Chapter 8. Network Services

In This Chapter

  • Basic Network Services.

  • Using Windows Server 2003 as a fax server.

  • Working with Shadow Copies.

  • Sharing secured files.

What's New

One of the basic functions of any network operating system is to provide network services. In a TCP/IP-based network, the most basic of these services range from the core services such as DHCP, WINS, and DNS (which provide connectivity and the capability to locate resources) to accessing those resources via methods such as file sharing.

Windows Server 2003 introduces a number of enhancements to these network services. The majority of these enhancements are changes to the various core network service consoles (DHCP, WINS), whereas others add increased functionality (application partitions in AD-integrated DNS). Additional improvements with other network-accessible services have been made primarily to make those services more accessible (fax sharing, shadow copies, EFS file sharing, and sharing of files across the Web). This chapter looks at the improvements to each of these services.

WINS, DHCP, and DNS

Windows Internet Naming Service (WINS) in Windows Server 2003 is largely unchanged from Windows 2000. There are some minor display improvements primarily for performance, but the service itself functions the same. Dynamic Host Configuration Protocol (DHCP) introduces a few new management features, but it too is largely unchanged. Domain Naming Service (DNS), on the other hand, has some significant improvements.

WINS

WINS is the service used for locating network basic input output system (NetBIOS) resources. It provides a dynamic database for maintaining associations between NetBIOS names and Internet Protocol (IP) addresses. The changes to the WINS service in Windows Server 2003 are primarily enhancement to the Microsoft Management Console (MMC) snap-in for administering WINS. The first notable improvement is in the way WINS records are displayed. In Windows 2000 you had to choose which records to display in the console. You could select to find records by name, owner (the WINS server on which the record was created), or type (which was a sub-choice of finding by owner). It is pretty much the same in Windows Server 2003, but now you simply select Display Records and enter the criteria for the records to display: by Record Owner; by Record Type; or by Record Mapping. Filtering by record mapping includes filtering by name, by IP address, or both. The real improvement is in what the console does when you choose to display the records.

When choosing to display records, you have an option labeled Enable Result Caching, as shown in Figure 8.1. If you don't select this check box, the query is run against the WINS server (or servers if multiple owners are queried) and the results are displayed. Subsequent queries are also run against the WINS servers(s). Depending on the size of the WINS database and the network connectivity between the servers, a significant delay could occur before displaying the results of each and every query as the query traverses the network. By selecting this check box, the WINS records are downloaded to the local machine and cached in memory. Subsequent queries can then find those records in memory without having to query the WINS server across the network again. Thus, with the results cached, subsequent queries to the same data are faster. The caveat is that if the WINS database is particularly large, the amount of memory consumed for caching can actually degrade performance. What actually gets cached depends on the query: If you query WINS records by owner, all the records from that owner are downloaded to the local machine and cached. Any subsequent queries for records from that owner are returned from the cache without querying the WINS server again—the queries are faster but potentially outdated if anything has changed on the WINS server queried. If the WINS records are queried through a filter (by name, IP address, or type), only those records in the query result set are cached. Subsequent queries for the same result set (or subset) are cached, but queries for other records have to again access the WINS server (across the network).

Caching WINS results improves the performance of queries.

Figure 8.1. Caching WINS results improves the performance of queries.

Another change in the WINS server is in the designation of valid replication partners. In previous versions of WINS, administrators had to manually configure push/pull partners to enable replication between two WINS servers. To ease this administrative burden, Windows 2000 introduced a new feature called Automatic Partner Configuration, which allows WINS servers to detect other WINS servers on the network and automatically configure push/pull relationships. If a lot of WINS servers are on the network, this autodiscovery and autoconfiguration could potentially lead to WINS replication chaos because any WINS server could replicate with any other WINS server. Administrators can gain some control over this by specifying a list of WINS servers from which a given WINS server would block replication of records. Windows Server 2003 improves on controlling Automatic Partner Configuration by enabling administrators to designate acceptance of records from particular owners. This is basically the same thing, but instead of having to specify all the servers with which you don't want to replicate, you can simply specify the few servers you do.

Note

Note

For an introduction to WINS, go to the book's product page at www.informit.com/store/product.aspx?isbn=0789728494. Click the Extra tab and locate article ID# A010801.

