Rules, and then click New Rule.
20. Choose Predefined, select File and Printer Sharing from the list of rules, and
then click Next twice.
21. On the Action page, select Allow the connection if it is secure, click Next,
and then click Finish.
22. Close the Group Policy Management Editor console.
Lab Answer Key: Configuring IPsec 11
Note: NAP compliance will require automatic updates by enabling this system
health check in the Windows Security Health Validator.
1. On NYC-DC1, click Start, click Run, type nps.msc, and then press ENTER.
2. In the console tree, open Network Access Protection, and then click System
Health Validators.
3. In the details pane, double-click Windows Security Health Validator, and
then click Configure.
Lab Answer Key: Configuring IPsec 13
5. In the Network Policy Server console tree, expand Policies, and then click
Network Policies.
6. In the details pane, double-click NAP IPsec with HRA Noncompliant.
7. Click the Settings tab, click NAP Enforcement, clear the Enable auto-
remediation of client computers check box, and then click OK.
8. Close the Network Policy Server console.
9. On NYC-CL1, in the command window, type ping -t NYC-CL2, and then press
ENTER. A continuous ping will run from NYC-CL1 to NYC-CL2. This should
be successful
10. On NYC-CL2, click Start, click Control Panel, and then click Security.
11. Under Windows Update, click Turn automatic updating on or off.
12. Select Never check for updates (not recommended), and then click OK.
Note: If it is already selected, select Check for updates, click OK, and then select
Never check for updates.
16. On NYC-CL2, in the Security control panel under Windows Update, click
Turn automatic updating on or off.
17. Select Install updates automatically (recommended), and then click OK.
This setting will cause NYC-CL2 to send a new Statement of Health (SoH) that
indicates it is compliant with network health requirements, and NYC-CL2 will
be granted full network access.
18. On NYC-CL1, verify that the response in the command window changes to
Reply from 10.10.0.60. It might take a minute before you see the change in
status.
19. Verify that you can browse the share of NYC-CL2 (\\NYC-CL2\).
20. Close all open windows.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Monitoring and Troubleshooting IPSec 1
Module 10
Lab Answer Key: Monitoring and
Troubleshooting IPSec
Contents:
Exercise 1: Monitoring IPSec Connectivity 2
Exercise 2: Configuring Connection Security 6
Exercise 3: Troubleshooting IPSec 8
2 Lab Answer Key: Monitoring and Troubleshooting IPSec
27. In the IP Protocol Port dialog box, select From this port, type 445 in the text
box, ensure that To Any port is selected, and then click Next.
28. On the Completing the IP Filter Wizard screen, click Finish, and then click
OK.
29. In the IP Filter list, select SecureSMBTCP, and then click Next.
30. In the Filter Action dialog box, click Add.
31. In the Filter Action Wizard dialog box, click Next.
32. In the Filter Action Name dialog box, type SecureTransmissionFilter, and
then click Next.
33. In the Filter Action General Options dialog box, ensure Negotiate Security is
selected, and then click Next.
34. In the Communicating with computers that do not support IPsec dialog
box, ensure Do not allow unsecured communication is selected, and then
click Next.
35. In the IP Traffic Security dialog box, ensure that Integrity and encryption is
selected, and then click Next.
36. On the Completing the IP Security Filter Action Wizard screen, click Finish.
37. In the Filter Action dialog box, select SecureTransmissionFilter, and then
click Next.
38. In the Authentication Method dialog box, ensure Active Directory default
(Kerberos V5 protocol) is selected, and then click Next.
39. On the Completing the Security Rule Wizard screen, click Finish.
40. In the SecureFileSharing Properties dialog box, click OK.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
8 Lab Answer Key: Monitoring and Troubleshooting IPSec
Scenario 1
An administrator is attempting to connect to a remote computer and monitor its
IPsec connectivity. The administrator reports that he is unable to monitor the
remote server. You ask him use the Event Viewer to identify the problem. In doing
so, the administrator notes the following error: “The IPsec server is unavailable or
incompatible with the IPsec monitor.”
Question: What can you do to resolve this issue?
Answer: The Administrator has not enabled remote IPsec monitoring on the
computer he wants to monitor. You can enable remote monitoring by configuring
the enableremotemgmt Registry key.
