Virtual Lab for CIS 192 & 196 Rich Simms May 27, 2006

Size: px
Start display at page:

Download "Virtual Lab for CIS 192 & 196 Rich Simms May 27, 2006"

Transcription

1 Virtual Lab for CIS 192 & 196 Rich Simms May 27, 2006 Overview Microsoft s virtualization technology has been available as a product called Virtual Server. Microsoft recently announced two major changes for Virtual Server 2005 R2. It is now a free download and Linux is supported. A virtual MiddleEarth lab was created was created using Virtual Server on one physical host computer running Windows 2003 Enterprise Edition R2. It is a virtual replica of the physical MiddleEarth lab running at Cabrillo College. There are some differences from the real lab in that the version of Linux is different and the VMs created are not dual boot. Each VM was either loaded with Windows or Linux as shown in the diagram below. The lab-router server was a virtual machine running Linux that bridged the virtual world with the physical world. The Sniffer VM had three interfaces with Ethereal loaded for troubleshooting purposes. Layout Physical Host

2 The Host computer supporting all these VMs had a single 2.6 GHz Pentium 4 CPU with 2 GB of RAM installed as shown in the following System Properties summary. Lab-Router configuration The VM named lab-router is a Linux server that connects the virtual lab to the home LAN. Eth0 is connected to the home LAN and eth1 is connected to virtual Shire network. Routes were added so MiddleEarth VMs could communicate with PCs on the home LAN. A destination NAT was added so VM s would still think the Cabrillo DNS server was available. The Cabrillo DNS addresses was translated to my home Netgear router which provide DNS services. Commands used: iptables -t nat -A PREROUTING -d j DNAT --to-destination route add -net netmask gw route add -net netmask gw Routing Table: [root@lab-router root]# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface U eth UG eth UG eth U eth U eth U lo UG eth0 [root@lab-router root]# - 2-5/27/2006

3 NAT table: root]# iptables -L -t nat Chain PREROUTING (policy ACCEPT) target prot opt source destination DNAT all -- anywhere buttercup.cabrillo.eduto: Chain POSTROUTING (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination root]# Lab-router VM configuration Serial Connections Some of the lab assignments required serial connections between computers. There is a way to have a virtual serial cable running between the COM ports of the VMs. This is done by specifying a named pipe as the COM port setting. For example the Com 1 ports on Frodo and Elrond are both set to \\.\pipe\null-modem-cable to enable a serial connection between the two of them /27/2006

4 Physical Disk Space Each VM occupies about 2 GB of physical disk space. They are kept in the folder shown below on the host machine: - 4-5/27/2006

5 - 5-5/27/2006

6 The virtual machines The Windows VMs were loaded with Windows 2003 Standard Edition and the Linux VMs were loaded with Redhat Enterprise Linux AS /27/2006

7 Typical Linux VM configuration: - 7-5/27/2006

8 Typical Windows VM configuration - 8-5/27/2006

9 Virtual Networks: Example network: - 9-5/27/2006

10 Resource Allocation: /27/2006

11 Issues with Virtual Server 2005 R2 Most issues that arose were resolved. The first issue I ran into was effective mouse control on a VM when using a Remote Desktop Connection. For example if you had a remote connection into the server hosting the VM s it was just about impossible to control the mouse using the Virtual Machine Remote Control Client. The resolution was to install the Virtual Machine Additions on each Windows VM. With Linux I still have two unresolved issues. One is an annoyance and the other is a serious limitation. The annoyance was that randomly on the Linux VM s you will get the following message: i8253 count too high! Resetting.. It seems to have no impact at all so I have just ignored it. The more serious issue is that I cannot get Linux to run in Graphics mode correctly. The display configuration is wrong resulting in a very stretched out screen. There is no ability to scroll to the right side and the GUI tools are too unreadable to be useful. I thought the not so easy to install VM Additions for Linux would help, especially the vmadd-x i386.rpm. While they improved mouse control there were no improvements to the display issue /27/2006

12 I had a similar problem in the past trying to install Linux on my laptop. The solution then was to fiddle with the boot and configuration files till it worked correctly. The Linux VMs work fine in text mode so it is a good way to learn how to do everything from the command line. Later I learned from Jim Griffin that using the VESA video driver completely resolved this issue with graphics mode. Summary This has been a very useful tool and the price is right. VMs are very flexible and useful for doing lab assignments. Being able to save the state of a VM allows you to save of multiple configurations that can be brought back online whenever needed /27/2006

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 5: Firewalls and Network Address Translation (NAT) Spring 2009 Lab 5: Firewalls and Network Address Translation (NAT) The purpose of this lab is to exercise the use of iptables

More information

Static and source based routing

Static and source based routing Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.

