In this practice you will be able:
-Configure Primary DNS and Secondary DNS
-Configure DNS zone transter
-DNS Delegation
-DNS Security zone transfer
-Configure also Linux(Sles 11) and Windows Server 2008R2
1. The document provides instructions for configuring iptables firewall rules on a SUSE Linux server to set up a network with internal servers and clients.
2. It outlines steps to allow specific services and access between servers and clients like SSH, DNS, file sharing, remote desktop, and internet access.
3. The configuration includes setting up masquerading and destination NAT rules to enable connectivity and allow internal clients to access the internet through the firewall server.
Configure Webserver & SSL secure & redirect in SuSE Linux EnterpriseTola LENG
In this chapter you will be able:
-How to install webserver in suse linux server
-How to configure webserver
-How to hosting website and web application
-How to configure secure connection (SSL, Redirect)
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
How to configure IPA-Server & Client-Centos 7Tola LENG
The document provides steps for configuring an IPA-Server on Centos 7, which includes assigning an IP address, downloading and installing IPA server services, and configuring the freeIPA server and client. It notes that the IP address must be assigned manually along with the DNS, gateway, and subnet mask.
The document outlines the configuration of a network including a LAN server and LAN client. It describes setting up Active Directory, DNS, DHCP services on the LAN server with IP scopes and reservations. It also covers installing DHCP relay on the server to facilitate IP addressing between the server and LAN client subnet, as well as allowing users to access file shares, join the domain, and login with Active Directory credentials.
-Configure DHCP (Create LAN Server and LAN Client) on Windows Server 2008R2
-Configure Relay on SuSE Linux Enterprise Server 11
-Allow Client Use DHCP IP for each LAN
Tola.leng mail server (sq_mail & rcmail)_q5_Tola LENG
The document discusses the steps to configure a mail server with Postfix and Dovecot on CentOS. It covers installing and configuring DNS, Postfix, Dovecot, Squirrelmail and Roundcube webmail clients. Authentication is enabled using LDAP. SSL/TLS encryption is configured for secure mail delivery. Troubleshooting tips and tests are provided to ensure proper send/receive functionality.
1. The document provides instructions for configuring iptables firewall rules on a SUSE Linux server to set up a network with internal servers and clients.
2. It outlines steps to allow specific services and access between servers and clients like SSH, DNS, file sharing, remote desktop, and internet access.
3. The configuration includes setting up masquerading and destination NAT rules to enable connectivity and allow internal clients to access the internet through the firewall server.
Configure Webserver & SSL secure & redirect in SuSE Linux EnterpriseTola LENG
In this chapter you will be able:
-How to install webserver in suse linux server
-How to configure webserver
-How to hosting website and web application
-How to configure secure connection (SSL, Redirect)
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
How to configure IPA-Server & Client-Centos 7Tola LENG
The document provides steps for configuring an IPA-Server on Centos 7, which includes assigning an IP address, downloading and installing IPA server services, and configuring the freeIPA server and client. It notes that the IP address must be assigned manually along with the DNS, gateway, and subnet mask.
The document outlines the configuration of a network including a LAN server and LAN client. It describes setting up Active Directory, DNS, DHCP services on the LAN server with IP scopes and reservations. It also covers installing DHCP relay on the server to facilitate IP addressing between the server and LAN client subnet, as well as allowing users to access file shares, join the domain, and login with Active Directory credentials.
-Configure DHCP (Create LAN Server and LAN Client) on Windows Server 2008R2
-Configure Relay on SuSE Linux Enterprise Server 11
-Allow Client Use DHCP IP for each LAN
Tola.leng mail server (sq_mail & rcmail)_q5_Tola LENG
The document discusses the steps to configure a mail server with Postfix and Dovecot on CentOS. It covers installing and configuring DNS, Postfix, Dovecot, Squirrelmail and Roundcube webmail clients. Authentication is enabled using LDAP. SSL/TLS encryption is configured for secure mail delivery. Troubleshooting tips and tests are provided to ensure proper send/receive functionality.
The document provides instructions for configuring a Mikrotik router, including setting up interfaces and network cards, assigning IP addresses, creating NAT and DHCP rules, configuring DNS and gateway settings, and setting up a basic hotspot with user authentication. It also describes how to change the ISP connection and switch between Radius and local authentication for the hotspot.
Configure proxy firewall on SuSE Linux Enterprise Server 11Tola LENG
In this practice you will be able:
-How to install and configure the iptables and proxy firewall when we want to block the packet.
-How to allow or deny the services or packet when the client access to the Internet.
System Engineer: OpenLDAP and Samba ServerTola LENG
1. The document describes how to set up an OpenLDAP server and Samba domain controller with a GUI. It includes steps to install LDAP services, create the LDAP server, add users, and join clients to the domain.
2. Configuration files are also used to combine Samba and OpenLDAP to allow Windows clients to join the domain. Folders are shared and permissions are set for domain user groups.
3. The Openfire chat software is installed on the LDAP server and configured to use LDAP for user authentication, allowing domain users to chat.
Dhcp & dhcp relay agent in cent os 5.3Sophan Nhean
This document discusses configuring a DHCP server and DHCP relay agent for network infrastructure. It provides instructions on installing and configuring a DHCP server to provide IP addresses, subnet masks, and other network configurations to clients from a specific IP range. It also describes installing and configuring a DHCP relay agent to forward DHCP requests from clients without a local DHCP server to DHCP servers on other subnets. The document gives step-by-step guidance on setting up both the DHCP server and relay agent, and testing that clients receive IP addresses as expected.
