2G1701 Advanced Internetworking Group 5 : KiStaNEt ISP Project Report
|
|
- Samuel Hudson
- 8 years ago
- Views:
Transcription
1 2G1701 Advanced Internetworking Group 5 : KiStaNEt ISP Project Report Course staff : Group Members : Jon-Olov Vatn (Course Leader) Sermed Al-abbasi (Teaching Assistant) Zaheen Sherwani Carlos Loarca Xiong Si Wen-Jia Gan Abstract This report details what went behind the setting up of KiStaNet ISP, and our motivations behind our design decisions, and summarizes what we all have learnt in the process. i
2 Table of Contents Page Number 1. Introduction 1 2. Description of Services 1 3. Description of Setup Detailed Setup Description of Individual Machines 4 4. Results 5 5. Individual Statements 5 6. Lessons Learned 6 7. Summary 6 8. References 6 Appendixes 7 Appendix A. : Verification Tests 7 Appendix B. : Configuration Files named.conf 8 db.kistanet.lab 9 db db dhcpd.conf 10 hostapd.conf 11 ii
3 1. Introduction The purpose of the project is to setup and run an Internet Service Provider (ISP) as a group. The tasks our group are to solve includes the mandatory services of Domain Name Services (DNS), web server, dynamic routing and dynamic address assignment. The selective service our group chose to do is Wireless LAN (WLAN), which enable hosts to connect and obtain IP address dynamically via cable or wirelessly. Due to manpower limitations of only 4 people in our group, our scope is limited to simple web server services. 2. Description of Services This section describes our services in more depth, and also how we have decided to provide the services. One major reason for the choice of implementations is due to the prior experiences and familiarity by the KSN technical staff. 2.1 Mandatory services DNS As the Internet's IP addresses are not generally user-friendly, Kistanet (KSN) domain name servers were used to resolve domain names to IP addresses. The relationship between IP addresses and domain names was managed by a primary domain name server (ns.kistanet.lab) and a secondary domain name server (ns2.kistanet.lab). KSN used the secondary DNS to provide redundancy to the customers. Users would otherwise not be able to access any Uniform Resource Locator (URL i.e. web page) if the primary DNS failed, unless the user knew the exact IP address. KSN is a start-up ISP company with not many resources. Therefore, KSN prefers to provide a DNS service using open source implementations (BIND) coordinated by The Internet Software Consortium. Meanwhile KSN will be trying to develop its own implementation to solve some security problems with BIND in the future. Web Server Our web server is running on Apache 2, which is the most popular web server implementation available today, together with PHP server side scripting and PostGreSQL database. Our ISP main webpage allows user login and authentication based on the above services. We have opted a rudimentary web server is provided instead of additional web services deployed due to manpower limitations. 1
4 Dynamic Routing KSN decided to use dynamic routing within the ISP setup ie on both interfaces of routers R1, R2, R3 and R4 to avoid the overhead of manually entering the static routes within the network. The link state Open Shortest Path First Protocol (OSPF) was selected for the dynamic routing protocol within the ISP network due to its low overhead and faster convergence time. OSPF is widely used in large networks such as ISP backbone and enterprise network. In order to provide dynamic routing, Zebra dynamic routing software package was used within the ISP setup. The advantage of using Zebra is that it provides a console based interface for the configuration of personal computer (PC) based routers running Linux environment. This interface is very similar to that developed by Cisco Systems for the configuration of their commercial routers. Since Zebra and OSPF process daemons are controlled through separate telnet sessions therefore a telnet server was also installed on these Linux machines. Dynamic Address Assignment There are many commercial Dynamic Host Configuration Protocol (DHCP) implementations available, such as Vicomsoft, 602ProLan Suite, IP Commander etc. We have chosen to use DHCP distribution from the Internet Software Consortium as it provides full functionality and is freely distributable. DHCP can be used by client machines in a plug-n-play fashion into our network and be assigned IP addresses with basically no configuration required on their part. 2.2 Selective services : Wireless LAN (WLAN) We chose Wireless LAN (WLAN) as our selective service as it is an up and coming field. Its setup had provided great learning value. WLAN services provided by ISPs is becoming popular as wireless hotspots usually located at cafes, restaurants, airports and hotels. 2
