LINUX ADMINISTRATION 1 www.educlash.com.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Enabling Secure Internet Access with ISA Server
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
1 Enabling Secure Internet Access with ISA Server.
Linux Operations and Administration
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Web Proxy Squid Setup. A proxy is a host which relays web access requests from clients a proxy server is an application program that acts as an intermediary.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
UNIT - III. Time Server It is a daemon that runs on one machine and to which other systems synchronize their system clocks. It is a service that provides.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
The Intranet.
Network Time Protocol Objectives Contents to learn how to setup ntp
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America BDII Server Installation and Configuration.
E-infrastructure shared between Europe and Latin America Introduction to the tutorial for site managers Vanessa Hamar Universidad de Los.
Implementing ISA Server Caching
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 10: Windows Firewall and Caching Fundamentals.
WEB SERVER SOFTWARE FEATURE SETS
Network Time Protocol Objectives Contents to learn how to setup ntp
Linux Operations and Administration
12th EELA TUTORIAL - USERS AND SYSTEM ADMINISTRATORS FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
NTP in UBuntu. The Network Time Protocol (NTP) is a protocol for synchronizing the clocks of computer systems over packet-switched, variable- latency.
LINUX - SAMBA
Presented by Michael Rainey South Mississippi Linux Users Group
Web and Proxy Server.
Chapter Overview Understanding Windows Name Resolution Using WINS.
BUILD SECURE PRODUCTS AND SERVICES
Application layer tcp/ip
Module 3: Enabling Access to Internet Resources
The Intranet.
Enabling Secure Internet Access with TMG
CONNECTING TO THE INTERNET
Internet and Intranet.
E-commerce | WWW World Wide Web - Concepts
DHCP server & Client Objectives Contents
E-commerce | WWW World Wide Web - Concepts
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Understand Networking Services
Welcome To : Group 1 VC Presentation
Internet and Intranet.
IIS.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Internet and Intranet.
AbbottLink™ - IP Address Overview
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Firewall Installation
Internet and Intranet.
Presentation transcript:

LINUX ADMINISTRATION 1 www.educlash.com

UNIT 3 CHAPTER-2 2 www.educlash.com

CHAPTER 2 : ADDITIONAL NETWORK SERVICES Configuring a Time Server Network Time Protocol (NTP) is a protocol used to help synchronize your Linux system's clock with an accurate time source. that allow the general public to synchronize with proper time They are divided into two types Stratum 1: NTP sites using an atomic clock for timing. Stratum 2: NTP sites with slightly less accurate time sources. It is good practice to have at least one server on your network be the local time server for all your other devices. 3 www.educlash.com

HOW TO CONFIGURE NTP SERVICE Download and Install The NTP Package Download ntp-4.1.2-5.i386.rpm and install rpm The /etc/ntp.conf File The /etc/ntp.conf file is the main configuration file for Linux NTP In which you place the IP addresses of the stratum 1 and stratum 2 servers you want to use. www.educlash.com

USING A PAIR OF SAMPLE INTERNET-BASED NTP SERVERS: STEPS TO CREATE A CONFIGURATION FILE USING A PAIR OF SAMPLE INTERNET-BASED NTP SERVERS: 1) First we specify the servers you're interested in: server otherntp.server.org # A stratum 1 server at server.org server ntp.research.gov # A stratum 2 server at research.gov 2) Restrict the type of access you allow these servers. In this servers are not allowed to modify the run-time configuration or query your Linux NTP server. restrict otherntp.server.org mask 255.255.255.255 nomodify notrap noquery restrict ntp.research.gov mask 255.255.255.255 nomodify notrap noquery Note: mask 255.255.255.255 statement is really a subnet mask limiting access to the single IP address www.educlash.com

4) how to give full access without any restricting 3) If this server is also going to provide time for other computers or network.  restrict 192.168.1.0 mask 255.255.255.0 nomodify notrap Note: You do so with a modified restrict statement removing the noquery keyword to allow the network to query your NTP server 4) how to give full access without any restricting  restrict 127.0.0.1 It will give full access to localhost 5) now save the file and restart NTP service www.educlash.com

HOW TO GET NTP STARTED To get NTP configured to start at boot, use the line: [root@bigboy tmp]# chkconfig ntpd on To start, stop and restart NTP after booting, follow these examples: [root@bigboy tmp]# service ntpd start [root@bigboy tmp]# service ntpd stop [root@bigboy tmp]# service ntpd restart Doing An Initial Synchronization ntpdate command is run three times to synchronize smallfry's clock to server 192.168.1.100, but it must be run while the ntpd process is stopped [root@smallfry tmp]# ntpdate -u 192.168.1.100 7 www.educlash.com

PROVIDING A CACHING PROXY SERVER In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. www.educlash.com

A PROXY SERVER HAS A VARIETY OF POTENTIAL PURPOSES, INCLUDING keep machines behind it anonymous, mainly for security speed up access to resources block undesired sites log / audit usage, Internet filtering to access content scan transmitted content for malware before delivery www.educlash.com

TYPES OF PROXY Forward proxy A forward proxy server will first check to make sure a request is valid. If a request is not valid, or not allowed (blocked by the proxy). If it is, the forward proxy serves the cached information. If it is not, the request is sent through a firewall to an actual content server which serves the information to the forward proxy. 10 www.educlash.com

Reverse proxy A reverse proxy is another common form of a proxy server and is generally used to pass requests from the Internet, through a firewall to isolated, private networks. It is used to prevent Internet clients from having direct, unmonitored access to sensitive data If caching is enabled, a reverse proxy can also lessen network traffic by serving cached information One advantage of using a reverse proxy is that Internet clients do not know their requests are being sent to and handled by a reverse proxy server www.educlash.com

Reverse proxy www.educlash.com

Proxy chaining A proxy chain uses two or more proxy servers to assist in server and protocol performance and network security. Proxy chaining is not a type of proxy, but a use of reverse and forward proxy servers across multiple networks. www.educlash.com

Proxy chaining www.educlash.com

SQUID WEB PROXY The Squid Web Proxy Cache is a fully featured Internet caching server that handles all types of web requests on behalf of a user. When a user requests a web resource (webpage, movie clip, graphic, etc..), Their request is sent to the caching server which then forwards the request to the real web server on their behalf. When the requested resource is returned to the caching server, it stores a copy of the resource in its "cache" and then forwards the request back to the original user. Using a proxy server can greatly reduce web browsing speed if frequently visited sites and resources are stored locally in the cache. www.educlash.com

THANK YOU 16 www.educlash.com