NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
What to expect.  Linux  Windows Server (2008 or 2012)
UNIX & W2K A single sign-on solution for a Kerberos V based AFS cell Enrico M.V. Fasanelli & Fulvio Ricciardi I.N.F.N. – Sezione di Lecce.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
MICROCONTROLLED HOME Keith Jones EKU Deparment of Technology CEN.
1 Web Server Administration Chapter 3 Installing the Server.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Microsoft Server Technology An Overview By Christopher W. Baran.
Installing Active Directory on Windows Server 2008 R2 Installing Active Directory on a fresh Windows Server 2008 R2 machine in a home network. These instructions.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
Test Review. What is the main advantage to using shadow copies?
OU Passwords What they all mean. What is a password Webster’s Online Dictionary describes a password as “a sequence of characters required for access.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Welcome. Who am I? Philip L. Sullivan MCT, MCSE, MCSA Microsoft Certified Trainer for 6 Years Work as a Lead Windows NT\2000\2003 Instructor for Clark.
The file server model July 14, 2011 © 2011 PC3.org The File Server Model Presented for the PCCC Program Notes We recommend that you print these slides.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Installing Active Directory on Windows Server 2008 R2 Installing Active Directory on a fresh Windows Server 2008 R2 machine in a home network. The guide.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
How Setup a Lab for VEA? Veritas Volume Manager is a Great Product from Symantec and we will see what we need setup a Home LAB. By AIK IT Support.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Indiana University’s Research File System. What is the IU Research File System? /user1/user2 /collaboration User 1, on campus User 2, somewhere else BACKUP.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Linux/Windows File Sharing Othman Almazrooa CEN Student, Eastern Kentucky University.
Mike Gore School of Computer Science. This talk is on the Web in TWIKI format A more detailed copy of this talk can be access on with web page. Including.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
PLANNING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE Chapter 2.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Day12 Network OS. What is an OS? Provides resource management and conflict resolution. –This includes Memory CPU Network Cards.
Are They Really Different?.  Check out these ads in which Apple and Microsoft are battling for the “coolness” factor: ◦ Apple Macintosh Apple Macintosh.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
LM/NTLMv1 Retirement Hosted by LSP Services.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Installing Linux: Partitioning and File System Considerations Kevin O'Brien Washtenaw Linux Users Group
Chapter 2 Operating Systems
Getting Connected to NGS while on the Road…
Guide to Operating Systems, 5th Edition
Overview of Active Directory Domain Services
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Introduction to Computers
QuickBooks Error Code is displayed when the verification of the database connection fails or QuickBooks tries to access company files. Due to the.
NTC 324 RANK Education Your Life - ntc324rank.com.
NTC 324 RANK Perfect Education/ ntc324rank.com.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Getting Connected to NGS while on the Road…
Digital Literacy 1.00 Computer Basics
Module 1: Overview of Systems Management Server 2003
Presentation transcript:

NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN

2 Overview The project I undertook was to try and provide an authentication method which would provide a single user logon over multiple Operating Systems. The goal was to be able to access shares and files over multiple operating systems.

3 MOTIVATION My motivation was formed out of curiosity about why so many websites complain about how hard it is to get Linux, UNIX, Mac OS X, and Windows to talk. From this curiosity I decided to choose this project in order to examine the pitfalls involved with getting these Operating Systems to talk to one another. I also wanted to show some solutions that are available in order to share data between multiple Operating Systems.

4 INTRODUCTION Why is interoperability so important? Problems with interoperability? What does this mean to Network Administrators? My ambitions for this project.

5 PROBLEM STATEMENT How do you get Windows Active Directory and UNIX based Operating Systems to authenticate to one another?

6 SOLUTIONS Open LDAP Microsoft Windows Services for UNIX 3.5 Microsoft Windows Services for UNIX 3.5 Apple’s Open Directory Other 3 rd party software solutions. Kerberos and Samba Authentication

7 AMBITIONS To provide a single log on over a Wide Area Network connection, and using Multiple Operating Systems. By using VLANs to simulate provide multiple domains for each OS. My overall plan was to have 5 separate domains with each domain having a different primary OS.

8 RESULTS Problems!!!! Open LDAP requires you to use Microsoft Services for UNIX 3.5 which in turn requires a Network Information Server (NIS) on a “NIX” machine. Then Windows Services for UNIX 3.5 was unable to connect to the NIS.

9 Results Cont. Apple solutions required OS X 10.3 (Panther) or latest OS X 10.4 (Tiger). I had OS X 10.2 (Jaguar) which was unable to connect to Active Directory. Some sites recommended special 3 rd party software for 10.2 but the software was only compatible with 10.3 or better.

10 MORE RESULTS Cisco routers unable to perform 802.1q encapsulation. Why? I don’t know after checking the IOS version and Cisco’s website I found that I should have been able to but the routers in the lab did not support VLAN routing.

11 KERBEROSE AND SAMBA PROBLEMS Not as many and it was the only authentication method I was able to get to work. The first problem was finding the right information about how to edit my samba.conf and krb5.conf files. The second problem was that I locked out the root account on my Linux system. The third was finding out that Windows sends Kerberos tickets out in all caps and Linux was case sensitive.

12 IT WORKS Finally I was able to get Kerberos and Samba to work with Active Directory. This was the only authentication method I was able to get to work and it was also the easiest to configure once I learned how Windows and Linux both see things. This method “should” work for any update version of “NIX” operating systems. Each system will be different but as long as Kerberos and Samba 3 are installed this method is the quickest choice.

13 IT WORKS CONT. The problem with this method is that you have to create accounts on both the Linux machine and in Active Directory. This means it’s not the most practical authentication method but if you’re using only a few machines this is not a bad route to take if you want secure connections between Linux and Windows networks and single user logons.

14 MY PERSONAL SUGGESTIONS If you’re planning to try this project for yourself these are a few of my suggestions for you. 1. Use virtual machines because you are going to break things and it’s easier to replace a virtual image than a real hard drive image or installation. 2. Research your network hardware to make sure it has all of the features you need.

15 MY PERSONAL SUGGESTIONS 3. Don’t believe all of the how to’s that are on the internet most are incomplete or don’t fully explain what they are doing. 4. Use multiple sites so that you can get a full understanding of what’s going on. 5. Don’t trust that because something should work that it will work. “Great plans rarely survive first contact with the enemy.”

16 MY PERSONAL SUGGESTIONS 6. Things are going to go wrong just accept it and be able to reorganize your plan accordingly. 7. Don’t get frustrated. This is definitely a project that will lead you to a lot of closed doors, use them as learning experiences not as show stoppers.

17 CONCLUSION To bring this presentation to an end I would like to say that overall this was an incredibly frustrating project because it destroyed almost everything that I wanted to accomplish, however it was a great learning experience. Plus through it all I had a lot of fun trying to put everything together and seeing what is possible.

18 CONCLUSION This project also pushed my networking skills to a new level and provided an incredible learning opportunity that I’ve greatly appreciated. I would also like to especially thank Dr. Kilgore, Stephen Crumb, and Dr. Chandra for all of their help in providing hardware and suggestions.

19 POSSIBLE EXTENSIONS 1. Getting Open LDAP to work so that you can have a single logon for and only have to set up a user account once on Active Directory (AD) and maybe once one Open LDAP if it can not replicate with AD. 2. Get OS X to authenticate into AD.