window server 2016
window server 2016
1. Computer
2. Server
3. Hub
4. Switch
5. NIC – Network Interface Card
6. Router
7. Cables
**************************************************************************
Note: one of the main differences between Desktop computer and Server
machine is its Hardware, in Desktop we have One Processor but in server we
can have Four Processor, RAM in Desktop is up to 16 GB, but in Server we can
get 64GB and more.
-------------------------------------------------------------------------------------------------------------------------------
Note: Hub and Switch are used to connect all end devices together on a network, but
Both have different capabilities.
HUB SWITCH
• Hub is a Dummy device. • Switch is an intelligent device.
• When a hub receives a packet of data from • When a switch receives a packet of data, it
one of the connected computers, determines what computer or device the packet
it broadcasts that data packet to all the other is intended for and sends it to that computer
connected computers, no matter which one is only. It does not broadcast the packet to all
the final destination of that data packet. computers as a hub does
• Collision occurs in Hub. • No Collision in Switch.
• No Memory in Hub. • Switch uses MAC table to keep connected
computers MAC address.
• No configuration/Security is possible in Hub. • Configuration/Security can be done in a Switch.
***************************************************************************
3. Network Interface Card: (NIC)
1. Also known as LAN card or Ethernet card or Network Adapter.
2. NIC card is used to connect a computer to a Network (LAN) or Internet
3. NIC card is both Wire and Wireless.
4. Every NIC has two addresses MAC(Hardware )address and IP address (Software)
5. MAC addresses are linked to the hardware of NIC when it is manufactured.
6. MAC address is unique address, No two NIC’s can have same MAC address.
7. MAC address is 48-bit Hex-Decimal address
Ex: B8-70-F4-2E-3E-EF.
8. Out of 48-bits first 24-bits is for Vendor ID and next 24-bits are for Card ID.
Router:
1. Router makes communication between two or more network’s
2. Router can be used between two LAN segments, or between
WAN/Internet.
3. Router can also be used as a security device
4. Router maintains Routing table, in this table Router keeps information of all
the other networks.
4. Types of Software’s
• Software is a set of Instructions that enables a user to interact with Hardware.
• Software is the language of computer.
• Software is also known as Program.
• Software’s can be divided into following categories
1. System Software :
• System Software is set of programs that control and manage the
operations of computer hardware and other Application’s.
• System software is directly installed on Hardware.
• It Controls and monitors the proper use of various hardware resources
like CPU, memory, peripheral devices like monitor, printer etc.
• Without system software Computer is a Dummy machine.
2. Application Software :
Application software’s helps a user to perform specific tasks. Application
software’s are installed over system software.
Following are some examples
• Word processors : word applications helps you to make
documents and helps you to check spellings mistakes, decorate
text, change size, using different font etc
Ex: Word, coral etc
• Spreadsheets : Spreadsheets have Row’s and Column’s that helps
to do calculation like total, average automatically
Ex: Excel, Lotus etc
• Presentation software : using this software we can create
Presentation for office meetings, class rooms etc
Ex: Power Point
• Database management systems : These are used to manage
Database
Ex: Access, Oracle etc
• Web Browser’s : This are used to access websites over Internet
Ex: Internet Explorer, Chrome, Opera etc
• Utility software: Utility software is a collection of one or
more programs that helps the user in system
maintenance task. Utility programs help the users in disk
formatting, data compression, data backup, scanning for
viruses etc.
Ex: Anti-virus, Disk cleaner, Data backup utility etc
3. Programming languages :
• This is used by programmers to developed new programmers and
application’s.
• The most popular programming language are C++, JAVA etc
We can choose the Server 2016 version on this menu. We need Server 2016 Standard with GUI so
selected “Server 2016 Standard (Desktop Experience).
Also, if you need to install Server 2016 without GUI you should select “Windows Server 2016
Standard” here. Further Windows Server 2016 has different edition: Datacenter, Standard and
Essentials editions.
We can see the license terms on this screen, select “I accept License Terms” then click Next to
continue
Select “Custom: Install Windows only (advanced)” here because we will do a clean installation OS.
But if you need an in-place upgrade you should select “Upgrade: Install and Keep files, settings and
applications” here. This option suitable for supported OS, features, services and roles. But keep in
mind you should not prefer in-place upgrade for critical roles like Active Directory Services, etc.
We can select and configure disc information on this screen. (You can set the installation disc, size,
etc.) Used default settings here.
You can see that the necessary files are copied and the installation process is running on this screen.
Screen showing that the necessary settings were made before the server was started.
We can set a password for the local administrator account. You should configure a secure password
for local admin.
On the login screen, we can login with “Administrator” account and related password.
And finally, you can see new Server 2016 interface. It’s similar to old Server 2012 interface but there
are a lot of new features coming with Server 2016.
You should fully patch 2016 before new Server you add or configure roles, services.
2. If your DVD or USB is bootable, then your computer will automatically boot from bootable
Windows 10 USB or DVD.
In case, it is not a bootable installation media, then you need to visit BIOS and their make
appropriate changes to boot from USB or DVD.
Alternatively, when you see the black screen after reboot, press ESC or F12 key for bringing boot
selection menu. Boot key varies from ESC to F1, F2, F8, F10, F11, F12 and Del key and depends on
PC/Motherboard manufacturers.
Once you get the boot menu, select the installation media drive and hit Enter.
3. Once your system successfully boots from your desired Windows 10 installation media, you will
see different options and you need to select according to your requirements
➢ Language to install
➢ Time and Currency Format
➢ Keyboard or Input method
4. In the next window, you will see a blue color window with a button labeled as “Install now“. You
need to click on it to continue the setup.
5. In this window, you will be asked to enter the 25 character product key in the space provided and
then click on the Next button.
If you don’t have a product key for the moment, then you can also click on Skip button and enter the
product key later.
Note: In above step, if you enter the product key, then you will not see the additional window where
you can select the edition which you want to install on your computer.
6. Now you will see the license agreement window, if you want, you can read all the terms and
conditions, check the option labeled as “I accept the license terms” and hit the “Next” button.
To perform a clean installation of Windows 10, you need to click on the second option i.e. Custom:
Install Windows Only (Advanced).
8. in the next windows, you need to choose the drive on which you want to install the copy of
Windows 10. If the drive already running a copy of Windows and you want to remove it, then you
need to format the system drive where the window is already installed. Of course, this will free up
space drive space.
To format the system drive, you need to select the drive and click on the “format” option at the
bottom of the window.
In case, you have installed the new SSD (Solid State Drive) and Hard Drive and you have not created
any partition yet, then you will see unallocated space depending on the size on the drive.
To create a partition, you need to select the drive and click on “New” button. Make sure to allocate
a minimum of 20 GB or you can create a partition of more size depending on the space on your hard
drive. Click “Apply” to complete the process.
The system will additionally create a partition with name “System Reserved” to ensure that system
work fine. The size of this partition is around 100MB in most of the cases .
Note: After formatting the drive, you will lose all the data on the C drive and settings which include
installed apps, games, and any personal data lying on the desktop, Music, Video, Pictures and
related folders.
9. Select the drive where you want to install the copy of Windows 10 and click on the “Next” button.
At this point, the installation of Windows will start. It will take around 20-25 minutes to complete
the installation process.
During the installation, your system may reboot two or three times.
Note: At the time or reboot, make sure to unplug the USB drive or DVD drive otherwise it will load
the complete setup again. Or if your Flash drive is bootable then don’t press any key on your
keyboard.
10. Once the installation is completed. You will see the blue color screen.
Here you can click on “Use Custom Settings” button if you want to go with default settings. You can
also click on “Customize” button if you want to customize settings.
Keep following the instruction as mentioned on the screen and in few seconds Windows 10 home
screens will appear.
