c
DEPARTAMENTO DE SISTEMAS Y COMPUTACION MATERIA REDES DE DE COMPUTADORAS HORARIO 12:00 a 13:00 HORAS CATEDRÁTICO JIMENEZ AGUILAR ARIADNA TRABAJO UNIDAD 5 PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN NOMBRE ALUMNOS CERVANTES VÁZQUEZ VERONICA RAMOS HERNÁNDEZ ROSA MARÍA FECHA DE ENTREGA MIÉRCOLES 1 DE DICIEMBRE 2010
c c c c
c
c
PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN c ! c cc c ! c ccc ccc ! c cc c ccc ! c c c c ! c "cc#c ! c ! c cc %c ! c%ccc ! c%( c)c * +c ! c%+cc,cc -( c c-( c.c,c / %c ! c*+c)c1cc ,c c ! c+cc,c ( cc c ! c1c c*c c ! c1cc#c c*c c3c ! c- +c)c +c#cc,c c ! c- +cc c#cc c - 5- c ! c- +cc% c . ccc ! c 3( +ccc ccc ! c +cc
cc, 6c7 c cc ! !c c c c c
c c
c
c
c
c
c
c c c
!c $c $c
c c
&'c &c
c
&$c
c
&0c
c
2'c
c
2c
c
2c
c
2c
c
24c
c
2$c
c
&c
c
!c
c c
4c 'c
c
2|Página
UNIDAD ! - PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN ! Análisis De Requerimientos ¿Qué es un requerimiento? üc
+ccc c c c cccc c cc(c
c c üc +ccc cc8"ccc c cc 3c c 6c 6c3+6c c c +c3 c c üc ,c+ccc ccc3 ccc c üc (c cc cc"cc c c cc ccc c pipos de requerimientos c(9cc c8 c c cc :c üc ,c c3 :c cc c+ccc c c cc"c c cc c 93c(c cc c (ccc;cc ;c üc ,c cc3 :cc 6cc6c
c Determinación de Requerimientos Concepto y Fases &c Obtención de requerimientos cc ccc cc3c c cc c 2c Documentación de requerimientos c c "c c 3c c c c c ( c c c c c c c c c 3c c c c c =c c c alidación c cccc c cc ccc3+c c cc ccc c 3cccc cc c Características c c c 3 c c 3c c 9 c %c c c "6c cc3 c" c"c üc Necesario: c cc c cccccc c üc No ambiguo:cc 8 ccc6cc=c c c>c +cc
`|Página
üc Conciso:cc cc c( c ccccc (cc c c c ?c=c;6c c>c9cc3cc c c üc Consistente:c (>c c c c c 3 c c c c 3 6c c c c c c 6c c ( c c c c c ccc c ?c üc Completo: c c c c c 9c c c c 3 +c 6c=cc cc c3 c8 c cc8 cc c c üc Alcanzable: ,c ccc c c 6cccc;cc c6cc c=cc cc üc erificable: %c c c 3c c
c ;6c c c c 3 c 3"c c c c 3+c c (c c +6c 6c +cc c
c
! Evaluar Las Necesidades De La Red 8 c 3c c 3 c c c c 6c c c c 3c c c #cc c 6c c cc c c- 5- !06cc
c c c c 1c c c c =c 196c c +c c c 6c ( c 8 cc16ccc+6c c 8 cc
c c c c c c c @ c 6c c c =c c 6c c A6c cc c c c*c c"=c "c 6cc c c c * 6c c c c c c c c c ;6c c c c c %c "c c ccc cc c cc c (cccc cc "B6ccCc=ccc3 +ccc ccc cc c96cc c
;c c ccccc;c
Motivos para montar una red c 8c c c c c c c c c c c c 9c =c c cc c (c c c c* cc cc c 6ccc ;c cc "c ccc c c"9cc (6c cccc3c cc c cc(c%cc c c cc c6cc ccc cc
G|Página
8 c c cc:cc üc ccccc üc ccc8 c üc - c
c c
! Requerimientos De Las Estaciones De prabajo ,c +cc 6c(>ccccc
+cc cD 6cc c 3c :c EFc c
c c c >c 6c c c 6c c "c c ;c c (36c 1c c c
6c (9c c c
ccc 93Ec c c c 36c c 3 6c c 3+c c c c c cc
c*c@* A6c +ccc=cFc
6c=c cc c3c(c3 c c3c c c3 6c c=c
c cc c c c c c c c c c c c c c c ( :c üc ,c cc*c@, *Acc üc F c*cc üc ,cc 5%cc # cc ccc c3 ccc( c :cc üc CPU: c c c c c @ c *(c , Ac c c c
cc c3 c@D*,Ac ccccc
cccc *,c c cc c1c=cc ccc6cc6cc c cc
c c
c
c c +c c c c c c c c cc c *,cc3 ccccc üc RAM:cc cc c c@ c cF =Accc c +cc
c% c cccc cc cc3 +c cc c c c c c 3c c c c =c c c c c c c 3 +c c c 7 c c +c c c c c &!c (= c@&!F#Acc c Fcc"c c 9 c cc c c Gc ,c c c c c (3c c c c c c 6c c c cc c Fc "c =cc üc Disco Duro: ccc cc c cc
cc 9c c c c c c +(c c c c % c c "c @3c = Ac c ,-Gc c c ( c c c c c "c c c c "c c(c ccc c>cc :cccccc c c !|Página
üc üc
üc
üc
üc
üc
üc
üc
c c9 c(cc c cc cccHH;IIc cc (6c c c cccccc&c ( cc Consola: cccc"cc +c cc cc c cc cc ccccc c c cccc perminal: c c c c +c c c
c > c c c 8 c c "c c % --c "c c ;c c cc c c3 cc* c=cc cGcc System Bus: ,c c c ccc +c
;cc c3 +c c c c 3 c c c
c c %= c # c c c c c c cc *,c=cc cc ccc c c cc c +c c c c c c cc8+cccc cc c(3cc SCSI Bus: c% %-cc ;;=c c"c(cccc c c ccc8+c c c c =c c c c c c c c c c % %-c c c c c (c cc c ( cc c c cc c =cc +cc c c cc c( cc cc c c ((c c cc 3 c3 cccc
cc(>c cc 3 6c c c c c c c +c c c c c =c 3 c c c c c +c
c c c % %-c c cc +cc ccccc&'cF#5cc Cache:cc"cc c c 1c=cc cccc 33cc c c @"("/c 33A6c c +c c c c c c c c=c ccc c Fcc cc"cc *,c%cc"cc
;c c 3 c c c c c c c c c ( c c c cc Puertos:cc ccc cc +cc ccc3?cc F%/CBc8 cc c .FFc@c cc +Ac=cc c*c@c c 6c Ac c ,-Gc c c c c
;c ?c c c ( c cc=cc 3cc> c=ccc(cc Adaptador de Red: ,c c c c c c c +c c c c c
c c c c c
c 7 c c c c
c
;c c c c c c " 6c c c c c cccccc@ Ac ccc +c
;c( c c 8+c @ Ac c c *5-*c c (c +c c c " c c c ccc cc-cc Unidades de Cinta: %c c c c (? c c c (c c ( c (c c c 3 +c 8 c c c c c c c c 3=c Jc c c " c c "c c c c $/ c c c c2c7#c cc
c c
! Aplicaciones Que Corren £|Página
ccccc cc ccc( :c üc
üc
c ?cc Ôc c @
c c (6c 1c c c
A6c c c1c=ccc cc(9c=c cc Ôc c@ " 6c((cc 6c% ccc c 5c(9c5c +Acccc+cccc +c=c 6c+cc c=c( cccc Ôc Fc@
c cF 3 (6cD+c cc
A6c c c c (9c c +6c c c c =c ( +c c cc Ôc c @ c (c
6c 1c +c
;A6c c c c 16c c =c c c c (6c c =c c c +cc Ôc %c@
c c%3 Bc((6c-(9cc%3 Bc c c
A6c c= ccc( +c ccccccc cccc+(c c 93cc Ôc 7-%c @7("c -3 c %= 6c % c c -3 +c 7(3Ac c +6c c =c c c 3 +c c c ;c ((36cccc3cc c( ;cc Ôc c ccc c 9 c=c3 ?
