1.18k likes | 1.29k Views
Internet System Management. Lesson 1: IT Systems and Services Overview. Objectives. List the services offered by IT departments Identify backbone and mission-critical services offered by IT departments Discuss the concepts of system maintenance. Common IT Tasks and Services.
E N D
Objectives • List the services offered by IT departments • Identify backbone and mission-critical services offered by IT departments • Discuss the concepts of system maintenance
Common IT Tasks and Services • System and service installation • Web server configuration • FTP server configuration and management • Name resolution configuration • E-mail server installation and support • E-commerce server installation and support
Common IT Tasksand Services (cont’d) • Database server installation and support • User management • Server monitoring and optimization • File backup • Routing • Establishing and managing shares
Backbone Services • Naming services • Address management • Directory services • Central logon • Routing
Mission-Critical Services • Mission-critical services are highly visible • Users rely on mission-critical services • Examples • Mail servers • Web servers • FTP servers • Middleware
Binding protocols to the network interface card Protocol management Addressing Gateways Name resolution configuration Service and application installation and management IP addressing System Configuration
User Management • Adding and removing users • Using applications • Managing permissions • Group membership • Password aging • Account lockout • Password history • Controlled access
System Performance • Bandwidth and access rate issues • System I/O performance • Hard drive access statistics • CPU usage • RAM usage
Backup • Archiving user-created files • Keeping copies of entire operating systems • Storing changes to databases and other data stores • Off-site storage
Maintenance • Upgrading operating systems • Installing service packs and hot fixes • Upgrading services, including Web ande-mail servers • Scanning hard drives for errors • Upgrading hard drives to provide more storage capacity
Summary • List the services offered by IT departments • Identify backbone and mission-critical services offered by IT departments • Discuss the concepts of system maintenance
Lesson 2:Internet System Installation and Configuration Issues
Objectives • Identify common hardware platforms • Describe capabilities of various platform components • Define bandwidth and throughput • Identify common network operating systems • Determine the ideal operating system for a given environment • Discuss system installation issues
System Elements • Bus speed • System I/O • NIC • Hard drive • RAM
Bandwidth • The total amount of information a network connection can carry • Network connections • T1 • Fractional T1 • T2 • T3 • ISDN • DSL
CalculatingThroughput • A percentage of bandwidth; the amount a network connection is being used • Throughput elements • Connection speed • Amount of information • Time available for transfer
Internetworking Operating Systems • Microsoft Windows • UNIX • Linux • System V • Novell • X-Window
Ease of use Platform stability Available talent pool Available technical support Operating System Issues
Operating System Issues (cont’d) • Cost • Hardware costs • Availability of services and applications • Purpose for the server
Installing NetworkOperating Systems • Single-boot and dual-boot machines • Local and network installation • Hardware considerations • Listing system components
Summary • Identify common hardware platforms • Describe capabilities of various platform components • Define bandwidth and throughput • Identify common network operating systems • Determine the ideal operating system for a given environment • Discuss system installation issues
Objectives • List key TCP/IP configuration parameters • Add NICs in Windows 2000 and Linux • Configure Windows 2000 with static IP addresses • Configure Linux with static IP addresses • Describe how DHCP works
TCP/IP Configuration Parameters • Computer name • IP address • Subnet mask • Default gateway • DNS information • DHCP client information • WINS
Adapters • Adding network adapter device drivers in UNIX/Linux • Adding network adapter device drivers in Windows 2000 • Binding device drivers to protocols in Windows 2000 Device Drivers (NIC)
Windows 2000 ipconfig Linux ifconfig ifup ifdown linuxconf netcfg dmesg grep Static Addressing
Additional TCP/IP Issues and Commands • netstat • traceroute • router • arp
Dynamic Addressing DHCP lease process
Summary • List key TCP/IP configuration parameters • Add NICs in Windows 2000 and Linux • Configure Windows 2000 with static IP addresses • Configure Linux with static IP addresses • Describe how DHCP works
Objectives • Define authentication • Explain the share-level and user-level access security models • Identify the purposes and functions of logon accounts, groups and passwords • Create a network password policy using standard practices and procedures
Objectives (cont’d) • Discuss permissions issues • Describe the relationship between permissions and user profiles • Use administrative utilities for specific networks and operating systems • Identify the permissions needed to add, delete or modify user accounts
Authentication • What you know • What you have • Who you are
Peer-level Less expensive Easier to implement Less secure Less control over file and resource management Not scalable User-level Increased security Supports larger number of users Increased control Offers system logs Grows with organizational needs Peer-Level vs. User-Level
Creating User Accounts • User name • Password • Group associations • Permissions • Additional options
Permissions • Read • Write • Execute • Print
Windows 2000Permissions • Full control • Change • Read • No access
Access Value Bit 7 6 5 4 3 2 1 0 Access Value Bit Meaning Read, write and execute Read and write Read and execute Read only Write and execute Write Execute No mode bits (access absent) UNIX Permissions
Supervisor Read Write Erase Modify Create File scan Access control No access Novell Rights
Additional LogonAccount Terms • Logon scripts • Home directories • Local profiles • Roaming profiles
UNIX =(including System V, Solaris, Free BSD and all Linux variants) Windows = Novell = Root (full privilege) Administrator (full privilege) Supervisor (full privilege) Administrative Privileges
Standard Password Practices • Create strong password • At least six characters • Both uppercase and lowercase letters • At least one Arabic numeral • At least one symbol • Implement password policy • Plan and create a balanced policy • Write and publish policy • Train users
Network Security Policies • Password aging • Password length • Password history • Account lockout • Share creation • User creation • Local logon
Standard Operating Procedures • Vendors for operating systems and software • Upgrading, replacing and maintaining hardware • Upgrading software (including operating systems and applications) • Responding to power outages, building evacuation and hacker intrusion • Acceptable use policy
Summary • Define authentication • Explain the share-level and user-level access security models • Identify the purposes and functions of logon accounts, groups and passwords • Create a network password policy using standard practices and procedures