Space


Server Administration

Server Administration Overview
Using Internet Service Manager
Putting Users in Windows NT Groups
Network Configuration
LAT Configuration
Dial-Up Support
Other Server Configuration Issues


To TopServer Administration Overview

Microsoft Proxy Server can be administered by using administrative tools provided with the product. It also interacts closely with Internet Information Server (IIS) and Windows NT Server settings. Together, using the tools provided with each of these Microsoft server products, you can develop an appropriate administrative configuration for Microsoft Proxy Server on your private network.

This chapter covers the following topics, which discuss how to administer Microsoft Proxy Server, as well as further considerations for administering the server to operate appropriately with other services on your network.


To TopUsing Internet Service Manager

Use Internet Service Manager, provided with Microsoft Internet Information Server, to administer the Microsoft Proxy Server services.

To configure Microsoft Proxy Server services with Internet Service Manager

  1. Click Start, select Programs, select Microsoft Proxy Server, and click Internet Service Manager.

    The Microsoft Internet Service Manager window is displayed. All installed Internet services for the current server are listed.

  2. If you will be managing a remote server, connect to that server.

    • To connect to a specific server, from the Properties menu click Connect to Server and complete the Connect to Server dialog box that appears.

    • To connect to all Microsoft Proxy Servers on your network, from the Properties menu click Find All Servers.

      Note   The WinSock Proxy service on other server computers is not detected when Find All Servers is used. To connect to WinSock Proxy service for different computers, use Connect to Server and specify the server name for connection.

  3. To administer a server’s Internet service, double-click the computer name next to the service name.

    • To administer a server’s Web Proxy service, double-click the computer name next to that service.
    • To administer a server’s WinSock Proxy service, double-click the computer name next to that service.

    The Service Properties window for the selected service appears.

  4. Use the Service Properties window to configure the service.

    For more information about administering the Microsoft Proxy Server services, see “Configuring the Web Proxy Service,” and “Configuring the WinSock Proxy Service.”


To TopPutting Users in Windows NT Groups

Considerations For Planning Windows NT Groups
Creating New Groups For Proxy Users
Assigning Groups to Service Permissions

To TopConsiderations For Planning Windows NT Groups

The Microsoft Proxy Server allows several possibilities for assigning permission rights for users to the Web Proxy and WinSock Proxy services. These permissions can be configured or enabled by using the Internet Service Manager.

For each of the service options that allow user permissions to be assigned, it is recommended that you create and use groups of users to simplify management of permissions for each user. You can use User Manager for Domains to create groups, which can be local groups on the server, or groups on the domain.

By separating your users into groups, you can simplify the process of modifying, adding, and removing user permissions Microsoft Proxy Server as your network service needs change.

The following are some guidelines for how to simplify managing user permissions for Microsoft Proxy Server by creating new local groups for this purpose.

To TopCreating New Groups For Proxy Users

To administer users and groups by using User Manager for Domains

  1. From the desktop, click Start, select Programs, and then select Administrative Tools (Common).

  2. Click User Manager for Domains.

  3. Connect to the domain or server to be administered.

    From the User menu choose Select Domain and complete the Select Domain dialog box that appears.

  4. As necessary add users and groups, and add users to groups.

For instructions see the online Help for User Manager for Domains. Also see your documentation for Windows NT.

For further examples of how to use groups effectively to restrict access permissions on your internal network using groups, see “Security.”

To TopAssigning Groups to Service Permissions

Once groups have been created, you can use Internet Service Manager to assign appropriate service permissions to each of the new groups.

To assign permissions for Web Proxy or WinSock Proxy services

  1. From Internet Service Manager, double-click the computer name next to the Web Proxy or WinSock Proxy service.
  2. The Service Properties window for that service is displayed.
  3. Click the Permissions tab.
  4. Select a protocol, and grant or revoke permissions for groups or users to use that protocol.

    For more information about administering service permissions, see “Configuring the Web Proxy Service,” and “Configuring the WinSock Proxy Service.”


To TopNetwork Configuration

Setting up Network Adapter Cards
Using TCP/IP Ports
Using DNS, WINS, and DHCP with Microsoft Proxy Server
Using Multiple Microsoft Proxy Server Gateways
More About DNS, WINS, and DHCP

To TopSetting up Network Adapter Cards

Setup Considerations When Using Two Adapters
Configuring the External Network Adapter Card
Configuring the Internal Network Adapter Card
Setup Considerations When Using a Single Adapter

The following section outlines some considerations to be followed when installing network adapter cards for use with Microsoft Proxy Server. In most installations, two network adapter cards will need to be installed on the server; one network adapter card for connecting to the internal private network, and the other adapter card to be used for external connection to the Internet or another external network.

In some circumstances, Microsoft Proxy Server may also be used with only a single adapter card as a way to provide limited use for caching services on a local network. When only one server adapter card is installed, gateway services are not in effect and the server can be configured similarly to other internal servers or clients on your network.

To TopSetup Considerations When Using Two Adapters

When setting up two network adapter cards for gateway operation, first install both network adapter cards in the server computer. Comply with any special manufacturer instructions for configuring the multiple network adapters for use in the same computer.

In most cases, device conflicts are possible where hardware settings are preconfigured for memory base I/O addresses or IRQ levels on each of the adapter cards. Check that base I/O and IRQ settings are set differently for each card and use settings that do not conflict with other devices that are currently installed on your system.

Make note of the configured settings used for each network adapter card as the card is installed and update these notes if changes are made while you are installing. Keeping notes can help reduce the amount of time required to troubleshoot any hardware device conflicts later.

Verify that both adapter cards are installed and configured correctly by using the Adapters property sheet in the Network application of Control Panel. Check for unique I/O base address and IRQ values for each adapter.

