3. What happens if we have 2 unique files file1 file2 and we type mv file1 file2, what happens to:

Size: px
Start display at page:

Download "3. What happens if we have 2 unique files file1 file2 and we type mv file1 file2, what happens to:"

Transcription

1 Prelab 1 Introduction to Linux 1. Review the Linux man pages for chmod, cp, hosts, kill, ls, man, more, mkdir, mv, ping, pwd, rm, rmdir, and tcpdump at Question Sheet for Prelab 1 1. What will happen if you type man man on a machine with a Linux/Unix/Darwin kernel? 2. How can you use the command ls to find out about the size of the file /etc/lilo.con? 3. What happens if we have 2 unique files file1 file2 and we type mv file1 file2, what happens to: a. file1 b. file2 c. mv is calling what commands in this example? 4. What is the command that you issue if you are in directory / and want to copy the file /mydata to directory /labdata? 5. What is the command that you issue if you are in directory / and want to copy all files and directories under /mydirectory to directory /newdirectory? 6. What happens when you type rm * in a directory? 7. What is the command used to delete all files and directories under the directory /mydirectory? 8. Give the command for compressing a directory mydirectory for both tar and zip formats.

2 LAB ONE: Introduction to Linux and Equipment 2 LAB 1: Introduction to Linux In this lab you will familiarize yourself with the lab equipment, i.e., Linux PCs and Cisco switches, as well as some network management tools. NOTE: Remember to reboot the machines before using them by either using the GNOME reboot option or typing reboot in the terminal as root. If you fail to reboot, system settings will linger from the previous users session. NOTE: Please submit file is the standard format: Lab[#]-Ex[#]-[part][#]-PC[#]-command Example: Lab1-Ex2-A1-PC1-ls You should save all files to the Desktop, then either use the GUI to move files or terminal to your USB device once mounted. Network Setup FOR LAB 1 Connect the PCs according to the diagram below to a single switch. Note: do not use port 24 on the switches as it has been configured to behave differently from the other ports you will find out about this in later labs. 1.1 Topology for Lab 1 The table below contains the IP address for each of the Linux PCs; these should be preconfigured: PC IP address of eth0 PC /24 PC /24 PC /24 PC /24-2 -

3 LAB ONE: Introduction to Linux and Equipment 3 Exercise 1 PART A: Setting up The Network Refer to the diagram above to see what the network looks like: A.1: Connect each PC s eth0 port to an associated port on the switch (any port will do for this exercise). A.2: Make sure eth0 is up on each PC by typing in the terminal: ifconfig eth0 This will bring up configuration information about eth0 only. Verify that the ipv4 address is the same as the one shown in the table above. PART B: Testing Connectivity After being connected, all four hosts (Linux PCs) should be able to communicate with each other: B.1: We will use ping to test connectivity between the PCs. B.2. On PC1 issue pings to PC2, PC3, and PC4 by typing: PC1% ping c (Ping to PC2) PC1% ping c (Ping to PC3) PC1% ping c (Ping to PC4) If the ping command fails, make sure to verify that the networking cables are inserted correctly, and ifconfig displays the correct information. Use the KVM switch to switch between PC s (The KVM has 4 LED s and Buttons, each for representing a PC). Save Data: B.3: On PC3 issue pings as you did before to PC1, PC2, and PC4. Exercise 2: Learning Linux Before starting this lab, you should be familiar with the following commands: man pwd ls more tcpdump less mv cp rm mkdir rmdir cat chmod (p)kill ping cd PART A: Familiarizing with Commands The goal of this section is to acquaint yourself with the Linux command line by executing common tasks. Some of the tasks may require multiple commands to complete: A.1: Change to the home directory of root. A.2: Make a directory called test in the directory you just entered. A.3: Copy the file /etc/hosts to the test directory just created. A.4: Change the current directory to test. A.5: Change the name of the file hosts to oldhosts. A.6: Change the permissions on the file such that other users can read but not write to it. A.7: Issue the command ls la and save the output to a file. (part B shows how to use redirection otherwise copy and paste) A.8: Remove all files in directory test. A.9: Remove the directory test

