2.2 File Systems. 2.1 (VDE) Virtual Distributed Ethernet

Size: px
Start display at page:

Download "2.2 File Systems. 2.1 (VDE) Virtual Distributed Ethernet"

Transcription

1 Teaching Operating Systems Administration with User Mode Linux Renzo Davoli Department of Computer Science University of Bologna - Italy renzo@cs.unibo.it ABSTRACT User Mode Linux is a virtual machine running on a GNU- Linux operating system. It is the right choice for teaching operating systems administration, as it does not need any dedicated hardware. It runs at user level (no need for root, i.e. administrator, access or possible security threats) and it does not have the performance problems of an emulator. This paper describes how to set up a laboratory for teaching operating systems administration. Categories and Subject Descriptors D.4.0 [Operating Systems]: General; D.4.6 [Operating Systems]: Security and ProtectionAccess controls; D.4.3 [Operating Systems]: File Systems Management; D.4.4 [Operating Systems]: Communications ManagementNetwork communication General Terms Experimentation, Performance, Security Keywords Teaching, Operating Systems, Administration, Virtual Machine, Security, Laboratory 1. INTRODUCTION Operating Systems is a very wide area in Computer Science, and there is no doubt that a good knowledge of O.S. is needed for any professional role in Information Technology and Computer Science. This paper focuses on the System Administration sector and, in Particular, on lab activities concerning administrative tools and procedures. There are proposals from many Universities to create specific courses in this field [20]. There are many examples in the literature of how to set up exercises and tools for many chapters in an Operating Systems syllabus. For instance, lab environment procedures Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ITiCSE 04, June 28 30, 2004, Leeds, United Kingdom. Copyright 2004 ACM /04/ $5.00. and software have been set up for teaching kernel development using hardware emulators [7, 2, 6, 5, 13, 11, 15, 10, 19] also using networked environments [3, 4]. There is also material on kernel developing teaching on bare hardware, using Minix [18] or the whole Linux kernel. All the laboratory activity related to the use of system calls and libraries or scripting does not require any special infrastructure except standard programming environments. On the other hand, far fewer proposals have been made for teaching O.S. administration. A laboratory environment to teach system administration can be based on: Hardware. This is an expensive choice in terms of technical staff activity, because of the need for a single machine per student, or group of students (or at least removable disk units). [1] It is not possible for students to work at home, unless they have or buy a suitable hardware unit, or work remotely on the laboratory machines. Network access should be provided for driver download or search for HOWTOs but, at the same time, students must have access to the bare hardware in order to install the kernel, so anonymous access and security threats are possible. If a single computer per student cannot be guaranteed there is no way to test the configuration of services realistically, because computers must be rebooted for other students to do their exercises. Hardware emulators [14, 16, 17, 22]. The cons of this choice consist in performance. It is possible, with Bochs and Qemu, to operate on operating systems not designed for the host machine CPU architecture, but the emulation phase can be computationally heavy. These emulators normally run at user level, but some of them (Plex86 and VmWare) have kernel modules to increase performance, thus reducing the security level of the system. Virtual Machines. This is an intermediate approach. It is efficient and safe: the interface between the virtual machine and the host operating system is at the system call layer and the entire virtual system can run in user mode and with standard user permissions. 2. DISCUSSION User Mode Linux [21, 8] (U-ML 1 ) is a virtual machine running on a GNU Linux Operating System. It has been 1 The standard acronym for User-Mode Linux would be 112

