Design assignment based on the given network configuration

Assignment Help Operating System
Reference no: EM131372958

Unix System Administration Assignment  

Design assignment based on the network configuration below.

1558_Figure.png

jump: must be the single node from the secondary subnet

i.e

node a = 10.128.2.201

node b = 10.128.1.202<< jump

node c = 10.128.2.202

server-a and server-b are both from the same subnet

in order to access the servers, first you need to login into the university network then ssh to the nodes.

node a = 10.128.1.101 root pw = 5037458

node b = 10.128.2.101 << jump - root pw = 5037458

node c = 10.128.1.102 -root pw = 5037458

YOUR PANTHER ID HERE = 5037458

the cvs file is on this link

https://users.cis.fiu.edu/~ggome002/cts4348/files/dpere297.csv

1. disable SSH login for root. // all nodes

2. SSH connections

restrict incoming SSH connection to server-a and server-b from the following server:

jump = 10.128.1.202

ocelot.aul.fiu.edu

users.cs.fiu.edu

cts4348-a.cs.fiu.edu

cts4348-b.cs.fiu.edu

10.128.1.90

3. // SSH keys

create a user with username [ YOUR PANTHER ID HERE ] on all nodes

configure the RSA key pair on jump

copy the private key to server a and server b

test key authentication between jump and server a / b

make sure that user [ YOUR PANTHER ID HERE ] does not have passwords configure in any of the boxes

download the users CSV from the following url.

https://users.cis.fiu.edu/~ggome002/cts4348/files/[ USERNAME ].csv

https://users.cis.fiu.edu/~ggome002/cts4348/files/dpere297.csv

4. add all users to the jump server

// basic useradd

i.euseradd roary001

5. // 1 - 299

// add the name of the user as a comment

i.euseradd roary001 -c "roary the panther "

server a - add only male users

server b - add only female users

6. // 300 - 599

// add users, make sure that the home folder is located

// in the directory /home/finishers

server a - add only overall position 1 - 3k

server b - add only overall position 1 - 6k

7. // 600 - 900

// add users, make sure that the home folder is located in the

// company name listed on the csv. i.e. /home/company/[COMPANY NAME]

// in addition make sure to add the company name as group in the

// system and add the users to that group

server a - add only overall position A - M

server b - add only overall position N - Z

8. // delete all user from jump that finish the race over 40 min

9. install fail2ban on all nodes. ( 2 point )

// make sure to fail.local

[DEFAULT]

# Ban hosts for 5 min:

bantime = 300

# Override /etc/fail2ban/jail.d/00-firewalld.conf:

banaction = iptables-multiport

[sshd]

enabled = true

Attachment:- Assignment.rar

Reference no: EM131372958

Questions Cloud

Heath bequeathed one third of his estate to morse : By his original will, Heath bequeathed one third of his estate to Morse. When the will was probated, it was found that the bequest to Morse had been crossed out and at the bottom of the will was a typrwritten attachment: "Under no condition do I wish..
What is wrong with the following array declarations : Implement the delivery method using a similar approach to that used in number In Stock. It should find the product with the given ID in the list of products and then call its increase Quantity method.
Analyze the fictional and dramatic elements of a film : Analyze the fictional and dramatic elements of a film.- Evaluate the editing function of a film.- Critique the sound effects in a film.- Critique acting in a film.- Evaluate the theme(s) of a film.
Analyze the key roles of actors in the us adversary system : Analyze the key roles of the actors in the U.S. adversary system. Distinguish the role of each actor in the adversarial systems, and determine whether or not each actor brings a bias to the prosecution of a case. Provide a rationale for your respo..
Design assignment based on the given network configuration : CTS 4348 - Unix System Administration Spring 2017 Assignment. Design assignment based on the network configuration below
Representation of religious belief : With reference to TWO medieval texts, consider the representation of RELIGIOUS belief and practice in medieval literature.
Facing marketing managers is controlling price escalation : One of the most challenging tasks facing marketing managers is controlling price escalation. A firm in your industry decides to increase prices on a somewhat regular basis in order to anticipate and help mitigate losses. Seems like a smart approach. ..
What are the implied bid and ask prices : FIN 4180- Based on part c, what is the implied cross rate (to sell pounds and buy euros)? If the two exchange rates from b and d are stated with the euro as the base currency, what are the implied bid and ask prices.
Sales reps can be expatriates and virtual expatriates : Sales reps can be expatriates, virtual expatriates, local nationals and third-country nationals. As your division’s sales manager, you recruit from all 4 groups. What would be your ideal sales team? What would determine the balance (of using each rep..

Reviews

len1372958

1/27/2017 4:36:32 AM

I am attaching the instruction of how to login. I took out some steps that you do not need to do. I will need a screenshot of the commands that you will use. Or you can write down on the attachment under the question so i can see how you did it.

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd