Advanced File Services Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
5 hours 18 minutes
Difficulty
Intermediate
CEU/CPE
20
Video Transcription
00:04
NCSU. We deserve a 2012 exam for 12. Configure an advanced Windows server
00:10
2012 Service's module two mile due to we're gonna talk about implementing advanced file service is
00:18
unless and warned, we're gonna talk about configure a nice cars the Internet stomachs Internets causes storage
00:26
is a lesson to you. Wanna talk about configured in branch cash?
00:31
There we are. The lab Come for guys cause its target on configuring brain cash clients, settings Unless you want conflict, guys causes storage.
00:42
Okay,
00:43
I go where? The story is very important
00:46
to most organizations today.
00:48
One of the great concern is connection between the storage on the remote
00:53
between the storage between the clients.
00:56
Storage on the remote disc
00:59
ice caused the story you in December 2012. It's cost effective
01:04
that allow you to create connection between the server and storage.
01:08
Um,
01:11
forced to be able to properly Lana by ice, causing most room.
01:15
We must be friendly with ice cosy architecture and components.
01:21
You have to also be a familiar with tools that provided
01:25
the Windows server to implement ice cause it based storage.
01:32
What is ice cosy
01:34
Ice cores Your internist causes his protocol
01:38
that support access to remove its scars. EBay storage devices over TCP Happy Network.
01:47
So this ice caused the protocol arc and carry Scotty commands over I p Networks.
01:53
You can use it to facilitate data transfer over the Internet,
01:59
Internet on to manage storage over long distances.
02:05
So I suppose it can be used to transfer data over your land, local area network or by your wine. Why they were network on over the Internet.
02:15
There's a good news of ice cosy. This reason wise, a little bit cost it cost effective. It relies on your Internet network architecture.
02:23
Ah, most organized. A shar is out the Ethernet network architecture. Anyway, that's just empty you're using. You don't need any specialized hardware such as H B A or specialized network devices. You don't need them.
02:37
Then we were gonna look at ice cosy.
02:40
I scored the component of ice causes. Next. What are the components of ice? Kasey,
02:46
you have I P Network. He provides I performance of redundancy.
02:53
We have ice cozy target.
02:58
It's one of storage devices.
03:00
I'm provide access to the disk
03:04
ice cores initiator most.
03:07
This also adapted on the server or or software component I provide. I access
03:14
toe ice, cozy our tests,
03:16
then be happy i Q n
03:20
I be I Q and his global unique Identify. Used to address initiators on target on ice causing networks.
03:28
Ice cozy Tag IT server.
03:30
This is available as a roll service in Windows Server 2012.
03:37
High scores. His target server can be used to create ice cores, the Target
03:42
and Scott Z V Disc
03:44
Virtual disc.
03:46
You're several manager can be used to manage I scores the target on Virtual disc
03:53
in December 2012. Also provide additional features such as lab environment to test software.
04:00
Okay, bye. Uses ice cosy. Allow you to test software the lab environment.
04:06
Also the network this less boot Also
04:11
ice cause initiator,
04:13
this is a star By devote for the fall since Windows Server
04:15
2008 on Vester,
04:18
you can use to connect your computer to a nice cosy target.
04:23
All you have to do started Microsoft vice our skulls initiator service. Then come figure it
04:30
if you're on the window. Several 2012 you have new futures such as
04:34
such as a tent occassion using Chapo are a neighbor. Reverse chap ice coz he also give you my availability.
04:45
What does that mean? You have to create more than one connection to your scores. This story to provide redundancy. Kiss one line goes down.
04:54
We have two technologies we can use for I availability. One of them is the M C s
05:00
on the m p i o.
05:05
You feel there are call outstanding ice cores It commands are reassigned to another connection automatically If it using M C s
05:15
so automatically
05:17
the connections are be routed
05:20
so another connection automatically
05:25
using M C s
05:28
N p i O.
05:30
If you have multiple network interface cards,
05:32
your ice cores initiators and stop target server, you can use M p I O
05:39
to provide for tolerance,
05:42
Philo, fault, tolerance in case of network failure.
05:46
Let's look our security options. We have a nice cozy.
05:49
For example, we are nice cozy provide access to historic device of a T c p I. P.
05:55
Because of that is, um is a high target for militias attacks all Hakkas.
06:01
Okay, they like your target
06:03
that well, you must have some of security to protect your data.
06:09
Well, to protect, use an I P sec encryption.
06:13
Hi, P circle. Happy security. I'd be sick.
06:15
Gives you a 10 tiki or 10 to city
06:18
confidentiality. Integrity
06:21
on encryption.
06:24
Your days and krypton if you use I p sick. Also, you can use I p sec authentication.
06:30
I placed a call to indication. Includes capers. Capers
06:34
includes, um
06:36
certificates. Appreciate key.
06:40
You can also use chap authentication.
06:43
No, it was Chappell is challenge on shake authentication protocol.
06:48
When you are using chopper, you wanna access a resource? Resource it JJ, it's sense you challenge Question
06:56
those challenge question. If you answer them correctly, you be given access.
07:00
Are the security option We have a nice causes. Disable are needed on necessary Service is your service is you don't need disabled them.
07:12
Nothing. You can also do secure your management console console used to manage ice cause you make sure you secure it.
07:20
You can also segregate ice causes Sanchar No,
07:25
you can have multiple china and also segregate them
Up Next
Microsoft Certified Solutions Associate (MCSA) Certification

Our self-paced online Microsoft Certified Solutions Associate (MCSA) certification training course will teach you all you need to know for the certification exam: how to configure file and print services, how to deploy, manage and maintain Microsoft servers, and other relevant topics.

Instructed By