2 A VDE Switch B Real Network Host Computer Real Disk Figure 1: A schematic view of a GNU Linux workstation running two U-ML virtual machines implemented as a patch for the Linux kernel source code. By compiling the patched kernel for an architecture named um, the resulting code can be executed as a standard binary, instead of being an image for the system boot. When a U-ML kernel is executed (as a standard program of the host machine) it appears as if it were another Linux machine. After booting, showing the same set of messages that can be seen on the console of a real Linux machine, the user gets the login prompt. The processes of the U-ML machine are mapped onto processes of the host machine and there is no emulation in place. Only access to the hardware from inside the virtual machine is intercepted and processed by virtual devices. Each user is the administrator of his/her own U-ML virtual computer. Almost all the practices of a system administrator can be tested inside a U-ML machine that behaves exactly like a real computer. U-ML is a set of standard processes for the host machine, having neither special privileges nor the need to be executed in set-uid mode, nor having access to specific kernel modules. The execution of U-ML is as safe as the execution of any other user application [9]. It is also possible to compile new versions of U-ML kernels with different drivers and features. In the case of kernel software bugs or erroneous configurations that would lead to kernel panic on a real machine, there is just the abnormal termination of the U-ML processes. There is no damage to security or availability for other users logged onto the same host computer. U-ML has become a standard tool for Linux kernel developers. The following subsections give a short description of the U-ML virtual devices and their configuration for the OS Administration Lab. (See fig. 1) 2.1 (VDE) Virtual Distributed Ethernet U-ML provides different virtual network interfaces: ethertap, tuntap, daemon and slip. Ethertap and tuntap are interface modules to the corresponding modules of the host UML. In this paper U-ML is used instead of UML to avoid confusion with other acronyms widely used in Computer Science like Unified Modeling Language kernel. Root access or a setuid utility is required to activate network interface at the host server for Ethertap or tuntap. Slip emulates the Serial Line IP protocol. It can be used to emulate serial communication between U-ML machines, but a teaching environment based on slip interface would not be real world consistent: in the most common scenario, computers are interconnected by an Ethernet interface or remote computers using modems. Networks based on local interconnections of point-to-point serial lines between pairs of computers are quite rare. We have used the daemon interface: an Ethernet network is emulated locally using a local daemon. The local communication is based on UNIX domain sockets. We have created a new daemon named vde-switch (based on the uml-switch tool) [12] to work as a real GNU-Linux daemon also interfacing the virtual network to the host machine through the tuntap module. The host machine can then act as a router to interconnect the virtual network to the Internet. We have configured the IP-masquerading option so that each U-ML machine is connected to the Internet as a host within a private intranet network. Network clients running on U-ML virtual machines can communicate with the entire Internet, while servers are viewable only for other U-ML machines and for the host computer. Students U-ML processes have the same access permissions to the real network that are normally given to ordinary users. VDE is also compatible with the hardware emulator MPS. MPS is a tool that can be used by students to create their own kernel (as described in [15]). With VDE it is possible to interoperate between real linux boxes, U-ML virtual machines and MPS student created operating systems. The MPS machine could provide simple services, as they were embedded systems (e.g. domotics appliances). In this way it is possible to give students a vertical perspective. They will have tested and implemented educational samples of software at all levels: kernel, application, services. Moreover, each user can start other instances of vdeswitch and it is possible to create other virtual LANs. It is also possible to create vde-cables that interconnect local or remote vde-switches. Using the latter tool the student can join the virtual network at the University from home or a dormitory and test the services. Students can manage an entire virtual network on their own. A vde-cable consists of two vde-plug units interconnected by a double pipe. Any kind of character based on remote execution service works to join a remote vde-switch. We use ssh: a vde-cable with ssh works as a general purpose encrypted tunnel. Students can also test the support for ethernet compatible protocols not yet supported by their Internet providers (e.g. IPv6) at home. Please note that the method also works when one of the ends (usually the end at the student s home) is behind a NAT masked subnet. Figure 2 shows an example of virtual network that can be created using vde-switches and vde-cables. 2.2 File Systems Each file system of the U-ML virtual machine is normally mapped onto a single large file on the host computer. There are no special encodings or formats: the file is an image of the file-system which can be mounted by the loop option. There are two special file systems in U-ML: hostfs and Copy on Write (COW). Hostfs is used to access a subtree of the host computer file system, while COW is used to have 113

3 LAB COMPUTER A TUNTAP (routed to the world) LAB COMPUTER B (router) MPS STUDENT S PC TUNTAP as default route (all applications on this real computer are directly connected to the virtual network) Figure 2: An example of complex virtual network infrastructure read-write access to a read-only file system image, by writing modifications in a separate diff file. Obviously, from inside U-ML it is possible to mount network file systems. We have decided to use a standard image file for the root file system which is quite small, while /usr is mapped on a read-only shared image, opened in COW mode (see 3). The /usr file system in a real environment is quite large (several GBs), it is very expensive in terms of resources to give such large quotas of disk space to all the students. With our architecture one (or some) shared /usr standard disks are created by the TAs. All the students can mount the chosen /usr file system in read/write COW mode. Only the changes to the /usr shared image will be accounted in their disk quotas. 2.3 Terminals U-ML emulates serial terminals that can be connected to serial lines, pseudo terminals and xterm windows. It is also possible to interconnect the terminal lines of two U- ML virtual machines: they will behave as a pair of real computers interconnected by a serial line (e.g. a modem). 2.4 Exercises and organization of the class Several sets of exercises can be organized using our lab environment. The following is a non exhaustive list of possible assignments: Root level basic administration commands. startup and shutdown; user management (add/delete user, change the user s shell,...). log management (log analysis, storage of log files). Installation of application and services (getting the source, configure make, install, choice of the right path and organization). use of a GNU-Linux distribution. (Packet update and downgrade when needed, security updates). System Administration scripting (writing and testing of shell/perl/python scripts for system administration) installation and configuration of local network services: Configuration of IPv4 and IPv6 local network services. NIS and LDAP installation and test usage. Configuration and test of a network file system infrastructure. Centralized printing services. Tests on network management systems. installation and configuration of Internet services: Testing of IPv4 IPv6 DNS configurations for direct and reverse mapping. Http servers: virtual hosting, gci execution. FTP server: anonymous and authorized access. other services: News (nntp), irc,... Proxy services. installation and administration of routers (zebra). Tests on security issues: 114

