118
Internet System Management

Internet System Management. Lesson 1: IT Systems and Services Overview

Embed Size (px)

Citation preview

Page 1: Internet System Management. Lesson 1: IT Systems and Services Overview

Internet System Management

Page 2: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 1:IT Systems and

Services Overview

Page 3: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

List the services offered by IT departments

Identify backbone and mission-critical services offered by IT departments

Discuss the concepts of system maintenance

Page 4: Internet System Management. Lesson 1: IT Systems and Services Overview

Common IT Tasks and Services

System and service installation

Web server configuration

FTP server configuration and management

Name resolution configuration

E-mail server installation and support

E-commerce server installation and support

Page 5: Internet System Management. Lesson 1: IT Systems and Services Overview

Common IT Tasksand Services (cont’d)

Database server installation and support

User management

Server monitoring and optimization

File backup

Routing

Establishing and managing shares

Page 6: Internet System Management. Lesson 1: IT Systems and Services Overview

Backbone Services

Naming services

Address management

Directory services

Central logon

Routing

Page 7: Internet System Management. Lesson 1: IT Systems and Services Overview

Mission-Critical Services

Mission-critical services are highly visible

Users rely on mission-critical services

Examples

- Mail servers

- Web servers

- FTP servers

- Middleware

Page 8: Internet System Management. Lesson 1: IT Systems and Services Overview

System Configuration

Binding protocols to the network interface card

Protocol management

Addressing

Gateways

Name resolution configuration

Service and application installation and management

IP addressing

Page 9: Internet System Management. Lesson 1: IT Systems and Services Overview

User Management

Adding and removing users

Using applications

Managing permissions

Group membership

Password aging

Account lockout

Password history

Controlled access

Page 10: Internet System Management. Lesson 1: IT Systems and Services Overview

System Performance

Bandwidth and access rate issues

System I/O performance

Hard drive access statistics

CPU usage

RAM usage

Page 11: Internet System Management. Lesson 1: IT Systems and Services Overview

Backup

Archiving user-created files

Keeping copies of entire operating systems

Storing changes to databases and other data stores

Off-site storage

Page 12: Internet System Management. Lesson 1: IT Systems and Services Overview

Maintenance

Upgrading operating systems

Installing service packs and hot fixes

Upgrading services, including Web ande-mail servers

Scanning hard drives for errors

Upgrading hard drives to provide more storage capacity

Page 13: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

List the services offered by IT departments

Identify backbone and mission-critical services offered by IT departments

Discuss the concepts of system maintenance

Page 14: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 2:Internet System Installation

and Configuration Issues

Page 15: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Identify common hardware platforms

Describe capabilities of various platform components

Define bandwidth and throughput

Identify common network operating systems

Determine the ideal operating system for a given environment

Discuss system installation issues

Page 16: Internet System Management. Lesson 1: IT Systems and Services Overview

System Elements

Bus speed

System I/O

NIC

Hard drive

RAM

Page 17: Internet System Management. Lesson 1: IT Systems and Services Overview

Bandwidth

The total amount of information a network connection can carry

Network connections

- T1

- Fractional T1

- T2

- T3

- ISDN

- DSL

Page 18: Internet System Management. Lesson 1: IT Systems and Services Overview

CalculatingThroughput

A percentage of bandwidth; the amount a network connection is being used

Throughput elements

- Connection speed

- Amount of information

- Time available for transfer

Page 19: Internet System Management. Lesson 1: IT Systems and Services Overview

Internetworking Operating Systems

Microsoft Windows

UNIX

Linux

System V

Novell

X Windows

Page 20: Internet System Management. Lesson 1: IT Systems and Services Overview

Operating System Issues

Ease of use

Platform stability

Available talent pool

Available technical support

Page 21: Internet System Management. Lesson 1: IT Systems and Services Overview

Operating SystemIssues (cont’d)

