SlideShare una empresa de Scribd logo
1 de 38
DHCP, DNS and Proxy
         servers
Members:

    Muhammad Yasir          10-arid-479
    Muhammad Rizwan         10-arid-473
    Talib Mehmood           09-arid-828

Group = J
Special Thanks:
          Sir Ghawas Khan
DHCP             Server
   Dynamic Host Configuration Protocol
    (DHCP) is a network configuration protocol for
    hosts on Internet Protocol (IP) networks.
    Computers that are connected to IP networks
    must be configured before they can
    communicate with other hosts.

   A DHCP Server assigns IP addresses to client
    computers. This is very often used in enterprise
    networks to reduce configuration efforts. All IP
    addresses of all computers are stored in a
    database that resides on a server machine.
DHCP

This is a very simple and easy
to use implementation of a
DHCP Server for Windows
based systems supporting all
Windows operating systems
from Windows 98 to Windows
7.


Before you can configure the DHCP service, you must
install it on the server. DHCP is not installed by default
during a typical installation of Windows Standard Server
2008 or Windows Enterprise Server 2008. You can install
DHCP either during the initial installation of Windows
Server 2008 or after the initial installation is completed.
How to DHCP install and Configure
   Step 1: Go to Start and select on
    Administration Tool click on server
    manager
   Step 2: Click Roles then click add role from
    right of window
   Step 3: new window apear click next and
    check the Dynamic Host Configuration
    Protocol and click next
   Step 4: There are step shown
    bellow(figures)
   Step 5: Click Next button for install
DHCP installation in windows server
                 2008
• Step 1: Goto start -> Administration tools -> Server manger.
•Step 2: Click Roles then Click Add New Role




A new window is appear.
Scope: A scope is a collection of IP addresses for computers on a
subnet that use DHCP.
After Installation DHCP
A menu of DHCP is add
in Administration Tool



Click on DHCP then this
window apeared it show
all information of DHCP
configurations.
For Changing the
range of IP group,
goto properties of
Scope.


In figure show the
old range of IP
addresses you can
change it by enter
new IP addresses
If you want to enter a group of IP then you right click on Address
Pool select new Existing Range

This Range only between the parent range.


As see in Fig.
DHCP servers permit you to reserve an IP address for a client. This means that the
specific network client will have the same IP for as long as you wanted it to. To do this
you will have to know the physical address (MAC) of each network card. Enter the
reservation name, desired IP address, MAC address and description - choose whether
you want to support DHCP or BOOTP and press add. The new reservation will be added to
the list.
DHCP Server TroubleShooting

Before Troubleshooting we must find what the problum e.g
Unable to provide servers to clients or Server stopped or Data
is loss during transfering.




• Authorize the DHCP server in the enterprise where it is being used.
• Inappropriate Address Assignment
• IP Address Conflicts
• DHCP overlaped




http://www.windowsnetworking.com
DNS Server

The Domain Name System (DNS) servers distribute the job of
mapping domain names to IP addresses among servers allocated
to each domain.

Each second-level domain must have at least one domain name
server responsible for maintenance of information about that
domain and all subsidiary domains, and response to queries about
those domains from other computers on the Internet.
DNS Installation and Configuration


Intallation
1. Go to Start, Administration Tool and then click Server
   Manager.
2. In the results pane, under Roles Summary, click Add roles.
3. In the Add Roles Wizard, if the Before You Begin page
   appears, click Next.
4. In the Roles list, click DNS Server, and then click Next.
5. Read the information on the DNS Server page, and then click
   Next.
6. On the Confirm Installation Options page, verify that the
   DNS Server role will be installed, and then click Install.
DNS installation in windows server
                 2008
• Step 1: Goto start -> Administration tools -> Server manger.
•Step 2: Click Roles then Click Add New Role




A new window is appear.
Configuration of DNS Server

Goto start -> Administration Tool -> click DNS
By configuration Right click on Server name and go to properties
A forward lookup zone is the most common type of zone. DNS
clients can use this zone to obtain such information as IP
addresses that correspond to DNS domain names or services
that is stored in the zone.

