...DHCP Server configuration 1) Configure the network interface to give a static IP address to the DHCP server Edit the file /etc/network/interfaces [pic] 2) Use the command sudo apt-get install isc-dhcp-server in the terminal to install DHCP. 3) For the DHCP to assign Ipv4 addresses edit the file /etc/dhcp/dhcpd.conf and provide the range of address you want to the DHCP server to assign. [pic] 4) For ipv6 address, create a new file dhcpd6.conf and then configure the range of ipv6 addresses which needs to be assigned. The file should be created in /etc/dhcp/dhcpd6.conf [pic] 5) For ipv6, edit the file /etc/sysctl.conf and provide the below configurations. net.ipv6.conf.all.forwarding=1 net.ipv6.conf.all.autoconf=1 net.ipv6.conf.all.accept_ra=1 [pic] 6) Enter the below commands to enable the configurations made above. sudo sysctl -w net.ipv6.conf.all.autoconf=1 sudo sysctl -w net.ipv6.conf.all.accept_ra=1 sudo sysctl -w net.ipv6.conf.all.forwarding=1 7) Install the router advertisement daemon or radvd by using the command Sudo apt-get install radvd 8) Create file /etc/radvd.conf and put the internal interface and prefix there. [pic] 9) Now restart all the service using the commands - Sudo /etc/init.d/networking restart - Sudo /etc/init.d/radvd restart ...
Words: 335 - Pages: 2
...Installing Server Roles with a Batch File 1. What does the /w switch do? Why is it used? “¹/W switch specifies the warning level of the MIDL compiler.” 2. What is the goal of port scanning? ServerManagerCmd.exe command-line tool can be utilized to install or remove Server 2008 Roles and Features. “Type the following, in which name represents the command name of the role, role service, or feature that you want to remove, and then press Enter. The -restart parameter restarts the computer automatically after removal is complete, if a restart of the computer is required. ” ServerManagerCmd.exe -remove name –restart”² 3. What is the command to start the DHCP Server service? “To start the DHCP service, use the command/sbin/service dhcpd start. To stop the DHCP server, use the command /sbin/service dhcpd stop.”³ 4. What command is used to configure a DNS zone? “dnscmd [ServerName] /zoneadd ZoneName ZoneType [/dp FQDN| {/domain|/enterprise|/legacy}] /load”⁴ References 1. /W switch. (n.d.). (Windows). Retrieved March 20, 2014, from http://msdn.microsoft.com/en-us/library/windows/desktop/aa367383(v=vs.85).aspx 2. Dnscmd Syntax. (n.d.). : Domain Name System(DNS). Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc756116(v=ws.10).aspx#BKMK_22 3. Removing Server Roles and Features. (n.d.). Removing Server Roles and Features. Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc732257.aspx 4. Start or stop...
Words: 274 - Pages: 2
...starting the next task. To command the computer to wait until the program finishes, the start command used with the /wait switch or /w for short is used. For example to install a DNS Server role the command line input would be start /w ocsetup DNS-Server-Core-Role. 2. To remove a Server role the switch /uninstall is used. The switch is typed at the end of a command line input of the start, /w, ocsetup and then name of the role which is to be removed. For an example, if say the Server role of DHCP was needed to be uninstalled the command line input would be start /w ocsetup DHCPServerCore /uninstall. 3. To start and configure the DHCP Server role once it has been installed two commands will be needed. To configure the service the command to input would be sc config dhcpserver start= auto. This command will bring up the ChangeServiceConfig function for the DHCP Server role. To start the DHCP Server role the command line input would be net start dhcpserver. 4. To configure a DNS zone once a DNS Server role has been installed the command line input to use is dnscmd. The dnscmd command is used in conjunction with the / command followed by the DNS configuration that is to be changed. For example if the DNS server cache need to be cleared the command line input would be dnscmd...
Words: 254 - Pages: 2
...Week 9 Capstone Most businesses relies heavily on information an information systems for the delivery of services and management of resources and must therefore ensure that its information assets are well protected. Failure to adequately protect the business information assets through the implementation of appropriate security controls puts the business at risk. This policy applies to business records and all other information that is in the custody or control of the business. This policy serves the following purposes: * Provides a security classification scheme for the business information that can be referenced in other policies, guidelines, standards, and procedures relating to information. * Outlines the responsibilities that members of the business community have with respect to information security. Use of information means any access to, collection, storage, transmission, processing, or destruction of information. Custody of information means the keeping, care, watch, preservation, or security of information for a legitimate business purpose. Control of information means the power or authority to make a decision about the use or disclosure of information in a business records. An information security breach involves one or more of: a circumvention of information security controls; the unauthorized use of information; the unintended exposure of information. Restricted information is the subset of confidential information where the protection of such...
