The Linux Small Business Server

Similar documents
Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Firewall, Mail and File server solution

SUSE LINUX School Server

Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf

Configuring Windows Server 2008 Network Infrastructure

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Exchange Migration Guide

NETASQ MIGRATING FROM V8 TO V9

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

13 Courses Quick Guide

How To Plan A Desktop Workspace Infrastructure

Cisco Knowledge Network

CYAN Secure Web Microsoft ISA Server Deployment Guide

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

How To Deploy Cisco Jabber For Windows On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

1 Introduction to the Axxess Server

DEPLOYMENT ROADMAP March 2015

Astaro Gateway Software V7.5. What s New

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Prepare your IP network for HD video conferencing

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

6445A - Implementing and Administering Small Business Server 2008

Phish Blocker: Spyware Blocker:

Gigabit SSL VPN Security Router

Implementing Microsoft Azure Infrastructure Solutions

Enterprise Edge Communications Manager. Data Capabilities

Edgewater Routers User Guide

Installing Version 7.6 The Latest Tips

IT Services. 1: Crosscutting Infrastructure. 2: Service Desk & Customer Services. 1.1: Computer & Information Security Services. 2.

MS-10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server Course Objectives. Price. Duration. Methods of Delivery

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Web Hosting. CMS Development. Domain registrations. DNS Pointing. Website Publishing. SMB Starter Package. Static Website Development

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

Workshop 5051A: Monitoring and Troubleshooting Microsoft Exchange Server 2007

Astaro Gateway Software Applications

Open-Xchange Hosted Edition Directory Integration

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Active Directory. Users & Computers. Group Policies

Edgewater Routers User Guide

Secured Enterprise eprivacy Suite

Managing Enterprise Security with Cisco Security Manager

MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Mithi Connect Server deployment options

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Security Administration R77

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

ITEC 495 Capstone Project Ideas

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

R4: Configuring Windows Server 2008 Network Infrastructure

Course Syllabus. About the course. Audience. At Course Completion. Microsoft Lync 2013 Depth Support Engineer. Certification Exams:

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Ubuntu Sever Administration

Introducing Cisco Voice and Unified Communications Administration Volume 1

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

User Identification (User-ID) Tips and Best Practices

Microsoft Technologies

User-ID Best Practices

Installation of the On Site Server (OSS)

This module explains the Microsoft Dynamics NAV architecture and its core components.

Configuration Notes 0215

Filtering and Identifying Web Activity by User Name

Phong Dam. Objective. Experience

Managing Enterprise Security with Cisco Security Manager

HOSTWAY. FlexCloudTM. Servers

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

Using the GMN webxaccelerator over Fleet Broadband, and BGAN Satellite Router with Access Control and Data Acceleration

Virtual Web Appliance Setup Guide

Move over, TMG! Replacing TMG with Sophos UTM

MS Installing and Configuring Windows Server 2012

v Installation Guide for Websense Enterprise v Embedded on Cisco Content Engine with ACNS v.5.4

Yealink VCS Network Deployment Solution

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION

Secure at all times. Protection systems are continuously updated so you have complete peace of mind.

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM

idirect Broadband Managed Services

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Cisco TelePresence Manager

Deliver Secure and Accelerated Remote Access to Applications

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Web Appliance Configuration Guide

Funkwerk UTM Release Notes (english)

Whitepaper. StoneGate Multi-Link. Ensuring Always-on Connectivity with Significant Savings

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

SOFTNIX LOGGER Centralized Logs Management

An Oracle White Paper October Frequently Asked Questions for Oracle Forms 11g

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Before reading this manual

Palo Alto Networks User-ID Services. Unified Visitor Management

Fortigate Features & Demo

Installation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v for use with

CXA 204 1I Basic Administration for Citrix XenApp 6

Remote Access Clients for Windows

Office 365. Azure. Windows Intune. Devices!

Transcription:

The Linux Small Business Server Goran Šljivić Metalurški fakultet Sisak Aco Dmitrović Hrvatski geološki institut CUC 2011

Zentyal Gateway UTM Infrastructure management Office Unified Communications 2

Proizvođač Tvrtka Zentyal Zaragoza, Spain E-mail: info@zentyal.com http://www.zentyal.com 3

Razvoj 2004. ebox Technologies S.L. 2005. prvo izdanje 2006. NEOTEC projekt, sredstva agencije Ministarstva gospodarstva, trgovine i turizma 2007. uključen u Ubuntu 7.10 2008. stabilna verzija (ebox Platform 1.0) 2010. Zentyal 2.0 Trenutna verzija 2.2, očekuje se v.3.0 4

Poslovni model Softver je besplatan Većinom open source, GPL Plaća se podrška i edukacija Tehnička podrška razvojnog tima Zentyal akademija, certifikati Neki dodaci su komercijalni (Zarafa groupware) Preko 50.000 aktivnih instalacija širom svijeta 5