More information

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two

More information

Quick guide for configuring a system with multiple IP-LINKs

Quick guide for configuring a system with multiple IP-LINKs Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

THE INTERNET PROTOCOL/1

THE INTERNET PROTOCOL/1 THE INTERNET PROTOCOL a (connectionless) network layer protocol designed for use in interconnected systems of packet-switched computer communication networks (store-and-forward paradigm) provides for transmitting

More information

Setting Up a Multihomed System

Setting Up a Multihomed System CHAPTER 4 By default, the installation of the Cisco Configuration Engine software offers a single-homed system setup. If you require a multihomed system setup, you must manually customize the network parameters

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Lab Exercise Sheet 2 (Sample Solution)

Lab Exercise Sheet 2 (Sample Solution) Lab Exercise Sheet 2 (Sample Solution) Document and analyze your experimental procedures by using your Wireshark and terminal recordings. Note all relevant intermediate steps. Mark and explain all relevant

More information

CIS Test 1- Practice - Fall 2011

CIS Test 1- Practice - Fall 2011 CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you

More information

Certification. Securing Networks

Certification. Securing Networks Certification Securing Networks UNIT 9 Securing Networks 1 Objectives Explain packet filtering architecture Explain primary filtering command syntax Explain Network Address Translation Provide examples

More information

A Technique for improving the scheduling of network communicating processes in MOSIX

A Technique for improving the scheduling of network communicating processes in MOSIX A Technique for improving the scheduling of network communicating processes in MOSIX Rengakrishnan Subramanian Masters Report, Final Defense Guidance by Prof. Dan Andresen Agenda MOSIX Network communicating

More information

Linux. Sirindhorn International Institute of Technology Thammasat University. Linux. Firewalls with iptables. Concepts. Examples

Linux. Sirindhorn International Institute of Technology Thammasat University. Linux. Firewalls with iptables. Concepts. Examples Linux Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 14 October 2013 Common/Reports/-introduction.tex, r715 1/14 Contents 2/14 Linux, netfilter and netfilter:

More information

CIS Lesson 3. Instructor: Rich Simms Dial-in: Passcode:

CIS Lesson 3. Instructor: Rich Simms Dial-in: Passcode: Instructor: Rich Simms Dial-in: 888-450-4821 Passcode: 761867 Solomon Sean C. Chris Corey Bryan Sean F. Tony David Donna Dave Evan Gabriel Elia Tajvia Carlos Adam Ben Laura Email me (risimms@cabrillo.edu)

More information

TP5 Sécurité IPTABLE. * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*: Tous sont des protocoles TCP

TP5 Sécurité IPTABLE. * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*: Tous sont des protocoles TCP TP5 Sécurité IPTABLE Routage classique Q1) Sur la machiine FIREWALL, les services actifs sont : Netstat -a * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*:53856. Tous sont des protocoles

More information

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2342 NoSQL Systems Comparison Lab Server VM Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

CIS 76 VLab Pod Setup

CIS 76 VLab Pod Setup CIS 76 VLab Pod Setup Last updated 9/4/2017 Status on setup instructions: 1. pfsense (2.3.1, 64 bit) pfsense-ce-2.3.4-release-amd64 - DONE for Fa17 2. Kali (2017.1, 64 bit) kali-linux-2017.1-amd64.iso

More information

Datagram. Source IP address. Destination IP address. Options. Data

Datagram. Source IP address. Destination IP address. Options. Data Datagram Version H. len Service Datagram length Datagram identifier FR-FR FR-FR-FR-FR Time-to-live Transp. prot. H. Checksum Source IP address Destination IP address Options Data Each line represents a

