0% found this document useful (0 votes)
27 views86 pages

Sna Assignment DNF Update

Uploaded by

jhalak.sapkota23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views86 pages

Sna Assignment DNF Update

Uploaded by

jhalak.sapkota23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Individual Assignment System & Network Administration APD2F2406CS(CYB)

SYSTEM AND NETWORK ADMINISTRATION


INDIVIDUAL ASSIGNMENT

Name (TP Number) : Pankaj Lal Dhear A/L Jagdish


Kumar(TP070590)

Intake Code : APD2F2406CS(CYB)

Lecturer Name : Shahab Alizadeh

Page | 1 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Table Of Contents
1.0 Introduction ............................................................................................................... 3
1.1 Domain Name System (DNS) .................................................................................. 3
1.2 Dynamic Host Configuration Protocol (DHCP)........................................................ 3
1.3 Email Server .......................................................................................................... 4
1.4 Web Server ............................................................................................................ 4
1.5 Secure Sockets Layer (SSL)/Transport Layer Security (TLS)................................... 4
2.0 Install Virtual Box on your machine and create a virtual machine running Rocky Linux
5
3.0 Install and configure a DNS server using BIND on the virtual machine. Ensure that the
DNS server can resolve local and external domain names. ..................................................... 24
4.0 Install and configure a DHCP server using DHCP on the virtual machine. Configure the
DHCP server to assign IP addresses to clients on the local network. ....................................... 49
5.0 Install and configure an email server using Postfix and Dovecot on the virtual machine.
Configure the email server to allow local users to send and receive emails. ............................. 58
6.0 Install and configure a web server using Apache on the virtual machine. Configure the
web server to host a basic website that can be accessed by clients on the local network. .......... 66
7.0 Implement SSL/TLS encryption for email and web services on the virtual machine.
Generate and install SSL certificates for the email and web servers. ...................................... 68
8.0 Troubleshooting Errors Encountered ........................................................................ 78
Error 1 ............................................................................................................................ 78
Error 2 ............................................................................................................................ 80
Error 3 ............................................................................................................................ 83
9.0 Conclusion ............................................................................................................... 85
10.0 References ............................................................................................................... 86

Page | 2 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

1.0 Introduction
This assignment aims to create an entire network architecture using Ubuntu and
Rocky Linux, mainly Rocky Linux, which uses Oracle Virtual Box. The goal is to
create a working system capable of meeting the demands of a small organization. The
system will integrate critical network services such as DNS, DHCP, email and web
servers, and SSL/TLS to do this.

1.1 Domain Name System (DNS)


The Domain Name System, or DNS, is the internet's address book. It converts
human-readable domain names into machine-readable IP addresses, which
computers use for communication. This translation is essential for navigating the
internet since it makes it easier to find specific websites and services. DNS
servers are scattered around the world, ensuring that domain names are resolved
quickly and reliably.

1.2 Dynamic Host Configuration Protocol (DHCP)


The Dynamic Host Configuration Protocol (DHCP) is a network protocol that
assigns IP addresses to networked devices. It improves network management by
reducing the requirement for manual IP address setting. DHCP servers manage a
pool of IP addresses and assign them to clients as needed. When a device
connects to a network, it broadcasts a DHCP request, and the server responds
with configuration information such as an IP address, subnet mask, gateway, and
DNS server addresses. DHCP is critical for efficient network operations,
particularly in large or dynamic networks (Gillis, 2023).

Page | 3 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

1.3 Email Server


Emails depend on a complex infrastructure behind the scenes, with email servers
operating as virtual mailboxes. When an individual sends an email, it passes
through several servers. The sender's server transmits it to an SMTP server, which
utilizes DNS to determine the recipient's server address. After confirming and
breaking down the email for faster delivery, the recipient's server checks for spam
and sends it using protocols such as POP3 or IMAP. This complicated process
guarantees that emails arrive at their destinations quickly and safely (Sharma,
2024).

1.4 Web Server


A web server is a computer system that maintains and transmits online material. It
comprises both hardware and software. When a user requests a webpage, the web
server processes it, downloads the relevant files, and delivers them to the user's
browser. There are two basic types of web servers: static and dynamic. Static
servers just transport files, but dynamic servers build content before delivery,
making them more adaptable for large-scale websites (MozDevNet, n.d.).

1.5 Secure Sockets Layer (SSL)/Transport Layer Security (TLS)


SSL/TLS encryption is a security technology for data transmission over the
internet. It provides an encrypted connection between a client and a server by
combining asymmetric and symmetric encryption. To allow this encryption,
websites must have SSL/TLS certificates, which ensures that sensitive data such
as passwords and payment information is safely delivered. This is critical for
preserving user privacy and deterring unwanted access.

Integrating these components will result in a powerful and reliable network solution
for a firm, allowing for continuous and efficient communication and data exchange.
This project will investigate the configuration and integration of these services within
the Oracle Virtual Box environment, emphasizing the critical factors and best
practices for developing a functioning and secure network infrastructure.

Page | 4 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

2.0 Install Virtual Box on your machine and create a virtual machine
running Rocky Linux

Figure 2.01 Virtual Box Download Page


In order to install Virtual Box, head to the Oracle Virtual Box download page as
shown below in Figure 2.01.

Figure 2.02 Virtual Box Download Package Type


Then, click on “Windows hosts” under the “VirtualBox 7.0.20 platform packages”
section as shown in Figure 2.02, to start the installation of Virtual Box.

Page | 5 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.03 Virtual Box Manager


Once the Virtual Box has been installed, launch the program to create a new Virtual
Machine which runs both Rocky Linux and Ubuntu. To do that, click on the button
that says “New” as shown in Figure 2.03 using the arrow.

