Elastix Smart Assistant

Size: px
Start display at page:

Download "Elastix Smart Assistant"

Transcription

1

2 Elastix Smart Assistant Administrator Manual Objective: Allow the administrator to set up the initial configuration of Smart Assistant in an Elastix server. Description: Smart Assistant is an application developed for smartphones that allows a user to efficiently assign calls over an Elastix unified communications server. The application allows to create several scenarios where the user can decide how to re-route an ingoing call. Smart Assistant intelligently determines our location trough the technologies that reside on the phone and proceeds to successfully apply a condition previously configured. Operation of Smart Assistant Fig.1 Flowchart of Smart Assistant operation

3 Installation Go to your Addons module on your Elastix server s web interface. Search for the module Smart Assistant, and click on install. Fig.2 Elastix Market Place It s important to mention that users must install as well the Smartphone app of Smart Assistant on their devices. This app is available in Google Play web store. When these two steps have been completed, you can go to the Smart Assistant menu on the Elastix web administration interface. Fig.3 Selecting Smart Assistant Menu Once there, click on Add Device. A form will appear where you can enter the User s Device ID, and associate it with the user with its extension. The information required for completing the user registration is: Device ID: An identifier with 20 alphanumeric characters that is generated for the user s phone by the application. Extension: The user s extension on the Elastix Server (example: 100). Allow Create Targets: It allows the creation of destinations. License File: The administrator can enter the license generated when the user made the purchase.

4 Fig.4 New device form for adding users The administrator, according with its company s politics, can enable, or not, the creation of Targets by the user. This functionality is available in the Premium version of the mobile application. Lets click on save and the module will register the new user to the database of the server. Fig.5 Registered users Configuration of the Follow me feature This configuration allows the server to re-route calls to the user of the Smart Assistant app. In Elastix administration web interface, go to: PBX à PBX Configuration à Follow me Select the user extension. A form will show where you will configure the following parameters: Ring Strategy: Select the option Ringall Follow-Me list: Write a non-existing extension, this will allow the call to be rerouted to the option Destination if no answer. Destination if no answer: Select Custom Destination à SmartAssistant

5 Fig.6 Follow Me configuration form Destination creation on the Other Destinations module To add destinations available in Elastix, go to: PBX à PBX Configuration à Misc Destinations The Elastix server administrator can create generic and specific locations for users. Generic destinations are available to all Smart Assistant users in the organization. Specific locations are only available to the user for which they were created. Generic Destinations Description: This field must have the prefix SMART-[name_of_destination]. In the example below you can see the name SMART-CONFROOM, which destination is the conference room of the company. Dial: This field contains the number that will be dialed by this destination.

6 Fig.7 Target Creation As we can see in the image above, when creating the destination called CONFROOM (SMART-CONFROOM), it will be shown in the user mobile app and be available in the destinations list. Please consider that in the free version, the destinations created are shared among all the users. This means that if you create a Home destination, it will be shown in all the organizations devices, and can be selected within the options by all the users created. Specific Targets The configuration for the Standard version of Smart Assistant is very similar to the free version. With the difference that the prefix that have to be used when adding a destination have to be the user s extension in the Elastix server and not the word Smart. For example: 230-CellPhone. Fig.8 Specific Target Creation This configuration assures that only the user whose extension is 230 will have this destination in the mobile Smart Assistant app.

7 The administrator can create as many targets as necessary; these targets will be shown on a list. Fig.9 List of available targets To allow the user the selection of a specific destination from the application, he/she must purchase a Standard license. Adding a license A user can purchase a Standard or Premium license at: Each license has additional features that allow to extend the functionality of the application. Once the user has purchased a license, he/she will receive a file with a ".lic" extension and the following format: lic- user_device_id_number.lic The user must send this file to the administrator, so he can include the license in the device configuration in Elastix. The administrator must go to PBX SmartAssistant Then click on the desired device to enter the license. Fig.10 Entering a license file

8 Once in the configuration interface, the administrator can add the license file by clicking on "Select File", then browse to find it, uploaded and click on "Save." The user will have all the available functionalities in the application automatically. Smart Assistant Advanced Configuration Changing ports for sending packets between the application and Smart Assistant In the application s configuration screen we must set the IP address and port where the Smart Assistant application will send communication packets to the Elastix server. The default port is Fig.11 Sending packets to the Elastix server When installing the addon from the Elastix s market place, a web application is created in apache. Its configuration file is located in: /etc/httpd/conf.d/smartassistant.conf [Continues next page]

9 Fig.12 SmartAssistant s Configuration Note: we can edit the file using vim If we want to change the communication port we must do so the two instances where it is set. In the following example we change the listening port to Fig.13 Changing the communication port in SmartAssistant s configuration file Save the changes and leave the file, then restart apache for the changes to take effect. service httpd restart Encrypted communication To improve the security of your application, all communication between the application and the Elastix server is encrypted. The encryption key is unique per server and the default value is , both on the server side (addon) and the application on the Smartphone. The administrator can edit this value.