More information

Università Ca Foscari Venezia

Università Ca Foscari Venezia Firewalls Security 1 2018-19 Università Ca Foscari Venezia www.dais.unive.it/~focardi secgroup.dais.unive.it Networks are complex (image from https://netcube.ru) 2 Example: traversal control Three subnetworks:

More information

Experimenting Internetworking using Linux Virtual Machines Part I

Experimenting Internetworking using Linux Virtual Machines Part I Experimenting Internetworking using Linux Virtual Machines Part I Hui Chen Previous Release on October 27, 2014 Lastly revised on November 4, 2015 Revision: Copyright c 2016. Hui Chen

More information

WA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2393 Data Science for Solution Architects Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements

More information

Docker Networking: From One to Many. Don Mills

Docker Networking: From One to Many. Don Mills Docker Networking: From One to Many Don Mills What we are going to talk about Overview of traditional Docker networking Some demonstrations Questions New Docker features Some more demonstrations Questions

More information

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. WA2592 Applied Data Science and Big Data Analytics Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements

More information

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host. Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green

More information

Supplies VLab pod 192 VMs shown above. Forum

Supplies VLab pod 192 VMs shown above. Forum Lab 4: Dynamic routing In this lab we will be using the Quagga package to implement dynamic routing across the three routers shown in the diagram below. Supplies VLab pod 192 VMs shown above Forum Use

More information

Networking Modes. TOBY-L2 / MPCI-L2 series. Application Note. Abstract

Networking Modes. TOBY-L2 / MPCI-L2 series. Application Note. Abstract Networking Modes TOBY-L2 / MPCI-L2 series Application Note Abstract This document describes the two operational modes of the TOBY-L2 / MPCI-L2 module and how to provide connectivity to customer modems.

More information

Addressing and Routing

Addressing and Routing Addressing and Routing Andrew Scott a.scott@lancaster.ac.uk Physical/ Hardware Addresses Aka MAC* or link(-layer) address Can only talk to things on same link Unique ID given to every network interface

More information

Network Address Translation

Network Address Translation Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 Network Address Translation (NAT) basically provides a mapping between internal (i.e.,

More information

ISO Installation Guide. Version 1.2 December 2015

ISO Installation Guide. Version 1.2 December 2015 Version 1.2 December 2015 ISO Installation Guide Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Firewalling for Free: An Enterprise Firewall Without the Enterprise Price. Name: Shawn Grimes Date: November 25, 2001 Course: CT-401

Firewalling for Free: An Enterprise Firewall Without the Enterprise Price. Name: Shawn Grimes Date: November 25, 2001 Course: CT-401 Firewalling for Free: An Enterprise Firewall Without the Enterprise Price Name: Shawn Grimes Date: November 25, 2001 Course: CT-401 Table of Contents Introduction..1 Nature of Bridging Firewalls 1 Physical

More information

Genie Routing lab. Laboration in data communications GenieLab Department of Information Technology, Uppsala University. Overview

Genie Routing lab. Laboration in data communications GenieLab Department of Information Technology, Uppsala University. Overview Genie Routing lab Laboration in data communications GenieLab Department of Information Technology, Uppsala University Overview This lab deals with linux network setup and routing in the network layer.

More information

Manually Change Default Gateway Centos Command Line Windows

Manually Change Default Gateway Centos Command Line Windows Manually Change Default Gateway Centos Command Line Windows Learn how to add a defaull gateway on Redhat Linux. Linux command line tutorial Bash scripting tutorial Vim tutorial Perl programming tutorial

More information

Installation of Fedora 12 with CD

Installation of Fedora 12 with CD Prepared by investech.wordpress.com Installation of Fedora 12 with Net Install CD Version 1.0 investech.wordpress.com 07-12-09 This document is produced under Creative Common License (Attribution No Derivatives).

