NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14

Size: px
Start display at page:

Download "NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14"

Transcription

1 DNS Lab Write-up Craig T. Ciulla NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14 Setup on Primary VM In this section, I installed and configured all necessary packages on my primary VM for use as a Master DNS Server. 1.) I began by installing the packages needed to run the primary VM as a DNS server. I did this with the command yum install bind bind-utils -y 2.) Following this, I began editing a file located at /etc/named.conf. I changed the basic template to reflect the configuration needed for the primary VM. This included configuring the named service to run the primary VM as a master DNS server with support for reverse DNS lookup, the ability to poll public DNS servers, and the location of the forward and reverse DNS library. It also included the setting of the master and slave IP addresses and the listing of the slave DNS as an alternative name server. 1

2 3.) Following this, I created the file /var/named/forward.ciullac referenced in line 44 of /etc/named.conf This is the file the named service uses to lookup logical addresses by name. The contents of the file are captured in the screenshot below: In this file I have the names ciullac-1 and masterdns associated with the IP address , and the names ciullac-2 and secondarydns associated to the address ) Following this, I created the file /var/named/reverse.ciullac referenced in line 49 of /etc/named.conf This is the file the named service uses to lookup names by logical addresses. The contents of the file are captured in the screenshot below: 2

3 Similar to how the forward.ciulla file was structured, this file contains IP addresses and associated them with their assigned names. 5.) With the main configuration files for the primary VM correctly setup, I used the command service named start to start the DNS service and begin running the primary VM as a Master DNS server. The service started without error, showing that there were no critical errors in the configuration files. Setup on Secondary VM 1.) Like with the primary VM, I began by installing the packages needed to run the secondary VM as a DNS server. I did this with the command yum install bind bind-utils -y 2.) Following this, I began editing a file located at /etc/named.conf. I changed the basic template to reflect the configuration needed for the secondary VM. This included configuring the named service to run the secondary VM as a slave DNS server with support for reverse DNS lookup, the ability to poll public DNS servers, and the location to store the forward and reverse DNS library. 3

4 I also set the secondary VM s IP address in this file 3.) With the main configuration files for the secondary VM correctly setup, I used the command service named start to start the DNS service and begin running the secondary VM as a Slave DNS server. The service started without error, showing that there were no critical errors in the configuration files. IPTABLES and Other Finishing Touches 1.) I began by looking up the ports which needed to be opened to receive DNS queries on the DNS servers. This ended up being port 43. Because of this I added this entry into the IPTABLES of both my machines for both TCP and UDP. I did this using the commands: iptabels -A INPUT -i eth0 -p udp -m udp dport 53 -j ACCEPT iptabels -A INPUT -i eth0 -p tcp -m tcp dport 53 -j ACCEPT 2.) With the IPTABLES configured correctly, I restarted the named service on both machines and checked the /var/named/slaves directory on the secondary VM to see if duplication correctly occurred. 4

5 As shown by the screenshot, the replication between machines was successful. This shows that the secondary VM is correctly running as a Slave DNS server. 3.) With replication correctly occurring, I configured the named service to start at the boot of both of the VMs. I did this using the command chkconfig named on 4.) Following this, I configured both VMs to use their own DNS server setup for name resolution. I did this my reconfiguring the /etc/resolv.conf file on both machines so that it referenced the IP addresses of the Master and Slave DNS servers. A screenshot of the file s contents is shown below: 4.) With the network information modified, I restarted the networking services on both machines using the command service network restart. I did this so that the changes would take effect and we could begin testing the DNS server s ability. 5

6 Testing 1.) I began my testing by pinging each VM by their names according to their DNS entries. I did this for every entry on both machines. 6

7 As shown by the screenshots, every test was successful. 2.) With the success of the first round of testing, I continued by looking up the IP of each entry using it s set name. Again, I did this from both VMs. 7

8 8

9 As shown by the screenshots, these tests were successful as well. 3.) With all of the tests successful so far, I expanded my testing to include an address outside the network. 9

10 10

11 With the success of the final test, the DNS server setup appears to be fully working. 11

DEPLOY A DNS SERVER IN A SECURE WAY

DEPLOY A DNS SERVER IN A SECURE WAY DEPLOY A DNS SERVER IN A SECURE WAY BIND (Berkeley Internet Name Domain) is one of the more widely used DNS servers. This article guides readers on how to deploy a BIND DNS server in a secure way by implementing

More information

Chapter 14. Configuring Linux Network Services Part 1 DHCP and DNS service

Chapter 14. Configuring Linux Network Services Part 1 DHCP and DNS service Chapter 14 Configuring Linux Network Services Part 1 DHCP and DNS service 1 Content Configuring a DHCP server on Linux Configuring a DNS server on Linux Configuring the Apache Web server on Linux Configuring

More information

Practical classes Lab2. Integration of global services in enterprise environments I: The INTRANET

Practical classes Lab2. Integration of global services in enterprise environments I: The INTRANET Computer Engineering Degree Computer Engineering Year 2017/18 Practical classes Lab2 CSDA Unit II INTRANET Integration of global services in enterprise environments I: The INTRANET Deployment of a secure

More information

Sharing files and printers with Microsoft Windows

Sharing files and printers with Microsoft Windows 1 Sharing files and printers with Microsoft Windows CIFS, Samba, SMB. Different words, same thing. Samba is mainly used as a share in a mixed environment, usually with Windows and Linux. Samba is also

More information

OPENSTACK CLOUD RUNNING IN A VIRTUAL MACHINE. In Preferences, add 3 Host-only Ethernet Adapters with the following IP Addresses:

OPENSTACK CLOUD RUNNING IN A VIRTUAL MACHINE. In Preferences, add 3 Host-only Ethernet Adapters with the following IP Addresses: OPENSTACK CLOUD RUNNING IN A VIRTUAL MACHINE VirtualBox Install VirtualBox In Preferences, add 3 Host-only Ethernet Adapters with the following IP Addresses: 192.168.1.2/24 192.168.2.2/24 192.168.3.2/24

More information

Page 1 of 7 SUMMARY MORE INFORMATION. Windows 2000 DNS Event Messages 1616 Through Microsoft resource record (RR) problems.

Page 1 of 7 SUMMARY MORE INFORMATION. Windows 2000 DNS Event Messages 1616 Through Microsoft resource record (RR) problems. Page 1 of 7 Knowledge Base Windows 2000 DNS Event Messages 1616 Through 6702 PSS ID Number: 287513 Article Last Modified on 10/11/2002 The information in this article applies to: Microsoft Windows 2000

More information

Lab: Configuring and Troubleshooting DNS

Lab: Configuring and Troubleshooting DNS Lab: Configuring and Troubleshooting DNS A. Datum is a global engineering and manufacturing company with its head office in London, UK. An IT office and a data center are located in London to support the

More information

Configure IBM Security Identity Manager Virtual Appliance in Cloud

Configure IBM Security Identity Manager Virtual Appliance in Cloud Configure IBM Security Identity Manager Virtual Appliance in Cloud Rahul Relan rarelan3@in.ibm.com Nnaemeka Emejulu eemejulu@us.ibm.com Parag Gokhale parag.gokhale@in.ibm.com Abstract: Installing IBM Security

More information

The article performs the following task:-

The article performs the following task:- This RAC installation article is based on RAC Attack hands-on learning lab https://en.wikibooks.org/wiki/rac_attack_-_oracle_cluster_database_at_home/rac_attack_12c The article performs the following task:-

More information

Supplies VLab pod 192 VMs shown above. Forum

Supplies VLab pod 192 VMs shown above. Forum Lab 4: Dynamic routing In this lab we will be using the Quagga package to implement dynamic routing across the three routers shown in the diagram below. Supplies VLab pod 192 VMs shown above Forum Use

More information

Install and Manage Windows Nano Server 2016 Step by Step

Install and Manage Windows Nano Server 2016 Step by Step Complete Lab (V2.0) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Table of Contents Lab Objective... 3 Windows Nano Server 2016 overview... 3 Current infrastructure environment...

More information

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org Load Balancing Bloxx Web Filter Deployment Guide v1.3.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

DNS Configuration Guide. Open Telekom Cloud

DNS Configuration Guide. Open Telekom Cloud DNS Configuration Guide Open Telekom Cloud www.telekom.de/opentelekomcloud For this guide we assume that two subnets are already configured. In our example the subnets are called subnet_dns01 (in AZ eu-de-01)

More information

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its

More information

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org Load Balancing Web Proxies / Filters / Gateways Deployment Guide v1.6.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Lockdown & support access guide

Lockdown & support access guide Lockdown & support access guide How to lock down your cloud, and enable the OnApp support team to help you with troubleshooting and ticket resolution. Document version 1.4 Document release date 21 st February

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Agha Mohammad Haidari General ICT Manager in Ministry of Communication & IT Cell#

Agha Mohammad Haidari General ICT Manager in Ministry of Communication & IT Cell# Install a DNS server in Windows Server 2008 IT administrators who have little or no experience with Domain Name System (DNS), can learn to install, configure and troubleshoot a Windows Server 2008 DNS

More information

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 5: Firewalls and Network Address Translation (NAT) Spring 2009 Lab 5: Firewalls and Network Address Translation (NAT) The purpose of this lab is to exercise the use of iptables

More information

High Availability & Fault Tolerance of the Deployment Manager using NFS on Linux

High Availability & Fault Tolerance of the Deployment Manager using NFS on Linux High Availability & Fault Tolerance of the Deployment Manager using NFS on Linux Abstract: For this exercise a shared filesystem will be created using NFS 4 on which the dmgr profile will be created. This

More information

Setting up High Availability

Setting up High Availability ManageEngine Password Manager Pro Tutorial Setting up High Availability (Procedure applicable only for PMP builds up to 6301. For versions 6302 and later, click here ) Overview Setting up high availability

More information

Prepared by Shiba Ratna Tamrakar

Prepared by Shiba Ratna Tamrakar Lab on Package management with RPM and Yum 1. to install the package bind-utils #rpm -hiv bind-utils* Note: i for install, h for hash, v for verbose 2. to install the package bind-utils from URL ftp://www.xyz.com/rpms

More information

LAB 8 CONFIGURING DNS ZONES

LAB 8 CONFIGURING DNS ZONES LAB 8 CONFIGURING DNS ZONES THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 8.1 Exercise 8.2 Exercise 8.3 Exercise 8.4 Exercise 8.5 Exercise 8.6 Exercise 8.7 Lab Challenge Installing

More information

Sicurezza dei sistemi e delle reti

Sicurezza dei sistemi e delle reti Sicurezza dei sistemi e delle reti LAB: DNS LOCAL ATTACK Pharming attacks The main objective of Pharming attacks on a user is to redirect the user to another machine B when the user tries to get to machine

More information

ELASTIX HIGH AVAILABILITY (HA) MODULE

ELASTIX HIGH AVAILABILITY (HA) MODULE ELASTIX HIGH AVAILABILITY (HA) MODULE Authors: Alfio Muñoz, Alberto Santos Version: 1.1 Date: March 28, 2016 2016 PaloSanto Solutions All rights reserved. This documentation is public and its intellectual

More information

LIP for Windows Server Infrastructure Automation Via Ansible Devops Tool

LIP for Windows Server Infrastructure Automation Via Ansible Devops Tool LIP for Windows Server Infrastructure Automation Via Ansible Devops Tool This document provides the details about ansible automation for Windows server infrastructure. Author : Sangeetha Sangeetha@cloudnloud.com

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

Overview. Last Lecture. This Lecture. Next Lecture. Scheduled tasks and log management. DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly

Overview. Last Lecture. This Lecture. Next Lecture. Scheduled tasks and log management. DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly Last Lecture Overview Scheduled tasks and log management This Lecture DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly Next Lecture Address assignment (DHCP) TELE 301 Lecture 11: DNS 1 TELE

More information

1.3 Analyzing the performance of various configurations and protocols

1.3 Analyzing the performance of various configurations and protocols 1.3 Analyzing the performance of various configurations and protocols Original TCP versus the above modified one: To compare the performance between the operation of TCP with congestion control and the

More information

Deployment Guide for Nuage Networks VSP

Deployment Guide for Nuage Networks VSP Page 1 of 29 view online Overview This document discusses the deployment and configuration of Avi Vantage Load Balancer in a Nuage Networks integrated OpenStack platform for a single tenant mode. The following

More information

Deployment Guide for Nuage Networks VSP

Deployment Guide for Nuage Networks VSP Page 1 of 11 view online Overview This document discusses the deployment and configuration of Avi Vantage Load Balancer in a Nuage Networks integrated OpenStack platform for a single tenant mode. The following

More information

HA for Azure Classic Interface. Feature Description

HA for Azure Classic Interface. Feature Description Feature Description UPDATED: 28 March 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Click Studios. Passwordstate. Upgrade Instructions to V5.6

Click Studios. Passwordstate. Upgrade Instructions to V5.6 Passwordstate Upgrade Instructions to V5.6 This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without

More information

System Requirements ENTERPRISE

System Requirements ENTERPRISE System Requirements ENTERPRISE Hardware Prerequisites You must have a single bootstrap node, Mesos master nodes, and Mesos agent nodes. Bootstrap node 1 node with 2 cores, 16 GB RAM, 60 GB HDD. This is

More information

Harness Your Internet Activity

Harness Your Internet Activity Harness Your Internet Activity Enabling Efficiency and Service Differentiation Ralf Weber October 13, 2014 Authoritative DNS Proven High-performance Tested with up to 1 Billion resource records per server

More information

CA Agile Central Installation Guide On-Premises release

CA Agile Central Installation Guide On-Premises release CA Agile Central Installation Guide On-Premises release 2016.2 Agile Central to Go 2017.1 rallysupport@rallydev.com www.rallydev.com 2017 CA Technologies (c) 2017 CA Technologies Version 2016.2 (c) Table

More information

Change Server Domain

Change Server Domain CHAPTER 6 Procedure Overview, page 6-1 Procedure Workflow, page 6-2 Update DNS Records, page 6-3 Update Cisco Unified Presence Node Name, page 6-5 Update DNS Domain, page 6-6 Reboot all Servers in Cluster

More information

Upgrade from a Standalone Deployment to a Coresident Deployment (Cisco Unified Intelligence Center with Live Data and IdS)

Upgrade from a Standalone Deployment to a Coresident Deployment (Cisco Unified Intelligence Center with Live Data and IdS) Upgrade from a Standalone Deployment to a Coresident Deployment (Cisco Unified Intelligence Center with Live Data and IdS) Upgrade from a Standalone to a Co-resident Deployment, on page 1 Set Deployment

More information

Eaton Intelligent Power Manager as a Virtual Appliance Deployment s Guide

Eaton Intelligent Power Manager as a Virtual Appliance Deployment s Guide Eaton Intelligent Power Manager as a Virtual Appliance Deployment s Guide Table of Contents 1 Introduction... 3 2 Free Version Limitation... 3 3 Virtualization Platform Supported... 3 4 Requirements...

More information

Load Balancing Censornet USS Gateway. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Censornet USS Gateway. Deployment Guide v Copyright Loadbalancer.org Load Balancing Censornet USS Gateway Deployment Guide v1.0.0 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software

More information

Wireshark Lab: DNS. 1. Run nslookup to obtain the IP address of a Web server in Asia. What is the IP address of that server?

Wireshark Lab: DNS. 1. Run nslookup to obtain the IP address of a Web server in Asia. What is the IP address of that server? Rick Shingu Nick Ishihara 11/30/14 Wireshark Lab: DNS 1. nslookup 1. Run nslookup to obtain the IP address of a Web server in Asia. What is the IP address of that server? Ran the command nslookup www.asdu.ait.ac.th.

