1. Goal This lab included installing multiple services on a single Red Hat Enterprise Linux 7 Server box, which included DNS, DHCP, openLDAP, NTP, and rsyslog. I have familiarity with installing and managing DNS, DHCP, and NTP, while just learning about openLDAP and ryslog, which are a new concept to me. The installation and configuration of openLDAP allowed me to get a basic general look at the operation of openLDAP, without going too in-depth. I was able to learn how to correctly and efficiently configure both the openLDAP server and client, add users, install schemas, and modify configuration files. Rsyslog was also a new concept to me which brought be a greater sense of local logging using Red Hat Enterprise Linux 7. This lab focused on deploying a DNS server, a NTP server, and a DHCP server to handle things such as IP address pools, hostname resolution, and a systematic time sync to keep all of the nodes on the network on the same page. Rsyslog allows us to remotely access log files from our servers, allowing us to determine issues from a node without actually being on that node, which is good when dealing with a client computer that is having issues. OpenLDAP allows us to create a directory in a similar manner as Windows Active Directory, to store information in an easily accessible lightweight database.
2. Procedural and Informational Documentation All information pertaining to my virtual network can be found at the address http://10.0.15.1/wiki or
Section 1Computing Usable Subnets and Hosts vLab—40 Points Total * Task 1 * Task 2 * Summary Paragraph
Chapter 4 - Describe the impact on users of migrating from a small single server-based network to a directory-based network with multiple servers in different roles. Also describe the impact on network designers and administrators.
At this point during our configuration, we have all of the hardware implementation in place. We will be utilizing seven servers, rather than the initially proposed four. The servers and networking components are configured. Once we acquire licence from OnApp, we will be able to install the OS onto the servers. As of now, all of our servers are connected and ready to be used. Once the desired operating systems are installed onto each servers, we will be able to configure core networking services in order to cluster them. In addition, we have acquired appropriate subnet mask and IP ranges to be used for our nodes. All our hardware will using static IP addresses.
The security aspects we should watch for in this lab relate mostly to the righty way of configuring the services well, setting up a strong and complex Administrator password. Also we must set up firewall rules to make sure that all iptables rules give access to what’s needed only. In firewall rules, we should allow incoming and out coming DNS and DHCP traffic from and to known ip addresses and ports that we needed to connect to. Moreover, in this lab we used the Microsoft Baseline Security tool, which gives good security alerts about critical security issues and controls in the Windows system unlike Linux where SELinux was restricting access rather than giving alerts.
During this section of my blog you would be able to view all the different types of typical services provided by networks and the purpose of each where I discuss the advantages and disadvantages of them all.
It creates a VPC with a /16 IPv4 CIDR block. It is a network with 65,536 private
The goal will be to provide secure connections to all locations where Kudler is located which includes corporate headquarters and the ability to share files as a secure data transmission. Virtual Private network will be implemented to handle this task.
Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of
NOTE: Please write your answers to each question in a different color font to make this easier for the Professor to grade.
7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items
This assignment will be mainly about network components and how do they operate, what are their functions and what are their flaws.
4. Identify the network protocols that are used in the protocols that are in the local are network at your shall or workplace. Why were these protocols chosen for your network? Was IPX ever implemented in your local area network? Why? if your network is using IP, what address class(es) is being used? Why? see if you can find out if and how class D and class E addresses are used in your network.
VLANs or Virtual Local Area Networks are logical local area networks that extend beyond the traditional LAN architecture. Because a VLAN is a logical entity, creating and configuring a VLAN is done completely in software. The advantages to using this type of LAN include but are not limited to the ability to conserve the network resources, to bridge geographical drawbacks, and to better manage the movement of personnel and equipment. To understand the need for VLANs you must first understand the Local Area Network (LAN). The definition of a LAN started as a group of computers that were connected in the same area, but today’s LAN is defined as a single broadcast domain. This is explained easily by looking at a large organization where each department would be on a separate LAN found behind a router or switch. With today’s expanding networks it has become important for these
Software defined networking is a new concept that redefined the current network device architecture and the way they behave. Due to the exponential growth of the Internet and services attached to this worldwide infrastructure, a number of issues have cropped up in modern day networks. This paper discusses a few of these limitations and how the software defined networking approach tries to alleviate them. OpenFlow, released in the year 2008, is a commercially viable implementation of this concept that is being well received by the networking industry at large. The paper also discusses the OpenFlow protocol, its implementation and the challenges facing its widespread acceptance