SlideShare ist ein Scribd-Unternehmen logo
1 von 38
DHCP, DNS and Proxy
         servers
Members:

    Muhammad Yasir          10-arid-479
    Muhammad Rizwan         10-arid-473
    Talib Mehmood           09-arid-828

Group = J
Special Thanks:
          Sir Ghawas Khan
DHCP             Server
   Dynamic Host Configuration Protocol
    (DHCP) is a network configuration protocol for
    hosts on Internet Protocol (IP) networks.
    Computers that are connected to IP networks
    must be configured before they can
    communicate with other hosts.

   A DHCP Server assigns IP addresses to client
    computers. This is very often used in enterprise
    networks to reduce configuration efforts. All IP
    addresses of all computers are stored in a
    database that resides on a server machine.
DHCP

This is a very simple and easy
to use implementation of a
DHCP Server for Windows
based systems supporting all
Windows operating systems
from Windows 98 to Windows
7.


Before you can configure the DHCP service, you must
install it on the server. DHCP is not installed by default
during a typical installation of Windows Standard Server
2008 or Windows Enterprise Server 2008. You can install
DHCP either during the initial installation of Windows
Server 2008 or after the initial installation is completed.
How to DHCP install and Configure
   Step 1: Go to Start and select on
    Administration Tool click on server
    manager
   Step 2: Click Roles then click add role from
    right of window
   Step 3: new window apear click next and
    check the Dynamic Host Configuration
    Protocol and click next
   Step 4: There are step shown
    bellow(figures)
   Step 5: Click Next button for install
DHCP installation in windows server
                 2008
• Step 1: Goto start -> Administration tools -> Server manger.
•Step 2: Click Roles then Click Add New Role




A new window is appear.
Scope: A scope is a collection of IP addresses for computers on a
subnet that use DHCP.
After Installation DHCP
A menu of DHCP is add
in Administration Tool



Click on DHCP then this
window apeared it show
all information of DHCP
configurations.
For Changing the
range of IP group,
goto properties of
Scope.


In figure show the
old range of IP
addresses you can
change it by enter
new IP addresses
If you want to enter a group of IP then you right click on Address
Pool select new Existing Range

This Range only between the parent range.


As see in Fig.
DHCP servers permit you to reserve an IP address for a client. This means that the
specific network client will have the same IP for as long as you wanted it to. To do this
you will have to know the physical address (MAC) of each network card. Enter the
reservation name, desired IP address, MAC address and description - choose whether
you want to support DHCP or BOOTP and press add. The new reservation will be added to
the list.
DHCP Server TroubleShooting

Before Troubleshooting we must find what the problum e.g
Unable to provide servers to clients or Server stopped or Data
is loss during transfering.




• Authorize the DHCP server in the enterprise where it is being used.
• Inappropriate Address Assignment
• IP Address Conflicts
• DHCP overlaped




http://www.windowsnetworking.com
DNS Server

The Domain Name System (DNS) servers distribute the job of
mapping domain names to IP addresses among servers allocated
to each domain.

Each second-level domain must have at least one domain name
server responsible for maintenance of information about that
domain and all subsidiary domains, and response to queries about
those domains from other computers on the Internet.
DNS Installation and Configuration


Intallation
1. Go to Start, Administration Tool and then click Server
   Manager.
2. In the results pane, under Roles Summary, click Add roles.
3. In the Add Roles Wizard, if the Before You Begin page
   appears, click Next.
4. In the Roles list, click DNS Server, and then click Next.
5. Read the information on the DNS Server page, and then click
   Next.
6. On the Confirm Installation Options page, verify that the
   DNS Server role will be installed, and then click Install.
DNS installation in windows server
                 2008
• Step 1: Goto start -> Administration tools -> Server manger.
•Step 2: Click Roles then Click Add New Role




A new window is appear.
Configuration of DNS Server

Goto start -> Administration Tool -> click DNS
By configuration Right click on Server name and go to properties
A forward lookup zone is the most common type of zone. DNS
clients can use this zone to obtain such information as IP
addresses that correspond to DNS domain names or services
that is stored in the zone.

 Another type of zone, a reverse lookup zone, provides mapping
from IP addresses back to DNS domain names.

DNS provides a reverse lookup process, in which clients use a
known IP address during a name query and look up a computer
name based on its address. A reverse lookup takes the form of a
question, such as "Can you tell me the DNS name of the
computer that uses the IP address 192.168.1.20?“
For Creating new Host, right click on new server(forwordlookup)
click add new host
You can create Mail Exchanger
Proxy Server
A proxy server is a computer that offers a computer
network service to allow clients to make indirect
network connections to other network services. A client
connects to the proxy server, then requests a
connection, file, or other resource available on a
different server. The proxy provides the resource either
by connecting to the specified server or by serving it
from a cache. In some cases, the proxy may alter the
client's request or the server's response for various
purposes.
Proxy Settings