More information

Getting started with MySQL Proxy

Getting started with MySQL Proxy Getting started with MySQL Proxy Giuseppe Maxia QA Developer - MySQL AB Sofia - OpenFest 2007 Agenda Overview Some fun Injecting queries Filtering and rewriting queries Working with results Proxy for logging

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

Fixing Issues with Corporate Directory Lookup from the Cisco IP Phone

Fixing Issues with Corporate Directory Lookup from the Cisco IP Phone Fixing Issues with Corporate Directory Lookup from the Cisco IP Phone Document ID: 13936 Contents Introduction Prerequisites Requirements Components Used Conventions Fix Corporate Directory Issues in Cisco

More information

DNS & DHCP CONFIGURATION

DNS & DHCP CONFIGURATION WELCOME DNS & DHCP CONFIGURATION Group Members Anmol Nazakat Ameena Fatima Shakeel ur Rehman Gulraiz Azam Irfan Ullah 1 2 3 4 5 BSIT-F14-E78 BSIT-F14-E100 BSIT-F14-E66 BSIT-F14-E69 BSIT-F14-E79 3 Today

More information

Installation & Basic Configuration

Installation & Basic Configuration Installation & Basic Configuration This document is a result of work by the perfsonar Project (http://www.perfsonar.net) and is licensed under CC BY-SA 4.0 (https://creativecommons.org/licenses/by-sa/4.0/).

More information

(B) Execute SMS TCP MODBUS Interface Application

(B) Execute SMS TCP MODBUS Interface Application Security Management System software generates notifications which indicate the state of various health parameters eg disk failure, one or more cameras offline etc. These notifications can be exposed as

More information

Load Balancing VMware Horizon View. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing VMware Horizon View. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing VMware Horizon View Deployment Guide v3.3 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 Introduction The expectation is that you will either have a virtual machine to use, or that you will revert any changes made to your machine

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Configure CEM Controller on CentOS 6.9

Configure CEM Controller on CentOS 6.9 Configure CEM Controller on CentOS 6.9 Contents Introduction Background Prerequisites Requirements Components Used Installing Oracle Java SE Runtime Environment 8 Downloading and Installing the CEM Controller

More information

Fujitsu Global Cloud Platform Setup and Configure yum Software Package Manager with CentOS. Servers. This guide details. with CentOS 6.

Fujitsu Global Cloud Platform Setup and Configure yum Software Package Manager with CentOS. Servers. This guide details. with CentOS 6. Fujitsu Global Cloud Platform Setup and Configure yum Software Package Manager with CentOS 6.x Servers Fujitsu Globa al Cloud Platform Setup and Configure yum Software Package Manager with CentOS 6.0 Servers

More information

agility17dns Release latest Jun 15, 2017

agility17dns Release latest Jun 15, 2017 agility17dns d ocsdocumentation Release latest Jun 15, 2017 Contents 1 Lab Access 1 2 Network Topology 3 3 GSLB 5 3.1 Initial Setup............................................... 5 3.2 Logging..................................................

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Setting Up OpenIMS Core for Your Network

Setting Up OpenIMS Core for Your Network Setting Up OpenIMS Core for Your Network Note: This Document will help you in setting up OpenIMSCore for your network. On top of which you can add an application server and setup your IMS application.

More information

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3 Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

LAMP Stack with VirtualHosts On Centos 6.x

LAMP Stack with VirtualHosts On Centos 6.x LAMP Stack with VirtualHosts On Centos 6.x This article illustrates how to install the Apache Mysql PHP Stack on Centos 6.x. Additionally, with this configuration, you can serve Multiple Domains using

More information

NetApp Element Plug-in for vcenter Server User Guide

NetApp Element Plug-in for vcenter Server User Guide NetApp Element Plug-in for vcenter Server User Guide Version 4.2 November 2018 215-13259_A0 doccomments@netapp.com Table of Contents 3 Contents About this guide... 8 vcenter Plug-in overview... 9 Network

More information

Chapter 19. Domain Name System (DNS)

Chapter 19. Domain Name System (DNS) Chapter 19 Domain Name System (DNS) TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To describe the purpose of DNS. To define

More information

Static and source based routing

Static and source based routing Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.

