CIS 193A – Lesson10 Protecting Your Network. CIS 193A – Lesson10 Focus Question What information contained in packets can be used as matching criteria.

Slides:



Advertisements
Similar presentations
UNIVERSITY OF EDUCATION BY H.M.ISHTIAQ RAFIQUE. Domain Name Structure.
Advertisements

FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
CIS 193A – Lesson9 Network Infrastructure. CIS 193A – Lesson9 Focus Question What are three high level subnets a corporate intranet will want to support?
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Ver AB Terms Host: The computer to be tested Gateway: The router connected to that part of the network PDU: Protocol Data Unit Perform Network Fault.
Networking in VMware Workstation 8
hotEx RADIUS Manager Installation
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
APACHE SERVER By Innovationframes.com »
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Virtual IP Network Windows Server 2012 Windows 08 Dual Subnets.
Ch 8-3 Working with domains and Active Directory.
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Cybersecurity Computer Science Innovations, LLC. Fingerprinting So, we have a file at the top level of a Web site. It is called robots.txt It specifies.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
Setting Up a Local WordPress Development Environment By Gregory Young Alternative Hosting
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
13/09/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Transport layer and Application Layer Slide 1.
Dr. Thomas E. Hicks Trinity University Computer Science.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
 Configuring a vSwitch Cloud Computing (ISM) [NETW1009]
Examining TCP/IP.
The complete picture Linux Network Management. End to End Connection Being able to describe the end to end connection sequence is a useful thing Very.
Links and LANs Link between two computers via cross cable The most simple way to connect two hosts is to link the two hosts with a cross cable.
Installing SME Version 5 –1)Set the computer to boot from the CDRom by changing the BIOS setting. –2)Startup the computer with the CD in the CD drive –3)Type.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
CIS 192B – Lesson 3 Network Information Services.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 TCP/IP Networking Yue Cui 06/13/02. 2 Presentation Outline Introduction Packets and Encapsulation IP Addresses, Routing ARP, DHCP and PPP Security Issue.
178 Connecting to the Network Version A.01 H3064S Module 21 Slides.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
Networking Material taken mainly from HowStuffWorks.com.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
DHCP as server. What is Dynamic Host Configuration Protocol (DHCP)? Dynamic Host Configuration Protocol (DHCP) is network protocol for automatically assigning.
Linux Operations and Administration
When you run a scenario, the Vusers on each host machine use the host’s IP address. You can define multiple IP addresses on a host machine to emulate a.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Chapter 38 Initialization & Configuration. Bootstrapping occurs during boot up to obtain boot program which may then load operating system may use network.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Testing and Trouble Shooting Client Connection By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Windows Vista Configuration MCTS : Advanced Networking.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
Domain Resolution Configuration Files: File: /etc/resolv.conf - host name resolver configuration file search name-of-domain.com - Name of your domain or.
Installing iHRIS on VMWare
Project CTF Yeganeh Safaei Arizona State University
Chap-I Network and System Configuration in Linux
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
COP 4343 Unix System Administration
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Configuration Of A Pull Network.
How To Configure Hotspot in Virtual Mikrotik on VMware
Module 12 Network Configuration
Presentation transcript:

CIS 193A – Lesson10 Protecting Your Network

CIS 193A – Lesson10 Focus Question What information contained in packets can be used as matching criteria for a firewall or network service?

CIS 193A – Lesson10 Setting the VMnet1 Network Address Run as admin the Vmware Manage Virtual Networks The admin password is funny Cabrillo Select the tab labeled: Host Virtual Network Mapping Click the arrow on the right and choose subnet Replace the third octet with your station number. Click Apply and OK

CIS 193A – Lesson10 Verify the Change with ipconfig

CIS 193A – Lesson10 DNS and Client VMs Copy the dns and client virtual Machines from Sybil to your Virtual Machines folder. \\ \vmware These machines are preconfigured to be on VMnet1, but they don’t have the correct IP addresses to match your network. You must change their hostnames and their IP addresses

CIS 193A – Lesson10 Booting the VMs Bring up the router vm first: –Set eth1 IP address to XX.2 Bring up the webserver vm second: –Change IP address to XX.3 –Add an index.html file to /var/www/html that shows your computer’s name and IP –Update the ServerName variable in /etc/httpd/conf/hhtpd.conf line 266 Ping your router to check for connectivity

CIS 193A – Lesson10 Booting the DNS VM Bring up the dns vm: –Change the hostname by substituting your station number for the XX. –Change the IP address to XX.4 –Set the nameserver address to the above IP address in the file, /etc/resolv.conf –Change the “XX” to your station # in files: /etc/named.conf /var/named/db.localdomain /var/named/db.XX

CIS 193A – Lesson10 Booting the Client VM Bring up the client vm last: –Change the hostname in /etc/hosts and /etc/sysconfig/network replacing the XX with your station number. –Add a GATEWAY= variable to the above network file. –Edit /etc/resolv.conf and specify your dnsXX server as the nameserver. Test connectivity and name resolution.

CIS 193A – Lesson10 Installing a Firewall Download the iptables shell script from Opus: scp Modify the shell script. Run the shell script as root. Test the firewall Save the firewall settings using iptables-save > /etc/sysconfig/iptables

CIS 193A – Lesson10 Review

CIS 193A – Lesson10 Focus Question What information contained in packets can be used as matching criteria for a firewall or network service? Mostly information from Network and Transport layers are used for access controls, but MAC addresses from layer 2 and User information from the application layer may also be used. The most common fields are src and dst IP address, src and dst port numbers, protocol, and TCP state flags such as SYN RST ACK