Server Setup and Configuration Babu Ram Dawadi 1.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

1 Server Selection & Content Distribution Networks (slides by Srini Seshan, CS CMU)
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Module 5: Configuring Access to Internal Resources.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
The Internet Useful Definitions and Concepts About the Internet.
EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao
What’s a Web Cache? Why do people use them? Web cache location Web cache purpose There are two main reasons that Web cache are used:  to reduce latency.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CDNs & Replication Prof. Vern Paxson EE122 Fall 2007 TAs: Lisa Fowler, Daniel Killebrew, Jorge Ortiz.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
CP476 Internet Computing Browser and Web Server 1 Web Browsers A client software program that allows you to access and view Web pages on the Internet –Examples.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Technologies for Building Content Delivery Networks Pei Cao Cisco Systems, Inc.
Caching and Content Distribution Networks. Web Caching r As an example, we use the web to illustrate caching and other related issues browser Web Proxy.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Linux Operations and Administration
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Caching and Content Distribution Networks. Some Interesting Observations r Top 1 % of all documents account for 20% - 35% of proxy requests r Top 10%
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
1 Caching  Temporary storage of frequently accessed data (duplicating original data stored somewhere else)  Reduces access time/latency for clients 
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Redirection and Load Balancing
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
CP476 Internet Computing Lecture 5 : HTTP, WWW and URL 1 Lecture 5. WWW, HTTP and URL Objective: to review the concepts of WWW to understand how HTTP works.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Module 11: Remote Access Fundamentals
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Web Server.
RADIUS What it is Remote Authentication Dial-In User Service
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
DNS/Proxy Babu Ram Dawadi. Introduction - DNS Domain Name Server Domain Name Server –programs that store information about the domain name space –largest.
Content Distribution Network, Proxy CDN: Distributed Environment
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Web Server Administration Chapter 6 Configuring a Web Server.
Web and Proxy Server.
Content Distribution Networks
Module Overview Installing and Configuring a Network Policy Server
Caching Temporary storage of frequently accessed data (duplicating original data stored somewhere else) Reduces access time/latency for clients Reduces.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Web Caching? Web Caching:.
Internet Networking recitation #12
Content Distribution Networks
Configuring Internet-related services
Content Distribution Networks
Presentation transcript:

Server Setup and Configuration Babu Ram Dawadi 1

Servers Minimum Server Required for Intranet/Internet Operation –DNS server –DHCP server –Proxy Server –Web Server –Authentication Server (RADIUS) –Database Server –Mail Server –More….. 2

DNS Server See the slides provided on Distributed System Classes –BIND/DJBDNS concepts and configuration –Requirement of DNS server based on network size –Benefits and drawbacks 3

DHCP Server DHCP Operation Concepts and Configuration DOCDHCP Operation Concepts and Configuration DOC 4

What is Squid Proxy Server? A caching proxy for –HTTP, HTTPS (tunnel only) –FTP –Gopher –WAIS (Wide area information server, requires additional software) –WHOIS (Squid version 2 only) Supports transparent proxying Supports proxy hierarchies (ICP protocol) 5

Other proxies Free-ware –Apache 1.2+ proxy support Commercial –Netscape Proxy –Microsoft Proxy Server –NetAppliance’s NetCache (shares some code history with Squid in the distant past) –CacheFlow ( –Cisco Cache Engine 6

What is a proxy? Firewall device; internal users communicate with the proxy, which in turn talks to the big bad Internet –Gate private address space (RFC 1918) into publicly routable address space Allows one to implement policy –Restrict who can access the Internet –Restrict what sites users can access –Provides detailed logs of user activity 7

What is a caching proxy? Stores a local copy of objects fetched –Subsequent accesses by other users in the organization are served from the local cache, rather than the origin server –Reduces network bandwidth –Users experience faster web access 8

