Description
Network Tuning and Analysis
Your Task
Locate and utilize linux system administration commands tocreate users and groups. Standard linux commands will be used toallocate specific user and group permissions for files and directories.
For admin tasks you will need to switch to the root user:
Part 1: Networking Topology Analysis
What are the following characteristics of your current network connection?
- Network Adapter Type
- Network Interface Name in Linux
- ip address
- subnet mask
- default route
What is the ip address of your Host Machine? (Machine running Virtual Box, not the Linux partition – i.e. Windows).
Is the ip address of the host machine on the same subnet as the virtual host? Why or why not?
Think of a server on the internet somewhere (i.e. google.com).Ping the server and ctrl-c after 10 or so samples). What was the averageround trip time.
Open a second window. From one window, ping the server on theinternet again. From the second window, bring down the network interfaceusing the ifconfig command. Watch the ping output. After severalsamples, bring up the interface using the ifconfig command. Control-Cout of the ping commands after watching it for several samples once theinterface is up again. Record and comments on the statistics (RTT andPacket Loss).
Can you ping the ip address of the host machine?
Can you ping the ip address of the default route? What machine is responding when pinging the default route?
Open a command window ( on Windows) or (Terminal on Mac) inyour host machine. Can you ping the ip address of your linux virtualhost?
How do you view the routing table? What is represented by the rows in the routing table?
Part 2: Adapter Configuration
In your Virtual Box configuration, add a second adapter whichuses a bridged connection instead of a NAT connection. Setpromiscuous mode to allow all. Your VM will need to be shutdown to dothis.
Startup your VM.
Review your Network interface(s) using ifconfig.
Now that you have multiple network interfaces on your systemwith ip addresses on different networks, review the routing table againand describe how it is used to route traffic between the two cards?
Which interface is being used as the default route? Change therouting table so that the default route contains the ip address of thedrfault gateway used by your host machine. Use ipconfig in windows toget this address. Can you still ping google? Describe how networktrafficing has changed.
Part 3: Packet Tracing
Download and install putty on your host machine (Machinerunning Virtual Box i.e. Windows this does not get installed on yourLinux Virtual Machine). http://www.putty.org
*If you already have a telnet and ssh client you can use those instead.
Using ssh and or telnet, login to your Virtual machine.
*sudo apt-get install openssh-server
*apt-get install telnetd
Using tcpdump start a packet trace which sniffs all packets on the bridged interface using port 22 or part 23.
Now, SSH in from your Host Machine using putty. Report thetraffic you see. Are you seeing what is expected? Take a couple ofpacket headera and report what the various fields mean. Name a situationwhere packet tracing is beneficial to you as a system administrator?
NOTE: A packet may contain connection information, includingthe server running the TCP service first column, and arrow > showsthe clients address and high order port used to establish the TCPconnection between the two hosts. Additional TCP information requiredfor handshaking and packaging packets is also included i.e. seq, ack,win, length, tos, ttl, id.
Submission Requirements
You will submit a Word or Libre Writer Document which containsresults from the above analysis and responses. I do not have access toyour system so you need to be sure to provide screenshots for anything Icannot possibly know. Only provide screenshots necessary to prove yourresponses.
Please insert your screenshots into your word document withsupporting documentation which meets all requirements. You will bepenalized for any results which are not backed by proof.