This is how you can install Windows 10 using USB or DVD Drive
If you have not entered the 25 character windows key above, then go to settings -> Update &
security -> Activation. Here you need to enter the key to activate the windows.
7. IP ADDRESS
• Internet Protocol (IP) address is also known as logical address or Software address
• IP address is a unique address used to identify a device over a Network, Every device like computer;
server, router, firewall etc have one IP address in a network.
• IP address is assigned to Network Interfaces (NIC); devices with multiple NIC have multiple IP
address.
• No two devices can have same IP address in a Network.
• Without IP address communication is not possible.
• There are two versions of IP address IP Version 4 and IP Version 6
IP Version 4:
1. IP v4 is a 32-bit Binary number.
2. This 32-bits are divided in two 4-octet, each octet contains 8-bits.
3. Octets are separated by a “.” Dot
Ex: 192.168.1.10
4. IP address if further divided in two Classes, Network and Host portion, Public and private
address etc
Note: IP v4 is in binary but for User convenience they are written in Dotted-
Decimal Notation.
Numbers:
Binary: 0, 1 (Bits)
Decimal: 0,1,2,3,4,5,6,7,8,9
Hex-Decimal: 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
Octet: 0, 1,2,3,4,5,6,7.
Note:
• In any octet if we have all bits as “ 0 ” that in
decimal it is “ 0 ”
• In any octet if all bits are “1” than decimal will be
“255”
• So in every octet we can get decimal numbers
between 0-255.
Classes:
IPv4 is divided in to five classes, so that can be used in various situations as per the requirement of
hosts per network.
A 1 – 126
Used in LAN and WAN /
B 128 – 191 INTERNET.
192 – 223
C
IP
Network Host
Portion Portion
In entire Network “Network Portion” should be same, and “Host Portion” Should be
different.
Class A:
10.0.0.0 10.0.1.3 10.0.2.3
10.0.0.2 10.0.1.5
10.0.0.3 10.0.1.6
10.0.0.4 10.0.2.255
10.0.255.255
10.0.1.0 10.0.2.0
10.0.1.1 10.0.2.1
Class B:
172.16.0.0 172.16.2.3
172.16.0.1 172.16.2.4
172.16.0.2 172.16.2.5
172.16.0.3 172.16.2.6
172.16.0.4
172.16.0.5 172.16.2.255
172.16.3.0
172.16.3.1
172.16.0.254 172.16.3.2
172.16.0.255 172.16.3.4
172.16.1.0 172.16.3.5
172.16.1.1
172.16.1.2
172.16.1.3 172.16.255.255
172.16.1.4
172.16.1.254
172.16.1.255
172.16.2.0
172.16.2.1
172.16.2.2
Class C:
192.168.1.0
192.168.1.1
192.168.1.2
192.168.1.254
192.168.1.255
In above example First number “192.168.1.0” is Network ID, and Last Number “192.168.1.255” is Broadcast
ID.
192.168.1 Is the Network portion it should be same whole network and last octet is Host portion which
should be different in whole Network.
Subnet Mask
Subnet Mask differentiates/Separates Network number and Host number of an IP
address.
In Subnet Mask network portion is always in “1” and Host Portion is always in “0”
A 255 0 0 0
B 255 255 0 0
C 255 255 255 0
2. Public IP are paid IP’s, user should Purchase 2. Private IP address are free, anyone can use
public IP. Private IP in their network.
Range of Private IP
Note: Beside Private IP address range, all IP’s from class A: 10.0.0.0 - 10.255.255.255.
A, B, and C are Public IP’s.
B: 172.16.0.0 - 172.31.255.255.
C: 192.168.0.0 - 192.168.255.255.
NETWORK
WORKGROUP DOMAIN
WORKGROUP
Active
Directory
Logical Physical
Domain
Forest Tree Domain OU Site
Controller
DOMAIN
VIRTUALNETWORKS.COM
TREE
VIRTUALNETWORKS.COM
HYD.VERTUALNETWORKS.COM BAN.VIRTUALNETWORKS.COM
Organizational Unit
Note: You can arrange objects that have similar administrative and security requirements into
organizational units. Organizational units provide multiple levels of administrative authority, so
that you can apply Group Policy settings and delegate administrative control.
This delegation simplifies the task of managing these objects and enables you to structure Active
Directory to fit your organization’s requirements.
FOREST
Global Catlog:
• The global catlog stores a full copy of all Active Directory objects in the directory for its
host domain and a partial copy of all objects for all other domains in the forest.
• Users in a forest do not need to be aware of directory structure because all users see a
single directory through the global catlog.
• Applications and clients can query the global catlog to locate any object in a forest.
• The global catlog is hosted on one or more domain controllers in the forest. It contains a
partial replica of every domain directory partition in the forest. These partial replicas
include replicas of every object in the forest, including the attributes most frequently
used in search operations and the attributes required to locate a full replica of the object.
• A global catlog is created automatically on the first domain controller in the forest.
Optionally, other domain controllers can be configured to serve as global catalogs.
• More Global Catlog servers can provide quicker responses, but more Global catlog servers
means more Replication traffic
Replication:
• Replication process ensures that changes made to one domain controller are
synchronized to all other domain controllers within the domain.
• Any change in a Domain controller will take 15 Seconds to replicate with other Domain
Controller in the same site.
• Between other sites it can take up to 15Minutes.
2. Load balancing: When many workstations are accessing Active Directory, the
information they are requesting is retrieved faster when there is more than
one domain controller to provide it.
Site:
Prerequisites:
1. Server Operating System (2012,2016)
2. Administrative account
3. Workgroup computer
4. IP address
5. Change computer name
6. Install ADDS / DNS roles
7. Configure ADDS
3. SELECT (TCP/IPV4)
• THEN CLICK ON PROPERTIES
2. WRITE IP CONFIGUR
3. CLICK ON MANAGE
4. CLICK ON ADD ROLE AND FEATURE
8. SELECT SERVER
• THEN AGAIN CLICK ON NEXT
15. CHECK THE BOX RESTART THE DESTINATION SERVER AUTOMATICALLY IF REQUIRED
• CLICK ON YES BUTTON
• CLICK ON INSTALL BUTTON
2. SELECT ADD A NEW FOREST AND ASSIGN FOREST NAME / DOMAIN NAME.
• CLICK ON NEXT.
4. CLICK ON NEXT.
6. NOW IT WILL SHOW ADS DATABASE FOLDER LOCATION, IF YOU WANT YOU CAN CHANGE
THE LOCATION.
• CLICK ON NEXT.
7. NOW REVIEW ALL OPTIONS IF, YOU WANT TO CHANGE CLICK ON PREVIOUS AND CHANGE
THE SETTINGS, IF NOT CLICK ON NEXT.
11. NOW WHEN WE LOGIN ADMINISTRATOR NAME WILL APPEAR WITH DOMAIN NAME.
12. TO VERIFY GO TO CMD AND SAY NET ACCOUNTS, IT WILL SHOW PRIMARY.
PREREQUIRMENTS
1. Computer with client o / s ( 7, 8, 8.1 or 10 )
2. Ip address and DNS address
3. Computer should be in workgroup
4. Administrator account
5. Go to start
• Right click on computer properties
NOTE: TO VERIFY.
• GO TO SERVER MANAGER
• CLICK ON TOOL BUTTON
• CLICK ON ACTIVE DIRECTORY USERS AND COMPUTERS
• EXPAND DOMAIN NAME
• CLICK ON COMPUTER AND VERIFY
USER
Domain
Local User
User
Local user:
Note: By-default in Windows Operating System two User accounts are created
1. Administrator
2. Guest (Disable By-default)
1. GO TO SERVER MSNAGER
• CLICK ON TOOLS
• CLICK ON ACTIVE DIRECTORY USERS AND COMPUTERS
2. EXPAND DOMAIN
• RIGHT CLICK ON USER
• CLICK ON NEW
• CLICK ON USER
NOTE: TO VERIFY.