4 LAB ONE: Introduction to Linux and Equipment 4 PART B: Saving Data In the Terminal This section will show you how to save output into a text file for review at a later date: B.1: There are several operators that help modify files. The most common are >>, >, and (pipe). We will be using pipe since it is the most convenient way to redirect one command soutput to another command s input. You can use pipe to send data to another program on the command line, for example to save a text file from a list command: PC% ls tee filename This lists a directory and uses the tee program that opens the file write operator taking input from the standard output of ls and outputting it to the filename from the standard out of each program. Use this to save any data from commands on the command line that you need. B.2: Data can also be saved from the terminal through by cutting and pasting. Highlight information and hit Shift- Ctrl-C, then paste into a text editor with Ctrl-V. Gedit is the GNOME Text Editor and can be run from the GUI main menu or by typing gedit in a terminal window. You can use the & after the command to run it in the background (this means that you can continue to use the same terminal while gedit is running.) B.3: Save the output of the command ls l /usr. PART C: Saving/Copying Files to USB Drive This section will show you how to mount a USB drive in Linux and how to save your files to it. NOTE: Only read the section for the storage method you choose. USB Drive: The process to mount a USB drive is similar to a floppy but requires a little more work at the beginning. After setup it is just a matter of mounting the drive. C.5: First you need to make a directory to mount the USB drive to (assuming it doesn t already exist): PC1% mkdir ~/Desktop/USB PC1% chmod 700 ~/Desktop/USB C.6: Mounting: Now we can mount the drive: PC1% mount /media/nameofusb ~/Desktop/USB That s it! The USB drive should be accessible with all file manipulation commands. NOTE: With most USB drives, Linux will auto-mount, and an icon will appear on the desktop allowing access to the USB drive. Exercise 3: Locating configuration files in Linux In this section a few configuration files will be used to explore the ability to change environment variables in Linux. PART A: Using the more Command - 4 -

5 LAB ONE: Introduction to Linux and Equipment 5 A.1: On PC1 use the more command to look at the following files (DO NOT change these files). Save these files for your lab report. You can either use the cp command or pipe cat to a file. /etc/hosts /etc/sysconfig/network /etc/sysconfig/network-scripts/ifcfg-lo /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/sysconfig/network-scripts/ifcfg-eth1 BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 3.1 Which file is used to set the hostname for the Linux PC? What variable is used to set the hostname? 3.2 What is the purpose of the /etc/hosts file? 3.3 Which file is used to configure the IP address of interface eth0? What variable is used to set the IP address? Exercise 4: The Ping command The ping command lets you debug IP networks by sending an ICMP echo request datagram to a remote interface and waiting for an ICMP echo Reply in return. In this way the ping command will discover the distance to the host (measured in time) and other essential information (for example, whether or not the host can be reached). PART A: Issuing a Ping command Save the output of the commands used for your lab report. A.1: On PC1 send five ping messages to PC2 using: PC1% ping c A.2: On PC2, issue a ping with 5 packets (as before) to PC1 A.3: On PC2 issue a ping as before, to the loopback interface, BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 4.1 Include the output of the ping commands 4.2 Explain the difference between Ethernet interfaces and the loopback interface. I.e. what is the difference between pinging and What are possible uses of the loopback interface? Exercise 5: Using tcpdump Tcpdump allows you to capture traffic on a network and display the packet headers of the captured traffic. It can be used to identify network problems or to monitor network activities. PART A: Simple tcpdump exercise Use tcpdump to observe the network traffic that is generated by issuing ping commands. A.1: On PC1 start tcpdump (saving the output for your lab report) so that it monitors all packets that contain the IP address of PC2 by typing PC1% tcpdump n host A.2: Open a new terminal window and execute a ping command to PC2-5 -

