Microsoft Solutions For Small & Medium Business: Medium IT Solution Series Medium Business Solution For Core Infrastructure
Microsoft Solutions For Small & Medium Business: Medium IT Solution Series Medium Business Solution For Core Infrastructure
Appendix I
Version 1.0
Abstract
This document provides recommendations and steps for performing tasks that are common to
chapters in this solution and other solutions and guides in the Medium IT Solution Series. It also
provides additional information and guidance that helps IT generalists better understand the solutions
or implement additional features.
Information in this document, including URL and other Internet Web site
references, is subject to change without notice. The entire risk of the use or
the results of the use of this document remains with the user.
Unless otherwise noted, the example companies, organizations, products,
domain names, email addresses, logos, people, places and events depicted
herein are fictitious, and no association with any real company, organization,
product, domain name, email address, logo, person, place or event is intended
or should be inferred.
Complying with all applicable copyright laws is the responsibility of the user.
Without limiting the rights under copyright, no part of this document may be
reproduced, stored in or introduced into a retrieval system, or transmitted in
any form or by any means (electronic, mechanical, photocopying, recording,
or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or
other intellectual property rights covering subject matter in this document.
Except as expressly provided in any written license agreement from Microsoft,
the furnishing of this document does not give you any license to these patents,
trademarks, copyrights, or other intellectual property.
© 2005 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Windows, and Windows XP are either registered
trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries.
The names of actual companies and products mentioned herein may be the
trademarks of their respective owners.
Microsoft Corporation • One Microsoft Way • Redmond, WA 98052-6399 •
USA 00
Table of Contents
GUIDELINES FOR CHOOSING DIRECT-ATTACHED STORAGE....................................................1
WINDOWS SERVER 2003 LICENSING MODES....................................................................................2
INITIAL SERVER CONFIGURATION......................................................................................................3
GATHERING INFORMATION FOR INITIAL CONFIGURATION............................................................................3
CREATING DHCP RESERVATIONS..................................................................................................................4
CONFIGURING THE HARDWARE.....................................................................................................................5
CONFIGURING THE OPERATING SYSTEM.......................................................................................................6
ADDING COMPUTERS TO THE ACTIVE DIRECTORY DOMAIN........................................................................7
PRODUCT ACTIVATION..................................................................................................................................7
SECURING THE WIRELESS NETWORK INFRASTRUCTURE.........................................................9
SETTING UP THE SERVER..............................................................................................................................9
Setting Up Internet Authentication Server Components..........................................................................9
Creating an Active Directory Group for Mobile Users and Computers................................................10
Configuring Wireless Internet Authentication Service Policy................................................................10
Adding RADIUS Clients to the Internet Authentication Service............................................................11
Modifying the Wireless Access Policy Profile Settings..........................................................................12
Creating Group Policy Objects (GPOs) for Wireless Properties on the Client Computer....................12
SETTING UP THE WIRELESS ACCESS POINT................................................................................................13
SETTING UP WIRELESS CLIENT COMPUTERS..............................................................................................14
Software Restriction Policies.........................................................................................................................15
Guidelines for Choosing Direct-
attached Storage
In the medium IT environment, planning for the right direct-attached storage (DAS)
configuration for servers typically involves choosing the following:
Redundant array of independent disks (RAID) configuration: This involves
deciding on the number of arrays required as well as deciding on the following for
each array:
The RAID level to use.
The number of disks to use.
The capacity of the array required.
Type of RAID controller: This involves choosing between hardware and software
RAID controllers.
Use the following guidelines while choosing DAS storage for servers:
RAID configuration: The right RAID configuration depends on the storage
considerations of each server. However, DAS storage attached to any server should
at least be configured in a RAID 1 array with two disks. Additional RAID arrays can
be added to this configuration as necessary based on the considerations.
Type of hard disk: It is recommended to use SCSI disks on all servers in the medium
IT environment. The appropriate disk speed may be chosen based on the
considerations.
Type of RAID controller: It is recommended to use hardware RAID controllers on
all servers in the medium IT environment.
