0% found this document useful (0 votes)
23 views60 pages

Chap1 - Introduction To Network Administration

The document outlines the objectives and structure of a course on Network Administration and Security, focusing on Linux OS. It covers key topics such as network management, user management from a security perspective, and the configuration of various network services. The course includes chapters on the roles of network administrators, Linux and TCP/IP concepts, and the use of network clients.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views60 pages

Chap1 - Introduction To Network Administration

The document outlines the objectives and structure of a course on Network Administration and Security, focusing on Linux OS. It covers key topics such as network management, user management from a security perspective, and the configuration of various network services. The course includes chapters on the roles of network administrators, Linux and TCP/IP concepts, and the use of network clients.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Network Administration and Security

Miguel Landry FOKO SINDJOUNG, PhD


Senior Lecturer
Department of Computer Engineering
Fotso Victor University Institute of Technology
University of Dschang
Cameroon
Objectives

• Understand the basics of Network administration with Linux


OS
• Being able to understand the management of the Linux file
system and Kernel for network management activities
• Configure network services like DHCP, DNS, Samba, etc.
• Understand the network management and security
• Know how user management can be done in a security
perspective
• Find account policies and specially password policy
• Find various user permissions and restrictions.
By Miguel Landry FOKO SINDJOUNG, PhD 2
Outlines

• Chapter 1: Introduction to Network Administration (8h)

• Chapter 2: Network Administration activities (8h)

• Chapter 3: Network configuration and setting (7h)

• Chapter 4: Network management and security (7h)


By Miguel Landry FOKO SINDJOUNG, PhD 3
Chap 1 Objectives

• Know the roles and responsibilities of a network


administrator
• Know about network client and its purpose
• Understand Linux system initialization
• Understand remote system administration and
available tools
By Miguel Landry FOKO SINDJOUNG, PhD 4
Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 5


Chap1: Introduction to Network Administration
1- Introduction

- Computer network is a
telecommunications network
that connects a collection of
computers to allow
communication and data
exchange between systems,
software applications, and users.
- The computers that are involved
in the network that originate,
route and terminate the data are
called nodes

By Miguel Landry FOKO SINDJOUNG, PhD 6


Chap1: Introduction to Network Administration
1- Introduction

- The interconnection of
computers is accomplished
with a combination of cable or
wireless media and
networking hardware
- Two devices are said to be
networked when a process in
one device is able to exchange
information with a process in
another device

By Miguel Landry FOKO SINDJOUNG, PhD 7


Chap1: Introduction to Network Administration
1- Introduction

- Networks may be classified


by various characteristics:
- The media used to transmit
signals
- The communications protocols
used to organize network traffic
- The network scale
- The network topology and
organizational scope
- The best-known computer network
is the Internet

By Miguel Landry FOKO SINDJOUNG, PhD 8


Chap1: Introduction to Network Administration
1- Introduction

- Networks may be classified


by various characteristics:
- The media used to transmit
signals
- The communications protocols
used to organize network traffic
- The network scale
- The network topology and
organizational scope
- The best-known computer network
is the Internet

By Miguel Landry FOKO SINDJOUNG, PhD 9


Chap1: Introduction to Network Administration
1- Introduction

- Networks may be classified


by various characteristics:
- the media used to transmit
signals
- The communications protocols
used to organize network traffic
- The network scale
- The network topology and
organizational scope
- The best-known computer network
is the Internet

By Miguel Landry FOKO SINDJOUNG, PhD 10


Chap1: Introduction to Network Administration
1- Introduction

- Networks may be classified


by various characteristics:
- the media used to transmit
signals
- The communications protocols
used to organize network traffic
- The network scale
- The network topology and
organizational scope
- The best-known computer network
is the Internet

By Miguel Landry FOKO SINDJOUNG, PhD 11


Chap1: Introduction to Network Administration
1- Introduction

- Homework
- Make a comparative study between the different network
types (The study concerns categories in the same
characteristics. E.g: between Mesh, star, bus, …
topologies)

By Miguel Landry FOKO SINDJOUNG, PhD 12


Chap1: Introduction to Network Administration
1- Introduction

- Communication protocols define the rules and data formats for


exchanging information in a computer network
- Well-known communications protocols include
- Ethernet: a hardware and link layer standard that is widely used for
local area networks
- The Internet protocol suite (TCP/IP): defines a set of protocols for
communication between multiple networks, for host-to-host data
transfer, and for application-specific data transmission formats

- Protocols provide the basis for network programming.