Tip   If the hardware description for both server adapter cards is identical, it may be confusing to keep track of which adapter you are configuring. Windows NT identifies each adapter added to the system with a leading number, such as [1] for the first adapter installed and [2] for the second adapter installed. Refer to these numbers when you are attempting to verify or change settings for a specific hardware adapter.

To TopConfiguring the External Network Adapter Card

The following considerations must be complied with when setting up the network adapter card that will be connected to the Internet.

To TopConfiguring the Internal Network Adapter Card

The following process details considerations for setting up the network adapter card that will be used to connect Microsoft Proxy Server internally to your private network.

To TopSetup Considerations When Using a Single Adapter

In some cases, the Microsoft Proxy Server can be used with a single network adapter on a private network. In this type of installation, no gateway services for Internet access are configured and the Microsoft Proxy Server is used primarily to provide a document caching service for local network users.

For configuring a Microsoft Proxy Server for a single network adapter connection to the internal network, you can use IP and DNS settings that are appropriate for servers and clients on your local TCP/IP network. There are no special considerations for TCP/IP network settings for this type of installation.

To TopUsing TCP/IP Ports

What are TCP/IP ports?
Setting WinSock Proxy Port Permissions
Advanced TCP/IP Security with Windows NT

To TopWhat are TCP/IP ports?

Ports are used in TCP/IP to name the ends of logical connections that carry long-term conversations. A port is an abstraction to allow transport protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) the capability of handling communications between multiple hosts. It allows a communication to be uniquely identified. The WinSock Proxy service uses ports extensively to provide a way of redirecting applications.

For the purpose of providing services to unknown callers, a service contact port is defined. Each WinSock Proxy-enabled application specifies a port to be used as the contact port on the server for TCP or UDP. The contact port is sometimes called the “well-known port.” To some extent, these same port assignments are used with UDP. In order to use UDP, the application must supply the IP address and port number of the destination application.

Ports are identified by a positive integer. Originally, the assigned ports available were in the range 0 – 255. Currently, the range for assigned ports has been expanded to the range allow 4-digit port numbers up to 9999. The assigned ports use a small portion of the range of possible port numbers, allowing other unassigned port numbers to be designated as alternatives if the initial port is not available or to be used for new custom server applications.

Ports can be designated to use either TCP or UDP as the transport-level protocol specifying how ports send and receive data. In addition, port assignments are enabled separately for inbound ports and outbound ports on Microsoft Proxy Server. Inbound ports are used to listen for client requests from Internet clients, and outbound ports are used to listen for requests from clients on the internal private network.

To TopSetting WinSock Proxy Port Permissions

The Microsoft Proxy Server uses application service ports for the WinSock Proxy service. In order for each Windows Sockets-based application to work through a network connection, ports are used in combination with IP addressing to form a “socketed” connection. For information on how Windows Sockets works, see Appendix D, “Architecture.”

When ports are defined for the WinSock Proxy service, port permissions can be assigned to users for each application defined on the Microsoft Proxy Server gateway. For example, VDOLive is a supported application for the WinSock Proxy service. It uses outbound TCP port 7000 and inbound UDP port 0 as its “well-known ports” for defining service on the Microsoft Proxy Server. Users can then be granted permission to use VDOLive with WinSock Proxy. Once permissions are granted by using the Permissions property sheet in WinSock Proxy Properties, users have access to those ports (both inbound and outbound) that are assigned.

If you want to enable access to inbound and outbound service ports separately for users on your network, you can create additional protocol definitions in WinSock Proxy service properties for that purpose.

For example, suppose you wanted to permit both outbound and inbound port access for FTP service to all internal users on your network, but allow only inbound FTP logon for a single Internet client user called FTPClient1.

In this example, you might use the predefined protocol, FTP, and assign all of the internal users permissions to this protocol because it enables inbound and outbound port access. Then, to allow only inbound port access for the FTPClient1 user account only, you could create a new protocol definition called “FTP (inbound only)” and define only the inbound TCP port 0 for it. The FTPClient1 account could then be assigned permissions to the “FTP (inbound only)” protocol permissions list.

For more information on how to add WinSock Proxy protocol definitions and set access permissions, see “Configuring the WinSock Proxy Service.”

To TopAdvanced TCP/IP Security with Windows NT

In addition to port-access permissions and protocol definitions created by using the Microsoft Proxy Server properties, Windows NT Server 4.0 provides additional settings for advanced TCP/IP security. This feature can be useful in instances where you want to selectively enable and disable TCP/IP ports or protocols globally for all users of that server on your network.

Some examples of cases where this feature might be useful include the following scenarios:

To enable advanced TCP/IP security with Windows NT

  1. From the desktop, click the Start button.

  2. Select Settings and click Control Panel.

  3. Double-click the Network icon.

    The Network properties window is displayed.

  4. Click the Protocols tab.

  5. Select the TCP/IP Protocol. Click Properties.

    The Microsoft TCP/IP Properties sheet is displayed.

  6. Click Advanced.

    The Advanced IP Addressing property sheet is displayed.

  7. Select the Enable Security option.

    The Configure button located beneath Enable Security is enabled.

  8. Click Configure.

    The TCP/IP Security dialog box is displayed.

  9. Select Permit Only for one of the three listed options available (TCP Ports, UDP Ports, IP Protocols).

    The Add button is enabled.

  10. Enable ports or protocols.

    • Click Add. The Security Add dialog box is displayed.
    • Enter a port or protocol number for the option you are specifying permissions for.
    • Click Add in the Security Add dialog box after entering a port or protocol number. The port or protocol number appears in the Permit Only list in the TCP/IP Security property sheet.

    Repeat this step for all ports or protocols that require enabling.

To TopUsing DNS, WINS and DHCP with Microsoft Proxy Server

Considerations for Using DNS
Considerations for Using WINS
Considerations for Using DHCP

The following section details further considerations for using the Microsoft Proxy Server with DNS, WINS, or DHCP services on your private network. For an overview of these services, see More About DNS, WINS, and DHCP, later in this chapter.

To TopConsiderations for Using DNS

Microsoft Proxy Server as a DNS Server
Microsoft Proxy Server as DNS Client

To TopMicrosoft Proxy Server as a DNS Server

When DNS services are used on the internal network, a computer running Windows NT Server and Microsoft Proxy Server can also be used as a DNS server for the internal network. The internal server adapter card must use static IP addressing (a permanent address on the local network) and no default gateway should be specified.

If you use the same server for Internet gateway access with Microsoft Proxy Server and for DNS servicing, be sure that the Windows NT DNS service and all internal hosts file information is accessible only to internal network clients. Set file system security appropriately to deny Internet users access, and disable DNS Server for the external network adapter.

For more information on configuring Windows NT Server for use as a DNS server, see your documentation for Windows NT Server.

To TopMicrosoft Proxy Server as a DNS Client

There are no special considerations for Microsoft Proxy Server as a DNS client on the internal network. This is a recommended configuration for networks already using DNS service. Also, a HOSTS file can be used as an alternative when no DNS services are available on the internal network.

For more information on configuring Windows NT Server for use as a DNS client, see your documentation for Windows NT Server.

To TopConsiderations for Using WINS

Microsoft Proxy Server as a WINS Server
Microsoft Proxy Server as a WINS Client

To TopMicrosoft Proxy Server as a WINS Server

When WINS services are used on the internal network, the computer running Microsoft Proxy Server can also be used as a WINS server. The internal server adapter card must use a permanent IP address on the local network, with no default gateway specified. To be sure that the internal WINS database information cannot be seen by Internet users, deny these users file access to WINS service and LMHOSTS files and disable all WINS services for the external network adapter.

To TopMicrosoft Proxy Server as a WINS Client

There are no special considerations for Microsoft Proxy Server as a WINS client on the internal network. This is a recommended configuration for networks already using WINS service. Also, an LMHOSTS file can be used as a WINS alternative when no WINS services are available on the internal network.

For more information on configuring Windows NT Server for use as either a WINS server or a WINS client, see your documentation for Windows NT Server.

To TopConsiderations for Using DHCP

Microsoft Proxy Server as a DHCP Server
Microsoft Proxy Server as a DHCP Client
Microsoft Proxy Server as a DHCP Relay Agent

To TopMicrosoft Proxy Server as a DHCP Server

When DHCP services are used on the internal network, the computer running Microsoft Proxy Server can be used as a DHCP server. However, The server must use a permanent address on the local network and no default gateway should be specified on the internal server adapter card. Also, be careful to enable DHCP Server for the internal network adapter only and to disable DHCP Server for the external network adapter.

To set Microsoft DHCP Server bindings for use with Microsoft Proxy Server

  1. Install and configure Microsoft DHCP Server.

    For information on installing and configuring Microsoft DHCP Server, see your documentation for Windows NT Server.

  2. From the desktop, click Start, select Settings, click Control Panel.

  3. Double-click the Network icon.

  4. Click the Bindings tab.

  5. From the Show Bindings for list box, select all services.

  6. Double-click Microsoft DHCP Server.

    The service listing expands to show protocols supported for this service.

  7. From the service view window, double-click TCP/IP Protocol.

    The service listing expands to show all adapters that are bound for this protocol and service.

  8. Select the external network adapter, click Disable, and then click OK.

To TopMicrosoft Proxy Server as a DHCP Client

It is recommended that the Microsoft Proxy Server not be enabled as a DHCP client on the internal network. Instead use static IP addressing and assign a permanent IP address for the internal network on the server adapter card. Do not specify a default gateway when assigning IP addressing for this card.

To TopMicrosoft Proxy Server as a DHCP Relay Agent

There are no special considerations for using Microsoft Proxy Server as DHCP relay agent on the private network between another DHCP server and DHCP clients. Use the Network application in Control Panel to set TCP/IP properties to enable DHCP relay. This option can be enabled by adding DHCP server addresses to the search list on the DHCP Relay property sheet.

To TopUsing Multiple Microsoft Proxy Server Gateways

Multiple Gateway Overview
Using Multiple Proxy Gateways in a DNS Environment

Using Multiple Proxy Gateways in a WINS Environment
Using Multiple WinSock Proxy Service Gateways

For an overview of the DNS, WINS, and DHCP services, see More About DNS, WINS, and DHCP, later in this chapter.

To TopMultiple Gateway Overview

A private network can have more than one Microsoft Proxy Server gateway in use. Where multiple server computers are configured for Microsoft Proxy Server, Internet traffic loads can be balanced across each separate gateway by configuring clients to use all gateways evenly. For example, if you have two Microsoft Proxy Server gateways, one named PROXY1 and the other PROXY2, you would specify either PROXY1 or PROXY2 in the proxy connection settings for each client browser and the valid port to be used (typically, port 80 is used for HTTP proxy service). Load balancing is managed in this manner when multiple proxy gateways are added.

Another option with multiple proxy gateways is to separate loads by service type across different servers. For example, you can enable HTTP proxy service for server (such as PROXY1) for a client and specify a second server (such as PROXY2) for enabling FTP proxy service.