6ccc c c c +c9 6c cc 8 c 9 c=c cc3 +cc c 9 cc Ôc c cc ccc ccc 6c +c=c +c c (c c =c G6c c =c 6c 9c c cc3 +ccc" cc Ôc % c c c c c c c c c c c (+(c =c 9 cc cc Ôc % c 8 6c c c ?c c ( +c c (c 36c c c c c +c +c c 6c 3 cc(+ cc3( +cc
cc c c
üc c c3 c cc ccc cc ccc c3 cc c,-Gc c c c(>cc cc 6c c c cc c c cc( :cc
üc 8:cccc3 c8$!6cc c "cc( 6c c%* cc üc % .%:c c c c 3 c !$Kc 9c c c c 3 c %* c c c c
c%,cc üc %:cccc3 c%* cc%,cc üc , 8:cccc3 cL Gcc( cc üc -G:cccc3 cc cc cc-#Fc=c*Bc* cc üc --G:cccc3 cc cc cc%c7"cc [|Página
c
! Ancho De Banda +cc ccc cc9c cc;cc3 +6cc c cc cccc +c3 c c8cc- cc"ccccc cc3 +ccc c cc c c c ?c c c 8+c c c c c 9c c c c c "c c c c c ( c c c c ( c @#*%A6c J c c ( c @JA6c c ( cc( c@ Ac cccc 6cc"cccc cc
;c c+ ccc cc
3cc c/cc cc c cc ccc c cc cc c 9c c @( c c ( Ac c c c "c c c c 8c ( cc c@c Acc( c@Acc6cc8c c= cc ( c@#Ac,c + c c3 cc4!''cc cccc"cccc c + c c3 cc2$$''ccc c(9ccc c ? cc
;c ?ccc ? ccccc c 1c c c cc +c cc c c +c c( cc c +cc86c c cc cc"ccc%c cc c8cc "c c c cc c c c cc c cc +cc c"ccccc c c 96cc cc c c 3?c =cc @ c(9cc(cc"c( cc ccEc c( EAcc c c c "=c c c c c c c 3?6c c c c "=c c ( 9 c c c c c c c c 8 c "=c c c
c c c c c 3?
! Almacenamiento SAN (Storage Area Network) ,cE% Ec@cccc Acc ccc c (c%c c c c c c c( cc( c :cc üc ,ccc ccccc3cc% %-cc üc ,c cc 8+cc@
6c 6c Acc üc cc ccc@c Acc
c Presentación de una SAN
Ñ|Página
,c % c c c c c c c c c c c c c c +c c c 19c c c c c 3c c c 6c c ccccc% c c c 3;ccc93c cc ccc% cc
entajas y desventajas c ccc% c c cccc ccc cc
;ccc c c c c c c c 36c c "c c c c c 8 c &''c (= 5( c@&'''c ( 5( Ac=cc c8 c cc c c8cccc ccc c% cc c8 cc cc c=c c;c c =c" c cc = cc ,c % c c c c c c c c c c c 3 c c c cc 3cc% c c ccc 3cc c%cccc c c3 c c c 3;c cccc c@( c ccc 3Ac=cccc c@cc(c " Acc *c c 6c c % c c "c c c c c %c =c c c c c c c c c
;c c (9c c 9c c =c c 6c c c 19c cc .c@ c ccAcc cc cc= 6c c cc c 3cc c3cc
NAS (Network Attached Storage) ,cE %Ec@ c ccAcc c cc ccc,c %c c c c c c c c c c 3 c c c c c c 19c c c c c c "c =c c c c c
cc3c
Presentación de un NAS ,c %c c c c c c c c c c c =c c 3 Bc c 3( +c ;ccc c cc ccc =9ccc cc *cc(6cc cc cc"c ccc c 6c9c c
?c cccc c cc
;cccc c cccc ( c
DAS (Direct Attached Storage) c
"c% (c@ %Accc ? c cc c=cc cc cc cc cc c cccc +cc
6cc6c39 c cc c c"c cc?c cc %c cc% c@% (c c BJA6ccc=c( cc c "c c cc cc cc3"c cc3c c c
(9c c c c c c c c "c c c 3"c c c c c c c c c %6c c c c c c c c |Página
3"6c c c c c % 6c c c c c c c c c c cc (9c %c@ c ccc/ BJ/
"c (A6c c c c "c c c c c c c c c 3"c c c c
Presentación de un NAS c cc cc %cc% %-6c% %c=cDc "6c c c c %c " c c 8 c c c c c 6c c c c "c c c =c c c c ,c 9c c %c c ""c c c c c cc c cc9(6c=c cc c cc 3c c ccccc +cc c c""cc cc c E" c c Ec @M# Ac ,c 9c c %c c c c c c c -c c E33/E6c c cc -ccM# c cc c c cc c %c
?c" cc cc 6c c cc > c@c cc Accccc c c+(6c c 9 c cc c
c c E (Ec c c 6c c c %c c c (c c ccc c% cccc cc
! Requerimientos De Servidores 7 6cc ccc c c 5ccc c c=c c c c c c c c c c c c 6c c c c (c c c Fc =c c c c c c c c c ?c cccc( :c üc F> c c üc %( c üc cc( +cccc
c
c (;+c c c c c 5c c c c cc( cc3 cJ/c
Arquitectura cliente/servidor M=ccc(;c 5:c üc c c cc cc c>cc üc c c c c c c c c c c c c c ccccccc +ccc c=cc ;c cc c üc c c c c C c ;c + c c c c c c ( cc c c cc c c üc ,c c B" c c (c > c c c =c 9c c c c cc c c c cc;cc3 cc cc c3 c c Ô |Página
c c 6c c (c c c c c c c c cc cc c entajas del uso de un entorno cliente/servidor c (9c 5cc c c c c3c "c cccc (;c,c c 5cc3ccc c + c c c 3c c c c c c c c c 3 6c c c c c 3c ;+c c c 93c cc c 5c+c9cc cc c cc ?ccc6c cc 3cccc
El entorno de red c ccc3c +c c c ccc=cc ccc cc
ccc c@c cc cc3 Bccc c c c c 5c@5%Acc"c 6c=c (c96cc(cc ccccc c Ac c c c c c c c ( c c
c c c c c cc +6cc cc cccc cc c
Controladores y el modelo OSI c cc cccccc cc cccc cc cccc cc cc3c.%-cccc cccc cc c c 3c c c c c c c c c c c c 39c c c6cc cc ccc( c c +c c cc c=cc cccN 6cc c;6c c cc cc c=cc ccc c
Controladores y software de red c " c c c 3 c c c c c c 3;c c c c c 3 Bc c 6c c c c c c c c c c c 3 Bc c c ccc c c c c "Bc c 3 c c c c =c c c c"ccc ccc c c- ccc cc
c c cc"cc ccc c cc6cc" c cc 3 c c c c c c =c c c c =9c c c c cc cc ccc c%c (6c cc c c 6cc ( cc cc c c c c c3 cc c c cc c c
Utilización de controladores c
;+cc ccc 6c =c c +6c3( +6c ;+c=c +c
Instalación de controladores
ÔÔ | P á g i n a
c c ccc c cc ? cc c c c =9cc c ccc c
;c 3c(3c 6cc cc(c c( 9cc cc ?ccc *c 6cF3 cCBcc%c =c c
c c*cc c c c c c (c c c c c c ?c c c c c c cc ccc
