Premium Essay

Dhcp Server Configuration in Ubuntu

In:

Submitted By srinivasdesiraju
Words 335
Pages 2
DHCP Server configuration

1) Configure the network interface to give a static IP address to the DHCP server

Edit the file /etc/network/interfaces

[pic]

2) Use the command sudo apt-get install isc-dhcp-server in the terminal to install DHCP.

3) For the DHCP to assign Ipv4 addresses edit the file /etc/dhcp/dhcpd.conf and provide the range of address you want to the DHCP server to assign.

[pic]

4) For ipv6 address, create a new file dhcpd6.conf and then configure the range of ipv6 addresses which needs to be assigned. The file should be created in /etc/dhcp/dhcpd6.conf

[pic]

5) For ipv6, edit the file /etc/sysctl.conf and provide the below configurations.

net.ipv6.conf.all.forwarding=1

net.ipv6.conf.all.autoconf=1

net.ipv6.conf.all.accept_ra=1

[pic]

6) Enter the below commands to enable the configurations made above.

sudo sysctl -w net.ipv6.conf.all.autoconf=1 sudo sysctl -w net.ipv6.conf.all.accept_ra=1

sudo sysctl -w net.ipv6.conf.all.forwarding=1

7) Install the router advertisement daemon or radvd by using the command

Sudo apt-get install radvd

8) Create file /etc/radvd.conf and put the internal interface and prefix there.

[pic]

9) Now restart all the service using the commands

- Sudo /etc/init.d/networking restart

- Sudo /etc/init.d/radvd restart

- Sudo /etc/init.d/isc-dhcp-server restart

- Sudo /etc/init.d/isc-dhcp-server6 restart

10) Also edit the firewall to allow ipv6. The file to be edited is /etc/default/ufw and set the ipv6 to yes.

[pic]

Testing:

1) Connect a client in the same network as the DHCP server. The server will assign IP address to the client.

Similar Documents

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic...

Words: 1059 - Pages: 5

Premium Essay

Server Buil Automation

...CentOS/RHEL/Fedora, if everything goes well here you should be able to build client servers without any manual work using PXE boot. Server setup. For the cobbler server basic requirement is you need two NIC cards if you want to use it for DHCP as well. Why do i need two NIC cards because it allow client servers to initially boot up in the private network where Cobbler will handle the installation. Since Cobbler utilizes DHCP and TFTP, making these services listen on a Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the Firewall It’s possible to have the firewall running — you just need to ensure that the proper ports are opened. For simplicity, and since this server is in a private network, I chose to have the firewall turned off. You can...

Words: 16529 - Pages: 67

Premium Essay

Systems Administration

...Q1. Outline the installation process of the Ubuntu Server Edition? Ans. * By using a pen drive or from a VMware network * By using a CD-ROM or do a bootable disc and slot it into the device * Q2. Describe the installation process of Ubuntu from a CD or a bootable disc. Ans. * First, download and burn the appropriate ISO file from the Ubuntu web site3. * Boot the system from the CD-ROM drive. * At the boot prompt you will be asked to select the language. This is default and it will show up immediately you install the server. * After, select an installation language. This is what will see you through the installation process. * Choose the continent and country. This is very important because there are servers all over the world that the Ubuntu or Linux system can go in for updates. It looks for servers available in the specified region and relays you to that server. This makes updating quite easy. * You will then asked to select your keyboard layout or the keyboard detection. * It will load the components from the CD or bootable drive onto the system. * The installer then discovers your hardware configuration, and configures the network settings using Dynamic Host Configuration Protocol (DHCP) which will make everything automatic and find your local host name by default * However, if you want to configure the network manually, you will need a static IP address since it is a server. You can use the ipconfig command in the command...

Words: 611 - Pages: 3

Premium Essay

Ubuntu Dns Server

...Assessment 3 Course Name | Managing Network Operating Systems | Credits | 15 | Code | NW701 | Level | 7 | Id | | Name | | Date | | Signature | | Aims: 1. To equip students with the skills necessary to enable them to manage network operating systems. Date | 6/08/2014 | Time | 9:30 | Learning Outcomes | 1, 2,3 | Assessment Weightings: | 100 Marks in total converted to 40% of final grade | Conditions: | In class individual test. Closed book. Practical task in laboratory conditions, and presentation | Time Allowed: | 1 Hours (practical not included) (plus 15-30 minutes practical time for each student) | Learning Outcomes Assessed: Learning outcomes assessed | Questions | Marks | Assessment Weighting % | 2 | Perform and evaluate tasks that will deploy and configure a network operating system | Task1 Task 2Task 3 | 30 2020 | 50% | 4 | Evaluate how a networking operating system uses the OSI model | Task 1 | 30 | 20% | 5 | Compare and contrast two network operating systems | Task 4 | 30 | 30% | Task Number | Marks allocated | Marks obtained | 1 | 30 | | 2 | 20 | | 3 | 20 | | 4 | 30 | | Total Marks | 100 | | Instructions: 1. You should attempt ALL the questions in this test. 2. Check all the tasks in the assessment 3. Task One is an individual project. 4. Task Two ,Three and Four are practical tasks 5. Read instructions carefully. 6. Write your full name and student...

Words: 1296 - Pages: 6

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Test

... Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18

Premium Essay

It530 Assignment Unit 1

...Running Head: DOMAIN NAME SERVERS AND INTERNET PROROCOL Domain Name Servers and Internet Protocol Awaz Barwari Kaplan University Abstract Domain Name System (DNS) is central to the Internet and networking. It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like www.google.com into a raw IP address number 173.194.40.197. DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net, .Org...

