Go to your Windows Server. Configure the DHCP server statically with the following When you are finished, return the client computers to normal. If necessary, access the

Working with Networking Services | 131 j. Add a DHCP scope by clicking the Add button. A scope is a range of IP addresses that can be handed out to clients. Add the following information: • Scope name: Proseware Scope1 • Starting IP address: 192.168.1.150 • Ending IP address: 192.168.1.199 • Subnet mask: 255.255.255.0 • Default gateway: 192.168.1.1 • Subnet type: Wired An example of this is shown in Figure 6-1. Of course, this information will vary depending on the confi guration you want for your network. Also, you have the option to select wireless as the Subnet type. Note that Wired has a lease duration of six days by default, whereas Wireless has a duration of eight hours. Wireless connections should always have a shorter lease equal to the duration of one work day or less. Make sure that “Activate this scope” is checkmarked and click OK. That adds the scope to the list. You can add more in the future if you wish, but for now, we will leave it as is. Click Next to continue.

k. In the Confi gure DHCPv6 Stateless Mode window, select Disable. We are focusing

on IPv4 for this exercise, but IPv6 could always be confi gured later if neces- sary. Click Next.

l. For the IPv6 DNS Settings window, simply click Next. We will not be

confi guring this feature.

m. You should now see a Confi rmation window Figure 6-2. Review the information

in this window and make sure it is correct before clicking Install. In the fi gure, we left DHCPv6 Stateless Mode enabled because our particular server needs to have it running. Figure 6-1 Adding a DHCP scope 132 | Lesson 6 When complete, the Results should show that the installation succeeded. Click Close to fi nish. This will authorize the server. At this point, the DHCP server is ready to hand out IP addresses to client computers.

3. Go to a Windows client computer and obtain an IP address automatically:

a. Access the IPv4 Properties dialog box for the wired network adapter.

b. Select the Obtain an IP address automatically radio button.

c. Click OK for all dialog boxes.

d. Open the command prompt and type ipconfi g all. You should obtain an

IP address automatically from the list of IP addresses in the DHCP server’s IP scope. Most likely, it will be the fi rst one on the list: 192.168.1.150.

e. If, for some reason, you cannot obtain an IP address, check your confi gura-

tion settings on the server. Also, on the client, you can attempt an ipconfi g release and ipconfi g renew to retry obtaining an IP address. In some cases, you might obtain an IP address from another DHCP device or server. If this is the case, remove that device from the network. If your client has obtained an address on the 169.254.0.0 network, then APIPA has intervened and self- assigned an IP address. See the next exercise for information about how to dis- able APIPA.

f. Test your new IP address by pinging the IP address of the DHCP server and

another client on the network. Disable any fi rewalls that might block pings.

4. When you are finished, return the client computers to normal. If necessary, access the

server and stop the DHCP service. Figure 6-2 DHCP Confirmation window Working with Networking Services | 133 DISABLE APIPA GET READY. Sometimes, APIPA can get in the way of a client obtaining an IP address properly e.g., when a client attempts to obtain an IP address from a DHCP server, but the DHCP server is too busy. At that point, APIPA would self-assign an IP address to the client computer, and the computer would be stuck with that address until an ipconfig release and renew was run from the command line. Depending on the version of Windows and the configuration, this still might not be enough. If you see an IP address of 169.254. x.x, then you know that the client has self-assigned an IP address with the help of APIPA. This shouldn’t happen often, but you never know. Just in case, here’s how to disable APIPA in the Registry: 1. Access the Registry by pressing Windows + R on the keyboard and typing regedit.exe. 2. Navigate the following path: Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services Tcpip Parameters Interfaces

3. In the Interfaces subkey, find the network adapter on which you wish to disable

APIPA. The best way to do this is to find the current IP address of the network adapter with an ipconfig, then locate that adapter in the registry by searching through each of the interfaces one at a time and examining the IPAddress entry.

4. Right click the right pane and select New DWORD.

5. Name the new dword ipautoconfigurationenabled.

6. Then, make sure the entry is set to zero. This is the disabled setting. An example of

this is shown in Figure 6-3. Once APIPA is disabled, it will not interfere with the client’s particular network adapter attempting to obtain an IP address. However, this does not ensure that the client will receive an IP address. Always verify that the DHCP server is configured properly and connected to the network. Figure 6-3 Disabling APIPA 134 | Lesson 6 Terminal Services, also known as Remote Desktop Services, is a type of thin-client termi- nal server computing. It allows client computers to access and use applications loaded on the server, as well as to connect to and take control of a server. Thin-client computers and PCs can connect to servers running Terminal Services. The service uses port 3389 and is also known as Microsoft WBT Server. WBT stands for Windows-Based Terminal. You can configure a set of applications that thin-clients are allowed to access, or you can set up Terminal Services to allow full administrative access to the server. When clients connect, they do so with the Remote Desktop program, which is based on the Remote Desktop Protocol RDP. CONFIGURE TERMINAL SERVICES GET READY. In this exercise, you will learn how to configure Terminal Services on a Windows Server for administrative access. You will also learn how to connect to the server and control it from a client computer.

1. Go to your Windows Server. In this exercise, we are using a Windows Server 2008

computer as our Terminal Services server.

2. Install and configure Terminal Services:

a. Go to the Server Manager console window. You can get to this in various ways,

such as by clicking Start Administrative Tools Server Manager. b. Click Roles. c. Click Add Roles. d. Click Next for the Before You Begin screen. e. Check Terminal Services and click Next. f . Read the Terminal Services introduction and click Next. g. In the Role Services screen, check Terminal Server and TS Licensing. Then click Next. h. Click Next again. i. In the Authentication Method screen, select the Do not require Network Level Authentication radio button. Then click Next. Keep in mind that many network environments will require Network Location Awareness NLA, but for this exercise, we will disable it.

j. In the Licensing Mode screen, select the Confi gure later radio button, then

click Next. k. Leave the User Groups screen as the default and click Next. You can add groups of users at any time to Terminal Services. For now, we will just allow Administrator access.

l. Leave the default setting for the TS Licensing Confi guration screen. By default

it is This workgroup, but if you are part of a domain, you can add the server to that as well. Click Next.

m. Review the Confi rmation screen. Your results should be similar to Figure 6-4.

Then click Install. Working with Terminal Services Terminal Services allows client computers to control a server remotely or use applica- tions that have been loaded on the server. It uses port 3389. In order for clients to con- nect to a server running Terminal Services, they must run the Remote Desktop Protocol or be thin-client computers. CERTIFICATION READY How do you configure Terminal Services? 3.5 Terminal Services utilizes port 3389. TAKE NOTE