Figure 2.04 Part 1 Creation of Virtual Machines

Figure 2.05 Ubuntu Selection on ISO Image


In Figure 2.04, it shows the first part of the creation of the Virtual Machine. Here, the
user will input the name of the virtual machine, select the ISO image which in Figure
2.05 shows the ISO image of Ubuntu, and so on.

Page | 6 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.06 Virtual Box Manager


In Figure 2.06, It allows the user to set the login, password, and hostname for the
unattended guest operating system installation.

Figure 2.07 Virtual Machine Hardware Setup


Figure 2.07 shows the hardware setup for the virtual machine.

Page | 7 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.08 Virtual Hard Disk Setup


On this section, it shows that the user is able to pick the size of their choice for the
Virtual Hard disk (Figure 1.08).

Figure 2.09 Finalise Creation of Virtual Machine


Figure 2.09 shows the final part of the Virtual Machine creation. It shows the
summary of what has been selected by the user from the earlier setups.

Page | 8 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.10 Arrow indicating to click on “Settings” button


Figure 2.10 depicts the upper portion of the Oracle VM VirtualBox Manager
interface. The arrow shows the next step for the VM setup.

Figure 2.11 Change Pointing Device to USB Tablet


This image shows that the user has changed the “Pointing Device” to USB Tablet.

Page | 9 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.12 Turning up the Video Memory to 128MB


In Figure 2.12, it is visible that the user has set their video memory to the maximum
option possible for the VM.

Figure 2.13 Changing Advanced settings


Under the “General” then “Advance” tab, the user has chosen the “Bidirectional”
option for both “Shared Clipboard” and “Drag’n’Drop”

Figure 2.14 Mount the Rocky IOS Image on the Virtual CD-ROM
In the image above, the user mounts the intended VM’s IOS Image onto the Virtual
CD-ROM through the “Storage” tab. The red arrow on the right shows the Rocky’s
IOS image whilst the blue arrow shows the Ubuntu’s IOS image.

Page | 10 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.15 Rocky Language Select Page


The screenshot illustrates the Rocky Linux 9.3 installation procedure. It prompts the
user to select their preferred installation language. By clicking on it, the user can
select their preferred language.

Figure 2.16 Rocky Installation Summary


In Figure 2.16, it shows the next part of the Rocky Linux installation process. It
summarises the selected settings. Before starting the installation, the user can examine
and change these options.

Page | 11 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.17 Rocky Installation Destination


Figure 2.17 presents a part of the process for selecting the installation location. The
user is prompted to select the chosen device, which will remain unchanged until the
"Begin Installation" button is clicked.

Figure 2.18 Rocky Set Root Password


This page will show up once the user selects on the “Root Password” option in the
installation summary page to set the VM’s root users password.

Page | 12 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.19 Root Password Successfully set


This image shows that the root users’ password has been successfully set.

Figure 2.20 Installation Complete


Figure 2.20 shows that the installation process has been completed and button at the
bottom right of the screen indicates that the system should be rebooted.

Page | 13 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.21 Welcome to Rocky Linux 9.3


Here, it shows that the user is able to begin with the setup for the system.

Figure 2.22 User Privacy Page


Figure 2.22 shows that the user has given permission to the system to allow
applications on the system to determine the user’s geographical location.

Page | 14 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.23 Link Online Accounts


This page shows that users are able to connect online accounts to the system.

Figure 2.24 Set Name and Username


In this image, it shows that the user is prompted to set their “Full Name” and
“Username”.

Page | 15 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.25 Set User Password


Figure 2.25 shows that the following page to set the Password after the user has set
the Username and Full Name.

Figure 2.26 Setup Completion


This page indicates that the user has successfully completed the setup of the system.

Page | 16 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.27 Software Application in Rocky


The user searches for the Software Application on Rocky.

Figure 2.28 Software Application Main Menu Page


Figure 2.28 shows that the user is in the Main Menu of the Software Application.

Page | 17 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.29 Software Application Update Page


This page which is the Update Page, is for users to start the update process of the
system.

Figure 2.30 Update Process Completion


This page shoes the final step of the update process where users are able to complete
the process by clicking the button on the top right that says “Restart & Update”.

Page | 18 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.31 Update and Upgrade Command on Rocky Linux Terminal


The user is also able to update and upgrade the system through the terminal using
commands as shown in Figure 2.31.

Figure 2.32 First Page of Ubuntu Installation


In Figure 2.32, the user is able to select the preferred language for the system and
have the option to either try or install Ubuntu.

Page | 19 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.33 Keyboard Language Layout Page


In this part, the user is able to select any of the languages as shown in Figure 2.33 for
the systems keyboard layout.

Page | 20 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.34 System Updates and other Software


This screenshot demonstrates that the user can select between a standard installation
and a minimum installation. The user can also choose to get updates when installing.

Figure 2.35 System Installation Type


Here, users are able to choose how they want to install Ubuntu.

Page | 21 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.36 Set User Details Page


In this image shows that the user is prompted to insert their details to create the user
into Ubuntu.

Figure 2.37 Ubuntu Installation Complete


Figure 2.37 shows that the installation of Ubuntu has been completed after user has
clicked the “Continue” button from Figure 2.36. Once installation is complete, the
user is urged to restart Ubuntu.

Page | 22 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 2.38 Ubuntu Linux Terminal


Once the user has restarted Ubuntu, the user is able to use the system. For example,
open the terminal as shown in Figure 2.38.

Figure 2.39 Ubuntu Update Command in Terminal


This image shows that the user is updating the system through the terminal by using
the “sudo apt-get update -y” command.

Page | 23 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

3.0 Install and configure a DNS server using BIND on the virtual
machine. Ensure that the DNS server can resolve local and external
domain names.

Figure 3.01 Install the “net-tools” Package


The command "sudo apt install net-tools" installs the "net-tools" package, which
includes network utilities. The output shows that the package was successfully
installed and that certain other packages were automatically installed and are no
longer required.

Page | 24 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.02 Command Used to Show Network Interfaces Details in Ubuntu


In this screenshot, the command "ifconfig" displays information about the system's
internet connections. The result of this command displays information about the
"enp0s3" and "lo" network interfaces.

Figure 3.03 Command Used to Show Network Interfaces Details in Rocky


This screenshot shows the similar information showed in Figure 3.02.

Page | 25 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.04 Network Manager Option in Virtual Box


Under the “File” option, select “Tools” to view the “Network Manager” option.

Figure 3.05 NAT Network Tab under the Network Manager Option
The screenshot depicts the Oracle VM VirtualBox Manager's Network Manager page
under the NAT Network tab. It shows a list of available network interfaces. The IPv4
prefix, IPv6 prefix, and DHCP server status are all available for each interface.

Figure 3.06 NAT Network Option for Both Rocky and Ubuntu
Figure 3.06 depicts the configuration for the network interface
"TP070590_ClientServerNet". This interface's IPv4 prefix is 192.168.30.0/24, and
DHCP is enabled. This indicates that the interface will use the DHCP protocol to
allocate IP addresses to connected devices.

Page | 26 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.07 Arrow Indicating the Settings Button


Figure 3.07 shows an arrow that which indicates the setting option.

Figure 3.08 Network Tab in Settings


In this screenshot, the user is selecting the newly created NAT Network to “Adapter
1” for both on the Rocky and Ubuntu VM.

Page | 27 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.09 DHCP Service is Working on Rocky


This image indicates that the DHCP service is working, and the Rocky Server is able
to receive the IP Address

Figure 3.10 DHCP Service is Working on Ubuntu


Similar to what happens in Figure 3.09 but in the Ubuntu Client VM.

Page | 28 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.11 Pinging Server to Client

Figure 3.12 Pinging Client to Server


This images above shows that the server and client can successfully ping to each other
with 0% packet loss.

Page | 29 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.13 Hostname of Rocky Server


The command “hostname” is used to display the current hostname for the Rocky
Server.

Figure 3.14 Command to Open “hostname” File in a Text Editor


In Figure 3.14, the command "sudo nano /etc/hostname" opens the "/etc/hostname"
file in a text editor with administrative capabilities. To accomplish this activity, the
user is requested to enter their password.

Page | 30 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.15 New Hostname for Rocky Server


In this file, users can insert the new hostname for the Rocky Server.

Figure 3.16 Command Used to Display Content in the “/etc/hostname” File


“cat /etc/hostname” displays the contents of the “/etc/hostname” file, which contains
the system's hostname.

Figure 3.17 Command to Open “hosts” File in a Text Editor


In Figure 3.14, the command "sudo nano /etc/hosts" opens the "/etc/hosts" file in a
text editor with administrative capabilities. To accomplish this activity, the user is
requested to enter their password.

Page | 31 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.18 Using Text Editor to Modify “/etc/hosts” File


The image shows a text editor window displaying the contents of the "/etc/hosts" file.
The first two lines are standard entries for the loopback interface, while the third line
specifies the IP address 192.168.30.4 and its associated hostname,
"pankajserver.sterling.org" which shows that the system will resolve the hostname
"pankajserver.sterling.org" to the IP address 192.168.30.4.

Figure 3.19 Command Used to Display Content in the “/etc/hosts” File


The command “cat /etc/hosts” displays the contents of the “/etc/hosts” file.

Figure 3.20 Command to Reboot System


In Figure 3.20, “reboot” command is used to reboot the Rocky Server.

Page | 32 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.21 Successful Ping to Server


Image above shows that the server can successfully ping to itself.

Figure 3.22 Hostname of Ubuntu Client


The command “hostname” is used to display the current hostname of the Ubuntu
Client.

Figure 3.23 Command to Open “hostname” File in a Text Editor in Ubuntu


In Figure 3.23, the command "sudo nano /etc/hostname" opens the "/etc/hostname"
file in a text editor with administrative capabilities.

Figure 3.24 New Hostname for Ubuntu Client


In this file, users can insert the new hostname for the Ubuntu Client.

Page | 33 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.25 Command to Open “hosts” File in a Text Editor in Ubuntu


In Figure 3.25, the command "sudo nano /etc/hosts" opens the "/etc/hosts" file in a
text editor with administrative capabilities. To accomplish this activity, the user is
requested to enter their password.

Figure 3.26 Using Text Editor to Modify “/etc/hosts” File in Ubuntu


The image shows a text editor window displaying the contents of the “/etc/hosts” file.
The first two lines are standard entries for the loopback interface, while the third line
specifies the IP address 192.168.30.5 and its associated hostname,
“pankajclient.sterling.org”. The remaining lines are comments that provide
information about IPv6 addresses and their purpose.

Page | 34 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.27 Successful Ping to Client


Image above shows that the client can successfully ping to itself.

Figure 3.28 Command to Display Details of Systems OS


The image displays the results of the "uname -a" command. The output includes
information about the system's operating system, kernel version, hostname,
architecture, and other specifications.

Page | 35 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.29 Installation of BIND Package


The command "sudo dnf install -y bind bind-utils " installs the BIND package, which
are required to operate a DNS server.

Figure 3.30 Enabling the “named” Service


Figure 3.30 depicts the "sudo systemctl enable named --now" command, which is
used to start the named service, which is the DNS server, and configure it to start
automatically when the system boots.

Figure 3.31 Starting the “named” Service


The command used in this image is to start the “named” service.

Page | 36 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.32 Status of “named” Service


This image shows the current status of the “named" service by using the “sudo
systemctl status named” command.

Figure 3.33 Command to Display Content of “/etc/named.conf” File


In the screenshot above, the command "ll /etc/named.conf" displays the contents of
the "/etc/named.conf" file, which is the configuration file for the specified DNS
server.

