SlideShare a Scribd company logo
1 of 9
Download to read offline
Ferry Astika Saputra
Isbat Udzin Nadhori
Iwan Syarif
M. Udin Harun al Rasyid
Administrasi Jaringan
(Network Administration)
Introduction
• Networks are no longer a luxury, but a
requirement to keep the organization running.
INTERNET
FIREWALL
E-MAIL
FILESERVER EIS
WWWDOMAIN
ROUTER
-GTW
Traffic Monitoring
CACTI
Http://noc.eepis-its.edu
EEPISHOTSPOT
PROXY
LECTURER
,EMPLOYEE
STUDENTS Internal Server
EEPIS-INFORMATION SYSTEM
(EIS http ://eis.eepis -its.edu)
Http://fileserver .eepis -its.edu
DMZ
E-Mail server
HTTPS , SPAM
(Spamassassin ), Virus
Scanner (ClamAV )
PROXY (Squid)
All access to Internet
must through Proxy
FIREWALL -IDS
Linux bridge , iptables
shorewall , snort ,
portsentry , acidlab
CISCO Router
Using acl , block malware
from outside
L3 Switch
Block malware on
physical port from inside
network
All Server in DMZ
Manage using SSH ,
Secure Webmin
SQL Database (MySQL )
Access only from
localhost (127.0.0.1)
EEPISHOTSPOT
Access from wifi , signal
only in EEPIS campus
Authentication from
Proxy
Managable Switchs
Block unwanted user from port ,
manage from WEB
Network Services
NOC
MULTILAYER
SWITCH
Who are Responsible
• Computer Technician
– Responsible for setting up and maintaining the users’ computers.
– Putting the computers together.
– Adding new hardware: RAM, CD-ROM drive, Monitor, etc.
– Installing software
– Setting up accounts, email, and access to servers
– Troubleshooting
• Network Technician
– Connecting the computers to the network.
– Setting up any wireless network access.
– Configure the routers and switches.
• Basic configurations
• Security
• Traffic flow
• System Administrator
– Maintaining the “file servers”, the computers that store the software and data used
by everyone.
– Setting up usernames and passwords for controlling access to the network.
– Setting up and maintaining the servers that control Email.
– Keep the computers secure from viruses and hackers.
Sys Admin Handle
User
Hardware Software
• How many users are there?
• The level of the user's expertise.
• What are the users trying to do?
• Are they responsible or irresponsible?
• Who do the users know?
• How many, how big and how complex?
• Is there a network?
• Are the computers heterogenous or homogenous?
Sys Admin Handle
What System Administrator Do ?
Conflict
• ensuring that the computing system runs correctly and as efficiently as
possible, and
• ensuring that all users can and do use the computing system to carry out
their required work in the easiest and most efficient manner
• Management will wish to restrict the amount of money spent on computer
systems.
• The users on the other hand will always want more disk space and faster
CPUs.
• The System Administrator must attempt to balance these two conflicting
aims
Network Administrator Activity
• Fault Management
• device management
• Configuration Management
• performance management
• history management
• Accounting
• security
• Management Scope
• Maintenance and upgrade
• Remote access
What Systems Administrators need to
know
• programming,
Systems Administrators have to be able to program. They might have to write
scripts that automate regular tasks to help users perform certain tasks.
• hardware maintenance and installation,
This may range from installing new hardware to cleaning old hardware so that it
continues to work.
• documentation and testing,
• Human Computer Interface,
• networks and computer communication,
• user education,
• diplomacy,
• legal issues and contracts,
• detective work,
• management and policy setting, and
• public relations.
Materi Administrasi Jaringan
1. Tugas dan Tanggung Jawab Sistem Administrator
2. Telnet dan SSH Server, Konsep dan Penerapan
3. Samba-FTP Server, Konsep dan Penerapan
4. DNS Server , Konsep dan Penerapan
5. Webserver, Konsep dan Penerapan
6. Mail Server, Konsep dan Penerapan
7. IMAP Server, Konsep dan Penerapan
8. Log Analysis, Konsep dan Penerapan
9. DHCP Server, Konsep dan Penerapan
10. Mailing List, Konsep dan Penerapan
11. Proxy Server, Konsep dan Penerapan
12. Traffic Shapping (Quality of Service), Konsep dan Penerapan
13. Network Monitoring, Konsep dan Penerapan
14. Dynamic DNS, Konsep dan Penerapan
15. Webmin, Konsep dan Penerapan
16. Virtualization , Konsep dan Penerapan

More Related Content

What's hot

Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removedNCC Group
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelinesgovsap_84
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)NCC Group
 
Hardware security
Hardware securityHardware security
Hardware securityRajKumar4943
 
MS08 067
MS08 067MS08 067
MS08 067Tim Krabec
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINALMartin Evans
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architecturesArun Mahajan
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016DefensiveDepth
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverGregory Hanis
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
Mayhem malware
Mayhem malwareMayhem malware
Mayhem malwareAkash Deep
 
Configuring Your Hardware Firewall
Configuring Your Hardware FirewallConfiguring Your Hardware Firewall
Configuring Your Hardware FirewallAventis Systems, Inc.
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityVinayak Wadhwa
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxmoy725
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - BriefAshley Deuble
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 

What's hot (20)

Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removed
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelines
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Hardware security
Hardware securityHardware security
Hardware security
 
MS08 067
MS08 067MS08 067
MS08 067
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Mayhem malware
Mayhem malwareMayhem malware
Mayhem malware
 
Configuring Your Hardware Firewall
Configuring Your Hardware FirewallConfiguring Your Hardware Firewall
Configuring Your Hardware Firewall
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 

Similar to Administrasi jaringan

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX SecurityHelpSystems
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
ANIL KUMAR-RESUME
ANIL KUMAR-RESUMEANIL KUMAR-RESUME
ANIL KUMAR-RESUMEANIL KUMAR
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
KINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKingsley King
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)Jean Jacques
 

Similar to Administrasi jaringan (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
ANIL KUMAR-RESUME
ANIL KUMAR-RESUMEANIL KUMAR-RESUME
ANIL KUMAR-RESUME
 
Operating system security
Operating system securityOperating system security
Operating system security
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
KINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_IT
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
 

More from seolangit2

Teori teknologi informasi
Teori teknologi informasiTeori teknologi informasi
Teori teknologi informasiseolangit2
 
Teknologi perangkat lunak
Teknologi perangkat lunakTeknologi perangkat lunak
Teknologi perangkat lunakseolangit2
 
Sejarah dan perkembangan komputer
Sejarah dan perkembangan komputerSejarah dan perkembangan komputer
Sejarah dan perkembangan komputerseolangit2
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiseolangit2
 
Pengamanan jaringan komputer
Pengamanan jaringan komputerPengamanan jaringan komputer
Pengamanan jaringan komputerseolangit2
 
Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1seolangit2
 
Komputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburanKomputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburanseolangit2
 
Keamanan jaringan komputer
Keamanan jaringan komputerKeamanan jaringan komputer
Keamanan jaringan komputerseolangit2
 
Software
SoftwareSoftware
Softwareseolangit2
 
Perkembangan teknologi informasi
Perkembangan teknologi informasiPerkembangan teknologi informasi
Perkembangan teknologi informasiseolangit2
 
Perkembangan dunia komputer
Perkembangan dunia komputerPerkembangan dunia komputer
Perkembangan dunia komputerseolangit2
 
Pengenalan hardware
Pengenalan hardwarePengenalan hardware
Pengenalan hardwareseolangit2
 
perangkat Hardware atau perangkat keras
perangkat  Hardware atau perangkat kerasperangkat  Hardware atau perangkat keras
perangkat Hardware atau perangkat kerasseolangit2
 
Pengenalan teknologi komputer
Pengenalan teknologi komputerPengenalan teknologi komputer
Pengenalan teknologi komputerseolangit2
 
JARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASARJARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASARseolangit2
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiseolangit2
 
Lan (local area network)
Lan (local area network)Lan (local area network)
Lan (local area network)seolangit2
 

More from seolangit2 (18)

Teori teknologi informasi
Teori teknologi informasiTeori teknologi informasi
Teori teknologi informasi
 
Teknologi perangkat lunak
Teknologi perangkat lunakTeknologi perangkat lunak
Teknologi perangkat lunak
 
Sejarah dan perkembangan komputer
Sejarah dan perkembangan komputerSejarah dan perkembangan komputer
Sejarah dan perkembangan komputer
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
 
Pengamanan jaringan komputer
Pengamanan jaringan komputerPengamanan jaringan komputer
Pengamanan jaringan komputer
 
Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1
 
Komputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburanKomputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburan
 
Keamanan jaringan komputer
Keamanan jaringan komputerKeamanan jaringan komputer
Keamanan jaringan komputer
 
Software
SoftwareSoftware
Software
 
Perkembangan teknologi informasi
Perkembangan teknologi informasiPerkembangan teknologi informasi
Perkembangan teknologi informasi
 
Perkembangan dunia komputer
Perkembangan dunia komputerPerkembangan dunia komputer
Perkembangan dunia komputer
 
Pengenalan hardware
Pengenalan hardwarePengenalan hardware
Pengenalan hardware
 
perangkat Hardware atau perangkat keras
perangkat  Hardware atau perangkat kerasperangkat  Hardware atau perangkat keras
perangkat Hardware atau perangkat keras
 