DHCP

DHCP is the service used to automatically issue IP addresses and configuration information. Like WINS, DHCP is largely unchanged in Windows Server 2003. Most of the improvements are with the DHCP service snap-in. One of the nicest enhancements is the capability to back up and restore the DHCP database right from the console. In previous editions, DHCP could be configured to back up its database; however, these configurations were performed either by modifying the Registry or with the netsh command. The netsh command still exists and is still used to configure an automated backup interval, but the DHCP snap-in now has the capability for performing a manual backup. More importantly, it provides an easy way to restore a corrupted DHCP database. Simply right-click the DHCP server, select Restore from the pop-up menu, and select the location from which to restore. It even prompts you to automatically restart the DHCP service to make the “new” database available.

Some additional niceties in the console are new descriptions on the Dynamic DNS tab, clarifying what each option does. Additionally, it provides the capability to specify the credentials used to authenticate to the DNS server for DNS dynamic updates. There is also a new predefined option (249 - classless static routes) that enables definition of static routes for configuring alternative routing paths over and above the default gateway.

There is a significant change in the Windows XP and Windows Server 2003 DHCP client. The Internet Protocol (TCP/IP) properties for the network adapter have a new Alternate Configuration tab that allows finer control over the Automatic Private IP Addressing feature. The Windows 2000 DHCP client introduced a new feature called Automatic Private IP Addressing (APIPA). APIPA is the capability of the DHCP client to assign itself an IP address. Basically, if a Windows 2000 client configured for DHCP does not receive a response when it attempts to obtain a lease from a DHCP server, the client automatically assigns itself an IP address in the 169.254.x.x class B address range.

This is great for small businesses and SOHOs on a single network segment. Their clients can make up IP addresses and communicate without needing a DHCP server. In that environment, with everyone on the same subnet, all machines would use the 169.254.x.x address space and could communicate with each other.

Although APIPA works well for small networks, it is not a very good option for large organizations that already have a DHCP infrastructure and multiple IP subnets. In such an environment, if a particular client comes up with a 169.254.x.x address, it might be able to communicate with other similar clients on its local subnet but not anything anywhere else, such as the servers, Internet, and so on.

By default, the APIPA configuration is enabled in Windows 2000 but can be turned off via a Registry key. It's just one more potential headache for administrators. With Windows XP and Windows Server 2003 the DHCP client still defaults to using APIPA, but now you can configure an alternative IP address to use instead of the randomly determined 169.254.x.x address. Basically, it's like being able to configure a static IP to use in the event the client cannot obtain a DHCP address. You can think of it as a static backup address for when DHCP is unavailable. One common application for the new Alternate Configuration feature is for laptop users. Their computers can be set to use DHCP when they're in the office and be programmed with a static address for use at the user's home or other location.

Some administrators like to configure servers to use DHCP, too. They create a reservation in DHCP, so that the servers always get the same IP addresses, and rely on DHCP to change other IP configuration settings such as DNS servers, WINS servers, and so forth. However, if the DHCP server fails, servers might not obtain an IP address at all, which would interrupt network operations. By using the Alternate Configuration, you can take advantage of DHCP while still ensuring that servers will have an accurate IP address if the DHCP server isn't available.

Note

Note

For more information on the DHCP service, go to the book's product page at www.informit.com/store/product.aspx?isbn=0789728494. Click the Extras tab and locate article ID# A010802.

DNS

DNS has received a minor makeover for Windows Server 2003, including how Windows Server 2003 handles Active Directory-integrated DNS zones and improvements to the DNS management console.

Active Directory-Integrated Zones

Probably the single greatest enhancement to the DNS service is a new feature of Active Directory (AD) integrated zones. Windows 2000 introduced Active Directory integrated zones, which store DNS records in the Active Directory database instead of in flat .dns files on the DNS server (like primary and secondary zones). The major benefit of an Active Directory-integrated zone is that your DNS records are replicated to all domain controllers, so in the event of a DNS server failure, you simply install DNS on a domain controller and the zone appears, as if by magic. In effect, any domain controller has the capability to become a DNS server, and your zone records are protected by Active Directory's replication.