• Go to server manager
• Click on tools
• Select on active directory users and computers
• Expand domain click on users folder.
3. Account→ logon to
4. Select the following computers and type the computer name → click on ADD → OK
5. Now Abdullah user cannot login to client1 computer, because he is allocated to “client50”
computer
4. Now change logon hours timings, in this example for SHAKEEL user logon hours is from
morning 8:00am to 5:00pm and Monday to Friday → ok
NOTE: go to client computer and login as shakeel user, between 8:00am to 6:00pm and
login will be allowed
But if you login before 8:00am or after 6:00pm than it will show the following message
3. Select the followings computers and type all the computers names→ click on ADD
4. Ok
2. Account → check the box→ logon hours and click on logon hours
4. ok
4. Click ok to refresh
To verify
1. Now go to active directory users and computers → right/click on users and delete
2. Now go to back active directory administrative center → click on domain name →
double/click on deleted object
3. We can see the deleted object → select your object and click on restore
Note
Now the deleted object is restored successfully to verify go to active directory users and
computers and verify
2. Expand forest → expand domain → expand domain name → right/click on default domain
policy → edit
Expand Forest → Expand Domains → Expand Domain Name “KNOC.COM” → Right Click on Default
Domain Policy → Edit
Under Computer Configuration → Expand Policies → Expand Windows Settings → Expand Security
settings → Expand Account Policies → Select Account Lockout Policies
1. Account lockout threshold : In this option we need to mention the invalid attempts, if two
invalid attempts are configured than account will be locked out if the uses is submitting
three invalid passwords
2. Account lockout duration : This option defines for how long account will be locked out
3. Reset account counter after: This option defines the time period in which a user can
submit invalid password before his account is locked out.
Note: Now go to client computer and give invalid passwords and user account will be locked, it
will show following message
1. Go to active directory users and computers → right click on organizational unit (IT)→ new →
organizational unit give some space → ok
2. Click on yes
4. Finish.
2. Expand forest → expand domain → right click on any organizational unit the create a GPO in this
domain and link it here.
5. Under user configuration → expand policies → expand administrative templates → select start
menu and taskbar.
6. in the right pane, select the option that you want to disable and then right click on the option and
edit.
B. UPDATE POLICY:
1. To update group policy → go to RUN and type the command Pupate /force
C. TO VERIFY:
1. Go to client computers and log in as any user from accounts organizational unit.
NOTE: in this same computer log in with a user from different organizational unit, that user can
access games, music, pictures etc.
2. Expand forest → expand domain→ expand domain name → expand organizational unit
[accounts] → select GPO → delegation → advance.
3. Click on ADD
4. Add user → OK
5. Now select the user → under permission for users (Ayesha) check the box “deny” → apply group
policy
E. TO VERIFY
1. Go to client computers and log in as Ayesha user
4. In right pane, right click on prohibit access to control panel and pc settings →
edit.
NOTE:
1. Now go to run → pupate force.
2. To verify go to client computer and login as account users.
29. Groups
Steps to create groups
1. Go to active directory users and computers → right click on domain or
organizational unit.
2. Members → add
4. Apply → ok
Sharing
1. Create some folders in any drive and add some files
2. To share the folders with users → right click on folder → properties
3. Sharing → share
4. Click on dropdown and select find people → add users to whom you want to
share ( user, group or everyone)
6. Done
7. Close
30. Security
1. Right click on created share folders → properties
2. Security → edit
3. Click on add ( to add user, group or everyone) enter the name of the object →
ok
4. Now select the user and deny write permissions and allow read permission →
apply
6. Ok →ok
To verify
1. Go to client computer and log in as any user and access the shade folder and
try to make some changes and in that folder → it will show you access is
denied.