Benefits of Caching 9 Benefits: Eliminate the need (in many cases) to: Send request to origin server (reducing delay, and link use) Send full response from origin server (reducing link use) Consequences: Reduced delay Directly benefits end-user. May benefit service providers (ISPs or web servers) by making their service more popular to end-users. Reduced traffic Reduces load on network links Reduces load on server Mask unavailability of origin server e.g. when working offline, or during faults

How proxies work (configuration) User configures web browser to use proxy instead of connecting directly to origin servers –Manual configuration for older PC based browsers, and many UNIX browsers (e.g., Lynx) –Proxy auto-configuration file for Netscape 2.x+ or Internet Explorer 4.x+ Far more flexible caching policy Simplifies user configuration, help desk support, etc. 10

How proxies work (user request) User requests a page: Browser forwards request to proxy Proxy optionally verifies user’s identity and checks policy for right to access Assuming right is granted, fetches page and returns it to user 11

Proxy – The Forward Proxy Forward Proxy –Proxy the outgoing requests, for the reason of Bandwidth saving Performance Central control –When objects requested are In cache, return the cached objects Otherwise, proxy server requests object from origin server, then cache it and return to client Request Reply Request Reply (using cached result) Request Reply client Proxy Server Original Server 12

Proxy – The Reverse Proxy Reverse Proxy –Proxy the incoming requests, for the reason of Reducing Server Load (by caching) Load Balance Fault Tolerant –Reverse proxy acts as the original server, accept incoming requests, reply corresponding result. SEAMLESS for clients! Request Reply client Reverse Proxy Server Server1 Request Reply Server1 Internet 13

Squid’s page fetch algorithm Check cache for existing copy of object (lookup based on MD5 hash of URL) If it exists in cache –Check object’s expire time; if expired, fall back to origin server –Check object’s refresh rule; if expired, perform an If- Modified-Since against origin server –If object still considered fresh, return cached object to requester 14

Lifecycle of an object 15 Last-modified: When the object was last modified at the origin server. OK to use copy Date – Last-modified suggests frequency of change Date: When the object was sent by the origin server => last time known to be fresh. + Age = Reference for checking for expiry Expires: Server’s prediction of when copies should be replaced. Age: How long the object has spent in caches

Squid’s page fetch algorithm If object is not in cache, expired, or otherwise invalidated –Fetch object from origin server –If 500 error from origin server, and expired object available, returns expired object –Test object for cacheability; if cacheable, store local copy 16

Installing Squid (overview) Get distribution from Run configure script with desired compile-time options Run make; make install Edit squid.conf file Run Squid -z to initialize cache directory structure Start Squid daemon Test Migrate users over to proxy 17

squid.conf runtime settings Default squid.conf file is heavily commented! Read it! Must set –cache_dir (one per disk) –cache_peer (one per peer) if participating in a hierarchy –cache_mem (8-16M preferred, even for large caches) –acl rules (default rules mostly work, but must reflect your address space) 18

squid.conf runtime settings Recommendations –ipcache_size, fqdncache_size to 4096 –log_fqdn off (use Apache’s logresolve offline) –Increase dns_children, redirect_children, authenticate_children based on usage statistics (see cachemgr.cgi front-end) 19

squid.conf ACL example acl manager proto cache_object acl localhost src /32 acl managerhost src /32 acl managerhost src /32 acl managerhost src /32 acl cawtech src /24 acl cawtech-internal src /16 acl all src /

squid.conf ACL example acl SSL_ports port acl gopher_ports port 70 acl wais_ports port 210 acl whois_ports port 43 acl www_ports port acl ftp_ports port 21 acl Safe_ports port acl CONNECT method CONNECT acl FTP proto FTP acl HTTP proto HTTP acl WAIS proto WAIS acl GOPHER proto GOPHER acl WHOIS proto WHOIS 21

squid.conf ACL example http_access deny manager !localhost !managerhost http_access deny CONNECT !SSL_ports http_access deny HTTP !www_ports !Safe_ports http_access deny FTP !ftp_ports !Safe_ports http_access deny GOPHER !gopher_ports !Safe_ports http_access deny WAIS !wais_ports !Safe_ports http_access deny WHOIS !whois_ports !Safe_ports http_access allow localhost http_access allow cawtech http_access allow cawtech-internal http_access deny all 22