Zentyal Gateway Load balancing & availability Traffic shaping & QoS Transparent caching Web content filter 6

Zentyal Gateway 7

Zentyal UTM Firewall Virtual Private Network Content filter Intrusion Detection 8

Zentyal UTM 9

Zentyal Infrastructure DHCP server DNS Web server Certification Authority 10

Zentyal Infrastructure 11

Zentyal Office Directory service File and printer sharing Groupware Data backup 12

Zentyal Office 13

Zentyal Unified Communications E-mail Groupware Instant Messaging VoIP 14

Zentyal Unified Communications 15

Zaključak Iskoristili postojeći slobodni software Linux, njegovi alati i aplikacije Grafičko sučelje za instalaciju i konfiguraciju Misija: Povećanje produktivnosti jednostavno administriranje Objediniti više funkcija na jednom računalu 16

Naglasci Captive portal web proxy za autentikaciju Bandwidth quota 17

Captive portal 18

Certficate Authority Lokalni, samoizdani certifikati Zasad... 19

LDAP Nekoliko modova rada: Standalone (ima svoj lokalni LDAP) Master (koristi drugom Zentyalu kao master) Slave (služi drugom Zentyalu kao slave ) Slave of Windows Active Directory(služi kao slave Windows AD ) AAI imenik? Imamo, međutim, napravljenu podršku za sinkronizaciju AAI-LDAP->MS Active Directory,opisano na: http://developer.aaiedu.hr/faq/aosi-2-plugins-msad.html Vjerojatno bi se dalo napisati plug-in koji bi slao akcije i u Vaš sustav. Na sljedećem URL-u je opisan API za AOSI-WS plug-in-ove: http://developer.aaiedu.hr/faq/4.html 20

Podrška 21

Nekomercijalna podrška 22

Nekomercijalna podška 23

Objekti 24

Christian, Zentyal developer Three main mistakes open source users make: Open source means free. More and more willingness to just mimic Windows instead of analyzing and describing needs in order to find suitable solution. Lack of understanding at concepts level before starting to implement and use components. Intervju na http://planet.zentyal.org 25

Christian... More and more users, moving from Windows world, are targeting Linux only because they want to reproduce with open source what they have with Windows, but for free. Because of the nature of open source, multiple components are available to cover similar needs. This requires maybe better technical understanding of involved concept, but this necessary effort is often not made. Hopefully there is still a lot of people balancing this with in-depth knowledge they are prone to share. 26

Success Story North American Bancard (NAB) has seen numerous benefits since we started deploying Zentyal servers. The most obvious benefit is costs savings, measured upwards of $100,000 yearly. Moreover, as we now deploy a single server instead of many, we have noticed a reduction in the monthly electric bills. Zentyal is extremely simple to install, setup and configure. We have used the Microsoft product in the past and have found that the Zentyal is far superior in quality, functionality and most importantly, in stability. Kelly Corbin, Senior Systems Administrator, NAB 27

Instalacija i konfiguracija 28

Instalacija Zentyala 29

Odabir jezika instalacije 30

Odabir lokacije 31

Odabir lokacije 32

Odabir lokacije 33

Podešavanje tipkovnice 34

Podešavanje tipkovnice 35

Odabir primarne mrežne kartice 36

Konfiguracija mreže 37

Odabir imena 38

Podešavanje sata 39

Instalacija osnovnog sistema 40

Dodavanje korisnika 41

Dodavanje korisnika 42

Lozinka korisnika 43

Slaba lozinka 44

Instalacija softwarea 45

Instalacija bootloadera 46

Završetak instalacije 47

Prvo pokretanje 48

Početni meni za odabir paketa 49

Instalacija network,dns,dhcp 50

Faza instalacije 51

Odabir javne i privatne mreže 52

Podešavanje mreže 53

Aktiviranje modula mreže 54

Aktiviranje modula mreže 55

Spremanje postavki 56

Spremanje postavki 57

Uključivanje modula firewalla 58

Uključivanje modula dhcp 59

Uključivanje modula dns 60

Spremanje postavki 61

Provjera konfiguracije javne mreže 62

Postavljanje privatne mreže 63

DNS privatne mreže 64

Podešavanje DNS-a 65

Dodavanje raspona adresa DHCP 66

Dodavanje raspona adresa DHCP 67

Podešavanje dashboarda 68

Podešavanje dashboarda 69

Podešavanje dashboarda 70

Korisnici i grupe 71

Podešananje načina rada 72

Provjera postavki 73

Uključivanje modula users 74

Otvaranje korisnika 75

Dodavanje korisnika 76

Instalacija Captive portala 77

Captive portal 78

Konfiguracija Captive portala 79

Uključivanje Captive portal modula 80

Captive portal sa strane MS korisnika 81

Captive portal sa strane MS korisnika 82

Captive portal sa strane MS korisnika 83

Captive portal sa strane MS korisnika 84