Words: 658 - Pages: 3
...*part one talk about DNS servers. What are they what do they do basic configuration and variation of configuration. As the network administrator for Contoso, Ltd to resolve the issue of users on the company network reporting that they can use host names to connect to computers on the local private network, but they cannot use host names to connect to Internet destinations you have a few options. The action that will take the least amount of administrate effort to enable network users can connect to the Internet host names would be to configure NS2 and NS3 to use NS1 as a forwarder. A DNS forwarder is a DNS server that performs DNS queries on behalf of another DNS server (Shinder.T 2005). With this setup one would configure the firewall used by NS1 to allow only one DNS server to communicate with the internet. After you configure NS2 and NS3 to forwarder all queries that cannot be resolved internally will be forwarded to NS1. Because of the large amount of traffic going through NS1 the server will build a large cache of DNS data, overtime this data will allow the DNS server to process request faster(Book). Another option to solve the issue of users on the company network reporting that they can use host names to connect to computers on the local private network, but they cannot use host names to connect to Internet destinations is to configure all DNS servers to send queries outside of a network using their root hints. This is not the most desirable configuration because...
Words: 781 - Pages: 4
...Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular...
Words: 415 - Pages: 2
...and growth possibilities of an organization. One area that will impact the entire organization for years relates to using/installing Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). DNS and DHCP services can be set up in an office by installing the correct equipment or through the ISP that the organization is using. Knowing what is best for the organization should be based on their current size and equipment needs. A small office with only 2 computers would not require new equipment to be installed. In this size office I would recommend statically assigning the IP addresses to the two computers and using the DNS that is on the ISP network. For an office a little bigger, with 5 computers, I would recommend that they install a router/hub in-one device which can also act as a DHCP server. These all-in-one devices are typically less than $200, will add firewall protection and have ports to connect the computers via an Ethernet connection which will allow better internet access. I would still recommend that this office use the DNS on their ISP’s network. For a larger organization with over 25 computers, I would recommend that they install a Server which will have both DNS & DHCP options. With the size of this organization, having the DNS & DHCP on site will allow for quicker response times when using the internet and the ability to not have to manage which IP addresses are assigned to which...
Words: 275 - Pages: 2
... Patient data must be kept confidential and only allowed to be seen by the doctors that they are working with. In the following, we will review the various domains, and the level of importance to each domain. User Domain * Least secure * Potential for malware, viruses ,etc * Generally where network breaches originate from * Medium risk Workstation Domain * More security * Laptops * Desktops * High risk Outdated software/Operating system Remote Access Domain * Linux Server 2 (web Server) * Low Privacy Impact Should this go down, it will have very little impact on the network. * System/Application Domain * Microsoft Server 1 (E-Commerce, Customer Data) * Microsoft Server 2 (SQL, Customer Database) * Microsoft Server 3 (Office DHCP, Customer Data) These are all critical to high as they contain sensitive information, or are critical to the operation of the network. * Microsoft Email Server. This is a medium threat, should it go down, it will have very little impact on the network. LAN to WAN Domain * Cisco Catalyst 2960 Switches * Minimal data impact * Major network impact Should one of these devices go down, or are breached, they will have very little impact on the network however they are critical to the function of the network. WAN Domain * Cisco 2811 Router * Minimal data impact * Major network impact Should one of these devices go down, or are breached...
Words: 261 - Pages: 2
...a Virtual Server Image Unit 1. Lab 1.2 Preparing an Application Server Ques. 1 – NT2670Svr03A Ques. 2 – This is the first time the disk has been used. Ques. 3 – Disk moves to online status. Ques. 4 – The disk is unallocated space and has not created a volume type yet. Table 1-2-1 – Disk type (basic or dynamic) – Disk 0 – Basic Disk 1 - Basic Total disk size - Disk 0 – 40GB Disk 1 – 16GB Number and type of partitions – Disk 0 – NTFS Primary Partition Disk 1 – Unallocated Basic Partition Amount of unallocated space – Disk 0 – 40GB Disk 1 – 16GB Ques. 5 – Shrink Volume / Delete Volume Ques. 6 – All available disk space has been allocated to C:, X:,Y: drives Ques. 7 – This allows data to be transferred from disk to disk Ques. 8 – C: drive contains system files and boot files that cannot be moved Table 1-2-2 – Unallocated space left (in Gigabytes) Disk 0 – 0 Disk 1 - 8 * Unallocated space left (in Megabytes) Disk 0 – 0 Disk 1 – 8000 Ques. 9 – All tasks could be completed using the Server Manager Ques. 10 – Active Directory Domain Services - DHCP Server - DNS Server Ques. 11 – Group Policy Management – AD DS Tools – DHCP Server Tools – DNS Server Tools – Net Framework 3.5 Ques. 12 – Active Directory Roles and Services were installed Ques. 13 – It added File Services under the Server Roles Ques...
Words: 314 - Pages: 2
...Everyone is on a first-name basis, even with Peter Charles, the president. Organization Structure Coastline Systems Consulting [pic] Information Systems Facilities PCs Each technician works uses a Dell notebook: o Pentium M class machines with 512 MB RAM, 30-50 GB hard drives The bookkeeper/receptionist has a Dell Optiplex desktop running a Pentium 4, 256 MB RAM, and an 80 GB hard drive: Operating systems - MS Windows Windows XP Professional Tools - MS Office 2003 suite plus other software depending on use Internet Browser – IE 6 and Mozilla FireFox E-mail Client - Mozilla Thunderbird Various inkjet and laser printers Servers Dell PowerEdge 2800 Server o 1 GB of RAM, 80 GB RAID-5 hard drive storage o Operating system - MS Windows Server...