10 Fig.14 Encrypted communication To change this you must execute the following command in the Elastix server. /opt/smartassistant/smart-set-secret.php new_key Note: the new key must be a 16 digits, alphanumeric string. As the encryption method is unique for the entire server, you must set up all the devices that are connected to it. In the next example, we change the encryption key to jk49uu23qw23ry5c Fig.15 Changing the key for the Smart Assistant users Note: This change will affect all the Smart Assistant applications associated with server, this cannot be changed individually for each user. Port Knocking SmartAssistant is able to work with Port-Knocking. Starting Elastix version 2.4, this functionality comes already included by default.

11 For versions prior to Elastix 2.4, you can install the Port-Knocking (knockd) service by following the procedure described in the "Security on CentOS servers with Elastix" guide. A detail of this installation can be reviewed in Appendix A. The following file shows an example of the settings available /opt/smartassistant/knockd_sample.conf Fig.16 Port Knocking Configuration File In this example we are enabling the opening of port 54321, once the user knocks (probes) the following sequence of ports: (sequence = 30000, 30500, 31000), also we are giving the order to close the port after 10 minutes (600 seconds). cmd_timeout = 600 The port opening is exclusively for the IP address that is knocking (probing), not for every IP address. Port-Knocking configuration in the application side is performed as follows: 1. Tick the Port Knocking checkbox. 2. Type the three ports to knock. The order is taken from the left to the right. Fig.17 Enabling Port Knocking

12 Fail2Ban We can find a sample configuration for fail2ban, in the directory /opt/smartassistant/ Configuration example: fail2ban_filter_smartassistant.conf Jail example: fail2ban_jail.sample Support / Questions For support or further inquiries, please write to:

13 Annex A Port-knocking: Knock before entering Installation and configuration Taken from: Seguridad en Servidores CentOS con Elastix + Buenas Prácticas V Author: Rodrigo Martín Available at: Installation Download the RPM file (for 32 bits architectures): # wget el5.rf.i386.rpm Install the packet # rpm -i knock el5.rf.i386.rpm Open the "/etc/knockd.conf" file and delete its contents, then add the following lines to close/open the ssh and https ports as follows: [options] logfile = /var/log/knockd.log [openssh] sequence = 7000,8000,9000 seq_timeout = 5 tcpflags = syn command = iptables -A INPUT -s %IP% -p tcp --dport 22 - j ACCEPT [closessh] sequence = 9000,8000,7000 seq_timeout = 5 tcpflags = syn command = iptables -D INPUT -s %IP% -p tcp --dport 22 - j ACCEPT [openhttps] sequence = 7001,8001,9001 seq_timeout = 5 tcpflags = syn command = iptables -I INPUT -s %IP% -p TCP --dport 443 -j ACCEPT

14 [closehtttps] sequence = 9001,8001,7001 seq_timeout = 5 tcpflags = syn command = iptables -D INPUT -s %IP% -p TCP --dport 443 -j ACCEPT Now we go to /etc/rc.d/init.d and create the "knock" file containing the following lines to handle the daemon as a service: #!/bin/bash # # chkconfig: # description: Demonio de Knockd # # process name: knockd # # # Author: Rodrigo Martin # # Source function library.. /etc/init.d/functions # Check that the config file exists #[ -f /etc/knockd.conf] exit 0 KNOCKD="/usr/sbin/knockd -d" RETVAL=0 getpid() { pid=` ps -eo pid,comm grep knockd awk '{ print $1 }'` #echo $pid } start() { echo -n $"Starting knockd: " getpid if [ -z "$pid" ]; then $KNOCKD start > /dev/null RETVAL=$? fi if [ $RETVAL -eq 0 ]; then touch /var/lock/subsys/knockd echo_success else echo_failure fi echo return $RETVAL } stop() {

