SlideShare a Scribd company logo
Ferry Astika Saputra
Isbat Udzin Nadhori
Iwan Syarif
M. Udin Harun al Rasyid
Administrasi Jaringan
(Network Administration)
Introduction
• Networks are no longer a luxury, but a
requirement to keep the organization running.
INTERNET
FIREWALL
E-MAIL
FILESERVER EIS
WWWDOMAIN
ROUTER
-GTW
Traffic Monitoring
CACTI
Http://noc.eepis-its.edu
EEPISHOTSPOT
PROXY
LECTURER
,EMPLOYEE
STUDENTS Internal Server
EEPIS-INFORMATION SYSTEM
(EIS http ://eis.eepis -its.edu)
Http://fileserver .eepis -its.edu
DMZ
E-Mail server
HTTPS , SPAM
(Spamassassin ), Virus
Scanner (ClamAV )
PROXY (Squid)
All access to Internet
must through Proxy
FIREWALL -IDS
Linux bridge , iptables
shorewall , snort ,
portsentry , acidlab
CISCO Router
Using acl , block malware
from outside
L3 Switch
Block malware on
physical port from inside
network
All Server in DMZ
Manage using SSH ,
Secure Webmin
SQL Database (MySQL )
Access only from
localhost (127.0.0.1)
EEPISHOTSPOT
Access from wifi , signal
only in EEPIS campus
Authentication from
Proxy
Managable Switchs
Block unwanted user from port ,
manage from WEB
Network Services
NOC
MULTILAYER
SWITCH
Who are Responsible
• Computer Technician
– Responsible for setting up and maintaining the users’ computers.
– Putting the computers together.
– Adding new hardware: RAM, CD-ROM drive, Monitor, etc.
– Installing software
– Setting up accounts, email, and access to servers
– Troubleshooting
• Network Technician
– Connecting the computers to the network.
– Setting up any wireless network access.
– Configure the routers and switches.
• Basic configurations
• Security
• Traffic flow
• System Administrator
– Maintaining the “file servers”, the computers that store the software and data used
by everyone.
– Setting up usernames and passwords for controlling access to the network.
– Setting up and maintaining the servers that control Email.
– Keep the computers secure from viruses and hackers.
Sys Admin Handle
User
Hardware Software
• How many users are there?
• The level of the user's expertise.
• What are the users trying to do?
• Are they responsible or irresponsible?
• Who do the users know?
• How many, how big and how complex?
• Is there a network?
• Are the computers heterogenous or homogenous?
Sys Admin Handle
What System Administrator Do ?
Conflict
• ensuring that the computing system runs correctly and as efficiently as
possible, and
• ensuring that all users can and do use the computing system to carry out
their required work in the easiest and most efficient manner
• Management will wish to restrict the amount of money spent on computer
systems.
• The users on the other hand will always want more disk space and faster
CPUs.
• The System Administrator must attempt to balance these two conflicting
aims
Network Administrator Activity
• Fault Management
• device management
• Configuration Management
• performance management
• history management
• Accounting
• security
• Management Scope
• Maintenance and upgrade
• Remote access
What Systems Administrators need to
know
• programming,
Systems Administrators have to be able to program. They might have to write
scripts that automate regular tasks to help users perform certain tasks.
• hardware maintenance and installation,
This may range from installing new hardware to cleaning old hardware so that it
continues to work.
• documentation and testing,
• Human Computer Interface,
• networks and computer communication,
• user education,
• diplomacy,
• legal issues and contracts,
• detective work,
• management and policy setting, and
• public relations.
Materi Administrasi Jaringan
1. Tugas dan Tanggung Jawab Sistem Administrator
2. Telnet dan SSH Server, Konsep dan Penerapan
3. Samba-FTP Server, Konsep dan Penerapan
4. DNS Server , Konsep dan Penerapan
5. Webserver, Konsep dan Penerapan
6. Mail Server, Konsep dan Penerapan
7. IMAP Server, Konsep dan Penerapan
8. Log Analysis, Konsep dan Penerapan
9. DHCP Server, Konsep dan Penerapan
10. Mailing List, Konsep dan Penerapan
11. Proxy Server, Konsep dan Penerapan
12. Traffic Shapping (Quality of Service), Konsep dan Penerapan
13. Network Monitoring, Konsep dan Penerapan
14. Dynamic DNS, Konsep dan Penerapan
15. Webmin, Konsep dan Penerapan
16. Virtualization , Konsep dan Penerapan

More Related Content

What's hot

Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removed
NCC Group
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelines
govsap_84
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
NCC Group
 
Hardware security
Hardware securityHardware security
Hardware security
RajKumar4943
 
MS08 067
MS08 067MS08 067
MS08 067
Tim Krabec
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
Martin Evans
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
Joebarton1997
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Arun Mahajan
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016
DefensiveDepth
 
Stuxnet
StuxnetStuxnet
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
Gregory Hanis
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
Raja Waseem Akhtar
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
hoshmand kareem
 
Mayhem malware
Mayhem malwareMayhem malware
Mayhem malware
Akash Deep
 
Configuring Your Hardware Firewall
Configuring Your Hardware FirewallConfiguring Your Hardware Firewall
Configuring Your Hardware Firewall
Aventis Systems, Inc.
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
Vinayak Wadhwa
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
moy725
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
Ashley Deuble
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
NCC Group
 

What's hot (20)

Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removed
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelines
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Hardware security
Hardware securityHardware security
Hardware security
 
MS08 067
MS08 067MS08 067
MS08 067
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Mayhem malware
Mayhem malwareMayhem malware
Mayhem malware
 
Configuring Your Hardware Firewall
Configuring Your Hardware FirewallConfiguring Your Hardware Firewall
Configuring Your Hardware Firewall
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 

Similar to Administrasi jaringan

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
HelpSystems
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
MuhammadFarhan571648
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
AlfredObia1
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
ANIL KUMAR-RESUME
ANIL KUMAR-RESUMEANIL KUMAR-RESUME
ANIL KUMAR-RESUME
ANIL KUMAR
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
KINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_IT
Kingsley King
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
Jean Jacques
 

Similar to Administrasi jaringan (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
ANIL KUMAR-RESUME
ANIL KUMAR-RESUMEANIL KUMAR-RESUME
ANIL KUMAR-RESUME
 
Operating system security
Operating system securityOperating system security
Operating system security
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
KINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_IT
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
GOODRESUMEMSFORMINDSHIFNYADDRESS (4)
 

More from seolangit2

Teori teknologi informasi
Teori teknologi informasiTeori teknologi informasi
Teori teknologi informasi
seolangit2
 
Teknologi perangkat lunak
Teknologi perangkat lunakTeknologi perangkat lunak
Teknologi perangkat lunak
seolangit2
 
Sejarah dan perkembangan komputer
Sejarah dan perkembangan komputerSejarah dan perkembangan komputer
Sejarah dan perkembangan komputer
seolangit2
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
seolangit2
 
Pengamanan jaringan komputer
Pengamanan jaringan komputerPengamanan jaringan komputer
Pengamanan jaringan komputer
seolangit2
 
Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1
seolangit2
 
Komputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburanKomputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburan
seolangit2
 
Keamanan jaringan komputer
Keamanan jaringan komputerKeamanan jaringan komputer
Keamanan jaringan komputer
seolangit2
 
Software
SoftwareSoftware
Software
seolangit2
 
Perkembangan teknologi informasi
Perkembangan teknologi informasiPerkembangan teknologi informasi
Perkembangan teknologi informasi
seolangit2
 
Perkembangan dunia komputer
Perkembangan dunia komputerPerkembangan dunia komputer
Perkembangan dunia komputer
seolangit2
 
Pengenalan hardware
Pengenalan hardwarePengenalan hardware
Pengenalan hardware
seolangit2
 
perangkat Hardware atau perangkat keras
perangkat  Hardware atau perangkat kerasperangkat  Hardware atau perangkat keras
perangkat Hardware atau perangkat keras
seolangit2
 
Pengenalan teknologi komputer
Pengenalan teknologi komputerPengenalan teknologi komputer
Pengenalan teknologi komputer
seolangit2
 
JARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASARJARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASAR
seolangit2
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
seolangit2
 
Linux
LinuxLinux
Linux
seolangit2
 
Lan (local area network)
Lan (local area network)Lan (local area network)
Lan (local area network)
seolangit2
 

More from seolangit2 (18)

Teori teknologi informasi
Teori teknologi informasiTeori teknologi informasi
Teori teknologi informasi
 
Teknologi perangkat lunak
Teknologi perangkat lunakTeknologi perangkat lunak
Teknologi perangkat lunak
 
Sejarah dan perkembangan komputer
Sejarah dan perkembangan komputerSejarah dan perkembangan komputer
Sejarah dan perkembangan komputer
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
 
Pengamanan jaringan komputer
Pengamanan jaringan komputerPengamanan jaringan komputer
Pengamanan jaringan komputer
 
Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1Makalah perkembangan-dan-peranan-komputer-1
Makalah perkembangan-dan-peranan-komputer-1
 
Komputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburanKomputer dan masyarakat komputer dan dunia hiburan
Komputer dan masyarakat komputer dan dunia hiburan
 
Keamanan jaringan komputer
Keamanan jaringan komputerKeamanan jaringan komputer
Keamanan jaringan komputer
 
Software
SoftwareSoftware
Software
 
Perkembangan teknologi informasi
Perkembangan teknologi informasiPerkembangan teknologi informasi
Perkembangan teknologi informasi
 
Perkembangan dunia komputer
Perkembangan dunia komputerPerkembangan dunia komputer
Perkembangan dunia komputer
 