NOTE: now disconnect client computer from server and access offline folder
3. Profile → under home folder → connect → choose any drive letter → give the
path ( \\serverIP\share folder) --> apply → ok
To verify
1. Go to client computer and log in a user
2. Quota → enable quota management and deny disk space to user exceeding
quota → select limit disk space and assign any space → and select both log
event box → apply
3. Ok → ok
To verify
1. Go to client computers and log in
34. Profile
1. Create a shade folder in server
2. Right click on user → properties
To verify
1. Go to client computer and log in as user and make some changes on desktop.
Now log off from that computer and log in to other computer and user will get
same option
1. STEP
2. STEP
Select
(1)Add a domain controller to an existing domain
(2)Give domain name
(3)Enter user name
(4)Next
3. STEP
Enter password
Next
4. STEP
Next
5. STEP
Next
6. STEP
Next
7. STEP
Next
8. STEP
Install
2. STEP
(5) Change
3. STEP
4. STEP
Enter DSRM Password
Next
5. STEP
Select DNS Option
Next
6. STEP
It will show net BIOS name
Next
7. STEP
Next
8. STEP
Next
9. STEP
Install
2. STEP
Transfer RID Master
Yes
3. STEP
Transfer infrastructure master
Yes
4. STEP
Transfer naming master
Yes
5. STEP
Transfer schema master
Yes
6. STEP
Transfer PDC
Yes
7. STEP
Now go to CMD of ADC1
Net account
NOTE: It will display PRIMARY
2. STEP
Seize RID master
Yes
3. STEP
Seize infrastructure master
Yes
4. STEP
Seize schema master
Yes
5. STEP
Seize naming master
Yes
6. STEP
Seize PDC
Yes
7. STEP
Now go to CMD and type net account it will show PRIMARY
3. RID master
These three Roles are present in every Domain
4. PDC emulator
5. Infrastructure master
1. SCHEMA MASTER:
➢ The schema master FSMO role holder DC is responsible for performing updates to the
directory schema.
➢ This DC is the only one that can process updates to the directory schema. Once the Schema
update is complete, it is replicated from the schema master to all other DCs in the directory.
➢ There is only one schema master in whole Forest.
2. Domain Naming Master:
➢ The domain naming master FSMO role holder DC is responsible for making changes to the
forest-wide domain name space of the directory.
➢ This DC is the only one that can add or remove a domain from the directory.
NOTE: No two Domain Controllers can hold Schema Master and Domain naming master role at same time in
whole Forest.
3. RID MASTER:
➢ The RID master FSMO role holder is the single DC responsible for processing RID Pool
requests from all DCs within a given domain. It is also responsible for removing an object
from its domain and putting it in another domain during an object move.
➢ When a DC creates a security principal object such as a user or group, it attaches a unique
Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs
created in a domain), and a relative ID (RID) that is unique for each security principal SID
created in a domain.
➢ Each Windows DC in a domain is allocated a pool of RIDs that it is allowed to assign to the
security principals it creates. When a DC's allocated RID pool falls below a threshold, that
DC
➢
➢ issues a request for additional RIDs to the domain's RID master. The domain RID master
responds to the request by retrieving RIDs from the domain's unallocated RID pool and
assigns them to the pool of the requesting DC.
➢ There is one RID master per domain in a directory.
4. PDC EMULATOR:
➢ The PDC emulator is necessary to synchronize time in an enterprise. Windows includes the
W32Time (Windows Time) time service that is required by the Kerberos authentication
protocol. All Windows-based computers within an enterprise use a common time. The
purpose of the time service is to ensure that the Windows Time service uses a hierarchical
relationship that controls authority and does not permit loops to ensure appropriate
common time usage.
➢ Password changes performed by other DCs in the domain are replicated preferentially to the
PDC emulator.
➢ Authentication failures that occur at a given DC in a domain because of an incorrect
password are forwarded to the PDC emulator before a bad password failure message is
reported to the user.
➢ Account lockout is processed on the PDC emulator.
➢ There is one PDC EMULATOR per domain in a directory.
5. INFRASTRUCTURE MASTER:
Transfer:
➢ Transferring of FSMO roles is possible if both the Domain Controllers are working.
➢ Transfer of role is safe.
