Introduction
Document Conventions
Resource Kit Compact Disc
Resource Xit Support Policy
Chapter 1 Unicast Routing Overview
Internetwork Routing
Addressing in an Internetwork
Routing Concepts
Host Routing
Host Detendnation of the First Ho
Host Detendnation of the Entire Pf
Router Routing
Routing Tables
Routing Table StrUcture
Locality of the Routing Table
Static and Dynandc Routers
Routing Problems
Routing Loops
Black Holes
Routers and Broadcast Traffic
Tunneling
FOundations of Routing Protocols
Distance Vector
Link State
Routing Infrastructllre
Single Path vs. Multipath
Flat vs. Hierarchical
Autonomous Systems
Interior Gateway Protocols
Exterior Gateway Protocols
Additional Resources
Chapter 2 Routing and Remote Access Service
Introduction to the Routing and Remote Access Service
Windows 2000 Routing and Remote Access Service
Combining Routing and Remote Access
Authentication and Authorization
Accounting
Installation and Configuration
Refreshing the Configuration
Features of the Routing and Remote Access Service
Unicast IP Support
IP Multicast Support
IPX Support
AppleTalk
Demand-Dial Routing
Remote Access
VPN Server
RADIUS Client
SNMP MIB Support
Extensive LAN and WAN Support
Graphical and Command-Line Management Utilities
API Support for Third-Party ComPonents
Architecture of the Routing and Remote Access Service
SNMP Agent
Management Applications
AAAA
DIM (Mprdim.dll)
Connection Manager
TAPI
IP Router Manager (Iprtmgr.dll)
IPX Router Manager (Ipxrtmgr.dll)
Unicast Routing Protocols
IP Multicast Protocols
RcoJe Tab je~(RtmdJJ)
Multicast Group Manager
IP Filtering Driver (Ipfltdrv.sys)
IP Unicast Forwarder
IP Multicast Forwarder
IPX Filtering Driver (Nwlnkflt.sys)
.IPX Forwarder Driver (Nwlnkfwd.sys)
Unicast IP Components and Processes
IP Multicast Components and Processes
IPX ComPonents and Processes
Registry Settings
Routing and Remote Access Service Tools and Facilities
Routing and Remote Access Snap-In
Routing and Remote Access Floating Windows
Netsh Command-Line Tool
Authentication and Accounting Logging
Event Logging
Tracing
File Tracing
Chapter 3 Unicast IP Routing
Windows 2000 and IP Routing
Windows 2000 Router Features for IP Routing
Preference Levels
RIP for IP
RIP and Large Internetworks
Convergence in RIP Intemetworks
Count-to-Infinity Problem
Reducing Convergence Time
RIP fOr IP Operation
RIP for IP Version l
RIP vl Message Format
Problems with RIP vl
RIP for IP Version
Features of RIP v
RIP v2 Message Format
Authentication in RIP v2
Mixed RIP vl and RIP v2 Environments
Windows 2000 as a RIP fOr IP Router
Troubleshooting RIP for IP
OSPF
OSPF Operation
Formation of the LSDB Using Link State Advertisements
Calculating the SPF Tree Using Dijkstras Algorithm
Calculating the Routing Table Entries from the SPF Tree
Example of OSPF Operation
OSPF Network Types
Synchronizing the LSDB Through Adjacencies
Fondng an Adjacency
Adjacency Configuration Parameters
Adding a Router to a Converged OSPF Internetwork
Designated Routers
DRs on Broadcast Networks
DRs on NBMA Nets
Backup Designated Router
Interface States
OSPF Communication on OSPF Networks
OSPF Areas
Reducing the Size of the LSDB
Reducing the Size of the Routing Table
Backbone Area
OSPF Router Types
Inter-Area Routing
Virtual Links
Configuring Virtual Links
External Routes
Extemal Route Filters
ASBRs and Default Routes
Stub Areas
Troubleshooting OSPF
3HCP Relay Agent
DHCP Across IP Routers
Initial DHCP Configuration
Rebooted Renewal
Troubleshooting the DHCP Relay Agent
Vetwork Address Translator
Static and Dynandc Address Mapping
Proper Translation of Header Fields
NAT Editors
NAT Processes in the Windows 2000 Router
Outbound Internet Traffic
Inbound Internet Traffic
