Internet System Management. Lesson 1: IT Systems and Services Overview.

Slides:



Advertisements
Similar presentations
© 2001 ComputerPREP, Inc. All rights reserved. Administering Linux Internet Services.
Advertisements

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Nassau Community College
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Chapter 8 Administering TCP/IP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Network Protocols Transmission Control Protocol/Internet Protocol (TCP/IP) Asynchronous Transfer Mode (ATM) NWLink NetBIOS Enhanced User Interface (NetBEUI)
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Windows 2008 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Workshop 1: Introduction to TCP/IP
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Name Resolution Domain Name System.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Module 4: Add Client Computers and Devices to the Network.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Chapter 6: Windows Servers
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
COMP1321 Digital Infrastructure Richard Henson February 2014.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Windows routing and resolution. Basic concepts  Host name: machine.sub-domain.domain example: mail.ubalt.edu same machine name in Windows in NetBIOS.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Configuring Name Resolution and Additional Services Lesson 12.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Introduction to Windows Server 2003,. 2 Objectives Identify the key features of each platform that makes up the Windows Server 2003 family Understand.
Hands-On Microsoft Windows Server 2003 Chapter 1 Introduction to Windows Server 2003, Standard Edition.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Linux Operations and Administration
Linux Operations and Administration
Web Server Administration Chapter 4 Name Resolution.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Windows Vista Configuration MCTS : Advanced Networking.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
Essential Services Lesson 5. Objectives Naming Resolution In today’s networks, you assign logical addresses, such as with IP addressing. Unfortunately,
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Windows Server Administration Fundamentals
Presentation transcript:

Internet System Management

Lesson 1: IT Systems and Services Overview

Objectives  List the services offered by IT departments  Identify backbone and mission-critical services offered by IT departments  Discuss the concepts of system maintenance

Common IT Tasks and Services  System and service installation  Web server configuration  FTP server configuration and management  Name resolution configuration  server installation and support  E-commerce server installation and support

Common IT Tasks and Services (cont’d)  Database server installation and support  User management  Server monitoring and optimization  File backup  Routing  Establishing and managing shares

Backbone Services  Naming services  Address management  Directory services  Central logon  Routing

Mission-Critical Services  Mission-critical services are highly visible  Users rely on mission-critical services  Examples - Mail servers - Web servers - FTP servers - Middleware

System Configuration  Binding protocols to the network interface card  Protocol management  Addressing  Gateways  Name resolution configuration  Service and application installation and management  IP addressing

User Management  Adding and removing users  Using applications  Managing permissions  Group membership  Password aging  Account lockout  Password history  Controlled access

System Performance  Bandwidth and access rate issues  System I/O performance  Hard drive access statistics  CPU usage  RAM usage

Backup  Archiving user-created files  Keeping copies of entire operating systems  Storing changes to databases and other data stores  Off-site storage

Maintenance  Upgrading operating systems  Installing service packs and hot fixes  Upgrading services, including Web and servers  Scanning hard drives for errors  Upgrading hard drives to provide more storage capacity

Summary List the services offered by IT departments Identify backbone and mission-critical services offered by IT departments Discuss the concepts of system maintenance

Lesson 2: Internet System Installation and Configuration Issues

Objectives  Identify common hardware platforms  Describe capabilities of various platform components  Define bandwidth and throughput  Identify common network operating systems  Determine the ideal operating system for a given environment  Discuss system installation issues

System Elements  Bus speed  System I/O  NIC  Hard drive  RAM

Bandwidth  The total amount of information a network connection can carry  Network connections - T1 - Fractional T1 - T2 - T3 - ISDN - DSL

Calculating Throughput  A percentage of bandwidth; the amount a network connection is being used  Throughput elements - Connection speed - Amount of information - Time available for transfer

Internetworking Operating Systems  Microsoft Windows  UNIX  Linux  System V  Novell  X Windows

Operating System Issues  Ease of use  Platform stability  Available talent pool  Available technical support

Operating System Issues (cont’d)  Cost  Hardware costs  Availability of services and applications  Purpose for the server

Installing Network Operating Systems  Single-boot and dual-boot machines  Local and network installation  Hardware considerations  Listing system components