4 NFS test Bob s UML mounts a subdir of Charlie s home directory A B C Student: Alice Student: Bob Student: Charlie / (root) / (root) / (root) COW DIFF /usr COW DIFF COW DIFF /home Charlie s Home dir on host Computer (using hostfs) Figure 3: An example of file system architecture used in the Lab. testing of iptables IP filtering and masquerading functions. IPsec implementation. installation of the ssl layer. testing of IDS and security auditing software (e.g. nessus) Kernel driver development, change and testing kernel configuration and compilation. installation/development of new drivers. Classes on system administration can be organized using a single path of exercises for all the students, or by creating the feeling of a project team. In the former case, the teacher decides a set of interesting experiments as a subset of the list above, and gives the specifications to the students. In the latter case, several groups manage different machines and carry on different projects, as each group is responsible for a service. Each approach has pros and cons: the former could lead to a higher probability of cheating, the latter an evaluation problem for grading different exercises. The experience can be exchanged either by organizing seminar lectures, where each group explains its implementation/configuration to the rest of the class, or by using reports to be published either on a web site or on a newsgroup. Students can realize the real-world consistency of their implementations. The teacher can also decide to interface the students virtual world to the real Internet (provided he/she trusts the services). In this way students will be able to receive s on their managed MTA or to show their web server. 3. CONCLUSIONS AND FURTHER DEVELOPMENTS The environment is very promising, the range of possible exercises is very wide and very valuable in terms of teaching aids. However, some system administration activities cannot be done on this U-ML lab, or the support has not been sufficiently tested. The basic installation of the entire O.S. is an example. U- ML starts from a kernel and then mounts a partition. Disk partitions are mapped onto separate files, there is no disk boot-block. For the same reason it is not possible (at least not yet possible) to make exercises on HD partitioning or tests on lilo. We already have a linux installation image: booting from that image the student can test a complete debian network installation on U-ML. Current implementation already makes some slight differences between a real machine and a virtual machine (e.g. the device names and a custom fdisk implementation). We are confident that we will be able to release this tool quite soon. We are studying solutions to also include exercises about practical aspects, administration and integration virtual systems based on other operating systems. However, there is a tradeoff between a tricky implementation on U-ML that could behave differently from a real computer, or a less efficient implementation on a hardware emulator, like Bochs or Qemu. In the former case, the student would use the same tool for the entire course or course module. In the latter, he/she has to learn how to use another tool. There are pros and cons to both approaches. We are studying fast emulation tools and techniques in order to create lab environments not only for exercises in system installation, but also to teach system ad- 115