By Miguel Landry FOKO SINDJOUNG, PhD 13


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 14


Chap1: Introduction to Network Administration
2- Roles and responsibilities of network administrator

- A Network Administrator is an
individual, who is responsible for:
- Configuring
- Commissioning
- And maintenance of network
infrastructure and services.

- It also includes the computer


hardware and software systems that
make up a data network

By Miguel Landry FOKO SINDJOUNG, PhD 15


Chap1: Introduction to Network Administration
2- Roles and responsibilities of network administrator

- In an organization, Network
Administrator generally don’t
typically get involved directly with
users, instead focus upon
configuring, monitoring and
maintenance of network
components within organization’s
LAN/WAN infrastructure
- Depending on the organization and
its size, the Network Administrator
may also involve in design and
deployment of computer networks

By Miguel Landry FOKO SINDJOUNG, PhD 16


Chap1: Introduction to Network Administration
2- Roles and responsibilities of network administrator

- The roles of a Network Administrator include


activities and tasks to be performed
such as configuring, commissioning and
maintenance of various
- Network devices routers,
- Switches,
- VPN gateways,
- Security devices-Firewall and IDS/IPS ,
- Creation of De Militarized Zones (DMZ) ,
- IP addresses allocation & management.
- It also includes configuring and commissioning of
various network services/protocols:
- DHCP, DNS, FTP, HTTP, NFS, etc.

By Miguel Landry FOKO SINDJOUNG, PhD 17


Chap1: Introduction to Network Administration
2- Roles and responsibilities of network administrator

- Apart from roles, the Network Administrator is also responsible to:


➢ Ensure data network connectivity

➢ Network monitoring and management


➢ Testing the network for breaches, if any
➢ Keeping an eye out for needed updates

➢ Update Access Control Lists (ACLs) time to time to regulate network traffic
➢ Security controls enforcement
➢ Preparing and implementation of security policy and standards

By Miguel Landry FOKO SINDJOUNG, PhD 18


Chap1: Introduction to Network Administration
2- Roles and responsibilities of network administrator

- Homework
- For each of the following elements, find the roles, the strength
and the weakness within a deployed computer network:
- Network devices routers,
- Switches,
- VPN gateways,
- Security devices-Firewall and IDS/IPS ,
- Creation of De Militarized Zones (DMZ) ,
- IP addresses allocation & management.

By Miguel Landry FOKO SINDJOUNG, PhD 19


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 20


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Linux is a Unix-like computer operating system assembled under the model of free and
open source software development and distribution (See the fsf rules)
- Linux was originally developed as a free operating system for Intel x86-based personal
computers

- It is a leading operating system and supports different computer hardware platforms like
other operating systems
- Linux also runs on embedded systems (a devices where the operating system is typically
built into the firmware and highly tailored to the system) such as mobile phones, tablet
computers, network routers, building automation controls, televisions, video game
consoles and
- The Android system, which is in wide use on mobile devices is built on the Linux kernel.

By Miguel Landry FOKO SINDJOUNG, PhD 21


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Typically, Linux is packaged in a


format known as a Linux distribution
for desktop and server use.
- Some popular mainstream Linux
distributions include
- Debian (and its derivatives such
as Ubuntu and Linux Mint),
- Red Hat Enterprise Linux (and its
derivatives such as Fedora)
- and openSUSE (and its
commercial derivative SUSE
Linux Enterprise Server).

