Lesson Overview Lesson OverviewFungi Lesson Overview 21.4 Fungi.
Internet System Management. Lesson 1: IT Systems and Services Overview.
-
Upload
sharon-hoover -
Category
Documents
-
view
217 -
download
1
Transcript of Internet System Management. Lesson 1: IT Systems and Services Overview.
![Page 1: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/1.jpg)
Internet System Management
![Page 2: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/2.jpg)
Lesson 1:IT Systems and
Services Overview
![Page 3: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/3.jpg)
Objectives
List the services offered by IT departments
Identify backbone and mission-critical services offered by IT departments
Discuss the concepts of system maintenance
![Page 4: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/4.jpg)
Common IT Tasks and Services
System and service installation
Web server configuration
FTP server configuration and management
Name resolution configuration
E-mail server installation and support
E-commerce server installation and support
![Page 5: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/5.jpg)
Common IT Tasksand Services (cont’d)
Database server installation and support
User management
Server monitoring and optimization
File backup
Routing
Establishing and managing shares
![Page 6: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/6.jpg)
Backbone Services
Naming services
Address management
Directory services
Central logon
Routing
![Page 7: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/7.jpg)
Mission-Critical Services
Mission-critical services are highly visible
Users rely on mission-critical services
Examples
- Mail servers
- Web servers
- FTP servers
- Middleware
![Page 8: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/8.jpg)
System Configuration
Binding protocols to the network interface card
Protocol management
Addressing
Gateways
Name resolution configuration
Service and application installation and management
IP addressing
![Page 9: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/9.jpg)
User Management
Adding and removing users
Using applications
Managing permissions
Group membership
Password aging
Account lockout
Password history
Controlled access
![Page 10: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/10.jpg)
System Performance
Bandwidth and access rate issues
System I/O performance
Hard drive access statistics
CPU usage
RAM usage
![Page 11: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/11.jpg)
Backup
Archiving user-created files
Keeping copies of entire operating systems
Storing changes to databases and other data stores
Off-site storage
![Page 12: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/12.jpg)
Maintenance
Upgrading operating systems
Installing service packs and hot fixes
Upgrading services, including Web ande-mail servers
Scanning hard drives for errors
Upgrading hard drives to provide more storage capacity
![Page 13: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/13.jpg)
Summary
List the services offered by IT departments
Identify backbone and mission-critical services offered by IT departments
Discuss the concepts of system maintenance
![Page 14: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/14.jpg)
Lesson 2:Internet System Installation
and Configuration Issues
![Page 15: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/15.jpg)
Objectives
Identify common hardware platforms
Describe capabilities of various platform components
Define bandwidth and throughput
Identify common network operating systems
Determine the ideal operating system for a given environment
Discuss system installation issues
![Page 16: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/16.jpg)
System Elements
Bus speed
System I/O
NIC
Hard drive
RAM
![Page 17: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/17.jpg)
Bandwidth
The total amount of information a network connection can carry
Network connections
- T1
- Fractional T1
- T2
- T3
- ISDN
- DSL
![Page 18: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/18.jpg)
CalculatingThroughput
A percentage of bandwidth; the amount a network connection is being used
Throughput elements
- Connection speed
- Amount of information
- Time available for transfer
![Page 19: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/19.jpg)
Internetworking Operating Systems
Microsoft Windows
UNIX
Linux
System V
Novell
X Windows
![Page 20: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/20.jpg)
Operating System Issues
Ease of use
Platform stability
Available talent pool
Available technical support
![Page 21: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/21.jpg)
Operating SystemIssues (cont’d)
Cost
Hardware costs
Availability of services and applications
Purpose for the server
![Page 22: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/22.jpg)
Installing NetworkOperating Systems
Single-boot and dual-boot machines
Local and network installation
Hardware considerations
Listing system components
![Page 23: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/23.jpg)
Summary
Identify common hardware platforms