Summary Identify common hardware platforms Describe capabilities of various platform components Define bandwidth and throughput Identify common network operating systems Determine the ideal operating system for a given environment Discuss system installation issues

Lesson 3: Configuring the System

Objectives  List key TCP/IP configuration parameters  Add NICs in Windows 2000 and Linux  Configure Windows 2000 with static IP addresses  Configure Linux with static IP addresses  Describe how DHCP works

TCP/IP Configuration Parameters  Computer name  IP address  Subnet mask  Default gateway  DNS information  DHCP client information  WINS

Adapters  Adding network adapter device drivers in UNIX/Linux  Adding network adapter device drivers in Windows 2000  Binding device drivers to protocols in Windows 2000 Device Drivers (NIC)

Static Addressing Windows 2000  ipconfig Linux  ifconfig  ifup  ifdown  linuxconf  netcfg  dmesg  grep

Additional TCP/IP Issues and Commands  netstat  traceroute  router  arp

Dynamic Addressing DHCP lease process

Summary List key TCP/IP configuration parameters Add NICs in Windows 2000 and Linux Configure Windows 2000 with static IP addresses Configure Linux with static IP addresses Describe how DHCP works

Lesson 4: User Management Essentials

Objectives  Define authentication  Explain the share-level and user-level access security models  Identify the purposes and functions of logon accounts, groups and passwords  Create a network password policy using standard practices and procedures

Objectives (cont’d)  Discuss permissions issues  Describe the relationship between permissions and user profiles  Use administrative utilities for specific networks and operating systems  Identify the permissions needed to add, delete or modify user accounts

Authentication  What you know  What you have  Who you are

Security Models and Authentication

Peer-Level Access

User-Level Access

Peer-Level vs. User-Level Peer-level  Less expensive  Easier to implement  Less secure  Less control over file and resource management  Not scalable User-level  Increased security  Supports larger number of users  Increased control  Offers system logs  Grows with organizational needs

Creating User Accounts  User name  Password  Group associations  Permissions  Additional options

Permissions  Read  Write  Execute  Print

Windows 2000 Permissions  Full control  Change  Read  No access

UNIX Permissions Access Value Bit  7  6  5  4  3  2  1  0 Access Value Bit Meaning Read, write and execute Read and write Read and execute Read only Write and execute Write Execute No mode bits (access absent)

Novell Rights  Supervisor  Read  Write  Erase  Modify  Create  File scan  Access control  No access

Additional Logon Account Terms  Logon scripts  Home directories  Local profiles  Roaming profiles

Administrative Privileges  UNIX = (including System V, Solaris, Free BSD and all Linux variants)  Windows =  Novell = Root (full privilege) Administrator (full privilege) Supervisor (full privilege)

Standard Password Practices  Create strong password - At least six characters - Both uppercase and lowercase letters - At least one Arabic numeral - At least one symbol  Implement password policy - Plan and create a balanced policy - Write and publish policy - Train users

Network Security Policies  Password aging  Password length  Password history  Account lockout  Share creation  User creation  Local logon

Standard Operating Procedures  Vendors for operating systems and software  Upgrading, replacing and maintaining hardware  Upgrading software (including operating systems and applications)  Responding to power outages, building evacuation and hacker intrusion  Acceptable use policy

Summary Define authentication Explain the share-level and user-level access security models Identify the purposes and functions of logon accounts, groups and passwords Create a network password policy using standard practices and procedures

Summary (cont’d) Discuss permissions issues Describe the relationship between permissions and user profiles Use administrative utilities for specific networks and operating systems Identify the permissions needed to add, delete or modify user accounts

Lesson 5: Managing Users in Windows 2000

Objectives  Identify the purpose of the Windows 2000 Security Accounts Manager  Administer remote Windows 2000 systems and users  Enforce systemwide policies  Convert a FAT drive to NTFS  Enable auditing in Windows 2000 Server  View local and remote events in Event Viewer

Objectives (cont’d)  Manage file and directory ownership  Manage user rights  Enable custom user settings  Identify accounts used by Windows 2000 services