This document provides a guide to configure an Linux computer to share an internet connection with multiple other devices on a local network. It discusses planning the network topology, setting up DHCP and IP forwarding on the Linux box, and configuring firewall rules to masquerade traffic and allow sharing of a single public IP address among private devices.
This document provides instructions for configuring a mail server on Red Hat/CentOS 6 that includes Postfix, Dovecot, SquirrelMail, and virus scanning/spam tagging. The 16 step process covers installing and configuring the software components, creating SSL certificates, enabling user authentication, and testing mail delivery to POP3/IMAP clients and via a web interface. Configuration files such as main.cf and dovecot.conf are edited to enable the required options.
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Chanaka Lasantha
This document provides instructions for configuring various server applications and services on a Linux server including Apache, PHP, MySQL, FTP, SSL, IPTables, PHPMyAdmin, and server monitoring. It discusses installing and configuring each of these applications and services individually with specific configuration details. The document is intended to provide a complete solution for setting up these common LAMP stack components and services on a Linux server.
This document provides instructions for setting up a local mail server with Postfix, Dovecot, and SquirrelMail on CentOS/RHEL. It involves installing and configuring each component, including Postfix for mail transfer, Dovecot for IMAP/POP3 access, and SquirrelMail for a webmail interface. Key steps include configuring Postfix and Dovecot settings, testing mail delivery via telnet, and using a SquirrelMail configuration wizard to set up the webmail interface.
1. The document explains the function of a DNS system using an example of connecting a school computer to www.yahoo.com. It describes how the client's request is first sent to an authoritative name server that resolves DNS names and finds IP addresses. If the name is not found, the request is passed to a root server that can find the associated name and IP address. Once the IP is found, the client computer can connect via IP to the destination website.
2. It then asks questions about the domain web.av.salesians.cat, defining an authoritative name server, host name, top-level domain (TLD), subdomain, and fully qualified domain name (FQDN).
3
This document provides steps to implement DNS and LDAP in Tiguin for a Samba PDC. It involves:
1. Installing and configuring Bind9 to setup DNS for the "eclipse.com" domain.
2. Installing slapd and adding LDAP schemas to setup an LDAP server for the "eclipse.com" domain.
3. Installing Samba and configuring it to use the LDAP server for user/group authentication and authorization. This allows central management of users and groups.
The document provides instructions for starting, stopping, restarting, and reloading the Apache HTTP Server using the /sbin/service command. It describes configuring the server by editing the httpd.conf file and locations for log and error files. It also covers setting up virtual hosts on multiple IPs, authentication, and protecting web directories with passwords. Key configuration directives like Listen, ServerName, DocumentRoot, Directory, and Authentication directives are explained.
Vibrant Technologies is headquarted in Mumbai,India.We are the best Linux training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Linux classes in Mumbai ac
This document provides instructions for setting up a DHCP server on a Linux CentOS system. It outlines steps to check if the DHCP package is installed, install it from the CentOS disc if needed, create and configure the dhcpd.conf script file, and start, stop, and restart the DHCP service. It also includes an example dhcpd.conf configuration with an IP range, gateway, DNS, and domain settings for a DHCP server lab setup with a Linux server and Windows clients.
The presentation summarizes DNS, SMTP, and POP3 protocols. It discusses configuring a local host file to map IP addresses to hostnames, setting up a DNS server using Bind on Windows 7, and interacting with an email server using SMTP and POP3 commands via Telnet. The objectives are to resolve hostnames, configure DNS, and send emails between mailboxes on the email server. Requirements include networked PCs and servers running Windows 7 with TCP/IP and an email server configured with user mailboxes.
Modul dhcp server menggunakan mikrotik osEen Pahlefi
The document provides steps to configure a MikroTik router as a DHCP server to assign IP addresses to client devices on the network. It involves changing the router's identity, adding an IP address and IP pool, enabling the DHCP server on an interface, and configuring DHCP network options. Finally, it verifies a client device receives an IP address from the router's DHCP server as shown by the client's IP configuration details.
This document discusses making Nova infrastructure components highly available and fault tolerant. It proposes an active-passive setup for MySQL and RabbitMQ using Linux HA (Heartbeat) and shared storage. The goals are to have Nova-network, Nova-scheduler and Nova-api be highly available without complex configurations. It describes testing high availability of Nova-network by simulating failures and verifying connectivity. Problems with network disconnect times are discussed and sending gratuitous ARPs is proposed to address it. Lastly, it invites discussion on ideas and concerns for making the different Nova components highly available.
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...Een Pahlefi
1) The document discusses configuring a MikroTik router to serve as an ARP-reply only DHCP server.
2) It provides steps to change the identity and IP address of the router, set one interface as ARP-reply only, and configure DHCP server settings including adding ARP entries for leases.
3) Testing confirms that clients can only obtain IP addresses automatically via DHCP, and cannot ping or access the router if manually configuring an IP address.
The document discusses several options for implementing database access control in a complex environment with many databases, applications, and users spread across different networks and locations. It recommends using a connection manager with access control lists to centrally authorize and audit connections, while giving security teams control over access policies through a centralized map table. This balanced approach provides security while avoiding over-complex solutions.
The document discusses how DNS (Domain Name System) affects page load time. It notes that DNS is often taken for granted but is the "phonebook of the internet" that translates domain names to IP addresses. The document then provides data on typical DNS lookup times by operating system and browser. It also examines the effects of DNS failures and distances between users and DNS resolvers. Finally, it discusses dual-stack DNS behavior and implications of IPv6 on page load times.
Day 1 of the training covers introductory C++ concepts like object-oriented programming, compilers, IDEs, classes, objects, and procedural programming concepts. Day 2 covers more advanced class concepts like constructors, destructors, static members, returning objects, and arrays of objects. Day 3 covers function and operator overloading.
The spatial theory of electoral competition assumes that voter choices are based on the distance between their own political positions and those of candidates in a political space. It models this using Euclidean distance, with voters preferring candidates whose positions are closest to their own. This clustering of ideological positions means candidates' strategies are highly constrained. Surveys in Turkey in 2001 and 2004 showed support for the pro-European, centrist Justice and Development Party, while other parties took more polarized stances on issues like the EU and Kurdish rights.
Configure active directory & trust domainTola LENG
The document outlines steps for configuring an Active Directory environment, including:
1. Creating OUs and user accounts
2. Adding users to security groups
3. Joining a Windows client to the domain
4. Setting user profile and login restrictions
5. Configuring a trust between two domains with either a two-way or one-way trust relationship
The prepared by line indicates the tasks were completed by LENG Tola from the SNA15-B class.
The document provides instructions for configuring a Mikrotik router, including setting up interfaces and network cards, assigning IP addresses, creating NAT and DHCP rules, configuring DNS and gateway settings, and setting up a basic hotspot with user authentication. It also describes how to change the ISP connection and switch between Radius and local authentication for the hotspot.
Configure proxy firewall on SuSE Linux Enterprise Server 11Tola LENG
In this practice you will be able:
-How to install and configure the iptables and proxy firewall when we want to block the packet.
-How to allow or deny the services or packet when the client access to the Internet.
System Engineer: OpenLDAP and Samba ServerTola LENG
1. The document describes how to set up an OpenLDAP server and Samba domain controller with a GUI. It includes steps to install LDAP services, create the LDAP server, add users, and join clients to the domain.
2. Configuration files are also used to combine Samba and OpenLDAP to allow Windows clients to join the domain. Folders are shared and permissions are set for domain user groups.
3. The Openfire chat software is installed on the LDAP server and configured to use LDAP for user authentication, allowing domain users to chat.
Dhcp & dhcp relay agent in cent os 5.3Sophan Nhean
This document discusses configuring a DHCP server and DHCP relay agent for network infrastructure. It provides instructions on installing and configuring a DHCP server to provide IP addresses, subnet masks, and other network configurations to clients from a specific IP range. It also describes installing and configuring a DHCP relay agent to forward DHCP requests from clients without a local DHCP server to DHCP servers on other subnets. The document gives step-by-step guidance on setting up both the DHCP server and relay agent, and testing that clients receive IP addresses as expected.
This document provides a guide to configure an Linux computer to share an internet connection with multiple other devices on a local network. It discusses planning the network topology, setting up DHCP and IP forwarding on the Linux box, and configuring firewall rules to masquerade traffic and allow sharing of a single public IP address among private devices.
This document provides instructions for configuring a mail server on Red Hat/CentOS 6 that includes Postfix, Dovecot, SquirrelMail, and virus scanning/spam tagging. The 16 step process covers installing and configuring the software components, creating SSL certificates, enabling user authentication, and testing mail delivery to POP3/IMAP clients and via a web interface. Configuration files such as main.cf and dovecot.conf are edited to enable the required options.
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Chanaka Lasantha
This document provides instructions for configuring various server applications and services on a Linux server including Apache, PHP, MySQL, FTP, SSL, IPTables, PHPMyAdmin, and server monitoring. It discusses installing and configuring each of these applications and services individually with specific configuration details. The document is intended to provide a complete solution for setting up these common LAMP stack components and services on a Linux server.
This document provides instructions for setting up a local mail server with Postfix, Dovecot, and SquirrelMail on CentOS/RHEL. It involves installing and configuring each component, including Postfix for mail transfer, Dovecot for IMAP/POP3 access, and SquirrelMail for a webmail interface. Key steps include configuring Postfix and Dovecot settings, testing mail delivery via telnet, and using a SquirrelMail configuration wizard to set up the webmail interface.
1. The document explains the function of a DNS system using an example of connecting a school computer to www.yahoo.com. It describes how the client's request is first sent to an authoritative name server that resolves DNS names and finds IP addresses. If the name is not found, the request is passed to a root server that can find the associated name and IP address. Once the IP is found, the client computer can connect via IP to the destination website.
2. It then asks questions about the domain web.av.salesians.cat, defining an authoritative name server, host name, top-level domain (TLD), subdomain, and fully qualified domain name (FQDN).
3
This document provides steps to implement DNS and LDAP in Tiguin for a Samba PDC. It involves:
1. Installing and configuring Bind9 to setup DNS for the "eclipse.com" domain.
2. Installing slapd and adding LDAP schemas to setup an LDAP server for the "eclipse.com" domain.
3. Installing Samba and configuring it to use the LDAP server for user/group authentication and authorization. This allows central management of users and groups.
The document provides instructions for starting, stopping, restarting, and reloading the Apache HTTP Server using the /sbin/service command. It describes configuring the server by editing the httpd.conf file and locations for log and error files. It also covers setting up virtual hosts on multiple IPs, authentication, and protecting web directories with passwords. Key configuration directives like Listen, ServerName, DocumentRoot, Directory, and Authentication directives are explained.
Vibrant Technologies is headquarted in Mumbai,India.We are the best Linux training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Linux classes in Mumbai ac
This document provides instructions for setting up a DHCP server on a Linux CentOS system. It outlines steps to check if the DHCP package is installed, install it from the CentOS disc if needed, create and configure the dhcpd.conf script file, and start, stop, and restart the DHCP service. It also includes an example dhcpd.conf configuration with an IP range, gateway, DNS, and domain settings for a DHCP server lab setup with a Linux server and Windows clients.
The presentation summarizes DNS, SMTP, and POP3 protocols. It discusses configuring a local host file to map IP addresses to hostnames, setting up a DNS server using Bind on Windows 7, and interacting with an email server using SMTP and POP3 commands via Telnet. The objectives are to resolve hostnames, configure DNS, and send emails between mailboxes on the email server. Requirements include networked PCs and servers running Windows 7 with TCP/IP and an email server configured with user mailboxes.
Modul dhcp server menggunakan mikrotik osEen Pahlefi
The document provides steps to configure a MikroTik router as a DHCP server to assign IP addresses to client devices on the network. It involves changing the router's identity, adding an IP address and IP pool, enabling the DHCP server on an interface, and configuring DHCP network options. Finally, it verifies a client device receives an IP address from the router's DHCP server as shown by the client's IP configuration details.
This document discusses making Nova infrastructure components highly available and fault tolerant. It proposes an active-passive setup for MySQL and RabbitMQ using Linux HA (Heartbeat) and shared storage. The goals are to have Nova-network, Nova-scheduler and Nova-api be highly available without complex configurations. It describes testing high availability of Nova-network by simulating failures and verifying connectivity. Problems with network disconnect times are discussed and sending gratuitous ARPs is proposed to address it. Lastly, it invites discussion on ideas and concerns for making the different Nova components highly available.
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...Een Pahlefi
1) The document discusses configuring a MikroTik router to serve as an ARP-reply only DHCP server.
2) It provides steps to change the identity and IP address of the router, set one interface as ARP-reply only, and configure DHCP server settings including adding ARP entries for leases.
3) Testing confirms that clients can only obtain IP addresses automatically via DHCP, and cannot ping or access the router if manually configuring an IP address.
The document discusses several options for implementing database access control in a complex environment with many databases, applications, and users spread across different networks and locations. It recommends using a connection manager with access control lists to centrally authorize and audit connections, while giving security teams control over access policies through a centralized map table. This balanced approach provides security while avoiding over-complex solutions.
The document discusses how DNS (Domain Name System) affects page load time. It notes that DNS is often taken for granted but is the "phonebook of the internet" that translates domain names to IP addresses. The document then provides data on typical DNS lookup times by operating system and browser. It also examines the effects of DNS failures and distances between users and DNS resolvers. Finally, it discusses dual-stack DNS behavior and implications of IPv6 on page load times.
Day 1 of the training covers introductory C++ concepts like object-oriented programming, compilers, IDEs, classes, objects, and procedural programming concepts. Day 2 covers more advanced class concepts like constructors, destructors, static members, returning objects, and arrays of objects. Day 3 covers function and operator overloading.
The spatial theory of electoral competition assumes that voter choices are based on the distance between their own political positions and those of candidates in a political space. It models this using Euclidean distance, with voters preferring candidates whose positions are closest to their own. This clustering of ideological positions means candidates' strategies are highly constrained. Surveys in Turkey in 2001 and 2004 showed support for the pro-European, centrist Justice and Development Party, while other parties took more polarized stances on issues like the EU and Kurdish rights.
Configure active directory & trust domainTola LENG
The document outlines steps for configuring an Active Directory environment, including:
1. Creating OUs and user accounts
2. Adding users to security groups
3. Joining a Windows client to the domain
4. Setting user profile and login restrictions
5. Configuring a trust between two domains with either a two-way or one-way trust relationship
The prepared by line indicates the tasks were completed by LENG Tola from the SNA15-B class.
The document provides step-by-step instructions for installing Linux SUSE (Sless11) using VMware Workstation. It describes: 1) Creating a new virtual machine and selecting Linux as the guest operating system; 2) Configuring storage, RAM, and other settings; 3) Mounting the Linux SUSE ISO image and booting the installation; 4) Completing the installation process by partitioning disks, setting up users and passwords, and configuring networking. Upon finishing, the virtual machine will be booted with the newly installed Linux SUSE operating system.
This document describes the network topology and IP addressing scheme for a company network. The network consists of multiple VLANs for different departments connected by switches and routers. It provides details of the subnet IDs, IP ranges, and subnet masks configured for each VLAN and network segment.
The document outlines the steps to install and configure Nagios network monitoring software on a system. It details installing necessary services like Nagios, Apache2, and PHP. It also covers creating a Nagios username and password. The bulk of the document describes configuring Nagios to monitor specific hosts like a switch, servers, and an XP machine by editing host configuration files and setting parent hosts. Finally, it mentions inserting host pictures into the Nagios interface and viewing the status map.
The document provides guidelines for how to become a good presenter. It outlines the key steps and phrases to use when structuring a presentation, including how to welcome the audience, introduce yourself and the presentation, explain the structure, conclude and summarize sections, thank the audience, and invite and answer questions. The overall goal is to clearly guide the audience through the presentation from beginning to end using consistent language.
Logging is essential for debugging applications and monitoring what is happening. The document discusses different logging frameworks like Log4j, Logback, and SLF4J. SLF4J acts as a facade and allows plugging in different logging frameworks. Log4j is commonly used and configuration involves setting log levels and output destinations. Examples demonstrate basic usage of Log4j for logging information and errors.
JSF 2 Notes with coding examples topics include introduction , managed bean, jsf tags, navigation, jsf life cycle and phase listners,jsf validation and converters, i18n
The document provides an overview of Struts 2 including:
1. The architecture of Struts 2 which uses patterns like front controller and composite.
2. A basic "Hello World" example demonstrating creating an action class and mapping it in struts.xml.
3. The Action interface and ActionSupport class which provides common functionality like validation. ActionSupport implements interfaces like Validateable.
4. Aware interfaces like SessionAware which allow injecting objects like the session into actions.
JSP provides a scripting environment for Java code to generate dynamic web page content. Key elements include directives like <jsp:include> and <jsp:forward> for page composition, scriptlets for Java code, and expressions for output. The Expression Language (EL) offers a simpler way than scriptlets to access data and call methods. JSPs are compiled into servlets, so they can use Java classes and web technologies like MVC.
Ansible is an open source automation tool that allows users to configure, manage, and deploy software on remote machines without requiring an agent. It uses SSH to connect to nodes and executes modules written in Python. Playbooks allow users to automate multiple tasks by defining YAML files containing a list of commands. Ansible is agentless and can manage hundreds of nodes with a single command.
File Share Server, FTP server on Linux SuSE and WindowsTola LENG
-Install and configure Services
-Configure Suse Linux for FTP File Share Server
-Configure Permission
- Configure Point IP address to specific users.
- FTP Acccess
The document outlines exercises for learning Servlets, JSPs, and Java web development fundamentals including:
1. Hello World applications using Servlets and JSPs
2. Form processing and request handling with Servlets
3. Customer registration and voting applications
4. Connection pooling with JDBC for a book database
5. Session management using cookies and URL rewriting
6. The MVC pattern for building web applications
7. Using filters for basic security
8. Avoiding scriptlets and using expression language (EL) and JSTL tags
9. A book shopping cart application demonstrating various concepts
10. A case study on building an employee or book management system with MVC,
Tomcat is an open source servlet container that is used to run Java servlets and JSP pages to build web applications. It originated from a combination of the JServ and Sun Microsystems servlet engines. Tomcat adheres closely to Java servlet and JSP specifications, is highly customizable, and provides features like automatic reloading for development and thread pooling for production performance. It is installed by extracting binary files, setting environment variables, and can be started or stopped using scripts.
The document provides an overview of Linux and how it can interoperate with Microsoft Windows. It discusses why Windows administrators should care about Linux, how the Linux world works with open source licensing, and common uses of Linux as a server for web, mail, DNS, file sharing and more. It also covers using Linux on the desktop, running Microsoft applications on Linux, and interoperability solutions between Linux and Windows like Samba for file sharing and virtual machines.
JSF 2.0 tutorials provide an overview of topics covered including JSF 2.0 introduction, managed beans and scoping, JSF tags, navigation, lifecycle and listeners, validators, converters, and internationalization. The document discusses key aspects of JSF including it being a Java EE standard web application framework, implementing the MVC pattern, providing reusable UI components, and extensibility. It also provides an example "hello world" JSF application and demonstrates managed bean scoping with different beans.
A Project Report on Linux Server AdministrationAvinash Kumar
This is a Project Report on Linux Server Admin. It contains key network features which are installed on Linux. This project was conducted on RedHat Enterprise Linux 7.2.
The presentation discusses DNS, SMTP, and POP3 protocols. It provides instructions on configuring a DNS server on Windows 7, including downloading and installing BIND, creating configuration files, and testing the DNS server. It also describes using Telnet and SMTP commands to send emails between servers, and creating a batch file to automate email messaging through the command prompt.
1. primary dns using bind for a and cname record for ipv4 and ipv6Piyush Kumar
1. A primary DNS server is responsible for storing domain name and IP address mappings for a zone and responding to queries for that zone. Secondary DNS servers synchronize with the primary server to provide redundancy.
2. This document describes how to set up a primary DNS server on Linux using the bind package. It includes editing the named.conf configuration file to define a zone for the domain "piyush.com", creating the zone file, and testing queries to the new DNS server.
3. Key steps shown are installing bind, configuring named.conf to define the zone and location of the zone file, editing the zone file to define name-IP mappings, restarting named, and verifying queries to the DNS
2. reverse primarydns using bind for ptr and cname record ipv4Piyush Kumar
This document provides instructions for setting up a primary DNS server on Linux using the bind package. It involves installing bind, configuring the named.conf file to define zones for networks, creating zone files for the reverse lookup of IP addresses, adding PTR records to map IP addresses to hostnames, and restarting the named service. Setting up a primary DNS server allows a network to locally resolve hostnames, rather than relying on external DNS servers.
6. reverse primarydns using bind for ptr and cname record ipv6 with forwarderPiyush Kumar
This document provides instructions for configuring a primary DNS server on Linux using BIND to serve reverse DNS lookups for IPv6 addresses. It describes installing BIND, editing the named.conf configuration file to define zones for IPv6 address ranges, creating zone files with PTR records, and testing lookups to the new primary DNS server from a client.