The big drawback to the way Windows 2000 implements Active Directory-integrated zones is that all DNS records in the zone are replicated to every domain controller throughout your domain. This can potentially generate a lot of unnecessary network traffic because not every domain controller is a DNS server and therefore doesn't need the DNS zone replicated. With the new Active Directory Application Partitions in Windows Server 2003, the replication of the DNS information can be more finely controlled.

When you use Active Directory Integrated zones on a Windows Server 2003 DNS server, Windows creates two application partitions—one called DomainDNSZones and one called ForestDNSZones—and used to replicate DNS information throughout the domain or forest. As shown in Figure 8.2, a given zone can be replicated as follows:

  • To all DNS servers in the Active Directory forest.

  • To all DNS servers in the Active Directory domain.

  • To all domain controllers in the Active Directory domain. This is the only option compatible with replication to Windows 2000 domain controllers. Windows 2000 domain controllers know nothing about application partitions.

  • To all domain controllers specified in the scope of the following application directory partition. This option enables you to load DNS into your own application partition (provided you have created one) for even tighter control of replication.

Windows Server 2003 enables you to control the scope of replication of Active Directory integrated zones.

Figure 8.2. Windows Server 2003 enables you to control the scope of replication of Active Directory integrated zones.

Enhancements for DNS Hierarchy

Several enhancement to DNS provide additional flexibility for designing a DNS infrastructure. One such enhancement is a new zone type: stub zone. A stub zone is simply a copy of a DNS zone, like a secondary zone. The difference between a stub zone and a secondary zone is that a stub zone can contain glue records for delegated subdomains.

Glue records are references to servers that are authoritative for the subdomain. These records enable the DNS server to send a referral directly to the DNS server authoritative for the child domain without having to forward the request up the DNS hierarchy, only to have it come back down again.

Another new infrastructure design feature is the capability to designate forwarders on a per-domain basis. A forwarder is a pointer to a particular DNS server for sending unresolved queries. Ordinarily, if a DNS server is not authoritative for the zone referenced in a DNS query, it contacts or forwards the query to a root ('.') server, which then sends the query to successive child domains down the tree until it gets to the authoritative zone. Forwarders enable you to pass the request to other DNS servers which might potentially have or know about the zone without having to start at the root servers. This gives administrators some control over how queries will be resolved, allowing them to design DNS hierarchies to more efficiently respond to queries. A potential problem is that you might want queries for some domains to start at the root but want other domains to send the queries to your internal DNS servers. With Windows Server 2003, you can do both. You can specify individual domains (or all domains) to forward and specify to which servers they get forwarded. You can also specify whether to use recursion for queries to those domains.

DNS Console Improvements

Similar to the other core networking services, the DNS console in Windows Server 2003 sports some improvements. One nicety is that the built-in DNS console provided includes the event viewer snap-in with the DNS event log for monitoring DNS service messages. Additionally, a new option on the server pop-up menu—Launch Nslookup—launches the nslookup command-line utility for testing DNS query resolution. The Debug Logging tab has also been redesigned with more detailed configuration information. Also, a new tab is available for specifying the types of events to be written to the event log (previously only available through editing the Registry).

An additional security improvement is the capability to manage DNS server permissions at the server level. This enables you to delegate server-wide control of your DNS servers instead of just at the zone level, such as in Windows 2000.

Note

DNS Console Improvements

For more information on DNS and how it works, go to the book's product page at www.informit.com/store/product.aspx?isbn=0789728494. Click the Extras tab and locate article ID# A010803.

Fax Sharing

To understand the improvements in the fax service for Windows Server 2003, you need to understand how faxing works in Windows 2000. Because faxing in Windows 2000 is extremely limited, it might be unfamiliar to some administrators, so we'll go over the basics here.

Faxing the Windows 2000 Way

Windows 2000 doesn't make faxing very easy. Basically, you first have to install a fax printer, configure the device, and learn to live with the operating system's limited faxing capabilities.

Installing Fax Printers

In Windows 2000, the fax service is installed by default. To enable faxing, you simply install a modem. After a modem is installed, a printer called Fax magically appears in the Printers control panel. You can install additional modems, but they do not show up as additional fax printers in the Printers control panel. Instead, they appear in the Fax Administration console as additional fax devices.