15 echo -n $"Stopping knockd: " getpid RETVAL=$? if [ -n "$pid" ]; then #$KNOCKD stop > /dev/null sleep 1 getpid if [ "$pid" ]; then } kill "$pid" rm -f /var/lock/subsys/knockd echo_success else echo_failure fi else echo_failure fi echo return $RETVAL # See how we were called. case "$1" in start) start ;; stop) stop ;; status) getpid if [ -n "$pid" ]; then echo "knockd (pid $pid) is running..." #$KNOCKD status else RETVAL=1 echo "knockd is stopped" fi ;; restart) stop sleep 2 start ;; *) echo $"Usage: $0 {start stop status restart}" exit 1 ;; esac exit $RETVAL Grant execute permissions to the file: # chmod 755 /etc/rc.d/init.d/knock

16 Configure so that it is always loaded when the server is started # chkconfig knock on Start the service # service knock start To test the port-knocking we must have the involved ports closed in the iptables Usage example: from another Linux PC do the "port knocking" to open the https port as follows: # telnet elastix.server.ip.address 7001 ; telnet elastix.server.ip.address 8001 ; telnet elastix.server.ip.address 9001 Then press Ctrl+c 4 times and our server will open the specified port for our IP address, we can close it by knocking the same ports in reverse order. If we need to "knock" from a Windows PC we can do it using the "knock-win32-port" (32-bit application).

Building an IPS solution for inline usage during Red Teaming

Building an IPS solution for inline usage during Red Teaming Building an IPS solution for inline usage during Red Teaming Repurposing defensive technologies for offensive Red Team operations K. Mladenov A. Zismer {kmladenov,azismer}@os3.nl Master Students in System

More information

#!/bin/bash # Change IP address to your own # Add this entry into /etc/syslog.conf # local7.* /var/log/boot.log. # touch /var/log/portknocking.

#!/bin/bash # Change IP address to your own # Add this entry into /etc/syslog.conf # local7.* /var/log/boot.log. # touch /var/log/portknocking. So we've been playing around PortKnocking with for some time, trying to nd a good implementation that didn't cre Yep, you heard right, BASH scripts. What you got here is a 100% shell based portknocking

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

To find all files on your file system that have the SUID or SGID bit set, execute:

To find all files on your file system that have the SUID or SGID bit set, execute: File System Security Checks There are certain files whose presence in the Linux file system can present a security risk and should be remedied as soon as possible. When the SUID (set user ID) or SGID (set

More information

Getting Started with MySQL

Getting Started with MySQL A P P E N D I X B Getting Started with MySQL M ysql is probably the most popular open source database. It is available for Linux and you can download and install it on your Linux machine. The package is

More information

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail])

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail]) The following firewall scripts will help you secure your web and db servers placed on the internet. The scenario is such that the MySQL db server is desired to receive db connections / traffic only from

More information

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 Introduction The expectation is that you will either have a virtual machine to use, or that you will revert any changes made to your machine

More information

PEN LOAD BALANCER WITH 2 NODES APACHE WEB SERVER

PEN LOAD BALANCER WITH 2 NODES APACHE WEB SERVER Alternate Titles: MYSQL SSL Encryption Based Replication Setup Author: Muhammad Zeeshan Bhatti [LPI, VCP-DCV5, OCP (DBA), MCSA, SUSE CLA, RHCSA-7] (http://zeeshanbhatti.com) (admin@zeeshanbhatti.com) PEN

More information

More Raspian. An editor Configuration files Shell scripts Shell variables System admin

More Raspian. An editor Configuration files Shell scripts Shell variables System admin More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make

More information

LAMP Stack with VirtualHosts On Centos 6.x

LAMP Stack with VirtualHosts On Centos 6.x LAMP Stack with VirtualHosts On Centos 6.x This article illustrates how to install the Apache Mysql PHP Stack on Centos 6.x. Additionally, with this configuration, you can serve Multiple Domains using

More information

Assignment 3 Firewalls

Assignment 3 Firewalls LEIC/MEIC - IST Alameda LEIC/MEIC IST Taguspark Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment

More information

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo LECTURE 7 Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH Remote Managing In real life, physical access to network nodes is not always an option. Often, we need

More information

HTTPS Setup using mod_ssl on CentOS 5.8. Jeong Chul. tland12.wordpress.com. Computer Science ITC and RUPP in Cambodia

HTTPS Setup using mod_ssl on CentOS 5.8. Jeong Chul. tland12.wordpress.com. Computer Science ITC and RUPP in Cambodia HTTPS Setup using mod_ssl on CentOS 5.8 Jeong Chul tland12.wordpress.com Computer Science ITC and RUPP in Cambodia HTTPS Setup using mod_ssl on CentOS 5.8 Part 1 Basic concepts on SSL Step 1 Secure Socket

