Linux Networking #2 Dr. Michael L. Collard 1.

Slides:



Advertisements
Similar presentations
/30 Host Name : R1 Serial 0/0/0.1.2 Host Name : R2 Router Lab 3 : 2 - Routers Connection DTE DCE.
Advertisements

Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
NIS Consistent configuration across the network. Why NIS? Primary reason is to provide same user configuration across the network Users go any machine.
Linux+ Guide to Linux Certification, Second Edition Chapter 15 Configuring Network Services and Security.
Linux Networking TCP/IP stack – kernel controls the TCP/IP protocol – Ethernet adapter is hooked to the kernel in with the ipconfig command – ifconfig.
© N. Ganesan, All rights reserved. Chapter IP Routing.
What’s New in Fireware XTM v Changes in Fireware XTM v  Routing table changes  Feature key global expiration for some XTMv keys  IP address.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Module 9 - Networking. 1.Network Concepts and Commands 2.Network Files 3.Network Services 4.Configure a network device 5.Network File-System (NFS & CIFS)
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Remote Disk Access with NFS
INFO 320 Server Technology I Week 6 Networking 1INFO 320 week 6.
Chapter 12: Configuring Networks The Complete Guide to Linux System Administration.
DHCP. DHCP (Dynamic Host Configuration Protocol) is a network service that enables clients to obtain network settings (IP Address, Subnet Mask, Default.
1 Network File Sharing. 2 Module - Network File Sharing ♦ Overview This module focuses on configuring Network File System (NFS) for servers and clients.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Common Devices Used In Computer Networks
Cosc 4750 Networking. The basics Machine A and Machine B have a connection to a network When Machine A wants to “talk” to machine B, it creates a packet.
Network Operating Systems versus Operating Systems Computer Networks.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
A day in the life: scenario
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Managing Ensembles Nilesh M. Bhide. System Access Models The Stand-alone System –Beowulf system unattached to any external network The Universally Accessible.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Communication Between Networks How the Internet Got Its Name.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
1.4 Open source implement. Open source implement Open vs. Closed Software Architecture in Linux Systems Linux Kernel Clients and Daemon Servers Interface.
Centralized logins with NIS Eric Stolten Tim Meade Mark Sidnam.
1 COP 4343 Unix System Administration Unit 11: Networking – basic concepts: IP, TCP, UDP, DHCP – devices: setup, status.
CIS 192B – Lesson 3 Network Information Services.
The Intranet.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Linux Networking #1 Dr. Michael L. Collard 1.
How to connect to the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Networking in Linux: a brief overview. TCP/IP  TCP/IP concepts we have seen are applicable to Linux (a version of UNIX, where TCP/IP started)  Some.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Basic Linux Router I Router, a device that... Working on OSI Layer 3 (Network Layer) Connected to more than one networks Finding.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Linux Operations and Administration
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
How to use the Internet Ikjun Yeom. How to send a packet  buy a computer  make sure that the computer is equipped with a network interface card  find.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Chap 35 Remote Procedure Calls RPC allows one host to make a procedure call that appears to be part of a local process (fig 35.1), but is really executed.
Networking SPARCS 2000 wheel seminar
TCP/IP (Routing). Content DHCP And Mobile IP Internet Routing Protocol RIP (Routing Information Protocol) OSPF (Open Shortest Path First) BGP (Border.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
1 ECE453 – Introduction to Computer Networks Lecture 11 – Network Layer III – IP Protocol.
LINUX Network Concepts M.S.Dibay Moghaddam Second Linux Festival Amir Kabir University of Technology Computer & IT Department.
Home Networking CCCC Linux Desktop SIG August 20, 2007.
Managing and Directing Network Traffic with Linux
Chapter 12: Configuring Networks
Network Configuration
LINUX ADMINISTRATION
Chapter 4: Routing Concepts
Welcome To : Group 1 VC Presentation
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Advanced Network Training
Setting Up Firewall using Netfilter and Iptables
NFS.
Attilla de Groot | Sr. Systems Engineer, HCIE #3494 | Cumulus Networks
Module 12 Network Configuration
Longest Mask Matching What happens if one of the organizations is not geographically close to the others, like in Figure No problem, as long as the.
Presentation transcript:

Linux Networking #2 Dr. Michael L. Collard 1

Network Configuration /etc/network/interfaces Used by ifup, ifdown NetworkManager replaces this # The loopback interface auto lo iface lo inet loopback # The first network card auto eth0 iface eth0 inet static address netmask broadcast gateway # dhcp iface eth1 inet dhcp

Routing Typically use a dedicated router as a gateway Computer as a gateway: – routed daemon – Uses RIP (Routing Information Protocol) – GNU Zebra – Uses RIP, OSPF (Open Shortest Path First), and BGP (Border Gateway Protocol)

Name Service Translates names to IP addresses DNS (Domain Name System) BIND (Berkerly Internet Name Domain) name server – de facto standard open source name server – named BIND server Clients: – dig – host

NFS (Network File System) Distributed file system Server – nfsd – exportfs, /etc/export – exported directories – /etc/hosts.allow, /etc/hosts.deny – nfsd Client – mounts exported directory mount servername:/projects /mnt/nfs/projects – Typically automounted

NIS (Network Information System) Client-server directory service protocol for distributing system configuration data (user and host names) Originally called: Yellow Pages (YP) ypserv – server daemon ypbind – client program Integrated into system password operations

NIS+ Sun replacement for NIS, implementation different from NIS – hierarchical – based Secure RPC (servers must authenticate clients and vice-versa) – may be replicated read-only – finer-grained permissions on data and operations Sun recommends to switch to LDAP (Lightweight Directory Access Protocol)

Firewalls Secure computer between an internal network and an external network Set of rules – chains netfilter – hooks in Linux kernel for filtering packets iptables – set up, maintain, and list IP packet filter rules