More information

Using NAT in Overlapping Networks

Using NAT in Overlapping Networks Using NAT in Overlapping Networks Document ID: 13774 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Related Information

More information

Microsoft Sharepoint 2010 Deployment Guide

Microsoft Sharepoint 2010 Deployment Guide Microsoft Sharepoint 2010 Deployment Guide v1.2.6 Copyright 2013 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Appliances Supported... 4 Microsoft Sharepoint Software Versions Supported...4

More information

GFS-python: A Simplified GFS Implementation in Python

GFS-python: A Simplified GFS Implementation in Python GFS-python: A Simplified GFS Implementation in Python Andy Strohman ABSTRACT GFS-python is distributed network filesystem written entirely in python. There are no dependencies other than Python s standard

More information

ShoreTel 14.x Full Server Protection Using Double-Take Availability for Windows

ShoreTel 14.x Full Server Protection Using Double-Take Availability for Windows ST AppNote 16076 (AN 16076) December, 2016 ShoreTel 14.x Full Server Protection Using Double-Take 8.0.0.1554.0 Availability for Windows Description: This Application Note describes configuration of Double-Take

More information

NETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart

NETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart NETWORK CONFIGURATION AND SERVICES route add default gw 192.168.0.1 /etc/init.d/apache restart NETWORK CONFIGURATION There are two main approaches to configuring a machine for network access: Static configuration

More information

How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux

How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux Author : admin I've recently installed a jabber server on one Debian Lenny server and hence decided to describe my installations

More information

1. Download the latest version of the Kali Linux 64 bit ISO image:

1. Download the latest version of the Kali Linux 64 bit ISO image: Ronny Bull Pen Testing Talk Pre-Lab: Virtual Machine Setup Lab Objectives: Configure VirtualBox to support Kali Linux LiveCD and Metasploitable 2 Configure Virtualbox networking to support both NAT Network

More information

Set Up Cisco ISE in a Distributed Environment

Set Up Cisco ISE in a Distributed Environment Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy

More information

CIT 668: System Architecture

CIT 668: System Architecture CIT 668: System Architecture Availability Topics 1. What is availability? 2. Measuring Availability 3. Failover 4. Failover Configurations 5. Linux HA Availability Availability is the ratio of the time

More information

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability

More information

Configuring DNS. Finding Feature Information. Prerequisites for Configuring DNS

Configuring DNS. Finding Feature Information. Prerequisites for Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map host names to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated host name.

More information

Assignment 3 Firewalls

Assignment 3 Firewalls LEIC/MEIC - IST Alameda LEIC/MEIC IST Taguspark Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment

More information

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail])

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail]) The following firewall scripts will help you secure your web and db servers placed on the internet. The scenario is such that the MySQL db server is desired to receive db connections / traffic only from

More information

Cisco Expressway ENUM Dialing

Cisco Expressway ENUM Dialing Cisco Expressway ENUM Dialing Deployment Guide First Published: December 2013 Last Updated: November 2015 Cisco Expressway X8.7 Cisco Systems, Inc. www.cisco.com 2 Introduction ENUM (E.164 Number Mapping)

More information

PISO-DNS100 DeviceNet Multi-Slave PCI board Quick Start User Guide

PISO-DNS100 DeviceNet Multi-Slave PCI board Quick Start User Guide PISO-DNS100 DeviceNet Multi-Slave PCI board Quick Start User Guide 1. Introduction This Quick Start User Guide introduces users how to implement the PISO-DNS100 PCI board to your application quickly. Therefore,

More information

RH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam.

RH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam. REDHAT RH202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam TYPE: DEMO http://www.examskey.com/rh202.html Examskey REDHAT RH202 exam demo product is here for you to test the quality

More information

How the web works - 2. How the web works - 2. Names and Numbers. Transmission Control Protocol / Internet Protocol

How the web works - 2. How the web works - 2. Names and Numbers. Transmission Control Protocol / Internet Protocol How the web works - 2 Transmission Control Protocol / Internet Protocol Domain Name System How the web works - 2 Transmission Control Protocol / Internet Protocol Domain Name System Names and Numbers Translating

More information

Engineering Goals. Scalability Availability. Transactional behavior Security EAI... CS530 S05

Engineering Goals. Scalability Availability. Transactional behavior Security EAI... CS530 S05 Engineering Goals Scalability Availability Transactional behavior Security EAI... Scalability How much performance can you get by adding hardware ($)? Performance perfect acceptable unacceptable Processors

More information

Tivoli Provisioning Manager for OS Deployment Installation on W2003R2-NFS-MySQL

Tivoli Provisioning Manager for OS Deployment Installation on W2003R2-NFS-MySQL This post is about the installation of IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD). Although the potential audience is small, I am sure that those who want to switch to use a MySQL database

More information

Module 5: Integrating Domain Name System and Active Directory

Module 5: Integrating Domain Name System and Active Directory Module 5: Integrating Domain Name System and Active Directory Contents Overview 1 Lesson: Configuring Active Directory Integrated Zones 2 Lesson: Configuring DNS Dynamic Updates 14 Lesson: Understanding

More information

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24 Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall.