More information

Newsreader virtual machines Technical Report NWR

Newsreader virtual machines Technical Report NWR Newsreader virtual machines Technical Report NWR-2014-4 Version FINAL Aitor Soroa 1, Enrique Fernández 2 1 University of Basque Country Donostia, Basque Country a.soroa@ehu.es 2 University of Basque Country

More information

Deployment Guide for Nuage Networks VSP

Deployment Guide for Nuage Networks VSP Page 1 of 29 view online Overview This document discusses the deployment and configuration of Avi Vantage Load Balancer in a Nuage Networks integrated OpenStack platform for a single tenant mode. The following

More information

Deployment Guide for Nuage Networks VSP

Deployment Guide for Nuage Networks VSP Page 1 of 11 view online Overview This document discusses the deployment and configuration of Avi Vantage Load Balancer in a Nuage Networks integrated OpenStack platform for a single tenant mode. The following

More information

Figure 1: Creating new VM in VirtualBox. Please change the parameters and options, and make them exactly like the following figure.

Figure 1: Creating new VM in VirtualBox. Please change the parameters and options, and make them exactly like the following figure. Run SEEDAndroid on VirtualBox We have already built Android VM for you. You can run this Android VM on VirtualBox by going through the instructions written here. Some steps might vary based on the VirtualBox

More information

Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box

Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box jthomas Enterprises, 2016 Building a CentOS 7 Workstation using Oracle VirtualBox 1 Section 1 Before You Begin This section details the environment

More information

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org Load Balancing Bloxx Web Filter Deployment Guide v1.3.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Best Practices VMware VMotion with HyperIP

Best Practices VMware VMotion with HyperIP Best Practices VMware VMotion with HyperIP 6420 Sycamore Lane N. Maple Grove, MN 55369 http://www.netex.com March 30, 2010 Page 1 of 10 Adding HyperIP into your network HyperIP improves the performance

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

Deploying Cisco UCS Central

Deploying Cisco UCS Central This chapter includes the following sections: Obtaining the Cisco UCS Central Software from Cisco, page 1 Using the Cisco UCS Central OVA File, page 2 Using the Cisco UCS Central ISO File, page 4 Logging

More information

How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT

How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS... 1 TEST NETWORK DIAGRAM... 2 PREPARING YOUR VPC... 3 IP addressing... 3 Virtual Private Cloud (VPC)...

More information

Assignment 3 Firewalls

Assignment 3 Firewalls LEIC/MEIC - IST Alameda LEIC/MEIC IST Taguspark Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment

More information

Static Ip Address No Internet Connection >>>CLICK HERE<<<

Static Ip Address No Internet Connection >>>CLICK HERE<<< Static Ip Address No Internet Connection Windows 7 To get a static IP on the internet you must contact your ISP to upgrade your Internet Connection, or use a dynamic DNS service such as DynDNS and No-IP.

More information

Utils Commands CHAPTER

Utils Commands CHAPTER CHAPTER 9 Published: October 26, 2010, This chapter contains the following utils commands: utils fior utils firewall utils iostat utils iothrottle enable utils iothrottle disable utils iothrottle status

More information

WA2503 Hadoop Programming on the. Hortonworks Data Platform. Lab Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

WA2503 Hadoop Programming on the. Hortonworks Data Platform. Lab Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. WA2503 Hadoop Programming on the Hortonworks Data Platform Lab Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2

More information

TCP/IP Network Essentials

TCP/IP Network Essentials TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet

More information

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can

More information

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Introduction Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Static routing has the advantage that it is simple, requires no computing power in router for determining routes (this

More information

State of the art hyper-optimized video management platform designed for ease, speed and efficiency. Blackjack BOLT-LX

State of the art hyper-optimized video management platform designed for ease, speed and efficiency. Blackjack BOLT-LX Quick Start Guide State of the art hyper-optimized video management platform designed for ease, speed and efficiency. Blackjack BOLT Up to 16 2.1MP Cameras (1080p True HD Resolution) Blackjack BOLT-LX

More information

Setting Up Initial System Configuration

Setting Up Initial System Configuration Default System Configuration on the Cisco ENCS, page 2 Default System Configuration on the Cisco UCS C220 M4 Server, page 3 Default System Configuration on the Cisco UCS E-Series Servers, page 4 Changing

More information

CTX118175 - How to Configure XenDesktop behind Network Address Translation -... 페이지 1 / 11 Knowledge Center Communities Sup Alerts Sign in How to Configure XenDesktop behind Network Address Translation