Pengenalan hardware
Pengenalan hardwarePengenalan hardware
Pengenalan hardware
 
perangkat Hardware atau perangkat keras
perangkat  Hardware atau perangkat kerasperangkat  Hardware atau perangkat keras
perangkat Hardware atau perangkat keras
 
Pengenalan teknologi komputer
Pengenalan teknologi komputerPengenalan teknologi komputer
Pengenalan teknologi komputer
 
JARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASARJARINGAN KOMPUTER DASAR
JARINGAN KOMPUTER DASAR
 
Prinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasiPrinsip dan aplikasi teknologi,informasi,komunikasi
Prinsip dan aplikasi teknologi,informasi,komunikasi
 
Linux
LinuxLinux
Linux
 
Lan (local area network)
Lan (local area network)Lan (local area network)
Lan (local area network)
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Administrasi jaringan

  • 1. Ferry Astika Saputra Isbat Udzin Nadhori Iwan Syarif M. Udin Harun al Rasyid Administrasi Jaringan (Network Administration)
  • 2. Introduction • Networks are no longer a luxury, but a requirement to keep the organization running.
  • 3. INTERNET FIREWALL E-MAIL FILESERVER EIS WWWDOMAIN ROUTER -GTW Traffic Monitoring CACTI Http://noc.eepis-its.edu EEPISHOTSPOT PROXY LECTURER ,EMPLOYEE STUDENTS Internal Server EEPIS-INFORMATION SYSTEM (EIS http ://eis.eepis -its.edu) Http://fileserver .eepis -its.edu DMZ E-Mail server HTTPS , SPAM (Spamassassin ), Virus Scanner (ClamAV ) PROXY (Squid) All access to Internet must through Proxy FIREWALL -IDS Linux bridge , iptables shorewall , snort , portsentry , acidlab CISCO Router Using acl , block malware from outside L3 Switch Block malware on physical port from inside network All Server in DMZ Manage using SSH , Secure Webmin SQL Database (MySQL ) Access only from localhost (127.0.0.1) EEPISHOTSPOT Access from wifi , signal only in EEPIS campus Authentication from Proxy Managable Switchs Block unwanted user from port , manage from WEB Network Services NOC MULTILAYER SWITCH
  • 4. Who are Responsible • Computer Technician – Responsible for setting up and maintaining the users’ computers. – Putting the computers together. – Adding new hardware: RAM, CD-ROM drive, Monitor, etc. – Installing software – Setting up accounts, email, and access to servers – Troubleshooting • Network Technician – Connecting the computers to the network. – Setting up any wireless network access. – Configure the routers and switches. • Basic configurations • Security • Traffic flow • System Administrator – Maintaining the “file servers”, the computers that store the software and data used by everyone. – Setting up usernames and passwords for controlling access to the network. – Setting up and maintaining the servers that control Email. – Keep the computers secure from viruses and hackers.
  • 5. Sys Admin Handle User Hardware Software • How many users are there? • The level of the user's expertise. • What are the users trying to do? • Are they responsible or irresponsible? • Who do the users know? • How many, how big and how complex? • Is there a network? • Are the computers heterogenous or homogenous?
  • 6. Sys Admin Handle What System Administrator Do ? Conflict • ensuring that the computing system runs correctly and as efficiently as possible, and • ensuring that all users can and do use the computing system to carry out their required work in the easiest and most efficient manner • Management will wish to restrict the amount of money spent on computer systems. • The users on the other hand will always want more disk space and faster CPUs. • The System Administrator must attempt to balance these two conflicting aims
  • 7. Network Administrator Activity • Fault Management • device management • Configuration Management • performance management • history management • Accounting • security • Management Scope • Maintenance and upgrade • Remote access
  • 8. What Systems Administrators need to know • programming, Systems Administrators have to be able to program. They might have to write scripts that automate regular tasks to help users perform certain tasks. • hardware maintenance and installation, This may range from installing new hardware to cleaning old hardware so that it continues to work. • documentation and testing, • Human Computer Interface, • networks and computer communication, • user education, • diplomacy, • legal issues and contracts, • detective work, • management and policy setting, and • public relations.
  • 9. Materi Administrasi Jaringan 1. Tugas dan Tanggung Jawab Sistem Administrator 2. Telnet dan SSH Server, Konsep dan Penerapan 3. Samba-FTP Server, Konsep dan Penerapan 4. DNS Server , Konsep dan Penerapan 5. Webserver, Konsep dan Penerapan 6. Mail Server, Konsep dan Penerapan 7. IMAP Server, Konsep dan Penerapan 8. Log Analysis, Konsep dan Penerapan 9. DHCP Server, Konsep dan Penerapan 10. Mailing List, Konsep dan Penerapan 11. Proxy Server, Konsep dan Penerapan 12. Traffic Shapping (Quality of Service), Konsep dan Penerapan 13. Network Monitoring, Konsep dan Penerapan 14. Dynamic DNS, Konsep dan Penerapan 15. Webmin, Konsep dan Penerapan 16. Virtualization , Konsep dan Penerapan