This solution recommends using the Per User or the Per Device mode licensing. Because
client computers in the medium IT environment consume services from a number of
different servers in the environment on a regular basis, this is the most economical choice.
Some manufacturers label the MAC address on the chassis, next to the network
adapter interface. If not found there, you might need to complete the operating
system installation and use the ipconfig /all command to get the MAC address.
Once the MAC address has been obtained, create the DHCP reservation on both
core infrastructure servers. For steps on creating DHCP reservations, refer to the
“Creating DHCP Reservations” section in this appendix.
Default gateway: The default gateway is set to the private IP address of the firewall.
This solution recommends using 10.0.0.1 as the private IP address of the firewall,
therefore 10.0.0.1 will be the default gateway. If you have a different default gateway
in your environment, use the appropriate address.
Subnet mask: This solution recommends a flat network and therefore, the subnet
mask will be the same on all computers. It is recommended to use the 255.255.0.0
subnet mask.
Server name: The recommendations for server names are provided in Chapter 1,
“Core Infrastructure Design Overview,” of this solution. You may also refer to the
“Configuring the Hardware and Operating System” section in the chapter or guide
that provides guidance on configuring the server for the recommended server name.
Location of service packs: Get the location of any service packs or critical updates
that should already have been downloaded as per the guidance provided in Chapter
1, “Core Infrastructure Design Overview,” of this solution. If not already
downloaded, the service packs for the Windows Server 2003 operating system can be
downloaded from the following URL:
http://www.microsoft.com/windowsserver2003/default.mspx
For documentation on downloading any available critical updates from the Windows
Catalog, refer to the following URL: http://support.microsoft.com/default.aspx?
scid=kb;[LN];323166
Note: You should only download updates and service packs using a computer that is
securely connected to the Internet. You should use a computer that is on a separate
network than the core servers and is connected to the Internet securely.
Use the MAC address of the server and corresponding IP address (from the IP addressing
scheme recommended in Chapter 3, “Network and Directory Services,” of this solution),
gathered earlier, and perform the following steps on both the DHCP servers (SMBDC and
SMBEX).
1. Open the DHCP Microsoft Management Console (MMC) snap-in located in the
Administrative Tools.
2. Expand the DHCP scope.
3. Right-click Reservations and then click New Reservation.
4. On the New Reservation page, provide appropriate information in the text boxes. As
an example, the following information was used while configuring the collaboration
server (SMBEXTNT).
Reservation name: SMBEXTNT.BusinessName.com
IP address: 10.0.0.4
MAC address: 000802455ea0
Description: Collaboration Server
Choose Per User or Per Device mode licensing rather than per server mode. For
information, refer to the “Windows Server 2003 Licensing Modes” section in this
Appendix.
Complete IP configuration of the server using the IP addressing information
gathered in the "Gathering Information for Initial Configuration" section earlier
in this Appendix.
Configure the name of both the infrastructure servers. The names of the servers
were gathered in the “Gathering Information for Initial Configuration” section
earlier in this Appendix.
2. Install antivirus software, including the latest virus pattern file on both the servers.
For more information about antivirus software, refer to the Medium Business Guide for
Antivirus.
Note: After the operating system is installed, Internet Explorer will be available to users. By
default, however, Windows Server 2003 installs the Internet Explorer Enhanced Security
Configuration component, which severely restricts the use of Internet Explorer. This default
configuration should not be changed. It is a security best practice that server logins be used
only for server administration or management and not for other purposes like mail or
Internet browsing. As a result of the enhanced security configuration, many Web sites
visited from a server will not be accessible, or will not work or display correctly. When
testing an internal Web site, configured in the medium IT environment, or an external Web
site, do not complete this testing from the server itself.
Perform the following steps to join the computer into the Active Directory domain:
1. Right-click My Computer and click Properties.
2. Click the Computer Name tab and then click the Change… button.
3. Click Domain under Member of, and type your domain name (for example,
BusinessName.com).