Additional NAT Routing Protocol Components
DHCP Allocator
DNS Proxy
Troubleshooting NAT
IP Packet Filtering
Windows 2000 IP Packet Filtering
IP Header
TCP Header
UDP Header
ICMP Header
Input Filters
Output Filters
Configuring a Filter
Filtering Scenarios
Local Host Filtering
Web Traffic Filtering
FTP Traffic Filtering
PPTP Traffic Filtering
L2TP Server Filtering
Denying Spoofed Packets from Private IP Addresses
Fragmentation Filtering
ICMP Router Discovery
Router Advertisements
Router Solicitations
Additional Resources
ChaPter4 IP Multicast Support
IP Multicasting Overview
Mapping IP Multicast to MAC-Layer Multicast
IP Multicast--Enabled Intranet
Hosts
Routers
Receive All IP Multicast Traffic
Forward IP Multicast Traffic
Receive and Process IGMP Host Membership Report Mess
Query Attached Subnets for Host Membership Status
Communicate Group Membership to Other IP Multicast Rc
MBone
IGMP
IGMP vl
Host Membership Report
Host Menibership Query
IGMP v2
IGMP v2 Host Membership Report
Leave Group Message
IGMP Group-Specific Query
Routing and Remote Access Service IP Multicast Suppor
IGMP Protocol
IGMP Router Mode
IGMP Router Mode Settings
IGMP Proxy Mode
Router Mode vs. Proxy Mode
Multicast Boundaries
Scope-Based Boundaries
TTL-Based Boundaries
Multicast Rate Lindting
Multicast Heartbeat
IP-in-IP Tunnels
IP-in-IP Interfaces
Multicast Static Routes
Supported Multicast Configurations
Single Router Intranet
Single Router Intranet Connected to the MBone
Peripheral Router in a Multicast-Enabled Intranet
Multicast Support for Remote Access Clients
MBone Access for ISP Dial-Up Clients
Private Intranet Access for Dial-Up or VPN Client
Multicast Support for Office Networks
IP Multicast Troubleshooting Tools
Routing and Remote Access Snap-In Tables
Multicast Forwarding Table
Multicast Statistics
IGMP Group Table
IGMP Interface Group Table
Mrinfo Command
Mtrace Support
Netsh Commands
IGMP Event Logging
Tracing
Additional Resources
:hapter5 lPX Routing
Nindows 2000 and IPX Routing
Windows 2000 Router Features fOr the IPX Protocol Suite
[PX Packet Filtering
IPX Header Structure
Demultiplexing an IPX Packet
The Windows 2000 Router IPX Packet Filtering
Configuring an IPX Filter
RIP fOr IPX
IPX Routing Tables
RIP for IPX Operation
RIP for IPX Packet Structure
RIP fOr IPX Route Filters
Static IPX Routes
SAP for IPX
IPX Routers and the Intemal Network Number
IPX Traffic Before the IPX Intemal Network
IPX Traffic After the IPX Internal Network
Windows 2000 Router and the IPX Internal Network and Internal
SAP Tables
SAP Operation for an IPX Router
SAP Packet Structure
SAP Filters
Static Services
NetBIOS Broadcasts
IPX WAN Broadcast
IPX WAN Broadcasts and Microsoft Networking
NetBIOS Over IPX Broadcast Packet StrUcture
Static NetBIOS Names
Additional Resources
ChaPter6 Demand-Dial Routing
Introduction to Demand-Dial Routing
Demand-Dial Routing and Remote Access
Types of Demand-Dial Connections
On-Demand and Persistent Connections
Two-Way and One-Way Initiated Connections
ComPonents of Demand-Dial Routing
Calling Router
Answering Router
Connection Medium
Demand-Dial Routing Process
On-Demand Router-to-Router VPN
Testing Demand-Dial Connections
Manual Test
Automatic
Monitoring Initiated Demand-Dial Connections with Rasmon
Demand-Dial Routing Security
Remote Access Pendssion
Authentication
One-Way and Mutual Authentication
Encryption
Demand-Dial Interface Packet Filtering
Remote Access Policy Profile Packet Filtering
Creating User Accounts with the Demand-Dial Wizard
Preventing Demand-Dial Connections
Demand-Dial Filters
Dial-Out Hours
. Demand-Dial Routing and Routing Protocols
On-Demand Connections
Manual Configuration of Static Routes
Autostatic Updates
Persistent Connections
