Welcome To : Group 1 VC Presentation

Slides:



Advertisements
Similar presentations
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Advertisements

Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Wi-Fi Structures.
1  Teacher : KIM Bunthoeurn  Group 3  Group members: o ENG Phally o CHHENG Sounly o POV Sopheap o SRORNG Voleak o NGET Phanny  Topic: Company description.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Your storage on the ground; Your files in the cloud.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Virtual Company Group 8 Presentation Date: June /04/2017
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Intranet, Extranet, Firewall. Intranet and Extranet.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Chapter Overview Network Communications.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 11: Remote Access Fundamentals
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Chapter TCP/IP in the Windows Environment © N. Ganesan, Ph.D., All rights reserved.
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
CompTIA Network+ Certification Exam
Security fundamentals
Getting Connected to NGS while on the Road…
MTA Network Fundamental Cram Sesion
Chapter 7: Using Windows Servers
Palo Alto Networks Certified Network Security Engineer
Chapter 1 Introduction to Networking
Connecting Desktops and Laptops to Networks
Installing TMG & Choosing a Client Type
Module 3: Enabling Access to Internet Resources
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
TECHNOLOGY GUIDE THREE
Pass4itsure Microsoft Dumps
Securing the Network Perimeter with ISA 2004
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Some bits on how it works
MCSA VCE
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
FTP - File Transfer Protocol
Implementing TMG Server Publishing
CompTIA Network+ Certification Exam
Network Services, Cloud Computing, and Virtualization
6.6 Firewalls Packet Filter (=filtering router)
Microsoft Dumps VCE
NTC 324 RANK Education for Service-- ntc324rank.com.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
IIS.
Guide to Computer Network Security
Routing and Switching Essentials v6.0
Information Security Session October 24, 2005
Firewalls Routers, Switches, Hubs VPNs
Professional Network Services
Getting Connected to NGS while on the Road…
Firewalls Jiang Long Spring 2002.
AbbottLink™ - IP Address Overview
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
How To Configure Hotspot in Virtual Mikrotik on VMware
Instructor Materials Chapter 8: Applied Networking
Computer Networks Protocols
STATEL an easy way to transfer data
Introduction to Networking Security
Presentation transcript:

Welcome To : Group 1 VC Presentation Tuesday, 26th, June, 2012

Agenda Introduction Show the network infrastructure Service that we use Security in network Problems & Solutions in this VC Tasks complete and not complete What we have learnt from this VC Recommendations and References Questions and Answers

Introductions To group

Introduction To VC What is VC? When did we do this VC? Why did we do this VC?

NETWORK INFRASTRUCTURE

Services Windows AD : is service use for control users and computers DNS : is service use for resolve name DHCP : is service for provide IP address, net mask gateway, suffix domain to clients File Server : is used for share and manage folder to user for store data

Services Fedora Mail Server : is service use for control sent and receive mail Web Server : is service use for hosting webpage on browser FTP Server : is a server use for hosting file easy to upload and download Proxy Server: is service and application use for share internet block web site, manage speed Internet ..etc,

Services Firewall : Allow or filter IP or Protocol Monitoring : is use for monitor on server or monitor on package incoming and outgoing VPN Server : is a virtual private network use for enable organization to have route between the separate network with organization over the public network.

Security In Network DMZ VLAN Router Anti-virus SSL encryption Backup data & file

Security In Network Complex password Software Firewall (iptables) Permission on folders & files VPN (Virtual Private Network) Authentication (proxy, FTP, VPN, SMTPS)

Problems And Solutions Short time New OS (window server 2008 and fedora) Conflict with task and time management Configure on real machine not on virtual machine Lack of equipment ( router, switch, client machine…)

Problems And Solutions Try to search internet and ask others group Try to do in free time to complete the tasks Help each others in team and other group Arrange the time and task management again Motivation

Tasks Complete And Not Complete Switch File Server AD, DNS, DHCP Network Monitoring Web and FTP Server VPN Server (Point to Point)

Tasks Complete And Not Complete Tasks not complete: Configure router Proxy ( Only user can not authenticate) Mail Server (client can not change password)

What we have learned from this VC? Technical Improve searching The real experiences Subnetting of IP address Cabling the real network cables Set up the real network infrastructure Can install and configure service in new OS Troubleshoot the real problem on the real materials Can practice on real material ( switch, router, PC… )

What we have learned from this VC? Non technical Responsibility. Solidarity and trust Can know how to do reports Can manage time and task management Good communication and good team work Prepare our self to be a good staff in the future

Recommendations and References Not enough time to complete our tasks. Internet connection doesn’t work properly More materials like switch, router and machine clients

Recommendations and References Configure Proxy, Web, FTP and Mail http://www.server world.info/en/note?os=Fedora_10&p Configure Nagios http://nagios.sourceforge.net/docs/3_0/quickstart-fedora.html

Questions and Answers