Seize:
➢ Seizing of FSMO role should only be attempted if the existing server with the
FSMO role is no longer available.
➢ If you perform a seizure of the FSMO roles from a DC, you
need to ensure two things.
➢ The current holder is actually dead and offline, and that
the old DC will NEVER return to the network.
➢ If you do an FSMO role Seize and then bring the previous
holder back online, you'll have a problem.
FSMO LAB
SYS 1 SYS 2
Domain Controller Additional Domain Controller
Now we can see three Domain Wide Roles. 1. RID, 2. PDC, 3.INFRASTRUCTUR
Yes
Now we can see RID role is transferred to SYS2, like this transfer remaining two roles.
Go to Tools → Active Directory Domains and Trusts → Right Click on Active Directory Domains and Trusts →
Operational Master
Change
Yes
OK
Change
Yes
Ok
NTDSUTIL
ROLES
CONNECTIONS
CONNECT TO SERVER SYS2
QUIT
➢ Go to CMD
NTDSUTIL
ROLES
CONNECTIONS
CONNECT TO SERVER SYS1
QUIT
Note: Now this Domain Controller holds all the five FSMO Roles, so it acts as Primary Domain controller.
39. DNS
1. STEPS TO INSTALL DNS
1. Go to server manager ➔ manage ➔ Add Roles and Features
2. Next
6. Next ➔ Next
7. Check the box restarts the destination server automatically if
required ➔ Yes ➔ Install ➔ Close
3. Next
8. Finish
2. Next
4. Select
8. Finish
3. Click on ok button
2. Next
6. Next
7. Finish
9. Zone transfer check the box allow zone transfer ➔ Only to the
following servers ➔ Edit
11. Click on ok
12. Apply ➔ Ok
13. New zone to secondary DNS ➔ Right click on zone ➔ Transfer from
master ➔ Refresh
40. DHCP
STEPS TO INSTALL DHCP ROLE
1. Go to server manager ➔manage➔Add Roles and Features
2. Click on Next
6. Next
7. Next
2. Next
4. Close
3. Click on Next
11. Next
13. Finish
The network administrator establishes DHCP servers that maintain TCP/IP configuration information and
provide address configuration to DHCP-enabled clients in the form of a lease offer. The DHCP server stores
the configuration information in a database that includes.
• Valid IP addresses, maintained in a pool for assignment to clients, as well as excluded addresses.
• Reserved IP addresses associated with particular DHCP clients. This allows consistent assignment of
a single IP address to a single DHCP client.
• The lease duration, or the length of time for which the IP address can be used before a lease
renewal is required.
• Requested DHCP options, which are additional parameters that a DHCP server is configured to
assign to clients. Some examples of DHCP options are Router (default gateway), DNS Servers, and
DNS Domain Name.
Benefits of DHCP:
• Reliable IP address configuration. DHCP minimizes configuration errors caused by manual IP
address configuration, such as typographical errors, or address conflicts caused by the assignment of
an IP address to more than one computer at the same time.
• Reduced network administration. DHCP includes the following features to reduce network
administration:
▪ The ability to assign a full range of additional TCP/IP configuration values by means of DHCP
options.
▪ The efficient handling of IP address changes for clients that must be updated frequently, such
as those for portable computers that move to different locations on a wireless network.
SYS 1 SYS 2
IP: 10.0.0.1 ....................
Close
Next
Commit
After Clicking on Add DNS Validation process will complete, Than click on Next
Finish
Now go to Client computer → In Ethernet Cart Properties → TCP/IPV4 Properties → Select “Obtain
an IP address automatically” → ok
Now go to CMD → and check the IP Address configuration → Client computer will IP Configuration
from DHCP
Give any Reservation name → Mention the IP Address that you want to be reserved → Than enter
the MAC address of the network adapter of the computer for which the reservation is being made in
the box provided → add → close
pre-requisites:
1) A computer running windows 2012 (DC)
2) A computer running windows 2012 (Member Server), Install DHCP.