5 3. Description of Setup This section described our network design and machine setup. Our ISP s network topology is illustrated in Figure 1. Figure 1 : KiStaNet Network Topology Diagram ns /24 ns.lab / / / <100+N>/24 R1 ISP1 R2 ISP2 Sec. DNS R1 ISPN Internal network of ISP 1 Internal network of ISP 2 Internal network of ISP /24 Internal network of ISP N (WWW) (DNS) R1 ISP5 Del. DNS (Delegation DNS) / /24 (add range ) Dynamic IP WLAN H R / /24 R / / / /124 R4 (DHCP) /24 (add range ) WLAN H Dynamic IP Dynamic IP Dynamic IP H H /24 3
6 3.1 Detailed Setup Description of Individual Machines This section describes how we have setup our services. DNS The domain contained: www mail mail.kistanet.lab The KSN domain names hierarchy consisted of a primary DNS (R1) and a secondary DNS (hosted on another ISP) to give the IP address mapping to a name and vice versa. A delegation server was also added for controlling the sub-domain of the KTH University (ns.kth.kistanet.lab). It was advantageous to delegate control from the domain to the sub-domains to simplify name resolution, for example to cater for when the ISP company grows. This sub-domain contains: web ftp ftp.kth.kistanet.lab mail.kth.kistanet.lab servers mail2.kth.kistanet.lab Web Server R1 is running Apache 2 web server, PHP server side scripting and PostGreSQL database. Dynamic Address Assignment R4 is running DHCP server for subnet (wired LAN) and (wireless LAN). Wireless LAN We made R4 act as an Access Point (AP). It had one interface connected via wire to our ISP network, with another interface that has a Wireless LAN card running on a Intersil's Prism 2/2.5/3 chipset. This PC need to run a software called HostAP for it to take care of IEEE management functions in the host computer and acts as an access point. Intersil's station firmware for Prism2 chipset supports a so called Host AP mode in which the firmware takes care of time critical tasks like beacon sending and frame acknowledging, but leaves other management tasks to host computer driver. Our PC providing WLAN runs Red Hat 9 with kernel version and use the stable release of HostAP. Using HostAP, the WLAN card is set as Master mode to enable it to function as an AP. It s Extended Service Set Identifier (ESSID) is set to WKSN (Wireless Kistanet) to differentiate our WLAN from others. Our AP has DHCP server to assign IP address dynamically, and also runs OSPF for dynamic routing. Access Control To implement access control, we ran hostapd, which is a user space daemon for extended IEEE management, that came with the HostAP distribution. We implemented station MAC address-based authentication, and specified in the hostapd.conf configuration file to deny all stations unless of those MAC addresses listed in /etc/hostapd.accept accept list. 4
7 4. Results We first tested for connectivity to the web servers of the other ISPs from host machines in our ISP network, by pinging. We then proceeded to resolve domain names of other ISPs, as well as others being able to resolve ours, successfully. This included normal lookup and reverse lookup of addresses. We also used web browsers to access the web pages of the other ISP s web server. To test our dynamic routing, we disconnected one of the routers (R2 and R3). Our end hosts were still able to reach the other ISPs web server, while maintaining local network connectivity. We then changed over to the disconnected router, and achieved the same results. Our end hosts were able to get IP addresses dynamically, both on the wired LAN and wireless LAN. We also tested for wireless LAN access control by allowing connection to authorized hosts with registered MAC addresses. A wireless client from another ISP was also able to get a dynamic IP address from our access point and got connected to our network. 5. Individual Statements This section is where each student in the group individually confirms that we know how to setup each of the services that the group is required to do (the mandatory services as well as the selected service.) Carlos Loarca I confirm that I know how to set up the mandatory and selective services that our group is required to do. Wen-Jia Gan I confirm that I know how to set up the mandatory and selective services that our group is required to do. Xiong Si I confirm that I know how to set up the mandatory and selective services that our group is required to do. Zaheen Sherwani I confirm that I know how to set up the mandatory and selective services that our group is required to do. 5