5 ministration for proprietary closed operating systems. VDE interfaces for Bochs, Plex86 and qemu are still in the early stages of development. A feature that should be implemented on the vde-switch is support for 802.1q tagged networks. Students could learn how to create virtual LANs on emulated switches. We have not yet tested the use of multicast protocols. If the performances are well suited to the application, several other exercises could be assigned (e.g. on multimedia content delivery). Another interesting tool is modem emulation. It is already possible to interconnect two U-ML machines by an emulated serial line and PPP, but all the problems related to modem control commands and specific protocols cannot be tested. The development of an emulated modem able to use AT commands, maybe with a virtual PABX (each U- ML modem is connected to a specific phone number), would help in testing utilities like modem dialers (e.g. chat). The students can learn how to set up dial-in services like those given by Internet providers, or how to set up a service using dial-out lines. The infrastructure is also suitable for just about any type of exercise on computer networking. VDE code has been released under the GPL: students can implement their own switch with different characteristics (e.g. minimum spanning tree, that is not currently implemented on owr vdeswitch, or some kind of priority management, or even level 4 switching services). U-ML machines can work as routers, so students can test existing routing tools or implement their own. Phenomena like count-to-infinity or link state inconsistencies due to unstable lines can be implemented by hand. NAT subnetworks or firewalling techniques can be tested using a U-ML machine with several interfaces interconnected to several vde-switches. 4. ACKNOWLEDGMENTS I wish to thank dr. D Ascanio, who made preliminary tests on U-ML teaching Environments, and Mr. Cosimo Iaia, who is working to complete the Debian installation tool for U-ML. 5. REFERENCES [1] R. R. Adams and C. Erickson. Linux in education: Teaching system administration with linux. Linux Journal, [2] O. Babaoglu, M. Bussan, R. Drummond, and F. B. Schneider. Documentation for the chip computer system. Technical report, Department of Computer Science, Cornell University, [3] E. Carniani and R. Davoli. The netwire emulator: A tool for teaching and understanding networks. In ACM 6th Conference on Innovation and Technology in Computer Science Education, ITiCSE 2001, pages , Canterbury, England, [4] E. Carniani and R. Davoli. The netwire emulator: Teaching and understanding networks in both synthetic and real scenarios. In M. Roccetti, editor, Simulation Series, volume (34)1, pages SCS, Presented at the International Conference on Simulation and Multimedia in Engineering Education, ICSEE [5] W. A. Christopher, S. J. Procter, and T. E. Anderson. Nachos. [6] W. A. Christopher, S. J. Procter, and T. E. Anderson. The nachos instructional operating system. In USENIX Winter 1993 Conference Proceedings, Best Paper Award. [7] R. Davoli and M. Goldweber. New directions in operating systems courses using hardware simulators. In Proc. of International Conference on Simulation and Multimedia in Engineering Education (ICSEE), Orlando, [8] J. D. Dike. User-mode linux. In Proc. of 2001 Ottawa Linux Symposium (OLS), Ottawa, [9] J. D. Dike. Making linux safe for virtual machines. In Proc. of 2002 Ottawa Linux Symposium (OLS), Ottawa, [10] G. Fankhauser. A mips r3000 simulator. gfa/sim/simulator.html. [11] D. A. Holland, A. T. Lim, and M. I. Seltzer. A new instructional operating system. In ACM 33rd Technical Simposium on Computer Science Education SIGCSE 2002 Proceedings, pages , [12] King enzo ark programs. renzo/keap/. [13] J. Larus. Spim: a mips r2000/r3000 simulator. larus/spim.html. [14] K. Lawton. Bochs project home page. [15] M. Morsiani and R. Davoli. Learning operating system structure and implementation through the MPS computer system simulator. In Proceedings of the 30th SIGCSE Technical Symposium on Computer Science Education, pages 63 67, New Orleans, [16] T. plex86 Team. Plex86 project home page. [17] Qemu cpu emulator. [18] A. S. Tanenbaum and A. S. Woodhull. Operating Systems Design and Implementation. Prentice Hall, 2nd edition, [19] T. T. Team. Topsy - a teachable operating system. topsy. [20] R. Tompkins. A new twist on teaching system administration. In Proc. of USENIX Tenth System Administration Conference (LISA), Chicago, October [21] User-mode linux. [22] Vmware inc

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

EXPLORING LINUX KERNEL: THE EASY WAY!

EXPLORING LINUX KERNEL: THE EASY WAY! EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment

More information

3.14. 3.14 Training on Linux System Administration, LPI Certification Level 1

3.14. 3.14 Training on Linux System Administration, LPI Certification Level 1 165 3.14 Training on Linux System Administration, LPI Certification Level 1 Name of the Tool: Source: Usage: Description: GIZ This training has been designed for IT experts and institutions desired to

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Remote Unix Lab Environment (RULE)

Remote Unix Lab Environment (RULE) Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au

More information

An Embedded Wireless Mini-Server with Database Support

An Embedded Wireless Mini-Server with Database Support An Embedded Wireless Mini-Server with Database Support Hungchi Chang, Sy-Yen Kuo and Yennun Huang Department of Electrical Engineering National Taiwan University Taipei, Taiwan, R.O.C. Abstract Due to

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main

More information

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the

More information

Some Experiences in Using Virtual Machines for Teaching Computer Networks

Some Experiences in Using Virtual Machines for Teaching Computer Networks Some Experiences in Using Virtual Machines for Teaching Computer Networks Ricardo Nabhen and Carlos Maziero Pontifical Catholic University of Paraná Exact Sciences and Technology Center Curitiba PR, Brazil

More information

Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education

Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education Ji Hu hu@ti.uni-trier.de Christoph Meinel meinel@ti.uni-trier.de Michael Schmitt michael.schmitt@teststep.org ABSTRACT

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY

AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.

