Upon completion of this course you will be able to:
- Describe and state the purpose of various network protocols.
- Configure network hardware and software.
- Configure routing and routing tables.
- Configure subnet masks.
- Set up and manage standard network services including telnet, ftp, NFS, NIS, DHCP, DNS, and Sendmail.
- Examine and improve the network security of AIX systems using network security tools and programs.
- Troubleshoot common network problems.
Network Hardware and Software
1) Network Hardware
|
|
Routers
CSU/DSU
Modems/Portmaster
Hubs
Switches
Network Interface Cards
|
2) Types of Networks
|
3) The Internet
|
4) Top Level Domains
|
5) Domain and Host Names
|
6) Gateways
|
7) Network Protocols
|
|
Network Protocol Overview
The TCP/IP Protocol Stack
Internet Protocol (IP)
Transmission Control Protocol (TCP)
File Transfer Protocol (FTP)
Telnet
Network News Transfer Protocol (NNTP)
Hyper Text Transport Protocol (HTTP)
Simple Mail Transport Protocol (SMTP)
Simple Network Management Protocol (SNMP)
Address Resolution Protocol & Reverse Address Resolution Protocol
|
8) IP Addressing
|
9) IP Address Format
|
10) Network and Host Addresses
|
|
Reserved Host Addresses
Reserved Network Addresses
Class A Address
Class B Address
Class C Address
|
11) Subnets
|
|
Netmasks
Calculating Subnet Sizes
|
12) Setting up A Network
|
|
IPv6
IPv6 over IPv4
|
Network Configuration and Administration
1) How the AIX Network Software Works
|
|
The inetd Internet Daemon
The /etc/inetd.conf File
Connection Requests
Sockets
|
2) Network Control Files
|
|
The /etc/hosts File
The /etc/hosts.equiv File
The /etc/hosts.lpd File
The /etc/protocols File
The /etc/services File
|
3) Using SMIT To Configure the Network
|
|
Configuring Required Services
Configuring Optional Services
|
4) Network Startup
|
5) Checking the Network Configuration
|
6) Obtaining Networking Information
|
|
The ifconfig Command
The hostname Command
The netstat Command
The traceroute Command
Managing Network Interfaces
Testing Network Connectivity
|
7) Managing Routes
|
|
The routing table
Configuring static routes
Configuring dynamic routes
Configure boot time routing
Troubleshooting routing
|
8) Configuring Ipv6
|
9) Network Shutdown
|
10) Diagnosing and Correcting Network Problems
|
Network File Systems
1) Network File System Overview
2) NFS Terminology
3) NFS Commands and Files
|
|
The /usr/sbin/exportfs Command
The /etc/exports File
The /bin/mount command
|
4) Configuring NFS
|
|
Setting Up the NFS Server
Setting Up A NFS Client
|
5) Removing NFS Resources
|
|
Server System Procedures
Client System Procedures
|
Network Information Service
1) Overview of NIS
2) How the Network Information Service Works
3) The NIS Client-Server Model
4) NIS Information Management
5) NIS Services
6) NIS Tables
7) Setting Up a NIS Server
8) Setting Up a NIS Client
9) Verifying NIS Operation
|
DHCP
1) Introduction to DHCP
2) The DHCP Protocol
3) Allocation of network addresses
4) Dynamic Allocation
5) Description of the communication steps
6) Variations on the timeline diagram
7) Message Types Summary
8) Installing and Configuring the DHCP Server and/or Client Software
9) Installing the DHCP Software
|
|
The /etc/dhcpd.conf File
The /etc/dhcpd.leases File
|
10) Controlling the dhcpd Server
11) DHCP Client Configuration
12) Testing the Client/Server Connection and completing the Installation
|
Domain Name Service
1) The DNS Database
2) DNS Overview
3) Installing DNS
4) DNS Terminology
5) DNS Daemons and Programs
6) DNS Configuration Files
7) DNS Control and Log Files
8) The named Daemon
9) Controlling the named Daemon
10) DNS Configuration Files
|
|
The /etc/resolv.conf File
The /etc/host.conf File
The /etc/named.conf File
The /var/named/named.ca File
The /var/named/named.[zone] Files
Format and Contents of the /var/named/named.[zone] Files
|
11) Reverse DNS
12) Slave DNS Servers
13) The nslookup Command
14) Setting up a DNS Client
15) Configuring a DNS Server
16) DNS Trouble Shooting
|
SendMail
1) What is sendmail?
2) Sendmail Programs
3) Configuring sendmail
|
|
The /etc/sendmail.cf File
The /etc/aliases File
|
4) Sendmail Directories and Log Files
5) Configuring sendmail
6) Starting and Stopping sendmail
7) Testing sendmail
8) Forwarding Email
9) Setting Up A Mail Server
10) The Post-Office-Protocol Daemon
11) Using a Mail Client to Retreive Email
12) Setting Up Microsoft Windows Email Clients
13) Unix Email Clients
14) Sendmail Security
|
AIX Network Security
1) Why is a System Hacked?
2) How are Systems Hacked?
3) How Network Hacking Is Detected and Prevented
4) Controlling Access - Network Users
5) Controlling Access - Remote Hosts
6) Network Services
7) Network Daemons
8) Scanners
|
|
System Scanners
Network Scanners
|
9) TCP/IP Wrappers?
|
|
What are TCP/IP Wrappers?
Installing TCP/IP Wrappers
Configuring TCP/IP Wrappers
Testing TCP/IP Wrappers
|
10) ftp Security
|
11) Network Security Tools
|
|
portsentry
satan
Other tools
|