More information

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server This guideline illustrates the installation of the C-MOR Video Surveillance Virtual Machine on VMware ESX Server. This manual applies to C-MOR version 4 with 64 bit operating system. First download the

More information

IPv6 NAT. Open Source Days 9th-10th March 2013 Copenhagen, Denmark. Patrick McHardy

IPv6 NAT. Open Source Days 9th-10th March 2013 Copenhagen, Denmark. Patrick McHardy IPv6 NAT Open Source Days 9th-10th March 2013 Copenhagen, Denmark Patrick McHardy Netfilter and IPv6 NAT historically http://lists.netfilter.org/pipermail/netfilter/2005-march/059463.html

More information

The NBN Experience: The Interwebs at the Speed of Light. Jason But.

The NBN Experience: The Interwebs at the Speed of Light. Jason But. The NBN Experience: The Interwebs at the Speed of Light Jason But jbut@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline NBN Nuts and Bolts What happens

More information

Amahi Instruction Manual

Amahi Instruction Manual History of Amahi Chapter 1 Installing fedora 10 and Amahi Home Digital Assistant (HDA) Chapter 2 Advanced Hard drive Partitioning Chapter 3 YOUR DHCP/DNS OPTIONS Chapter 4 Network Troubleshooting Chapter

More information

Jackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan

Jackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Jackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 3: Simulating DHCP Snooping and DNS Cache Poisoning through

More information

ScopTEL TM IP PBX Software. Mediatrix Sentinel ScopTEL VM Installation

ScopTEL TM IP PBX Software. Mediatrix Sentinel ScopTEL VM Installation Mediatrix Sentinel ScopTEL VM Installation Mediatrix Sentinel The Mediatrix Sentinel appliance is a Gateway Appliance with several advanced features (some of which are activated by licensing). Eight Gateway

More information

ECE 4110 Internetwork Programming Lab 7: Configuring a Network Using RIP Routing Protocol. Prelab Questions

ECE 4110 Internetwork Programming Lab 7: Configuring a Network Using RIP Routing Protocol. Prelab Questions ECE 4110 Internetwork Programming Lab 7: Configuring a Network Using RIP Routing Protocol Group Number: Member Names: Date Issued: March 26, 2013 Date Due: April 3, 2013 Last Edited: January 31, 2013 This

More information

SEEDAndroid User Manual

SEEDAndroid User Manual SEEDAndroid User Manual Copyright 2016 Wenliang Du, Syracuse University. All rights reserved. ATTENTION: Before using the Android VM, please at least read Section 3.1 about how to release the mouse pointer.

More information

Windows Server 2008 Training

Windows Server 2008 Training Windows Server 2008 Training Vijay Bhalerao BCS, MCM, CISA, DCL,MCTS, ISO 27001 LA univijay@unisoftpune.com 1 Windows Server 2008 Course Contents Day - 1 Server Components Windows 2008 Server Series Overview

More information

CIS 76 VLab Pod Setup

CIS 76 VLab Pod Setup CIS 76 VLab Pod Setup Last updated 11/30/2016 Status on setup instructions: 1. pfsense (2.3, 64 bit) - OK 2. Kali (2016, 64 bit) - OK 3. Windows XP (SP2, 32 bit) - OK 4. Port Forwarding - OK 5. OWASP_Broken_Web_Apps_VM_1.2

More information

Virtuozzo DevOps. Installation Guide

Virtuozzo DevOps. Installation Guide Virtuozzo DevOps Installation Guide May 03, 2017 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 http://www.virtuozzo.com Copyright

More information

(Refer Slide Time: 00:30)

(Refer Slide Time: 00:30) Information Security Sri Vasan V S Principal Consultant Department of Computer Science and Engineering Indian Institute of Technology, Madras Module 25 Linux File Comparison So in this module we will be

More information

LAN Setup Reflection

LAN Setup Reflection LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Basic Linux Desktop Security. Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer

Basic Linux Desktop Security. Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer Basic Linux Desktop Security Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer Think Security: 5Q 1)What is the problem? 2)What is the proposed solution?

More information

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Remote Desktop Services Deployment Guide v2.0.2 Copyright Loadbalancer.org Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

IPtables and Netfilter

IPtables and Netfilter in tables rely on IPtables and Netfilter Comp Sci 3600 Security Outline in tables rely on 1 2 in tables rely on 3 Linux firewall: IPtables in tables rely on Iptables is the userspace module, the bit that

More information

Network Layer Introduction

Network Layer Introduction Network Layer Introduction Tom Kelliher, CS 325 Apr. 6, 2011 1 Administrivia Announcements Assignment Read 4.4. From Last Time Congestion Control. Outline 1. Introduction. 2. Virtual circuit and datagram

More information

Linux. Computer networks - Administration 1DV202. fredag 30 mars 12

Linux. Computer networks - Administration 1DV202. fredag 30 mars 12 Linux Computer networks - Administration 1DV202 Configuration files /etc/hosts /etc/resolv.conf /etc/network/interfaces /etc/hosts 127.0.0.1 localhost.localdomain localhost 127.0.1.1 lokal.kalmar.se lokal

More information

Natlog. For this exercise you must again be root. Login and obtain root privileges:

Natlog. For this exercise you must again be root. Login and obtain root privileges: 1 For this exercise you must again be root. Login and obtain root privileges: sudo su Caveat: this exercise requires at least one computer with two network interfaces. 2 Make sure natlog is installed First

More information

Using KVM On Ubuntu 7.10 (Gutsy Gibbon)

Using KVM On Ubuntu 7.10 (Gutsy Gibbon) By Mike Weimichkirch Published: 2007-11-28 17:38 Using KVM On Ubuntu 7.10 (Gutsy Gibbon) In this HowTo I'll explain how to install and use KVM for running your services in virtual machines. KVM (Kernel-based

More information

ROUTING PROTOCOL BASICS

ROUTING PROTOCOL BASICS ROUTING PROTOCOL BASICS Let s spice things up. 0..0. LAN E 0..0.0/6 LAN D 0..0.0/6 eth: 0..0. router 0..0. LAN C 0..0.0/6 A much more complex topology pc pc 0..0. eth: 0..0. router eth: 0.9.0. eth: 0.0.0.

More information

Basic Troubleshooting Process for Operating Systems

Basic Troubleshooting Process for Operating Systems Basic Troubleshooting Process for Operating Systems Applying the Troubleshooting Process to Operating Systems OS problems can result from a combination of hardware, software, and network issues. Computer

More information

Network security Exercise 9 How to build a wall of fire Linux Netfilter

Network security Exercise 9 How to build a wall of fire Linux Netfilter Network security Exercise 9 How to build a wall of fire Linux Netfilter Tobias Limmer Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 2.2.

More information

XD10004: How to Install VMware ESX Server 3.5 on VMware Workstation 6.5 as a VM

XD10004: How to Install VMware ESX Server 3.5 on VMware Workstation 6.5 as a VM white paper XD10004: How to Install VMware ESX Server 3.5 on VMware Workstation 6.5 as a VM VI in a Box - the portable virtual infrastructure Title: How to Install VMware ESX Server 3.5 on VMware Workstation

More information

The Research and Application of Firewall based on Netfilter

The Research and Application of Firewall based on Netfilter Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1231 1235 2012 International Conference on Solid State Devices and Materials Science The Research and Application of Firewall based

More information

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? LAN Setup Reflection Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other VMs in the classroom?

More information

CTRS Utils Commands CHAPTER

CTRS Utils Commands CHAPTER CHAPTER 7 Revised: November 2009, This chapter contains Cisco TelePresence Recording Server (CTRS) utils commands: utils create report hardware, page 7-3 utils iothrottle disable, page 7-4 utils iothrottle

More information

Debian Configure Static Ipv6 Address Windows Server 2008 R2

Debian Configure Static Ipv6 Address Windows Server 2008 R2 Debian Configure Static Ipv6 Address Windows Server 2008 R2 Also on the Linux machines I ensured that they are set to a FQDN in the b2c1-961f2d9a0dbd/linux-clients-are-not-registered-in-dns-using-ms-2008-r2-dhcp