Cost

Hardware costs

Availability of services and applications

Purpose for the server

Page 22: Internet System Management. Lesson 1: IT Systems and Services Overview

Installing NetworkOperating Systems

Single-boot and dual-boot machines

Local and network installation

Hardware considerations

Listing system components

Page 23: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Identify common hardware platforms

Describe capabilities of various platform components

Define bandwidth and throughput

Identify common network operating systems

Determine the ideal operating system for a given environment

Discuss system installation issues

Page 24: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 3:Configuring the System

Page 25: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

List key TCP/IP configuration parameters

Add NICs in Windows 2000 and Linux

Configure Windows 2000 with static IP addresses

Configure Linux with static IP addresses

Describe how DHCP works

Page 26: Internet System Management. Lesson 1: IT Systems and Services Overview

TCP/IP Configuration Parameters

Computer name

IP address

Subnet mask

Default gateway

DNS information

DHCP client information

WINS

Page 27: Internet System Management. Lesson 1: IT Systems and Services Overview

Adapters

Adding network adapter device drivers in UNIX/Linux

Adding network adapter device drivers in Windows 2000

Binding device drivers to protocols in Windows 2000

Device Drivers (NIC)

Page 28: Internet System Management. Lesson 1: IT Systems and Services Overview

Static Addressing

Windows 2000

ipconfig

Linux

ifconfig

ifup

ifdown

linuxconf

netcfg

dmesg

grep

Page 29: Internet System Management. Lesson 1: IT Systems and Services Overview

Additional TCP/IP Issues and Commands

netstat

traceroute

router

arp

Page 30: Internet System Management. Lesson 1: IT Systems and Services Overview

Dynamic Addressing

DHCP lease process

D i s c o v e r

O f f e r

R e q u e s t

A c k n o w l e d g m e n t

Page 31: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

List key TCP/IP configuration parameters

Add NICs in Windows 2000 and Linux

Configure Windows 2000 with static IP addresses

Configure Linux with static IP addresses

Describe how DHCP works

Page 32: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 4:User Management

Essentials

Page 33: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Define authentication

Explain the share-level and user-level access security models

Identify the purposes and functions of logon accounts, groups and passwords

Create a network password policy using standard practices and procedures

Page 34: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives (cont’d)

Discuss permissions issues

Describe the relationship between permissions and user profiles

Use administrative utilities for specific networks and operating systems

Identify the permissions needed to add, delete or modify user accounts

Page 35: Internet System Management. Lesson 1: IT Systems and Services Overview

Authentication

What you know

What you have

Who you are

Page 36: Internet System Management. Lesson 1: IT Systems and Services Overview

Security Models and Authentication

text

Peer-levelAccess

User-levelAccess

Page 37: Internet System Management. Lesson 1: IT Systems and Services Overview

Peer-Level Access

Athena Aphrodite Hermes

Apollo Ares

Printer

Page 38: Internet System Management. Lesson 1: IT Systems and Services Overview

User-Level Access

Athena Aphrodite Hermes

AresApollo

User AccountsDatabase

Printer A

Printer B

Page 39: Internet System Management. Lesson 1: IT Systems and Services Overview

Peer-Level vs. User-Level

Peer-level

Less expensive

Easier to implement

Less secure

Less control over file and resource management

Not scalable

User-level

Increased security

Supports larger number of users

Increased control

Offers system logs

Grows with organizational needs

Page 40: Internet System Management. Lesson 1: IT Systems and Services Overview

Creating User Accounts

User name

Password

Group associations

Permissions

Additional options

Page 41: Internet System Management. Lesson 1: IT Systems and Services Overview

Permissions

Read

Write

Execute

Print

User AccountsDatabase

Print

Write

Print

Exec.