Describe capabilities of various platform components
Define bandwidth and throughput
Identify common network operating systems
Determine the ideal operating system for a given environment
Discuss system installation issues
![Page 24: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/24.jpg)
Lesson 3:Configuring the System
![Page 25: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/25.jpg)
Objectives
List key TCP/IP configuration parameters
Add NICs in Windows 2000 and Linux
Configure Windows 2000 with static IP addresses
Configure Linux with static IP addresses
Describe how DHCP works
![Page 26: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/26.jpg)
TCP/IP Configuration Parameters
Computer name
IP address
Subnet mask
Default gateway
DNS information
DHCP client information
WINS
![Page 27: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/27.jpg)
Adapters
Adding network adapter device drivers in UNIX/Linux
Adding network adapter device drivers in Windows 2000
Binding device drivers to protocols in Windows 2000
Device Drivers (NIC)
![Page 28: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/28.jpg)
Static Addressing
Windows 2000
ipconfig
Linux
ifconfig
ifup
ifdown
linuxconf
netcfg
dmesg
grep
![Page 29: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/29.jpg)
Additional TCP/IP Issues and Commands
netstat
traceroute
router
arp
![Page 30: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/30.jpg)
Dynamic Addressing
DHCP lease process
D i s c o v e r
O f f e r
R e q u e s t
A c k n o w l e d g m e n t
![Page 31: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/31.jpg)
Summary
List key TCP/IP configuration parameters
Add NICs in Windows 2000 and Linux
Configure Windows 2000 with static IP addresses
Configure Linux with static IP addresses
Describe how DHCP works
![Page 32: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/32.jpg)
Lesson 4:User Management
Essentials
![Page 33: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/33.jpg)
Objectives
Define authentication
Explain the share-level and user-level access security models
Identify the purposes and functions of logon accounts, groups and passwords
Create a network password policy using standard practices and procedures
![Page 34: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/34.jpg)
Objectives (cont’d)
Discuss permissions issues
Describe the relationship between permissions and user profiles
Use administrative utilities for specific networks and operating systems
Identify the permissions needed to add, delete or modify user accounts
![Page 35: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/35.jpg)
Authentication
What you know
What you have
Who you are
![Page 36: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/36.jpg)
Security Models and Authentication
text
Peer-levelAccess
User-levelAccess
![Page 37: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/37.jpg)
Peer-Level Access
Athena Aphrodite Hermes
Apollo Ares
Printer
![Page 38: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/38.jpg)
User-Level Access
Athena Aphrodite Hermes
AresApollo
User AccountsDatabase
Printer A
Printer B
![Page 39: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/39.jpg)
Peer-Level vs. User-Level
Peer-level
Less expensive
Easier to implement
Less secure
Less control over file and resource management
Not scalable
User-level
Increased security
Supports larger number of users
Increased control
Offers system logs
Grows with organizational needs
![Page 40: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/40.jpg)
Creating User Accounts
User name
Password
Group associations
Permissions
Additional options
![Page 41: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/41.jpg)
Permissions
Read
Write
Execute
User AccountsDatabase
Write
Exec.
Write
Read
Printer
PrintServer
Server
![Page 42: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/42.jpg)
Windows 2000Permissions
Full control
Change
Read
No access
![Page 43: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/43.jpg)
UNIX Permissions
Access Value Bit
7
6
5
4
3
2
1
0
Access Value Bit Meaning
Read, write and execute
Read and write
Read and execute
Read only
Write and execute
Write
Execute
No mode bits (access absent)
![Page 44: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/44.jpg)
Novell Rights
Supervisor
Read
Write
Erase
Modify
Create
File scan
Access control
No access
![Page 45: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/45.jpg)
Additional LogonAccount Terms
Logon scripts
Home directories
Local profiles
Roaming profiles
![Page 46: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/46.jpg)
Administrative Privileges
UNIX =(including System V, Solaris, Free BSD and all Linux variants)
Windows =
Novell =
Root (full privilege)
Administrator (full privilege)
Supervisor (full privilege)
![Page 47: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/47.jpg)
Standard Password Practices
Create strong password
- At least six characters
- Both uppercase and lowercase letters
- At least one Arabic numeral
- At least one symbol
Implement password policy
- Plan and create a balanced policy