Page | 37 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.34 Copying Files to a Directory and Listing Files from a Directory
The first command in Figure 3.34, “sudo cp -p /etc/named.conf /etc/named.conf.bak”,
generates a backup copy of the named DNS server's configuration file,
“/etc/named.conf”. The second command, ls -l /etc, lists the contents of the /etc
directory, which contains a variety of system configuration files.

Figure 3.35 Copied Files Existent in Directory


Files that were copied in Figure 3.34 can be found in the directory as shown in Figure
3.35.

Figure 3.36 Swapping to Root User


This command “su –“ as shown in the screenshot above is used to change the user
from “TP070590SNA” to Root.

Page | 38 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.37 Modifying the “/etc/named.conf” file


The image displays the "/etc/named.conf" file, which contains three zone definitions
which are the root zone, the "sterling.org" zone, and the "30.168.192.in-addr.arpa"
zone. Each zone describes its kind which are hint, master, or slave, the file containing
zone data, and the permissible update policy.

Figure 3.38 Checking the “named” Service Configuration


This command used is to check if there are any syntax error in the “named.conf” file
along with the consistency of the file for the “named” DNS server.

Figure 3.39 Entering Directory and Listing the Files in the Directory
The first command, "cd /var/named," moves the current directory to "/var/named".
The second command, "ls -l", lists the current directory's contents, including file
names, permissions, owner, group, size, and modification date.

Page | 39 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.40 Enter the Text Editor of “fwd.sterling.org.db” File


In Figure 3.40, the command “nano fwd.sterling.org.db” is used to create the file and
add contents into the file using the text editor.

Figure 3.41 RedHat Site for Contents to Put in “fwd.sterling.org.db” File


Entered the RedHat Site to copy the contents that should inserted into the new file that
is created in Figure 3.40.

Figure 3.42 Pasting Contents and Modifying


Pasting the contents from the site in Figure 3.41 and modifying it.

Page | 40 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.43 New File Existent in Directory


In this image, it is visible that the new file created is existent in the “/var/named”
directory.

Figure 3.44 Enter the Text Editor of “rvs.30.168.192.db” File


Just like in Figure 3.40, the command “nano rvs.30.168.192.db” is used to create the
file and add contents into the file using the text editor.

Figure 3.45 RedHat Site for Contents to Put in “rvs.30.168.192.db” File


Entered the RedHat Site to copy the contents which is then copied into the
“rvs.30.168.192.db” file that is created and saved by doing “Ctrl + X”, then “Y”, and
“Enter”.

Page | 41 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.46 Launching Terminal in Ubuntu


In Figure 3.46, it is visible that the “rvs.30.168.192.db” file is existent in the
“/var/named” directory.

Figure 3.47 Restarting and Checking Status of “named” Service


The commands “systemctl restart named” and “systemctl status named” are used to
restart the service and to then check the service status to see if its active and working
right.

Figure 3.48 Firewall Configuration


In this image, the commands "firewall-cmd --permanent --add-port=53/udp" and
"firewall-cmd --permanent --add-port=53/tcp" are used to configure the firewall to
accept incoming traffic on port 53 using both UDP and TCP protocols.

Page | 42 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.49 Reload Firewall


This command is used to reload the firewall to ensure that the configurations are
saved and function well.

Figure 3.50 Modifying the “enp0s3” Configuration File


In Figure 3.50, the only thing that was modified is the “ipv4” setting by adding the
contents shown in the image above.

Figure 3.51 Modifying DNS Resolver Configuration File


Figure 3.51 depicts the "sterling.org" search domain with two DNS servers added
which are 192.168.30.4 and 8.8.8.8. This setup instructs the system to look for DNS
records in the "sterling.org" domain and resolve domain names through the provided
DNS servers.

Page | 43 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.52 Restarting “named” service


The command “sudo systemctl restart named” is used here to restart the “named”
service

Figure 3.53 Proof of Operational DNS


In this screenshot, the commands "nslookup pankajserver.sterling.org" and "nslookup
pankajclient.sterling.org" show that the DNS server is operational and can resolve
hostnames to IP addresses.

Figure 3.54 Successfully Ping to Server


The server is able to ping to itself with no packet loss in Figure 3.54.

Page | 44 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.55 Successfully Ping to Client


The server is able to ping to the Ubuntu Client with no packet loss in Figure 3.55.

Figure 3.56 Arrow Pointing to Wired Settings


To start with the DNS configuration on Ubuntu, the user would have to first head to
the Wired Settings option as shown in Figure 3.56.

Figure 3.57 Arrow Pointing to Settings Icon


Users will have to click on to the Settings icon.

Page | 45 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.58 Insert DNS Server Manually


Under DNS, insert the ip addresses that were added in the “resolv.conf” file from the
Rocky Server as shown in Figure 3.51.

Figure 3.59 Installing a Package in Ubuntu


Figure 3.59 shows the command “sudo apt install resolvconf” to install the
“resolvconf” package.

Figure 3.60 Updating the DNS Resolver


The command "sudo resolvconf -u" updates the DNS resolver configuration based on
the current network settings.

Figure 3.61 Launching Terminal in Ubuntu


The screenshot depicts the DNS resolver's configuration file. The file contains two
lines that define the DNS servers to be used which are 192.168.30.4 and 8.8.8.8.

Page | 46 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.62 Configure NetworkManager File


The file in the image is the NetworkManager's configuration file which is
"/etc/NetworkManager/conf.d/10-dns.conf". The only setting that was changed in this
file is under "main"; DNS was changed to "none"

Figure 3.63 Displaying Contents of “/etc/resolv.conf” File


“sudo cat /etc/resolv.conf” is used to display the contents that are in the
“/etc/resolv.conf” file and to ensure that the changes made were saved.