To TopUsing Multiple Proxy Gateways in a DNS Environment

When you use multiple gateways on a private network with DNS services, you must configure at least one entry for each gateway that indicates an IP address to be searched for on the local network to provide DNS name resolution. The DNS server address specified will be used to forward all domain name requests. In some cases, you may also have a secondary DNS server address to be searched for and used if the first DNS server is not available.

Note   When working with DNS environments that are located on the Internet, it is not unusual for companies to make mutual arrangements to host each other’s DNS entries. This ensures that, if a primary DNS server becomes unavailable, there is a backup domain server for the domain. This backup domain server is listed with the domain record that is registered with the Internet Network Information Center (InterNIC). Both DNS servers are mutually configured to provide secondary DNS service to the complimentary domain.

You can also use DNS “round-robin,” a feature that offers load balancing for multiple DNS servers on a network. Round-robin involves assigning a single DNS domain name to be serviced by multiple DNS servers, each with its own IP address on the local network. The round robin configuration assures that for all DNS name lookup requests, any server assigned for round-robin can that is currently available can respond to a DNS request.

For more information about configuring Windows NT Server as a DNS server, see your documentation Windows NT Server.

To TopUsing Multiple Proxy Gateways in a WINS Environment

In a WINS environment, you use the WINS Server to configure a multi-homed environment. This is similar to the DNS environment in that you create one entry, which contains the list of IP addresses for all the Microsoft Proxy Server gateways. In a WINS environment, there are three levels of name resolution. At first the WINS Server matches a client’s request with the client’s IP address. The WINS Server seeks a Proxy Server with the same subnet as the client. The WINS Server then seeks a Microsoft Proxy Server gateway with the same net as the client. If WINS cannot match a client to a gateway in this fashion, it picks a gateway from the WINS list at random.

For more information about configuring Windows NT Server as a WINS server, see your documentation for Windows NT Server.

To TopUsing Multiple WinSock Proxy Service Gateways

WinSock Proxy clients use the WinSock Proxy service on the server they were configured to use by the client Setup program.. This information is preconfigured during Proxy Client Setup, in the Mspclnt.ini file. To balance the load across each of your Microsoft Proxy Server gateways configure the Microsoft Proxy Server client initialization files appropriately (for example, to use DNS round-robin).

For information about configuring WinSock Proxy clients and the Mspclnt.ini file, see “Setting Up Clients.”

To TopMore About DNS, WINS, and DHCP

Background on Internet Naming and Addressing
What is DNS?
What is WINS?
What is DHCP?

To TopBackground on Internet Naming and Addressing

As the Internet continues to increase grow in size and numbers, the use of TCP/IP for private internetworking increases along with it as well. The primary reason for this increase is that TCP/IP offers the benefit of a widely deployed set of open protocol standards that are well suited to forming wide area networks (WANs).

In order for each computer to identify itself on the TCP/IP network, each host must be uniquely identified by the following information:

One way to configure this address information is to have a network administrator or technician manually enter these settings on each computer before it is joined to the local network. For small networks, this does not present an overly difficult problem, but as networks become larger or further divide into multiple subnetworks, integrating new devices onto existing networks becomes a significant chore for network administrators to manage. In addition, this chore might need to be repeated each time a device is relocated to a different subnetwork.

This type of manually applied configuration is referred to as static IP addressing. It requires that all addresses be recorded and centrally maintained by a network administrator. This is to provide an orderly procedure for adding new devices and avoid problems that can arise from duplicating address assignments on the network.

Another limitation of IP addressing is that users find it awkward to deal with numbers when locating devices on the network. Although IP addressing is an efficient scheme that works optimally for computers and routers, in practice it is true that network users find common names for hosts(such as myserver.mycompany.com) much easier to remember than IP addresses (such as 10.100.206.195). Further solutions for mapping user-friendly names to assigned IP addresses simplify user access, but compound the existing administrative problems already inherent in TCP/IP.

The following section covers some of the accepted and proposed standards that have been drafted to provide solutions for all of these TCP/IP shortcomings. Standards for mapping IP addresses to common names through the use of the Domain Naming System (DNS) and for maintaining dynamic storage of network names and IP addresses by use of the Windows Internet Name Service (WINS) are discussed first. Protocols developed to automate the process of assigning IP addresses and configuring clients, such as the Dynamic Host Configuration Protocol (DHCP) are also discussed.

To TopWhat is DNS?

The Domain Naming System (DNS) was developed by the Internet Engineering Task Force (IETF) as an attempt to standardize a way to map pairings of logical host names to actual IP addresses on a TCP/IP network.

DNS is an acceptable method for resolving names to addresses, but it requires the use of host files, and DNS servers must be overseen and updated manually as names and addresses are modified. This furthers the administrative chores that a TCP/IP network administrator must perform, although it does simplify network access for users.

For DNS to work properly it requires the use of a name space. The DNS name space is hierarchical in nature and allows host names to be stated in absolute or relative terms. Absolute names, or Fully Qualified Domain Names (FQDNs) are defined from the root of the name space and uniquely identify a node in the hierarchy. FQDNs end with a trailing dot. Relative names are represented relative to a name in the hierarchy. For example, server.microsoft.com is a relative DNS name of a host defined from the com part of the DNS name space hierarchy, which contains domain names of commercial organizations.

If the domain name of a company is:

mycompany.com

then the following domain names:

sales.mycompany.com

and:

marketing.mycompany.com

are known as subdomains of the mycompany.com domain.

In addition to planning for domain hierarchies, DNS services use host files, which are flat text files that pair DNS domain names and IP address pairings for hosts on the local network. Host files are used by the DNS server to process and resolve name query requests forwarded by DNS clients initiating communications on the local network. In nearly all cases where DNS is used, host files must be created and updated manually for DNS service to work properly for all hosts.