Configuración de controladores 7 6c c c c 3;c c c c c 3( c c c c c cc cc c3 cc3 c c c =9cc c cccc3( cc3 Bcc* (cc*=c@**Acc "=c c -*c c c c 3( c c 3( +c c ;c c c 3 B6c cc +ccc cc c;c 6cc@ cc c c c c c **6c c c F3 c CBc 0c c CBc 0$Ac c c c c 3( c c c "Bc
c c c CBcc'cc( cc c**6c cc c c%cc cc c 3 6c c c c c c ;c c c c c c ccc3 c%c=c ccccc c 6cc c c c c cccCBcc+c c
Actualización de controladores c 6c c 3 c c c c c c 3c c c 6c c c c c c c c c 3 c c c c c c c c c c c c c ( 6c c c c 9c +cc- 6cccc c+cc ?cc cc c c"c F3 c BJc @F%A6c %c c c c - c c 3 c c c c c(cc cc c ;c ccc ;+cc cc ccc c +6c c c c c c c c c ( c (>c c c c "c c ccc3 Bcc"c cc3 cc c c c +c ( c 6c cc cc(cc- c c c 9c +6c c c 3 c c "c
c c c 6c c c ccc cc"c=cc"c
c;cc +c
Eliminación de controladores cc6ccc c 6c c cc c(c c c3 ccc c c%c c c c 6c c ?c c c 6c c ( c c c c "=c 3 c c c ( c c =c c c c c c c c c c c c c cc ccc c
Instalación de tarjetas de red
Ô2 | P á g i n a
c +c c c c c c c c c c c ( c c c 3cccc c3c3 cc c ? cc ;cc c c ;c c c 1c3+c cc c cc6c c> c c c cc c c
pipo de tarjeta c c c c c c c ( c c c c 1c c c +c c 3 c c c 8+6c c c c c c 93c c c c c c *c 6c c c 1c c c c c c " c c 3 c c c cJc(c
elocidad de la red 8 c c c c " :c &'#c @&'c FAc c &''#Gc @&''c FAc F "c c c c ccc c3 cc cc c6ccc c ( c+c3 cc&'cFc c1c c6c(>cc cc cc3
c cccc* c c c c3 c c"c ccccc c c c c c c c c
Conexión al medio c =c " c 6c 8 c c c c (c (>c c 8 c cc c c 6cc c cc ccccc c ( c c c c# ccO/
Incorporación de extras c +cc cccc cc(+ c c c c c+c cc ;c cc cc cc cc cc c c c c =c c c c * c c c c c c c c @ cccc cAc=c cc c cc c ( c c cc =c&6c2c+ccccccc c8 cc c7 6c c cc c c"=c c8+c c cc c=cc c M 6c c ;c c cc cc c cc c
Comprobación de la compatibilidad hardware c c c c "B6c =c c c c c "Bc c c c "Bc c c c c c c c ( c 6c c c "Bc cc c c c9c*c 6cc c(9c c c c c
+:c c ;c c c c =c c ;c c c3 +6ccc c c1cc cc c"9 c3 c
Problemas con el hardware c c "Bc c c ""c c c c c 3 c 6c c c 3 c c "Bc =c 3 Bc c 3 c c c c ccc c ? cccccc c 6c=cc c3c c +c>cc cc"cc
c=c c c>c cc c Ô` | P á g i n a
c +c =c +c c "Bc c c c 3 c c c 3+c c c +cc cc%c cc ccc cc1c ccc cc6c c c c 3 c c c =c c c c c c c cc;c c 6cc c cc"Bc cc c=c 9c cc 3 c cc cc cc c c 6cc c c cc+cc c c*c 6cc ccc +c c c c @Gc c )A6c ( c c c c c Gc c c c c c c )c =c ( c c c c c )c c c c c c c Gc c c c c
c cc3 Bc (>cc c c c cc ;c
Lectura de la documentación c cc +ccc c c* c c c"Bcc c3 Bc
(c c 6c c c c c 3 c c c c 7 6c c 3 c c c3 c=cc c +c%cc cc +ccc +c 6c c c c c 3 c c c =c c 3 +c c c c c *c c 3 +6c 8c c c Cc c3 c
Detección durante la instalación c c c c c c c c c c c 6c ( c c c c c c "Bc c c c c c c +6c =c (c c c c c c c c c c c "Bc c =c (>c c c c c c c c c c *c 6c c c c c - C6c c
c c +c 8 c
c c 6c c "Bc c c c 6c c c /.Fc =c c c c %c c c c 6c c c c c c c c (c
c
Comprobación de los requerimientos mínimos c c c c c c +6c (>c c c c c c 9 ccc cc c c c =cccc6cc c=cccccc c c ? c c c c 9 c c c c c 9 c c6cc 6c3 cc cc c c c ccc c 9 c c c c c c 1c * c "6c c 9c "c c 3c =c ÔG | P á g i n a
c c c "c c CBc c %c 3 c c &!c F#c c Fc =c c cccFM;6cccc"cc;c
ardware de red c "Bc c c c c c c c c 3 Bc c c 3 c =c c c c c c @ 6c (6c
6c
c =c ( B=Ac 3 c c c c c 3c c c c 3c .%-c @c c 39c =c c c c Ac c c c c c c "c c c c c =c 3 c cc cc 6cc cc c c3 c c 3 c c c c c c c c $'28c c -c *c
6c c c c c c c -c c c c c c c cc c cc cc>c +ccc c cc c c c c c c c c c c 3 c *c 6c c c " c =c Jc (c
;c ? c 3 c c cccc*c 6c c c1cc cc c " c$'2cc c cc c c1cc ccc cJc(c$'2c
! Servicios De Red c3cc ccc cc ccc c3 cc c(;+c c"c c c ccc c cc c cc c(cc c(;+c 9cc(;c c ccc cc ccccc c cc 6c c c:cc üc üc üc üc üc üc üc üc
F=c3cc +cc Fccc cc Fccc cc( cc +cc cccc cc +ccc cccc cc Fccc +ccc( cc Fccc (ccc cc Fccc cc cc üc D8ccccc cc üc F=ccc( cc üc F=c3cc cFc( cc c *c c c cc6cccc c ccccc c 6c c :c üc cc üc D"cc üc - +cc üc cc üc -3 +cc üc . cc Ô! | P á g i n a
c *c c +c c c c c c c c c 8 c c c c c c c c c c c c c =c c c c c c c c c ccc ,c c cccc c cc( c c c=c cc cc c c c c > c c c ( c c c c c ccc c=cc(ccc cc c*c 6cc c cc6cc cc? c3ccc c=c c%(>c c3 cc +ccc( ccc6c8 cc3 cc c+(:cc
Cliente-servidor c c c c c c c c c c c c c c ( c c c
c c c c =c c c c +c c c c c c c c c c cccccc cc ccc c c cc;+cc
c 6cccc cc;cc cc c cccccc c c c c c 6c c c c c c
c c c c 3;c c
c @ c c c c c c 6c 6c Ac =c c c ;c c ;c=c cc cccc c c cc6cc ccc c c9c c cc c c =:cc üc - ccc cc üc cc +cc cc c cc üc Dcc +6cc cc ccccc üc Dcc +cc
