3. What happens if we have 2 unique files file1 file2 and we type mv file1 file2, what happens to:
|
|
- Mitchell Woods
- 7 years ago
- Views:
Transcription
1 Prelab 1 Introduction to Linux 1. Review the Linux man pages for chmod, cp, hosts, kill, ls, man, more, mkdir, mv, ping, pwd, rm, rmdir, and tcpdump at Question Sheet for Prelab 1 1. What will happen if you type man man on a machine with a Linux/Unix/Darwin kernel? 2. How can you use the command ls to find out about the size of the file /etc/lilo.con? 3. What happens if we have 2 unique files file1 file2 and we type mv file1 file2, what happens to: a. file1 b. file2 c. mv is calling what commands in this example? 4. What is the command that you issue if you are in directory / and want to copy the file /mydata to directory /labdata? 5. What is the command that you issue if you are in directory / and want to copy all files and directories under /mydirectory to directory /newdirectory? 6. What happens when you type rm * in a directory? 7. What is the command used to delete all files and directories under the directory /mydirectory? 8. Give the command for compressing a directory mydirectory for both tar and zip formats.
2 LAB ONE: Introduction to Linux and Equipment 2 LAB 1: Introduction to Linux In this lab you will familiarize yourself with the lab equipment, i.e., Linux PCs and Cisco switches, as well as some network management tools. NOTE: Remember to reboot the machines before using them by either using the GNOME reboot option or typing reboot in the terminal as root. If you fail to reboot, system settings will linger from the previous users session. NOTE: Please submit file is the standard format: Lab[#]-Ex[#]-[part][#]-PC[#]-command Example: Lab1-Ex2-A1-PC1-ls You should save all files to the Desktop, then either use the GUI to move files or terminal to your USB device once mounted. Network Setup FOR LAB 1 Connect the PCs according to the diagram below to a single switch. Note: do not use port 24 on the switches as it has been configured to behave differently from the other ports you will find out about this in later labs. 1.1 Topology for Lab 1 The table below contains the IP address for each of the Linux PCs; these should be preconfigured: PC IP address of eth0 PC /24 PC /24 PC /24 PC /24-2 -
3 LAB ONE: Introduction to Linux and Equipment 3 Exercise 1 PART A: Setting up The Network Refer to the diagram above to see what the network looks like: A.1: Connect each PC s eth0 port to an associated port on the switch (any port will do for this exercise). A.2: Make sure eth0 is up on each PC by typing in the terminal: ifconfig eth0 This will bring up configuration information about eth0 only. Verify that the ipv4 address is the same as the one shown in the table above. PART B: Testing Connectivity After being connected, all four hosts (Linux PCs) should be able to communicate with each other: B.1: We will use ping to test connectivity between the PCs. B.2. On PC1 issue pings to PC2, PC3, and PC4 by typing: PC1% ping c (Ping to PC2) PC1% ping c (Ping to PC3) PC1% ping c (Ping to PC4) If the ping command fails, make sure to verify that the networking cables are inserted correctly, and ifconfig displays the correct information. Use the KVM switch to switch between PC s (The KVM has 4 LED s and Buttons, each for representing a PC). Save Data: B.3: On PC3 issue pings as you did before to PC1, PC2, and PC4. Exercise 2: Learning Linux Before starting this lab, you should be familiar with the following commands: man pwd ls more tcpdump less mv cp rm mkdir rmdir cat chmod (p)kill ping cd PART A: Familiarizing with Commands The goal of this section is to acquaint yourself with the Linux command line by executing common tasks. Some of the tasks may require multiple commands to complete: A.1: Change to the home directory of root. A.2: Make a directory called test in the directory you just entered. A.3: Copy the file /etc/hosts to the test directory just created. A.4: Change the current directory to test. A.5: Change the name of the file hosts to oldhosts. A.6: Change the permissions on the file such that other users can read but not write to it. A.7: Issue the command ls la and save the output to a file. (part B shows how to use redirection otherwise copy and paste) A.8: Remove all files in directory test. A.9: Remove the directory test
4 LAB ONE: Introduction to Linux and Equipment 4 PART B: Saving Data In the Terminal This section will show you how to save output into a text file for review at a later date: B.1: There are several operators that help modify files. The most common are >>, >, and (pipe). We will be using pipe since it is the most convenient way to redirect one command soutput to another command s input. You can use pipe to send data to another program on the command line, for example to save a text file from a list command: PC% ls tee filename This lists a directory and uses the tee program that opens the file write operator taking input from the standard output of ls and outputting it to the filename from the standard out of each program. Use this to save any data from commands on the command line that you need. B.2: Data can also be saved from the terminal through by cutting and pasting. Highlight information and hit Shift- Ctrl-C, then paste into a text editor with Ctrl-V. Gedit is the GNOME Text Editor and can be run from the GUI main menu or by typing gedit in a terminal window. You can use the & after the command to run it in the background (this means that you can continue to use the same terminal while gedit is running.) B.3: Save the output of the command ls l /usr. PART C: Saving/Copying Files to USB Drive This section will show you how to mount a USB drive in Linux and how to save your files to it. NOTE: Only read the section for the storage method you choose. USB Drive: The process to mount a USB drive is similar to a floppy but requires a little more work at the beginning. After setup it is just a matter of mounting the drive. C.5: First you need to make a directory to mount the USB drive to (assuming it doesn t already exist): PC1% mkdir ~/Desktop/USB PC1% chmod 700 ~/Desktop/USB C.6: Mounting: Now we can mount the drive: PC1% mount /media/nameofusb ~/Desktop/USB That s it! The USB drive should be accessible with all file manipulation commands. NOTE: With most USB drives, Linux will auto-mount, and an icon will appear on the desktop allowing access to the USB drive. Exercise 3: Locating configuration files in Linux In this section a few configuration files will be used to explore the ability to change environment variables in Linux. PART A: Using the more Command - 4 -
5 LAB ONE: Introduction to Linux and Equipment 5 A.1: On PC1 use the more command to look at the following files (DO NOT change these files). Save these files for your lab report. You can either use the cp command or pipe cat to a file. /etc/hosts /etc/sysconfig/network /etc/sysconfig/network-scripts/ifcfg-lo /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/sysconfig/network-scripts/ifcfg-eth1 BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 3.1 Which file is used to set the hostname for the Linux PC? What variable is used to set the hostname? 3.2 What is the purpose of the /etc/hosts file? 3.3 Which file is used to configure the IP address of interface eth0? What variable is used to set the IP address? Exercise 4: The Ping command The ping command lets you debug IP networks by sending an ICMP echo request datagram to a remote interface and waiting for an ICMP echo Reply in return. In this way the ping command will discover the distance to the host (measured in time) and other essential information (for example, whether or not the host can be reached). PART A: Issuing a Ping command Save the output of the commands used for your lab report. A.1: On PC1 send five ping messages to PC2 using: PC1% ping c A.2: On PC2, issue a ping with 5 packets (as before) to PC1 A.3: On PC2 issue a ping as before, to the loopback interface, BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 4.1 Include the output of the ping commands 4.2 Explain the difference between Ethernet interfaces and the loopback interface. I.e. what is the difference between pinging and What are possible uses of the loopback interface? Exercise 5: Using tcpdump Tcpdump allows you to capture traffic on a network and display the packet headers of the captured traffic. It can be used to identify network problems or to monitor network activities. PART A: Simple tcpdump exercise Use tcpdump to observe the network traffic that is generated by issuing ping commands. A.1: On PC1 start tcpdump (saving the output for your lab report) so that it monitors all packets that contain the IP address of PC2 by typing PC1% tcpdump n host A.2: Open a new terminal window and execute a ping command to PC2-5 -
6 LAB ONE: Introduction to Linux and Equipment 6 PC1% ping c NOTE: If you use the tee or tail commands to simultaneously view and save the output from tcpdump, you need to use the l option of tcpdump. The n removes name resolution while l buffers output, this allows for redirecting tcpdump seamlessly. For example, tcpdump n l > filename & tail f filename tcpdump n l tee filename It may be necessary to press Ctrl-C to terminate the tcpdump session. It may sometimes be best to simply redirect the output of tcpdump straight to a file (e.g. tcpdump > filename) and view it afterward with the more command or a text editor. PART B: Another tcpdump traffic capture B.1: On PC1, issue a ping to the nonexistent IP address Save the output for your lab report (you will need to capture stderr). PC1% ping c On PC3, start with the n option: tcpdump n. B.2: Issue a ping (saving the output for your lab report) to the broadcast address using the command: PC3% ping c 1 b BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 5.1 Include the saved files from Part A and B of Exercise Interpret the results captured in the saved files. 5.3 How many of the Linux PCs responded to the broadcast ping? Exercise 6: Using Wireshark Wireshark is a program that allows you to examine captured packets across a network and analyze them interactively. Wireshark is available for free download at There is documentation available on that site, and a tutorial and tips for how to effectively use Wireshark (formerly Ethereal) can also be found at PART A: Running Wireshark A.1: On PC1: Open a terminal window type wireshark &. This will open the wireshark GUI window and allow you to use the terminal window for other purposes. A.2: Selecting Capture Options: In Wireshark: Step 1: Go to Capture: Options (close pop-up first) Step 2: A display will pop up with Wireshark Capture Options as the title Step 3: Select eth0 in Interface Step 4: Select Capture packets in promiscuous mode Step 5: Select Update list of packets in real time Step 6: Select Automatic scrolling in live capture Step 7: Select Hide Capture info dialog Step 8: Unselect Enable MAC name resolution - 6 -
