Windows Server 2008 or Long Horn has behind it the long experience acquired by Microsoft in Windows Server operating systems and includes many new features and technological improvements. This help increases safety, productivity, scalability and significantly reduce the burden of the administrator in the development of their normal duties.
Compared to the previous Microsoft Windows 2003 operating system, LongHorn offers improvements, new features, and functionality. The 2008 version includes the Server Manager, Bit Locker Drive Encryption, Application Server Role, a new Windows Firewall with Advanced Security, NAP (Network Access Protection), Terminal Services Gateway, Terminal Services RemoteApp, Server Core, PowerShell, Backup, homogenizing applications and many others.
For the correct configuration of the Network Infrastructure of the Windows Server 2008 it is necessary to follow at least thirteen steps:
1. Enable Local Access Network: The user must activate the ability of the computer to accept local access network with the acceptation of sharing files, folders, and printers with the work group.
2. Add static routes: The user must configure the router with a fixed value of Internet Protocols and Domain Name Systems. The values must meet the specifications of other local networks and the internet service provider.
3. Configure Routing Information Protocol: The configuration must use the vector distance, ensuring the data to follow the shortest distance between one terminal and another.
4. Configure Demand Dial Routing: The routing will work only when a network connection it is necessary. The user must introduce the frequency and quantity of data.
5. Configure Auto-Static Routing: The automatic configuration will act when the client shut off the manual demand routing (Cisco, 2014).
6. Configure Network Address Translation: The user must assign an IP and DNS value that for the information exchange between two or more routers and switch in the network.
7. Configure a Remote Access Server: The user configures the number of clients that are allowed to enter the network.
8. Reconfigure a server to Remote Access Server: The server must have a name that is different to all the clients of the work group.
9. Configure a Virtual Private Network: The user must indicate the security level and the privileges of the clients in the network.
10. Configure Virtual Private Network ports: The port is a four digit number that combines with the Internet Protocol and the Domain Name System.
11. Create a Network Access Policy. The policy appoints the lecture and edition rights of all the members of the network.
12. Configure Remote Authentication Dial-In User Service. The user must configure the username and password.
13. Enforce Windows NT Lan Manager: The user must guarantee the interoperability between the Windows Server 2008 and the installed base of servers that works with Windows 95, 98 and 98 SE (Microsoft, 2013) (Techtarget, 2015).
Reference List
Cisco. (2014). Why is EIGRP automatically redistributing a static route? Retrieved from Cisco: https://supportforums.cisco.com/discussion/10818106/why-eigrp-automatically-redistributing-static-route
Microsoft. (2013). How to enable NTLM 2 authentication. Retrieved from Microsoft: https://support.microsoft.com/en-us/kb/239869
Techtarget. (2015). Virtual Private Network (VPN). Retrieved from Techtarget: http://searchenterprisewan.techtarget.com/definition/virtual-private-network