6 LAB ONE: Introduction to Linux and Equipment 6 PC1% ping c NOTE: If you use the tee or tail commands to simultaneously view and save the output from tcpdump, you need to use the l option of tcpdump. The n removes name resolution while l buffers output, this allows for redirecting tcpdump seamlessly. For example, tcpdump n l > filename & tail f filename tcpdump n l tee filename It may be necessary to press Ctrl-C to terminate the tcpdump session. It may sometimes be best to simply redirect the output of tcpdump straight to a file (e.g. tcpdump > filename) and view it afterward with the more command or a text editor. PART B: Another tcpdump traffic capture B.1: On PC1, issue a ping to the nonexistent IP address Save the output for your lab report (you will need to capture stderr). PC1% ping c On PC3, start with the n option: tcpdump n. B.2: Issue a ping (saving the output for your lab report) to the broadcast address using the command: PC3% ping c 1 b BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 5.1 Include the saved files from Part A and B of Exercise Interpret the results captured in the saved files. 5.3 How many of the Linux PCs responded to the broadcast ping? Exercise 6: Using Wireshark Wireshark is a program that allows you to examine captured packets across a network and analyze them interactively. Wireshark is available for free download at There is documentation available on that site, and a tutorial and tips for how to effectively use Wireshark (formerly Ethereal) can also be found at PART A: Running Wireshark A.1: On PC1: Open a terminal window type wireshark &. This will open the wireshark GUI window and allow you to use the terminal window for other purposes. A.2: Selecting Capture Options: In Wireshark: Step 1: Go to Capture: Options (close pop-up first) Step 2: A display will pop up with Wireshark Capture Options as the title Step 3: Select eth0 in Interface Step 4: Select Capture packets in promiscuous mode Step 5: Select Update list of packets in real time Step 6: Select Automatic scrolling in live capture Step 7: Select Hide Capture info dialog Step 8: Unselect Enable MAC name resolution - 6 -

7 LAB ONE: Introduction to Linux and Equipment 7 Step 9: Unselect Enable network name resolution Step 10: Unselect Enable transport name resolution Step 11: Click Start (wireshark is now running and capturing packets) NOTE: Use these settings for every lab and every time you use Wireshark aside from the interface and filter. KEEP WIRESHARK OPEN, DO NOT CLOSE. PART B: Capture Packets with Wireshark B.1: Wireshark is now running and data needs to be collected (You may have seen some packets from the loopback interface and Cisco protocols being sent across the network). On PC1: PC1% ping c B.2: We can view detailed information about a packet, so choose one that is of type ICMP and click it. You will see all of the packet information (expandable) in the bottom two frames. B.3: Stop the traffic capture by hitting the stop button in the Wireshark Capture window. B.4: Save the data in Wireshark as a text file by: 1- Going to File menu, and selecting the Print option 2- Print selecting the following Format: A)Plain Text option, B)Select Output to File: and input a file name with the FULL path C) Select Packet Summary Line D) Deselect Packet Details. E)Then hit the Print button. The file should now be saved. NOTE: When saving wireshark data in future labs save using Packet Summary Line, unless asked otherwise. BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 6.1 Include the captured data from the wireshark experiment in the lab report

8 LAB ONE: Introduction to Linux and Equipment 8 REMEMBER TO COPY SAVED FILES TO YOUR USB DRIVE OR FLOPPY! LAB REPORT Exercise 3 Questions: Using the files from the exercise explain and answer the following questions: 3.1 Which file is used to set the hostname for the Linux PC? 3.2 What is the purpose of the /etc/hosts file? 3.3 Which file is used to configure the IP address of interface eth0? What variable is used to set the IP address? Exercise 4 Questions: 4.1 Explain the difference between Ethernet interfaces and the loopback interface. I.e. what is the difference between pinging and What are possible uses of the loopback interface? Exercise 5 Questions: 5.1 Explain what happened when you attempted to ping What packets would you expect to find in a capture, what packets would you expect not to find? 5.2 How many of the Linux PCs responded to the broadcast ping? Include the packet captured lines which support your statement. Make sure to include all saved files with this report

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Lab 4 Domain Name System - DNS CMPE 150

Lab 4 Domain Name System - DNS CMPE 150 Lab 4 Domain Name System - DNS CMPE 150 Lab Report Reports must be written and submitted individually as PDFs. Submission Instructions: Submit your report on the ecommons by 11:55 PM on the day of your