By Miguel Landry FOKO SINDJOUNG, PhD 22


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Linux is the most popular network operating system (NOS) runs on a


server and enables the server to manage
- data, users, groups, security, applications, and other networking
functions.
- It runs based on a client/server architecture in which a server enables
multiple clients to share resources.
- Linux allows shared file and printer access among multiple computers in
a network, typically a local area network (LAN), a private network or to
other networks.
- Linux well supports to configure and commissioning of various network
servers and services such as proxy servers, Domain name systems, Mail
servers, Web servers, etc that are to be accessed through internet

By Miguel Landry FOKO SINDJOUNG, PhD 23


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Linux is the most popular network operating system (NOS) runs on a


server and enables the server to manage
- data, users, groups, security, applications, and other networking
functions.
- It runs based on a client/server architecture in which a server enables
multiple clients to share resources.
- Linux allows shared file and printer access among multiple computers in
a network, typically a local area network (LAN), a private network or to
other networks.
- Linux well supports to configure and commissioning of various network
servers and services such as proxy servers, Domain name systems, Mail
servers, Web servers, etc that are to be accessed through internet

By Miguel Landry FOKO SINDJOUNG, PhD 24


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Internetworking is the practice of connecting a computer network with other networks


through the use of network gateways that provide a common method of routing data
packets between the networks.
- The most notable example of internetworking is the Internet, which is a network of
networks based on many underlying hardware technologies, but unified by an
internetworking protocol standard, referred to as the Internet Protocol Suite and known as
TCP/IP

- TCP/IP ( Transmission Control Protocol (TCP) and the Internet Protocol (IP)) is a
networking model and provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed and received at the destination.

By Miguel Landry FOKO SINDJOUNG, PhD 25


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

By Miguel Landry FOKO SINDJOUNG, PhD 26


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- TCP/IP for IP version 4 (IPv4) is a networking protocol suite that uses to


communicate over the internet with other computers.
- It interacts with naming services like Domain Name System (DNS) and security
technologies, such as IPsec for secure transfer of IP packets between computers.

- Linux provides extensive support for the TCP/IP suite, as both a protocol and a set of
services for connectivity and management of IP internetworks.
- Knowledge of the basic concepts of TCP/IP is an absolute requirement for the proper
understanding of the configuration, deployment, and troubleshooting of IP-based
Linux server
-

By Miguel Landry FOKO SINDJOUNG, PhD 27


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

By Miguel Landry FOKO SINDJOUNG, PhD 28


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- The Network Interface layer also called the Network Access layer that handles placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network
medium
- The Internet layer handles addressing, packaging, and routing functions. The core
protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
- The Transport layer handles and provides session and datagram communication services
to Application layer (TCP and UDP)
- The application layer provides services for an application program to ensure that
effective communication with another application program in a network is possible
(HTTP, FTP, SMTP, Telnet, DNS, RIP, SNMP, etc.)
- The TCP/IP Application layer encompasses the responsibilities of the Session,
Presentation, and Application layers of OSI model.

By Miguel Landry FOKO SINDJOUNG, PhD 29


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

By Miguel Landry FOKO SINDJOUNG, PhD 30


Chap1: Introduction to Network Administration
3- Linux and TCP/IP Internetworking concepts

- Homework
- For each of the following protocols, present the working
principles and the data structure (Where it is available) for
an item sent by the protocol:
- IP, ARP, ICMP, and IGMP
- TCP and UDP
- HTTP, FTP, SMTP, Telnet, DNS, RIP, SNMP

By Miguel Landry FOKO SINDJOUNG, PhD 31


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 32


Chap1: Introduction to Network Administration
4- Using Network Clients
- A client is a piece of computer hardware or software or both or a computer program that sends a
service request to a server/computer program or accesses a service made available by a
server/computer program.
- A network client is a client that can interact with servers/computer program through
network/internet.
- The term client was first applied to devices that were not capable of running their own stand-
alone programs but could interact with remote computers via a network.
- For example:
- web browsers are clients that connect to web servers and retrieve web pages for display.
- Email clients retrieve email from mail servers.
- Online chat uses a variety of clients, which vary depending on the chat protocol being
used.
- Multiplayer video games or online video games may run as a client on each computer.
- The term "client" may also be applied to computers or devices that run the client software or
users that use the client software.
By Miguel Landry FOKO SINDJOUNG, PhD 33
Chap1: Introduction to Network Administration
4- Using Network Clients

