Email Us   Phone : 503-259-0312   
  Home    |    Instructor-led Training    |    Online Training     


Contact Us   -   Why Choose Wintrac   -   Clients    

Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Microsoft technologies
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
AIX Network Administration
Overview

This course provides instruction on IBM AIX network administration and security. Students will be introduced to networking termonology and will learn how to administer the AIX TCP/IP network through lectures and hands-on exercises. Topics include an overview of network protocols, how to use the network commands, how to install and configure network hardware, and how to configure standard network services, including the network filesystem (NFS), Network Information System (NIS), Dynamic Host Configuration Protocol (DHCP), Domain Name Services (DNS), IP Version 6 (IPv6), and sendmail. Attendes will also learn how to set up and manage network security through the use of network scanner detection programs and other tools.

Audience

System and Network Administrators.

Prerequisites

Attendees of this course should have completed the AIX System Administration course.

Learning Objectives

Upon completion of this course you will be able to:

  • Describe and state the purpose of various network protocols.
  • Configure network hardware and software.
  • Configure routing and routing tables.
  • Configure subnet masks.
  • Set up and manage standard network services including telnet, ftp, NFS, NIS, DHCP, DNS, and Sendmail.
  • Examine and improve the network security of AIX systems using network security tools and programs.
  • Troubleshoot common network problems.
Course duration

5 Days

Course outline

Network Hardware and Software

1) Network Hardware
 
Routers
CSU/DSU
Modems/Portmaster
Hubs
Switches
Network Interface Cards

2) Types of Networks
3) The Internet
4) Top Level Domains
5) Domain and Host Names
6) Gateways
7) Network Protocols
 
Network Protocol Overview
The TCP/IP Protocol Stack
Internet Protocol (IP)
Transmission Control Protocol (TCP)
File Transfer Protocol (FTP)
Telnet
Network News Transfer Protocol (NNTP)
Hyper Text Transport Protocol (HTTP)
Simple Mail Transport Protocol (SMTP)
Simple Network Management Protocol (SNMP)
Address Resolution Protocol & Reverse Address Resolution Protocol

8) IP Addressing
9) IP Address Format
10) Network and Host Addresses
 
Reserved Host Addresses
Reserved Network Addresses
Class A Address
Class B Address
Class C Address

11) Subnets
 
Netmasks
Calculating Subnet Sizes

12) Setting up A Network
 
IPv6
IPv6 over IPv4

Network Configuration and Administration

1) How the AIX Network Software Works
 
The inetd Internet Daemon
The /etc/inetd.conf File
Connection Requests
Sockets

2) Network Control Files
 
The /etc/hosts File
The /etc/hosts.equiv File
The /etc/hosts.lpd File
The /etc/protocols File
The /etc/services File

3) Using SMIT To Configure the Network
 
Configuring Required Services
Configuring Optional Services

4) Network Startup
5) Checking the Network Configuration
6) Obtaining Networking Information
 
The ifconfig Command
The hostname Command
The netstat Command
The traceroute Command
Managing Network Interfaces
Testing Network Connectivity

7) Managing Routes
 
The routing table
Configuring static routes
Configuring dynamic routes
Configure boot time routing
Troubleshooting routing

8) Configuring Ipv6
9) Network Shutdown
10) Diagnosing and Correcting Network Problems

Network File Systems

1) Network File System Overview

2) NFS Terminology

3) NFS Commands and Files
 
The /usr/sbin/exportfs Command
The /etc/exports File
The /bin/mount command

4) Configuring NFS
 
Setting Up the NFS Server
Setting Up A NFS Client

5) Removing NFS Resources
 
Server System Procedures
Client System Procedures

Network Information Service

1) Overview of NIS

2) How the Network Information Service Works

3) The NIS Client-Server Model

4) NIS Information Management

5) NIS Services

6) NIS Tables

7) Setting Up a NIS Server

8) Setting Up a NIS Client

9) Verifying NIS Operation

DHCP

1) Introduction to DHCP

2) The DHCP Protocol

3) Allocation of network addresses

4) Dynamic Allocation

5) Description of the communication steps

6) Variations on the timeline diagram

7) Message Types Summary

8) Installing and Configuring the DHCP Server and/or Client Software

9) Installing the DHCP Software
 
The /etc/dhcpd.conf File
The /etc/dhcpd.leases File

10) Controlling the dhcpd Server

11) DHCP Client Configuration

12) Testing the Client/Server Connection and completing the Installation

Domain Name Service

1) The DNS Database

2) DNS Overview

3) Installing DNS

4) DNS Terminology

5) DNS Daemons and Programs

6) DNS Configuration Files

7) DNS Control and Log Files

8) The named Daemon

9) Controlling the named Daemon

10) DNS Configuration Files
 
The /etc/resolv.conf File
The /etc/host.conf File
The /etc/named.conf File
The /var/named/named.ca File
The /var/named/named.[zone] Files
Format and Contents of the /var/named/named.[zone] Files

11) Reverse DNS

12) Slave DNS Servers

13) The nslookup Command

14) Setting up a DNS Client

15) Configuring a DNS Server

16) DNS Trouble Shooting

SendMail

1) What is sendmail?

2) Sendmail Programs

3) Configuring sendmail
 
The /etc/sendmail.cf File
The /etc/aliases File

4) Sendmail Directories and Log Files

5) Configuring sendmail

6) Starting and Stopping sendmail

7) Testing sendmail

8) Forwarding Email

9) Setting Up A Mail Server

10) The Post-Office-Protocol Daemon

11) Using a Mail Client to Retreive Email

12) Setting Up Microsoft Windows Email Clients

13) Unix Email Clients

14) Sendmail Security

AIX Network Security

1) Why is a System Hacked?

2) How are Systems Hacked?

3) How Network Hacking Is Detected and Prevented

4) Controlling Access - Network Users

5) Controlling Access - Remote Hosts

6) Network Services

7) Network Daemons

8) Scanners
 
System Scanners
Network Scanners

9) TCP/IP Wrappers?
 
What are TCP/IP Wrappers?
Installing TCP/IP Wrappers
Configuring TCP/IP Wrappers
Testing TCP/IP Wrappers

10) ftp Security

11) Network Security Tools
 
portsentry
satan
Other tools



 
About us
Contact us
Careers at Wintrac
Our Clients
Why Wintrac


Register for a free training CD-ROM drawing
Refer a client or instructor and earn $$$


Wintrac Inc.
16523 SW McGwire Ct.
Beaverton OR 97007
 
? Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy