1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.

Slides:



Advertisements
Similar presentations
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Advertisements

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
CS 497C – Introduction to UNIX Lecture 38: - Electronic Mail Chin-Chih Chang
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Chapter 2: Exploring the Desktop The Complete Guide to Linux System Administration.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Chapter 7: Using Windows Servers to Share Information.
Name Resolution Domain Name System.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
CCNA Exploration Network Fundamentals
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
Chapter 10 Networking and the Internet ITSC 1458.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Version 3.0 Module 11 TCP Application and Transport.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Web Server Administration Chapter 4 Name Resolution.
Chapter 5 Overview of Network Services 5.1 – Network Services 5.2 – Remote Administration and Access Services 5.3 – Directory Services 5.4 – Other NOS.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Application Layer Functionality and Protocols
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Chapter 10: Application Layer
Applications Layer Functionality & Protocols
Chapter 7 Network Applications
Data Communications and Networks
Presentation transcript:

1 Linux Networking and Security Chapter 3

2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand client services such as DHCP and LDAP Use remote graphical applications and remote dial-up authentication Use common client tools such as Linux Web browsers and clients

3 Setting Up Name Resolution The domain name service (DNS) is implemented by a domain name server  The term domain name refers to the name of multiple hosts on the Internet that are collectively referred to  The most widely known top-level domain is.com  Within a top-level domain, an organization has its own domain or domains  Network hosts are given names called hostnames  A fully qualified domain name (FQDN) combines a hostname with the name of its domain

4 Setting Up Name Resolution

5 Configuring the DNS Resolver Manually The resolver is the client part of DNS  It makes requests to a DNS server so that other workstation programs can use the IP address of a given server to make a network connection  The resolver is configured by a single file in Linux: /etc/resolv.conf  Configure the resolver by storing the IP address of one or more DNS servers in the resolv.conf file, proceeded by the keyword nameserver

6 The hosts File Another way to convert an IP address to a domain name is store the IP address and corresponding domain names in a text file called /etc/hosts on your host The /etc/hosts.conf or /etc/nsswitch.conf files determine the order in which the resolver looks to various sources to resolve IP addresses

7 Configuring the DNS Resolver Graphically

8

9

10 Configuring the DNS Resolver Graphically

11 Dial-up Network Access Using PPP PPP is widely used to connect to the Internet via modem  PPP includes feature that make it more secure, flexible, and dependable than terminal emulation  In reality, PPP was not very secure and was challenging to configure and manage Two advances improve PPP security:  Password Authentication Protocol (PAP) stores user data in a file that only the root user accesses  Challenge Handshake Authentication Protocol (CHAP) is the most secure PPP option

12 PPP Connections Text-mode utility wvdial is designed to ease the difficulty of working with PPP  Used from a command line on a server Red Hat Linux uses a utility called rp3  This is a wizard-driven graphical utility The Linux KDE graphical environment uses a utility called KPPP diald automates PPP  difficult to use and challenging to set up

13 PPP Connections

14 PPP Connections

15 Using DHCP Dynamic Host Configuration Protocol (DHCP) allows the configuration of a service that hands out IP addresses to network clients  DHCP can drastically reduce the administration needs of a network  The DHCP server is installed by default on many Linux systems  Configuration of DHCP involves creating an /etc/dhcpd.conf file

16 Using DHCP

17 Understanding LDAP The Lightweight Directory Access Protocol (LDAP) provides a directory service that lets users query a database of network resource information  LDAP directories are organized as inverted trees of information  To use a directory, client software allows traversal of the tree, looking for the needed data  Objects in the tree are referred to using a formalized set of identifiers

18 Understanding LDAP

19 Understanding LDAP

20 Running Applications Remotely

21 Running Applications Remotely Before an X client can display its windows on a remote host, the remote host must be configured to allow others to use its X server  To use xhost Authentication, include the hostname of the computer that will be allowed to display  xauth Authentication is more secure than xhost since it employs the use of a cookie XDMCP for Remote Graphical Terminals  lets users on remote X servers obtain a graphical login screen and begin using X clients on Linux

22 Running Applications Remotely Using r-Utilities for Remote Execution  Allow a user to learn about or execute a program on another host  The r-utilities are not secure Using UUCP for Remote Access  Provides transfer of over modem between multiple servers

23 Running Applications Remotely

24 Web and Mail Clients Popular Linux Browsers  Lynx is a text-based browser that is installed by default on many popular Linux distributions  Netscape Communicator on Linux is similar to Netscape on Windows  Mozilla is included as the default on Red Hat Linux on the Gnome desktop  Other browsers: Opera, dillo, Galeon, SkipStone

25 Popular Linux Browsers

26 Understanding is transferred on the Internet via the Simple Mail Transport Protocol (SMTP) -related programs are divided into three categories:  Mail Transfer Agent (MTA) - moves messages from one server to another  Mail Delivery Agent (MDA) - places in a user’s mailbox  Mail User Agent (MUA) - displays and manages messages for a user

27 Understanding On every Linux system, user accounts have associated accounts and is placed in the /var/spool/mail directory is typically retrieved using a MUA in one of three ways:  Post Office Protocol (POP3) - via a POP3 server downloads messages to the computer  Internet Mail Access Protocol (IMAP) - views messages on the remote server  Web browser

28 Understanding Using an Filter: Procmail  Procmail is a special MDA acts as a filter and processes based on user-defined criteria  Difficult to configure, but worth the effort if a large number of incoming messages are regularly received  Is installed by default on many Linux systems  Checks for both a system-wide configuration file /etc/procmailrc and per-user.procmailrc  These files can contain recipes, or formulas for examining messages and taking an action

29 Linux Clients

30 Linux Clients

31 Chapter Summary The client portion of the domain name service is called a resolver A fully qualified domain name (FQDN) consists of a hostname plus the domain of which the host is part PPP is a popular method of making network connections via modem PPP security is provided by the Password Authentication (PAP) and Challenge Handshake Authentication (CHAP) protocols The wvdial utility can configure and manage a PPP connection from the command line

32 Chapter Summary The diald program automates use of a dial-up connection via PPP, automatically connecting and disconnecting based on traffic The Dynamic Host Configuration Protocol (DHCP) allows clients to configure IP networking automatically by receiving network address information from a DHCP server Most versions of Linux include the dhcpd server and at least one of the three common DHCP clients The Lightweight Directory Access Protocol (LDAP) provides a directory service that lets users query a worldwide database for information on resources

33 Chapter Summary The OpenLDAP server is provided with most Linux distributions X can execute graphical programs remotely by referring to the DISPLAY variable or the --display command line option XDMCP lets users on remote X servers obtain a graphical login screen and begin using X clients on Linux without first logging into Linux via Telnet The r-utilities provide a convenient way to execute commands on, or copy files between, remote hosts when working in a trusted network environment

34 Chapter Summary The Unix to Unix Copy (UUCP) protocol was designed to facilitate inexpensive transfers of messages between servers in the days before Internet connectivity was widespread Many Web browsers are available for Linux, with the most popular being the text-mode browser Lynx and graphical browsers Mozilla and Netscape Internet relies on a Mail Transfer Agent (MTA) to move messages between hosts; a Mail Delivery Agent (MDA) may process mail as it is delivered to a user’s mailbox; and a Mail User Agent MUA is relied upon in order for a user to read and send messages

35 Chapter Summary MUAs can either read local mail files, or can use the POP3 or IMAP protocols to retrieve messages from a central server The Procmail program processes messages using recipes which provide automatic message management Many other Linux clients are popular: elm and pine, fetchmail, Kmail and Balsa