Skills measured by exam 70-088 |
Course 836 |
Course 1503 |
Course 1603 |
Planning |
Choose a secure access strategy for various situations. Access includes outbound access by users to the Internet and inbound access to your Web site. Considerations include:
- Translating addresses from the internal network to the Local Address Table (LAT)
- Controlling anonymous access
- Controlling access by known users and groups
- Setting protocol permissions
- Auditing protocol access
- Setting Microsoft Windows NT® security parameters
|
• |
• |
• |
Plan an Internet site or an intranet site for stand-alone servers, single-domain environments, and multiple-domain environments. Tasks include:
- Choosing appropriate connectivity methods
- Choosing services
- Using Microsoft Proxy Server in an intranet that has no access to the Internet
- Choosing hardware
|
• |
• |
• |
Choose a strategy to balance Internet access across multiple Proxy Server computers. Strategies include:
- Using DNS
- Using arrays
- Using Cache Array Routing Protocol (CARP)
|
• |
• |
• |
Choose a rollout plan for integrating a Proxy Server with an existing corporate environment. |
• |
• |
• |
Choose a fault tolerance strategy. Strategies include:
- Using arrays
- Using routing
|
• |
• |
• |
Installation and Configuration |
Create a LAT. |
• |
• |
• |
Configure server authentication. Authentication options include:
- Anonymous logon
- Basic authentication
- Microsoft Windows NT Challenge/Response authentication
|
• |
• |
• |
Configure Windows NT to support Microsoft Proxy Server. |
• |
• |
• |
Configure the various Proxy Server services. |
• |
• |
• |
Configure Microsoft Proxy Server for Internet access. Situations include:
- Configuring Proxy Server to provide Internet access through a dial-up connection to an ISP.
- Configuring Proxy Server to act as an IPX gateway.
- Configuring multiple Microsoft Proxy Servers for Internet access.
- Configuring multiple Proxy Servers spread across several different geographic locations.
|
• |
• |
• |
Select and use software configuration management tools (for example, Control Panel, Windows NT Setup, Regedt32). |
• |
• |
• |
Configure auditing. |
• |
• |
• |
Given a scenario, decide which user interface to use to perform administrative tasks. |
• |
• |
• |
Identify the licensing requirements for a given Proxy Server site. |
|
• |
• |
Configure Proxy Server arrays. |
• |
• |
• |
Configure arrays to provide fault-tolerance for Web Proxy client requests. |
• |
• |
• |
Use packet filtering to prevent unauthorized access. Tasks include:
- Using packet filtering to enable a specific protocol.
- Configuring packet filter alerting and logging.
|
• |
• |
• |
Configure hierarchical caching. |
• |
• |
• |
Setting Up and Managing Resource Access |
Grant or restrict access to the Internet for selected outbound users and groups who use the various Proxy Server services to access the Internet. |
• |
• |
• |
Grant or restrict access to specific Internet sites for outbound users. |
• |
• |
• |
Choose the location, size, and type of caching for the Web Proxy service. |
• |
• |
• |
Configure active caching and passive caching. |
• |
• |
• |
Implement Web publishing to enable reverse proxying. |
• |
• |
• |
Back up and restore Proxy Server configurations. |
• |
• |
• |
Implement reverse hosting. |
• |
• |
• |
Integration and Interoperability |
Use the Proxy Server client Setup program to configure client computers. |
• |
• |
• |
Configure Proxy Server and Proxy Server client computers to use the Proxy Server services. Configurations include:
- Microsoft Internet Explorer client computers
- Netscape Navigator client computers
- Macintosh® client computers
- UNIX client computers
- Client computers on an IPX-only network
|
¤ |
• |
• |
Configure a RAS server to route Internet requests. |
• |
• |
• |
Write JavaScript to configure a Web browser. |
|
• |
• |
Change settings in Mspclnt.ini. |
• |
• |
• |
Monitoring and Optimization |
Configure Proxy Server to log errors when they occur. |
• |
• |
• |
Monitor performance of various functions by using Microsoft Windows NT Performance Monitor. Functions include HTTP and FTP sessions. |
• |
• |
• |
Analyze performance issues. Performance issues include:
- Identifying bottlenecks
- Identifying network-related performance issues
- Identifying disk-related performance issues
- Identifying CPU-related performance issues
- Identifying memory-related performance issues
|
• |
• |
• |
Optimize performance for various purposes. Purposes include:
- Increasing throughput
- Optimizing routing
|
• |
• |
• |
Use Performance Monitor logs to identify the appropriate configuration. |
¤ |
• |
• |
Perform Internet traffic analysis by using Windows NT Server tools. |
• |
• |
• |
Monitor current sessions. |
• |
• |
• |
Troubleshooting |
Resolve Proxy Server and Proxy Server client installation problems. |
• |
• |
• |
Resolve Proxy Server and Proxy Server client access problems. |
• |
• |
• |
Resolve Proxy Server client computer problems. |
• |
• |
• |
Resolve security problems. |
• |
• |
• |
Resolve caching problems. |
• |
• |
• |
Troubleshoot a WINS server to provide client access to Proxy Servers. |
¤ |
• |
• |
Troubleshoot hardware-related problems such as network interfaces and disk drives. |
• |
• |
• |
Troubleshoot Internet/intranet routing hardware and software. Software includes Microsoft Routing and Remote Access Service (RRAS). |
• |
• |
• |