Because DNS is a supported standard for all TCP/IP networks, there are typically no restrictions to using DNS services on most private networks that support TCP/IP network. Although other TCP/IP servers that are not Windows-based can be made to function as DNS servers, Windows NT Server provides the option of acting as a DNS server as well.

For more information on setting up Windows NT Server for use as a DNS Server, see your documentation for Windows NT Server. Also see Using DNS, WINS, and DHCP with Microsoft Proxy Server, earlier in this chapter.

To TopWhat is WINS?

Windows Internet Naming Service (WINS) is another option for resolving host names on networks that use Microsoft TCP/IP. It provides a distributed database for registering and querying dynamic computer name-to-IP address mappings in a routed network environment. WINS uses the NetBIOS computer name for any Microsoft-based network client to register each client in the WINS database on a computer running Windows NT Server.

A WINS system consists of the following:

If you are administering a routed internetwork, WINS is the best choice for NetBIOS name resolution, because it is designed to solve the problems that occur with name resolution in a complex internetwork. WINS goes beyond eliminating the need for an LMHOSTS file (a hosts file of NetBIOS names–to–IP address pairs) by reducing the use of local broadcasts for name resolution and allowing users to easily locate systems on remote networks.

Using WINS provides several benefits. In a dynamic network environment where host IP addresses can change frequently, WINS provides an excellent way to dynamically register these changes as they occur. It centralizes management of the NetBIOS names–to–IP addresses mapping database, so that there is no need to manage multiple LMHOSTS files on across several servers on a network. It also reduces IP broadcast traffic in a NetBIOS-based internetwork, while allowing the clients to locate remote systems across local or wide area networks easily. Finally, with WINS, users on a Windows NT network can browse transparently across routers (for Windows NT domains that span multiple subnets). Browsing without WINS is complicated and involves manual procedures.

For more information, see Using DNS, WINS, and DHCP with Microsoft Proxy Server, earlier in this chapter.

To TopWhat is DHCP?

The Dynamic Host Configuration Protocol (DHCP) was established to relieve the administrative burden of manual configuration of TCP/IP hosts on the network. DHCP provides an alternative to static IP addressing by enabling automatic configuration of the TCP/IP-related parameters when a DHCP client becomes active on the local network.

Note   DHCP provides a way of passing configuration information to hosts that is based on an earlier protocol standard, known as the Bootstrap Protocol (BOOTP). BOOTP was conceived as a way to allow diskless workstations to obtain TCP/IP configuration settings and perform a network “boot.” DHCP uses some of the same concepts as BOOTP, such as a shared message format, which allows existing BOOTP clients to interoperate with DHCP Servers. However, there are further additions to DHCP that distinguish it from BOOTP and the two protocols are not identical in all respects.

DHCP provides safe, reliable, and simple TCP/IP network configuration. It ensures that address conflicts do not occur, and helps conserve the use of IP addresses by use of centralized management of address allocation. DHCP conserves addresses that are not in use by having the DHCP server reclaim an address after the address lease period has elapsed.

The system administrator controls how IP addresses are dynamically assigned by the DHCP server. To establish DHCP service, you set several parameters that are used to manage dynamic assignment of IP addresses. First, a lease period for each address is set. A lease specifies how long a computer can use an assigned IP address before having to renew the lease with the DHCP server. Another parameter that must be set for DHCP service is a scope. A scope indicates the available range of addresses that can be used within DHCP assignment. The scope provides for an available pool of addresses for the DHCP server to use when assigning and configuring clients. The scope exists only once for an entire subnetwork, but it can be further defined by excluding reserved subranges of addresses from the pool of assignable addresses allowed by the scope.

There are three major benefits to setting up a DHCP environment. First, it requires no additional address configuration for the workstation. This is useful because users do not need to know or maintain their computer’s TCP/IP address configuration. This can be useful for mobile computer users who use portable computers that are moved to different offices or subnets frequently. Second, DHCP clients can be configured with additional TCP/IP parameters, such as the DNS server address or WINS server addresses that are essential for successful name-to-IP-address resolution by a host. Third, DHCP gives you better control of IP address assignment and management. For example, if the IP address for a router in a network changes and 250 client computers have to be updated with the new address, with DHCP you do not have to visit every workstation to reconfigure the default gateway manually.

How does DHCP work?

DHCP is based on a client/server model. The DHCP server runs on a server, such as a Windows NT Server. The DHCP client runs on a network client such as a Windows 95 or Windows NT Workstation.

During system startup (the initializing state), a DHCP client computer sends a DHCP “discover” message that is broadcast on the local network and can be forwarded to all the DHCP servers on the private internetwork. Each DHCP server that receives the discover message responds with an “offer” message containing an IP address and valid configuration information for the DHCP client computer that sent the request.

The DHCP client then collects the configuration and enters a selecting state, where it chooses one of the address “offers” provided by the DHCP servers. The client selects one of the offered configurations and enters a requesting state. It then sends a “request” message to specify a request from that DHCP server. The selected DHCP server sends an “acknowledgment” message that contains the address requested, a valid lease for the address, and TCP/IP network configuration parameters for the client. The client enters a bound state after receiving the acknowledgment from the server and can now participate on the TCP/IP network.

Client computers with local disk storage save the received address for use during subsequent system startup. As the lease approaches its expiration date, the client attempts to renew its lease with the DHCP server. If the DHCP server that initially offered the lease is not available or the lease has expired, the client repeats the process and gets a new configuration from any of the DHCP servers available.

The following three types of hosts can be active in a DHCP configuration process.

For more information about setting up DHCP services, see your documentation for Windows NT Server. Also see Using DNS, WINS, and DHCP with Microsoft Proxy Server, earlier in this chapter.