By Miguel Landry FOKO SINDJOUNG, PhD 34


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 35


Chap1: Introduction to Network Administration
5- Understanding system initialization
- The system here means the combination of the computer hardware and the software (the
operating system installed on the computer hardware).
- Linux system initialization means how system gets started after power is on.
- The Linux startup process is the process of Linux-operating system initialization.
- In Linux, the flow of control during a boot is from BIOS (Basic Input/output System), to
boot loader, to kernel.
- The kernel then starts the scheduler and runs the first program Init (which is mostly
responsible to run startup scripts for each runlevel), at which point the kernel goes idle
unless called externally
- init (short for initialization) is a program for Unix-based computer operating systems
that spawns all other processes.
- It runs as a daemon and typically has PID 1.
- The boot loader starts the kernel and the kernel starts init. If some one has to delete
init without a replacement, the system would encounter a kernel panic on the next
reboot.
By Miguel Landry FOKO SINDJOUNG, PhD 36
Chap1: Introduction to Network Administration
5- Understanding system initialization
- Overall system initialization process

- The BIOS performs hardware-platform specific startup tasks


- Once the hardware is recognized and started correctly, the BIOS loads and executes
the partition boot code from the designated boot device
- The boot loader often presents the user with a menu of possible boot options. It then
loads the operating system, which decompresses into memory, and sets up system
functions such as essential hardware and memory paging, before calling
‘start_kernel()’
- start_kernel() then performs the majority of system setup (interrupts, the rest of
memory management, device initialization, drivers, etc.) before spawning
separately, the idle process and scheduler, and the Init process (which is executed
in user space).
- The Init process executes scripts as needed that set up all non-operating system
services and structures in order to allow a user environment to be created, and then
presents the user with a login screen
By Miguel Landry FOKO SINDJOUNG, PhD 37
Chap1: Introduction to Network Administration
5- Understanding system initialization

By Miguel Landry FOKO SINDJOUNG, PhD 38


Chap1: Introduction to Network Administration
5- Understanding system initialization
A- System Startup

- The BIOS (Basic Input/Output System) is the interface between


the hardware and software at a very basic level, it provides all
the basic instructions used by the operating system.
- The BIOS begins by executing an auto-ignition test (POST), and
then it searches for devices
- After the POST, a boot device is selected from a list that is
configurable in the BIOS.
- The BIOS reads and executes the first physical sector of the
boot media selected on the system, which is usually contained in
the first 512 bytes of hard disk

By Miguel Landry FOKO SINDJOUNG, PhD 39


Chap1: Introduction to Network Administration
5- Understanding system initialization
B- Stage 1: Bootloader
- The bootloader is usually contained in the first sector of the disk
and then read and executed by the BIOS
- The storage space that reads the BIOS is not sufficient to
contain all the bootloader, but just a part sufficient enough to
start the rest of the bootloader, which is usually contained in a
configuration file stored elsewhere on the disc. Hence the start is
done in two steps:
- Launch via BIOS
- Launch a file under boot

- The bootloader is designed to load and run the system kernel.


- The standard bootloader is GRUB but can also shift to LILO.
By Miguel Landry FOKO SINDJOUNG, PhD 40
Chap1: Introduction to Network Administration
5- Understanding system initialization
C- Stage 2: Kernel Initialization
- The kernel in Linux handles all operating system processes, such as memory
management, task scheduling, I/O, interprocess communication, and overall
system control.
- This is loaded in two stages - in the first stage the kernel is loaded into memory
and decompressed, and a few fundamental functions such as basic memory
management are set up.
- Control is then switched to the main kernel start process.
- Once the kernel is fully operational, it looks for an init process to run, which sets
up a user space and the processes needed for a user environment and ultimate
login.
- The kernel itself is then allowed to go idle, subject to calls from other processes
- The kernel initialization is very rapid and therefore it is very difficult to follow
visually