Write

Read

Printer

PrintServer

Server

Page 42: Internet System Management. Lesson 1: IT Systems and Services Overview

Windows 2000Permissions

Full control

Change

Read

No access

Page 43: Internet System Management. Lesson 1: IT Systems and Services Overview

UNIX Permissions

Access Value Bit

7

6

5

4

3

2

1

0

Access Value Bit Meaning

Read, write and execute

Read and write

Read and execute

Read only

Write and execute

Write

Execute

No mode bits (access absent)

Page 44: Internet System Management. Lesson 1: IT Systems and Services Overview

Novell Rights

Supervisor

Read

Write

Erase

Modify

Create

File scan

Access control

No access

Page 45: Internet System Management. Lesson 1: IT Systems and Services Overview

Additional LogonAccount Terms

Logon scripts

Home directories

Local profiles

Roaming profiles

Page 46: Internet System Management. Lesson 1: IT Systems and Services Overview

Administrative Privileges

UNIX =(including System V, Solaris, Free BSD and all Linux variants)

Windows =

Novell =

Root (full privilege)

Administrator (full privilege)

Supervisor (full privilege)

Page 47: Internet System Management. Lesson 1: IT Systems and Services Overview

Standard Password Practices

Create strong password

- At least six characters

- Both uppercase and lowercase letters

- At least one Arabic numeral

- At least one symbol

Implement password policy

- Plan and create a balanced policy

- Write and publish policy

- Train users

Page 48: Internet System Management. Lesson 1: IT Systems and Services Overview

Network Security Policies

Password aging

Password length

Password history

Account lockout

Share creation

User creation

Local logon

Page 49: Internet System Management. Lesson 1: IT Systems and Services Overview

Standard Operating Procedures

Vendors for operating systems and software

Upgrading, replacing and maintaining hardware

Upgrading software (including operating systems and applications)

Responding to power outages, building evacuation and hacker intrusion

Acceptable use policy

Page 50: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Define authentication

Explain the share-level and user-level access security models

Identify the purposes and functions of logon accounts, groups and passwords

Create a network password policy using standard practices and procedures

Page 51: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary (cont’d)

Discuss permissions issues

Describe the relationship between permissions and user profiles

Use administrative utilities for specific networks and operating systems

Identify the permissions needed to add, delete or modify user accounts

Page 52: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 5:Managing Users in Windows 2000

Page 53: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Identify the purpose of the Windows 2000 Security Accounts Manager

Administer remote Windows 2000 systems and users

Enforce systemwide policies

Convert a FAT drive to NTFS

Enable auditing in Windows 2000 Server

View local and remote events in Event Viewer

Page 54: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives (cont’d)

Manage file and directory ownership

Manage user rights

Enable custom user settings

Identify accounts used by Windows 2000 services

Page 55: Internet System Management. Lesson 1: IT Systems and Services Overview

The Security Accounts Manager

Sam

- A collection of processes and files used by Windows 2000 to authenticate users

- Located at C:\winnt\system32\config

Page 56: Internet System Management. Lesson 1: IT Systems and Services Overview

The ComputerManagement Snap-in

Managing users on a remote system

Page 57: Internet System Management. Lesson 1: IT Systems and Services Overview

LocalSecurity Settings

Start | Programs | Administrative Tools | Local Security Policy

- Configure account policies

- Establish auditing

- Change default user-rights settings

- Alter default settings for system peripherals and auditing options

- Determine public-key encryption and IP security policies

Page 58: Internet System Management. Lesson 1: IT Systems and Services Overview

Auditing,Ownership and Rights

Audit policy

User rights

Security options

Page 59: Internet System Management. Lesson 1: IT Systems and Services Overview

Editing and Customizing User Accounts

Groups

User environment

(home directory,

logon scripts, user

profiles)

Dial-in options

Page 60: Internet System Management. Lesson 1: IT Systems and Services Overview

Windows 2000Services and User Accounts

IIS

Remote Management

Terminal Services

NetShow Video Server

Page 61: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Identify the purpose of the Windows 2000 Security Accounts Manager