8 6. Lessons Learnt Carlos Loarca The theory is very important since fits completely with the practical experiences generating the best learning environment. I was so sorry when I couldn't read every thing what I needed to read for a laboration, once. But when you have done it for sure you get a good knowledge. In the other hand, I feel more confident using on Linux now at days than before starting this course and also I'm encouraged to research and play with some other services on Linux. Wen-Jia Gan This project had given us the opportunity to hone our network design, and troubleshooting skills. The research and experimentations while doing the project had been most valuable. Xiong Si First, I realize that group cooperation is really important. Second, this project give me a lot of practical experiments, and combine the knowledge on book with practical applications. Zaheen Sherwani Apart from learning the subject, I realised the importance of working in groups. We learnt from each others weaknesses and strengths, and were able to achieve our goals through mutual cooperation. Secondly, at the beginning of the course I did not know much about Linux, now I am comfortable in it. 7. Summary In all, this ISP group project provided invaluable learning experience to us all, in both areas of practical work and teamwork. 8. References Guidelines for ISP Project Demonstration Guidelines for ISP Project Report Internet Software Consortium (ISC) Dynamic Host Configuration Protocol (DHCP) Host AP driver for Intersil Prism2/2.5/3 Appendixes 6
9 A. Verification Tests This section describes how we verified that our different services work. DNS We looked up our dns with the following command to inquire the root name server for our web server. dig +trace We are able to obtain answers from root, top level domain and local name servers. We did reverse lookup using : dig x to get the domain name corresponding to this IP address. Web Server We opened a web browser to browse our webpage using a host in our network, and also using a host in other ISP s host machines. Dynamic Routing First we listed our routing table to see which router (R2 or R3) was the default gateway of the end host. We then disconnected that the router. We noted that the default gateway was automatically changed to the other router. We then changed over to the disconnected router, and reachability to the other ISPs remained. Dynamic Address Assignment Our end hosts were able to get assigned IP addresses dynamically to their connected interfaces, on both the wired LAN and wireless LAN. We checked that the IP addresses assigned corresponded to the IP address range given. Wireless LAN Hosts with wireless LAN cards were able to detect the SSID ( WKSN ) of our Access Point, and get assigned dynamic IP addresses by the DHCP server. The hosts were also able to ping hosts in the other ISPs networks. 7
10 B. Configuration Files named.conf options { directory "/var/named"; forward first; forwarders { ; ; controls { inet allow { ; } keys { "rndc-key"; controls { inet allow { ; } keys { "rndc-key"; zone "." in { type hint; file "root.hints"; zone " in-addr.arpa" in { type master; file "kistanet/db "; zone " in-addr.arpa" in { type master; file "kistanet/db "; zone " in-addr.arpa" in { type master; file "kistanet/db "; zone "kistanet.lab" in { type master; file "kistanet/db.kistanet.lab"; # Start of rndc.conf key "rndc-key" { algorithm hmac-md5; secret "qnmtlajk4dcoqceot+a9+g=="; 8
11 db.kistanet.lab $TTL IN SOA ns.kistanet.lab. staff5.kistanet.lab.( ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL kistanet.lab. NS ns.kistanet.lab. NS ns2.kistanet.lab. MX 10 mail.kistanet.lab. ;delegation record kth.kistanet.lab. IN NS ns.kth.kistanet.lab. localhost IN A ;name servers ns IN A ns.kth.kistanet.lab. IN A ;service servers www IN A mail IN A db $TTL IN SOA ns.kistanet.lab. staff5.kistanet.lab.( 1 ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL IN NS ns.kistanet.lab. IN NS ns2.kistanet.lab. ; root name server IN PTR ns. ; top domain server IN PTR ns.lab. ; any type servers 1 IN PTR ;10 IN PTR ns2.kistanet.lab. 15 IN PTR mail.kistanet.lab. ; delegation server 11 IN NS ns.kth.kistanet.lab. 12 IN NS ns.kth.kistanet.lab. 13 IN NS ns.kth.kistanet.lab. 14 IN NS ns.kth.kistanet.lab. ns.kth.kistanet.lab. IN A