Words: 1390 - Pages: 6

Free Essay

Netw

...Report Detailing Network Solution for Extension Site Grading Rubric Categories | Points/Grading Content | Points/Grading Content | Points/Grading Content | Points/Grading Content | Content/Terminal Course Objective | 20The network report contains TCO with extensive detail for the network VLAN configuration. | 15The network report contains TCO with basic detail regarding the network VLAN configuration. | 10The network report contains TCO with limited detail regarding network VLAN configuration. | 5The network report contains TCO with little to no parts covered on network VLAN configuration. | Creativity | 10The network report has creative details and descriptions using their own determination, experience, or knowledge to meet network requirements. | 8The network report has few creative details and descriptions using their own determination, experience, or knowledge to meet network requirements. | 6The network report has one creative detail and descriptions using their own determination, experience, or knowledge to meet network requirements. | 4The network report contains no creative details and descriptions using their own determination, experience, or knowledge to meet network requirements. | Grammar/Punctuation | 5The network report contains fewer than two grammatical errors. | 4The network report contains fewer than four grammatical errors. | 3The network report contains fewer than six grammatical errors. | 2The network report contains more than six grammatical errors...

Words: 668 - Pages: 3

Premium Essay

Using Google Dns

...Configuring your network settings to use Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses used by your ISP's domain name servers are automatically set by your ISP via the Dynamic Host Configuration Protocol (DHCP). To use Google Public DNS, you need to explicitly change the DNS settings in your operating system or device to use the Google Public DNS IP addresses. The procedure for changing your DNS settings varies according to operating system and version (Windows, Mac or Linux) or the device (computer, phone, or router). We give general procedures here that might not apply for your OS or device; please consult your vendor documentation for authoritative information. Note: We recommend that only users who are proficient with configuring operating system settings make these changes. Important: Before you start Before you change your DNS settings to use Google Public DNS, be sure to write down the current server addresses or settings on a piece of paper. It is very important that you keep these numbers for backup purposes, in case you need to revert to them at any time. After changing your settings, if you encounter a problem and cannot connect to the Internet, please call our support numbers for troubleshooting instructions. We also recommend that you download this page and print it, in the event that you encounter a problem and need to refer to these instructions...

Words: 2404 - Pages: 10

Premium Essay

Itech 1005

...ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1- NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .....................................................

Words: 3418 - Pages: 14

Premium Essay

345 Lab 4

...Enterprise Internetwork Design & Implementation | Lab IV | | Contents OSPF 4 BASIC COMMANDS 4 Backup link Configuration 4 QOS 8 Testing 10 Trouble Shooting 11 Implications/How it works 11 SNMP & NetFlow 12 In Global Configuration Mode on each Cisco Router: 12 In Interface Configuration Mode on each Cisco Router: 12 Install Cacti on the HQ Server 12 Installing NfSen on the HQ Server: 13 Troubleshooting: 14 Verification/Testing: 14 Explanation: 15 What was not accomplished: 15 Formatting Cisco IOS on 2600 series routers 15 Testing 16 Trouble Shooting 16 General IPv6 commands: 17 Rip6 commands: 17 Implications/How it works 18 Testing 19 Troubleshooting 20 IP 21 Delegation: 21 VLAN information: 22 VLAN IP Addresses: 23 HQ Subnetting: 23 Store Subnetting: 24 Procedures: 25 Troubleshooting: 27 Traffic generation/Services 29 Installing Ubuntu 10.04.2 LTS 29 Installing and Configuring NTP on Ubuntu 31 Installing BackTrack 4 R2 32 Installing and Configuring Nping 35 Verification and Troubleshooting for Nping 35 Reflection 36 Troubleshooting 36 Adtran 37 Commands for set-up 37 How does Adtran differ from Cisco? 38 How do you verify/what were the results 38 Bibliography 39 Appendix A 40 OSPF BASIC COMMANDS The following commands are entered into global configuration mode. router ospf 10 network <the ip network of the network you wish to add> <the inverse mask of the area>...

Words: 7461 - Pages: 30

Free Essay

Systems High Availability

...Cloud Computing Future Proof IT… Internal Cloud External Cloud APP APP Owned and Operated by IT Rented by IT Unlock new market based economies of scale, service and innovation beyond what currently exists today What is Virtualization? What is Virtualization? Physical World Virtualized World Hardware Traditional x86 Architecture • Single OS image per machine • Software and hardware tightly coupled • Multiple applications often conflict • Underutilized resources Virtualization: • Separation of OS and hardware • OS and application contained in single file • Applications are isolated from one another • Hardware independence & flexibility Typical Consolidation: 15:1 Key Properties of Virtual Machines •Partitioning  Run multiple operating systems on one physical machine system resources between virtual machines  Divide Key Properties of Virtual Machines •Partitioning   Run multiple operating systems on one physical machine Divide system resources between virtual machines •Isolation  Fault and security isolation at the hardware level resource controls preserve performance  Advanced Key Properties of Virtual Machines •Partitioning   Run multiple operating systems on one physical machine Divide system resources between virtual machines •Isolation   Fault and security isolation at the hardware level Advanced resource controls preserve performance •Encapsulation  Entire state of...

Words: 2163 - Pages: 9

Premium Essay

Network

...and Client/Server Environments Group Assignment Carroll Backus, Sonia Crumbley, Willie Coffie, Jason Duggan, Christopher West 13 May 2013 Instructor: Dr. Betty Tipton Colorado Technical University Table of Contents Technology Analysis and Assessment Plan 3 Technology Analysis and Assessment Improvement Plan 6 Operating System Platform and Cost Containment 6 Architecture Assessment and Governance 9 Enterprise Authentication 11 Directory Services and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250 GB hard drives in a RAID configuration (one drive...

Words: 5202 - Pages: 21

Free Essay

Niloy

...The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com 1 Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I...

Words: 16651 - Pages: 67