7 LAB ONE: Introduction to Linux and Equipment 7 Step 9: Unselect Enable network name resolution Step 10: Unselect Enable transport name resolution Step 11: Click Start (wireshark is now running and capturing packets) NOTE: Use these settings for every lab and every time you use Wireshark aside from the interface and filter. KEEP WIRESHARK OPEN, DO NOT CLOSE. PART B: Capture Packets with Wireshark B.1: Wireshark is now running and data needs to be collected (You may have seen some packets from the loopback interface and Cisco protocols being sent across the network). On PC1: PC1% ping c B.2: We can view detailed information about a packet, so choose one that is of type ICMP and click it. You will see all of the packet information (expandable) in the bottom two frames. B.3: Stop the traffic capture by hitting the stop button in the Wireshark Capture window. B.4: Save the data in Wireshark as a text file by: 1- Going to File menu, and selecting the Print option 2- Print selecting the following Format: A)Plain Text option, B)Select Output to File: and input a file name with the FULL path C) Select Packet Summary Line D) Deselect Packet Details. E)Then hit the Print button. The file should now be saved. NOTE: When saving wireshark data in future labs save using Packet Summary Line, unless asked otherwise. BEFORE MOVING ON: Make sure that you have the data you need to be able to answer the following question: 6.1 Include the captured data from the wireshark experiment in the lab report
8 LAB ONE: Introduction to Linux and Equipment 8 REMEMBER TO COPY SAVED FILES TO YOUR USB DRIVE OR FLOPPY! LAB REPORT Exercise 3 Questions: Using the files from the exercise explain and answer the following questions: 3.1 Which file is used to set the hostname for the Linux PC? 3.2 What is the purpose of the /etc/hosts file? 3.3 Which file is used to configure the IP address of interface eth0? What variable is used to set the IP address? Exercise 4 Questions: 4.1 Explain the difference between Ethernet interfaces and the loopback interface. I.e. what is the difference between pinging and What are possible uses of the loopback interface? Exercise 5 Questions: 5.1 Explain what happened when you attempted to ping What packets would you expect to find in a capture, what packets would you expect not to find? 5.2 How many of the Linux PCs responded to the broadcast ping? Include the packet captured lines which support your statement. Make sure to include all saved files with this report
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationLab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
More informationICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationLab 4 Domain Name System - DNS CMPE 150
Lab 4 Domain Name System - DNS CMPE 150 Lab Report Reports must be written and submitted individually as PDFs. Submission Instructions: Submit your report on the ecommons by 11:55 PM on the day of your
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationINTRODUCTION. Version 6c, May 16 th, 2003. -updated numbering of Figures 28, 31 0-1. Deleted: March
INTRODUCTION The Internet Lab is a miniature version of the Internet. Instead of millions of hosts and routers, the Internet Lab has only four routers, four personal computers (PCs), and a few Ethernet
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationLab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationCCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
More informationSample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationLinux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationCapture and analysis of the network traffic with Wireshark
Capture and analysis of the network traffic with Wireshark Lab Objectives Understanding the purpose of Wireshark Studying configuration settings and capture options of Wireshark Studying Wireshark filters
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationPacket Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
More informationIntroduction to Mac OS X
Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationCommand Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
More informationSmoking and any food or drinks are not permitted in the Applications Lab!
220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks
More informationHost Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
More informationServer Configuration. Server Configuration Settings CHAPTER
CHAPTER 2 This chapter contains information on the following topics: Settings, page 2-1 Finding a Server, page 2-4 Configuring a Server, page 2-5 Deleting a Server, page 2-6 Related Topics, page 2-8 Settings
More informationHomework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
More informationNew Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
More informationInstalling Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationIntrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
More informationPractical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationPre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
More informationLinux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
More informationInformation Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
More informationMoxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More information6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.
More informationSNMP Upgrade Procedure for NV Transmitters
SNMP Upgrade Procedure for NV Transmitters IS09019C Issue 1.0...26 November 2010 Nautel Limited 10089 Peggy's Cove Road, Hackett's Cove, NS, Canada B3Z 3J4 T.877 6 nautel (628835) or +1.902.823.2233 F.+1.902.823.3183
More informationCS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab
CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab This guide provide guidance on critical steps on using VirtualBox to setup a virtual machine (VM) on configure external (internet
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
More informationAllworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationRed Hat Linux Networking
The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationAPPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
More informationExercise 4 MPLS router configuration
Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.
