Linux Networking TCP/IP stack – kernel controls the TCP/IP protocol – Ethernet adapter is hooked to the kernel in with the ipconfig command – ifconfig.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
DHCP Dynamic Host Configuration Part 7 NVCC Professional Development TCP/IP.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Advanced Networking for DVRs
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
DHCP. DHCP (Dynamic Host Configuration Protocol) is a network service that enables clients to obtain network settings (IP Address, Subnet Mask, Default.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Linux Networking #2 Dr. Michael L. Collard 1.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Chapter 10 Networking and the Internet ITSC 1458.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
Setting up NIS and HTTP. Network Information Service Reading: 1. Linux NIS HOWTO: howto/HOWTOhttp://
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Links and LANs Link between two computers via cross cable The most simple way to connect two hosts is to link the two hosts with a cross cable.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
CIS 192B – Lesson 3 Network Information Services.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 TCP/IP Networking Yue Cui 06/13/02. 2 Presentation Outline Introduction Packets and Encapsulation IP Addresses, Routing ARP, DHCP and PPP Security Issue.
How to connect to the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Networking Material taken mainly from HowStuffWorks.com.
Linux Operations and Administration Chapter Eight Network Communications.
Sample DNS configurations. Example 1: Master 'master' DNS and is authoritative for this zone for example.com provides 'caching' services for all other.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Linux Operations and Administration
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Wireless Access Point. What is a WAP?  A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network.
Chapter Objectives In this chapter, you will learn:
Troubleshooting ip Chapter 5e.
LINUX ADMINISTRATION
Introduction to Networking
Troubleshooting IP Addressing
IIS.
TCP/IP Networking An Example
By - Ricardo Sanchez, Ken Wolters and William Hibbard
Setting Up Firewall using Netfilter and Iptables
OPS235: Configuring a Network Using Virtual Machines – Part 2
Troubleshooting ip Chapter 5e.
AbbottLink™ - IP Address Overview
Module 12 Network Configuration
Presentation transcript:

Linux Networking TCP/IP stack – kernel controls the TCP/IP protocol – Ethernet adapter is hooked to the kernel in with the ipconfig command – ifconfig sets the ip address as well as netmask and broadcast addresses

Network Hardware Typically linux finds the NIC (PCI) at bootup but the administrator needs to tell linux that the card is to be enabled. If linux doesn’t discover the NIC (network interface card) you must assign the card type, interrupt and base address for the card in the linux kernel.

Ipconfig ifconfig eth0 addr broadcast netmask Netmask forces TCP/IP to go only to the router interface for any address except those in Broadcast limits broadcasts to the subnet

DHCP Dynamic Host Configuration Protocol – Allows the client to grab TCP/IP setup information from a centralized service – The client broadcasts the request over the ethernet interface. – The router recognizes the DHCP request and forwards that request to a server or system that is configured into the router as a DHCP device.

Name Service DHCP typically assigns the nameservers for the linux box. DHCP does not assign the search domain for the box. Name resolution configuration is done in the /etc/resolv.conf file. If the domain search field is set to usu.edu then you can access: cc.usu.edu as just cc. If you want to contact you would have to use If the domain search field is usu.edu and cs.usu.edu then you can access as The ambiguity is: What if you want and not You would then need to use the fully qualified host name to contact the site you desire.

Routers Routers are added via DHCP or the route command. The default route for a system is the address that all of the packets flow if they are resolved elsewhere. Other routers may be defined using appropriate netmasks and ip addresses. Since route configuration may follow indistinct paths the configuration may have to tell route how may hops (intermediate routers) there are between the local box and the actual ‘default’ router.

Linux Network Features NFS – Network File System – Centralized File sharing NIS (Yellow Pages) – Centralized password/authentication system

NFS Server Setup NFS Server enabled RPC server enabled /etc/exportfs file created – /usr/local –o ro sys1,sys2,sys3 – /home/users –o rw sys1,sys2,sys3

NFS Client Setup Run mountd, lockd, statd Mount the remote disk as: – mount –o ro server.cs.usu.edu:/usr/local /usr/local

NIS Server Setup Domainname – This is the YP domainname not necessarily the DNS domain name – ypserve, set up the yp server as a master – ypbind, bind to the server – yppasswdd, the password changing daemon – Create the maps with ypmake

NIS Client Setup Set the yp domainname Bind to the server – ypbind Add wildcard info to the /etc/passwd and /etc/group files (+::::::::) Add wildcard to other files as needed

PPP (dialup) PPP will automatically configure the linux box to act as a router for the dialin users. When a user dials in, the PPP protocol typically starts immediately so the user doesn’t see a login prompt. The PPP (CHAP/PAP) authorization is built into the protocol. NAT (Network Address Translation) will allow the linux box to take packets from systems on an internal (non- routable) address and translate those requests to the address of the router interface.

Linux as a router The linux box can handle up to 4 NIC (network interface cards) to act as a router for a wide area network and 3 internal networks. With this configuration the linux box can act as a firewall. The program routed handles the packet exchange between boards. Care must be exercised in configuring routed so that packets are misrouted, i.e. packets are sent to the wrong interface. One of the interfaces is the WAN and should be listed as the default router.

IP access control Ipchains and iptables can limit packets (by address and port) in either direction (coming in to the box or going out of the box) If a particular address needs to be filtered then ipchains or iptables can block that address and never even look a which port it’s want to attach to. IP access can be controlled (filtered) by using ipchains or iptabels on the linux box. Ipchains or iptables can also limit which service (port) is available to outside addresses.

Xinetd Xinetd controls which services are accessible from the internet The port numbers xinetd translate into service names are located in /etc/services. Xinetd controls what process owns the service and what flags are passed to the service program. Xinetd times outs the service program when the internet user completes to that memory and CPU time are freed.

Xinetd server programming Xinetd redirects input that would be from stdin and takes that from the IP packets Xinetd redirects output that would go to stdout and puts them into the IP packets. If a program is dispatched through xinetd then all I/O can be done via stdin and stdout

Background Programs The xinetd system has a time latency since packets need to be dispatched and the a program must start before the service can begin. To enhance network speed a program can be started at boot time and run in the background. These programs must communicate with the TCP/IP stack using system calls. Stdin and stdout calls will be lost or redirected to system logs and not the network.

Network Programs High network intensive programs need to run at all times on the system. Examples are: – Web servers (http) May run several processes to gain throughput – Network file services – Remote Procedure Call programs – Mail Low impact programs – telnet – ftp – Time – news

Network monitoring ping echo test traceroute check the router path netstat – -r show the routing table – -i shows the interfaces – -p what program is doing network stuff – No option What is presently going on

External Tools Sniffer, snoop, tcpdump – Look at packets on the wire Scanner (nmap) – What ports are open? Security checks – Mail relays, writeable anonymous ftp

Class Evaluations Remember to do the evaluations!

December 5, 2002 The End