Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer

Slides:



Advertisements
Similar presentations
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Advertisements

Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Network+ Guide to Networks, Fourth Edition Chapter 10 Netware-Based Networking.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Guide To UNIX Using Linux Third Edition
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Instructor: Michael Teske BI222.  Lab follow up  Current events  Linux/Unix best practices  Project Management.
1 Web Server Administration Chapter 9 Extending the Web Environment.
1 Pertemuan 6 Finishing the Configuration. Discussion Topics Importance of configuration standards Interface descriptions Configuring interface description.
Network Services CSCI N321 – System and Network Administration Copyright © 2000, 2007 by Scott Orr and the Trustees of Indiana University.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Remote Controller & Presenter Make education more efficiently
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Berkeley R Utilities & the new S Utilities The Unix (or Berkeley) r utilities provide an alternative to IP facilities telnet and ftp. Three programs: rlogin.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Phil Hurvitz Securing UNIX Servers with the Secure.
Accessing Evitech network via FTP by Susan Jansson.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Linux Services Configuration
Apache, MySQL and PHP Installation and Configuration Chapter 2 MySQL Installation and Configuration.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Linux Operations and Administration
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Unit – 5 FTP Server. FTP Introduction One of the oldest and most commonly used protocols The original specification for the File Transfer Protocol was.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
LINUX - SAMBA
Web and Proxy Server.
Enumeration.
Chapter 7: Using Network Clients
Introduction to Operating Systems
Mail Server Basic.
Chapter 5 Linux Services
LINUX ADMINISTRATION 1
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Web Server Administration
Logging into the linux machines
Lab 1 introduction, debrief
File Transfer Olivia Irving and Cameron Foss
Network Services CSCI N321 – System and Network Administration
Telnet/SSH Connecting to Hosts Internet Technology.
Network Services.
Configuring Internet-related services
COP 4343 Unix System Administration
Web Servers / Deployment
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Logging into the linux machines
Computer Networks Protocols
Presentation transcript:

Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer Telnet SSH SCP, rsync

Router Configuration Use Cisco Packet Tracer

Webmin Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more. Webmin removes the need to manually edit Unix configuration files like /etc/passwd, and lets you manage a system from the console or remotely. Download webmin.rpm file from google Install webmin rpm file

Webmin In a web browser, enter the https address of the server with the port number 10000 to access Webmin - for example: https://192.168.1.1:10000 -or- https://myserver.example.net:10000 You will need to enter the root password of the server running Webmin to use the Webmin interface and administer the server.

Team viewer TeamViewer is a proprietary computer software package for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers. The software operates with the Microsoft Windows, OS X, Linux, iOS, Android, Windows RT and Windows Phone operating systems. It is possible to access a machine running TeamViewer with a web browser. While the main focus of the application is remote control of computers, collaboration and presentation features are included.

What is Telnet? Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer.

SSH Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.

SCP Secure copy or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. scp SourceFile user@host:directory/TargetFile scp user@host:directory/SourceFile TargetFilescp -r user@host:directory/SourceFolder TargetFolder

rsync rsync is a utility software and network protocol for Unix-like systems (with ports to Windows) that synchronizes files and directories from one location to another while minimizing data transfer by using delta encoding when appropriate One of the earliest applications of rsync was to implement mirroring or backup for multiple Unix clients to a central Unix server using rsync/ssh and standard Unix accounts.

The example below is for automatical settings The example below is for automatical settings. Ecxample ⇒ Copy files and directories in /var/www/html on a HostA[10.0.0.31] to in /home/backup on HostB[10.0.0.30].

Rsync - Synchronizes files and directories [root@dlp ~]# yum -y install rsync xinetd [root@dlp ~]# vi /etc/xinetd.d/rsync # default: off # description: The rsync server is a good addition to an ftp server, as it \ #      allows crc checksumming etc. service rsync { disable = no # change flags = IPv6 socket_type = stream wait = no user = root server = /usr/bin/rsync server_args = --daemon log_on_failure += USERID }

[root@dlp ~]# /etc/rc.d/init.d/xinetd start  Starting xinetd:[ OK ] [root@dlp ~]# chkconfig xinetd on [root@dlp ~]# mkdir /home/backup  [root@dlp ~]# vi /etc/rsyncd.conf # any name you like [website] # destination directory path = /home/backup # Hosts you allow to copy (specify source Host) hosts allow = 10.0.0.31 hosts deny = * list = true uid = root gid = root read only = false

[2]Configure on Source Host.[root@www ~]# yum -y install rsync [root@www ~]# vi /etc/rsync_exclude.lst # specify files or directories you'd like to exclude to copy test test.txt

[3]It's OK. Execute rsync on Source Host like follows. [root@www ~]# rsync -avz --delete --exclude-from=/etc/rsync_exclude.lst /var/www/html/ 10.0.0.30::website # Add in cron if you'd like to run reguraly [root@www ~]# crontab -e # run at 2:00 AM in a day 00 02 * * * rsync -avz --delete --exclude-from=/etc/rsync_exclude.lst /var/www/html/ 10.0.0.30::website

Packet Analysis by using TCPDUMP and WIRESHARK TCPDUMP Command Wireshark installation