By Miguel Landry FOKO SINDJOUNG, PhD 41


Chap1: Introduction to Network Administration
5- Understanding system initialization
D- Initialize init
- Init (initialization) is the father of all processes. Its primary role
is to create processes from a script stored in the file /etc/inittab.
- This file usually has entries which cause init to spawn gettys on
each line that users can log in.
- It also controls autonomous processes required by any particular
system.
- "init" is the main process, it will always have a PID value:
1.
- "init" reads its configuration from the /etc/inittab file, that
contains the settings for the system at every level of
execution.
By Miguel Landry FOKO SINDJOUNG, PhD 42
Chap1: Introduction to Network Administration
5- Understanding system initialization
- Run Levels
- A run level is a software configuration of the system which allows only a
selected group of processes to exist.
- The processes spawned by init for each of these run levels are defined in the
/etc/inittab file
- Level 0: Stop (not to be attributed to the initdefault)
- Level 1, S: single user mode (only the root user can log). Typically used for
maintenance.
- Level 2: Multi-user mode without NFS network
- Level 3: full mode for multiple users including network
- Level 4: User Configurable duplicate but the level 3 by default.
- Level 5: X11 (including network)
- Level 6: Restart
By Miguel Landry FOKO SINDJOUNG, PhD 43
Chap1: Introduction to Network Administration
5- Understanding system initialization
- Runlevel (System V)
- The ability to change runlevel offers easy interaction with administrators; this
allows to switch between different levels of startup.

- Scripts services are in /etc/rc.d/init.d.


- Each runlevel correspond to a /etc/rc.d/rcX.d directory, where X is the runlevel.

- System Shutdown
- On shutdown, Init is called to close down all user space functionality in a
controlled manner, again via scripted directions, following which Init terminates
and the Kernel executes its own shutdown

By Miguel Landry FOKO SINDJOUNG, PhD 44


Chap1: Introduction to Network Administration
5- Understanding system initialization

- Homework
- Give 4 different commands lines that can be used to stop a
Linux operating system

By Miguel Landry FOKO SINDJOUNG, PhD 45


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 46


Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Remote administration is an approach being followed
to control either a computer system or a network or an
application or all three from a remote location.
- A remote location may refer to a computer in the next
room or one on the other side of the world.
- Generally, remote administration is essentially adopted
when it is difficult or impractical to a person to be
physically present and do administration on a system’s
terminal.

By Miguel Landry FOKO SINDJOUNG, PhD 47


Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Requirements to perform Remote Administration

- Network connectivity is essentially needed to perform


remote administration: The network could be either Local
Area Network (LAN) connectivity or internet connectivity
depending on remote location.
- For non-malicious administration, the user must install or
enable remote administration software/tool on the host
system then the user/client can access the host system from
another computer using the remote tool.

By Miguel Landry FOKO SINDJOUNG, PhD 48


Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Common Services for which remote administration is used
- user management,
- file system management,
- software installation/configuration,
- network management- Network Security/Firewalls,
- VPN,
- Infrastructure Design,
- Network File Servers,
- Automounting etc.
By Miguel Landry FOKO SINDJOUNG, PhD 49
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Some of the tasks/ services for which remote administration need to be done (1/2)

- General
- Controlling one's own computer from a remote location

- ICT Infrastructure Management


- Remote administration essentially needed to administer the ICT
infrastructure such as the servers, the routing and switching components, the
security devices and other such related.