To TopLAT Configuration

Overview of LAT Configuration
Modifying the LAT
Replacing the LAT

Overview of LAT Configuration

During Microsoft Proxy Server installation the Setup program helps you create a list of the IP addresses that constitute your private network. The information you provide is used to create a table, called the Local Address Table (LAT), that defines your private network. IP addresses that are external to your private network are specifically excluded from this table. The server maintains the master copy of the LAT, and a copy is downloaded to client computers.

The Setup program creates the original copy of the LAT. After installation, the server’s copy of the LAT can be modified by using Internet Service Manager.

To TopModifying the LAT

You can modify the existing LAT, adding or removing to the IP address pairs provided by the Windows NT Server internal routing tables.

To modify the LAT

  1. From Internet Service Manager, double-click the computer name next to the Web Proxy or WinSock Proxy service.

    The Service Properties window appears. Make sure the Service tab is selected.

  2. Click the Edit Local Address Table (LAT) button.

    The Local Address Table Configuration dialog box appears.

  3. Verify that the entries in the Internal IP Ranges box correctly identify your internal network. Add any needed IP address pairs until all addresses of your internal network are defined. Remove any IP address pairs that define external (Internet) addresses.

    • To add a range of IP addresses to the list, under Edit type a pair of addresses in the From and To boxes, and then click the Add button.

    • To add a single IP address to the list, under Edit type the same address in both the From and To boxes, and then click the Add button.

    • To remove an IP address or address pair from the list, select it from the Internal IP Ranges box, and then click the Remove button.

    Be sure to exclude from the LAT any IP addresses associated with Internet-connected network adapter cards on servers running Microsoft Proxy Server. These are external IP addresses and should not be included in the LAT.

  4. When the configuration is properly set, click OK, and click OK again.

  5. Stop and start the WinSock Proxy and Web Proxy services.

    The LAT changes do not take effect on the server until the services are restarted. 

To TopReplacing the LAT

You can also completely replace the LAT, generating a new list of IP address pairs from internal routing tables used by Windows NT Server.

To replace the LAT and generate a new list of addresses

  1. From Internet Service Manager, double-click the computer name next to the Web Proxy or WinSock Proxy service.

    The Service Properties window appears. Make sure the Service tab is selected.

  2. Click the Edit Local Address Table (LAT) button.

    The Local Address Table Configuration dialog box appears.

  3. To completely replace the addresses shown in the Internal IP Ranges list and generate a new table of IP addresses, click the Construct Table button.

    The Construct Local Address Table dialog box appears.

  4. To add to the LAT three ranges of IP addresses defined by IANA as private address ranges that can be used in a private IP network that is not connected to the Internet, select the Add the private ranges check box.

  5. To choose the network adapter cards on the server whose IP addresses will be included in the LAT, select Load from NT Internal Routing Table and complete its options.

    • If you do not know which of the server’s network adapter cards are connected to the private network, select Load known address ranges from all IP interface cards.

    • If you know which of the server’s network adapter cards are connected to the private (internal) network and which are connected to the Internet, load only those IP addresses associated with the server’s internally connected cards. Select Load known address ranges from the following IP interface cards. Then, in the list of network adapter cards, select the check box for each of the internally connected cards, and clear the check box for each of the externally connected cards.

  6. When you have completed the Construct Local Address Table dialog box click OK.

    The Local Address Table Configuration dialog box returns. A list of IP address pairs is displayed in the Internal IP Ranges box.

  7. Verify that the entries in the Internal IP Ranges box correctly identify your internal network. Use the Add button to add any needed IP address pairs until all addresses of your internal network are defined. Use the Remove button to remove any IP address pairs that define external (Internet) addresses.

    Be sure to exclude from the LAT any IP addresses associated with Internet-connected network adapter cards on servers running Microsoft Proxy Server. These are external IP addresses and should not be included in the LAT.

  8. When the LAT configuration is properly set, click OK, and then click OK again.

  9. Stop and start the WinSock Proxy and Web Proxy services.

    The LAT changes do not take effect on the server until the services are restarted.


To TopDial-Up Support

How Dial-Up Support Works
Using RAS with Microsoft Proxy Server
Using Microsoft Proxy Auto Dial
Restarting Services After a Dial-Up Connection

To TopHow Dial-Up Support Works

For Microsoft Proxy Server, dial-up support for connecting to an Internet service provider (ISP) is managed by using the Microsoft Proxy Auto Dial utility, Adialcfg.exe.

Microsoft Proxy Auto Dial uses Remote Access Service (RAS) phone book entries to perform on-demand dial-up connections as a RAS client. Once a RAS client is installed and configured on the server computer, Dial-Up Networking can be used to create RAS phone book entries for service dialing with Microsoft Proxy Server.

For dial-up support, connections are made by Microsoft Proxy Server when the following service demands occur:

To TopUsing RAS with Microsoft Proxy Server

Configuring RAS Options
Creating RAS Phone Book Entries
Other RAS-Related Issues

To TopConfiguring RAS Options

To configure dial-up support for Microsoft Proxy Server, first verify that RAS has been installed and configured properly. (If RAS is not currently installed, refer to your Windows NT product documentation for more information on installing and configuring RAS.) Once RAS is installed, you must configure port usage for dial-out only (to support dial-up service).