More information

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported

More information

This describes how to use DD-WRT to connect to a Cisco VPN Concentrator using vpnc without auto-reconnect and without connect on startup

This describes how to use DD-WRT to connect to a Cisco VPN Concentrator using vpnc without auto-reconnect and without connect on startup vpnc is supposed to work with: Cisco VPN concentrator 3000 Series Cisco IOS routers Cisco PIX / ASA Zecurity Appliances Juniper/Netscreen Contents 1 This describes how to use DD-WRT to connect to a Cisco

More information

IPv6 Workshop: CRIHAN -Rouen 04-06/02/2014 Security Bernard TUY Thanh-Luu HA

IPv6 Workshop: CRIHAN -Rouen 04-06/02/2014 Security Bernard TUY Thanh-Luu HA : CRIHAN -Rouen 04-06/02/2014 Bernard TUY Thanh-Luu HA 1/6 Securing the servers 1 ) Boot on linux, check that the IPv6 connectivity is fine. 2 ) From application hands-on, a web server should be running

More information

LOG ON TO LINUX AND LOG OFF

LOG ON TO LINUX AND LOG OFF EXPNO:1A LOG ON TO LINUX AND LOG OFF AIM: To know how to logon to Linux and logoff. PROCEDURE: Logon: To logon to the Linux system, we have to enter the correct username and password details, when asked,

More information

Php Scripts If Then Else Linux Bash Shell

Php Scripts If Then Else Linux Bash Shell Php Scripts If Then Else Linux Bash Shell I am using awk as part of and if then else statement. KSH, CSH, SH, BASH, PERL, PHP, SED, AWK and shell scripts and shell scripting languages here. I just wrote

More information

DINOMI Call Center Module Administrador s Manual Version 1.1

DINOMI Call Center Module Administrador s Manual Version 1.1 DINOMI Call Center Module Administrador s Manual Version 1.1 DINOMI Call Center Module Administration Manual v 1.1 DINOMI March 2017 Table of Contents INTRODUCTION... 6 DINOMI Call Center Module Installation...

More information

Setting up the Apache Web Server

Setting up the Apache Web Server 1 Setting up the Apache Web Server The Apache Web Server (Hyper Text Transfer Protocol) is the most popular web server available. The project gained popularity with Linux in the 1990 s as they teamed up

More information

ITEC451 Network Design & Analysis Laboratory Guide: Appendix

ITEC451 Network Design & Analysis Laboratory Guide: Appendix Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you

More information

Useful Unix Commands Cheat Sheet

Useful Unix Commands Cheat Sheet Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

Net LineDancer v13. Install Guide for Linux. Revision History

Net LineDancer v13. Install Guide for Linux. Revision History Net LineDancer v13 Install Guide for Linux Revision History Revision Subject Revisions First Edition (v13.08) Created as a First Edition (2013/09/03) LogicVein, Inc. www.logicvein.com Tel: +81-44-852-4200

More information

DINOMI Call Center Module. Quick start guide v 1.1

DINOMI Call Center Module. Quick start guide v 1.1 DINOMI Call Center Module Quick start guide v. DINOMI April 07 Table of contents Welcome to Dinomi Call Center... 4 Step : Install Dinomi... 5 Step : Connect to an external PBX and configure Dinomi...

More information

TEAMWORK SYSTEM. version user guide

TEAMWORK SYSTEM. version user guide version 17.0.1 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any means. All

More information

7.3 Install on Linux and Initial Configurations

7.3 Install on Linux and Initial Configurations 7.3 Install on Linux and Initial Configurations This section describes how to install SoftEther VPN Server to a Linux operating system. This assumes that in the Linux operating system, no extra application

More information

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006 Netfilter Fedora Core 5 setting up firewall for NIS and NFS labs June 2006 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering (Firewall) Stateful packet

More information

Automating Linux App Startup

Automating Linux App Startup Automating Linux App Startup David Boyes Sine Nomine Associates Agenda Runlevels, init, and symlinks, oh, my! Sequence of events during startup A sample application startup script Caveats on insserv, yast

More information

Extension User Guide. S-Series Extension User Guide

Extension User Guide. S-Series Extension User Guide Extension User Guide Sales Tel: +86-592-5503309 E-mail: sales@yeastar.com Support Tel:+86-592-5503301 E-mail: support@yeastar.com Web: http://www.yeastar.com Version: 1.0 Revised: 2016.06 1 Contents 1.