12 db $TTL IN SOA ns.kistanet.lab. staff5.kistanet.lab.( 1 ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL NS ns.kistanet.lab. 1 PTR localhost. dhcpd.conf : Configuration file for DHCP server #ddns-update-style interim; ddns-update-style none; ignore client-updates; subnet netmask { range ; # --- default gateway option routers ; option subnet-mask ; option domain-name "kistanet.lab"; option domain-name-servers ; option domain-name-servers ; } default-lease-time 120; max-lease-time 43200; subnet netmask { range ; # --- default gateway option routers ; option subnet-mask ; option domain-name "kistanet.lab"; option domain-name-servers ; option domain-name-servers ; } default-lease-time 120; max-lease-time 43200; 10
13 hostapd.conf : Configuration file for HostAP daemon ##### hostapd configuration file ############################################## # Empty lines and lines starting with # are ignored # AP netdevice name (without 'ap' prefix, i.e., wlan0 uses wlan0ap for # management frames) interface=wlan0 # hostapd event logger configuration # # Two output method: syslog and stdout (only usable if not forking to # background). # # Module bitfield (ORed bitfield of modules that will be logged; -1 = all # modules): # bit 0 (1) = IEEE # bit 1 (2) = IEEE 802.1X # bit 2 (4) = RADIUS # # Levels (minimum value for logged events): # 0 = verbose debugging # 1 = debugging # 2 = informational messages # 3 = notification # 4 = warning # logger_syslog=-1 logger_syslog_level=2 logger_stdout=-1 logger_stdout_level=2 # Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps debug=0 # Dump file for state information (on SIGUSR1) dump_file=/tmp/hostapd.dump # Daemonize hostapd process (i.e., fork to background) daemonize=1 ##### IEEE related configuration ####################################### # SSID to be used in IEEE management frames #ssid=test ssid=wksn # Station MAC address -based authentication # 0 = accept unless in deny list # 1 = deny unless in accept list # 2 = use external RADIUS server (accept/deny lists are searched first) #macaddr_acl=0 macaddr_acl=1 11
14 # Accept/deny lists are read from separate files (containing list of # MAC addresses, one per line). Use absolute path name to make sure that the # files can be read on SIGHUP configuration reloads. accept_mac_file=/etc/hostapd.accept #deny_mac_file=/etc/hostapd.deny # IEEE specifies two authentication algorithms. hostapd can be # configured to allow both of these or only one. Open system authentication # should be used with IEEE 802.1X. # Bit fields of allowed authentication algorithms: # bit 0 = Open System Authentication # bit 1 = Shared Key Authentication (requires WEP) auth_algs=3 # Associate as a station to another AP while still acting as an AP on the same # channel. #assoc_ap_addr=00:12:34:56:78:9a ##### IEEE 802.1X (and IEEE 802.1aa/D4) related configuration ################# # Require IEEE 802.1X authorization #ieee8021x=1 # Use internal minimal EAP Authentication Server for testing IEEE 802.1X. # This should only be used for testing since it authorizes all users that # suppot IEEE 802.1X without any keys or certificates. minimal_eap=0 # Optional displayable message sent with EAP Request-Identity eap_message=hello # WEP rekeying (disabled if key lengths are not set or are set to 0) # Key lengths for default/broadcast and individual/unicast keys: # 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits) # 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits) #wep_key_len_broadcast=5 #wep_key_len_unicast=5 # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once) #wep_rekey_period=300 # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if # only broadcast keys are used) eapol_key_index_workaround=0 ##### IEEE f - Inter-Access Point Protocol (IAPP) ####################### 12
15 # Interface to be used for IAPP broadcast packets #iapp_interface=eth0 ##### RADIUS configuration #################################################### # for IEEE 802.1X with external Authentication Server, IEEE # authentication with external ACL for MAC addresses, and accounting # The own IP address of the access point (used as NAS-IP-Address) own_ip_addr= # RADIUS authentication server #auth_server_addr= #auth_server_port=1812 #auth_server_shared_secret=secret # RADIUS accounting server #acct_server_addr= #acct_server_port=1813 #acct_server_shared_secret=secret # Secondary RADIUS servers; to be used if primary one does not reply to # RADIUS packets. These are optional and there can be more than one secondary # server listed. #auth_server_addr= #auth_server_port=1812 #auth_server_shared_secret=secret2 # #acct_server_addr= #acct_server_port=1813 #acct_server_shared_secret=secret2 # Retry interval for trying to return to the primary RADIUS server (in # seconds). RADIUS client code will automatically try to use the next server # when the current server is not replying to requests. If this interval is set, # primary server will be retried after configured amount of time even if the # currently used secondary server is still working. #radius_retry_primary_interval=600 13
Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction
Volume 3 New User To Technical Expert Solaris Bookshelf Stewart Watkiss This document is currently under construction This version is to be considered a preview only Solaris Networking Guide Copyright
More informationCork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9
Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9 February 2005 System and Network Management (Time: 2 Hours) Answer any THREE questions
More informationLesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
More informationLab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
More informationKAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
More information- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
More informationUsing Webmin and Bind9 to Setup DNS Sever on Linux
Global Open Versity Systems Integration Hands-on Labs Training Manual Using Webmin and Bind9 to Setup DNS Sever on Linux By Kefa Rabah, krabah@globalopenversity.org March 2008 Installing and Configuring
More informationBuilding a Linux IPv6 DNS Server
Building a Linux IPv6 DS Server By David Gordon and Ibrahim Haddad Open Systems Lab Ericsson Research Corporate Unit This article presents a tutorial on building an IPv6 DS Linux server that provides IPv6
More informationUnified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
More informationConfiguration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationChapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
More informationTunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer
Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get
More informationHTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
More informationVantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
More informationLocal DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
More informationCreating a master/slave DNS server combination for your Grid Infrastructure
Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In
More informationChapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationSetting up a Raspberry Pi as a WiFi access point
Setting up a Raspberry Pi as a WiFi access point Created by lady ada Last updated on 2015-03-10 04:30:11 PM EDT Guide Contents Guide Contents Overview What you'll need Preparation Check Ethernet & Wifi
More informationestadium Project Lab 8: Wireless Mesh Network Setup with DD WRT
estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT Objectives To become familiar with wireless mesh networks and show set up a wireless mesh network test bed using the DD WRT firmware. We
More informationLab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
More informationInterconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
More informationDomain Name System Security
Abstract Domain Name System Security Ladislav Hagara hgr@vabo.cz Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
More informationCSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
More informationQuick Installation Guide
0, Total 18 Quick Installation Guide Sep, 2013 1, Total 18 Thank you for purchasing Enterprise High Gain Outdoor CPE. This manual will instruct you how to configure and manage this CPE, enable you to use
More informationConfiguring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files
Configuring DNS BIND: UNIX Name Service Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files Zone: a collection of domain information contained
More informationHome Networking In Linux
Home Networking In Linux Iptables Firewall, Routing, Wireless, and More Scott Paul Robertson http://spr.mahonri5.net spr@mahonri5.net December 10, 2006 Introduction Why Build My Own Router? With most ISPs,
More informationHow To Guide Edge Network Appliance How To Guide:
How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table
More informationHow to Configure Split DNS
How to Configure Split DNS Split DNS is a concept that allows a hostname to resolve to one IP address on the internal network, and another on the external network. An example is the G/On Server if it is
More informationLAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
More information1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
More informationUsing Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
More informationNetworking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationInterlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
More informationc. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem
Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.