Administer remote Windows 2000 systems and users

Enforce systemwide policies

Convert a FAT drive to NTFS

Enable auditing in Windows 2000 Server

View local and remote events in Event Viewer

Page 62: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary (cont’d)

Manage file and directory ownership

Manage user rights

Enable custom user settings

Identify accounts used by Windows 2000 services

Page 63: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 6:Managing

Users in Linux

Page 64: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Create new accounts on Linux systems

Set password aging policies on Linux systems

Set account policies in Linux

View user accounts used by system daemons

Explain run levels

Use ntsysv and chkconfig

Page 65: Internet System Management. Lesson 1: IT Systems and Services Overview

Manually Adding Users

File

/etc/passwd

/etc/shadow

/etc/logon.defs

Purpose

Public user database

Shadow password file

Contains default values

Page 66: Internet System Management. Lesson 1: IT Systems and Services Overview

Manually Adding Users (cont’d)

File

/etc/default/useradd

/etc/skel

/etc/group

Purpose

Contains default values

Contains default values

Group file

Page 67: Internet System Management. Lesson 1: IT Systems and Services Overview

Linux User Accounts

Entry of the new account into a database

Creation of the resources the new account will need

Page 68: Internet System Management. Lesson 1: IT Systems and Services Overview

Linux User Account Properties

User name

User ID number

Primary group ID number

Home directory

Shell program

Password

Page 69: Internet System Management. Lesson 1: IT Systems and Services Overview

PluggableAuthentication Modules

The password file

The shadow password file

Creating and preparing home directories

Account creation utility

linuxconf

Page 70: Internet System Management. Lesson 1: IT Systems and Services Overview

Password Management and Account Policies

Passwordaging

Password checking

Page 71: Internet System Management. Lesson 1: IT Systems and Services Overview

Groups

Mechanisms for managing access tofiles and processes

Page 72: Internet System Management. Lesson 1: IT Systems and Services Overview

Linux System Accounts

Different subsystems should run under different accounts

File protections should be used to prevent one subsystem from interfering with resources belonging to another

Page 73: Internet System Management. Lesson 1: IT Systems and Services Overview

Run Levels,ntsysv and chkconfig

The /etc/inittab file

The /etc/rc.d/ directory

The ntsysv command

The chkconfig command

Page 74: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Create new accounts on Linux systems

Set password aging policies on Linux systems

Set account policies in Linux

View user accounts used by system daemons

Explain run levels

Use ntsysv and chkconfig

Page 75: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 7:Name Resolutionin LANs with DNS

Page 76: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Explain the DNS

Identify DNS components

List the common DNS record types

Define reverse DNS lookup

Implement DNS in Windows 2000 and Linux

Deploy DDNS

Use nslookup

Page 77: Internet System Management. Lesson 1: IT Systems and Services Overview

The Domain Name System

Internet service thatconverts common host names

into their correspondingIP addresses

Page 78: Internet System Management. Lesson 1: IT Systems and Services Overview

The Domain Name Space

Root

Second

TOP

Second

DNS consists of three levels

- Root

- Top

- Second

Page 79: Internet System Management. Lesson 1: IT Systems and Services Overview

Accessing Hosts by DNS Name

wwwwww

www.ciwcertified.com

host1host1

host1.ciwcertified.com

The .ciwcertified domainThe .ciwcertified domain

sales1sales1

sales2sales2

.sales

sales.ciwcertified.com

.dnsresearch

dns1dns1

dns2dns2

dnsresearch.research.ciwcertified.com

.research

research2research2

research1research1

research.ciwcertified.com

.research

research2research2

Possible Possible resolution to a resolution to a

top-level top-level domain, such domain, such

as .comas .com

Page 80: Internet System Management. Lesson 1: IT Systems and Services Overview

DNS Server Types

Root server

Master (or primary) server

Slave (or secondary) server

Caching-only server

Forwarding server

Page 81: Internet System Management. Lesson 1: IT Systems and Services Overview

Common DNS Records

Internet (IN)