The Security Accounts Manager  Sam - A collection of processes and files used by Windows 2000 to authenticate users - Located at C:\winnt\system32\config

The Computer Management Snap-in  Managing users on a remote system

Local Security Settings  Start | Programs | Administrative Tools | Local Security Policy - Configure account policies - Establish auditing - Change default user-rights settings - Alter default settings for system peripherals and auditing options - Determine public-key encryption and IP security policies

Auditing, Ownership and Rights  Audit policy  User rights  Security options

Editing and Customizing User Accounts  Groups  User environment (home directory, logon scripts, user profiles)  Dial-in options

Windows 2000 Services and User Accounts  IIS  Remote Management  Terminal Services  NetShow Video Server

Summary Identify the purpose of the Windows 2000 Security Accounts Manager Administer remote Windows 2000 systems and users Enforce systemwide policies Convert a FAT drive to NTFS Enable auditing in Windows 2000 Server View local and remote events in Event Viewer

Summary (cont’d) Manage file and directory ownership Manage user rights Enable custom user settings Identify accounts used by Windows 2000 services

Lesson 6: Managing Users in Linux

Objectives  Create new accounts on Linux systems  Set password aging policies on Linux systems  Set account policies in Linux  View user accounts used by system daemons  Explain run levels  Use ntsysv and chkconfig

Manually Adding Users File  /etc/passwd  /etc/shadow  /etc/logon.defs Purpose  Public user database  Shadow password file  Contains default values

Manually Adding Users (cont’d) File  /etc/default/useradd  /etc/skel  /etc/group Purpose  Contains default values  Group file

Linux User Accounts  Entry of the new account into a database  Creation of the resources the new account will need

Linux User Account Properties  User name  User ID number  Primary group ID number  Home directory  Shell program  Password

Pluggable Authentication Modules  The password file  The shadow password file  Creating and preparing home directories  Account creation utility  linuxconf

Password Management and Account Policies  Password aging  Password checking

Groups Mechanisms for managing access to files and processes

Linux System Accounts  Different subsystems should run under different accounts  File protections should be used to prevent one subsystem from interfering with resources belonging to another

Run Levels, ntsysv and chkconfig  The /etc/inittab file  The /etc/rc.d/ directory  The ntsysv command  The chkconfig command

Summary Create new accounts on Linux systems Set password aging policies on Linux systems Set account policies in Linux View user accounts used by system daemons Explain run levels Use ntsysv and chkconfig

Lesson 7: Name Resolution in LANs with DNS

Objectives  Explain the DNS  Identify DNS components  List the common DNS record types  Define reverse DNS lookup  Implement DNS in Windows 2000 and Linux  Deploy DDNS  Use nslookup

The Domain Name System Internet service that converts common host names into their corresponding IP addresses

The Domain Name Space Root Second TOP Second  DNS consists of three levels - Root - Top - Second

Accessing Hosts by DNS Name www host1 host1.ciwcertified.com The.ciwcertified domain sales1 sales2.sales sales.ciwcertified.com.dnsresearch dns1 dns2 dnsresearch.research.ciwcertified.com.research research2 research1 research.ciwcertified.com.research research2 Possible resolution to a top-level domain, such as.com

DNS Server Types  Root server  Master (or primary) server  Slave (or secondary) server  Caching-only server  Forwarding server

Common DNS Records  Internet (IN)  Name Server (NS)  Start of Authority (SOA)  Address (A)  Canonical Name (CNAME)  Mail Exchanger (MX)  Pointer (PTR)

Setting Up DNS  Server  Zone file  DNS record

Probing DNS with Nslookup  Locate name servers  Locate IP addresses  Locate host names  Review various record types  Change servers  List domains

Configuring DNS in Windows 2000  Dynamic DNS - DNS record aging and scavenging  SOA field  WINS  Zone transfers

Understanding BIND  BIND 4  BIND 8.x  BIND 9.x

Setting Up DNS in Linux  The named.conf file (BIND versions 8 and 9)  The named.ca file  The named.local file  The forward zone file  The reverse zone file

Troubleshooting DNS  DNS Professional  CyberKit Professional  Ping Plotter  WS_FTP Ping ProPack