More informationDeveloping Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
More informationModule 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
More informationLab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
More informationChapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationThis chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
More informationLinkProof DNS Quick Start Guide
LinkProof DNS Quick Start Guide TABLE OF CONTENTS 1 INTRODUCTION...3 2 SIMPLE SCENARIO SINGLE LINKPROOF WITH EXTERNAL SOA...3 3 MODIFYING DNS ON THE EXTERNAL SOA...4 3.1 REFERRING THE A RECORD RESOLUTION
More informationnetkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)
netkit lab load balancer dns Version Author(s) 1.2 Massimo Rimondini E-mail Web Description contact@netkit.org http://www.netkit.org/ A lab showing how to perform simple load balancing on a set of web
More informationWireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
More informationCopyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
More informationDNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
More informationDomain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
More informationLab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
More informationComputer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
More informationENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
More informationECE 4321 Computer Networks. Network Programming
ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationUnified Access Point Administrator s Guide
Page 1 Table of Contents Section 1 - About This Document...9 Document Organization... 9 Additional Documentation... 9 Document Conventions... 9 Online Help, Supported Browsers, and Limitations... 10 Section
More informationLab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
More informationLevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router
LevelOne WBR-3405TX 11g Wireless AP Router User`s Manual Contents 1. Overview...4 1.1 Product Feature...4 1.2 System Requirements...4 1.3 Applications...4 2. Getting Start...5 2.1 Know the 11g Wireless
More informationMikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationWifi Web Server Module w TF Socket User s Guide
Wifi Web Server Module w TF Socket User s Guide 2004-2010 Sure Electronics Inc. MB-CM14117_Ver1.0 WIFI WEB SERVER MODULE W TF SOCKET USER S GUIDE Table of Contents Chapter 1. Overview...1 1.1 Overview...
More informationBasic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
More informationRuckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationConfiguring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationINTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationNetworking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
More informationPT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
More informationNokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
More informationSavvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
More informationConfiguring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
More informationHow To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationAbout Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa mark@jumpingbean.co.za
IPv6 & Linux About Me Work at Jumping Bean Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa mark@jumpingbean.co.za Goals & Motivation Why? Why IPv6? Why this talk? Information on
More informationSI455 Advanced Computer Networking. Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class
SI455 Advanced Computer Networking Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class WHAT TO HAND IN: 1. Completed checklist from the last page of this document 2. 2-4 page write-up
More informationPre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationIP Address, Domain and Hostname for IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1)
IP Address, Domain and Hostname for IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1) November 28, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San
More informationHome Linux Networking Lab (202) This Howto shows how to recreate the CIS Lab environment at home.
Liinux Howttos Home Liinux Nettworrkiing Lab ((202)) CIIS 192 Sprriing 2010 Home Linux Networking Lab (202) This Howto shows how to recreate the CIS Lab environment at home. Supplies: A fast PC 2 GB memory
More informationAPNIC IPv6 Deployment
APNIC IPv6 Deployment Ulaanbaatar, Mongolia 19 October 2015 Issue Date: Revision: Overview Deployment motivation Network deployment IPv6 Services deployment IPv6 Anycast service IPv6 Cloud service Summary
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationDeploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
More informationInstalling and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationLab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
More informationIntegrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
More informationDNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
More informationInterconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationChapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
More informationWiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
More informationDomain Name Server. Training Division National Informatics Centre New Delhi
Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations
More informationHow To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
More informationChapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
More informationConfiguring WAN Failover with a Cisco 881 Router and an AirLink ES440
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440 When the AirLink ES440 is combined with a third-party router, the combined solution supports business continuity by providing primary
More informationConnecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
More informationDSA-1000 / PRT-1000 Device Server / Thermal Printer
LevelOne DSA-1000 / PRT-1000 Device Server / Thermal Printer User Manual V2.0 TABLE OF CONTENTS 1. INTRODUCTION...- 3-2. DEVICE OVERVIEW...- 7-3. HARDWARE SETUP...- 10-4. SYSTEM CONFIGURATION...- 12 -,
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationCisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
More information