Using Multilink and BAP
IPX Demand-Dial Connections
Troubleshooting Demand-Dial Routing
Troubleshooting Tools
Part 2 Remote Access
ChaPter 7 RemOte Access Server
Remote Access Overview
Remote Access Versus Remote Control
Elements of a Dial-Up Remote Access Connection
Remote Access Client
Remote Access Server
Dial-Up Equipment and WAN Infrastructure
Remote Access Protocols
LAN Protocols
Elements of Secure Remote Access
Secure User Authentication
Mutual Authentication
Data Encryption
Callback
Caller-ID
Remote Access Account Lockout
Managing Remote Access
Managing Users
Managing Addresses
Managing Access
Managing Authentication
Managing Accounting
Network Management
Remote Access Server Aichitecture
IP, IPX, and AppleTalk Router
Packets frOm Remote Access Clients
Packets to Remote Access Clients
TCPlIP On-Subnet and Off Subnet Addressing
On-Subnet Addressing and Proxy ARP
Off Subnet Addressing and IP Routing
NetBIOS Gateway
Point-to-Point PrOtocol
PPP Encapsulation
Preventing the Occurrence of the Flag Character
PPP Link Negotiation with LCP
LCP Packet StrUcture
LCP Options
LCP Negotiation Process
Callback Negotiation with the Callback Control Protocol
Packet Structure
Negotiated Options
PPP Network Layer Negotiation with NCP
IPCP
IPXCP
ATCP
NBFCP
ComPression Control Protocol
ECP
PPP Connection Process
Phase l: PPP Configuration
Phase 2: Authentication
Phase 3:Callback
Phase 4: Protocol Configuration
A SamPle PPP Connection
Network Monitor
PPP Tracing
PPP Connection Tendnation
PPP Authentication ProtOco]s
PAP
SPAP
CHAP
MS-CHAP vl
MS-CHAP v2
EAP
EAP-MD5
EAP-TLS
EAP-RADIUS
Unauthenticated Connections
Remote Access and TCP/IP and IPX
TCPlIP
IP Address Allocation
DNS and WINS Address Assignment
Ovetriding IPCP-Allocated DNS and WINS Server IP Addresses with
DHCPIrifOrm
Remote Access Server and the DHCP Relay Agent
IPX
Remote Access Policies
Connection Attempt PrOcessing
Troubleshooting Remote Access Policies
Multilink and Bandwidth Allocation Protocol
PPP Multilink Protocol
Bandwidth Allocation Protocol (BAP)
Bandwidth Allocation Control Protocol (BACP)
Remote Access Server and IP Multicast Support
Multicast Traffc to Remote Access Clients
Multicast Traffic from Remote Access Clients
Internet-Based IP Multicast Traffic
Organization--Based IP Multicast Traffic
Troubleshooting the Remote Access Server
Common Remote Access Problems
Troubleshooting Tools
Chapter 8 Intern6t Authentication Service
IAS Overview
IAS Features
RADIUS Protocol
RADIUS Authentication Operation
RADIUS Packet Format
General Packet Structure
RADIUS Attributes
Vendor-Specific Attributes
RADIUS Packet Example
IAS Authentication
IAS Step-by-Step Authentication and Authorization
Compulsory Tunneling with IAS
Voluntary Tunneling
Compulsory Tunneling
Authentication Methods
Password Authentication Protocol
Challenge Handshake Authentication Protocol
Microsoft Challenge Handshake Authentication Protocol
Extensible Authentication Protocol
Unauthenticated Access
IAS Authorization
Remote Access Policies
Local vs. Centralized Policy Management
Dial-in Properties of a User Object
Elements of a Remote Access Policy
Vendor Profiles
Accepting a Connection AttemPt
Remote Access Policy Adndnistrative Models
IAS Accounting
RADIUS Accounting
IAS Log File
IAS Authentication and Windows Domain Modes
Windows 2000 Native-Mode Domains
Windows 2000 Mixed-Mode Domains or indows NT 4.0 Domains
Windows 2000 Stand-Alone Servers
Behavior Differences Between Windows 2000 and Windows NT 4.0 IAS
Windows NT 4.0 IAS Behavior
Windows 2000 IAS Behavior
Security Considerations
RADIUS Proxy Security Issues
Firewall Protection
Remote Access Account Lockout
Performance Tuning and Optindzation
Monitoring PerfOrmance and Health of the IAS Server