This document provides instructions for installing and configuring the DNS server role in a Windows 2016 server environment. It discusses best practices like using strong passwords and installing security updates. It then provides step-by-step directions for installing the DNS role using the Add Roles and Features Wizard in Server Manager. Some key configuration steps include assigning static IP addresses to server network cards and configuring DNS server properties like IP address, subnet mask, default gateway and preferred/alternate DNS servers. Finally, it confirms the DNS role installation is complete and DNS Manager can be used to further configure the new DNS server.
Membangun web server,_e-mail_server_dan_ftp_serverIwan Kurniarasa
This document provides instructions for installing Linux RHEL 4 to build a web server, email server, and FTP server on a local network. It describes preparing the installation media and hardware, running the installation wizard to partition disks and set up users, and configuring the installed system to enable DNS, web, email, and FTP services. Key steps include installing required packages, configuring files like named.conf, httpd.conf, and main.cf, and testing the installed services.
Installation of Active Directory on Windows Server 2003 Server► Supreme Mandal ◄
The document provides instructions for installing Active Directory on a Windows 2003 Server. It outlines configuring the server name and IP address, installing DNS services, creating DNS zones, and running the DCPROMO utility to promote the server to a domain controller. The summary checks the installation, including verifying Active Directory tools are installed, the required OUs exist, and the server is listed in the sites and services. It also checks DNS for the required SRV records and ensures files are present in the NTDS and SYSVOL folders.
3. reverse primarydns using bind for ptr and cname record ipv6Piyush Kumar
This document describes how to configure a primary DNS server on Linux using BIND to serve PTR records for reverse DNS lookups of IPv6 addresses. It involves installing BIND, configuring named.conf to define zones for IPv6 address blocks, creating zone files with PTR records, and testing lookups. Key steps include defining options and zones in named.conf, copying an existing zone file and modifying it to include PTR records that map IPv6 addresses to domain names, and restarting BIND. This allows the server to resolve IPv6 addresses to names and function as the primary DNS server for its defined zones.
The document provides instructions for installing Active Directory on a Windows Server 2003 server in 3 main steps:
1. Configure the server's TCP/IP settings and DNS zone to point to itself as the DNS server.
2. Run Dcpromo.exe to promote the server to a domain controller for a new domain and forest.
3. Check that the Active Directory installation was successful by verifying tools, sites, and required files and shares.
This document provides instructions for configuring IP addresses, hostnames, DHCP server, and DNS server on a Debian Lenny server. It describes editing configuration files such as interfaces, hostname, and dhcpd.conf to set the IP address, netmask, gateway and hostname. It also explains installing the dhcp3-server and bind9 packages and editing files such as dhcpd.conf and named.conf to configure the DHCP and DNS servers, respectively. Commands shown include ifconfig, hostname, service networking commands, and apt-get install.
Linux Administration Tutorial | Configuring A DNS Server In 10 Simple Steps |...Edureka!
This Linux administration tutorial is ideal for those who want to learn how to configure a Bind DNS server in Linux. The following topics have been covered in this video:
1. What is DNS?
2. How Does DNS Server Work?
3. Configuring Bind DNS Server In 10 Steps.
Configuration of BIND DNS Server On CentOS 8Kaan Aslandağ
This document provides instructions for configuring a BIND DNS server on CentOS 8. It involves installing the BIND packages, enabling the named service to start at reboot, editing the configuration files to listen on all interfaces and define the forward and reverse DNS zones. The forward zone maps hostnames to IP addresses, while the reverse zone maps IP addresses to hostnames. The zone files are then created and validated before restarting the named service.
1. The document describes how to set up a PXE kickstart server to automatically install CentOS 5.3 over the network using DHCP and TFTP. It provides instructions for configuring the TFTP, DHCP and NFS servers, creating a kickstart installation tree and kickstart files.
2. Additional clients can be added by modifying the DHCP configuration to assign them a static IP, creating a customized kickstart file, and PXE booting the client to initiate the network installation.
3. Example configurations are provided for the /etc/dhcpd.conf DHCP configuration file and a sample kickstart file.
This document discusses BIND 9, an open source implementation of DNS software. It provides instructions on installing and configuring BIND 9 on an Ubuntu system. Key points covered include installing BIND 9 and related tools using apt, configuring files such as named.conf.options and named.conf.local to define zones and records, testing with dig and nslookup commands, and enabling the DNS port on firewalls.
Networking in Linux discusses DNS related commands in Linux. It begins by listing DNS concepts like zones and records. It then demonstrates commands like nslookup, host and dig to query DNS records like A, MX, NS, SOA records and perform operations like reverse lookups. It shows how to use specific nameservers, change ports and timeouts. The document provides examples of using these tools to troubleshoot DNS issues like propagation.
Networking in Linux discusses DNS related commands in Linux. It begins by listing DNS concepts like zones and records. It then demonstrates commands like nslookup, host and dig to query DNS records like A, MX, NS, SOA records and perform operations like reverse lookups. It shows how to use specific nameservers, change ports and timeouts. The document provides examples of using these tools to troubleshoot DNS issues like propagation.
The document describes how to set up a basic DNS server using Bind9 on Ubuntu. It explains DNS concepts like name resolution, zones, and domain space hierarchy. It then provides step-by-step instructions to install and configure Bind9, create forward and reverse lookup zones, check configurations, and test the DNS server.