More information

:13 1/10 Traffic counting on the CCGX

:13 1/10 Traffic counting on the CCGX 2017-08-18 15:13 1/10 Traffic counting on the CCGX Traffic counting on the CCGX There are situation in which it is interesting to know the traffic usage of the color control. This can be done on the CCGX

More information

Gyrfalcon 2.0 User's Guide

Gyrfalcon 2.0 User's Guide User's Guide November 26, 2013 Classified By: 2245665 Reason: 1.4(c) Declassify On: 20381126 Derived From: COL S-06 //20381126 November 2013 (U) Table of Changes Date Change Description Authority 11/26/13

More information

Elastix Installation Manual

Elastix Installation Manual Synway AST Series Elastix 1.5.2 Installation Manual Synway Information Engineering Co., Ltd www.synway.net Contents Contents...i Copyright Declaration...ii Software License Agreement...iii Preface...iv

More information

Writing LCFG components

Writing LCFG components Writing LCFG components Innovative Learning Week Wed 17th February 2016 Paul Anderson Alastair Scobie Stephen Quinney Kenny MacDonald B compiler component schema D machine profile A application to be configured

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Automating Linux App Startup

Automating Linux App Startup Automating Linux App Startup David Boyes Session L55 2006 Sine Nomine Associates Agenda Runlevels, init, and symlinks, oh, my! Sequence of events during startup A sample application startup script Separating

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

systemd: Converting sysvinit scripts

systemd: Converting sysvinit scripts systemd: Converting sysvinit scripts Welcome back for another installment of the systemd series. Throughout this series, we discuss ways to use systemd to understand and manage your system. This article

More information

Synchro PRO 2016 Shared User License Manager Installation Instructions

Synchro PRO 2016 Shared User License Manager Installation Instructions Synchro PRO 2016 Shared User License Manager Installation Instructions i electronically or otherwise, or transmitted in any form, without the express prior permission of Synchro Installation 1. Run setupsynchrolicenseserver.exe,

More information

Confining Spacewalk with SELinux

Confining Spacewalk with SELinux Confining Spacewalk with SELinux Jan Pazdziora Principal Software Engineer Satellite Engineering, Red Hat Open Source Conference 2011 19 th April 2011 Prague, Czech Republic What is Spacewalk? System management

More information

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK Mastering Linux Paul S. Wang CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an Imprint of the Taylor & Francis Croup an informa business A CHAPMAN St HALL BOOK Contents Preface

More information

Part 1: Basic Commands/U3li3es

Part 1: Basic Commands/U3li3es Final Exam Part 1: Basic Commands/U3li3es May 17 th 3:00~4:00pm S-3-143 Same types of questions as in mid-term 1 2 ls, cat, echo ls -l e.g., regular file or directory, permissions, file size ls -a cat

More information

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 5: Firewalls and Network Address Translation (NAT) Spring 2009 Lab 5: Firewalls and Network Address Translation (NAT) The purpose of this lab is to exercise the use of iptables

More information

Contents. Preventing Brute Force Attacks. The First Method: Basic Protection. Introduction. Prerequisites

Contents. Preventing Brute Force Attacks. The First Method: Basic Protection. Introduction. Prerequisites Contents 1 Preventing Brute Force Attacks 1.1 Introduction 1.2 Prerequisites 2 The First Method: Basic Protection 2.1 Implementing Basic Protection for SSH (outdated) 2.2 Protecting Telnet in Addition

More information

SoLink-Lite IP-PBX. Administrator Guide. (Version 1.0)

SoLink-Lite IP-PBX. Administrator Guide. (Version 1.0) SoLink-Lite IP-PBX Administrator Guide (Version 1.0) TABLE OF CONTENT 1.0 Introduction... 1 2.0 Setting Up the IP-PBX... 2 3.0 Logging On... 3 4.0 Configuring Network... 4 5.0 Configuring Hardware... 5

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Firmware RELEASE NOTES

Firmware RELEASE NOTES Firmware 6.1.4 RELEASE NOTES Abstract This document describes: Firmware upgrade instructions. Description of all new features, fixes and other changes implemented in firmware 6.1.4. Known issues. For detailed

More information

Containers. Pablo F. Ordóñez. October 18, 2018

Containers. Pablo F. Ordóñez. October 18, 2018 Containers Pablo F. Ordóñez October 18, 2018 1 Welcome Song: Sola vaya Interpreter: La Sonora Ponceña 2 Goals Containers!= ( Moby-Dick ) Containers are part of the Linux Kernel Make your own container