Troubleshooting
Troubleshooting IAS Installation
Troubleshooting by Using Network Mqnitor
Chapter9 Virtual Private NetWorking
Virtual Private Networking Overview
Elements of a VPN Connection
VPN Connections
Remote Access VPN Connection
Router-to-Router VPN Connection
Properties of VPN Connections
Intemet and Intranet-Based VPN Connections
Intemet-Based VPN Connections
Intranet-Based VPN Connections
Combined Internet and lntranet VPN Connections
Managing Virtual Private Networking
Managing Users
Managing Addresses and Name Servers
Managing Access
Managing Authentication
Managing Accounting
Network Management
Point-to-Point Tunneling Protocol
Tunnel Maintenance with the PPTP Control Connection
PgrP Data Tunneling
PPTP Packets and Windows 2000 Networking Architecture
Using Network Load Balancing with PPTP
Layer Two Tunneling Protocol and Internet Protocol Security
Tunnel Maintenance with L2TP Control Messages
L2TP Data Tunneling
L2TP over IPSec Packets and Windows 2000 Networking Architect
VPN Security
PPTP Connections
User Authentication with PPP
Encryption with MPPE
PPTP Packet Filtering
L2TP over IPSec Connections
User Authentication with L2TP over IPSec
Encryption with L2TP over IPSec
Data Authentication and Integrity with L2TP over IPSec
L2TP over IPSec Packet Filtering
Addressing and Routing for VPNs
Remote Access VPN Connections
IP Addresses and the Dial-Up VPN Client
Default Routes and Dial-Up Clients
Default Routes and VPNs over the Internet
Router-to-Router VPN Connections
TemPorary vs. Persistent Router-to-Router VPNs
VPNs Using Dial-Up ISP Connections
Static vs. Dynandc Routing
Pre-shared Key Authentication fOr L2TP over IPSec Router-to-Router VPN
Connections
Same Pre-shared Key for All Connections
Different Pre-shared Keys for Different Connections
Using IPSecPol to Create the IPSec Policy
VPNs and Firewalls
VPN Server and Firewall Configurations
VPN Server in Front of the Firewall
VPN Server Behind the Firewall
VPNs and Network Address Translators
Address and Port Mapping fOr VPN Traffic
PPTP Traffic
L2TP over IPSec Traffic
Pass-Through VPN Scenario
Configuration of the Company A VPN Server
Configuration of the Company B VPN Server
Filtering Configuration
Configuration of the VPN Client Computer fOr a Pass-Through VPN
Creating the Pass-Through VPN Connection
Troubleshooting VPNs
Common VPN Problems
Troubleshooting Tools
Additional Resources
Part 3 lnteroperability
Chapter 10 lnteroperability with IBM Host Systems
Overview of Microsoft SNA Server
Network Integration Services
Data Access
Application Integration
Network Management Integration
Network Integration Methods
Deployment Models
Branch Deployment Model
Centralized Deployment Model
Distributed Deployment Model
SNA Server Integration with Windows 2000--Based Networks
Windows 2000 Domains
SNA Server Subdomains
Organizing SNA Server--Based Subdomains
Detendning SNA Server Roles
Connection Methods
Connecting SNA ServerBased ComPuters to IBM Host Systems
Choosing Network Protocols
Commnications with Hierarchical SNA Networks
3270 Access
Using LU Pools
Assigning LUs to Workstations
Providing Fault Tolerance
Providing Load Balancing
TN3270 Access
Providing Hot Backup and Load Balancing
Assigning LUs to IP Addresses
Downstream Connections
Communications with Peer-tO-Peer SNA Networks
APPC Using SNA Server
Commn Prograedng Interface for Commnications
APPC Applications
5250 Access
TN5250 Access
APPC File Transfers
APPC Deployment Strategies
Using Independent APPC LUs
Using Dependent APPC LUs
Using APPC LU Pools
Providing Fault Tolerance
TN5250 IP Settings
SNA Remote Access Service
Heterogeneous Client Services
Integrating Heterogeneous Clients with Mainframes