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

INTRODUCTION. Version 6c, May 16 th, 2003. -updated numbering of Figures 28, 31 0-1. Deleted: March

INTRODUCTION. Version 6c, May 16 th, 2003. -updated numbering of Figures 28, 31 0-1. Deleted: March INTRODUCTION The Internet Lab is a miniature version of the Internet. Instead of millions of hosts and routers, the Internet Lab has only four routers, four personal computers (PCs), and a few Ethernet

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Lab 8.3.2 Conducting a Network Capture with Wireshark

Lab 8.3.2 Conducting a Network Capture with Wireshark Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source list C Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Capture and analysis of the network traffic with Wireshark

Capture and analysis of the network traffic with Wireshark Capture and analysis of the network traffic with Wireshark Lab Objectives Understanding the purpose of Wireshark Studying configuration settings and capture options of Wireshark Studying Wireshark filters

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Packet Sniffing with Wireshark and Tcpdump

Packet Sniffing with Wireshark and Tcpdump Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security

More information

Introduction to Mac OS X

Introduction to Mac OS X Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the

More information

Tutorial 0A Programming on the command line

Tutorial 0A Programming on the command line Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple

More information

Command Line Crash Course For Unix

Command Line Crash Course For Unix Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

Host Configuration (Linux)

Host Configuration (Linux) : Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support

More information

Server Configuration. Server Configuration Settings CHAPTER

Server Configuration. Server Configuration Settings CHAPTER CHAPTER 2 This chapter contains information on the following topics: Settings, page 2-1 Finding a Server, page 2-4 Configuring a Server, page 2-5 Deleting a Server, page 2-6 Related Topics, page 2-8 Settings

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

New Lab Intro to KDE Terminal Konsole

New Lab Intro to KDE Terminal Konsole New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line

More information

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system

More information

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful

More information

Information Security Training. Assignment 1 Networking

Information Security Training. Assignment 1 Networking Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.

More information

SNMP Upgrade Procedure for NV Transmitters

SNMP Upgrade Procedure for NV Transmitters SNMP Upgrade Procedure for NV Transmitters IS09019C Issue 1.0...26 November 2010 Nautel Limited 10089 Peggy's Cove Road, Hackett's Cove, NS, Canada B3Z 3J4 T.877 6 nautel (628835) or +1.902.823.2233 F.+1.902.823.3183

More information

CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab

CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab This guide provide guidance on critical steps on using VirtualBox to setup a virtual machine (VM) on configure external (internet

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Red Hat Linux Networking

Red Hat Linux Networking The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

APPLICATION NOTE. How to build pylon applications for ARM

APPLICATION NOTE. How to build pylon applications for ARM APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

QOS 8 High-Speed RAID System Guide

QOS 8 High-Speed RAID System Guide QOS 8 High-Speed RAID System Guide Not for Redistribution 1 Introduction The QOS is a standalone storage array, part of a file- based workflow involving numerous users sharing the same files in real time.

More information

Lab assignment #1 Firewall operation and Access Control Lists

Lab assignment #1 Firewall operation and Access Control Lists University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall

More information

Capture and analysis of 802.11 wireless traffic

Capture and analysis of 802.11 wireless traffic Capture and analysis of 802.11 wireless traffic October 2012 Ver. 1.00 Copyright Connect One Ltd., 2008-2012 The information in this document is subject to change without notice and shall not be construed

More information

INASP: Effective Network Management Workshops

INASP: Effective Network Management Workshops INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network

More information

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course

More information

Raspberry Pi Setup Tutorial

Raspberry Pi Setup Tutorial Raspberry Pi Setup Tutorial The Raspberry Pi is basically a miniature linux- based computer. It has an ARM processor on it, specifically the ARM1176JZF- S 700 MHz processor. This is the main reason why

More information

10.3.1.8 Lab - Configure a Windows 7 Firewall

10.3.1.8 Lab - Configure a Windows 7 Firewall 5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

Assignment 3 Firewalls

Assignment 3 Firewalls LEIC/MEIC - IST Alameda ONLY For ALAMEDA LAB equipment Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment

More information

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Linux Development Environment Description Based on VirtualBox Structure

