Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.

Slides:



Advertisements
Similar presentations
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Advertisements

SYSTEM ADMINISTRATION Chapter 19
Chapter 13: Troubleshooting network connectivity Unit objectives Identify TCP/IP troubleshooting tools Discuss the Telnet utility and its functions Discuss.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
IS 247 Introduction to Web Application Development Tim Wu.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Linux Operations and Administration
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Course 201 – Administration, Content Inspection and SSL VPN
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Forensic and Investigative Accounting
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 7: Linux Network Services Chapter 10: Networking and the Internet By Fred R. McClurg Linux.
Computation for Physics 計算物理概論 Introduction to Linux.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Chapter 10 Networking and the Internet ITSC 1458.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Version 3.0 Module 11 TCP Application and Transport.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Linux Networking and Security
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
1 Chapter 34 Internet Applications (Telnet, FTP).
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Linux Services Configuration
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Linux Operations and Administration Chapter Eight Network Communications.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Windows Vista Configuration MCTS : Advanced Networking.
Application Layer Functionality and Protocols
Click to edit Master subtitle style
Chapter 7: Using Network Clients
Instructor Materials Chapter 5 Providing Network Services
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter 7 Network Applications
Computer Networks Protocols
Internet Applications (Telnet, FTP)
Presentation transcript:

Chapter 7: Using Network Clients The Complete Guide To Linux System Administration

The Complete Guide to Linux System Administration2 Objectives Log in to a Linux system over a network connection Use command-line tools for common network services such as FTP and the Web Perform simple network diagnostic checks

The Complete Guide to Linux System Administration3 Remote Login Networking integrated into kernel –Easily log in across network –Perform virtually same work as if you were seated in front of Linux system Server –Program running on Linux system listens for connections over network –Serves up information to another program Client –Program making requests

The Complete Guide to Linux System Administration4 Remote Login (continued) telnet –Most basic remote login capability –Set up by default on Red Hat Linux –Completely unprotected r-utilities –Designed to access remote computers in order to: Run programs Transfer files Perform other functions within trusted network environment –Designed for convenience, not security

The Complete Guide to Linux System Administration5 Remote Login (continued)

The Complete Guide to Linux System Administration6 Remote Login (continued) Secure shell (SSH) –Similar to telnet –Uses encryption so that everything transmitted over network is unreadable to other users

The Complete Guide to Linux System Administration7 The Telnet Remote Login Utility Terminal emulation program Log in to remote computer as if you were sitting at computer’s keyboard Must have: –telnet client –telnet server Command –telnet paris.mydomain.org

The Complete Guide to Linux System Administration8 The Telnet Remote Login Utility (continued) telnet session –Login –Execute commands on remote computer telnet designed for text only telnet program included with most versions of windows

The Complete Guide to Linux System Administration9 The Telnet Remote Login Utility (continued)

The Complete Guide to Linux System Administration10 The telnet Remote Login Utility (continued) To use telnet, need to know: –Remote host –Port number –Type of terminal to emulate –User name and password

The Complete Guide to Linux System Administration11 Using r-Utilities for Remote Execution r-utilities –Not used much anymore –Useful for working with multiple computers in trusted network –Most effective when you can set up configuration file on multiple computers /etc/hosts.equiv file –Contains hosts and user names permitted to access system using r-utilities

The Complete Guide to Linux System Administration12 Using r-Utilities for Remote Execution (continued)

The Complete Guide to Linux System Administration13 Using r-utilities for Remote Execution (continued) rhosts file –List of hosts and user names that you want to permit to access account without password

The Complete Guide to Linux System Administration14 Secure Shell (SSH) Encrypted version of telnet Data encoded so that only authorized recipient can read it Can also act as complete networking toolkit SSH consists of: –Client utility―ssh or slogin –Server program―sshd

The Complete Guide to Linux System Administration15 Secure Shell (SSH) (continued) SSH package also includes utilities Openssh –Free version of SSH –Installed by default on many Linux systems SSH can authenticate a connection using: –r-utilities files –User passwords –Public key encryption (preferred method)

The Complete Guide to Linux System Administration16 Secure Shell (SSH) (continued) Public key encryption –Method of encrypting information –Establishes secure connection without sending key over network connection In a way that compromises security of connection

The Complete Guide to Linux System Administration17 Data Services Tools for accessing –Web – Other network-based data services

The Complete Guide to Linux System Administration18 Accessing the Web Lynx –Text-based browser –Access Web sites when working on system that doesn’t have graphical interface –Very fast –Can be run from any command-line window –To use: lynx –Can download pages automatically using -dump option

The Complete Guide to Linux System Administration19 Accessing the Web (continued)

The Complete Guide to Linux System Administration20 Accessing the Web (continued) wget command –Download Web pages –Designed specifically for command-line downloading of Web pages –Example: wget http// –Download recursively Download Web page you indicate Plus all pages referred to on page Plus all pages linked to from those pages