More information

Advanced Unix Programming Module 03 Raju Alluri spurthi.com

Advanced Unix Programming Module 03 Raju Alluri spurthi.com Advanced Unix Programming Module 03 Raju Alluri askraju @ spurthi.com Advanced Unix Programming: Module 3 Shells & Shell Programming Environment Variables Writing Simple Shell Programs (shell scripts)

More information

ameh Documentation Release Eric Pierce

ameh Documentation Release Eric Pierce ameh Documentation Release 0.0.1 Eric Pierce July 17, 2012 CONTENTS 1 Motivation 3 2 Configuration 5 3 Usage 7 3.1 Permissions................................................ 7 3.2 init....................................................

More information

Mills HPC Tutorial Series. Linux Basics II

Mills HPC Tutorial Series. Linux Basics II Mills HPC Tutorial Series Linux Basics II Objectives Bash Shell Script Basics Script Project This project is based on using the Gnuplot program which reads a command file, a data file and writes an image

More information

Elastix Installation Manual

Elastix Installation Manual Synway AST Series Elastix 2.3.0 Installation Manual Synway Information Engineering Co., Ltd www.synway.net Contents Contents... i Copyright Declaration... ii Software License Agreement... iii Preface...

More information

SIM Bank Scheduler Server User Manual. (for Version )

SIM Bank Scheduler Server User Manual. (for Version ) SIM Bank Scheduler Server User Manual (for Version 1.01.1) Introduction to the SIM of Bank Scheduler Server: SIM Bank Scheduler Server ( SIM Server for short) is a type of server software launched by our

More information

Installing SmartSense on HDP

Installing SmartSense on HDP 1 Installing SmartSense on HDP Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense installation... 3 SmartSense system requirements... 3 Operating system, JDK, and browser requirements...3

More information

7.3 Linux?????????????

7.3 Linux????????????? 7.3 Linux???????????????????SoftEther VPN Server?? Linux????????????????????????????????????????Linux??????????????????????????????????????????????????????????????????????????????????????Linux????????????????????????????????????????????????????

More information

9.3 Linux?????????????

9.3 Linux????????????? 9.3 Linux???????????????????VPN Bridge???Linux????????????????????????????????????????Linux?????????????????????????????????????????????????????????????????????????????????????? Linux????????????????????????????????????????????????????

More information

Week 6 Lesson 1: Control-Flow Statements (Continued)

Week 6 Lesson 1: Control-Flow Statements (Continued) Week 6 Lesson 1: Control-Flow Statements (Continued) 1 Chapter Objectives In this chapter, you will: Learn additional shell scripting tools including: Logic Case Statement Loops Purpose Indeterminate Loops

More information

Amazon Web Services Hands On S3 January, 2012

Amazon Web Services Hands On S3 January, 2012 Amazon Web Services Hands On S3 January, 2012 Copyright 2011-2012, Amazon Web Services, All Rights Reserved Page 1-8 Table of Contents Overview... 3 Create S3 Bucket... 3 Upload Content and Set Permissions...

More information

Using RDP with Azure Linux Virtual Machines

Using RDP with Azure Linux Virtual Machines Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.

More information

Services and Security

Services and Security Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html

More information

How to Create PAR or PCA Files on the Command Line

How to Create PAR or PCA Files on the Command Line How to Create PAR or PCA Files on the Command Line Use the phionar tool to back up the configuration of a single Barracuda NextGen Firewall F-Series or Barracuda NextGen Control Center. A cron job can

More information

nettalk DUO WiFi Configuration (using an Android smartphone)

nettalk DUO WiFi Configuration (using an Android smartphone) nettalk DUO WiFi Configuration (using an Android smartphone) Step 1. Activate your Device a. Locate your username and password inside of the box. b. Go to www.nettalk.com/activate and follow the activation

More information

Config Server Firewall. Đặng Thanh Bình

Config Server Firewall. Đặng Thanh Bình Config Server Firewall Đặng Thanh Bình Contents Introduction Features Installation Basic CSF commands Advanced Configuration 2 INTRODUCTION Intro Config Server Firewall (CSF) is a free and advanced firewall

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Introduction to UNIX Stephen Pauwels University of Antwerp October 2, 2015 Outline What is Unix? Getting started Streams Exercises UNIX Operating system Servers, desktops,

More information

netcat Johannes Franken

netcat Johannes Franken netcat Johannes Franken On this page I show example uses of netcat - a command line tool to create network connections over tcp or udp. Contents 1. Intended purpose 2. Usage as client