Scenario 2
An administrator has configured and enabled an IPsec Security policy on a file
server that stores sensitive data files. The administrator also created an Active
Directory-based policy and applied it to the organizational unit (OU) of clients that
are permitted access to the secure server. The next day, the Backup Administrator,
who is responsible for backing up the secure server, reports he was unable to
access the server from the backup server. The backup server’s computer account is
stored in an administrative OU separate from the client’s OU.
Question: Based on the information provided, why is the backup server unable to
access the secure server?
Answer: The backup server does not have an IPsec policy defined that allows it to
communicate with the secure server. The clients received an IPsec policy via a
Group Policy object (GPO). However, because the backup server was in a separate
OU, it did not receive the secure policy.
Lab Answer Key: Configuring and Managing Distributed File System 1
Module 11
Lab Answer Key: Configuring and Managing
Distributed File System
Contents:
Exercise 1: Installing the Distributed File
System Role Service 2
Exercise 2: Creating a DFS Namespace 4
Exercise 3: Configuring Folder Targets and Folder
Replication 5
Exercise 4: Viewing Diagnostic Reports for
Replicated Folders 10
2 Lab Answer Key: Configuring and Managing Distributed File System
5. On the Select Role Services page, select the Distributed File System check
box. Ensure that the File Server, Distributed File System, DFS Namespaces,
and DFS Replication check boxes all are selected, and then click Next.
6. On the Create a DFS Namespace page, click Create a namespace later using
the DFS Management snap-in in Server Manager, and then click Next.
7. On the Confirm Installation Selections page, click Install.
8. After the installation is complete, click Close.
9. In Server Manager, verify that File Server, Distributed File System, DFS
Namespaces, and DFS Replication all are installed.
10. Close Server Manager.
10. In the details pane, click the Namespace Servers tab. Notice that the
CorpDocs namespace is hosted on a single namespace server (NYC-DC1).
11. In the Add Folder Target box, ensure that the path shows \\NYC-
DC1\HRTemplateFiles, and then click OK.
12. In the New Folder box, ensure that HRTemplates is listed for the Name and
\\NYC-DC1\HRTemplateFiles is listed for the Folder targets, and then click
OK.
13. In the console tree, click \\WoodgroveBank.com\CorpDocs.
14. In the details pane, click the Namespace tab. Notice that HRTemplates is
listed as an entry in the namespace.
15. In the console tree, expand \\WoodgroveBank.com\CorpDocs, and then
click HRTemplates. In the details pane, notice that on the Folder Targets tab,
one folder target is configured.
16. Click the Replication tab, and notice that replication is not configured.
13. In the New Folder box, ensure that PolicyFiles is listed for the Name and
\\NYC-SVR1\PolicyFiles is listed for the Folder targets, and then click OK.
14. In the tree pane, ensure that \\WoodgroveBank.com\CorpDocs is expanded,
and then click PolicyFiles. In the details pane, notice that on the Folder
Targets tab, one folder target is configured.
16. In the console tree, expand the Replication node, and then click
woodgrovebank.com\corpdocs\hrtemplates.
17. In the details pane, on the Memberships tab, verify that both NYC-DC1 and
NYC-SVR1 are listed and enabled.
f Task 5: Create additional folder targets for the PolicyFiles folder, and
configure folder replication
1. On NYC-DC1, in the DFS Management console tree, right-click PolicyFiles,
and then click Add Folder Target.
2. In the New Folder Target box, under Path to folder target, type \\NYC-
DC1\PolicyFiles, and then click OK.
3. In the Warning box, click Yes to create the \\NYC-DC1\PolicyFiles shared
folder.
4. In the Create Share box, under Local path of shared folder, type
C:\PolicyFiles.
5. Under Shared folder permissions, select Administrators have full access;
other users have read-only permissions, and then click OK.
6. In the Warning box, click Yes to create the C:\PolicyFiles folder.
7. In the Replication message box, click Yes to create a replication group. A
progress bar appears, followed by the Replicate Folder Wizard.
8. In the Replicate Folder Wizard, on the Replication Group and Replicated
Folder Name page, ensure that woodgrovebank.com\corpdocs\policyfiles is
listed as the Replication group name and that PolicyFiles is listed as the
Replicated folder name, and then click Next.