Words: 626 - Pages: 3
...browser. On the address bar type 192.168.1.1 and hit the enter key. A user name and password window will appear. Leave the user name blank and by default password isadmin. 4. Under the SETUP tab, for the Internet Connection Type, click the drop down arrow and selectPPPoE. Type in your user name (in email format i.e. username@isp.net/com) and then your password both from your ISP. Make sure to set it to Keep Alive Redial period 30 sec. Leave the rest as it is then SAVE the settings. 5. Go to the STATUS tab check the status if it is Connected, if not click on the “Connect” button. If you are connected proceed to step number 7 to configure the wireless settings but if it gives you the message “Cannot get an IP from the PPPoE Server” or “Cannot connect to PPPoE Server”...
Words: 707 - Pages: 3
...CONSOLIDATED DOCTORS A COMPERHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT/COMPUTER NETWORK SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By: The Pin Heads: Bobbi Haynes Beau Driscoll Peter Hsu Advisor - Bill Pool and Tracy Martin ITT TECHNICAL INSTITUTE SPOKANE, WASHINGTON NOVEMBER, 2011 Table of Contents Scope Document and Project Charter 4 Purpose 4 Goals and Objectives 5 Success Criteria 5 Project Context 5 Project Deliverables 6 Scope Specifications 6 Out-of-Scope Specifications 6 Assumptions 7 Constraints 7 Risks 7 Stakeholders 7 Recommended Project Approach 7 Cost Matrix 8 Security/Maintenance Plan 9 Introduction and Background 9 Budget 10 Roles and Responsibilities 10 System Administrator 10 Help Desk IT 11 Office Manager 11 Financial manager 11 Supervisors 12 Receptionist 12 Performance Measures and Reporting 12 Printers 12 Phones 13 Work stations and laptops 13 Serves 13 Routers and Switches 13 Software 14 Card Access System 14 Governance and Management/Security Approach 14 Customer/Business Owner Management and security 14 Standard Operations and Business Practices 14 Security 14 Data Sharing 15 Data Storage 16 Tools used for change control management 16 Problem reporting 16 Risk identification 16 Disaster Recovery 16 Documentation Strategies 16 Training 16 Security 17 Roles and Responsibilities 17 Network...
Words: 11047 - Pages: 45
...There is a limit on the cable length; there is also a limit on the number of nodes that can be connected all at once. Ring This is referred to as a ring network. This is a when computers are connected to each other in a circle shape. The packet is sent around the ring until it gets where it is meant to be. You don’t need the network server to control the connection between the workstations. Each of the computers have got access to all of the same things. If one of the computers go down it will affect the whole network. The network depends on the wire which connects the computers components. Tree This network is referred to as a star bus topology; it is common to networks such as the star and bus topology. The tree topology connects groups of star networks to other star networks so you can extend them. You can expand the network easily. If one of the parts are damaged the others will not be affected. The tree topology depends on the main bus cable to keep the network running but if it breaks the whole network will go down. The more computers added then the more difficult...
Words: 798 - Pages: 4
...Assignment 1. DHCP Troubleshooting Dear Junior Administrator, I would start by rechecking your initial configurations to make sure the setting were saved. Once that is done, check to see if the workstations have picked up a new lease or not. If that doesn’t resolve the issue, did you check to make sure the server is up and operational? Have any Error messages or pop up’s appear with any type of warning, if so what did it say? Once the server has been checked, if it is working properly we will check these three common problems; 1. “The client might be configured to use an IP address not provided by the server. 2. The server sends a negative response back to the client, and the client displays an error message or popup indicating that a DHCP server could not be found. 3. The server leases the client an address but the client appears to have other network configuration–based problems, such as the inability to register or resolve DNS or NetBIOS names, or to perceive computers beyond its same subnet.”(Troubleshooting DHCP) On the chance that the DHCP server is off I would like you to follow these steps to try to restart the DHCP server. 1. “Start Windows Server, and log on under an account with Administrator rights. 2. At the command prompt, type net start dhcpserver , and then press ENTER. As a helpful tool Use Event Viewer in Administrative Tools to find the possible source of problems with DHCP services.”(Troubleshooting DHCP) I hope some of this...
Words: 311 - Pages: 2
...Window Server 2008-DCHP Server Role This paper is designed to explain the equipment, installation, and configurations of the DHCP Server Role for Windows Server 2008. In order to fully understand how DHCP Server Roles operate within the network, you first have to know why, when, and where the DHCP Server Role will be used. What is a server role? A set of software programs that when installed and configured properly, allows a computer to perform specialized functions for numerous clients or other computers within a network. They describe the main function, or use of a computer. A certain computer can be created to perform a clear-cut function that’s greatly used in an enterprise, or perform many roles if it’s not used too much. They provide aid to client’s throughout an organization, that’s directed by other computers, like websites, printers, or files....
Words: 431 - Pages: 2