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall. This chapter describes how to configure the ASA for the. About the, page 1 Guidelines for the, page 7 Prerequisites for the, page 9 Configure the, page 10 Collect User Statistics, page 19 Examples for

More information

Linux Network Administration

Linux Network Administration Linux Network Administration Objective Describe the organization of the namespace Define the top-level subdomains of the Describe the process of converting IP addresses into names Define the concept of

More information

Installation and Reference Guide High Availability iscsi Add-On for HA-Lizard

Installation and Reference Guide High Availability iscsi Add-On for HA-Lizard Installation and Reference Guide High Availability iscsi Add-On for HA-Lizard Version 1.4 1 P a g e The information in this document and any product or service specifications referred to herein are subject

More information

Firewall Evasion Lab: Bypassing Firewalls using VPN

Firewall Evasion Lab: Bypassing Firewalls using VPN SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science

More information

Load Balancing Microsoft Sharepoint 2010 / Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Sharepoint 2010 / Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Sharepoint 2010 / 2013 Deployment Guide v1.5.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4

More information

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425)

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Code: 6123 Lengt h: URL: 5 days View Online In this comprehensive course you will not only discuss the crucial concepts

More information

Table 1 List of Common Ports Used by STRM Components. Port Direction Reason. components. your SMTP gateway

Table 1 List of Common Ports Used by STRM Components. Port Direction Reason. components. your SMTP gateway TECHNICAL NOTE OPEN PORTS USED BY STRM November 2010 This document provides information about the ports used by and between STRM components. Table 1 lists the common ports used by STRM components, identifies

More information

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 3 Configure Network Services

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 3 Configure Network Services Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 3 Configure Network Services Objectives Configure a DNS Server Using BIND Deploy OpenLDAP on a SLES 9 Server Configure an Apache

More information

Load Balancing Fujifilm SYNAPSE. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Fujifilm SYNAPSE. Deployment Guide v Copyright Loadbalancer.org Load Balancing Fujifilm SYNAPSE Deployment Guide v0.1 Copyright Loadbalancer.org Table of Contents 2. 3. 4. 5. 6. About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing Release 7.1 Revised: May 30, :54 am

Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing Release 7.1 Revised: May 30, :54 am Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing Release 7.1 Revised: May 30, 2013 9:54 am We recommend that you monitor heavily used systems at short intervals, such as biweekly

More information

Check the FQDN of your server by executing following two commands in the terminal.

Check the FQDN of your server by executing following two commands in the terminal. LDAP or Lightweight Directory Access Protocol, is a protocol designed to manage and access related information in a centralized, hierarchical file and directory structure. An LDAP server is a non-relational

More information

DNS Pharming Attack Lab

DNS Pharming Attack Lab CNT 5140 - Fall 2017 1 DNS Pharming Attack Lab Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation s Course, Curriculum,

More information

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the other 3(4) nodes.

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the other 3(4) nodes. Network setup As the root user execute the command "ifconfig" on each host. Take a note of ipaddress's of all machines I have a home LAN so my addresses are class C which might be in the format 192.168.192.x.

More information

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP Purpose This document describes how to monitor Linux machines with using SNMP. SNMP is an agentless method of monitoring network devices and servers, and is often preferable to installing dedicated agents

More information

Novell Internet Security Management with BorderManager 3.5: Enterprise Edition.

Novell Internet Security Management with BorderManager 3.5: Enterprise Edition. Novell 050-650 Internet Security Management with BorderManager 3.5: Enterprise Edition http://killexams.com/exam-detail/050-650 QUESTION: 165 When using NAT, which ICMP packet types are prevented from

More information