Browsers Settings

Goto Tool -> Internet Options


Then Click Connections -> LAN
Settings
•In the Address box, type the IP address of the proxy server. In the Port box,
type the port number that is used by the proxy server for client connections
(by default, 8080).
• You can click to select the Bypass proxy server for local addresses check
box if you do not want the proxy server computer to be used when you
connect to a computer on the local network (this may speed up
performance).
Following softwares are used for proxy configuration

1.   CCProxy (Any Virsion)
2.   WebSphere Proxy Server
3.   Proxy Server
4.   My Proxy Server.com
5.   etc


Links:
Softpedia.com
Brothersoft.com
Types of Proxy Servers
Web Proxy Servers
1. Transparent Proxy
2. Anonymous Proxy
3. High Anonymity Proxy
Transparent Proxy
          A transparent proxy is a server that satisfies the definition
of a proxy, but does not enforce any local policies. It means that it
does not add, delete or modify attributes or modify information
within messages it forwards. These are generally used for their
ability to cache websites and do not effectively provide any
anonymity to those who use them. However, the use of a
transparent proxy will get you around simple IP bans. Further, your
web browser does not require special configuration and the cache
is transparent to the end-user. This is also known as transparent
forward proxy.
Anonymous Proxy
          An anonymous proxy server also known as web proxy,
generally attempts to anonymize web surfing by hiding the
original IP address of the end user. This type of proxy server are
typically difficult to track, and provides reasonable anonymity for
most users.


High Anonymity Proxy
This type of proxy server does not identify itself as a proxy
server and does not make available the original IP address.

Weitere ähnliche Inhalte

Was ist angesagt?

Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat systemJagsir Singh
 
3 cucm database
3 cucm database3 cucm database
3 cucm databasepasabakac
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linuxVarnnit Jain
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNSDHIVYADEVAKI
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networkingSreenatha Reddy K R
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed ComputingChandan Padalkar
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup► Supreme Mandal ◄
 
Tcpdump
TcpdumpTcpdump
TcpdumpTensor
 
DNS : The internet’s directory service
DNS : The internet’s directory serviceDNS : The internet’s directory service
DNS : The internet’s directory serviceBalaSuresh AsaiThambi
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 

Was ist angesagt? (20)

Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Ch 8 workshow
Ch 8 workshowCh 8 workshow
Ch 8 workshow
 
3 cucm database
3 cucm database3 cucm database
3 cucm database
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Linux
LinuxLinux
Linux
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Linux
LinuxLinux
Linux
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
 
Tcpdump
TcpdumpTcpdump
Tcpdump
 
Ext filesystem4
Ext filesystem4Ext filesystem4
Ext filesystem4
 
DNS : The internet’s directory service
DNS : The internet’s directory serviceDNS : The internet’s directory service
DNS : The internet’s directory service
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 

Ähnlich wie DHCP, DNS and Proxy Server Documentation

Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopesjocelyn_tanner
 
Installing the dhcp server role
Installing the dhcp server roleInstalling the dhcp server role
Installing the dhcp server rolemuneerepckd
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdfssuserfd0132
 
Dhcp server and windows 2012
Dhcp server and windows 2012Dhcp server and windows 2012
Dhcp server and windows 2012HEM Sothon
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup ReportsJiaul Hasan Jony
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxMUHAMMADATTAURREHMAN7
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCPHameda Hurmat
 
Installation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 ServerInstallation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 Server► Supreme Mandal ◄
 
Installation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 ServerInstallation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 Server► Supreme Mandal ◄
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)Melchor Maravillas
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration StepsPasala Jayaraju
 
Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcpduraimurugan89
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Chanaka Lasantha
 

Ähnlich wie DHCP, DNS and Proxy Server Documentation (20)

Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
Installing the dhcp server role
Installing the dhcp server roleInstalling the dhcp server role
Installing the dhcp server role
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
 
Dhcp server and windows 2012
Dhcp server and windows 2012Dhcp server and windows 2012
Dhcp server and windows 2012
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
 
main
mainmain
main
 
DNS,SMTP and POP3
DNS,SMTP and POP3DNS,SMTP and POP3
DNS,SMTP and POP3
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
P09
P09P09
P09
 
Dhcp server
Dhcp serverDhcp server
Dhcp server
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
DHCP(In_Linux).pptx
DHCP(In_Linux).pptxDHCP(In_Linux).pptx
DHCP(In_Linux).pptx
 
Installation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 ServerInstallation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 Server
 
Installation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 ServerInstallation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 Server
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration Steps
 
Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcp
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
 

