1 / 118

Internet System Management

Internet System Management. Lesson 1: IT Systems and Services Overview. Objectives. List the services offered by IT departments Identify backbone and mission-critical services offered by IT departments Discuss the concepts of system maintenance. Common IT Tasks and Services.

temira
Télécharger la présentation

Internet System Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet System Management

  2. Lesson 1:IT Systems and Services Overview

  3. Objectives • List the services offered by IT departments • Identify backbone and mission-critical services offered by IT departments • Discuss the concepts of system maintenance

  4. Common IT Tasks and Services • System and service installation • Web server configuration • FTP server configuration and management • Name resolution configuration • E-mail server installation and support • E-commerce server installation and support

  5. Common IT Tasksand Services (cont’d) • Database server installation and support • User management • Server monitoring and optimization • File backup • Routing • Establishing and managing shares

  6. Backbone Services • Naming services • Address management • Directory services • Central logon • Routing

  7. Mission-Critical Services • Mission-critical services are highly visible • Users rely on mission-critical services • Examples • Mail servers • Web servers • FTP servers • Middleware

  8. Binding protocols to the network interface card Protocol management Addressing Gateways Name resolution configuration Service and application installation and management IP addressing System Configuration

  9. User Management • Adding and removing users • Using applications • Managing permissions • Group membership • Password aging • Account lockout • Password history • Controlled access

  10. System Performance • Bandwidth and access rate issues • System I/O performance • Hard drive access statistics • CPU usage • RAM usage

  11. Backup • Archiving user-created files • Keeping copies of entire operating systems • Storing changes to databases and other data stores • Off-site storage

  12. Maintenance • Upgrading operating systems • Installing service packs and hot fixes • Upgrading services, including Web ande-mail servers • Scanning hard drives for errors • Upgrading hard drives to provide more storage capacity

  13. Summary • List the services offered by IT departments • Identify backbone and mission-critical services offered by IT departments • Discuss the concepts of system maintenance

  14. Lesson 2:Internet System Installation and Configuration Issues

  15. Objectives • Identify common hardware platforms • Describe capabilities of various platform components • Define bandwidth and throughput • Identify common network operating systems • Determine the ideal operating system for a given environment • Discuss system installation issues

  16. System Elements • Bus speed • System I/O • NIC • Hard drive • RAM

  17. Bandwidth • The total amount of information a network connection can carry • Network connections • T1 • Fractional T1 • T2 • T3 • ISDN • DSL

  18. CalculatingThroughput • A percentage of bandwidth; the amount a network connection is being used • Throughput elements • Connection speed • Amount of information • Time available for transfer

  19. Internetworking Operating Systems • Microsoft Windows • UNIX • Linux • System V • Novell • X-Window

  20. Ease of use Platform stability Available talent pool Available technical support Operating System Issues

  21. Operating System Issues (cont’d) • Cost • Hardware costs • Availability of services and applications • Purpose for the server

  22. Installing NetworkOperating Systems • Single-boot and dual-boot machines • Local and network installation • Hardware considerations • Listing system components

  23. Summary • Identify common hardware platforms • Describe capabilities of various platform components • Define bandwidth and throughput • Identify common network operating systems • Determine the ideal operating system for a given environment • Discuss system installation issues

  24. Lesson 3:Configuring the System

  25. Objectives • List key TCP/IP configuration parameters • Add NICs in Windows 2000 and Linux • Configure Windows 2000 with static IP addresses • Configure Linux with static IP addresses • Describe how DHCP works

  26. TCP/IP Configuration Parameters • Computer name • IP address • Subnet mask • Default gateway • DNS information • DHCP client information • WINS

  27. Adapters • Adding network adapter device drivers in UNIX/Linux • Adding network adapter device drivers in Windows 2000 • Binding device drivers to protocols in Windows 2000 Device Drivers (NIC)

  28. Windows 2000 ipconfig Linux ifconfig ifup ifdown linuxconf netcfg dmesg grep Static Addressing

  29. Additional TCP/IP Issues and Commands • netstat • traceroute • router • arp

  30. Dynamic Addressing DHCP lease process

  31. Summary • List key TCP/IP configuration parameters • Add NICs in Windows 2000 and Linux • Configure Windows 2000 with static IP addresses • Configure Linux with static IP addresses • Describe how DHCP works

  32. Lesson 4:User Management Essentials

  33. Objectives • Define authentication • Explain the share-level and user-level access security models • Identify the purposes and functions of logon accounts, groups and passwords • Create a network password policy using standard practices and procedures

  34. Objectives (cont’d) • Discuss permissions issues • Describe the relationship between permissions and user profiles • Use administrative utilities for specific networks and operating systems • Identify the permissions needed to add, delete or modify user accounts

  35. Authentication • What you know • What you have • Who you are

  36. Security Models and Authentication

  37. Peer-Level Access

  38. User-Level Access

  39. Peer-level Less expensive Easier to implement Less secure Less control over file and resource management Not scalable User-level Increased security Supports larger number of users Increased control Offers system logs Grows with organizational needs Peer-Level vs. User-Level

  40. Creating User Accounts • User name • Password • Group associations • Permissions • Additional options

  41. Permissions • Read • Write • Execute • Print

  42. Windows 2000Permissions • Full control • Change • Read • No access

  43. Access Value Bit 7 6 5 4 3 2 1 0 Access Value Bit Meaning Read, write and execute Read and write Read and execute Read only Write and execute Write Execute No mode bits (access absent) UNIX Permissions

  44. Supervisor Read Write Erase Modify Create File scan Access control No access Novell Rights

  45. Additional LogonAccount Terms • Logon scripts • Home directories • Local profiles • Roaming profiles

  46. UNIX =(including System V, Solaris, Free BSD and all Linux variants) Windows = Novell = Root (full privilege) Administrator (full privilege) Supervisor (full privilege) Administrative Privileges

  47. Standard Password Practices • Create strong password • At least six characters • Both uppercase and lowercase letters • At least one Arabic numeral • At least one symbol • Implement password policy • Plan and create a balanced policy • Write and publish policy • Train users

  48. Network Security Policies • Password aging • Password length • Password history • Account lockout • Share creation • User creation • Local logon

  49. Standard Operating Procedures • Vendors for operating systems and software • Upgrading, replacing and maintaining hardware • Upgrading software (including operating systems and applications) • Responding to power outages, building evacuation and hacker intrusion • Acceptable use policy

  50. Summary • Define authentication • Explain the share-level and user-level access security models • Identify the purposes and functions of logon accounts, groups and passwords • Create a network password policy using standard practices and procedures

More Related