Open main menu

CDOT Wiki β

Changes

OPS235 Lab 6 - CentOS7 - SSD

349 bytes removed, 17:57, 13 June 2016
no edit summary
===Part 1: Configuring a Private Network (Via Virtual Machine Manager) ===
[[Image:network-config-centos.png|thumb|600px|right|This diagram shows the current network configuration of your '''c7host''' machine in relation to your '''Virtual Machines'''. In this section, you will be learning to change the default network settings for both your '''c7host''' machine and '''VMs''' to belong to a '''virtual network''' using fixed IP Addresses. ]]
</ol>
'''Answer Part 1 observations / questions in your lab log book.'''
 === Part 2: Configuring VM Network Setup Graphically ('''system-config-network''')===
For Parts 2 and 3 of this investigation, we will be using a graphical tool to connect our '''centos1''' and '''centos2''' VMs to our private network.
# Verify that '''centos1'''VM is now connected to the VPN by issuing the following command from your '''c7host''' machine:<br><b><code><span style="color:#3366CC;font-size:1.2em;">ping 192.168.235.11</span></code></b>
'''Answer Part 2 observations / questions in your lab log book.'''
=== Part 3: Backing up Only Recent File Changes ===
This part is a repeat of part2, except we will be demonstrating how to use the '''find''' command to backup recent changes to files. In this case, we will save date/time stamp information in a file, configure to connect '''centos2''' to the network, run the '''find''' command, and prove that the incremental backup worked (showing the files created as a result of the configuration of centos1 to the VPN).
'''Answer Part 3 observations / questions in your lab log book.''' === Part 4: Configuring VM Network Setup via Command Line ('''centos3''') ===
Our centos3 VM is a '''text-based only''' system, thus we cannot use a graphical tool to configure centos3 to connect to our private network. Therefore we will learn how to perform this task by using command-line tools.
# Login and attempt to '''ssh''' to your matrix account to verify the settings.
'''Answer Part 4 INVESTIGATION 1 observations / questions in your lab log book.''' 
=INVESTIGATION 2: VIRTUAL NETWORKING ENVIRONMENT TWEAKS AND OTHER USEFUL COMMON NETWORK UTILITIES=
Connecting a private network is an important task, but a system administrator also needs to "tweak" the network to make it '''convenient to use''', make it '''safer from unauthorized access''', and use troubleshooting utilities to help '''troubleshoot''' network connectivity problems as they occur. This investigation will expose you to some useful tricks and utilities to help accomplish this task.
=== Part 1: Using Local Hostname Resolution ===
{| width="40%" align="right" cellpadding="10"
|- valign="top"
#Confirm that each host can ping all three of the other hosts by name.
'''Answer Part 1 observations / questions in your lab log book.'''
=== Part 2: Obtaining MAC (Hardware) addresses on Network Computers ===
{| width="40%" align="right" cellpadding="10"
|- valign="top"
# Now execute the command <b><code><span style="color:#3366CC;font-size:1.2em;">netstat -au</span></code></b> What is the difference between the options: '''-at''' and '''-au'''?
# When examining UDP ports why is there no state?
 
'''Answer Part 2 observations / questions in your lab log book.'''
=== Part 3: Introduction to Firewalls: iptables ===
{| width="40%" align="right" cellpadding="10"
|- valign="top"
'''Answer the Part 3 INVESTIGATION 2 observations / questions in your lab log book.'''
13,420
edits