4. When prompted, provide the user name and password of the domain administrator.
5. Click OK on the Computer Name Changes popup screen.
6. Complete the setup and restart the computer.
Note: There is also an option to join a computer to the domain when installing the operating
system. These steps can be skipped if the computer was already joined to the domain
during installation of the operating system.
Product Activation
After the Windows Server 2003 installation, you will have to activate the Windows
Server 2003, unless you are using volume licensing or your operating system is pre-installed
and pre-activated by your hardware manufacturer. Product activation is quick, simple, and
unobtrusive, and it protects your privacy. It is designed to reduce software piracy of
Microsoft® products. The servers run for a grace period that is stated in your End-User
After you have created the group, wireless users need to be added to the Mobile Users group
to be able to connect to the wireless network.
Perform the following steps to grant wireless network access permission to computers (by
adding their computer accounts to the Mobile Users group):
1. Open the Mobile Users group.
2. Select the Members tab.
3. Click Add, click Object Types, and select the Computers check box.
4. Add to the computers that need to be granted wireless access to the Mobile Users
group.
Perform the following steps to grant wireless network access permission to users (by adding
their user accounts to the Mobile Users group):
1. Open the Mobile Users group.
2. Select the Members tab.
3. Click Add, click Object Types, and select the Users check box.
4. Add the users that need to be granted wireless access to the Mobile Users group.
Perform the following steps using the Internet Authentication Service (IAS) management
console on the primary infrastructure server in the Administrative Tools menu.
1. Right-click the Remote Access Policies folder and click the New Remote Access
Policy option.
2. Name the policy Allow Wireless Access and select the option Use the wizard to set
up a typical policy for a common scenario.
3. Select Wireless as the access method.
4. Grant access, based on the group and add the Mobile Users security group to the list
of groups that have wireless access rights.
5. Select Protected EAP (PEAP) for the EAP type.
6. Select Configure and verify that the certificate issued is set to
core1servername.BusinessName.com, click OK, and click Next.
7. Click the Finish button and exit the wizard.
8. Double-click the wireless access policy just created, click Edit Profile, click the
Authentication tab, and select Microsoft Encrypted Authentication version 2 (MS-
CHAP v2), and click OK.
9. Accept any warning messages that may appear.
Note: The Allow Wireless Access policy created during the installation of IAS can
coexist with other remote access policies. However, ensure that other remote
access policies are listed below the Allow Wireless Access policy list in the
Remote Access Policies folder. Policies at the top of the policy list override
settings configured on lower priority policies. Use the arrows next to the list to move
the Allow Wireless Access policy to the top of the list.
Note: Most wireless access points do not require vendor-specific attributes (VSA). However,
some RADIUS clients may require configuring VSA to function correctly. For more information
on VSA requirements, refer to your vendor-specific documentation.
5. Close the dialog boxes and exit from the Internet Authentication Service (IAS)
management console.
9. Click the IEEE 802.1x tab, and change the EAP type to “Protected EAP (PEAP)”.
10. Click the Settings button for EAP type. Under Trusted Root Certificate Authorities,
select the root CA for the IAS server certificates (which was configured as
BusinessNameCA in Chapter 3, “Network and Directory Services,” of this solution).
11. Click Ok on all of the dialog boxes and close Group Policy Object Editor.
Link the wireless GPO to the OU that will contain computers that will need to access
the wireless network. For more information on OU design and GPOs, refer to the
Medium Business Solution for Management and Security using Active Directory Group
Policy.
In scenarios where multiple wireless access points are used, each wireless access point needs
to be configured with the same settings. Ensure that the SSIDs are the same, but the channels
are different for each wireless access point.
For documentation on using Group Policy, refer to the "Windows Server 2003 Group Policy
Technology Center" at the following URL:
http://www.microsoft.com/windowsserver2003/technologies/management/grouppolicy
/default.mspx
For more information, refer to the Using Software Restriction Policies to Protect Against
Unauthorized Software page at the following URL:
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/rstrplcy.mspx