Virtual Company Group 8 Presentation Date: June /04/2017

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Enabling Secure Internet Access with ISA Server
Ming-Chang Cheng 鄭明彰 May 22 / May 29 , 2014
File Server Organization and Best Practices IT Partners June, 02, 2010.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
What to expect.  Linux  Windows Server (2008 or 2012)
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Wi-Fi Structures.
Advanced Routers Opening Ports
DVG-N5402SP.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
1  Teacher : KIM Bunthoeurn  Group 3  Group members: o ENG Phally o CHHENG Sounly o POV Sopheap o SRORNG Voleak o NGET Phanny  Topic: Company description.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Firewall Slides by John Rouda
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Advanced Networking for DVRs
Virtual IP Network Windows Server 2012 Windows 08 Dual Subnets.
Course 201 – Administration, Content Inspection and SSL VPN
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Test Review. What is the main advantage to using shadow copies?
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Your storage on the ground; Your files in the cloud.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Chapter 7: Using Windows Servers to Share Information.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Network Operating Systems versus Operating Systems Computer Networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Cisco ASA 5505 Joseph Cicero Northeast Wisconsin Technical College.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Security fundamentals Topic 10 Securing the network perimeter.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Security fundamentals
Chapter 7: Using Windows Servers
NAT、DHCP、Firewall、FTP、Proxy
Installing TMG & Choosing a Client Type
Module 3: Enabling Access to Internet Resources
Securing the Network Perimeter with ISA 2004
Implementing TMG Server Publishing
Welcome To : Group 1 VC Presentation
Unit 27: Network Operating Systems
Firewalls Purpose of a Firewall Characteristic of a firewall
AbbottLink™ - IP Address Overview
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

Virtual Company Group 8 Presentation Date: 26 -27 June 2012 20/04/2017 prepare by group8

Content Introduction Objective of Virtual Company 20/04/2017 Content Introduction Objective of Virtual Company Introduction of Network Infrastructure in Virtual Company Operating System and Services in Company usage Security in Company Switch and Router CISCO Problems and solutions Completed and Uncompleted Tasks Experiences of Virtual Company References of Services in Virtual Company Questions and Answers prepare by group8

Introduction Group number : 8 Supervisor : HY Leapcheang Manager : LONG Chanthorn Group Member : CHHOEUN Sambath HOEUNG Kunthea MEN Amara NHEAN Sophan NY Sreypech SIN Sokheng SORY Sokuntheara

Objective of Virtual Company Understand the real network infrastructure of company Understand the security in the company Install and configure services : AD, DNS, DHCP, File Server, Proxy, Firewall, Mail and Webmail, Web, FTP, VPN, and DHCP Relay Agent. Understand the rules allow or deny in firewall Team work Understand problem solving Improve self-learning

Introduction to Network Infrastructure Virtual Company

Operating Systems and Services in Company usage The company use two Operating Systems : Microsoft : Windows Server 2008 (File Server, AD,DNS and DHCP) Windows 7 Linux : Red Hat 6 (Mail, Web, FTP, Firewall and Monitoring)

Operating Systems and Services in Company usage Microsoft : Window Server 2008 The first server: (192.168.8.2/29) AD : group8.lan DNS : group8.lan Backup network : use Backup4all Professional 4 setup wizard tool(software from internet) Backup data from file server DHCP : g8-ad.group8.lan Scope : 172.16.8.0/26 Range : 172.16.8.1 – 172.16.8.62 Excluded: 172.16.8.1 – 172.16.8.8 Some services : Backup, Anti virus, Nsclient….

Operating Systems and Services in Company usage The second server: (192.168.8.3/29) File server : sharing data and assign permission There are 5 folder Common, Finance, HR, IT and Marketing Assign permission for manager and staff Disk quotas : limited space for clients Home_user : 60GB(one user 5GB) Data : 122GB Common(42GB)and Finance, HR, IT and Marketing(20GB) Windows 7 : setup as clients IP from DHCP server

Operating Systems and Services in Company usage Linux : There are three machines using Red Hat 6 First server: Web server and FTP server(192.168.8.10/26) Web server : www.group8.lan : Joomla website (port 443) movie.group8.lan : Movie website (port 80) flowershop.group8.lan: Flower Shop (port 80)

Operating Systems and Services in Company usage FTP server : Use service pure-ftpd (download from internet) There are four groups (department of client) There is a directory and has four sub-directories for clients can download and upload Quota: 3GB for each (IT and Finance Department) and 2GB for each (HR and Marketing Department)

Operating Systems and Services in Company usage Second server: Mail and Webmail (192.168.8.11/26) Mail server using Zimbra (download from internet) Webmail name g8mail.group8.lan and using security port (https or 443) Authentication with certificate (log fail only 3 time) There are three groups user IT, HR, Finance and Marketing department

Operating Systems and Services in Company usage Third server: setup as firewall, VPN, Proxy server, DHCP Relay Agent and Monitoring IP : 192.186.8.1/29 LAN Server interface 172.16.8.1/26 LAN Client interface 192.168.8.12/29 LAN DMZ interface Rule firewall Allow client request IP from DHCP server, use DNS, Join Domain, Access file sever, .etc. Allow LAN Client, LAN Server, LAN DMZ can access to internet by using proxy NAT Post Routing and Pre-routing Allow DNS local can forward to DNS public Allow VPN, etc.