9. On the Replication Eligibility page, ensure that both NYC-DC1 and NYC-
SVR1 are listed, and then click Next.
10. On the Primary Member page, select NYC-SVR1, and then click Next.
11. On the Topology Selection page, select Full mesh, and then click Next.
12. On the Replication Group Schedule and Bandwidth page ensure that
Replicate continuously using the specified bandwidth is selected, with Full
Bandwidth, and then click Next.
13. On the Review Settings and Create Replication Group page, review the
settings, and then click Create.
10 Lab Answer Key: Configuring and Managing Distributed File System
14. On the Confirmation page, ensure that all tasks are successful, and then click
Close.
15. Read the Replication Delay message, and then click OK.
16. In the tree pane, ensure that the Replication node is expanded, and then click
woodgrovebank.com\corpdocs\policyfiles.
17. In the details pane, on the Memberships tab, verify that both NYC-DC1 and
NYC-SVR1 are listed and enabled.
8. Read through the report and take note of any errors or warnings. Errors will
appear if replication is still in process or has not taken place yet. When you are
finished, close the Microsoft® Internet Explorer® window.
9. Create a diagnostic report for the policyfiles replication group. Read through
the report, and take note of any errors or warnings. When you are finished,
close the Internet Explorer window. Note that there may be errors reported if
replication has not begun or finished yet.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring and Managing Storage Technologies 1
Module 12
Lab Answer Key: Configuring and Managing
Storage Technologies
Contents:
Exercise 1: Installing the FSRM Role Service 2
Exercise 2: Configuring Storage Quotas 3
Exercise 3: Configuring File Screening 5
Exercise 4: Generating Storage Reports 6
2 Lab Answer Key: Configuring and Managing Storage Technologies
f Task 3: Test that the Quota is working by generating several large files
1. Open a command prompt. To do this, click Start, and then click Command
Prompt.
2. Change to the Users folder by typing D:, and then pressing ENTER. Type
cd \labfiles\module12\users\user1, and then press ENTER.
3. At the D:\labfiles\module12\users\user1 prompt, type: fsutil file createnew
file1.txt 89400000, and then press ENTER. This creates a file that is over 85
megabytes (MB), which generates a warning in Event Viewer.
4. Check the Event Viewer. To do this, click Start, click Administrative tools,
and then click Event Viewer. Expand Windows Logs, and then click on
Application. Note the event with Event ID of 12325.
5. Switch to the command prompt. Type fsutil file createnew file2.txt
16400000, and then press ENTER. The file cannot be created because it
would surpass the quota limit.
6. In Windows Explorer, navigate to the D:\Labfiles\Module12\Users folder.
Right-click the folder, and then click Properties.
7. In the Users Properties dialog box, click Advanced. Select Compress
contents to save disk space, click OK, and then click OK again. At the
Confirm Attribute Changes box, ensure that Apply changes to this folder,
subfolders and files is selected and then click OK.
8. In the File Server Resource Manager console, in the Quotas node, click
Refresh. Notice that the amount of used space is reduced significantly.
9. Switch to the command prompt. Type fsutil file createnew file2.txt
16400000, and then press ENTER. The file now is created.
10. Close the command prompt window.
Lab Answer Key: Configuring and Managing Storage Technologies 5
Important: When creating files, you are specifying the number of bytes they will be.
This is why they are not exactly 85000000, because a byte is only eight bits.
Important: In Step 7, when the Users folder is compressed, you reduced the file’s
actual space. If you were to specify this using NTFS file system quotas, the actual file
size would be calculated and not the compressed size.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring Availability of Network Resources and Content 1
Module 13
Lab Answer Key: Configuring Availability of
Network Resources and Content
Contents:
Exercise 1: Configuring Windows Server Backup and
Restore 2
Exercise 2: Configuring Shadow Copying 5
Exercise 3: Configuring Network Load Balancing 7
2 Lab Answer Key: Configuring Availability of Network Resources and Content
3. Click Next.
4. On the Confirm Installation Selections page, click Install.
5. On the Installation Results page, verify that the Windows Server Backup
installation succeeded, and then click Close.
6. Close Server Manager.
4. On the Select backup configuration page, select Custom, and then click
Next.