Session Types with Mainframes
Host Utilities with Mainframes
Application Prograedng Interfaces with Mainframes
Integrating Heterogeneous Clients with ASl400 Systems
Session Types with AS/400 Systems
Host Utilities with AS/400 Systems
Application Prograedng Interfaces with AS/400 Systems
Host Print Services
SNA Server Host Print Service
Mainframe Printing
AS/400 Printing
LAN-to-Host Security
Authentication
Domain Authentication
Resource Allocation
3270 Tendnal Access
5250 Tendnal Access and APPC Access
TN3270 and TN5250 Services
Shared Folder Services
Data Encryption
Firewall Support
Host Security Integration
Host Security Integration ComPonents
Host Account Cache
Host Account Synchronization Service
Windows 2000 Account Synchronization Sevice
Password Synchronization Options
Automating Password Synchronization
Host-Initiated Changes
Windows 2000--Initiated Changes
Automating Logons
Host Data Access
Host Data Access Using ODBC
Host Data Access Using OLE DB
Choosing a Host Data Access Method
Host Application Integration Using COMTI
Host Transaction Integration
Transaction and Data Access Scenarios
Web-to-Host Integration
SNA Server and Web Technology
Web-to-Host Access Methods
Browser-Based Tenninal Access
Web-to-Host Data Access
Web-to-Host Application Access
Network Management Integration
SNA Server Management Services
Integration with Windows 2000 Management Services
Integration with IBM NetView Management Services
NVAlert Service
NVRunCmd Service
Response Time Monitor
Link Alerts for SDLC and Token Ring
Additional Resources
ChaPter 11 Services for UNIX
Overview
File Sharing with NFS
Supported Versions of NFS
Server for NFS
Client for NFS
NFS Aichitecture and Protocols
Remote Procedure Call Protocol
NFS Threads
PCNFSD Authentication
Using Showmount
NFS Design Features
Inodes
File Nandng
File Petrissions
Symbolic Links
File Locking
File Caching
Telnet Server and Client
Telnet Protocol
Network Virtual Teednal
Telnet Session
Telnet Options
Telnet Security
Password Synchronization
Using Password Synchronization
Security
ExamPle Files
TripleDES
UNIX Utilities and Kom Shell
UNIX Shell
Using the Korn Shell
UNIX Utilities
Using vi
Scripting
Additional Resources
Chapter 12 lnteroperabiIity with NetWare
Windows 2000 Services for NetWare
NWLink
NWLink Architecture
IPX
SPX
SPXII
RIP
SAP
NetBIOS OverIPX
Forwarder
Tuning NWLink
Frame Types and Network Numbers
NWLink Auto Detect
NWLink and Supported IPX Frame Types
Network Numbers
Gateway Service and Client Service
Choosing Between Gateway Service and Client Service
Advantages and Disadvantages of Client Service for NetWare
Advantages and Disadvantages of Gateway Service for NetWare
How Gateway Service for NetWare Works
Gateway Service for NetWare Packet Translation
How Client Service fOr NetWare Works
Client Setvice fOr NetWare Packet Translation
Configuring Gateway Service and Client Service
Preparing the NetWare Server for Gateway Service and Client
Service
Configuring a Gateway Service on the Windows 2000 ServerBased
ComPuter
Configuring Client Service fOr NetWare on Windows 2000
Professional
Selecting the Default Tree and Context or the Preferred Server
Installing Multiple Gateways
Establishing Security
Files Installed with Gateway Service, Client Service, and NWLink
NetWare Adndnistration Through Windows 2000
Adndnistering NetWare Servers
Windows 2000 and NetWare Security
Windows 2000 Pendssions
NetWare Trustee Rights
Windows 2000 Folder Pendssions and NetWare Directory Rights
Windows 2000 File Pendssions and NetWare File Rights
Windows 2000 and NetWare File Attributes
NDS Object and Property Rights
Accessing NetWare Volumes
Using the Net Viw Command
Login Scripts
Troubleshooting Windows 2000 and NetWare Connectivity