Page | 47 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 3.64 Proof of Operational DNS on Ubuntu


Just like in Figure 3.53, this image above shows that the DNS server is operational
and can resolve hostnames to IP addresses on the Ubuntu Client.

Figure 3.65 Pinging to Server


The client is able to ping to the server with no packet loss.

Figure 3.66 Pinging to Client


The client is able to ping to itself with no packet loss.

Page | 48 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

4.0 Install and configure a DHCP server using DHCP on the virtual
machine. Configure the DHCP server to assign IP addresses to clients
on the local network.

Figure 4.01 Display Network Interfaces Details


"ip addr" displays information about the system's network interfaces. The output
contains information on the "lo" and "enp0s3" network interfaces. The "lo" interface
is the loopback interface for local communication, whereas the "enp0s3" interface is a
physical Ethernet interface.

Figure 4.02 Display the Files in Specific Directory


The image depicts a tool that lists the contents of the "/etc/NetworkManager/system-
connections/" directory, which contains configuration files for NetworkManager.

Page | 49 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.03 Accessing the NetworkManager “enp0s3” Connection Configuration File

Figure 4.04 NetworkManager “enp0s3” Connection Configuration File Settings


Figure 4.03 shows the command to open the "/etc/NetworkManager/system-
connections/enp0s3.nmconnection" file in a text editor with administrative rights.
Figure 4.04 displays the network parameters from the NetworkManager "enp0s3"
connection configuration file.

Figure 4.05 Installation of “dhcp-server” Package


The command "sudo dnf install -y dchp-server" installs the "dhcp-server" package,
which includes a DHCP server that dynamically assigns IP addresses to network
devices.

Page | 50 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.06 Modifying the DHCP Configuration File using Text Editor
The image depicts a text editor window displaying the contents of the
“/etc/dhcp/dhcpd.conf” file, which serves as the DHCP server's configuration. The file
contains DHCP server parameters such as default and maximum lease times,
authoritative status, subnet to be serviced, IP address range to be assigned, router
address, subnet mask, and DNS servers to be used. These configurations instruct the
DHCP server to offer IP addresses and other network information to clients on the
specified network.

Figure 4.07 Enabling the “dhcpd” Service

Figure 4.08 Starting the “dhcpd” Service


“sudo systemctl enable --now dhcpd.service” and “sudo systemctl start dhcpd” is used
to start and enable the dhcpd service which is known to be the DHCP server.

Page | 51 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.09 Status of the “dhcpd” Service


The image above shows the status of the “dhcpd” service to check if the service is
working properly or if there are any errors.

Figure 4.10 DHCP Firewall Configuration


The first command in Figure 4.10 shows that the user is adding the DHCP service into
the firewall and the second command shows that the user is reloading the firewall to
ensure the changes are saved.

Figure 4.11 Network Manager Option in Virtual Box


Under the “File” option, select “Tools” to view the “Network Manager” option.

Page | 52 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.12 Disabling DHCP


The DHCP service for the configuration of the network interface
"TP070590_ClientServerNet" has been disabled.

Figure 4.13 Viewing Details of the “enp0s3” Network Interface


The “nmcli” command manages network connections. The output displays details
about the “enp0s3” network interface, such as its connection status, device name,
hardware address, and IPv4 settings.

Page | 53 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.14 Circle Showing Wired Setting Option


The “Wired Setting” is circled to indicate that the user will enter into the wired setting
to start the DHCP settings.

Figure 4.15 Arrow Pointing to Settings Icon in Rocky


Users will have to click on to the Settings icon.

Page | 54 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.16 The Identity Tab


The image above shows the Identity Tab where it shows the name of the interface.

Figure 4.17 Displaying All Files in the “/etc/NetworkManager/system-connections/”


Directory
The command “sudo ls -l /etc/NetworkManager/system-connections/” is used to
display all files in the “/etc/NetworkManager/system-connections/” directory.

Figure 4.18 Command to Edit the File Using Text Editor


Figure 4.18 shows the command that opens the “/etc/NetworkManager/system-
connections/enp0s3.nmconnection” file in a text editor with administrative access.

Figure 4.19 Restart and Check Status of NetworkManager


The command “sudo systemctl restart NetworkManager” is used to restart the
NetworkManager service and the “sudo systemctl status NetworkManager” command
is used to check to see if the service is operational.

Page | 55 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.20 Interface Successfully Connected to Wired Connection


The image above shows the interface linked to a wired network via an Intel 82540EM
Ethernet adapter, with an IPv4 address of 192.168.30.80/24. The DNS servers
assigned to the interface are 192.168.30.4 and 8.8.8.8.

Figure 4.21 Pinging to Server


Figure 4.21 shows that the client is able to ping to the server with 0% packet loss.

Page | 56 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 4.22 Testing Internet Connectivity


There are results as shown in Figure 4.22 shows that the connection is working as it
should.

Page | 57 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

5.0 Install and configure an email server using Postfix and Dovecot on
the virtual machine. Configure the email server to allow local users to
send and receive emails.

Figure 5.01 Installation of Both “postfix” and “dovecot” Packages


The command as shown in Figure 5.01 is used to install both the “postfix” and
“dovecot” packages in one.