- Shutdown

- Shutting down or rebooting a computer over a network

- Accessing Peripherals
- Using a network device, like printer
- Retrieving streaming data, much like a CCTV system
By Miguel Landry FOKO SINDJOUNG, PhD 50
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Some of the tasks/ services for which remote administration need to be done (2/2)

- Modifying
- Editing another computer's registry settings
- Modifying system services
- Installing software on another machine
- Modifying logical groups

- Viewing
- Remotely assisting others
- Supervising computer or internet usage
- Access to a remote system's "Computer Management" snap-in

- Hacking
- Computers infected with malware such as Trojans sometimes open back doors into
computer systems which allow malicious users to hack into and control the computer.
- Such users may then add, delete, modify or execute files on the computer to their own ends

By Miguel Landry FOKO SINDJOUNG, PhD 51


Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Remote Desktop Solutions for Linux

- Most people who are used to a Unix-style environment know


that a machine can be reached over the network at the shell
level using utilities like telnet or ssh.
- And some people realize that X Windows output can be
redirected back to the client workstation.
- But many people don’t realize that it is easy to use an entire
desktop over the network.

By Miguel Landry FOKO SINDJOUNG, PhD 52


Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Remote Desktop Solutions for Linux

- The following are some of proprietary and open source applications that can be
used to achieve remote Desktop administration :

- SSH
- OpenSSH
- Telnet
- rlogin
- Rsh
- PuTTY
- VNC
- FreeNX
By Miguel Landry FOKO SINDJOUNG, PhD 53
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Wireless Remote Administration
- Remote administration software has recently started to appear on wireless devices
such as the BlackBerry, Pocket PC, and Palm devices, as well as some mobile
phones.

- Generally these solutions do not provide the full remote access seen on software
such as VNC or Terminal Services, but do allow administrators to perform a
variety of tasks, such as:
- rebooting computers,

- resetting passwords,

- and viewing system event logs,

- Thus reducing or even eliminating the need for system administrators to carry a
laptop or be within reach of the office.
- AetherPal and Netop are some of the tools used for full wireless remote access
and administration on Smartphone devices.
By Miguel Landry FOKO SINDJOUNG, PhD 54
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Disadvantages of Remote Administration
- Remote administration has many disadvantages too apart
from its advantages.
- The first and foremost disadvantage is the security.
- Generally, certain ports to be open at Server level to do remote
administration.
- Due to open ports, the hackers/attackers takes advantage to compromise the
system.
- It is advised that remote administration to be used only in emergency or
essential situations only to do administration remotely.

- In normal situations, it is ideal to block the ports to avoid


remote administration.
By Miguel Landry FOKO SINDJOUNG, PhD 55
Chap1: Introduction to Network Administration
6- User remote administration services and tools

- Homework
- Prepare a presentation of no more than 14 slides
(including the welcome page and references) for
each of the following tools: SSH, OpenSSH. Telnet, rlogin, Rsh,
PuTTY, VNC, FreeNX

By Miguel Landry FOKO SINDJOUNG, PhD 56


Chap 1 Outlines

- Introduction

- Roles and Responsibilities of Network Administrator

- Linux and TCP/IP Internetworking Concepts

- Using Network Clients

- Understanding System Initialization

- User Remote Administration Services and Tools

- Summary

By Miguel Landry FOKO SINDJOUNG, PhD 57


Chap1: Introduction to Network Administration
7- Summary

- In this chapter, different roles and responsibilities of a network administrator are clearly
explained
- The TCP/IP and its role in data transmission from source to destination is
made clear.

- System initialization process and importance of remote administration also covered

By Miguel Landry FOKO SINDJOUNG, PhD 58


Chap1: Introduction to Network Administration
8- Practical

- Install three Linux distribution in your computer (Preferably a


DEBIAN Version) using VirtualBox. They should be named either
Raynor, Dugalle and Kerrigan or Duke, Horner and Stukov
- Also make sure you install the Cisco Paquet Tracer in your
environment

By Miguel Landry FOKO SINDJOUNG, PhD 59


Bibliography

1. Computer Networks by Andrew S Tanenbaum , Fifth Edition


2. SA2, Redhat System Administration I & II, Student Workbook
3. Cisco Certified Network Associate Study Guide, Seventh Edition by
Todd Lammle
4. Redhat Enterprise Linux System Administration
5. http://en.wikipedia.org/wiki/Internetworking
6. http://en.wikipedia.org/wiki/Remote_administration

By Miguel Landry FOKO SINDJOUNG, PhD 60

You might also like