More information

bash Args, Signals, Functions Administrative Shell Scripting COMP2101 Fall 2018

bash Args, Signals, Functions Administrative Shell Scripting COMP2101 Fall 2018 bash Args, Signals, Functions Administrative Shell Scripting COMP2101 Fall 2018 Error Output Failed commands often generate unwanted or irrelevant error messages That output can be saved as a log, sent

More information

Micro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide

Micro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide Micro Focus Security ArcSight Connectors SmartConnector for Microsoft IIS Multiple Site File Configuration Guide June, 2018 Configuration Guide SmartConnector for Microsoft IIS Multiple Site File June,

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---

More information

This document is intended for use by Nagios XI Administrators who need a boost in I/O performance.

This document is intended for use by Nagios XI Administrators who need a boost in I/O performance. Purpose This document describes how to use a RAM disk to boost performance on a server. Target Audience This document is intended for use by Administrators who need a boost in I/O performance. Summary

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Stephen Pauwels Computer Systems Academic Year 2018-2019 Overview of the Semester UNIX Introductie Regular Expressions Scripting Data Representation Integers, Fixed point,

More information

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

Introduction To. Barry Grant

Introduction To. Barry Grant Introduction To Barry Grant bjgrant@umich.edu http://thegrantlab.org Introduction to Biocomputing http://bioboot.github.io/web-2016/ Monday Tuesday Wednesday Thursday Friday Introduction to UNIX* Introduction

More information

Vendor: RedHat. Exam Code: RH133. Exam Name: Red Hat Linux System Administration. Version: Demo

Vendor: RedHat. Exam Code: RH133. Exam Name: Red Hat Linux System Administration. Version: Demo Vendor: RedHat Exam Code: RH133 Exam Name: Red Hat Linux System Administration Version: Demo QUESTION NO: 1 You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based

More information

(U) Hive Infrastructure Installation and Configuration Guide

(U) Hive Infrastructure Installation and Configuration Guide (U) Hive Infrastructure Installation and Configuration Guide November 11, 2012 Classified By: 0706993 Reason: 1.4(c) Declassify On: 20371105 Derived From: COL S-06 ii //20371105 November 2012 (U) Table

More information

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 8: Samba Spring 2009 Lab 8: Samba The purpose of this lab is to share files among Windows and Linux hosts on a common network. The goal is to browse directories on the Linux

More information

OCTVQE Zaptel Echo Canceller (PRELIMINARY)

OCTVQE Zaptel Echo Canceller (PRELIMINARY) OCTVQE - Zaptel Echo Canceller User s Guide (Preliminary) OCTVQE Zaptel Echo Canceller (PRELIMINARY) User s Guide Revision 1.9 OctWare Inc. www.octware.net 4101, Molson St., Suite 300 Montreal Quebec H1Y

More information

Introduction to Linux for BlueBEAR. January

Introduction to Linux for BlueBEAR. January Introduction to Linux for BlueBEAR January 2019 http://intranet.birmingham.ac.uk/bear Overview Understanding of the BlueBEAR workflow Logging in to BlueBEAR Introduction to basic Linux commands Basic file

More information

Introduction to Linux

Introduction to Linux Introduction to Linux University of Bristol - Advance Computing Research Centre 1 / 47 Operating Systems Program running all the time Interfaces between other programs and hardware Provides abstractions

More information

List of Linux Commands in an IPm

List of Linux Commands in an IPm List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir

More information

Sipdex M200s IPPBX. Embedded. Support Any IP Phone. Softphone and SIP Client App

Sipdex M200s IPPBX. Embedded. Support Any IP Phone. Softphone and SIP Client App Sipdex M200s IPPBX Based on embedded asterisk system, SIPDEX M200s IPPBX is a high quality, stable PBX without any moving parts and a very small footprint required minimum technology knowledge to deploy.