 Another type of zone, a reverse lookup zone, provides mapping
from IP addresses back to DNS domain names.

DNS provides a reverse lookup process, in which clients use a
known IP address during a name query and look up a computer
name based on its address. A reverse lookup takes the form of a
question, such as "Can you tell me the DNS name of the
computer that uses the IP address 192.168.1.20?“
For Creating new Host, right click on new server(forwordlookup)
click add new host
You can create Mail Exchanger
Proxy Server
A proxy server is a computer that offers a computer
network service to allow clients to make indirect
network connections to other network services. A client
connects to the proxy server, then requests a
connection, file, or other resource available on a
different server. The proxy provides the resource either
by connecting to the specified server or by serving it
from a cache. In some cases, the proxy may alter the
client's request or the server's response for various
purposes.
Proxy Settings




Browsers Settings

Goto Tool -> Internet Options


Then Click Connections -> LAN
Settings
•In the Address box, type the IP address of the proxy server. In the Port box,
type the port number that is used by the proxy server for client connections
(by default, 8080).
• You can click to select the Bypass proxy server for local addresses check
box if you do not want the proxy server computer to be used when you
connect to a computer on the local network (this may speed up
performance).
Following softwares are used for proxy configuration

1.   CCProxy (Any Virsion)
2.   WebSphere Proxy Server
3.   Proxy Server
4.   My Proxy Server.com
5.   etc


Links:
Softpedia.com
Brothersoft.com
Types of Proxy Servers
Web Proxy Servers
1. Transparent Proxy
2. Anonymous Proxy
3. High Anonymity Proxy
Transparent Proxy
          A transparent proxy is a server that satisfies the definition
of a proxy, but does not enforce any local policies. It means that it
does not add, delete or modify attributes or modify information
within messages it forwards. These are generally used for their
ability to cache websites and do not effectively provide any
anonymity to those who use them. However, the use of a
transparent proxy will get you around simple IP bans. Further, your
web browser does not require special configuration and the cache
is transparent to the end-user. This is also known as transparent
forward proxy.
Anonymous Proxy
          An anonymous proxy server also known as web proxy,
generally attempts to anonymize web surfing by hiding the
original IP address of the end user. This type of proxy server are
typically difficult to track, and provides reasonable anonymity for
most users.


High Anonymity Proxy
This type of proxy server does not identify itself as a proxy
server and does not make available the original IP address.

Más contenido relacionado

La actualidad más candente

Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...Sehrish Asif
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
FIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmFIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmArijitRoy118
 
Oracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdfOracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdfAlex446314
 
MySQL Architecture and Engine
MySQL Architecture and EngineMySQL Architecture and Engine
MySQL Architecture and EngineAbdul Manaf
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingSolidQ
 
HCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for DummiesHCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for Dummiespanagenda
 
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?vasuballa
 
Monitor và tối ưu sql server
Monitor và tối ưu sql serverMonitor và tối ưu sql server
Monitor và tối ưu sql serverHuân Bùi Đình
 
Database replication
Database replicationDatabase replication
Database replicationArslan111
 
Tuning for Oracle RAC Wait Events
Tuning for Oracle RAC Wait EventsTuning for Oracle RAC Wait Events
Tuning for Oracle RAC Wait EventsConfio Software
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)113068
 
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Niklas Iveslatt
 
Awr + 12c performance tuning
Awr + 12c performance tuningAwr + 12c performance tuning
Awr + 12c performance tuningAiougVizagChapter
 
Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management SystemAli Raza
 
Components Of A Database Worksheet
Components Of A Database WorksheetComponents Of A Database Worksheet
Components Of A Database WorksheetEdificat0r
 

La actualidad más candente (20)

DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
FIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmFIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement Algorithm
 
Oracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdfOracle_Patching_Untold_Story_Final_Part2.pdf
Oracle_Patching_Untold_Story_Final_Part2.pdf
 
MySQL Architecture and Engine
MySQL Architecture and EngineMySQL Architecture and Engine
MySQL Architecture and Engine
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
HCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for DummiesHCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for Dummies
 
Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
 
Monitor và tối ưu sql server
Monitor và tối ưu sql serverMonitor và tối ưu sql server
Monitor và tối ưu sql server
 
Database replication
Database replicationDatabase replication
Database replication
 
Tuning for Oracle RAC Wait Events
Tuning for Oracle RAC Wait EventsTuning for Oracle RAC Wait Events
Tuning for Oracle RAC Wait Events
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
 
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
 
Awr + 12c performance tuning
Awr + 12c performance tuningAwr + 12c performance tuning
Awr + 12c performance tuning
 
Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management System
 
Components Of A Database Worksheet
Components Of A Database WorksheetComponents Of A Database Worksheet
Components Of A Database Worksheet
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 

Similar a Dhcp, dns and proxy server (1)

Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup► Supreme Mandal ◄
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopesjocelyn_tanner
 
Installing the dhcp server role
Installing the dhcp server roleInstalling the dhcp server role
Installing the dhcp server rolemuneerepckd
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdfssuserfd0132
 
Dhcp server and windows 2012
Dhcp server and windows 2012Dhcp server and windows 2012
Dhcp server and windows 2012HEM Sothon
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup ReportsJiaul Hasan Jony
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxMUHAMMADATTAURREHMAN7
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCPHameda Hurmat
 
Installation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 ServerInstallation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 Server► Supreme Mandal ◄
 
Installation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 ServerInstallation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 Server► Supreme Mandal ◄
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)Melchor Maravillas
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration StepsPasala Jayaraju
 
Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcpduraimurugan89
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 

Similar a Dhcp, dns and proxy server (1) (20)

Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
Installing the dhcp server role
Installing the dhcp server roleInstalling the dhcp server role
Installing the dhcp server role
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
 
Dhcp server and windows 2012
Dhcp server and windows 2012Dhcp server and windows 2012
Dhcp server and windows 2012
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
 
DNS,SMTP and POP3
DNS,SMTP and POP3DNS,SMTP and POP3
DNS,SMTP and POP3
 
main
mainmain
main
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
P09
P09P09
P09
 
Dhcp server
Dhcp serverDhcp server
Dhcp server
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
DHCP(In_Linux).pptx
DHCP(In_Linux).pptxDHCP(In_Linux).pptx
DHCP(In_Linux).pptx
 
Installation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 ServerInstallation of Active Directory on Windows 2000 Server
Installation of Active Directory on Windows 2000 Server
 
Installation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 ServerInstallation of Active Directory on Windows Server 2003 Server
Installation of Active Directory on Windows Server 2003 Server
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration Steps
 
Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcp
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Dhcp, dns and proxy server (1)