Fax Device Configuration and Routing Options

Each device in the Fax Administration console can be configured to receive incoming faxes, send outgoing faxes, or both. Devices configured as outgoing simply send the fax via the fax device; devices configured to receive incoming faxes require further configuration to designate what to do with the incoming faxes. The Received Faxes configuration options are as follows:

  • Print On—. The fax gets printed to a local printer.

  • Save in Folder—. The fax is stored locally in a specified directory on the server.

  • Send to Local Email Inbox Profile Name—. The fax is sent to the inbox of a mail profile on the server.

You might have noticed in this description that everything is local: Incoming options are the local printer, local file, or local profile.

Limitations

The biggest limitation of the Windows 2000 fax service is that it cannot be shared. This means that all outgoing faxes need to be sent from the server and all incoming faxes are stored locally on the server in some form. This is all well and good for a client machine, but generally you don't want to have to log on locally to your servers.

Faxing the Windows Server 2003 Way

Windows Server 2003 improves Windows' built-in faxing capabilities. It improves installation and offers the capability to share fax printers with network users, giving you an effective entry-level network fax solution.

Installing the Fax Service

The first clue that faxing in Windows Server 2003 is different from Windows 2000 is in the fax service itself. It is not installed by default. Installing a fax modem does not magically generate a fax printer in the Printers, now called Printers and Faxes, control panel applet. To enable faxing in Windows Server 2003, you need to install the fax service using Add/Remove Programs—Add/Remove Windows Components, just like any other service. After it's installed, a whole host of new features are available.

First, when a modem is installed, the fax printer appears in Printers and Faxes. Unlike Windows 2000, this fax printer queue can be shared out just like any other print share, enabling remote users to be able to print to it and thereby send outgoing faxes via the fax server.

Fax Device Configuration and Routing Options

The Fax Administration console, now called the Fax Service Management console, has been greatly improved. In addition to showing all the fax devices, it has several new configuration properties for controlling the behavior of faxes. For example, you can set different archival settings to maintain copies of sent or received faxes. You can also record incoming and outgoing events, as well as Activity Logging and Event Reporting. Activity Logging enables you to write incoming and outgoing activities to a special log, whereas Event Reporting controls the level of information written to the Windows Application Event Log.

The routing options for incoming faxes have also been extended. As shown in Figure 8.3, you can still print directly to a local printer or save to a local folder as before; however, the incoming email routing option enables routing to any email address via an SMTP server that you configure in the fax properties. You can also arrange multiple devices into device groups. Devices groups are just that—collections of devices that enable you to treat multiple devices as a single unit. Another new feature is the ability to designate rules; you can create rules to designate faxes destined for a certain region/country and area code to use specific fax devices (or groups of devices).

Routing incoming faxes via email.

Figure 8.3. Routing incoming faxes via email.

The fax client, previously the fax queue application, has been replaced with the Fax Console. With the Fax Console, you can send and receive faxes, create cover letters, and so on. Another new console, the Fax Monitor, enables you to monitor the status of current faxes, and it can be configured to automatically pop up whenever a fax is sent or received.

File Sharing

Probably the most significant new feature for file share management is the capability to create shadow copies. Shadow copies enable you to save point-in-time copies of files. These captures are performed at the file system level, so they even capture open files.

The intended implementation for shadow copies is as a safety net to easily recover deleted or modified files without resorting to backups, not as the sole method for disaster recovery. Even better, a shadow copy enables the user to restore files, freeing the administrator from the headache of sifting through backup tapes to find a particular version of a file.

Shadow copies are enabled at the volume level (Volume Shadow Copies or VSS). To enable shadow copies for a particular volume, simply right-click the volume, click Properties, and then select the Shadow Copies tab. From this tab, you can create shadow copies for any given volume. When creating a shadow copy, you must choose where to store it. The default is to store shadow copies on the same volume as the original file, but you can configure (on a per-volume basis) the location of shadow copies. It is recommended that you save your shadow copies to a different volume so as not to consume more space on the original volume. Additionally, if the volume fails, you won't lose the files and the copies. You also can specify how much disk space to allow the shadow copies for a particular volume to consume (minimum 100MB). After they use up this space, previous shadow copies are overwritten and lost, so choose the amount of disk space carefully based on how much data is in your file shares.

After shadow copies are enabled, the contents of all file shares (including the administrative shares, C$, IPC$, and so on) are saved as shadow copies. The Shadow Copies tab lists the existing volumes, when the next shadow copy is scheduled to run (if enabled), the number of shares (not including administrative shares) on each volume, and the amount of disk space used by shadow copies. For each volume you can enable or disable shadow copies of all shares on that volume.

You can also schedule when to perform shadow copies (the default is twice per day—weekdays at 7 a.m. and 12 p.m.) or perform one manually.

After shadow copies are enabled, clients can view them. This essentially provides a type of versioning capability, where a user can compare changes between an existing file and a shadow copy of the same file.

It can also be used for a type of disaster recovery. Consider the following scenario:

Mary creates a file in a shared folder that has been enabled for shadow copies. The file is there long enough to be captured by a scheduled shadow copy. Another user, Jim, overwrites the original file. Mary accesses the file and realizes her changes are gone. She can simply click the file and then select View Previous Versions under File and Folder Tasks in Windows Explorer. This opens a dialog box that displays a list of the shadow copies where she can choose to view, copy, or restore her original file. Alternatively, she could select the folder (not the file), select View Previous Versions, and she would once again be given the option to view, copy, or restore (see Figure 8.4). In this case, clicking View opens a new window and displays the contents of the entire folder from the selected shadow copy. This method is particularly useful for recovering multiple files or deleted files.

Recover accidentally deleted files with shadow copies.

Figure 8.4. Recover accidentally deleted files with shadow copies.

Windows Server 2003 provides some enhancements to the Computer Management console for file share administration. One such enhancement is the new Publish tab on the shared folder properties. This enables resource administrators to publish and maintain information about their file shares in Active Directory, without giving them the Active Directory Users and Computers snap-in. The new File Share wizard has also been improved: The folder path and selection options are clearer, as are the folder caching (now simply called Offline Settings) options.

Distributed File System

Distributed file system (DFS) is a technology that provides easier access and availability for file shares. The two types of DFS are server-based and domain-based. Server-based DFS resides on a single server. Administrators designate a DFS root, which is just a pointer to a file share, and underneath the DFS root administrators can create DFS links that point to other file shares. These file shares can be on the same or different servers. This enables administrators to provide a logical shared folder hierarchy regardless of the actual underlying folder structure.

Domain-based DFS has the same structure of DFS roots and links, but you can create multiple roots. Domain-based DFS also gives you the ability to provide redundant shares called replicas.

Replicas are copies of the DFS root and link on another server. By having replicas on multiple servers, clients can always access the DFS shares. For example, consider a domain called braincore.net with a DFS root (Software) that points to a file share on a server (Netserver). An additional replica is created on the server Netserver2, which provides fault tolerance for the Software share. Clients access the share via \braincore.netSoftware. The DFS client queries Active Directory and determines the replica server closest to the client. If one of the servers is down, the client is still capable of accessing the other server. The multiple DFS replicas not only provide fault tolerance for the Software share, but also potentially bring the share closer to the user. Site-aware DFS clients (Windows 2000 or better) are directed to the DFS link in their own sites.

New DFS Features

At first glance, DFS in Windows Server 2003 appears to be the same as in previous versions. However, some subtle enhancements dramatically increase its functionality. First, you can now create multiple DFS roots on a single server. Previously, although you could create multiple DFS roots in domain-based DFS, each server could host only one root. This meant that to have multiple DFS roots in a domain, you had to use different servers for each of the roots, thus increasing the number of servers required for DFS. Additionally, DFS roots can now be published in Active Directory, to make them easier for users to find. DFS links can also be made available for offline access by Windows XP clients.

You can now designate the DFS replication topology in domain-based DFS (full ring or hub and spoke). In Windows 2000, DFS replication is either automatic or manual. Manual is just that—the administrator must manually keep the replicas in sync (such as by using robocopy or xcopy). With automatic replication, one server (by default the first one) is designated as the master and all other replicas synchronize with the master. With Windows Server 2003, the administrator can designate the DFS replication topology. Four choices are available:

  • Ring—. One replica replicates with another and so on in a chain until the last one replicates back with the first.

  • Hub and Spoke—. Similar to Windows 2000 in that there is a central server with which everyone replicates.

  • Full Mesh—. Everyone replicates with everyone else.

  • Custom—. The administrator can choose who replicates with whom. This provides much more flexibility in the traffic between replicas.

For additional flexibility, you can designate a replication schedule and designate certain files that should not be replicated (called a replication exclusion list).

When multiple replicas exist for a DFS root or link, a client has to choose one of the replicas with which to connect. The way it determines which replica to use is by looking up site information in Active Directory. In Windows 2000, if no DFS replica exists in the same site as the client, the client could choose to connect to a replica in any site. Therefore, a client could potentially attempt to connect to a replica on the other side of the world when there might be a closer replica. Windows Server 2003 includes the capability to specify costs for DFS links. This provides an alternative mechanism for determining which link to use.

Network Attached Storage and Storage Area Network Management

Further file system improvements in Windows Server 2003 include enhancements for Network Attached Storage (NAS) and Storage Area Networks (SANs). Discussions about NAS and SANs can sometimes be confusing because they are two similar acronyms for similar technologies.

Too Many Acronyms

You'd think with all the letters in the alphabet that the information technology industry could come up with unique acronyms. However, to add to the confusion, both NAS and SAN are acronyms for two unrelated technologies—Network Access Server (NAS) and System Area Network (SAN). This section discusses the differences between these four technologies and then looks at the enhancements in Windows Server 2003 for Network Attached Storage and Storage Area Networks in Windows.

NAS: Network Attached Storage Versus Network Access Server

Network Attached Storage is a storage device that provides file share access across the network. It is essentially a file server in a box. There is even a class of NAS devices called filers, which are file server appliances. You simply plug them into the network and access the storage device via network shares as if it was a file server. Clients and servers can directly access the data stored on a NAS device across the same network. NAS devices can be used to expand storage capacity of existing file servers. The file servers map file shares to the NAS storage device. The clients connect to a share on the file server, which redirects to the NAS storage device.

Network Access Server is a method of providing authentication for access to remote networks. Generally, NAS servers are used by ISPs to provide authentication for Internet access. Network Access Servers have nothing to do with Network Attached Storage other than sharing an acronym.

SAN: Storage Area Network Versus System Area Network

Storage Area Network is a technology for connecting multiple servers and storage devices (hard drives) over a network. Generally, it consists of one or more hard drive enclosures accessed via fibre channel or Small Computer System Interface (SCSI) with partitions carved out for one or more servers, with no sharing of data between servers. To the server operating system it appears as a hard drive. Storage Area Networks are an extension of traditional high-speed direct attached storage devices, but it allows more flexibility in that it can be expanded more easily or repartitioned to more efficiently use the available storage.

A System Area Network, on the other hand, is a special technology for providing high-speed network connectivity between systems. In Windows 2000 and Windows Server 2003, Datacenter Edition, System Area Networks can be used to connect data center servers to each other using special System Area Network adapters and reliable high-speed Gigabit fibre channel connections. Additionally, System Area Networks use Winsock Direct, which provides Winsock applications direct access to the System Area Network devices without having to go through the TCP/IP protocol layer. This reduces network overhead and provides high-speed connections between servers.

Windows Server 2003 Improvements for NAS and SAN

Windows Server 2003 provides improvements to all these technologies. In this section we will touch on the improvements for Storage Area Networks and Network Attached Storage.

Storage Area Network Improvements

Windows Server 2003 supports “multipath failover” when connected to a SAN, which enables redundant paths from the host server.” What does this mean? It means you can have multiple physical connections between the server and the storage array. If a given path (connection) fails, it dynamically uses the remaining path(s), thus providing fault tolerance for the connection between the server and SAN devices.

Windows Server 2003 also provides built-in APIs, called Virtual Disk Services (VDS), for managing SAN devices. Previously, SAN vendors had their own set of APIs for manipulating their SAN devices. So, to add more storage devices or to repartition the SAN, you had to use special applications provided by the SAN vendor. With Windows Server 2003, each vendor provides a VDS provider that translates the Windows 2003 APIs to the vendor-specific APIs. VDS is an abstraction layer, which makes developing storage management applications for SANs easier because you no longer have to worry about the vendor-specific details. Therefore, SANs can be managed through the Disk Management console or command-line utilities, such as diskpart, just like any other disk.