Windows 2000 Troubleshooting Tools
Troubleshooting Commn Problems
Troubleshooting NetWare Login Scripts
Troubleshooting Other Common Problems
Additional Resources
ChaPter 13 Services for Macintosh
Overview
AppleTalk
AppleTalk Networking and Routing
AppleTalk Phase 2 Features
Network Design
Seed Routers
Using Multiple Seed Routers on a Network
Detennining Seed Router Placement on a Network
Assigning Network Numbers and Network Ranges
Zones
Assigning Zones
Making a Router Plan
Planning the Physical Setup
Installation of Ethernet Cards
Installation of LocalTalk Card
Installation of an Ethemet/LocalTalk Router
Advanced Examples of a Physical Network
File Services fOr Macintosh
File Server Accessibility over TCP/IP
File Server Accessibility over AppleTalk
AppleTalk Filing Protocol
NTFS Streams
Indexing
Disk Storage
Network Security
Authentication
Domains and Trusted Domains
Windows 2000 Server Accounts fOr Macintosh Clients
File Peedssions
Types of Pendssions
Handling File-Level Pendssions
TransIating Pendssions
Setting Pendssions from a Macintosh or a Windows 2000 Computer
Volume Passwords
Macintosh File Name Translation
Nandng Differences
Overview of Macintosh-to-8.3 Translation
Mapping of Extended Characters
Cross-PlatfOrm Applications on Macintosh and Windows 2000 ComPuters
Extension-Type Associations
Print Server for Macintosh
Printing Protocol
Printing Authentication
Macintosh Port Monitor
Services for Macintosh Print Processor
Setup of Printing Devices for Network Printing
Avoiding Lasethep Wars
Advanced Printing Topics
Creating Multiple Printers for a Single Printing Device
Creating Printing Pools
Remote Access
Troubleshooting
Adndnistrator and User Issues and Solutions
Printing Issues and Solutions
Additional Resources
Part4 Media lntegration
ChaPter 14 Asynchronous TranSter Mode
Introduction to ATM
ATM Overview
Basic ComPonents
Traditional LAN and ATM LAN
Connectionless vs. Connection-Oriented
Network Speed
ATM Architecture
ATM Model
Physical Layer
The ATM Layer
ATM AdaPtation Layers
ATM Cell StrUcture
Virtual Paths and Virtual Channels
Switching Hierarchy
Quality of Service
ATM Addresses
Addressing in Detail
ATM Connection Types
Signaling
LAN Emulation
LANE Architecture
LANE Operation
TCP/IP Over ATM
IP over ATM Architecture
IP over ATM ComPonents
ATMARP Server
MARS
IP over ATM Operation
Services at an ATM Sfyitch
Windows 2000 ATM Services
ComPonents
ATM Call Manager
ATM LAN Emulation Module
ATMARP and ARP MARS
API Support: Winsock 2.0, TAPI, and NDIS 5.0
PPP over ATM
PPP over ATM and NDISWAN
Support fOr Raw Channel Access Filtering: DirectShow
IP Phone Access
Best Practices
Using the Default ELAN
Using Multiple ELANs for Security
Enable Event Logging
Proper ELAN Names
Using Supported ATM Adapters
ATM Utilities
ATMADM Utility
ATMLANE Utility
ATMARP Utility
IP over ATM
Enhancing Security through Logical IP Subnets
Using PVCs Effectively
Setting Up IP over ATM fOr a PVC-Only Environment
Modifying ATM Defaults
Security: Preventing Unauthorized Access to a Switch
Troubleshooting
Initialization Failure
Parameters Unsupported
PVC Not Forwarding Cells
IP over ATM Troubleshooting
Additional Resources
Chapter 15 TeIephony lntegration and Conferencing
Introduction to Windows 2000 Telephony and Conferencing
ComPuter-Telephony Integration Overview
Microsoft Support of CTI
Phone Dialer Application
TAPI 2.l and 3.0
Service Providers
TAPI Architecture
TAPI 3.0 COM API
TAPI Server Process
Telephony Service Providers
H.323 Service Provider
Multicast Conferencing Service Provider
NDIS Proxy Service Provider
Remote Service Provider
TAPI Kemel-Mode Service Provider
Unimodem 5 Service Provider
Third-Party Service Providers
Media Service Providers