Name Server (NS)

Start of Authority (SOA)

Address (A)

Canonical Name (CNAME)

Mail Exchanger (MX)

Pointer (PTR)

Page 82: Internet System Management. Lesson 1: IT Systems and Services Overview

Setting Up DNS

Server

Zone file

DNS record

Page 83: Internet System Management. Lesson 1: IT Systems and Services Overview

Probing DNS with Nslookup

Locate name servers

Locate IP addresses

Locate host names

Review various record types

Change servers

List domains

Page 84: Internet System Management. Lesson 1: IT Systems and Services Overview

Configuring DNS in Windows 2000

Dynamic DNS

- DNS record aging and scavenging

SOA field

WINS

Zone transfers

Page 85: Internet System Management. Lesson 1: IT Systems and Services Overview

Understanding BIND

BIND 4

BIND 8.x

BIND 9.x

Page 86: Internet System Management. Lesson 1: IT Systems and Services Overview

Setting Up DNS in Linux

The named.conf file (BIND versions 8 and 9)

The named.ca file

The named.local file

The forward zone file

The reverse zone file

Page 87: Internet System Management. Lesson 1: IT Systems and Services Overview

Troubleshooting DNS

DNS Professional

CyberKit Professional

Ping Plotter

WS_FTP Ping ProPack

Page 88: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Explain the DNS

Identify DNS components

List the common DNS record types

Define reverse DNS lookup

Implement DNS in Windows 2000 and Linux

Deploy DDNS

Use nslookup

Page 89: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 8:Name Resolution

with WINS and Samba

Page 90: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Explain the basics of NetBIOS

Identify additional name resolution options for LANs and WANs

Implement and manage WINS

Use Samba to create a WINS server in UNIX

Configure Samba systems to use Windows 2000 authentication

Create and manage shares using Samba

Page 91: Internet System Management. Lesson 1: IT Systems and Services Overview

NetBIOS over TCP/IP

NetBIOS runs over TCP/IP much thesame way that SMB runs over TCP/IP

Page 92: Internet System Management. Lesson 1: IT Systems and Services Overview

The NetBIOS Naming Convention

NetBIOS services use UDP ports 137 and 138 and TCP port 139

- 137 supports the NetBIOS name service

- 138 carries the NetBIOS datagram service

- 139 carries the NetBIOS session layer

Page 93: Internet System Management. Lesson 1: IT Systems and Services Overview

Windows Internet Naming Service

Handles queries regarding NetBIOS names and corresponding IP addresses

Uses UDP ports 137 and 138

NetBIOS computer name (Instructor1) IP address for

(Instructor1)

Page 94: Internet System Management. Lesson 1: IT Systems and Services Overview

Managing WINS

Scavenging and backup

- Scheduling queue

Page 95: Internet System Management. Lesson 1: IT Systems and Services Overview

Static Mapping

Static mapping creates entries in the WINS database that allow non-WINS clients

Entries include Unique Group Domain name Internet group Multihomed

Page 96: Internet System Management. Lesson 1: IT Systems and Services Overview

Replication

- Pushpartner

- Pullpartner

Page 97: Internet System Management. Lesson 1: IT Systems and Services Overview

Configuring DNS and WINS

DNS and WINS can work together to allow DNS to retrieve the dynamically assigned IP address associated with a particular name

Page 98: Internet System Management. Lesson 1: IT Systems and Services Overview

Samba

Samba allows UNIX systems to participate in Windows networks

- Establishes shares on UNIX hosts that are accessible to Windows systems

- Shares printers

- Makes a UNIX system a WINS server

- Makes a UNIX system a WINS client

Page 99: Internet System Management. Lesson 1: IT Systems and Services Overview

SWAT

Samba configuration tool

- Home

- Globals

- Shares

- Printers

- Status

- View

- Password

Page 100: Internet System Management. Lesson 1: IT Systems and Services Overview

Sambaand WINS

Creating a WINS client

Troubleshooting WINS in UNIX systems

Page 101: Internet System Management. Lesson 1: IT Systems and Services Overview

Samba Share Clients

Windows

- Network Neighborhood applet

- Windows Explorer Map Network Drive utility

Linux

- The smbclient program

- The smbmount program

Page 102: Internet System Management. Lesson 1: IT Systems and Services Overview

Interoperability Issues

Encrypting Samba passwords

- The smb.conf file

- The smbadduser command

- The smbpasswd command

- Registry changes

Page 103: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Explain the basics of NetBIOS

Identify additional name resolution options for LANs and WANs

Implement and manage WINS

Use Samba to create a WINS server in UNIX

Configure Samba systems to use Windows 2000 authentication

Create and manage shares using Samba

Page 104: Internet System Management. Lesson 1: IT Systems and Services Overview

Lesson 9:Implementing

Internet Services

Page 105: Internet System Management. Lesson 1: IT Systems and Services Overview

Objectives

Deploy user-level and anonymous FTP access in Windows 2000 and Linux

Describe standard and passive FTP

Configure Telnet for Windows 2000 and Linux

Configure finger in Linux

Control access to Linux services

Page 106: Internet System Management. Lesson 1: IT Systems and Services Overview

File TransferProtocol Servers

Application-layer protocol

Uses two ports

- TCP/20

- TCP/21

Passive mode

Normal mode

Page 107: Internet System Management. Lesson 1: IT Systems and Services Overview

Anonymous Accounts

Anonymous accounts in Windows NT

Anonymous accounts in UNIX

Account considerations

Page 108: Internet System Management. Lesson 1: IT Systems and Services Overview

ImplementingMicrosoft FTP

Microsoft Internet Information Server (IIS) is the primary way to implement FTP in Windows FTP

Page 109: Internet System Management. Lesson 1: IT Systems and Services Overview

Managing FTP in IIS

Security Accounts tab

Messages tab

Home Directory tab

Directory Security tab

Page 110: Internet System Management. Lesson 1: IT Systems and Services Overview

Creating Virtual FTP Servers

Dedicated virtual FTP servers

Simple virtual FTP servers

Shared virtual FTP servers

Page 111: Internet System Management. Lesson 1: IT Systems and Services Overview

Anonymous Access in IIS

Analyzing and configuring anonymous FTP

Controlling access to your FTP site

Customizing your IIS FTP server

Configuring anonymous FTP on UNIX

Page 112: Internet System Management. Lesson 1: IT Systems and Services Overview

Telnet

Controls a system from a remote location

Operates on port 23

Page 113: Internet System Management. Lesson 1: IT Systems and Services Overview

Xinetd

FTP

Telnet

Finger

SWAT

TFTP

Chargen

Daytime

POP3

BOOTP

Echo

Page 114: Internet System Management. Lesson 1: IT Systems and Services Overview

Finger

Accesses information about local and remote users

- Daytime

- Echo

- Chargen

Page 115: Internet System Management. Lesson 1: IT Systems and Services Overview

The hosts.allow andhosts.deny Files

Controls access to UNIX services

Page 116: Internet System Management. Lesson 1: IT Systems and Services Overview

Summary

Deploy user-level and anonymous FTP access in Windows NT and UNIX

Install and configure Telnet for Windows 2000 and UNIX

Configure finger in UNIX

Control access to UNIX services

Page 117: Internet System Management. Lesson 1: IT Systems and Services Overview

Internet System Management

IT Systems and Services Overview

Internet System Installation and Configuration Issues

Configuring the System

User Management Essentials

Managing Users in Windows 2000

Page 118: Internet System Management. Lesson 1: IT Systems and Services Overview

InternetSystem Management

Managing Users in Linux

Name Resolution in LANs with DNS

Name Resolution with WINS and Samba

Implementing Internet Services