Figure 5.02 Command to Edit the File Using Text Editor

Figure 5.03 Setting the Emails Hostname

Figure 5.04 Setting the Emails Domain

Figure 5.05 Setting the “myorigin” Parameters

Page | 58 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.06 Changing the “inet_interfaces” and “inet_protocols”

Figure 5.07 “mydestination” Parameters

Figure 5.08 “home_mailbox” Parameters

Figure 5.09 “mynetworks” Parameters

Figure 5.10 Additional Configuration

Figure 5.11 Extra SMTP Port Configuration


The command in Figure 5.02 opens the "/etc/postfix/main.cf" file in a text editor that
has administrative capabilities. The file is Postfix's main configuration file. In Figure
5.03, the hostname is utilized to identify the server on the network and to perform
other email-related tasks. The domain name identifies the email addresses linked with
the server in Figure 5.04. Figure 5.05 shows two lines in the configuration file that
define the "myorigin" parameter as "$myhostname" and "$mydomain". In the
following part in the file, as shown in Figure 5.06, change the “inet_interfaces” and
“inet_protocols” to all. In Figure 5.07, the line specifies the
"mydestination" parameter, which determines where the server sends emails
addressed to local recipients. The line defines the "home_mailbox" parameter, which
determines where the server will store incoming emails for local users, as seen in
Figure 5.08. Figure 5.09 shows that the setting specifies the "mynetworks" option,

Page | 59 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

which sets the IP address ranges that the server deems local. Figure 5.10 shows the
section of the file which provides settings relating to SMTP authentication and
permission. The "smtpd_sasl_type" and "smtpd_sasl_path" lines define the SASL
authentication method and path, respectively. The "smtpd_sasl_auth_enable" line
allows SASL authentication. The "smtpd_sasl_security_options" line indicates that
anonymous authentication is not permitted. The "smtpd_sasl_local_domain" line
configures the local domain for SASL authentication. The
"smtpd_recipient_restrictions" line specifies the constraints for receiving emails. The
"disable_verify_command" line disables the VERIFY command, which checks the
existence of email addresses. Finally in Figure 5.11, this parameter configures the
server to accept SMTP connections on a certain port, usually 587 for secure
connections. Once the file configuration is completed, press “Ctrl + X’, then “Y”, and
“Enter” to save the file modifications.

Figure 5.12 Restarting the Postfix Service

Figure 5.13 Enabling the Postfix Service


Figure 5.12 shows that the Postfix service is being restarted and enabled in Figure
5.13.

Figure 5.14 Command to Edit the “dovecot.conf” File Using Text Editor

Figure 5.15 Protocols Used


The command in Figure 5.14 opens the file in a text editor that has administrative
capabilities. Figure 5.15 shows the protocols that are the dovecot service accepts.

Page | 60 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.16 Command to Edit the “10-mail.conf” File Using Text Editor

Figure 5.17 Text Editor of the ““10-mail.conf” File


Figure 5.16 shows a command that gives administrative capabilities to modify the
“10-mail.conf” file and Figure 5.17 shows the contents of the “10-mail.conf" file.

Figure 5.18 Command to Edit the “10-auth.conf” File Using Text Editor

Figure 5.19 “disable_plaintext_auth” Parameter

Figure 5.20 “auth_mechanisms” Parameter


Figure 5.18 shows a command that gives administrative capabilities to modify the
“10-auth.conf” file. Figure 5.19 shows that the server will allow users to authenticate
without utilizing encryption. The line in Figure 5.20 indicates that the only acceptable
mechanism is "plain," which implies users will authenticate using their username and
password in plain text.

Page | 61 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.21 Command to Edit the “10-master.conf” File Using Text Editor

Figure 5.22 Contents of “10-master.conf” File


The command in Figure 5.21 opens the file in a text editor that has administrative
capabilities. Figure 5.22 shows that the user has set the parameters of “user” and
“group” to postfix.

Figure 5.23 Command to Edit the “10-ssl.conf” File Using Text Editor

Figure 5.24 Contents of “10-ssl.conf” File


Figure 5.23 shows a command that gives administrative capabilities to modify the
“10-ssl.conf” file. In Figure 5.24, the user has set the “ssl” parameter to yes.

Page | 62 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.25 Restarting and Enabling Dovecot Service


The commands shown in Figure 5.25 indicates that the Dovecot service has been
restarted and enabled.

Figure 5.26 Creating a New User


In the first command, "sudo useradd raheem", adds a new user named raheem. The
second command, "sudo passwd raheem", asks the user to create a new password for
the raheem account. After entering the password again for confirmation, the system
states that the password has been successfully updated.

Figure 5.27 Firewall Configuration


The screenshot above shows that the smtp, smtp-submission, pop3, imap, pop3s, and
imaps services has been added into the firewall. After the service has been added, the
user reloads the firewall.

Page | 63 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.28 Installation of Thunderbird


The command in Figure 5.28 is to install the Thunderbird email client into Ubuntu
Client.

Figure 5.29 Arrow Pointing to Thunderbird Mail


The red arrow shows the Thunderbird Mail application.

Page | 64 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 5.30 Login Details


In the image above shows the login credentials of the created user in Rocky Linux
earlier.

Figure 5.31 Successful Login


A green checkmark indicates that the application successfully located a service
configuration using common server names.

Page | 65 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

6.0 Install and configure a web server using Apache on the virtual
machine. Configure the web server to host a basic website that can be
accessed by clients on the local network.

Figure 6.01 Installation of “httpd” Package


This command installs the Apache HTTP server.

Figure 6.02 Command to Edit the “httpd.conf” File Using Text Editor

Figure 6.03 “ServerAdmin” and “ServerName” Parameters

Figure 6.04 “ErrorLog” Line

Figure 6.05 “LoadModule” Line

Page | 66 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 6.06 “Directory” Lines


In Figure 6.03, the "ServerName" is set to "pankaj.sterling.org:80", which means that
the server will listen for connections on port 80 and may be reached via the domain
name "pankaj.sterling.org". Figure 6.04 shows where the error messages will be
stored. The "LoadModule" line loads modules that provide functionality to the server
as shown in Figure 6.05. Finally, Figure 6.06 indicates that all requests to this
directory will be rejected, preventing unwanted access to the files and content
contained within it.

Figure 6.07 Change the Ownership and Permissions of the Directories


The first command, "sudo chown -R apache:apache /var/www/html", assigns
ownership of the “/var/www/html” directory and all of its directories to the apache
user and group. The second command, "sudo chmod -R 755 /var/www/html", changes
the permissions of the “/var/www/html” directory and all of its directories to 755.