Pengenalan teknologi komputer
Pengenalan teknologi komputerPengenalan teknologi komputer
Pengenalan teknologi komputer
 
JARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASARJARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASAR
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
 
Linux
LinuxLinux
Linux
 
Lan (local area network)
Lan (local area network)Lan (local area network)
Lan (local area network)
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Administrasi jaringan

  • 1. Ferry Astika Saputra Isbat Udzin Nadhori Iwan Syarif M. Udin Harun al Rasyid Administrasi Jaringan (Network Administration)
  • 2. Introduction • Networks are no longer a luxury, but a requirement to keep the organization running.
  • 3. INTERNET FIREWALL E-MAIL FILESERVER EIS WWWDOMAIN ROUTER -GTW Traffic Monitoring CACTI Http://noc.eepis-its.edu EEPISHOTSPOT PROXY LECTURER ,EMPLOYEE STUDENTS Internal Server EEPIS-INFORMATION SYSTEM (EIS http ://eis.eepis -its.edu) Http://fileserver .eepis -its.edu DMZ E-Mail server HTTPS , SPAM (Spamassassin ), Virus Scanner (ClamAV ) PROXY (Squid) All access to Internet must through Proxy FIREWALL -IDS Linux bridge , iptables shorewall , snort , portsentry , acidlab CISCO Router Using acl , block malware from outside L3 Switch Block malware on physical port from inside network All Server in DMZ Manage using SSH , Secure Webmin SQL Database (MySQL ) Access only from localhost (127.0.0.1) EEPISHOTSPOT Access from wifi , signal only in EEPIS campus Authentication from Proxy Managable Switchs Block unwanted user from port , manage from WEB Network Services NOC MULTILAYER SWITCH
  • 4. Who are Responsible • Computer Technician – Responsible for setting up and maintaining the users’ computers. – Putting the computers together. – Adding new hardware: RAM, CD-ROM drive, Monitor, etc. – Installing software – Setting up accounts, email, and access to servers – Troubleshooting • Network Technician – Connecting the computers to the network. – Setting up any wireless network access. – Configure the routers and switches. • Basic configurations • Security • Traffic flow • System Administrator – Maintaining the “file servers”, the computers that store the software and data used by everyone. – Setting up usernames and passwords for controlling access to the network. – Setting up and maintaining the servers that control Email. – Keep the computers secure from viruses and hackers.
  • 5. Sys Admin Handle User Hardware Software • How many users are there? • The level of the user's expertise. • What are the users trying to do? • Are they responsible or irresponsible? • Who do the users know? • How many, how big and how complex? • Is there a network? • Are the computers heterogenous or homogenous?
  • 6. Sys Admin Handle What System Administrator Do ? Conflict • ensuring that the computing system runs correctly and as efficiently as possible, and • ensuring that all users can and do use the computing system to carry out their required work in the easiest and most efficient manner • Management will wish to restrict the amount of money spent on computer systems. • The users on the other hand will always want more disk space and faster CPUs. • The System Administrator must attempt to balance these two conflicting aims
  • 7. Network Administrator Activity • Fault Management • device management • Configuration Management • performance management • history management • Accounting • security • Management Scope • Maintenance and upgrade • Remote access
  • 8. What Systems Administrators need to know • programming, Systems Administrators have to be able to program. They might have to write scripts that automate regular tasks to help users perform certain tasks. • hardware maintenance and installation, This may range from installing new hardware to cleaning old hardware so that it continues to work. • documentation and testing, • Human Computer Interface, • networks and computer communication, • user education, • diplomacy, • legal issues and contracts, • detective work, • management and policy setting, and • public relations.
  • 9. Materi Administrasi Jaringan 1. Tugas dan Tanggung Jawab Sistem Administrator 2. Telnet dan SSH Server, Konsep dan Penerapan 3. Samba-FTP Server, Konsep dan Penerapan 4. DNS Server , Konsep dan Penerapan 5. Webserver, Konsep dan Penerapan 6. Mail Server, Konsep dan Penerapan 7. IMAP Server, Konsep dan Penerapan 8. Log Analysis, Konsep dan Penerapan 9. DHCP Server, Konsep dan Penerapan 10. Mailing List, Konsep dan Penerapan 11. Proxy Server, Konsep dan Penerapan 12. Traffic Shapping (Quality of Service), Konsep dan Penerapan 13. Network Monitoring, Konsep dan Penerapan 14. Dynamic DNS, Konsep dan Penerapan 15. Webmin, Konsep dan Penerapan 16. Virtualization , Konsep dan Penerapan