c Redes de pares (peer-to-peer) c c cc +c c c@ Ac cc c c cc c c ccc 3ccc cc c c:cc üc %;c=c3cc +6c +c=c cc üc D8c c +c c c c c =c c c c 6c c cc c(>cccc
c Acceso ccccccc c cc3+ccc cc c c c ccc ccc c c c
;6c ccc cc8+cc ccccc (c cc
Control de acceso
Ô£ | P á g i n a
*cc cc6cc cc 3c cc cccc c c
3c c c c c c c c =c c c c c %c c c 6cc c c ccccc
Acceso remoto c c 6c c c c c (;+c c c c c >c c c c 8+c c c c c c c (c c c c ? c
;cc cc8+cc cccc c c c cc
Ficheros c c c 3"c c c 3c c c c (c c c c c (c c c c c c c c c c c c c c ccc6c cc ccc cc 3"ccc(ccc cc c cc
Impresión * c c c c c 6c c =c c c > c 6c c9cc( c8 c ccccc cc cc cc cccc +6cc c c cc cc ( cc c3 +cc c;c ,c c c c c +c c c c c c c 386c c c cccccc cc38cc c c cc? cc c +cc c6cc cccc38cccc +cc cc
Correo c c +c c c +c c c c
;c * c c c c c +c3 cc c c*c 6cc c+ c cc ?3c cc c c c c c c c 6c c c c c c c c
c c c "c c c c ( c c c 3 +c D c c cc ccc ccc;cc
Información ccc3 +c ccc3"cc3 +cc c c c ccc c" 8 6c ccccc c +c.c6c c c 3 +c c c c c c c 6c c c c c c c cccc c
Otros c c c 6c c (c c c +6c c 3c c 3 c c c 6c c c c (c c c c c c :cc
Ô[ | P á g i n a
üc üc üc üc
c (c@;c=c Acc 39c (cc %cc (cc L3cc cc
c c
! Seguridad Y Protección ¿Qué es la seguridad de redes? c( cccc ccc( c c( ;c cc3 cc c c cc ccc+ c =c c cc cc c ccc "c cc"cc:cc c c :cc üc c ccc
;c (ccc cc3c (cc üc c cc ccc c c c1cc cc üc ( cc c cc+cc3cc üc 7 ;c ccc ccc
c Las causas de inseguridad 7 6cc( c cccc (9:cc üc ,c cc( c 6cc6cc3 cc cc ccc c3 cc 6c( ccc c cc1ccc c@c 6cc ccccc cc cc Acc üc ,c ccc(
c El objetivo de los atacantes c c@ ?c cE EccE"JEAc c c "c :cc üc üc üc üc
c +c"cc"cc ccc cc@c 6ccc cc cAcc c
+c@ cc c (Acc ccc"c1c@ c 6c"c c c cc3 Acc
c
El comportamiento del atacante D 6c c c c c c c c c c c c c c ccc8 cc3 cc(c :cc
ÔÑ | P á g i n a
üc . c3 +c c c
;cc cc üc 8 cc cc cc üc D;c c cc cc?cc
c ¿Cómo es posible protegerse? üc F ?(c3 cc üc ;c c c cc üc cccccc@3BAcc üc cc> cc cc c@ Acc üc 3c c9 cc( c c@ 16c +cc"c
Acc üc M(c cc
cc( c@( Acc
c Firewall c
c cc cc c c c9 cc cc c"Jcc (9c c( c cc"Jc cc;ccc@ cc9c cc cc Acc cc c c c,c;c c c c
6c c "Jc c c c ?c c c c c ( c c 8 c =c
cccc ccc cc c
! Selección De Una Red Igual A Igual O Cliente-Servidor c3cc c c6c cc cccc-( cc-( ccc c ccc36cc cccc cc cc( c c=ccc c cc c c=cc cc /%cc cc c c cc cc c( 6cc c3 c;c cc c( 6cc6c ccc c
c c c cc 6c( c=c3( 6c ccccc
c "c cc cc c-( cc-( c üc Compartir recursos:c,cc c1cc3ccc "c"cc c c c c =c c ( c c c c c c +cc cccc cc c=c cc3 c ;c c c c c c ;c c 3 c 6c c c3cc;c=c c cc c cc c c üc Seguridad:c c ( c c c c c ;+c c c c c 3 c ccccccc c ccc6c"=c c c c 3c c 9 c =c c c c c c c c c 6c c ( c c ( c üc Redundancia:cF cc cc ? cccc( c c cc 6c c c c c c c c c =c c c
Ô | P á g i n a
9c ccccc c c1c c cc cc c c 6cc c c ccc( ccc cc c üc Número de usuarios: ,ccccc c c cc c üc ardware:cc"Bccc c c c c ccccc
6c =c c c c c c c c c @ FAc =c c ccccccccc üc Centralización del control: 6c cc (ccc c ccc cc3 c c c( c c3 cc c1cc c c c
! Planeación Y Diseño De Una LAN ,c c c "c 9 c c c c 6c c c =c c c cc3 +c cc ccc 3(c cc cc cc+ccc c +ccccc c=c 3
c cc8 c cccccc+ccc 1cc
c c6c ccc cc396c c c+c 9 cc c c +c c c c (c c c c c "c c c cc3 cc=c" cc c6cc c c c c c c c 3
c %c c c c c c c c 6c c +c =c c c c c ( c ( 9c c +c c 3c c c +cc +ccccc ,ccc c c 9 c cc ccccccc c c 6c c c c c % c c c c =c c c c M=c c 9c c c c c 3 +c c 6c c 3 +c +c "c c c (c (c c c 6c c 3 +c (c c c
;c c c c c c c c c +c c +c c ccc( c( :c &c 2c c c c
cc c %c #+(c , c
c *c c c +c c c "=c c c c c c c c c c c ;c M=c c c c c c ( c c c c cc"cc 3c c 3;c c cc( c c+c c cc cc cc+cc( cccc+ccccc c +c c c
6c ?c c c cc c c c c c c c c c 6c c c c c c c c c c c c c c *c = c c c +6c c c c ;c c c c c c c
c c
c c +c c c c c c c c c = c " cc cc "cccc*c6c c cc cc( :c Etapas de la red 2 |Página
INpERNA:c cc c3:cc c c@8c=c cAc c c@,*c=c c (Ac EXpERNA:c c3c c c@DcP c=c c (Ac c cc;c ccc ccccc cc *cccccc cc cccc c=c cc c c ( 6c 9c c c *+c c c c c c c 6c =c c c c "c c +c c c c c c ccc cc"cc;ccc3
c
Necesidades del cliente ccc cc c@ cc Ac cc c3ccc 3cc c=cc c3cc cccc=5c cc cc ccc c=c3
c cc8 c ccccccc +c c c 1c c c c 6c c c c c c 396c c c +c 9 c c 6c c +c c c c (c c ccc "ccc c c3 c c=c" c c c6c c c c ccccc3
c%c c cc cccc6cc +c=cc ccc( c( 9cc+c c 3c cc+cc +ccccc
Planeación Etapa interna üc cc cc c cc c ccc üc ;c c cc (ccc ccc üc ;c c c c:c Ôc 3 cc cc Ôc cc cc=c c ccc cc Ôc cc+ccc c@cccAc Ôc c@* HAc6c cc c=c 9 c Ôc 3 cc (c Ôc cc c Ôc cc3ccc ccc Ôc c cccc c c Ôc cccc cc c Ôc c c cc ccc +c üc cc cccc