The Complete Guide to Linux System Administration21 Accessing the Web (continued) Mirroring –Process of copying entire Web site or FTP site –Mirror entire Web site wget -m -k -K -E http// -o /tmp/gnu_site_log & kget graphical utility –Enter one or more urls –Have them downloaded to system in background while you do other work

The Complete Guide to Linux System Administration22 Accessing the Web (continued)

The Complete Guide to Linux System Administration23 Accessing the Web (continued) rsync utility –Uses SSH to transport files between systems –After first time files are copied, checks remote files to see what changes need to be updated –Example: rsync -avz stockholmdocs/ /data/docs

The Complete Guide to Linux System Administration24 Accessing FTP Servers File transfer protocol (FTP) –Standard method used to move files between computers on Internet Most publicly visible FTP servers support anonymous access –Log in using user name anonymous or FTP –Enter address as password –Browser provides login information automatically in background

The Complete Guide to Linux System Administration25 Accessing FTP Servers (continued)

The Complete Guide to Linux System Administration26 Accessing FTP Servers (continued) User name and password access –Administrator of FTP server must permit this type of connection –Access url: –Web browser starts connection and prompts for password Graphical FTP clients –IglooFTP pro –gFTP

The Complete Guide to Linux System Administration27 Accessing FTP Servers (continued) FTP utility –Text-mode program –Example: ftp ftp.ibiblio.org –Prompt changes to ftp> –Can transfer files in text mode or binary mode ncftp program –Similar to ftp –Preferred by administrators –Package includes other utilities (ncftpget, ncftpput)

The Complete Guide to Linux System Administration28 Accessing FTP Servers (continued)

The Complete Guide to Linux System Administration29 Accessing FTP Servers (continued)

The Complete Guide to Linux System Administration30 Accessing FTP Servers (continued)

The Complete Guide to Linux System Administration31 Networking and Network Diagnostic Tools Solve basic networking problems –Understand basics of networking –Use a few standard utilities

The Complete Guide to Linux System Administration32 Introduction to Networking Internet protocol (IP) –Core of networking in Linux –Sends packets of information across network Ethernet –Most widely used type of networking hardware Other network hardware –Token ring –Wireless 80211b

The Complete Guide to Linux System Administration33 Introduction to Networking (continued) IP address –Allows computers to locate each other on network –Each computer that uses IP must have address –Represented as series of four numbers Each from 0 to 255 Network mask helps system route packets correctly between multiple networks

The Complete Guide to Linux System Administration34 Introduction to Networking (continued) Routing –Moving packets of information efficiently through networks to reach correct destination –Only necessary when you have multiple networks that need to communicate Gateway or router –Computer attached to multiple networks used by computers on one network can reach other networks

The Complete Guide to Linux System Administration35 Introduction to Networking (continued) Transmission control protocol (TCP) provides stable connection between two computers Domain name –Used by humans to address computers –Must be converted to IP address Domain name system (DNS) converts domain names to IP addresses Dynamic host configuration protocol (DHCP) issues IP addresses on request

The Complete Guide to Linux System Administration36 Introduction to Networking (continued) ifconfig command –View active networking interfaces –Usually two network interfaces on Linux client Local interface Ethernet interface Can also use graphical tools to set up or alter network configuration

The Complete Guide to Linux System Administration37 Using ping for System Testing ping utility –Sends diagnostic data packet to specified computer –Verifies network connectivity Example: ping Use series of ping commands to test networking –ping to hosts further and further away from your system

The Complete Guide to Linux System Administration38 Using ping for System Testing Can also be used for malicious attacks –“Flood ping” –“Ping of death” –Many computers on internet do not respond to ping to prevent attacks

The Complete Guide to Linux System Administration39 Using traceroute to Examine Routing Patterns traceroute command –Carefully tracks each router between you and destination host –Lets you see Exactly where packets are going How long each hop takes –Tries a maximum of 30 hops to reach destination Can change this value

The Complete Guide to Linux System Administration40 Using traceroute to Examine Routing Patterns (continued) Useful tool for diagnosing problems such as –Where packet stops –Where packet slows down My traceroute program –Graphical interface in Red Hat

The Complete Guide to Linux System Administration41 Using traceroute to Examine Routing Patterns (continued)

The Complete Guide to Linux System Administration42 Summary Well-known methods of accessing Linux systems remotely –telnet –r-utilities –SSH suite of utilities Command-line utilities provided in Linux to download Web pages and access FTP sites Networking in Linux is based on IP

The Complete Guide to Linux System Administration43 Summary (continued) Computers communicate across multiple networks by: –Relying on routing information –Sending data packets through routers or gateways DNS servers convert domain names to IP addresses ifconfig utility displays network interfaces in Linux

The Complete Guide to Linux System Administration44 Summary (continued) ping command sends test packet to network location to determine if location is reachable traceroute command shows computers that data packet traverses between your system and system you want to reach