Kürzlich hochgeladen

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

DHCP, DNS and Proxy Server Documentation

  • 1.
  • 2. DHCP, DNS and Proxy servers Members: Muhammad Yasir 10-arid-479 Muhammad Rizwan 10-arid-473 Talib Mehmood 09-arid-828 Group = J Special Thanks: Sir Ghawas Khan
  • 3. DHCP Server  Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts.  A DHCP Server assigns IP addresses to client computers. This is very often used in enterprise networks to reduce configuration efforts. All IP addresses of all computers are stored in a database that resides on a server machine.
  • 4. DHCP This is a very simple and easy to use implementation of a DHCP Server for Windows based systems supporting all Windows operating systems from Windows 98 to Windows 7. Before you can configure the DHCP service, you must install it on the server. DHCP is not installed by default during a typical installation of Windows Standard Server 2008 or Windows Enterprise Server 2008. You can install DHCP either during the initial installation of Windows Server 2008 or after the initial installation is completed.
  • 5. How to DHCP install and Configure  Step 1: Go to Start and select on Administration Tool click on server manager  Step 2: Click Roles then click add role from right of window  Step 3: new window apear click next and check the Dynamic Host Configuration Protocol and click next  Step 4: There are step shown bellow(figures)  Step 5: Click Next button for install
  • 6. DHCP installation in windows server 2008 • Step 1: Goto start -> Administration tools -> Server manger. •Step 2: Click Roles then Click Add New Role A new window is appear.
  • 7.
  • 8. Scope: A scope is a collection of IP addresses for computers on a subnet that use DHCP.
  • 9.
  • 10. After Installation DHCP A menu of DHCP is add in Administration Tool Click on DHCP then this window apeared it show all information of DHCP configurations.
  • 11. For Changing the range of IP group, goto properties of Scope. In figure show the old range of IP addresses you can change it by enter new IP addresses
  • 12. If you want to enter a group of IP then you right click on Address Pool select new Existing Range This Range only between the parent range. As see in Fig.
  • 13.
  • 14. DHCP servers permit you to reserve an IP address for a client. This means that the specific network client will have the same IP for as long as you wanted it to. To do this you will have to know the physical address (MAC) of each network card. Enter the reservation name, desired IP address, MAC address and description - choose whether you want to support DHCP or BOOTP and press add. The new reservation will be added to the list.
  • 15. DHCP Server TroubleShooting Before Troubleshooting we must find what the problum e.g Unable to provide servers to clients or Server stopped or Data is loss during transfering. • Authorize the DHCP server in the enterprise where it is being used. • Inappropriate Address Assignment • IP Address Conflicts • DHCP overlaped http://www.windowsnetworking.com
  • 16. DNS Server The Domain Name System (DNS) servers distribute the job of mapping domain names to IP addresses among servers allocated to each domain. Each second-level domain must have at least one domain name server responsible for maintenance of information about that domain and all subsidiary domains, and response to queries about those domains from other computers on the Internet.
  • 17. DNS Installation and Configuration Intallation 1. Go to Start, Administration Tool and then click Server Manager. 2. In the results pane, under Roles Summary, click Add roles. 3. In the Add Roles Wizard, if the Before You Begin page appears, click Next. 4. In the Roles list, click DNS Server, and then click Next. 5. Read the information on the DNS Server page, and then click Next. 6. On the Confirm Installation Options page, verify that the DNS Server role will be installed, and then click Install.
  • 18. DNS installation in windows server 2008 • Step 1: Goto start -> Administration tools -> Server manger. •Step 2: Click Roles then Click Add New Role A new window is appear.
  • 19.
  • 20. Configuration of DNS Server Goto start -> Administration Tool -> click DNS
  • 21. By configuration Right click on Server name and go to properties
  • 22. A forward lookup zone is the most common type of zone. DNS clients can use this zone to obtain such information as IP addresses that correspond to DNS domain names or services that is stored in the zone. Another type of zone, a reverse lookup zone, provides mapping from IP addresses back to DNS domain names. DNS provides a reverse lookup process, in which clients use a known IP address during a name query and look up a computer name based on its address. A reverse lookup takes the form of a question, such as "Can you tell me the DNS name of the computer that uses the IP address 192.168.1.20?“
  • 23. For Creating new Host, right click on new server(forwordlookup) click add new host You can create Mail Exchanger
  • 24.
  • 25.
  • 26. Proxy Server A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
  • 27. Proxy Settings Browsers Settings Goto Tool -> Internet Options Then Click Connections -> LAN Settings
  • 28. •In the Address box, type the IP address of the proxy server. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080). • You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
  • 29. Following softwares are used for proxy configuration 1. CCProxy (Any Virsion) 2. WebSphere Proxy Server 3. Proxy Server 4. My Proxy Server.com 5. etc Links: Softpedia.com Brothersoft.com
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Types of Proxy Servers Web Proxy Servers 1. Transparent Proxy 2. Anonymous Proxy 3. High Anonymity Proxy
  • 37. Transparent Proxy A transparent proxy is a server that satisfies the definition of a proxy, but does not enforce any local policies. It means that it does not add, delete or modify attributes or modify information within messages it forwards. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. Further, your web browser does not require special configuration and the cache is transparent to the end-user. This is also known as transparent forward proxy.
  • 38. Anonymous Proxy An anonymous proxy server also known as web proxy, generally attempts to anonymize web surfing by hiding the original IP address of the end user. This type of proxy server are typically difficult to track, and provides reasonable anonymity for most users. High Anonymity Proxy This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.