;:c cc c üc ,c (ccc
2Ô | P á g i n a
üc üc üc üc üc üc
üc üc üc üc üc üc
ccc ,c (ccc cc c cc cc c cc cc8+ccc ;c ;cc;+ccc +ccc ;c cc c:c Ôc ;+ccc Ôc ;+cc cc c Ôc ccc@ Ac Ôc c ccc Ôc ;+c Ôc +c Ôc cc3 c c(cc cc3 Bc c> ccc c ccc +c cc c ccc +c c ccc c;ccc;+ccc c c c c cc= c * cc= cc ?ccc
c Desarrollo etapa interna üc -cc= ccc3"cc üc ;c c cc9ccc c;c üc üc üc üc
;cc +c ;c cc3 c (cc= cc c ccc +cc c cc= c
c
Desarrollo etapa externa üc -cc= ccc3"cc üc % cc;+c8 c=cc6c ccc c3cc c c üc ,c;c cc c c cc (ccc +c üc ;c c cc9ccc c;c üc üc üc üc
;cc +c ;c cc3 c (cc= cc c ccc +cc c cc= c
c c@cQc BJAcc cc c c c c9c c cc
c c ((3c c @ c c c c c c c K Ac % c c c c c c c c c c c c 6c c 6c c c c c .3c c c +c c @c c c c FAc c c c
22 | P á g i n a
+cc cc cc 6cc( cccc cc c ccc c ccc ccc3 c" cc c c cc:c üc cc=c cc ;c c c c c( c üc ccc cc ;c c c cc( c
c Determinación de las necesidades de la red
c cc =c6cc ccc 3(c ccc cc c c c "c c c c c c c c c ( c c c ( c = cc 3ccccc:c üc üc üc üc üc
*c ?cccRc ccc Rc ccccc Rc ?cc c c Rcc c ccRc
c La planeación üc c c c( c(;cc üc * cc ccc cc cc;c üc cc cc ?cc cc c=c cc;cc
c c1c c ccc 1c3;cccc c cc( 6cc
c c c c c c c ( c c c c c c + c=c cc( c=c c ? cc(c*c cc3 ;cc( c c 3;c c c c c c c c c c c c c c c 3 +c c c +c c +c =c c +c c c =c c =c c c c c c c c
6c c =c c c c +c c =c c c c c ( c ?ccccc=c=cc c c c cc c c c c c c c c c c c c c c c c c 6c c c cc c c 3 c 8 c c c c c cccc c*c c cccc c;c cccccc(c;cc
Naturaleza de la planeación
2` | P á g i n a
c c cc ;cccc+cc8 c c c c :cc üc üc üc üc
% c +cc+ c=cc cc % c 9c cc cc cc % c(;+c c3cccc c
c c
! Elaboración De Un Cronograma De Actividades c ( c c c c c 3c c c c c ( c c c c c c +c =c c c c c c ;c c c c =c c c c ;cc cc+cc c * cc ccc cc ccc( :c &c *+cc :c &&c 3+cc c &2c *+cc c &c .(;+cc c &c - (+cc cc c 2c ;+cc :c 2&c 3+cc cc cc 22c 3+cc c 2c 1ccccc c 2c ccFDc 2c - +cc 9c 2!c - +ccc@ cc +Ac 24c +ccccc c 2$c * cc cc c c (cc:c &c * cc +c 2c (cc +c c * +cc c3;c c c
! Diseño Conceptual Por Dispositivos cc1c ccc ccc cc 3cc c c3 +c=cc ccc cc c cc ccc
ccc c cc
;ccc1cc c cc
2G | P á g i n a
*c c cc c ccc3ccMJc%(cF?86c c*c(6c " c c cc;cccc cc c c 6c c c ";c c c +c c c c 3 c c c c
6c=c c c9cc cccc c c c MJc %(c F?8c c c c c c c c c c cc(c*6ccc*c(c=cMJc- 6cc"cccc c c cc2c7c%c c c c 6cc c c cc c c
?cc- c c (9c cccccc cc c 6c c c c cc
?cc c cc6c cc c"=c ccc6c cc c=c"c=c c cc
9c cc c +c cc c cc c c c c c 6c c ?c c c O c ?c c c c cc c c(+ccc-*ccc c" cc 6c c cc cc " cc cc c-*c 6cc( c=c ccc c 3c cccc *c cc;c c1c cc cccc cc c cc
;ccc;+cccc c 6c9c c ?c c 9 cccc cc
;c
! Diseño En Base A Planos Con Especificaciones c*ccc +c(36c cc c=c 8 6ccc cc +cccc6cc cc c:cc üc cc1cc9ccc c( cc üc
cc c üc c=c c
c c c c cc c" cc ccccc1c:c üc F;+cc c cc1cc üc ;+ccc cc1cc üc c1c (c=c ;c c c =cc8ccc c( c c c c c c @16c 6c 6c 6c c Acc üc . ;+cccc1ccc= c
2! | P á g i n a
c c 6c c 1c c c c c c c +c @ c c (cAcc1ccc"c(>c cc ccc c ccc
;+ccc (c
Red Sencilla Sin Punto de Acceso (" Access Point") cc c
c* c cc c c c96cc cc c c c ccc
c* cc3( cc cE "Ecc;c c cE3 Ec
Red sencilla Con Un Access Point c c c c 3( c c 3 c c c E3 Ec c ? cc +c c
c* c cc c ccc c c c c c c c c c c =c c c 6c c c @c(Acc
c@c
Acc 3c cc cc ccc- cc c cccc c
6c c ?c(cc-*ccc* ccc c ccM *c
Puente ("bridge") entre una Red Alámbrica y una Red Inalámbrica c c c c c >c c c c c c c c (6c c * c c c (c c c c c c
c c =c c c c cc
Ruteador Cable/DSL con Ethernet Alámbrico y Conexión Inalámbrica Interconstruidos ( c
c =c c c c 8+c 6c c c c c c
6c c c c c c c c c c c
c ?c 3 c c ccc ccc( c cc c
cc =c c=c c cc c
ccc"6c cc
3c c c c c c c 3c c c c C 6c c c c c 3 (c@DBAcc
Router DSL/Cable más un Punto de Acceso en la Misma Red %c c((c c* c cc cc " 6c
;cc cc c c @#(Ac c
c c 5%c c c c c
c c c c cccc- cc ccc ccc* c c cccc " cc c c3 6cc
c c c c+c-*ccc
c (c c cc c
ccccc=ccc cc ?cc
c
Access Point pipo Ruteador
2£ | P á g i n a
c ccc cc c8+c3 c c c
ccc"cc
cc ccc ccc
c c c
6c c c c 3c c c c 3c c c C c @ A6c c c c c 3 (c ccc
c* cc ccc c
! Instalación Y Administración Básica De Una LAN Pasos a Seguir para la Construcción de la Red üc cc*.) .cc üc c?cc üc c ?cc
c üc c?ccccQccc üc c?cc% cc cc üc c ?cc% cc7 +cccc üc c ?cc ;+cc üc * cc üc *cc üc 1c=c3+ccccc üc +ccccc üc 3( +ccccc c c üc c3( c ccc c :c *5-*cc üc - +cMBcc üc c 8+cc- cc üc 3( +c%cc üc 3( +c c üc F cc cc