Managing Squid the Calamaris.pl logfile analysis script, available at Use modified MRTG with Squid’s SNMP support SQUID-GRPAH 23

Content Distribution Networks (CDN) rBusiness Model: A content provider such as or Yahoo pays a CDN company (such as Akamai) to get its content to the requesting users with short delays. rA CDN provides a mechanism for mReplicating content on multiple servers in the Internet mProviding clients with a means to determine the servers that can deliver the content fastest.

Terminology Content: Any publicly accessible combination of text, images, applets, frames, MP3, video, flash, virtual reality objects, etc. Content Provider: Any individual, organization, or company that has content that it wishes to make available to users. Origin Server: Content provider ’ s server, where the content is first uploaded. Surrogate Server (sometimes called edge server): Content distributor ’ s server, where the replicated content is kept.

Players Content Provider H/W and S/W Vendor Content Distributor Hosting Provider Yahoo, MSNBC, CNN CBC Cisco, Oracle- Sun Akamai, Bell Sells servers Send content Install servers

CDN Distribution Content providers are CDN customers Content replication CDN company installs thousands of servers throughout Internet –In large datacenters –Or, close to users CDN replicates customers’ content When provider updates content, CDN updates servers origin server in North America CDN distribution node CDN server in S. America CDN server in Europe CDN server in Asia 27

CDN: Functional Components r Distribution Service r rRedirection Service r Accounting and Billing system

CDN:Distribution Service rThe content provider determines which of its objects it wants the CDN to distribute. rThe content provider tags and then pushes this content to a CDN node, which in turn replicates and pushes the content to all its CDN servers.

CDN: Redirection When a browser in a user ’ s host is instructed to retrieve a specific object (specified using a URL), how does the browser determine whether it should retrieve the object from the origin server or from one of the CDN servers? an example, suppose the hostname of the content provider is

How Akamai Works End-user cnn.com (content provider) DNS root server 12 Nearby Akamai cluster GET index. html 31 cnn.com/af/cnn.com/foo.jpg HTTP Akamai cluster Akamai global DNS server Akamai regional DNS server

CDN: Redirection Users get an html document from this could be index.html The file index.html uses a modified URL for content that has been replicated. Example: If the jpeg files are what has been replicated then may be modified as follows: The browser needs to resolve a73.g.akamai.net hostname for replicated content.

Caching and Content Distribution(CDN) 33

CDN 34

CDN 35

CDN 36

CDN: Redirection rWhat does this mean? m host part: a73.g.akamai.net mAkamai control part: /7/23 mContent URL: /af/foo.jpg

CDN: Redirection rDNS is configured so that all queries about g.akamai.net that arrive at a DNS server are sent to an authoritative DNS server for g.akamai.net. r This is referred to as a Akamai DNS server (authoritative DNS server)

How Akamai Works End-user cnn.com (content provider)DNS root server 12 Nearby Akamai cluster DNS lookup cache.cnn.com Akamai cluster 3 4 ALIAS: g.akamai.net Akamai global DNS server Akamai regional DNS server

CDN: Redirection rWhen the Akamai DNS server receives the query, it extracts the IP address of the requesting browser..

P P How Akamai Works End-user cnn.com (content provider) DNS root server 12 Akamai global DNS server Akamai regional DNS server Nearby Akamai cluster Akamai cluster ALIAS a73.g.akamai.net DNS lookup g.akamai.net

CDN: Redirection rBased on the IP address and information that it has about the Internet (called a map), the IP address of an Akamai regional server is returned to the requesting browser based on policy me.g., select the server that is the fewest hops away. rThe regional server may choose a surrogate server for content retrieval

HTTP How Akamai Works End-user cnn.com (content provider) DNS root server 12 Akamai global DNS server Akamai regional DNS server Nearby Akamai cluster Akamai cluster DNS a73.g.akamai.net Address

