Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2001 ComputerPREP, Inc. All rights reserved. Administering Linux Internet Services.

Similar presentations


Presentation on theme: "© 2001 ComputerPREP, Inc. All rights reserved. Administering Linux Internet Services."— Presentation transcript:

1 © 2001 ComputerPREP, Inc. All rights reserved. Administering Linux Internet Services

2 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 1: TCP/IP Configuration

3 Objectives Deploy ifconfig and Linuxconf to reconfigure a NIC in Linux Use the netconfig and netcfg commands Identify the /etc/sysconfig/network-scripts file Use ping options List the uses of the arp, netstat, and route commands Use the traceroute command to discover network paths Enable IP forwarding

4 TCP/IP Configuration Parameters Basic configuration information –Computer name –IP address –Subnet mask –Default gateway –DNS information –DHCP client information

5 Static Addressing Configuration commands Manual interface configuration

6 Dynamic Addressing DHCP –Client/server node configuration –BOOTP

7 Testing Network Connectivity The ping command Address resolution and ARP The netstat command The route command Traceroute

8 Using Multiple Ethernet Adapters Adding multiple adapters IP forwarding –Enabling IP forwarding –Editing the network scripts directly

9 Summary Deploy ifconfig and Linuxconf to reconfigure a NIC in Linux Use the netconfig and netcfg commands Identify the /etc/sysconfig/network-scripts file Use ping options List the uses of the arp, netstat, and route commands Use the traceroute command to discover network paths Enable IP forwarding

10 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 2: The Domain Name System

11 Objectives Explain the DNS Identify DNS components List the common DNS record types Define reverse DNS lookup Use nslookup and other DNS troubleshooting tools Implement DNS on Linux

12 Domain Name System Address resolution

13 Domain Name Space Root level Top level Second level –Subdomains

14 Accessing Hosts by DNS Name Fully qualified domain name (FQDN) DNS components DNS server types

15 Setting Up DNS Zone files DNS records Reverse lookups and the in-addr.arpa trick

16 Probing DNS with nslookup BIND Basic nslookup operation –Interactive operation Finding other record types Changing servers Listing domains (zone file transfers)

17 Setting Up DNS in Linux Named.conf (BIND v.8) Named.ca Named.local Forward zone Reverse zone

18 Troubleshooting DNS Utilities Additional tools

19 Summary Explain the DNS Identify DNS components List the common DNS record types Define reverse DNS lookup Use nslookup and other DNS troubleshooting tools Implement DNS on Linux

20 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 3: Modem Configuration

21 Objectives Identify tools to configure a PPP interface Configure a PPP interface to make outbound connections Configure a modem to listen for and service inbound connections Configure a PPP logon script List steps for initiating an ISDN connection

22 Modems and Interfaces PPP ISDN Additional types of dial-up interfaces –Dummy –SLIP –CSLIP Selecting the correct modem Inbound and outbound access

23 Common Configuration Options Automatic reconnection Startup program Connection software

24 The Modem Chat Sequence Hayes commands Unsuccessful sessions Authentication and the chat sequence

25 PPP Configuration PPP configuration files Using Linuxconf Using Kppp Creating a new account

26 Activating the Interface ifup ppp0 Kppp Linuxconf

27 Listing the PPP Interface Monitoring interface activity

28 Troubleshooting the Modem Minicom utility PPP HOWTO auth required /lib/security/pam_pwdb.so module

29 ISDN and Linux ISDN adapter Linux utilities to configure ISDN support

30 Summary Identify tools to configure a PPP interface Configure a PPP interface to make outbound connections Configure a modem to listen for and service inbound connections Configure a PPP logon script List steps for initiating an ISDN connection

31 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 4: Configuring a DHCP Server

32 Objectives Identify the usefulness of DHCP Configure a DHCP server Configure a DHCP client

33 How DHCP Works Discover message Initializing Offer message Selecting state Request message Requesting state Acknowledgment message

34 DHCP Implementation Dynamic allocation Manual allocation (client reservation)

35 Summary Identify the usefulness of DHCP Configure a DHCP server Configure a DHCP client

36 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 5: Configuring Apache Server

37 Objectives Stop and start Apache Server Create aliases Redirect URLs Understand CGI and Perl Enable access control Create a virtual server

38 Apache Server Concepts Document root directories Apache Server RPM files –Controlling the server

39 Administering Apache Server Apache Server processes Stopping and starting httpd Configuring Apache Server Merging all three files Graphical user interfaces and Apache

40 Apache Server and Perl Apache Server modules –perl_module –php3_module –php4_module

41 Controlling Access Creating a password file Adding users Additional options

42 Virtual Servers Order of entries Giving the correct name Additional server directives

43 Summary Stop and start Apache Server Create aliases Redirect URLs Understand CGI and Perl Enable access control Create a virtual server

