In this course we will focus attention on connecting our private network to the Internet.
When connecting your private network to the Internet, you must consider the limited number of available IP addresses in your design plan.
Because of the shortage of IP addresses, other methods of allowing IP-based clients have been devised.
The Network Address Translation (NAT) server that comes with Windows 2000 is aimed at solving the problem of allowing access to the Internet for internal IP network clients.
Internal computers can use a group of "private" IP addresses that are not valid on the Internet and have their requests forwarded by a NAT server.
This also aids in securing your network, because Internet intruders cannot access your internal network when you use only private IP addresses.
In this course you will learn how to design a NAT solution and how to include in that design security measures for your NAT design.
We will examine how you can use IP packet filters and designated address pools to secure your internal network.
You will also see how you can leverage the power of Virtual Private Networks (VPNs) to secure the internal network that lies behind NAT.
After learning the principles of NAT network design, we'll turn our attention to Microsoft Proxy Server 2.0. MS Proxy Server uses similar technologies as NAT,
and allows you to use private IP addresses on your internal network to access Internet resources.
However, Proxy Server provides additional features that allow you to secure and optimize your network.
We will cover how to integrate Proxy Server's features into your existing network.
You will see how to include in your network design plan important issues regarding client software and methods of limiting Internet access for internal network clients.
These features allow you to control what users can and cannot see on the Internet.
After covering design principles focused on the client side, you will learn how to take advantage of Proxy Server 2.0 firewall features.
You will include in your Proxy Plan packet filtering methods to protect the internal network clients from Internet intruders.
Finally, you will see how to design a highly available and high-performance Proxy Server network. Included in these solutions will be proxy clusters, proxy chains, and proxy arrays.
After completing the course, you will be able to:
Design a functional NAT solution
Secure and enhance NAT design for availability
Design a functional Proxy Server solution
Secure a Proxy Server solution
Enhance and optimize Proxy Server for availability and performance
QuickChecks are unscored opportunities for you to self-check your understanding of key points before you arrive at a scored Exercise or Quiz. You will see QuickCheck icons throughout the lessons. Click the icon to display a brief question, then click again to see the correct answer in a short animated sequence.
If you are running Java Virtual Machine in Internet Explorer 5.0 or above, you will need to
disable the JIT compiler in your Internet Options dialog box.
Problem Solver exercises
To better prepare you to pass the MCSE Exam and to provide you an opportunity to practice what you learn within a context, we have created
exercises throughout the series in which you apply your knowledge about Windows 2000 to various scenarios. You will submit your solutions
to the Problem Solver exercises to tutors for scoring, but you should also consider using the discussion groups as a forum for sharing
When you see this icon placed near a term or topic, you can click it to go to a learning bridge.
A learning bridge is a sidebar that provides refresher information from other courses in this and other series.
In the next lesson, you will learn about prerequisites to this course.