More information

NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14

NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14 DNS Lab Write-up Craig T. Ciulla NCS490 Date Assigned: 11/03/14 Ronny L. Bull Due Date: 11/15/14 Setup on Primary VM In this section, I installed and configured all necessary packages on my primary VM

More information

Distributed Systems Security

Distributed Systems Security Distributed Systems Security Lab Assignments Module I IT Security Group (SeTI) Guillermo Suarez de Tangil (guillermo.suarez.tangil@uc3m.es) Remembering Server should offer: Web application (Fakebook) Remote

More information

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2 CTP Series Security Deployment Guide Release 6.2 20 February 2012 TABLE OF CONTENTS Introduction... 2 Outline... 2 Preparation... 2 Set BIOS Passwords... 2 First Boot Procedures... 2 Configuration Actions

More information

Installation and Administration Guide

Installation and Administration Guide Integrity Document Library Installation and Administration Guide Installing and using Integrity Agent for Linux 1-0277-0650-2006-03-09 Smarter Securi- Editor's Notes: 2006 Check Point Software Technologies

More information

Thunder Series for MobileIron Sentry

Thunder Series for MobileIron Sentry DEPLOYMENT GUIDE Thunder Series for MobileIron Sentry Table of Contents 1 Overview...2 2 Deployment Guide Overview...2 3 Deployment Guide Prerequisites...2 4 Accessing the AX Series Load Balancer...2 5

More information

Intro to Git. Getting started with Version Control. Murray Anderegg February 9, 2018

Intro to Git. Getting started with Version Control. Murray Anderegg February 9, 2018 Intro to Git Getting started with Version Control Murray Anderegg February 9, 2018 What is Version Control? * It provides one method for an entire team to use; everybody operates under the same 'ground

More information

CCloud for ios Devices

CCloud for ios Devices CCloud for ios Devices User Guide Guide Version 3.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. CCloud for ios - Introduction... 3 1.1.Starting Comodo Cloud...

More information

Installing an SSL certificate on your server

Installing an SSL certificate on your server Installing an SSL certificate on your server Contents Introduction... 2 Preparing your certificate... 2 Installing your Certificate... 3 IIS 8... 3 IIS 7... 7 Apache... 10 Plesk 12... 11 Plesk Onyx...

More information

Introduction to the Linux Command Line January Presentation Topics

Introduction to the Linux Command Line January Presentation Topics 1/22/13 Introduction to the Linux Command Line January 2013 Presented by Oralee Nudson ARSC User Consultant & Student Supervisor onudson@alaska.edu Presentation Topics Information Assurance and Security

More information

HP OpenView HP-UX Integration

HP OpenView HP-UX Integration HP OpenView HP-UX Integration User s Guide HP OpenView HP-UX Integration User s Guide Page 1/14 Table of Contents 1 Introduction This document describes the stages to integrate and use EATON with the HP

More information

Red Hat Gluster Storage 3.2 Console Installation Guide

Red Hat Gluster Storage 3.2 Console Installation Guide Red Hat Gluster Storage 3.2 Console Installation Guide Installing Red Hat Gluster Storage Console Red Hat Gluster Storage Documentation Team Red Hat Gluster Storage 3.2 Console Installation Guide Installing

More information

D. Delete the /var/lib/slocate/slocate.db file because it buffers all search results.

D. Delete the /var/lib/slocate/slocate.db file because it buffers all search results. Volume: 230 Questions Question No: 1 You located a file created in /home successfully by using the slocate command. You found that the slocate command could locate that file even after deletion. What could

More information

iptables and ip6tables An introduction to LINUX firewall

iptables and ip6tables An introduction to LINUX firewall 7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on

More information

CS Computer and Network Security: Firewalls

CS Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Fall 2017 Reminders Monday: Change of Plans Recording lecture - turn in your rules. Friday: Project Abstract The hardest paragraph

More information

Introduction. Pre-Installation Procedure. Installation Procedure Windows Server 2012 / Windows 8. Installation on Windows Server 2012

Introduction. Pre-Installation Procedure. Installation Procedure Windows Server 2012 / Windows 8. Installation on Windows Server 2012 Introduction When installing Ocularis version 3.0 or 3.5 on a Windows Server 2012 or Windows 8 operating system, you will need to perform a few additional steps before installing the Ocularis Base software

More information

3. Apache Server Vulnerability Identification and Analysis

3. Apache Server Vulnerability Identification and Analysis 1. Target Identification The pentester uses netdiscover to identify the target: root@kali:~# netdiscover -r 192.168.0.0/24 Target: 192.168.0.48 (Cadmus Computer Systems) Note: the victim IP address changes

More information

Zend Server Cluster Manager 5.5 Beta. Installation Guide. By Zend Technologies.

Zend Server Cluster Manager 5.5 Beta. Installation Guide. By Zend Technologies. Zend Server Cluster Manager 5.5 Beta Installation Guide By Zend Technologies www.zend.com Abstract This is the Installation Guide for Zend Server Cluster Manager Version 5.5 Beta. The information in this

More information