Operating Systems and Services in Company usage VPN server Use packet openvpn-as-1.8.3-RHEL5.x86_64.rpm (download from internet) Open VPN provide IP address to clients network address range 10.10.10.0/26 (Secure IP address of VPN) Allow Open VPN’s users use local DNS and access File Server (IP address 192.168.8.2) by use port 138,139,443,445,538 and port 943 with protocol TCP and UDP.

Operating Systems and Services in Company usage Proxy server: (Port 3128) Use service Squid Sharing internet to client and filter contents Proxy configure authentication with all user in AD All staff can’t access to website www.youtube.com, but Manager has full access to any websites Delay pool (Limit speed download and upload) Client can download only 10KB/s. Manager can download only 20KB/s

Operating Systems and Services in Company usage DHCP Relay Agent Relay from LAN Client interface to LAN Server interface in the router (Enable client gets IP address) Monitoring Configure with Nagios Monitor on hosts and services (Up or Down)

Company Security Network Security Firewall (IPTABLE) DMZ : allow external can access webhosting Proxy - Squid (User Authentication) Configure SSL Web Application for hosting VPN (authentication, Provide password for Open VPN’s users ) Antivirus

Company Security Data Security Permission data share Back up local (configuration) Backup Network (data ,file share and configuration …….)

Router and Switch (CISCO and HP) - Sub interface - Dynamic NAT 2. Switch: - VLAN - Trunk port - Native VLAN

Problems and Solutions Network Problem: Configure router CISCO Network monitoring System Problems: Can not map home folder to the clients on Windows 2008 64bit standard Can not install Acronis on Win 2008 64bit standard Can not install packages on Redhat 6, Firewall machine getting down, full of Kdump file Clients VPN can not login to the server

Problem and Solution System Solution: Reinstall Windows Server 2008 32bit Changing the repository on install the packages from the CD (Redhat 6) Reinstall the new Redhat 6 with non GUI Checking on iptables rules

Completed and Uncompleted Tasks Task Completed: File Server and Quota Map home folder, and Map drive Assigned Permission to Each directory Setting Quota AD, DNS, DHCP Domain Controller Create users and Groups DNS update automatically from DHCP server (DDNS) Provide IP address from DHCP server to clients

Completed and Uncompleted Tasks Web Server Creating hosting website (3 websites), one with SSL Proxy Server Sharing Internet Blocking domain Limit Upload and Download Bandwidth User Authentication 5. File Transfer Protocol (FTP) All staffs can read data in their department Manager have full control on their department Only manager can delete the data on their department

Completed and Uncompleted Tasks 6. Virtual Private Network Allow VPN’s clients to access from Outside network 7. Mail Set up mail and webmail server with SSL (SSL Encryption and Certificate) 8. Backup Backup data on each department Backup Configuration file on Mail, Webmail, Proxy, Firewall, FTP…

Completed and Uncompleted Tasks 1. File Transfer Protocol Clients Can not access FTP server from Outside network Web server Can not hosting webmail to Internet Mail and Webmail Server

Experiences of Virtual Company Non _Technical - Understand the important of team work Understand how to adapt myself to work in team Solidarity in team To know how to deliver task for members in group To know about responsibility for our task To know about tasks organization and task priority Improve self-learning by using searching skill.

Experiences of Virtual Company Related _Technical Get familiar with the installation of services such as Proxy, File server, DNS, DHCP especially DMZ, mail hosting, web hosting, webmail hosting, Firewall and network monitoring, etc. Understand Network and Data security Understand how to designed Network Infrastructure Understand IP sub netting to assign for each computer (LAN)

Referent Service Virtual Company http://www.irtaza.com/servers/linux/how-to-setup-ftp-server-on-linux-pureftp/ http://manyrootsofallevilrants.blogspot.com/2012/02/join-rhel-6-server-to-windows-2003.html http://www.softpanorama.org/Commercial_linuxes/Devices/disk_partitioning.shtml http://www.installationwiki.org/OpenVPN http://www.generationip.com/documentation/Howto/137-howto-install-zimbra-collaboration-suite-6-0 http://www.linuxquestions.org/questions/linux-server-73/directory-quota-601140/ http://souptonuts.sourceforge.net/quota_tutorial.html http://magazine.redhat.com/2007/04/11/squid-in-5-minutes/ http://www.redhat.com/magazine/022aug06/features/webserver/ http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html/Installation_Guide/ch-Installing_EWS_on_Red_Hat_Enterprise_Linux.html http://www.cyberciti.biz/tips/howto-rhel-centos-fedora-squid-installation-configuration.html

Thanks for Your Paying Attention! Question and Answer Thanks for Your Paying Attention!