c c +c c c c c c c ?c c c c c c 6c 3 6c ( 6c c c =c c c +c c =c c c % c c:cc üc Fc c c c c +c c c c c c c c c=c 6cc +cc c=cc cc c üc Mc c3 cccc=c
;c cc 6c cc 6cc"c cc üc c cc cc cc( c=cc c ccc üc Mc c c c ( 6c (?c c c c c
;6c "c c ccc c cc3 +c c ccc üc
c c =c ;c c c c c c c c c c c6cccccc c
c 2[ | P á g i n a
c +c c c c c c c c =c 39c c c c c c c c cc( :c üc F;ccc16c c;6c 6c (c=c(3c üc - 8+ccc cc6c cC 6c c=cF c üc c cc > c cc +6c cc ;6cc86c3c + 6c ? 6c6c3c=c c üc c cc +6c =c *5-*6c%*G5-*G6c% 6c.%-c üc c c c "c c 6c c .%6c B6c CBc 6c ,S%6c .%52c üc c c c 6c =c " c &'c c 6c D c " 6c Jc (6cD-6c&''(/ =cc=cDc"c üc Lc ? cc +6c+(cc96c c
c c cc +cccccc( cc:c &c
2c c c c !c
+c c 3 +c c c c c c c =c c c c c 3 +c c c c c c :c 6c
c =c c c 3 +c c c 3 +c c c c 3 c c c c cc c +ccc3 +cc c cc cc c ccc cccc cc c cc cc c c c c c c c ccccc +cc(ccc=c
cc cc c3c =c
c c 9 c3 cc c cc +ccc ccccc c c 6c ;c c c c c =c c c c c c c c c:c ccc ccc c c c c
! Instalación De Cableado Bajo Las Normas pIA/EIA Cableado Estructurado c" c c ccc3ccc"cc c ccc =c c c c +(c 9c c c "c c c3+6c c 6c c ? 6c (396c ( 6c 6c 9 c c c c 3 6c =c c c c c3c
;c
cc c3ccc cc c cc( +c ;6cccc 8+c c 6c=ccc cc c3 cc c@;6c 6c
8 6c (A6c ; cc"cc3c ( cc;c 2Ñ | P á g i n a
c c c c c c c c 6c ;6c 6c 6c c =c c c c c c c c c c 3 cc c(?cc c3cc cc 9 cc +c c c c c c "c c c c c c c 3 c cc cc(ccc ccc c c c c (c c 3c c c c c =c c @3 c (?A6c38cc +6ccc c =c3cc +c
Algunas Normas del Cableado Estructurado üc üc üc üc üc üc üc üc üc
%-5- 5- /!$/#c c c c c 3c c @+ c cc Ac - 5- c!$/#&c c(c - 5- c!$/#2c ccc cc ;cc - 5- c!$/#c cc6cDc+ c %-5- 5- /!0/ c ccc=ccc +cc3c c@ c
ccAc %-5- 5- /4'/ c cc-3 ccc c %-5- 5- /!'!/ c c c +c c -3 c c cc3c c %-5- 5- /!'4c cc cc cc cc cc cc3c c %-5- 5- /4$c c /* c c c c * c 8 c c
c
c Componentes del Cableado Estructurado Área de prabajo cQccc 8 ccccc c@.Ac" cc +cc
c c c c c c c c 1c c c c c c c c c c c c c c 6c c c (6c c c c =c 3 c c c c c c c c ?36c D86c * T6c - 6cCc c@c Ac c+cc1ccc c ccc cc&'c 2c=c ccc c cc ccccc Cableado horizontal c c c c c .c " c c c c c - =c c 6c cc8+c=ccc c ccc cc ccc cc cc c cc (9c cc ccc ccc(>cc c cc c
;c c ,*c c c *c &''c U6c %*c c 2c c &'c Uc =c Dc P c c c c 3c !25&'c 2 | P á g i n a
( c:c üc c 8 c cc.c=cc* "c*ccc0'c c cc c cc ?c
;c üc ccc c cc cc c üc %cc ccc c c c? 6c c3 6c 6cc6ccc c c
c Cableado ertical cc(cc cc cc 6cc cc c=cc c %c cc,*6c%*6c=c3c+ c c=c c c
;c=c c üc ,*c@;A:c$''c cD.c :c2''' c üc %*c@;A:c4''c cD.c :c'''c c üc ,*c@ A:c0'c c
c %c c (9cc c F8 ccc cc8:ccc c F8 c c8c ccc=cc c Cableado Backbone cccccc c cc ccc +c=cc c c cccc c c + c c c c Jc c c 8c c c c cccc36c cc c=c cc c - =cc8+c c ccc3cccc 6c =c cc
+c @A6c c c c c c 8+c ;c =c c c c c (9c c c c c ?c c
;c c
(9c c c c c 6c c c 8 c c cc 96c c c (+ccc1c Centro Principal de pelecomunicaciones cccc c3c
;ccc c8 cc cccc cc cc c ccc cc cccc cc c? c c c c c c c c c c c c ;c c (c cc 6c cc c =c cc 8+c c
` |Página
Creación de Cables de Red y erificación CÓDIGOS DE COLORES PARA CABLES UpP SEGUN EIA/pIA !-A Y EIA/pIA !-B Códigos de colores cc,*c cc cccccc c:c üc @#5 ; A/ ; c üc @#5A/c üc @#5LA/Lc üc @#5 3?A/ 3?c
c c c O/c c $c "5c c c c c c c c c @c
? c Oc c c ( c OJAc ?c 8 c 6c c !c c =c c c c @c 6c c c 3+c c c "c c c O/&&Ac c c c $c c c c c &c c $6c c ; c c "6c c c cc ccc c cc(" c@c cccc Ac c +(c c c (>c c - 5- c !$/ c =c !$/#c c "c c c ,*c
;c cO/c@$cAcc ccc( c c *c "c c c c c 6c c c c c c
c c c 6c c c c c c c c c Oc c c c !$ c c c8 cc 6cc6c c8 ccc c!$#c &c ; c c cc cccc 2c c c 1c ccc ccc@8c2c Ac c ; c 8 c &2c c c c c c =c c c c c Occ cc
;cc cc
c cc c c9c &c %( c c c c c c c c 6c c c c =c ;ccc 2c *c c c c c c c 8 cc c c c c !$ c =c ccc!$#c c c( c 6cc;cc"ccc ccc3+c c c
! Instalación De Sistemas Operativos De Red `Ô | P á g i n a
c ( c c c c c c c c c c 6c c c c c c c3 cc c c ccc%ccccc(>c c c c 6c c c c c c c =c c c c c
;c c c c c 3 c c c c c 6c c c c 3 Bc c c c c ccc c1ccc c cc cc (c c?c Cccccc c c3 c=c3 cc c ccccc 3 Bcccc c ccccc c cc cc c c c c c c c ( c c c 3 c c c=cc3 c c c 3 Bc c c c c c c (c c c > c c c c c 6c =c CBc 2'''c %5*36c CBc c %5CJ 6cCBc050$5Fc=c cJc c 3( +c @ c c c c =c c c 6c c c c cc3 cc Ac c c cc c*c 6c c
c c cccc cc3( +c c cc ccc cc cc
Coordinación del software y del hardware c c cc c ccc +c cc c=cc( c@c Ac c c
c c c (+c =c
;+c c c c "Bc c :c üc üc üc üc
F cc cc *,cc cccc c3?cc