Linux Development Environment Description Based on VirtualBox Structure Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At

More information

Tcpdump Lab: Wired Network Traffic Sniffing

Tcpdump Lab: Wired Network Traffic Sniffing Cyber Forensics Laboratory 1 Tcpdump Lab: Wired Network Traffic Sniffing Copyright c 2012 Hui Li and Xinwen Fu, University of Massachusetts Lowell Permission is granted to copy, distribute and/or modify

More information

CS 103 Lab Linux and Virtual Machines

CS 103 Lab Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation

More information

User Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3

User Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3 User Manual Table of Contents 1 ) Introduction Page 2 2 ) PNY Flash drive 2.0 Series Specification Page 3 3 ) Driver Installation (Win 98 / 98 SE) Page 4 4 ) Driver Installation (Win ME / 2000 / XP) Page

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,

More information

mypro Installation and Handling Manual Version: 7

mypro Installation and Handling Manual Version: 7 mypro Installation and Handling Manual Version: 7 Date: JAN 2016 Thank you for using mypro on your PC. myscada is a full featured HMI/SCADA system with advanced options such as vector graphics views, advanced

More information

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2

More information

Command Line - Part 1

Command Line - Part 1 Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces

More information

Setting up VNC, SAMBA and SSH on Ubuntu Linux PCs Getting More Benefit out of Your Local Area Network

Setting up VNC, SAMBA and SSH on Ubuntu Linux PCs Getting More Benefit out of Your Local Area Network What Are These Programs? VNC (Virtual Network Computing) is a networking application that allows one computer's screen to be viewed by, and optionally controlled by one or more other computers through

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24 Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

More information

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide

More information

ML310 VxWorks QuickStart Tutorial. Note: Screen shots in this acrobat file appear best when Acrobat Magnification is set to 133.3%

ML310 VxWorks QuickStart Tutorial. Note: Screen shots in this acrobat file appear best when Acrobat Magnification is set to 133.3% ML30 VxWorks QuickStart Tutorial Note: Screen shots in this acrobat file appear best when Acrobat Magnification is set to 33.3% Overview Setup Boot ROM with VxWorks Hardware and Software ACE file Target

More information

How to Configure Windows Firewall on a Single Computer

How to Configure Windows Firewall on a Single Computer Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and

More information

Installing and Using Wireshark for Capturing Network Traffic

Installing and Using Wireshark for Capturing Network Traffic Installing and Using Wireshark for Capturing Network Traffic These instructions are written for using a Windows computer, but are mostly valid for a Linux/Apple environment too. In order to better troubleshoot

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

Cloud Storage Quick Start Guide

Cloud Storage Quick Start Guide Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.

More information

Introduction to the UNIX Operating System and Open Windows Desktop Environment

Introduction to the UNIX Operating System and Open Windows Desktop Environment Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks CTC Union Technologies Co., Ltd. Far Eastern Vienna Technology Center (Neihu Technology Park) 8F, No. 60 Zhouzi St. Neihu,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip

More information

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 [HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures

More information

Packet Sniffers. * Windows and Linux - Wireshark

Packet Sniffers. * Windows and Linux - Wireshark Packet Sniffers The following are tools that are either built in to the software or freeware that can be obtained from the website indicated. They are used by the corresponding Operating Systems. * Windows

More information

Remote Monitoring and Control of the R&S FSV with a Web Browser

Remote Monitoring and Control of the R&S FSV with a Web Browser Rohde & Schwarz Products: R&S FSV3, R&S FSV7, R&S FSV13, R&S FSV30 Remote Monitoring and Control of the R&S FSV with a Web Browser Application Note This application note describes remote operation or monitoring

More information

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Tutorial Guide to the IS Unix Service

Tutorial Guide to the IS Unix Service Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance

Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure the use of Cisco Intrusion

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

How to monitor network traffic inside an ESXi host

How to monitor network traffic inside an ESXi host created by: Rainer Bemsel Version 1.0 Dated: Dec/30/2012 I ve done several packet analyses on physical wired environment which was easy and pretty straight forward to set up. But with all virtualization

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information