- Write and publish policy
- Train users
![Page 48: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/48.jpg)
Network Security Policies
Password aging
Password length
Password history
Account lockout
Share creation
User creation
Local logon
![Page 49: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/49.jpg)
Standard Operating Procedures
Vendors for operating systems and software
Upgrading, replacing and maintaining hardware
Upgrading software (including operating systems and applications)
Responding to power outages, building evacuation and hacker intrusion
Acceptable use policy
![Page 50: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/50.jpg)
Summary
Define authentication
Explain the share-level and user-level access security models
Identify the purposes and functions of logon accounts, groups and passwords
Create a network password policy using standard practices and procedures
![Page 51: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/51.jpg)
Summary (cont’d)
Discuss permissions issues
Describe the relationship between permissions and user profiles
Use administrative utilities for specific networks and operating systems
Identify the permissions needed to add, delete or modify user accounts
![Page 52: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/52.jpg)
Lesson 5:Managing Users in Windows 2000
![Page 53: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/53.jpg)
Objectives
Identify the purpose of the Windows 2000 Security Accounts Manager
Administer remote Windows 2000 systems and users
Enforce systemwide policies
Convert a FAT drive to NTFS
Enable auditing in Windows 2000 Server
View local and remote events in Event Viewer
![Page 54: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/54.jpg)
Objectives (cont’d)
Manage file and directory ownership
Manage user rights
Enable custom user settings
Identify accounts used by Windows 2000 services
![Page 55: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/55.jpg)
The Security Accounts Manager
Sam
- A collection of processes and files used by Windows 2000 to authenticate users
- Located at C:\winnt\system32\config
![Page 56: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/56.jpg)
The ComputerManagement Snap-in
Managing users on a remote system
![Page 57: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/57.jpg)
LocalSecurity Settings
Start | Programs | Administrative Tools | Local Security Policy
- Configure account policies
- Establish auditing
- Change default user-rights settings
- Alter default settings for system peripherals and auditing options
- Determine public-key encryption and IP security policies
![Page 58: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/58.jpg)
Auditing,Ownership and Rights
Audit policy
User rights
Security options
![Page 59: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/59.jpg)
Editing and Customizing User Accounts
Groups
User environment
(home directory,
logon scripts, user
profiles)
Dial-in options
![Page 60: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/60.jpg)
Windows 2000Services and User Accounts
IIS
Remote Management
Terminal Services
NetShow Video Server
![Page 61: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/61.jpg)
Summary
Identify the purpose of the Windows 2000 Security Accounts Manager
Administer remote Windows 2000 systems and users
Enforce systemwide policies
Convert a FAT drive to NTFS
Enable auditing in Windows 2000 Server
View local and remote events in Event Viewer
![Page 62: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/62.jpg)
Summary (cont’d)
Manage file and directory ownership
Manage user rights
Enable custom user settings
Identify accounts used by Windows 2000 services
![Page 63: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/63.jpg)
Lesson 6:Managing
Users in Linux
![Page 64: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/64.jpg)
Objectives
Create new accounts on Linux systems
Set password aging policies on Linux systems
Set account policies in Linux
View user accounts used by system daemons
Explain run levels
Use ntsysv and chkconfig
![Page 65: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/65.jpg)
Manually Adding Users
File
/etc/passwd
/etc/shadow
/etc/logon.defs
Purpose
Public user database
Shadow password file
Contains default values
![Page 66: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/66.jpg)
Manually Adding Users (cont’d)
File
/etc/default/useradd
/etc/skel
/etc/group
Purpose
Contains default values
Contains default values
Group file
![Page 67: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/67.jpg)
Linux User Accounts
Entry of the new account into a database
Creation of the resources the new account will need
![Page 68: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/68.jpg)
Linux User Account Properties
User name
User ID number
Primary group ID number
Home directory
Shell program
Password
![Page 69: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/69.jpg)
PluggableAuthentication Modules
The password file
The shadow password file
Creating and preparing home directories
Account creation utility
linuxconf
![Page 70: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/70.jpg)
Password Management and Account Policies
Passwordaging
Password checking
![Page 71: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/71.jpg)
Groups
Mechanisms for managing access tofiles and processes
![Page 72: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/72.jpg)
Linux System Accounts
Different subsystems should run under different accounts
File protections should be used to prevent one subsystem from interfering with resources belonging to another
![Page 73: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/73.jpg)
Run Levels,ntsysv and chkconfig
The /etc/inittab file
The /etc/rc.d/ directory
The ntsysv command
The chkconfig command
![Page 74: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/74.jpg)
Summary
Create new accounts on Linux systems
Set password aging policies on Linux systems
Set account policies in Linux
View user accounts used by system daemons
Explain run levels
Use ntsysv and chkconfig
![Page 75: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/75.jpg)
Lesson 7:Name Resolutionin LANs with DNS
![Page 76: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/76.jpg)
Objectives
Explain the DNS
Identify DNS components
List the common DNS record types
Define reverse DNS lookup
Implement DNS in Windows 2000 and Linux
Deploy DDNS
Use nslookup
![Page 77: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/77.jpg)
The Domain Name System
Internet service thatconverts common host names
into their correspondingIP addresses
![Page 78: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/78.jpg)
The Domain Name Space
Root
Second
TOP
Second
DNS consists of three levels
- Root
- Top
- Second
![Page 79: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/79.jpg)
Accessing Hosts by DNS Name
wwwwww
www.ciwcertified.com
host1host1
host1.ciwcertified.com
The .ciwcertified domainThe .ciwcertified domain
sales1sales1
sales2sales2
.sales
sales.ciwcertified.com
.dnsresearch
dns1dns1
dns2dns2
dnsresearch.research.ciwcertified.com
.research
research2research2
research1research1
research.ciwcertified.com
.research
research2research2
Possible Possible resolution to a resolution to a
top-level top-level domain, such domain, such
as .comas .com
![Page 80: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/80.jpg)
DNS Server Types
Root server
Master (or primary) server
Slave (or secondary) server
Caching-only server
Forwarding server
![Page 81: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/81.jpg)
Common DNS Records
Internet (IN)
Name Server (NS)
Start of Authority (SOA)
Address (A)
Canonical Name (CNAME)
Mail Exchanger (MX)
Pointer (PTR)
![Page 82: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/82.jpg)
Setting Up DNS
Server
Zone file
DNS record
![Page 83: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/83.jpg)
Probing DNS with Nslookup
Locate name servers
Locate IP addresses
Locate host names
Review various record types
Change servers
List domains
![Page 84: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/84.jpg)
Configuring DNS in Windows 2000
Dynamic DNS
- DNS record aging and scavenging
SOA field
WINS
Zone transfers
![Page 85: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/85.jpg)
Understanding BIND
BIND 4
BIND 8.x
BIND 9.x
![Page 86: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/86.jpg)
Setting Up DNS in Linux
The named.conf file (BIND versions 8 and 9)
The named.ca file
The named.local file
The forward zone file
The reverse zone file
![Page 87: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/87.jpg)
Troubleshooting DNS
DNS Professional
CyberKit Professional
Ping Plotter
WS_FTP Ping ProPack
![Page 88: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/88.jpg)
Summary
Explain the DNS
Identify DNS components
List the common DNS record types
Define reverse DNS lookup
Implement DNS in Windows 2000 and Linux
Deploy DDNS
Use nslookup
![Page 89: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/89.jpg)
Lesson 8:Name Resolution
with WINS and Samba
![Page 90: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/90.jpg)
Objectives
Explain the basics of NetBIOS
Identify additional name resolution options for LANs and WANs
Implement and manage WINS
Use Samba to create a WINS server in UNIX
Configure Samba systems to use Windows 2000 authentication
Create and manage shares using Samba
![Page 91: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/91.jpg)
NetBIOS over TCP/IP
NetBIOS runs over TCP/IP much thesame way that SMB runs over TCP/IP
![Page 92: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/92.jpg)
The NetBIOS Naming Convention
NetBIOS services use UDP ports 137 and 138 and TCP port 139
- 137 supports the NetBIOS name service
- 138 carries the NetBIOS datagram service
- 139 carries the NetBIOS session layer
![Page 93: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/93.jpg)
Windows Internet Naming Service
Handles queries regarding NetBIOS names and corresponding IP addresses
Uses UDP ports 137 and 138
NetBIOS computer name (Instructor1) IP address for