c c c c c 6c c c c c c c c c c c =c c 3 Bc c c c c c c c c ?c c c c c c cc =c c c cc c ccc3 c c cc cccc3 c c
Multitarea ,c c c 6c c c c6ccc c c cc
c c c c c c c c c ;c ,c c c c c c
c c c cc (c%cc> cc cc cc> c c6cc cccccccc c c cc ccc 6c c" c cc cc c c c c 6cc cc c c ccc ccc;c 8 cc ? ccc :c
`2 | P á g i n a
üc
ccc c c c6cc c c c c c ccccc+cccc cc üc %c c @ Ac c c c c 6c c c c c c c c c c ( c c c c c c c c c c (>c c c +c c c c c c c c c c c
c (>c c ( c " c c c ( c c c"=ccc cccc c c c c c c c c c c c c +c cc c c c=cc% c. ccc@ c ccAc *c 6c c c +c c 6c c c c c c
c c ccc *,cc c ccc c ccc
Componentes software c 3 Bc c c c c c c c c c 8 6c c c c c c c c c =c 3 c c c c . c c 6c cCBc52'''6c (cc c ccc=c c c c c c c c c c c (c c ( c 6c c c c
;+c c c % c . c c c c c c c c c c c c 3( c cc c 3 c %c c c c cc ccc c cV Wc c c3 c c 3 c c c c *c 6c c c Cc c c @c 6cccc Accc Cc=ccCBc52'''c ,c c cc:c üc c cc c=c3?cc üc cc3 cc cc3?c=c cc üc *c( c ccccc c=c3?c
c cc ccc3 Bccc:c üc c3 Bccc cc ccc cc üc c3 Bccc cc cccc
c Software de cliente c c c
+ 6c c c cc c c c cc cc ;c c 6cc +c cc ?cc ccc c" cc *,cc c *c 6cc cc c cc cc cccc c6cc *,c c =c
c c +c =6c c +6c c c c c c c cc c c %c (6c c c c c 6c c c c c c +c c
;c c c c c c c c c c c c c 6c c c c c c +cc c c6cc(6ccc ccccc=cc9ccc c
cc c c c9cc;ccc c
`` | P á g i n a
Redirector ,c ccc9cc ccc3 Bcc6c c c cc cX%"YccX(cc Ycc cc c 1c+cc +(cc c% c. ccc :c üc - c ccc cc üc c c c c c c c c c c c cc c (cc ?ccccc cc
c c cc cccc c c c cc c(cc +c c c cccccc cc cc 3c c 6c c c c;c c +cc ccc c cc +c=cc 9ccc c c c c c 8+c c c c c c c =c c c ccc c cc c6ccccc ccc c
Designadores 6c c c c c 3 c c c c c c c c c c c c c =c (c c c cc;c*c 6ccCBc52'''6c9c
;ccc c c c c c c 8c c CBc 52'''c c c c c c c c ?6c c(c c cc(+cc c cc(c c cc cc c cc6cc3 c cc c ccccccc c 3c=c;cc c ?c;c c( ccc(cc
ccc ccc
Periféricos c c c c c c c 3?6c c ( c c c 9c c c c cc +cc(ccc c(c=cc9cc ?ccc c c c c c c 6c c c c c c c +c c c c c c c 6c c 3c c *&c c .F&c c c c c (c c ccc c c c cc +c(cc*&c=cc 9ccc ccc3c c
;+cc c ccc cc cccc +c cc c cc3?cccc cccc8+cc c*c 6c cccc cc c cc6cc c+c ccc(cc c c(ccc;+cc c =cc c cc c c
Software de servidor
`G | P á g i n a
c 3 Bc c c c c c c c c 6c =c c c c 6c c c c c =c 3?c c c =c 6c ;c =c c %c c c c c c c c c c c c c c c c9cc +ccc6cccccc"c c cc c c%ccc +c=cccc cc c
Compartir recursos c c c ? c
;c c c c c c > c c cc c ccccc =9ccc c cccc +c c 6cc ?c cc(cc +cccc c +cc c =:c üc * c3 c cc3 cccccc cc üc +cc c c c c c ( c c c c c
;c c c ccc c c
c *c 6c c cc c3c c c cccccc3 c c c c c @"A6c c 3 c c c c c c %c (6cc cccc c ?cc3 c :c üc üc
( c c+cccc ( c ccc=c;c 3cc?cc
c Gestión de usuarios c c ccc cc cccc cc6cc ( c c 6c c c c c c c c c c c c c c cc cc c
;cc% c. ccc:c üc
c cc 6c cc c c c c6c cc ?c c
;cccc üc (cc(c cc ccccc üc c ccc cc c c cc c cccc c *c 3cc ccc( +cc cc c(c6cc c ccc c c +c c ( c c c F c c 3+c c c c c ( 6c c c c(c cc ( ccc cc c( c
cc c 6c(cc( c c c c cc cccc c c 6cc c c(c c c cc( c6cc c c c=c"c
Gestión de la red ( c c ccc;c =c" cc( +c c= cc c cc cc cccc cc c c c c c 6c c " c c ( +c c c 9 c c c c c `! | P á g i n a
c=c c c9 cc c(3ccc c3 c c c" 6c c cccc c cc+c c cc cc c (c c9cccc c
! Configuración De Las Estaciones De prabajo ,c +cc c@c(?cBJ Acc c
c c3 ccc c c c c c c =c 3?c c c c c 3c c c
c 6c
c c ccc=c c39 c cc ccc c c cc ( ccccc ccc=c cc c;c ccc c3 6cc c c3c36c 6c c=c c;ccc c c 3c c c c ( c c c c =c 3( +c c c c c 6c c=c c :c üc c
cc ccc c c(>c c3 Bc@ (cc c c3 Bcc Ac ccccc=c cc cc cc c c üc cc c@J c=cAcc cc3 Bc c c =c c9c cc> c ;+cc c=cc3+cc c üc c c"c c c3( +c c@+c-*6c %6c c c c c 3 c 7 B=6c
c 6c Ac c c c c
c c c 6c c c 3( c c c c +c -*c
c üc % c c c c c c c 38c =c c "c c c +cc +c cccc3 +c ccc üc c+ cc ccc=c3( 6c=c c c c (c( c üc %c c c
;c c c c 3 c c 3 c c c c 3( +c c=c cc 3 c üc c c"c cc c cc(( c c
cc3 Bc cc"Bccc c üc c c "c c c c c c c c (c c c "cc(c üc c c c 3( c c c c c c *5-*c =c c c c c cc@-*G5%*G6c 6c%F*6c Ac
c c c c
`£ | P á g i n a
! Administración De Cuentas De Usuario, Grupos De prabajo ,c c c c c c c c c >c c c c c c 6c 3?ccccc+ccc cc cccc cc cccccc+ccc c cc cccc cc c c c
c c c ( c c c c c c c c c c
;cc c+ c c c ccc ccc c c*c 6c c cc> cc"ccc c c c cc c+ccc 6c c c c c c
;c c 6c (c c c c c c c c c c cc c c c c"cc c 6cc ?cc c cc c c=cc3( +cc"cc cc 8 cc cc cc :c üc Cuentas creadas por nosotros como administradores del dominio:c c c c 3 +c c c 6c =c c c =c c 1c c