  • 1.
  • 2. DHCP, DNS and Proxy servers Members: Muhammad Yasir 10-arid-479 Muhammad Rizwan 10-arid-473 Talib Mehmood 09-arid-828 Group = J Special Thanks: Sir Ghawas Khan
  • 3. DHCP Server  Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts.  A DHCP Server assigns IP addresses to client computers. This is very often used in enterprise networks to reduce configuration efforts. All IP addresses of all computers are stored in a database that resides on a server machine.
  • 4. DHCP This is a very simple and easy to use implementation of a DHCP Server for Windows based systems supporting all Windows operating systems from Windows 98 to Windows 7. Before you can configure the DHCP service, you must install it on the server. DHCP is not installed by default during a typical installation of Windows Standard Server 2008 or Windows Enterprise Server 2008. You can install DHCP either during the initial installation of Windows Server 2008 or after the initial installation is completed.
  • 5. How to DHCP install and Configure  Step 1: Go to Start and select on Administration Tool click on server manager  Step 2: Click Roles then click add role from right of window  Step 3: new window apear click next and check the Dynamic Host Configuration Protocol and click next  Step 4: There are step shown bellow(figures)  Step 5: Click Next button for install
  • 6. DHCP installation in windows server 2008 • Step 1: Goto start -> Administration tools -> Server manger. •Step 2: Click Roles then Click Add New Role A new window is appear.
  • 7.
  • 8. Scope: A scope is a collection of IP addresses for computers on a subnet that use DHCP.
  • 9.
  • 10. After Installation DHCP A menu of DHCP is add in Administration Tool Click on DHCP then this window apeared it show all information of DHCP configurations.
  • 11. For Changing the range of IP group, goto properties of Scope. In figure show the old range of IP addresses you can change it by enter new IP addresses
  • 12. If you want to enter a group of IP then you right click on Address Pool select new Existing Range This Range only between the parent range. As see in Fig.
  • 13.
  • 14. DHCP servers permit you to reserve an IP address for a client. This means that the specific network client will have the same IP for as long as you wanted it to. To do this you will have to know the physical address (MAC) of each network card. Enter the reservation name, desired IP address, MAC address and description - choose whether you want to support DHCP or BOOTP and press add. The new reservation will be added to the list.
  • 15. DHCP Server TroubleShooting Before Troubleshooting we must find what the problum e.g Unable to provide servers to clients or Server stopped or Data is loss during transfering. • Authorize the DHCP server in the enterprise where it is being used. • Inappropriate Address Assignment • IP Address Conflicts • DHCP overlaped http://www.windowsnetworking.com
  • 16. DNS Server The Domain Name System (DNS) servers distribute the job of mapping domain names to IP addresses among servers allocated to each domain. Each second-level domain must have at least one domain name server responsible for maintenance of information about that domain and all subsidiary domains, and response to queries about those domains from other computers on the Internet.
  • 17. DNS Installation and Configuration Intallation 1. Go to Start, Administration Tool and then click Server Manager. 2. In the results pane, under Roles Summary, click Add roles. 3. In the Add Roles Wizard, if the Before You Begin page appears, click Next. 4. In the Roles list, click DNS Server, and then click Next. 5. Read the information on the DNS Server page, and then click Next. 6. On the Confirm Installation Options page, verify that the DNS Server role will be installed, and then click Install.
  • 18. DNS installation in windows server 2008 • Step 1: Goto start -> Administration tools -> Server manger. •Step 2: Click Roles then Click Add New Role A new window is appear.
  • 19.
  • 20. Configuration of DNS Server Goto start -> Administration Tool -> click DNS
  • 21. By configuration Right click on Server name and go to properties
  • 22. A forward lookup zone is the most common type of zone. DNS clients can use this zone to obtain such information as IP addresses that correspond to DNS domain names or services that is stored in the zone. Another type of zone, a reverse lookup zone, provides mapping from IP addresses back to DNS domain names. DNS provides a reverse lookup process, in which clients use a known IP address during a name query and look up a computer name based on its address. A reverse lookup takes the form of a question, such as "Can you tell me the DNS name of the computer that uses the IP address 192.168.1.20?“
  • 23. For Creating new Host, right click on new server(forwordlookup) click add new host You can create Mail Exchanger
  • 24.
  • 25.
  • 26. Proxy Server A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
  • 27. Proxy Settings Browsers Settings Goto Tool -> Internet Options Then Click Connections -> LAN Settings
  • 28. •In the Address box, type the IP address of the proxy server. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080). • You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
  • 29. Following softwares are used for proxy configuration 1. CCProxy (Any Virsion) 2. WebSphere Proxy Server 3. Proxy Server 4. My Proxy Server.com 5. etc Links: Softpedia.com Brothersoft.com
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Types of Proxy Servers Web Proxy Servers 1. Transparent Proxy 2. Anonymous Proxy 3. High Anonymity Proxy
  • 37. Transparent Proxy A transparent proxy is a server that satisfies the definition of a proxy, but does not enforce any local policies. It means that it does not add, delete or modify attributes or modify information within messages it forwards. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. Further, your web browser does not require special configuration and the cache is transparent to the end-user. This is also known as transparent forward proxy.
  • 38. Anonymous Proxy An anonymous proxy server also known as web proxy, generally attempts to anonymize web surfing by hiding the original IP address of the end user. This type of proxy server are typically difficult to track, and provides reasonable anonymity for most users. High Anonymity Proxy This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.