Client/Server Telephony
Intemet Telephony and Conferencing
Internet Telephony with H.323
Placing H.323 Calls with the Dialer
Receiving H.323 Calls
Using Windows 2000 Directory Services
H.323 Protocol
Media Streams with RTP
Audio and Video Codecs
Calling Through IP-PSTN Gateways
Calling Through Firewalls
Calling Through Gatekeepers
Quality of Service Support
Multiparty Conferencing with IP Multicast
Conferences
IP Multicast
Single Group IP Address
Allocating Multicast Addresses
PUblishing Conference Objects
Session Description Protocol
Conference Security Model
Routing and Remote Access Service Considerations
Troubleshooting
Troubleshooting PSTN Telephony
Yroubleshooting H.323 Calls and Multicast Conferencing
Additional Resources
Part 5 Other ProtocoIs
Chapter16 N6tBEUI
Overview of Windows 2000 NetBEUI
Interoperability Using NBF
Architecture of NBF
TDI Interface
NDIS Interface
Network Communication Methods
Connectionless Network Communications
Connection-Oriented Network Communications
Adaptive Sliding Windows
Link Timers
NBF Dynandcally Allocates Memory
NBF Supports Remote Access Clients
NBF Session Limit
Establishing Sessions
Lindted Network Routing Using NBF
Plug and Play
Troubleshooting NetBEUI
Chapter 17 Data Link Control
Overview of Data Link Control
Installing the DLC Protocol
Configuring Network Bindings
DLC Driver Parameters in the Registry
Conununicating with SNA Hosts Using DLC
Changing the Locally Adndnistered Address
Using DLC to Connect to Print Devices
Additional Resources
ApPendix A lBM SNA Int6roPerability ConcePts
IBM Host Integration
Microsoft SNA Server
IBM Systems Network forhitecture
Hierarchical SNA Networks
Hardware Components on Hierarchical Networks
Connection Types in Hierarchical Networks
Connections from the Mainframe to the FEP
Connections from the Front-End Processor to the Cluster Controller
Physical Units in Hierarchical Networks
Mainframe Software
FEP Software
Cluster Controller Software
Logical Units in Hierarchical Networks
SNA Functional Layers
Path Control
Network Addressable Units
SNA Sessions
Hierarchical Domains and Subareas
Advanced Peer-to-Peer Networking
Hardware Components on Peer-to-Peer Networks
Connection Types in Peer-to-Peer Networks
Physical Units in Peer-to-Peer Networks
Node Types
Logical Units in Peer-to-Peer Networks
Advanced Program--to-Program Communications
Dependent and Independent LUs
SNA in Transition
Hierarchical and Peer-to-Peer Integration
IBM Networking Blueprint
Host Application Standards
Tendnal Access
Tendnal Access to IBM Mainframes
Tendnal Access to ASl400 Systems
Host Database Standards
Record-Level Data Access
File-Level Data Access
Host Transaction Processing
Reliable Transaction Standards
Transaction Processing ComPonents
Transaction Processing Synchronization
IBM Host Transaction Processing Standards
IBM NetView Network Management System
NetView Functions
NetView Management Architecture
Additional Resources
Appendjx B Unix lnteroperabiIity Concepts
Hierarchical File StrUcture
Kernel
Root
UNIX Implementations
UNIX Printing
UNIX Man Pages
Appendix C Windows 2000 Resource Kit Deployment Lab
Windows 2000 Resource Xit Deployment Scenarios Web S
Resource Xit Deployment Lab Partners
Routers
Cisco 7500 Series Routers
Cisco 3600 Router
Switches
Cisco Catalyst 6000 L3 Switch
Cisco Catalyst 3500 Switch Series
Servers
Compaq ProLiant 5500 LAN Server
Compaq ProLiant 2500 LAN Server
Compaq ProLiant 850R LAN Server
Intel Quad Pentium LAN Server
Intel Dual Pentium LAN Server
Desktop Computers
Compaq Deskpro 4000 Series
Compaq Deskpro 6000 Series
Portable ComPuters
Compaq ArInada 4000 Series
Compaq Armada l700 Series
Compaq Armada 7700 Series
ComPaq Armada 7800 Series
GIossary
lndex