Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views42 pages

Day 2 AD 1

Day-2-AD-1

Uploaded by

Putrevu Ramesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views42 pages

Day 2 AD 1

Day-2-AD-1

Uploaded by

Putrevu Ramesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

IP Addressing

• Two Versions of Addressing Scheme


– IP version 4 – 32 bit addressing

– IP version 6 – 128 bit addressing


IP Address Classes

• Total IP Addressing Scheme is divided into 5 Classes

– CLASS A

– CLASS B LAN & WAN

– CLASS C

Multicasting
– CLASS D

– CLASS E Research & Development


Class Ranges

• CLASS A Range
– 0.0.0.0 - 127.255.255.255

• CLASS B Range
– 128.0.0.0 - 191.255.255.255

• CLASS C Range
– 192.0.0.0 - 223.255.255.255

• CLASS D Range
– 224.0.0.0 - 239.255.255.255

• CLASS E Range
– 240.0.0.0 - 255.255.255.255
Octet Format

• IP address is divided into Network & Host Portion


– CLASS A is written as N.H.H.H
– CLASS B is written as N.N.H.H
– CLASS C is written as N.N.N.H
Private and Public IP Address

• Private IP Address
– CLASS A 10.0.0.0 - 10.255.255.255
– CLASS B 172.16.0.0 - 172.31.255.255
– CLASS C 192.168.0.0 - 192.168.255.255
• Public IP Address
– Apart from the above specified IP addresses all other IP addresses are
Public IP’s
Assigning IP address via Command Prompt

Microsoft Windows [Version 6.2.92000]


(C) 2012 Microsoft Corporation. All rights reserved.

C:\Users \Administrator> Netsh interface ipv4 set address name=“Ethernet"


source=static addr=10.0.0.1 mask=255.0.0.0
C:\Users\Administrator>
Assigning IP address via Powershell

Windows PowerShell
Copyright (C) 2012 Microsoft Corporation. All rights reserved.

PS C:\Users\Administrator> Set-NetIPAddress –InterfaceAlias “Ethernet"


-IPAddress 10.0.0.1 -PrefixLength 24
PS C:\Users\Administrator>
Logical Topologies

• Workgroup Model or Peer-To-Peer Model


• Domain Model or Client/Server Model
Workgroup Model

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User1
user1

****

12
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

user1
user1found
found
Authentication
Authentication
Successful
Successful
Access
Access- -Granted
Granted

Computer1
Computer1
LOCAL USER DATABASE
Computer2
Computer2
Windows
Windowsuser1 ****
WindowsXP
Windows XP
XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User1
14
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User2
user2

****

16
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

user2
user2not
notfound
found
Authentication
Authentication
Fail
Fail
Access
Access- -Denied
Denied

Computer1
Computer1
LOCAL USER DATABASE
Computer2
Computer2
Windows
Windowsuser1 ****
WindowsXP
Windows XP
XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User2
18
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User2
user2

****

20
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

user2
user2found
found
Authentication
Authentication
Successful
Successful
Access
Access- -Granted
Granted

Computer1
Computer1 LOCAL USER DATABASE
Computer2
Computer2
Windows user2 ****
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User2
22
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User1
user1

****

24
How Local Authentication works ?

Computer3
Computer3 Computer4
Computer4
Windows
Windows 2000
2000
user3
user3 user4
user4 Windows
Windows NT
NT

user1
user1not
notfound
found
Authentication
Authentication
Fail
Fail
Access
Access- -Denied
Denied

Computer1
Computer1 LOCAL USER DATABASE
Computer2
Computer2
Windows user2 ****
Windows XP
XP
user1
user1 user2
user2 Windows
Windows 2003
2003

User2
26
Domain Model

CENTRALIZED USER
DATABASE

ZOOM user1 ****


ZOOM
user2 ****
Windows
Windows 2012
2012
user3 ****

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
Windows
Windows 88
How Centralized Authentication works ?

ZOOM
ZOOM
Windows
Windows 2012
2012

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
Windows
Windows 88
user1

****

ZOOM

29
How Centralized Authentication works ?

CENTRALIZED USER
DATABASE
user1 ****
ZOOM user1 ****
ZOOM
Kerberos - Authentication
user2 ****
Windows
Windows 2012
2012 Successful
Access Granted user3 ****

Computer1
Computer1
Kerberos - Authentication
Computer2
Computer2
Windows
Windows XP
XP Request
Windows
Windows 88
31
How Centralized Authentication works ?

ZOOM
ZOOM
Windows
Windows 2012
2012

Computer1
Computer1 Computer2
Computer2
Windows
Windows XP
XP
Windows
Windows 88
ZOOM\user1
****

33
How Centralized Authentication works ?

CENTRALIZED USER
DATABASE
user1 ****
ZOOM user1 ****
ZOOM
Kerberos - Authentication
user2 ****
Windows
Windows 2012
2012 Successful
Access Granted user3 ****

Computer1
Computer1 Computer2
Computer2
Kerberos - Authentication
Windows
Windows XP
XP Request
Windows
Windows 88
35
What Is Active Directory Domain Services ?

• The AD DS database stores information on user identity, computers,

groups, services and resources.


• AD DS domain controllers also host the service that authenticates

user and computer accounts when they log on to the domain


Active
Active Directory
Directory DS
DS
Purpose of Active Directory

• Provides User Logon and Authentication Services using Kerberos

protocol.
• To Centralize and Decentralize the resource management.

• To centrally organize and manage:


− User Accounts, Computers, Groups, Network Resources.

• Enables authorized Users to easily locate Network Resources.


Domain

• Domain is a logical grouping of user, computer, and group objects for


the purpose of management and security.
• Creating the initial domain controller in a network also creates the
domain—you cannot have a domain without at least one domain
controller.
• Each domain is identified by a DNS domain name.

MS.COM
What is a Domain Controller ?

• A domain controller is a server that is configured to store a copy of


the AD DS directory database (NTDS.DIT) and a copy of the SYSVOL
folder.
• All domain controllers except RODCs store a read/write copy of both
NTDS.DIT and the SYSVOL folder.
• NTDS.DIT is the database itself, and the SYSVOL folder contains all
the template settings for GPOs.
What is a Domain Controller ?

• Domain controllers host several other Active Directory–related


services, including the Kerberos authentication service and the Key
Distribution Center (KDC).
• Kerberos authentication service is used by User and Computer
accounts for logon authentication
• KDC is the service that issues the ticket-granting ticket (TGT) to an
account that logs on to the AD DS domain.
AD DS Logon Process

1. User Account is authenticated to


Domain Controller Domain
Controller
2. Domain Controller returns TGT back to
Client
3. Client uses TGT to apply for access to
Workstation
4. Domain Controller grants access to
Workstation
5. Client uses TGT to apply for access to
Server
6. Domain Controller returns access to
Work Station Server
Server

You might also like