5. On the Select backup items page, clear the Enable system recovery
checkbox, select Allfiles (D:), and then click Next.
6. On the Specify destination type page, select Remote Shared Folder, and then
click Next.
7. On the Specify remote folder page, type the path
\\NYC-SVR1\NetBackup on the text path and then click Next.
8. On the Specify advanced option page, select VSS full backup, and then click
Next.
9. On the Confirmation page, click Backup.
10. On the Backup Progress page, verify the status is Backup Completed, and
then click Close.
10. In the Printer Sharing dialog box, accept the default name, and then click
Next.
11. In the You’ve successfully added HP LaserJet 6MP dialog box, click Finish.
12. Close the Printers control panel applet.
13. Repeat steps 1 through 11 on NYC-SVR1.
Note: After you have completed the lab exercises closing the VM’s and selecting
undo disk is not required for hosted labs. Click the Quit button to exit.
Lab Answer Key: Configuring Server Security Compliance 1
Module 14
Lab Answer Key: Configuring Server Security
Compliance
Contents:
Exercise 1: Configuring and Analyzing Security 2
Exercise 2: Analyzing Security Templates 4
Exercise 3: Configuring Windows Software Update
Services 6
2 Lab Answer Key: Configuring Server Security Compliance
6. When the SCW Viewer opens, a Microsoft® Internet Explorer® message box
may appear asking for permission to allow an ActiveX® control. Click Yes in
this message box.
7. Scroll through and read the list of Server Roles, Client Features,
Administration and Other Options, Services, and Windows Firewall.
8. Close SCW Viewer, and then click Next.
9. On the Role-Based Service Configuration page, click Next.
10. On the Select Server Roles page, click Next.
11. On the Select Client Features page, click Next.
12. On the Select Administration and Other Options page, click Next.
13. On the Select Additional Services page, click Next.
14. On the Handling Unspecified Services page, verify that Do not change the
startup mode of the service is selected, and then click Next.
15. On the Confirm Service Changes page, scroll through the list and note which
ones are being disabled, and then click Next.
16. On the Network Security page, click Next to start configuring network
security.
17. On the Network Security Rules page, scroll through the list of ports that will
be opened, and then click Next.
18. On the Registry Settings page, select Skip this section, and then click Next.
19. On the Audit Policy page, select Skip this section, and then click Next.
20. On the Save Security Policy page, click Next.
21. On the Security Policy File Name page, specify a name of
NewMemberSrv.xml at the end of the
C:\Windows\Security\msscw\Policies path that is listed, and then click
Next.
22. On the Apply Security Policy page, select Apply now, and then click Next.
23. The Applying Security Policy page appears, and the wizard prepares and
applies the policy.
24. When Application Complete appears above the status bar, click Next.
25. On the Completing the Security Configuration Wizard page, click Finish.
4 Lab Answer Key: Configuring Server Security Compliance
4. In the list pane, right-click Security Configuration and Analysis, and then
click Analyze Computer Now.
5. In the Perform Analysis dialog box, click OK to accept the default log name.
6. When the analysis is complete, in the list pane, expand Security
Configuration and Analysis, expand Local Policies, and then select Security
Options.
7. Scroll down to Interactive Logon: Do not display last user name, and
compare the database setting to the computer setting. You should see a red “x”
on the item, which indicates that the settings are different between the
computer and database settings.
8. Leave the Console1 MMC open for the next task.
13. In the Run dialog box, type cmd, and then press ENTER.
14. At the command prompt, type gpupdate /force, and then press ENTER.
15. At the command prompt, type wuauclt /detectnow, and then press ENTER.
16. Close the command window on NYC-CL2.
f Task 3: Create a computer group, and add NYC-CL2 to the new group
1. In the list pane, expand Computers, and then select All Computers.
2. In the Actions pane, click Add Computer Group.
3. In the Add Computer Group dialog box, specify a computer group name of
HO Computers, and then click Add.
4. In the Update Services list pane, under Computers and All Computers, click
Unassigned Computers.
5. In the Unassigned Computers details pane, specify Any in the Status drop-
down list, and then click Refresh.
8 Lab Answer Key: Configuring Server Security Compliance
Important: Notice that a message appears stating that the update is approved,
but must be downloaded to complete.