1. The document provides instructions for installing CentOS and setting up a DNS server on the installed CentOS system.
2. It describes downloading and burning the CentOS ISO, installing it on a computer, and configuring the network interfaces and other installation options.
3. It also explains how to generate an rndc key for bind, edit the rndc.conf and named.conf files, and enable DNS services on the new CentOS server.
iStorage Server - High Availability iSCSI SAN for Windows Server 2003KernSafe Technologies
This article demonstrates how to build Windows Server 2003 High Availability cluster by using KernSafe iSCSI Target. In this case, at least three computers are needed, respectively domain controller, node 1 and node 2. Each computer requires two network adapters.
This document provides instructions for installing a LAMP server with Drupal on it. It describes installing CentOS as the base Linux server, then using yum to add Apache, MySQL, PHP, and additional packages to create a full LAMP stack. It details configuring DHCP and FTP services. It also explains downloading and extracting Drupal, creating a MySQL database for it, and navigating through the Drupal installation process via a web browser. The key steps are: 1) installing a base Linux server; 2) using yum to add Apache, MySQL, PHP to create a LAMP server; 3) downloading and extracting Drupal; 4) creating a MySQL database; and 5) navigating through the Drupal installation
Similar to DNS windows server(2008R2) & linux(SLES 11) (20)
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 5
DNS windows server(2008R2) & linux(SLES 11)
1. NETWORK ADMINISTRATION
DNS Server(Windows & Linux)
2013-2014
PASSERELLES NUMERIQEUS CAMBODIA
Street 371 Phum Tropeang Chhuk (Borey Sorla), Sangkat Tek Thia Khan Sek Sok P.O. Box 511 Phnom Penh,
Cambodia
2. Table of Content
1. Configure Domain Name ................................................................................................................................2
2. Install Bind package..........................................................................................................................................4
3. Create: Forward Lookup zone file & Reverse Lookup zone file in the
master DNS zone. .........................................................................................................................................................4
4. Create Resource Record with: ....................................................................................................................5
5. Create Zone transfer .............................................................................................................................................. 10
5. Encryption transfer protocol...................................................................................................................... 17
I. On Windows: ................................................................................................................................................... 20
1. Install DNS + AD service ............................................................................................................................ 22
2. Configure DNS zone: .............................................................................................................................................. 30
- Configure Forward ............................................................................................................................................ 30
-Revers lookup zone ........................................................................................................................................... 31
3. Create Resource Record: ..................................................................................................................................... 38
A(Resolve from host to host) ........................................................................................................... 38
PTR(pointer) ................................................................................................................................................... 40
CNAME(alias) .................................................................................................................................................. 42
MX(Mail Exchanger).................................................................................................................................. 45
4. Create multiple domains name ........................................................................................................................ 48
-Forward New zone ................................................................................................................................................... 48
-Reverse New Zone .................................................................................................................................................. 52
5. Configure DNS zone transfer............................................................................................................................. 57
- Configure on Primary DNS server ................................................................................................................ 57
- Allow only sna2015. lan ....................................................................................................................................... 59
- Configure on Secondary DNS server (Transfer only sna2015.lan) .......................................... 60
-Enable master transfer zone ............................................................................................................................. 66
6. Active Directory-integrated DNS zone:....................................................................................................... 68
- Configure AD-integrated Replication .......................................................................................................... 68
- Set Dynamic update as Security only ........................................................................................................ 79
3. Suse Linux:
1. Configure Domain Name
-Go to by type yast lan =>Hostname/DNS =>input the Domain name and
Server name => OK
-Configure by input the domain name: tola091.lan
4. -Show IP Address and restart network services config(rcnetwork restart,
ifconfig)
-Show hostname
5. 2. Install Bind package
-Types the yast –I => install the packet bind (bind) =>type bind in the
Search Phrase and Accept to install. Or (zipper install –y bind)
OR
3. Create: Forward Lookup zone file & Reverse Lookup zone file
in the master DNS zone.
- After we finished install the dns services, we need to back up the file
named.conf that store in the locate /etc to other or some locations.( cp
/etc/named.conf /etc/named.conf.bk)
6. - Forward zone is a zone that map name of host to IP address.
- Reverse zone is a zone that map IP address to name of host.
- Create these zone we need to: vim /etc/name.conf for configure the file
named.conf.
-Configure the zone by creaete forward zone: tola091.lan.zone and reverse zone:
192.168.1.zone and disable for file include as the picture below:
-Save them after configure by use :x1 or ZZ
4. Create Resource Record with:
-Backup the forward zone and reverse zone of loca to master
7. -Create resource record and confure for forward zone and reverse zone
as A, PTR,MX,CNAME
-Type this command vim tola091.lan.zone to configure forward zone
- A = Resolves a host to an IP address
- PTR = Resolves an IP to a host name (1.168.192.in-addr.arpa)
- CNAME = Resolves from hostname to hostname
- MX = The mail Server
8. -Type this command vim 192.168.1.zone to configure reverse zone
-Use command rcnamed restart to restart service named
- Use command vim /etc/resolv.conf to add more line of DNS
-NSLookup Tools
Nslookup is a command-line utility used to diagnose DNS infrastructure
11. + Let client test
5. Create Zone transfer
- Configure on Master DNS server
Additional command for enable master transfer zone to slave
allow-update { none; };
allow-query { any; };
allow-transfer { 192.168.1.2; };
12. - Configure on Slave DNS server
-Check IP and Hostname
-Test Connection
-Configure Domain Name for DNS Slave
14. -Zone Transfer, Use command vim /etc/named.conf to configure to get
the zone transfer from master dns.