More information

VMware Workstation 5 Lab. New Features and Capabilities: Multiple Snapshots, Teams, Clones, Video Capture and More

VMware Workstation 5 Lab. New Features and Capabilities: Multiple Snapshots, Teams, Clones, Video Capture and More VMware Workstation 5 Lab New Features and Capabilities: Multiple Snapshots, Teams, Clones, Video Capture and More Presentation Summary VMware Workstation overview VMware Workstation usage scenarios Features

More information

Dual-stack Firewalling with husk

Dual-stack Firewalling with husk Dual-stack Firewalling with husk Phil Smith linux.conf.au Perth 2014 1 Phil Smith SysAdmin from Melbourne Personal Care Manufacturer Implemented complete Dual-stack Previous role in managed security 4WD'ing

More information

NDN iptables match extension

NDN iptables match extension NDN iptables match extension L. Bracciale, A. Detti, P. Loreti, G. Rossi, N. Blefari Melazzi May 3, 2017 This module implements a match extension for netfilter 1 to match only certain NDN packets according

More information

Troubleshooting Can not access the router on

Troubleshooting Can not access the router on Troubleshooting Can not access the router on 192.168.0.1 Please note that when accessing the router s Web interface via http://192.168.0.1 you are not accessing some web site on the Internet. The router

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

Network I Lab 02. What are the major external components of the PC including the peripherals? / Characteristics

Network I Lab 02. What are the major external components of the PC including the peripherals? / Characteristics Part 01 : PC Hardware Network I Lab 02 Objective Become familiar with the basic peripheral components of a PC computer system. Identify PC connections including network attachment. Examine the internal

More information

CIS 191A Final Exam. Fall CIS 191 Final Exam

CIS 191A Final Exam. Fall CIS 191 Final Exam CIS 191A Final Exam Fall 2008 CIS 191 Final Exam The final for CIS 191A is composed several parts: A. (10 points) Questions B. (5 points) Checklist C. (10 points) Troubleshooting D. (35 points) Building

More information

Chapter 02: Working with Oracle VM VirtualBox 5

Chapter 02: Working with Oracle VM VirtualBox 5 True / False 1. Operating systems are grouped by type within the VirtualBox Manager. a. True b. False ANSWER: True REFERENCES: Creating a Virtual Machine QUESTION TYPE: True / False 2. When a VirtualBox

More information

VPN-against-Firewall Lab: Bypassing Firewalls using VPN

VPN-against-Firewall Lab: Bypassing Firewalls using VPN SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation

More information

Lab Determining Data Storage Capacity

Lab Determining Data Storage Capacity Lab 1.3.2 Determining Data Storage Capacity Objectives Determine the amount of RAM (in MB) installed in a PC. Determine the size of the hard disk drive (in GB) installed in a PC. Determine the used and

More information

Configure Windows VM to CGM-SRV Module on CGR1xxx

Configure Windows VM to CGM-SRV Module on CGR1xxx Configure Windows VM to CGM-SRV Module on CGR1xxx Contents Introduction Prerequisites Requirements Components Used Background Information Configure Create the Windows VM Image Install KVM on your Linux

More information

202 Lab Introduction Connecting to the Lab Environment

202 Lab Introduction Connecting to the Lab Environment 202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned

More information

SmartPath EMS VMA Virtual Appliance Quick Start Guide

SmartPath EMS VMA Virtual Appliance Quick Start Guide LWN600VMA SmartPath Enterprise Wireless System Virtual Appliance SmartPath EMS VMA Virtual Appliance Quick Start Guide Provides the speed, range, security, adapability, and manageability to replace wired

More information

setup.exe file must be run locally. The setup.exe file was easy to find, in the LumiraTeamServer subfolder.

setup.exe file must be run locally. The setup.exe file was easy to find, in the LumiraTeamServer subfolder. Lumira Edge Install As a moderately experienced user of SAP Lumira Desktop, I am knowledgeable in the utility and functionality that it provides. It is ideal for manipulating, editing, and formatting data

More information

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE [COMPANY NAME] [Company address] Table of Contents Arcserve UDP Cloud Direct Disaster Recovery Appliance for VMware... 2 Download the Arcserve

More information