For example, you can connect your SAN storage arrays as if they were regular disks. You can create volumes or partitions and assign them drive letters, or not—just like local disks.

Network Attached Storage Improvements

Windows Server 2003 natively supports connecting to NAS devices. This support isn't immediately obvious because connecting to a NAS is implemented by simply mapping a file share, just like Windows 2000. With the native support—unlike Windows 2000—you don't necessarily need any vendor-specific applications to connect to the NAS device. The Configure Your Server Wizard can be used to install a Web-based console for configuring NAS devices. Additionally, Microsoft uses the Windows Server 2003 server operating system as the foundation for its Windows-powered NAS devices, which will be available from a number of vendors.

Encrypting File System

Encrypting File System (EFS), a feature of the NTFS file system first introduced in Windows 2000, enables increased security of files by encrypting them so only those with the correct encryption key are able to view them. Encryption is the process of scrambling something (in this case a file) in a particular way such that you are the only one who can unscramble it. The two types of encryption are symmetric key, in which the same key is used to encrypt and decrypt, and asymmetric key, in which one key (a public key) is used to encrypt and a different key (the private key) is used to decrypt.

EFS Implementation

EFS uses a combination of both types of encryption. Each file has its own unique encryption key that is used for encrypting and decrypting the file (symmetric). Additionally, each user has her own public/private key pair that is used to encrypt/decrypt the file encryption key. The following is what happens when a user encrypts a file:

  • The operating system encrypts the file using the file's unique encryption key.

  • The file's encryption key is then itself encrypted using the user's public key and is stored in the data definition field (DDF) of the file.

  • The file encryption key is also encrypted with the public key of a recovery agent (by default the administrator) and stored in the data recovery field (DRF) of the file. This provides the ability to decrypt the file in case the user loses her private key.

This process ensures that the data is secure because only the private key of the user (or the recovery agent) can decrypt the key used to encrypt the file. The problem with this implementation is that it prevents the sharing of encrypted files—even to trusted personnel. In Windows Server 2003 (and Windows XP), the encryption model used by EFS has been expanded to allow the user to designate one or more authorized users. The user can add additional users' public keys to encrypt the file encryption key, thus enabling multiple users to be able to decrypt the file.

Storing Encrypted Files Remotely

Going along with the concept of making encrypted files more available, Windows Server 2003 supports storage of encrypted files on remote servers without having the user's digital certificate installed on the server. Several requirements exist for this to work. First, only Windows XP and Windows Server 2003 support this feature. Additionally, both the client and the server must be in the same Windows 2003 forest. After the domain is in Windows 2003 native mode (meaning there are no more Windows 2000 or Windows NT 4 domain controllers), a new delegation tab is available for computer accounts in Active Directory Users and Computers. Selecting Trust This Computer for Delegation to Any Service (Kerberos Only) allows the computer to support encrypted files remotely. This option enables the computer to impersonate the user. Therefore, the computer account then has access to the user's private key and is capable of encrypting and decrypting the user's files.

Additional improvements to EFS include the ability to use stronger encryption algorithms (DESX in Windows 2000 versus DESX or 3DES in Windows Server 2003) and the capability to encrypt offline files.

WebDAV and Remote Sharing

Another benefit for file sharing in Windows Server 2003 is an extension to WebDAV. The new WebDAV redirector allows file sharing using normal HTTP, which in turn enables access to network shares across the Internet through firewalls and proxy servers. This new feature is implemented as the Web Sharing tab on the properties of the folder to be shared. Simply select the Web site and click Share This Folder, as shown in Figure 8.5. (IIS has to be installed first.)

  • For more information on IIS 6, see Chapter 7, “Internet Information Services,” p. 101.

Enabling remote file sharing by creating a virtual directory that is accessible via WebDAV.

Figure 8.5. Enabling remote file sharing by creating a virtual directory that is accessible via WebDAV.

Next, give the Web share a name—the Alias—and designate the permissions (read, write, script source access, directory browsing, scripts, and scripts and executables). Doing so creates a new application (a virtual directory enabled as an application) in the specified Web site. Windows XP clients can then map a drive to this WebDAV-enabled virtual directory, which makes the file share available to any application without requiring anything special.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.185.155