44 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 6: Sendmail

45 Objectives Describe how Sendmail uses SMTP Differentiate between SMTP, POP3, and IMAP Stop and start Sendmail and configure parameters Create mail aliases Configure mail forwarding Control access to Sendmail Troubleshoot Sendmail

46 E-Mail Agents Mail transfer agent Mail delivery agent Mail user agent

47 E-Mail Delivery Methods Central server Individual machines

48 E-Mail Server Terminology Masquerading Aliasing Relaying E-mail hub Combining aliasing and forwarding MX records

49 The Simple Mail Transfer Protocol SMTP headers

50 Post Office Protocol 3 user pass list retr dele quit

51 Internet Message Access Protocol IMAP and e-mail clients

52 Stopping and Starting Sendmail System V scripts ps /var/run/sendmail.pid file

53 Miscellaneous Configuration Issues Modifying sendmail.cf Common client modifications Aliasing with Sendmail –Machine aliases

54 The /etc/mail Directory The access file Forwarding e-mail to a local user Forwarding e-mail to a remote user The.forward file

55 The Mail Queue Viewing the mail queue Deleting queued messages Managing queued messages

56 Troubleshooting Sendmail Using the mail command The /var/log/messages file

57 Enabling POP3 and IMAP IMAP and POP3 daemons Concurrent servers

58 Summary Describe how Sendmail uses SMTP Differentiate between SMTP, POP3, and IMAP Stop and start Sendmail and configure parameters Create mail aliases Configure mail forwarding Control access to Sendmail Troubleshoot Sendmail

59 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 7: Network Monitoring

60 Objectives Use tcpdump to examine all network traffic Obtain a graphical display of all network traffic View a network activity matrix Gather network use statistics for your own interface Identify the type and amount of traffic passing through a network

61 Packet Sniffing Ethereal Network Analyzer –Dependencies Sniffit Promiscuous mode –Switches –Running tcpdump

62 Viewing a Network Matrix HTTP FTP DNS ICMP ARP SSH SMTP UNIX Login Telnet IPv IPv6

63 Gathering Statistics IPTraf Ntop

64 Summary Use tcpdump to examine all network traffic Obtain a graphical display of all network traffic View a network activity matrix Gather network use statistics for your own interface Identify the type and amount of traffic passing through a network

65 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 8: Security Principles, Tools and Practices

66 Objectives Discuss authentication and encryption Explain how PAMs work in Linux Search for commonly exploited file permissions Identify system scanning tools Use shadow passwords Deploy TCPWrapper Control user access to system processes

67 Encryption Categories –Symmetric –Asymmetric –Hash Benefits –Data confidentiality –Data integrity –Authentication –Nonrepudiation

68 Authentication Methods –Prove what you know –Show what you have –Demonstrate who you are –Identify where you are

69 Logon Security and Pluggable Authentication Modules Configuring PAM Remote access and the root account Denying remote access to specific users Time-based access Controlling processor and memory usage The ulimit command

70 System Scanning Finding suspect files Disabling accounts chattr and isattr

71 TCPWrapper Tcpd Syntax for hosts.allow and hosts.deny

72 Setting FTP Logon Limits Creating and limiting classes

73 Incident Response Notify management Break the link or create a “jail” Call the police Contact the hacker Conduct trace routes Delete and replace affected binaries

74 Proactive Maintenance CERT BugTraq SecurityPortal Linux vendors

75 Summary Discuss authentication and encryption Explain how PAMs work in Linux Search for commonly exploited file permissions Identify system scanning tools Use shadow passwords Deploy TCPWrapper Control user access to system processes

76 © 2001 ComputerPREP, Inc. All rights reserved. Lesson 9: Deploying Secure Shell

77 Objectives Describe public key encryption Obtain and install SSH to replace Telnet Use Linux clients to connect to an SSH server Authenticate using public key encryption

78 Secure Shell Security services provided by SSH Obtaining SSH Encryption in SSH Authentication in SSH SSH2 components SSH clients

79 Preparing SSH Components Installing components and starting the server Logging on using SSH Compatibility with SSH1 SSH and DNS

80 Secure Shell and Authentication Exchanging public keys Establishing trust relationships Using the secure FTP client

81 Summary Describe public key encryption Obtain and install SSH to replace Telnet Use Linux clients to connect to an SSH server Authenticate using public key encryption

82 Administering Linux Internet Services TCP/IP Configuration The Domain Name System Modem Configuration Configuring a DHCP Server Configuring Apache Server

83 Administering Linux Internet Services Sendmail Network Monitoring Security Principles, Tools and Practices Deploying Secure Shell


Download ppt "© 2001 ComputerPREP, Inc. All rights reserved. Administering Linux Internet Services."

Similar presentations


Ads by Google