To set or verify a RAS client for dial-up support

  1. From the server’s desktop, select Settings, then select Control Panel.
  2. Select the Network icon and double-click it. The Network Properties dialog box appears.
  3. Click the Services tab, then select Remote Access Service from the list of network services.
  4. Click Properties. The Remote Access Setup dialog box appears.
  5. If necessary, select a port from the list. If only a single port has been set up for RAS use, this port will be selected by default.
  6. Click Configure. The Configure Port Usage dialog box appears.
  7. From the Port Usage options, select Dial out only, then click OK.
  8. From Remote Access Setup, click Network. The Network Configuration dialog box appears.
  9. Select TCP/IP from the list of dial-out protocols, then click OK.
  10. From Remote Access Setup, click Continue.
  11. Click Close from the Network Properties dialog box, then select Yes when prompted to restart the computer.

Note   If RAS was installed and ports were configured initially as a RAS server (to receive calls) and not as a RAS client (to dial out only), port usage must be changed. For more information on changing from RAS server to RAS client settings, see Using RAS Server and Microsoft Proxy Server.

Once the RAS client is installed, you must reconfigure Remote Access Autodial Manager and Remote Access Connection Manager services to use Microsoft Proxy Auto Dial to manage dial-up support.

To reconfigure Remote Access Service for dial-up support

  1. From the server’s desktop, select Settings, then select Control Panel.
  2. Select the Services icon and double-click it. The Services Properties dialog box appears.
  3. Select Remote Access Autodial Manager from the listed services.
  4. Click Startup. The Service dialog box appears.
  5. Click Disabled from the Startup Type dialog box, then click OK.
  6. Select Remote Access Connection Manager from the listed services.
  7. Click Startup. The Service dialog box appears.
  8. Click Automatic from the Startup Type dialog box, then click OK.
  9. Click Close.

To TopCreating RAS Phone Book Entries

Once a RAS client has been configured, an initial dialing entry must be created by using the Dial-Up Networking program. This entry will be used to dial your ISP’s phone number. Before creating a dialing entry, first check with your ISP for any specific connection settings that you will need to use when creating your dialing entry.

Note   When creating a RAS phone book entry for use with Microsoft Proxy Server, you must first log on by using an account with Administrator privileges.

To create a default RAS phone book entry for dial-up support

  1. From the server’s desktop, select Programs, select Accessories, then click Dial-Up Networking.
  2. If the phone book is empty, click OK to add a new entry.
  3. Enter a name for the new phone book entry, then click Next.
  4. Follow the on-screen instructions for creating a phone book entry. Click Finish when you have completed the entry.
  5. Select the new phone book entry to dial from the drop-down list box.
  6. Click More, then click Logon Preferences. The Logon Preferences dialog box appears
  7. From the Dialing tab, click the arrow next to Idle seconds before hanging up to change the default value from 0 to 1. This will ensure that RAS always disconnects after each dialing attempt.
  8. Click OK, then click Close.

To TopOther RAS-Related Issues

Using RAS Server and Microsoft Proxy Server
Using PPTP and Microsoft Proxy Server

To TopUsing RAS Server and Microsoft Proxy Server


Warning   Enabling a RAS Server with Microsoft Proxy Server is not a recommended configuration. If you are considering using RAS dialup, or if you configured a RAS server during installation of RAS, read the following section carefully for more information on issues related to RAS server usage and Microsoft Proxy Server.


If you have installed RAS and configured an initial port for dial-out use after Microsoft Proxy Server was installed, check that port usage is set for Dial Out Only. If Dial Out and Receive Calls or Receive Calls Only is selected, the server is configured as a RAS server. In almost all cases, RAS should be reconfigured for RAS client use (to dial out only).

To change from a RAS server to a RAS client

  1. From the server’s desktop, select Settings, then select Control Panel.
  2. Select the Network icon and double-click it. The Network Properties dialog box appears.
  3. Click the Services tab, then select Remote Access Service from the list of network services.
  4. Click Properties. The Remote Access Setup dialog box appears.
  5. If necessary, select a port from the list. If only a single port has been set up for RAS use, this port will be selected by default.
  6. Click Configure. The Configure Port Usage dialog box appears.
  7. From the Port Usage options, select Dial Out Only, then click OK.
  8. From Remote Access Setup, click Continue.
  9. Click the Protocols tab, then select TCP/IP Protocol from the list of network protocols.
  10. Click Properties. The Microsoft TCP/IP Properties dialog box appears.
  11. Click on the Routing tab.
  12. Clear Enable IP Forwarding, then click Apply, and then click OK.
  13. Click Close from the Network Properties dialog box, then select Yes when prompted to restart the computer.

To use a RAS server with Microsoft Proxy Server

There is one exceptional case where a RAS server can be installed and used: if an additional separate port is configured to receive calls only. For example, if dial-up support is configured on the COM2 port of the server, a dial-in server could be allowed on the server’s COM1 port.

When configuring any additional ports for RAS server usage, limit dial-in clients by selecting This Computer Only and clear Entire Network access during Remote Access Service setup. (If access to the entire network is allowed, IP forwarding will be also be enabled. IP forwarding is not allowed with Microsoft Proxy Server.)

To TopUsing PPTP and Microsoft Proxy Server

Point-to-Point Tunneling Protocol (PPTP) is a networking protocol that supports multiprotocol virtual private networks (VPNs), enabling secure network access over the Internet between remote computers.


Warning   Using PPTP with Microsoft Proxy Server is not recommended. If PPTP is installed, read the following section carefully for information on issues related to PPTP usage with Microsoft Proxy Server.


If PPTP is installed on the same computer used for Microsoft Proxy Server, the following configuration changes must be made after installation:

To TopUsing Microsoft Proxy Auto Dial

About Microsoft Proxy Auto Dial
Setting Credentials
Setting Dialing Hours

To TopAbout Microsoft Proxy Auto Dial

Microsoft Proxy Auto Dial is an additional tool that can be used to manage dial-up support for connecting Microsoft Proxy Server to your ISP. You can use the Auto Dial tool to configure the following options for any configured RAS phone book entry.