HTTP How Akamai Works End-user cnn.com (content provider) DNS root server 12 Akamai global DNS server Akamai regional DNS server Nearby Akamai cluster Akamai cluster GET /foo.jpg Host: cache.cnn.com

HTTP How Akamai Works End-user cnn.com (content provider) DNS root server 12 Akamai global DNS server Akamai regional DNS server Nearby Akamai cluster Akamai cluster GET /foo.jpg Host: cache.cnn.com GET foo.jpg

CDN Redirection rThe Akamai DNS server IP address is now in the cache of the local DNS server. mThis implies that it is not always necessary to go to the root DNS server. rThe TTL associated with the IP address of an Akamai server(surrogate) is relatively small. mThis is done for performance reasons. rAkamai content distribution servers are caches

CDN Redirection rWhat if content is not there? mIf the request content is not found then the surrogate will ask other surrogates within a specified region for information. m mIf requested information is still not found or is stale, then a request is made to the original web site.

CDN Selection rThe tricky issue is selecting which local content server to use for a particular request mWant to spread load evenly mWant minimal impact if server is added or removed. rIn Akamai, each surrogate server sends measurement results to the Network Operations Communications Center (NOCC). mMeasurement results include number of active TCP connections, HTTP request arrival rate, bandwidth availability, etc mThis information is used by the Akamai DNS server.

Accounting Mechanism rAccounting mechanisms collect and track information related to request routing, distribution and delivery. rInformation is gathered in real time and put into log files for each CDN component. rThis gets sent to the Network Operations Communications Center (NOCC).

Full Site Delivery vs. Partial Site Delivery r Full Site Delivery : All the contents are delivered by the CDN (including HTML, images, and other objects). rPartial Site delivery: Only images, streaming media and other bandwidth intensive objects delivered by the CDN.

Current Akamai Customers

52 Web Server: Click Here

53 RADIUS

54 RADIUS Overview RADIUS: remote authentication dial-in user service Designed to centralize the authentication process for large distributed networks Originally intended for dial-up networks Can be used for VPN servers, switches, and wireless access points Two mandatory server roles: –RADIUS client –RADIUS server

55

56 RADIUS Overview (continued) The RADIUS client accepts authentication information from users or devices and forwards the information to a RADIUS server The RADIUS server accepts authentication information from a RADIUS client

57 Radius Overview (continued)

58 Radius Overview (continued)

59 Outsourcing Dial-up Requirements A user dials into ISP, ISP forwards request to RADIUS proxy, RADIUS proxy forwards request to RADIUS server, RADIUS server passes information to domain controller for authentication

60 Outsourcing Dial-up Requirements (continued)

61 What is AAA ? Authentication Authorization Accounting

62 Authentication Verify a person’s or machine’s declared identity. Mechanisms: passwords, Public Key Infrastructure (PKI). Key aspect is Trust relationships between servers.

63 Authorization Rules or templates on what a authenticated user can do on a system. Dial up user requests can be one link or multiple.

64 Accounting Measures and tracks resources a user accesses. Include time, amount of data, session statistics, resource utilization etc. Logs sent and analyzed for billing, security servers.

65 Properties Client/server model UDP based Hop by hop security Stateless Uses MD5 for password hiding. PAP/CHAP via PPP

66 Authentication methods PAP: Password Authentication Protocol (MD5/XOR). CHAP: Challenge Handshake Authentication protocol PAP is preferred sometimes in cases where authorization must travel outside the realm of control

67

68 The CHAP 3-way handshake

69 Using RADIUS and CHAP

70

71 Ports Authentication: udp/1812 Accounting: udp/1813

72 Implementations Livingston GNU FreeRADIUS Cistron Radiator Alepo Juniper: Steel Belt.

73 Databases Oracle Informix Sybase mSQL MySQL Microsoft SQL including versions 6.5, 7 and 2000 ODBC Interbase SAP PostgreSQL SQLite