Steps in sys1:
• go to DHCP console
• in left pane expand server name
• expand IPv4
• R/C on scope
• select configure failover
• next
• click add server to add the failover server
• in add server, browse and select the server (sys2.knco.com)
• ok
• select mode, enable message authentication and enter shared
secret
• next
• finish
• close
Steps in sys2 (Member server):
• go to server manager
• select notification complete DHCP configuration
• next
• click commit, to authorize server sys2.knco.com
• close
verification:
go to DHCP console and verify the scope replicated form sys1
NOTE: To verify
➔ Go to DHCP Server ➔ Expand server 1 ➔ Expand IP Version 4 ➔
Expand scope ➔ select Address Lease
2. Next
6. Finish
7. Close
46. WDS
1. STEPS TO INSTALL WDS
1. Go to server manager ➔ manage ➔ Add roles and features
2. Next
6. Next
7. Next
8. Next
3. Next
4. Next
6. Yes
7. Next
9. Finish
Note: Now access WDS server ➔ Right click on server name ➔ All task ➔
Start
2. Next
\
3. Find the location of install image from OS DVD sources folder
Browse
4. Open CD DVD
7. Next
9. Next
10. Finish
2. Booting Image
1. Go to WDS server ➔ Expand server ➔ Right click on Booting image
➔ Add boot image
3. Next
4. Next ➔ Next
5. Finish
The following are requirements for installing this role, depending on whether you choose the default
installation (both Deployment Server and Transport Server), or only the Transport Server role service
➢ Active Directory Domain Services (AD DS): A Windows Deployment Services server must be a
member of an Active Directory Domain Services (AD DS) domain or a domain controller for an AD DS
domain.
The AD DS domain and forest versions are irrelevant; all domain and forest configurations support
Windows Deployment Services.
➢ DHCP: You must have a working Dynamic Host Configuration Protocol (DHCP) server with an active
scope on the network because Windows Deployment Services uses PXE, which relies on DHCP for IP
addressing.
➢ DNS: You must have a working Domain Name System (DNS) server on the network before you can
run Windows Deployment Services.
➢ NTFS volume: The server running Windows Deployment Services requires an NTFS file system
volume for the image store.
➢ Credentials: To install the role, you must be a member of the Local Administrators group on the
server. To initialize the server, you must be a member of the Domain Users group.
During installation, on the Select role services page, the wizard presents the option to select role services to
be installed in Windows Deployment Services. You can choose to install the Deployment Server and
Transport Server, or leave both roles selected.
• Transport Server. This option provides a subset of the functionality of Windows Deployment
Services. It contains only the core networking parts. You can use Transport Server to create
multicast namespaces that transmit data (including operating system images) from a standalone
server. You can also use it if you want to have a PXE server that allows clients to PXE boot and
download your own custom setup application. You should use this option if you want to use either
of these scenarios, but you do not want to incorporate all of Windows Deployment Services.
• Deployment Server. This option provides the full functionality of Windows Deployment Services,
which you can use to configure and remotely install Windows operating systems. Note that
Deployment Server is dependent on the core parts of Transport Server.
IP: 10.0.0.1
SYS 1 .....................
SYS 2
Mask: 255.0.0.0 .....................
Go to Server → Log in as Administrator → Server Manager → Manage → Add roles and Features
Select the server where you want to install this Role → Next
Next
Next
Now Windows Deployment Services Configuration Wizard will complete → than click on FINISH
Browse the “BOOT.WIN” file from WIN 7 DVD (EX: F:\Sources\Boot.Win) → click on open
Next
Go to Tools → Windows Deployment Server → Right click on Install Images → Add Install Image
Browse and Select INSTALL.WIN file from WINDOWS 7 O/S DVD (Ex: F:\Sources\Install.wim) → Next
After pressing F12 it will start loading files from WDS and follow the steps
3. Give some team name and select your NIC’S ➔ Click on additional
properties ➔ Select load balancing mode (address hash) ➔ ok