(Instructor1)
![Page 94: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/94.jpg)
Managing WINS
Scavenging and backup
- Scheduling queue
![Page 95: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/95.jpg)
Static Mapping
Static mapping creates entries in the WINS database that allow non-WINS clients
Entries include Unique Group Domain name Internet group Multihomed
![Page 96: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/96.jpg)
Replication
- Pushpartner
- Pullpartner
![Page 97: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/97.jpg)
Configuring DNS and WINS
DNS and WINS can work together to allow DNS to retrieve the dynamically assigned IP address associated with a particular name
![Page 98: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/98.jpg)
Samba
Samba allows UNIX systems to participate in Windows networks
- Establishes shares on UNIX hosts that are accessible to Windows systems
- Shares printers
- Makes a UNIX system a WINS server
- Makes a UNIX system a WINS client
![Page 99: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/99.jpg)
SWAT
Samba configuration tool
- Home
- Globals
- Shares
- Printers
- Status
- View
- Password
![Page 100: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/100.jpg)
Sambaand WINS
Creating a WINS client
Troubleshooting WINS in UNIX systems
![Page 101: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/101.jpg)
Samba Share Clients
Windows
- Network Neighborhood applet
- Windows Explorer Map Network Drive utility
Linux
- The smbclient program
- The smbmount program
![Page 102: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/102.jpg)
Interoperability Issues
Encrypting Samba passwords
- The smb.conf file
- The smbadduser command
- The smbpasswd command
- Registry changes
![Page 103: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/103.jpg)
Summary
Explain the basics of NetBIOS
Identify additional name resolution options for LANs and WANs
Implement and manage WINS
Use Samba to create a WINS server in UNIX
Configure Samba systems to use Windows 2000 authentication
Create and manage shares using Samba
![Page 104: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/104.jpg)
Lesson 9:Implementing
Internet Services
![Page 105: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/105.jpg)
Objectives
Deploy user-level and anonymous FTP access in Windows 2000 and Linux
Describe standard and passive FTP
Configure Telnet for Windows 2000 and Linux
Configure finger in Linux
Control access to Linux services
![Page 106: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/106.jpg)
File TransferProtocol Servers
Application-layer protocol
Uses two ports
- TCP/20
- TCP/21
Passive mode
Normal mode
![Page 107: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/107.jpg)
Anonymous Accounts
Anonymous accounts in Windows NT
Anonymous accounts in UNIX
Account considerations
![Page 108: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/108.jpg)
ImplementingMicrosoft FTP
Microsoft Internet Information Server (IIS) is the primary way to implement FTP in Windows FTP
![Page 109: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/109.jpg)
Managing FTP in IIS
Security Accounts tab
Messages tab
Home Directory tab
Directory Security tab
![Page 110: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/110.jpg)
Creating Virtual FTP Servers
Dedicated virtual FTP servers
Simple virtual FTP servers
Shared virtual FTP servers
![Page 111: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/111.jpg)
Anonymous Access in IIS
Analyzing and configuring anonymous FTP
Controlling access to your FTP site
Customizing your IIS FTP server
Configuring anonymous FTP on UNIX
![Page 112: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/112.jpg)
Telnet
Controls a system from a remote location
Operates on port 23
![Page 113: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/113.jpg)
Xinetd
FTP
Telnet
Finger
SWAT
TFTP
Chargen
Daytime
POP3
BOOTP
Echo
![Page 114: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/114.jpg)
Finger
Accesses information about local and remote users
- Daytime
- Echo
- Chargen
![Page 115: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/115.jpg)
The hosts.allow andhosts.deny Files
Controls access to UNIX services
![Page 116: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/116.jpg)
Summary
Deploy user-level and anonymous FTP access in Windows NT and UNIX
Install and configure Telnet for Windows 2000 and UNIX
Configure finger in UNIX
Control access to UNIX services
![Page 117: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/117.jpg)
Internet System Management
IT Systems and Services Overview
Internet System Installation and Configuration Issues
Configuring the System
User Management Essentials
Managing Users in Windows 2000
![Page 118: Internet System Management. Lesson 1: IT Systems and Services Overview.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649e995503460f94b9bca7/html5/thumbnails/118.jpg)
InternetSystem Management
Managing Users in Linux
Name Resolution in LANs with DNS
Name Resolution with WINS and Samba
Implementing Internet Services