More information

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux.. RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Linux Operating System Security

Linux Operating System Security Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security

More information

A Virtual Laboratory for IT Security Education

A Virtual Laboratory for IT Security Education A Virtual Laboratory for IT Security Education Ji Hu, Dirk Cordel, Christoph Meinel FB IV Informatik Universitaet Trier D-54286 Trier, Germany {hu, cordel, meinel}@ti.uni-trier.de Abstract: Success of

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Starting a Management Session

Starting a Management Session Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007

More information

Configuring a Multi-Course Lab for System-Level Projects

Configuring a Multi-Course Lab for System-Level Projects Configuring a Multi-Course Lab for System-Level Projects Joel C Adams W David Laverell Department of Computer Science Calvin College Grand Rapids, MI 49546 1-616-526-8562 {adams, lave}@calvinedu ABSTRACT

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS

More information

SO114 - Solaris 10 OE Network Administration

SO114 - Solaris 10 OE Network Administration COURSE TITLE: SO114 - Solaris 10 OE Network Administration LENGTH: 40 Hours DESCRIPTION: This comprehensive course provides instruction on Solaris OE network administration. Students will be introduced

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: zklebic@openinformatics.net Configuring a Vyatta 4.0 release

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

In today s world the Internet has become a valuable resource for many people.

In today s world the Internet has become a valuable resource for many people. In today s world the Internet has become a valuable resource for many people. However with the benefits of being connected to the Internet there are certain risks that a user must take. In many cases people

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Load Balancing - Single Multipath Route HOWTO

Load Balancing - Single Multipath Route HOWTO Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing

More information

NETWORK EMULATION AND NETKIT

NETWORK EMULATION AND NETKIT NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia CLASS OBJECTIVES To understand what is meant by network

More information

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added

More information

Virtualization of Linux based computers: the Linux-VServer project

Virtualization of Linux based computers: the Linux-VServer project Virtualization of Linux based computers: the Linux-VServer project Benoît t des Ligneris, Ph. D. Benoit.des.Ligneris@RevolutionLinux.com Objectives: Objectives: 1) Present the available programs that can

More information

ISERink Installation Guide

ISERink Installation Guide ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to

More information

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,

More information

Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt

Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

IT6203 Systems & Network Administration. (Optional)

IT6203 Systems & Network Administration. (Optional) Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students

More information

Professional Xen Visualization

Professional Xen Visualization Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization

More information

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1 Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access

More information

Specialized Programme on Internetworking Design and LAN WAN Administration

Specialized Programme on Internetworking Design and LAN WAN Administration Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN

More information

RedHat (RHEL) System Administration Course Summary

RedHat (RHEL) System Administration Course Summary Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

Effect of Windows XP Firewall on Network Simulation and Testing

Effect of Windows XP Firewall on Network Simulation and Testing Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Load Balancing Trend Micro InterScan Web Gateway

Load Balancing Trend Micro InterScan Web Gateway Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...

More information

MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 COURSE SYLLABUS MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure

More information

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

More information

System administration basics

System administration basics Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Contact Us: (616) 875-4060 HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Length: Classroom: 5 days Virtual: 6 hrs/day - 5 days Prerequisite: System Administration

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

INF-110. GPFS Installation

INF-110. GPFS Installation INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity

More information

Study and installation of a VOIP service on ipaq in Linux environment

Study and installation of a VOIP service on ipaq in Linux environment Study and installation of a VOIP service on ipaq in Linux environment Volkan Altuntas Chaba Ballo Olivier Dole Jean-Romain Gotteland ENSEIRB 2002 Summary 1. Introduction 2. Presentation a. ipaq s characteristics

More information

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals

More information

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35 Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure

More information

Installing and Configuring Websense Content Gateway

Installing and Configuring Websense Content Gateway Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture

More information

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how

More information

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Advanced Linux System Administration Knowledge GNU/LINUX Requirements Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Embedded Linux development training 4 days session

Embedded Linux development training 4 days session Embedded Linux development training 4 days session Title Overview Duration Trainer Language Audience Prerequisites Embedded Linux development training Understanding the Linux kernel Building the Linux

More information

Load Balancing McAfee Web Gateway. Deployment Guide

Load Balancing McAfee Web Gateway. Deployment Guide Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information