© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

Info to Enterprise Migration Implementation Case Study: SBC Corporation Presented to the Crystal Decisions Regional Users Group for the Bay Area on October.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
NetSEC: metrology-based application for network security Jean-François SCARIOT Bernard MARTINET Centre Interuniversitaire de Calcul de Grenoble TNC 2002.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Improvement of TCP Packet Reassembly in Libnids
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 10 second questions
Communicating over the Network
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Richmond House, Liverpool (1) 26 th January 2004.
Virtualization & Disaster Recovery
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Chapter 1: Introduction to Scaling Networks
ABC Technology Project
WebCafé Slide No:1 World Cyber Cafe Association Brings to You Webcafe A Cyber Café Management Software A Software That Will Boost Your Efficiency For Managing.
Chapter 15 Integrated Services Digital Network ISDN Services History Subscriber Access Layers BISDN WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998.
powerful network monitoring & management solution
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
Chapter 11: The X Window System Guide To UNIX Using Linux Third Edition.
VOORBLAD.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Identifying Our Own Style Extended DISC ® Personal Analysis.
Security Systems BU Communication Systems Slide 1 DCNtech MPCC IO NServerPC Installing and Operating with Multi PC Control  Windows Set-up.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Chapter 5 Microsoft Excel 2007 Window
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
1 VM/Advanced Network Services A New Reference Architecture for VM TCP Services David Boyes Sine Nomine Associates Session V29.
Addition 1’s to 20.
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 Institutional Repository Workshop 1 – 3 April 2009 Presented by Leonard Daniels.
What’s New in WatchGuard Dimension v1.2
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Slide 1 of 29 Community news Slide 2 of 29 Nouvelles de la communauté…
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Chapter 14 Designing Distributed and Internet Systems
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
CpSc 3220 Designing a Database
OPC and the 5000 Connections made even easier! Adrian Oliver iTools Development Team
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Welcome to the GIG Event 1. MICROSOFT ACTIVE DIRECTORY SERVICES Presenter: Avinesh MCP, MCTS 2.
Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.
Linux Networking and Security
CHAPTER 9 Sniffing.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Presentation transcript:

© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE Enterprise Linux 8 Server setup Module 6

Module objectives When completing SUSE Linux setup, the administrator should be aware of: Database server support Thin client server Authentication server Security

SUSE – Database server (1 of 2) MySQL is supported by SUSE and Webmin:

SUSE – Database server (2 of 2) PostgreSQL is supported by SUSE and Webmin:

SUSE – Database support A wide number of commercial databases are supported on SUSE Linux including IBM DB2 IBM Informix Oracle Sybase

SUSE – Thin client server (1 of 4) SUSE can be used as a server for thin clients. Included in SLES8 are: Tftp server Dhcp server (with bootp support) A typical thin client like the Linux Terminal Server must also be loaded. The LTSP package is available tin RPM format from

SUSE – Thin client server (2 of 4) Tftp is an insecure protocol Wrappers should be used to prevent remote sites from gaining access to a system

SUSE – Thin client server (3 of 4) Dhcp can be easily managed from webmin:

SUSE – Thin client server (4 of 4)

SUSE – Authentication server PAM (Pluggable Authentication Manager) is an integrated package that manages accounts, passwords, authentication and sessions. SUSE (like Red Hat) uses PAM for authentication. PAM supports the following authentication systems: – Windows Domain authentication with Samba – LDAP Domain integration with Windows – NIS (and NIS+) – Unix/Linux passwords (with or without /etc/shadow )

SUSE – Security Monitor Security Applications Argus Ethereal Mon Mtr Nmap Nagios Saint ntop Traffic-vis Nessus Snort tcpdump Security monitor applications (1 of 3)

Security monitor applications (2 of 3) The rich set of SUSE security applications fall into a number of categories: Passive network packet sniffers Intrusion Detection Systems Active network Probes Active Network Monitors

Security monitor applications (3 of 3) Passive network packet sniffers Tcpdump – a real-time text based packet sniffer Ethereal – a real-time graphic based packet sniffer Argus – batch mode IP transaction analysis and archiving tool Traffic-vis - batch mode packet analysis and archiving tool Ntop – a web oriented net traffic analysis tool

Security monitor - Ethereal Ethereal from the SUSE Console:

Security monitor – Intrusion detection (1 of 2) Intrusion Detection Systems Snort - open source network intrusion detection system manageable with Webmin (3 rd party module)

Security monitor – Intrusion detection (1 of 2) Snort record of intrusion attempts ( /var/log/snort/alert ):

Security - Network probes Active network probes (black hat/white hat utilities) Saint – Security Administrators Integrated Network Tool Nessus – a client/server security scanner; nessus emulates viral and port scanning attacks on remote systems Nmap – a comprehensive port scanner Mtr – Matts combines the functionality of traceroute with ping yielding a continuous display of network route efficiencies

Security – Network monitors Active Network Monitors Nagios – replaced NetSaint, a comprehensive network management tool Mon – a background monitoring tool Webmin – in addition to managing almost everything in a Linux/Unix environment, webmin also has a built in monitoring tool

Security monitor – Nagios (1 of 3)

Security monitor – Nagios (2 of 3)

Security monitor – Nagios (3 of 3)

Security Monitor – Webmin Webmins system monitoring capability:

SUSE – server (1 of 4) SUSE Enterprise server includes postfix rather than sendmail as its MTA. Postfix is functionally identical to sendmail but claims to be easier to configure. Postfix is just … different, but does the same job You be the judge:

SUSE – server (2 of 4) The postfix admin page on webmin:

SUSE – server (3 of 4) The sendmail admin page on webmin:

SUSE – server (4 of 4) POP & IMAP SUSE and Red Hat use imap-2001a-xx.rpm as a basis for IMAP and POP(2,3) Internet daemon use – SUSE uses inet – Red Hat uses xinet

SUSE – Domain Name Service Both SUSE and Red Hat use bind9 for DNS service, Bind may be serviced by Webmin:

SUSE – File server SUSE can act like a NAS server or as a NAS client Network File System (nfs) SNB shares (Samba) Gigabit Ethernet support Fiber optic network support (Fiber channel, ethernet over fiber, FDDI) Huge Disk arrays with LVM

SUSE … and lots more!

Learning check

Hidden slide