6c c c c c c c +c c c c =6c c c c 6c (cccc ccccc üc Cuentas predefinidas o incorporadas: %c c c c c c c +ccCBcc c c:ccc üc Invitado (Guess):cc cc- cc
;cc3ccc c cccccc=c cccc cc c c cc*c 6c c c c c ccc c c
c c c c c c c - c c " c c 3 c cccc" c c cc ccc c( c*c =c( 6c cc cc c c=c9(c c 1ccc üc Administrador (Administrator):c c c c c c
;c c cc3( +c(cc c=cc cc c c ;c cc 6c cc+cc 3+cc cc c=cc ( 6cc +ccc cc( 6cc+cc 6c=cc (+cc c=c"ccc cc cc c (ccc c ccc üc Otras cuentas:c c c c c c c c c c 3c *c 6c c c c --%c c c c c -,%Z%c c8c+ c
c *c( c c =c(cc( 6cc c cc c c c c
;c c ;c c c c 6c c c c c c c c=c+cc c+c c cc;c c c %c cc cc cc cc cc ccc üc
cc cc :c,c cc cc ccc cc cc cc c ccc c cc cc c 6c c c c c c c c c c c c c c c c c * c c c c c c c c c @# Ac c c cccccc cc c c@% FAc,c;cc `[ | P á g i n a
c cc ccc* 6c c c ccc+ccc cc c cccc* cc( c
c" c ccccc c c c c c c c # c ?c ;c c c *
; cc c c c %c c c c c c c c c c c
cCBccCJ c=cF3 cCBc0cc cc M ccCBcc%cc" c ccCBc 0c =c CBc c CJ c c c c c /.Fc c +c c CBcc%c'ccc
:c[ [% [C0cc[ [% [C cc üc c c c :c c c c c c c c c c c ccc c c c
cF3 cCBccCJ 6c cc cc c cc c cc c6ccc+ccc c c c c c c c c c c c c c 6c c
c c c c +c =c c c > cc c c c "c c c Grupos Globales y Locales ,c( cc c cc cc cc(+cc c cc cc c ( c c c ? c c c "c =c c c c ( c c ( c 3cc +ccc c ? c3ccc"c c c > c c c *c 6c c c c *3Z&6c *3Z2c =c *3Zc ccc c c cc cc c 6cc (c c(ccc ccc"ccc cc cc c( c c F 6c 1c c "c ( c c c c =c c c ( c "c c c c c c 6c c c c c c c 6c c c 6c c c c c (>c c " c c c c c c c c c ?c c c (c c "c c c 6c c c "c c 3c c c c c c c (c c ( c c @( c c c c c c 3 c c c c Ac c c c c =c c c c c c c 9c"cccc c cc cccc( c*c 6c c ( c 3c c +c c c c ? c 3c c c c c c > c c c +c c ( c c ;c c c " c :c cc, cc c
Grupos Locales c( ccc
;ccccc c cccc c cc cc c cc cc c c( c ?c c c c c c 6c c 6c c 6c c "c c c c c ( c c
?c c
;c c c c c c c "c c ;c c c c c cc cc"cc c ccccc( c=cc +cc "cc( cc c3 cc c=c( c c cc c c c c c c c =c c c 6c c c c 6c c c ccc3;cc c c(>c( cc=c+ccc c (c c=c"cc cc cc
Grupos Globales `Ñ | P á g i n a
c( c (cc
;cc(;c cc cc 6c c c3 +cc +c((3c%c c 6cccc > c c c c cc c c c cccc c8 cc c 6c c((cc c ( ccc c ccc"cc c c%c
c ccc c cc ccc ccc ccc c c( c(c c3 c+cc cc c c c@c cc c cc( Ac=cc c c(>c cc( c
Administración de cuentas 8 c c=c" c c c c c
;cc;c c
c c c 3 c 3 c =c c c c c 3 c 3 c c c ( ccc c=c" :cc üc c cc((c c cc ccc üc ;c c ccc cc cc üc 1cc c ccc cc (cccc üc F c c c c c c 3 c c c c c c c cc c=cc cc üc % c c c c c c c c c c 6c c c cccc+ccc üc c ( c c c c c c c +c c c ccc c.cc :cc üc c cc( c c c ccc c %ccc1c=cc ccc( ccccc üc c c c ( c .c c c c 6c c =c 3c c c 6c ( c (c =c ( c c c 6c c c 3cc( c c=c.ccc
c Plantillas de cuentas de usuario c cc cc ccc c cccc c c c c %c c c c c c c c c c c c c c c c c *c 6c c c c c c ccD +c cc cc( cF 6c cc c c ccccc ccc( c*c
;c c c=cccc
c c c 6c c c c c c c @ c Ac =c (c c c c c =c c 1c c c c c c ( c c c ccccc c cc :c üc +cc üc c cc cc 1ccc( ccc+cc üc c cc c cc 1cc üc üc üc üc
c 1c c cc 7 cc *3cc Mcccc+c@+c cc Acc ` | P á g i n a
üc -cc@+c cc Acc üc c@+c cc Acc üc Fc
c c"c=c ccc c cc c ccccc % (ccc :c üc
c c c c c 3+c c 6c c 6c c c 6c 6c36c cc üc %c c c c cc cc 6c c c c c "c c c c +c 6c 3c c c c
c=c c ccc üc c c c c c c c c c c c c 3? 6c c c c c c =c @ZA6c c c 3 c c c cccccc ccc cE cc, Ecc c c
! ! Recursos Compartidos Lc 19c=c(;c c c ccc c( cc c ;c c "c c 3c c ( +c c c c c c c ccccc c cc"c86c=cc""c8 c c 6c c c c 3 c c c c c c c
c c c c c c c (3c c c c c c c c c c c 6c c c c c c c c c c =c " c c(6c c cc
+c 6c :c üc
c c c 6c c c 6c c c c c c c c c F "c ( c "c 3c c c c c c c c c c . cc=ccCc c39c c cccc 93cc c üc ,ccc cc c3 Bccc cc cc c c c3 c c cc +c cc c=cc c c 6c c c c c c c c * c c c c c c c 6c c c " (?6c c c ( c c c 3 c c c c c .%c c c (6c c c " (?cc üc ,c c c c 6c c c c c c c c c 6c c c c cc c c cc396c" c c c ccc cc c c9cc ?cc- c üc ,c +c c 3 Bc c c c V BWc c + c c c 3 Bc c c c 3 c 6c 3 c c c c c +c c G |Página
cccc cc B6ccc( c cc cc cc
+c c%c 6cc +cc cc c9c c c cc3 Bcc(6cc"=c c3 c>cc Bc üc cc ccc>c cc;c=c(;cc cc cccc
c c c c c c c ?c c c c c c c c ?c c ;c c c c ( c c c c c ( cc ?c cc c ccc6cc8 c cccc cc c*c6c c c cc
+c 6c 9c V Wc c c c c c c
;6c c (c ccc ccc 6c=cc ccccc(c üc c c c c c c c 6c c c c c (c c c c c c =c " c c
;c c c c c c 3 c c =c c 3 c 6c c c c c c
c c c 3 c c c ( c c c c "c 3 c c c c c +c c c 6c c "c
c=c "c( c3 cc c"cc ccc *c cc c cc c c cc cccc cc cc3 c cc cc c
GÔ | P á g i n a