Figure 6.08 HTML File Creation of Web Server


This command is to create a HTML file for the web server and once accessed, the
message “Welcome to pankaj.sterling.org” will be shown on the web page.

Figure 6.09 Restarting and Enabling the “httpd” service


Figure 6.09 shows that the “httpd" service is being restarted and enabled.

Page | 67 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 6.10 Firewall Configuration for Necessary Ports


The commands shown in the screenshot indicate that the 80/tcp and 443/tcp ports
were added to the firewall. Once added, the firewall is then restarted.

Figure 6.11 Web Page Accessible


Figure 6.11 shows that the site is Accessible in Mozilla FireFox Browser using
Ubuntu Client with the message displayed.

7.0 Implement SSL/TLS encryption for email and web services on the
virtual machine. Generate and install SSL certificates for the email
and web servers.

Figure 7.01 Installation of “mod-ssl” Package


The command used in the image above is to install the “mod-ssl” package.

Page | 68 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.02 Creation of Self-Signed SSL/TLS


The command in this image generates a server's self-signed SSL/TLS certificate and
private key.

Figure 7.03 Certificate Security Pass Phrase


In Figure 7.03, the image shows the password for an SSL/TLS certificate's private
key. To verify, the user must input the same passphrase twice. This is a security
mechanism to prevent unwanted access to the private key, which is required to
encrypt and decrypt data delivered over a secure connection.

Figure 7.04 Information for the Certificate


The user is prompted to enter information such as country, state, area, organization
name, organizational unit name, common name, and email address. This information
will be used to generate a certificate that identifies the server and creates trust among
clients that connect to it.

Figure 7.05 Command to Edit the “ssl.conf” File Using Text Editor

Figure 7.06 “DocumentRoot” and “ServerName” from the “ssl.conf” file

Page | 69 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.07 Pathway of Both Certificate and Certificate Key File


In the Figure 7.05, it shows the command to access the “/etc/httpd/conf.d/ssl.conf”
using the text editor. The "DocumentRoot" directive specifies the directory where the
virtual host will provide web content, in this screenshot "/var/www/html". The
"ServerName" directive specifies the server name and port number of the virtual host
"pankajserver.sterling.org:443" as shown in Figure 7.06. Finally, in Figure 7.07 The
"SSLCertificateFile" directive defines the path to the SSL certificate file,
"/etc/pki/tls/certs/server.crt". The "SSLCertificateKeyFile" directive defines the path
of the certificate's private key file, which is "/etc/pki/tls/private/server.key".

Figure 7.08 HTTPS Firewall Configuration


The command “sudo firewall-cmd --permanent --add-service=https” is used to add the
HTTPS service into the firewall.

Figure 7.09 Restart the HTTPD Service


In this image, the HTTPD service is restarted and the output as shown in the image
prompts the user to input their pass phrase set earlier.

Page | 70 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.10 Web Page Warning


The image shows a warning message where the user will click on the “Advanced”
button. Under the Advanced section, the error code shows that the web site is using a
self-signed certificate.

Figure 7.11 Successfully Applied Self-Signed Certificate


In Figure 7.11, it is visible that that the Self-Signed Certificate is working well by
looking at the web address and the lock icon.

Figure 7.12 Creation of Self-Signed SSL/TLS


Just like in Figure 7.02, The command in this image generates a server's self-signed
SSL/TLS certificate and private key.

Page | 71 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.13 Information for the Certificate


Similar to Figure 7.04, The user is prompted to enter information such as country,
state, area, organization name, organizational unit name, common name, and email
address. This information will be used to generate a certificate that identifies the
server and creates trust among clients that connect to it.

Figure 7.14 Command to Edit the Postfix Configuration File Using Text Editor

Figure 7.15 Pathway of TLS Certificates

Figure 7.16 Additional Settings in Configuration File


In Figure 7.15, the "smtpd_tls_cert_file" and "smtpd_tls_key_file" directives define
the paths to the SSL certificate and private key files, respectively. These files are
required for the server to support secure SMTP connections via SSL/TLS encryption.
Figure 7.16 the file contains settings related to SSL/TLS encryption for the SMTP
server.

Page | 72 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.17 Command to Edit the Postfix Master Configuration File Using Text
Editor

Figure 7.18 Web Page Accessible

Figure 7.19 Web Page Accessible


For Figure 7.18, the lines in the screenshot define the parameters for the submission
service, which accepts incoming emails from external clients. The "syslog_name"
option configures the name of the submission service's syslog record. The
"smtpd_sasl_auth_enable" option is set to yes, indicating that the submission service
uses SASL authentication. As for the Figure 7.19, The smtps line specifies the
submission service, which listens on the inet interface. The "syslog_name" parameter
specifies the name of the submission service's syslog entry. The
"smtpd_tls_wrappermode" option is set to yes, indicating that the submission service
uses SSL/TLS encryption. The "smtpd_sasl_auth_enable" option is set to yes,
indicating that the submission service uses SASL authentication.

Figure 7.20 Command to Edit the Dovecot Configuration File Using Text Editor

Figure 7.21 Protocols Being Used


The command in Figure 7.20 opens the file in a text editor that has administrative
capabilities. In Figure 7.21, it shows the protocols that are being used for the dovecot
service. In this line, the protocol “submission” has been removed.

Page | 73 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.22 Command to Edit the “10-ssl.conf” File Using Text Editor

Figure 7.23 Pathways of the SSL Certificate and Key


The command in Figure 7.22 opens the file in a text editor that has administrative
capabilities. In Figure 7.23, the lines "ssl_cert" and "ssl_key" specify the paths to the
SSL certificate and private key files, respectively.

