List and describe the steps to configure a DHCP server.
What will be an ideal response?
After DHCP is installed, it is necessary to configure the DHCP server. First, set up one or more scopes of contiguous address ranges and activate each scope. Configuring a scope includes the following:
• Obtain the range of addresses to be used.
• Determine the subnet mask for the range of addresses.
• Decide on a name for the scope, such as naming it to reflect the name of a department or division in your organization.
• Decide how long to lease IP addresses.
• Determine whether to exclude specific addresses.
Second, authorize the DHCP server. The process of authorizing the server is a security precaution to make sure IP addresses are only assigned by DHCP servers that are managed by network and server administrators. The security is needed because it is critical for IP address leasing to be carefully managed through ensuring that only valid IP addresses are used and that there is no possibility that duplicate IP addresses can be leased. DHCP servers that are not authorized are prevented from running on a network.
Third, a step that is not required, but that saves time in managing DNS, is to configure the DHCP server and its clients to automatically update DNS records.
You might also like to view...
4 / 3x= 8 / 6x
Use cross multiplication to • determine the value(s) of x that will make the equation true, or • determine that any value of x will make the equation true, or • determine that any value of x, except zero, will make the equation true, or • determine that no value of x will make the equation true.
A ________ is a shape that can be used to point to information or to connect shapes on a slide
A) callout B) vertex C) selection net D) line
The filter effect is a way to add an image that displays a special effect
Indicate whether the statement is true or false
After accessing your organization and its security needs, you make several recommendations regarding security training for personnel. Management decides to adopt all the security training recommendations. Of which type of control are these recommendations an example?
A. Administrative B. Technical C. Physical D. Recovery