More informationQOS 8 High-Speed RAID System Guide
QOS 8 High-Speed RAID System Guide Not for Redistribution 1 Introduction The QOS is a standalone storage array, part of a file- based workflow involving numerous users sharing the same files in real time.
More informationLab assignment #1 Firewall operation and Access Control Lists
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall
More informationCapture and analysis of 802.11 wireless traffic
Capture and analysis of 802.11 wireless traffic October 2012 Ver. 1.00 Copyright Connect One Ltd., 2008-2012 The information in this document is subject to change without notice and shall not be construed
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More informationSnoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points
Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course
More informationRaspberry Pi Setup Tutorial
Raspberry Pi Setup Tutorial The Raspberry Pi is basically a miniature linux- based computer. It has an ARM processor on it, specifically the ARM1176JZF- S 700 MHz processor. This is the main reason why
More information10.3.1.8 Lab - Configure a Windows 7 Firewall
5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two
More informationWinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
More informationAssignment 3 Firewalls
LEIC/MEIC - IST Alameda ONLY For ALAMEDA LAB equipment Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment
More informationLab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network
Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationLinux Development Environment Description Based on VirtualBox Structure
Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At
More informationTcpdump Lab: Wired Network Traffic Sniffing
Cyber Forensics Laboratory 1 Tcpdump Lab: Wired Network Traffic Sniffing Copyright c 2012 Hui Li and Xinwen Fu, University of Massachusetts Lowell Permission is granted to copy, distribute and/or modify
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationUser Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3
User Manual Table of Contents 1 ) Introduction Page 2 2 ) PNY Flash drive 2.0 Series Specification Page 3 3 ) Driver Installation (Win 98 / 98 SE) Page 4 4 ) Driver Installation (Win ME / 2000 / XP) Page
More informationIntroduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
More informationR&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement
I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,
More informationmypro Installation and Handling Manual Version: 7
mypro Installation and Handling Manual Version: 7 Date: JAN 2016 Thank you for using mypro on your PC. myscada is a full featured HMI/SCADA system with advanced options such as vector graphics views, advanced
More informationUnix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
More informationCommand Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
More informationSetting up VNC, SAMBA and SSH on Ubuntu Linux PCs Getting More Benefit out of Your Local Area Network
What Are These Programs? VNC (Virtual Network Computing) is a networking application that allows one computer's screen to be viewed by, and optionally controlled by one or more other computers through
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationLab assignment #2 IPSec and VPN Tunnels (Document version 1.1)
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources
More informationDuring your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationML310 VxWorks QuickStart Tutorial. Note: Screen shots in this acrobat file appear best when Acrobat Magnification is set to 133.3%
ML30 VxWorks QuickStart Tutorial Note: Screen shots in this acrobat file appear best when Acrobat Magnification is set to 33.3% Overview Setup Boot ROM with VxWorks Hardware and Software ACE file Target
More informationHow to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
More informationInstalling and Using Wireshark for Capturing Network Traffic
Installing and Using Wireshark for Capturing Network Traffic These instructions are written for using a Windows computer, but are mostly valid for a Linux/Apple environment too. In order to better troubleshoot
More information24 Port Gigabit Ethernet Web Smart Switch. Users Manual
24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------
More informationCloud Storage Quick Start Guide
Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.
More informationIntroduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationHow To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
More informationUSER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks
USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks CTC Union Technologies Co., Ltd. Far Eastern Vienna Technology Center (Neihu Technology Park) 8F, No. 60 Zhouzi St. Neihu,
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationTutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired
Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip
More information[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
More informationPacket Sniffers. * Windows and Linux - Wireshark
Packet Sniffers The following are tools that are either built in to the software or freeware that can be obtained from the website indicated. They are used by the corresponding Operating Systems. * Windows
More informationRemote Monitoring and Control of the R&S FSV with a Web Browser
Rohde & Schwarz Products: R&S FSV3, R&S FSV7, R&S FSV13, R&S FSV30 Remote Monitoring and Control of the R&S FSV with a Web Browser Application Note This application note describes remote operation or monitoring
More informationR&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement
I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationConfigure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
More informationLab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure the use of Cisco Intrusion
More informationEINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
More informationCET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationHow to monitor network traffic inside an ESXi host
created by: Rainer Bemsel Version 1.0 Dated: Dec/30/2012 I ve done several packet analyses on physical wired environment which was easy and pretty straight forward to set up. But with all virtualization
More informationNetwork Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
More information