Summary Explain the DNS Identify DNS components List the common DNS record types Define reverse DNS lookup Implement DNS in Windows 2000 and Linux Deploy DDNS Use nslookup

Lesson 8: Name Resolution with WINS and Samba

Objectives  Explain the basics of NetBIOS  Identify additional name resolution options for LANs and WANs  Implement and manage WINS  Use Samba to create a WINS server in UNIX  Configure Samba systems to use Windows 2000 authentication  Create and manage shares using Samba

NetBIOS over TCP/IP NetBIOS runs over TCP/IP much the same way that SMB runs over TCP/IP

The NetBIOS Naming Convention  NetBIOS services use UDP ports 137 and 138 and TCP port supports the NetBIOS name service carries the NetBIOS datagram service carries the NetBIOS session layer

Windows Internet Naming Service  Handles queries regarding NetBIOS names and corresponding IP addresses  Uses UDP ports 137 and 138 NetBIOS computer name (Instructor1) IP address for (Instructor1)

Managing WINS  Scavenging and backup - Scheduling queue

Static Mapping Static mapping creates entries in the WINS database that allow non-WINS clients  Entries include  Unique  Group  Domain name  Internet group  Multihomed

Replication - Push partner - Pull partner

Configuring DNS and WINS  DNS and WINS can work together to allow DNS to retrieve the dynamically assigned IP address associated with a particular name

Samba  Samba allows UNIX systems to participate in Windows networks - Establishes shares on UNIX hosts that are accessible to Windows systems - Shares printers - Makes a UNIX system a WINS server - Makes a UNIX system a WINS client

SWAT  Samba configuration tool - Home - Globals - Shares - Printers - Status - View - Password

Samba and WINS  Creating a WINS client  Troubleshooting WINS in UNIX systems

Samba Share Clients  Windows - Network Neighborhood applet - Windows Explorer Map Network Drive utility  Linux - The smbclient program - The smbmount program

Interoperability Issues  Encrypting Samba passwords - The smb.conf file - The smbadduser command - The smbpasswd command - Registry changes

Summary Explain the basics of NetBIOS Identify additional name resolution options for LANs and WANs Implement and manage WINS Use Samba to create a WINS server in UNIX Configure Samba systems to use Windows 2000 authentication Create and manage shares using Samba

Lesson 9: Implementing Internet Services

Objectives  Deploy user-level and anonymous FTP access in Windows 2000 and Linux  Describe standard and passive FTP  Configure Telnet for Windows 2000 and Linux  Configure finger in Linux  Control access to Linux services

File Transfer Protocol Servers  Application-layer protocol  Uses two ports - TCP/20 - TCP/21  Passive mode  Normal mode

Anonymous Accounts  Anonymous accounts in Windows NT  Anonymous accounts in UNIX  Account considerations

Implementing Microsoft FTP  Microsoft Internet Information Server (IIS) is the primary way to implement FTP in Windows FTP

Managing FTP in IIS  Security Accounts tab  Messages tab  Home Directory tab  Directory Security tab

Creating Virtual FTP Servers  Dedicated virtual FTP servers  Simple virtual FTP servers  Shared virtual FTP servers

Anonymous Access in IIS  Analyzing and configuring anonymous FTP  Controlling access to your FTP site  Customizing your IIS FTP server  Configuring anonymous FTP on UNIX

Telnet  Controls a system from a remote location  Operates on port 23

Xinetd  FTP  Telnet  Finger  SWAT  TFTP  Chargen  Daytime  POP3  BOOTP  Echo

Finger  Accesses information about local and remote users - Daytime - Echo - Chargen

The hosts.allow and hosts.deny Files  Controls access to UNIX services

Summary Deploy user-level and anonymous FTP access in Windows NT and UNIX Install and configure Telnet for Windows 2000 and UNIX Configure finger in UNIX Control access to UNIX services

Internet System Management IT Systems and Services Overview Internet System Installation and Configuration Issues Configuring the System User Management Essentials Managing Users in Windows 2000

Internet System Management Managing Users in Linux Name Resolution in LANs with DNS Name Resolution with WINS and Samba Implementing Internet Services