Figure 7.24 Adding Services to the Firewall


“imaps”, “pop3s”, “smtps”, and “smtp-s” services are all being added into the
firewall. Once added the firewall is then reloaded as shown in Figure 7.24.

Figure 7.25 Arrow Pointing to Account Settings and Users Email


To begin with the applying the certificate into Thunderbird Mail, users will have to
click on the users email account, in this case “[email protected]”,
then click on “Account Settings” as shown in the image using the arrow.

Page | 74 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.26 Arrow Pointing to Server Settings


The users will then have to head to the “Server Settings” tab.

Figure 7.27 Editing SMTP Server


In this image, there are four arrows. The first arrow is for users to click on “Edit
SMTP Server” button. Then in the Editing SMTP Server tab, the user will select the
“STARTTLS” connection security, set the port to the default number which is 587,
and insert the User Name which is “raheem”.

Page | 75 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.28 Sending Mail to Client


Figure 7.28 shows that the user on Rocky sends a mail to the user “raheem”.

Figure 7.29 Receiving Mail on Thunderbird Mail


This image shows that the user has successfully received the mail sent by the user
from Rocky.

Page | 76 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 7.30 Client Sending Mail on Thunderbird Mail


The image shows the page to send the mail to the Rocky Server’s user.

Figure 7.31 Mail Being Sent


Figure 7.31 shows that the mail can be sent without any error message popping up.

Page | 77 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

8.0 Troubleshooting Errors Encountered

Error 1

Figure 8.01 Command to Install BIND


The image above shows the command to install the BIND package.

Figure 8.02 Error When Installing BIND


In the image, it shows that the error is caused due to the existence of the “bind-libs”
from the BIND package

Page | 78 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 8.03 Searching for “bind-libs”

Figure 8.05 Web Page Accessible

In Figure 8.03, the command “sudo dnf search bind-libs” to search for “bind-libs” in
the system. Once located, remove it using the “sudo dnf remove bind-libs” command
and reinstall BIND.

Page | 79 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Error 2

Figure 8.04 The “10-ssl.conf” File Contents


The image above shows the contents of the “10-ssl.conf” file using the text editor.

Page | 80 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 8.06 Web Page Accessible

Figure 8.07 Web Page Accessible

Figure 8.08 Web Page Accessible

Figure 8.09 Web Page Accessible


In the images above from Figure 8.06 to Figure 8.09, it shows that the Dovecot
service cannot be restarted as there is a “Fatal” error that says “Can’t open file
/etc/pki/dovecot/private/dovecot.key: No such file or directory.

Page | 81 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 8.10 Modifying the “10-ssl.conf” File


Under the “ssl_key”, replace the end of the file path from “.key” to “.pem”

Figure 8.11 Restarting and Enabling Dovecot Service

Figure 8.12 Inspecting Status of Dovecot Service


In Figure 8.11, it is visible that the user is able to restart and enable the Dovecot
service without any error. Figure 8.12 shows that the Dovecot service is active and
running as it should without any error.

Page | 82 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Error 3

Figure 8.13 Postfix Service Restart Failure


In Figure 8.13, it shows that the Postfix service is unable to restart.

Figure 8.14 Status of the Postfix Service

Figure 8.15 Fatal Errors Shown in Service Status


The command “sudo s ystemctl status postfix” is used to identify the error as shown in
Figure 8.14. In Figure 8.15, it is shown that there are multiple fatal errors.

Page | 83 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

Figure 8.16 Stop and Start the Postfix Service

Figure 8.17 Functional and Operational Service is Shown


To resolve the error, all the user has to do is stop the Postfix service and start it again
as shown in Figure 8.16. Once that’s completed, check the status by using the “sudo
systemctl status postfix” command to see if the error has been resolved. Finally, in
Figure 8.17 shows that the Postfix service is functioning well.

Page | 84 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

9.0 Conclusion
To summarize, the project successfully constructed a working network infrastructure that
included DNS, DHCP, email, and web servers, as well as SSL/TLS encryption. The
virtual network environment was created using virtual machines that ran Rocky Linux
and Ubuntu Linux. The system was created to satisfy the needs of a small firm by
offering critical network services for communication and data exchange. The integration
of these components produced a dependable and secure network infrastructure capable of
meeting a variety of organizational requirements.

Page | 85 Asia Pacific University


of Technology & Innovation
Individual Assignment System & Network Administration APD2F2406CS(CYB)

10.0 References
1. Buzdar, K. (2019, March 18). Karim Buzdar. VITUX.
https://vitux.com/how-to-install-and-setup-thunderbird-email-client-in-ubuntu/
2. Codex, A. C. (2024, February 18). Installing Apache web server on Rocky Linux 9.
Reintech media.
https://reintech.io/blog/installing-apache-web-server-on-rocky-linux-9
3. Codex, A. C. (2024, March 5). Setting up Postfix Mail Server on Rocky Linux 9.
Reintech media.
https://reintech.io/blog/setting-up-postfix-mail-server-rocky-linux-9
4. Domain name system (DNS). Internet Society. (n.d.).
https://www.internetsociety.org/issues/past-categories/domain-name-system-dns/
5. Gillis, A. S. (2023, January 4). What is DHCP (dynamic host configuration
protocol)?. Networking.
https://www.techtarget.com/searchnetworking/definition/DHCP
6. MozDevNet. (n.d.). What is a web server? - learn web development: MDN. MDN
Web Docs.
https://developer.mozilla.org/en-
US/docs/Learn/Common_questions/Web_mechanics/What_is_a_web_server
7. Sharma, H. (2024, July 12). What is an email server and how does it work.
Mailmodo.
https://www.mailmodo.com/guides/email-server/
8. What is SSL/TLS encryption?. F5, Inc. (n.d.).
https://www.f5.com/glossary/ssl-tls-encryption

Page | 86 Asia Pacific University


of Technology & Innovation

You might also like