-All the zone will transfer from master zone
-Restart rcnamed restart
- The zone will change directory to /var/lib/named/slave so we will
see the zone that transfer from master zone.
15. -Show the Reverse Zone Configuration of DNS slave that transfer from
master DNS
-Show the Forward zone Configuration of DNS slave that transfer from
master DNS
18. 5. Encryption transfer protocol
-Encryption zone transfer means we would transfer the zone from master
to slave by using security of encrypt password.
-Type command dnssec-keygen –a HMAC-MD5-b 96 –n HOST tola in
order to create encrypt password.
19.
20. -Copy encryption file from master to slave to bring this key encrypt to
slave.
-Go to the named configuration to pass the encrypt key.
-Restart named services
7. Let testing of Zone transfer and Encryption transfer
21. I. On Windows:
+Before we install other services we need to modify the hostname and
assigned the real IP address of host.
-Assigned IP by type command ncpa.cpl to configure the IP address.
22. -Right on LAN and then click Properties
-Check Hostname
23. 1. Install DNS + AD service
-Select Server Manager.Or from the Quick Launch Taskbar.
-Select Roles. Then Add Roles. Before you continue verify that;
-You can skip this page by default.
-Click Next to continue
24. -Select Active Directory Domain Services. There is no need to select DNS
Server; this role will be added with DCPROMO. Then Click Next.
25. - Ensure you read Things to Note. Then Click Next. Click Install.
26. - The Active Directory Binaries have been installed. Click Close this wizard
and launch dcpromo.exe. You can also launch dcpromo from the Run box.
Click Next. Or type the dcpromo on the run.
- Operating System Compatibility warning about new Server 2008 security
settings. Check there is no compatibility issue with existing network
infrastructure. If none click Next.
27. - Select Create a new domain in a new forest and Click Next.
28. -
- There are 3 Forest functional levels Windows 2000, Windows 2003,
Windows 2008 and Windows Server 2008 R2.
29. - Select DNS server then Next to continue. Next to continue. The Wizard
cannot contact the DNS server for this zone. Select yes to continue; DNS
will then be installed. The Database folders are assigned. Click Next to
accept the defaults. Restore mode password must be set, click Next to
continue.
30. - The Active Directory components are installed. Click Finish to complete
the installation. The Server needs to be restarted to finalise the
installation. Click Restart Now. Server restarts.
31. -
2. Configure DNS zone:
- Configure Forward
A Forward lookup is the most common form of DNS lookup. This
type of lookup converts a hostname into an IP address. A Forward
Lookup-Zone contains Name to IP Address mappings.
-Click Start> Administrative Tools> DNS >Expand by clicking the + next
to the DNS server
32. -To add a New Forward Lookup Zone Right click Forward Lookup Zones.
Click New Zone.
-Revers lookup zone
- Right click Reverse Lookup Zones and Select New Zone.
- Select Primary Zone and tick Store
33. - Select IPv4 Reverse Lookup Zone. and Next to continue
34. - Type in the Network ID and Next to continue
- The Wizard will ask you if you want to accept dynamic updates. As the
wizard shows there are drawbacks to having it enabled, but there are also
drawbacks for having it disabled.
35. - New Delegation to class Monitor as Admin
- To open DNS Manager, click Start, point to Administrative Tools, and
then click DNS.
36. - right-click the applicable subdomain, and then click New Delegation.
- Follow the instructions in the New Delegation Wizard to finish creating
the new delegated domain.
37.
38.
39. 3. Create Resource Record:
A(Resolve from host to host)
-Open DNS Manager
- right-click the forward lookup zone to which you want to add the record,
and then click New Host (A or AAAA).
40. - In Name, type the DNS computer name for the new host.
In IP address, type the IP address for the new host. You can type the
address in IP version 4 (IPv4) format (to add a host (A) resource record)
or format (to add a host (AAAA) resource record).
41. -
PTR(pointer)
-You can use this procedure to create a pointer (PTR) resource record in a
reverse lookup zone in Domain Name System (DNS).
- right-click the reverse lookup zone that you want to manage, and then
click New Pointer (PTR).
42. -In the Host IP number text box, type the host IP address in IP version 4
(IPv4),
-As an option, you can click Browse to search the DNS namespace for
hosts that have host (A or AAAA) resource records already defined.
43. CNAME(alias)
- Alias (CNAME) resource records are also sometimes called canonical
name resource records. With these records, you can use more than one
name to point to a single host,
44. - right-click the applicable forward lookup zone, and then click New Alias.
- In Alias name, type the alias name.
- In Fully qualified domain name (FQDN) for target host, type the FQDN of
the DNS host computer for which this alias is to be used.
As an option, you can click Browse to search the DNS namespace for
hosts in this domain that have host (A) resource records already defined.
45. -
-Click OK to add the new record to the zone.
46. MX(Mail Exchanger)
-You can use this procedure to add a mail exchanger (MX) resource
record to a Domain Name System (DNS) zone to provide message routing
to a mail exchanger host.
- right-click the forward lookup zone to which you want to add the record,
and then click New Mail Exchanger (MX).
47.
48.
49. 4. Create multiple domains name
- (tola091.lan) New Domain
-Forward New zone