To open Microsoft Proxy Auto Dial

  1. From the server’s desktop click Start, select Programs, and then select Microsoft Proxy Server.
  2. Select Dialup Tool.

To TopSetting Credentials

You can use the Credentials property sheet if your ISP requires additional user and password information to be entered when a dial-up connection is made. This information can be stored for use by Microsoft Proxy Auto Dial and used each time when dialing a specific phone book entry.

To set credentials to be used when dialing a RAS phone book entry

  1. Open Microsoft Proxy Auto Dial as described in the previous procedure.
  2. Make sure the Credentials property sheet is selected.
  3. Click the arrow to display the Entry Name list box. Select the name of the RAS phone book entry to be used when dialing with Microsoft Proxy Server.
  4. Under User Name, specify the user name to be used when logging on to a service provider’s dial-in server.
  5. Under Password, specify a user password (if one is required) to be used when logging on.
  6. Under Domain, specify a domain if the dial-in server requires one be provided when logging on. (This parameter is not usually required and can be left blank in most cases.)
  7. Click Apply, then OK. Credentials entered will be used each time Microsoft Proxy Server initiates a dial-up connection by using this RAS phone book entry.

To TopSetting Dialing Hours

You can use the Dialing Hours property sheet to specify selected hours or days during the week when service dialing is to be allowed. When dialing hours are selected, Microsoft Proxy Server will allow on-demand dialing to occur. When dialing hours are cleared, service dialing will not occur.

This feature can be used to prevent service dial-up connections from being made during certain selected hours during the day, or for selected days of the week. In some cases, limiting dialing to certain specified hours can be useful where Internet access is billed by connection time or where there are toll charges applied each time an ISP’s access number is dialed.

When dialing hours are set for a specific phone book entry, this information stored by Microsoft Proxy Auto Dial and used each time when dialing the entry.

To set dialing hours for use when dialing a RAS phone book entry

  1. Open Microsoft Proxy Auto Dial as described previously.
  2. Make sure the Credentials property sheet is selected.
  3. Click on the arrow to display the Entry Name list box. Select the name of the RAS phone book entry to be used when dialing with Microsoft Proxy Server.
  4. Click on the Dialing Hours property sheet.
  5. To disable service dialing during specified hours of the day or for specified days of the week, type the appropriate hours and days. By default, service dialing is set to be enabled for all hours and is not restricted.
  6. When dialing hours have been set or modified, click Apply, then OK. The dialing hours entered will be used each time Microsoft Proxy Server initiates a dial-up connection by using this RAS phone book entry.

Note   Microsoft Proxy Auto Dial does not provide an option for automated dial-up connections. To automate dial-up connections, use RAS dial-out scripting options, which can be set within the designated RAS scripting file, Switch.inf. For more information on RAS scripting, see your documentation provided with Windows NT Server 4.0 or RAS online Help.

To TopRestarting Services After a Dial-Up Connection

When Microsoft Proxy Auto Dial is used to establish a dial-up connection to an ISP, the WWW, Web Proxy, and WinSock Proxy services must be restarted if:

Once Microsoft Proxy Auto Dial has been used at least once (click Apply and OK to store settings), further changes to Auto Dial settings will be used by Web Proxy and WinSock Proxy services for subsequent dial-out connections without requiring services to be stopped and started each time.

You can stop and restart all services (WWW, Web Proxy, and WinSock Proxy) by using Internet Service Manager.

Also, you can stop and start the WWW, Web Proxy, and WinSock Proxy services from the command prompt by issuing the following set of commands:

net stop w3svc
net stop wspsrv
net start w3svc
net start wspsrv

It is not necessary to issue a separate command to stop and start the Web Proxy service. Stopping and starting the WWW Service also stops and starts the Web Proxy service.


To TopOther Server Configuration Issues

Web Proxy Support for Anonymous FTP Clients
Ping and Tracert
Microsoft Exchange and Internet Mail Connector

To TopWeb Proxy Support for Anonymous FTP Clients

Some FTP sites require an e-mail user name as the password to be entered for anonymous FTP client access. Where a password is required for anonymous access, the e-mail name to be sent by Web Proxy is:

proxyuser@domain

where domain is the current Internet DNS domain setting in use on for TCP/IP properties on Microsoft Proxy Server, such as mycompany.com.

To TopPing and Tracert

Ping and Tracert are two standard utilities used to assist in troubleshooting TCP/IP-related problems on your network.

Ping is a utility that helps to verify IP-level connectivity. When troubleshooting, the Ping command is used to send an Internet Control Message Protocol (ICMP) echo request to a targeted DNS domain name or IP address. Tracert is a route-tracing utility. Tracert uses the IP TTL field and ICMP error messages to determine the route followed from one host to another through a network.

Because the Ping and Tracert utilities operate at the transport layer by using ICMP (which does not use Windows Sockets), these utilities can not be redirected by Microsoft Proxy Server. Results obtained through proxy connections using the Ping and Tracert utilities to test connections between remote and local hosts will be invalid.

To TopMicrosoft Exchange and Internet Mail Connector

The Internet Mail Connector is used to provide message exchange between Microsoft Exchange Server and systems that use Simple Mail Transfer Protocol (SMTP) for Internet e-mail.

Microsoft Proxy Server cannot support proxy forwarding of SMTP-based requests when Exchange Server is installed on another server computer on the internal network. This prevents another computer running Exchange on your private network from using Internet Mail Connector to service Internet e-mail messaging.

However, Exchange Server can be installed together with Microsoft Proxy Server on the same server and communicate normally to both internal and external SMTP clients.


© 1996 by Microsoft Corporation. All rights reserved.