Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assessment - Managing Services and Security

Task - In This Assignment your job is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offer services to a user base.

The Virtual Machines can be implemented using any hypervisor e.g. VMWare Player, Virtual Box or anything else you think is appropriate.

You can use bridged or host only networking when setting up these Virtual Machines. When implementing the Virtual Machines, rather then obtaining an address from the HyperVisors DHCP server you should ensure the addresses used are static and assigned from your network. YOU WILL NEED TO WORK OUT WHAT ADDRESS SPACE YOU ARE USING AND HOW IT WILL IMPACT YOUR LAN.

Part 1: Virtual Machine One - DNS & SSH Server

The first Virtual Machine should be installed and have the BIND (DNS) server installed on it. While you do not own any address space/ name space your name server should manage the following domains: saffioti

The name server should answer queries for this domain. In addition to the saffioti.org.au zone, a zone should be set up for the reverse zone - the reverse zone would be whatever the address range is of your virtual machine. You should do some research on how Bind handles reverse zones.

You should set up the saffioti.org.au zone with the usual information including SOA, NS and other records where appropriate. The address used for this should be the address of the virtual machine. You should give this Virtual Machine an A record with the name server1.You should also create a A record for server2.

In addition to this you should create an CNAME record with the name www. When a user does a lookup on the address returned should be that of the other virtual machine (Virtual Machine Two).

Be sure to create the appropriate reverse (PTR) records for the machines and to help other administrators be sure to put in place appropriate TXT records.

Once complete, you should fine tune your DNS Servers Virtual machine. Do this by disabling services that were installed but are not required. Be very careful not to break anything here. As a tip you will want to keep both DNS and SSH services active. Ensure both DNS and SSH are invoked at startup.

Finally harden this Virtual Machine using a firewall. Set up filters which allow access to the services possibly being access on the Virtual Machine from other hosts - specifically SSH and DNS. You can assume this incoming traffic can come from anywhere. You will need to make sure these rules always take affect at boot.

Test your virtual machine by setting your Host computer (i.e. the computer that is running the VM) Name Server to the address of the Virtual Machine. See if you can resolve queries for the A records create in saffioti i.e. server1 and www.

Document the entire process and challenges you experienced. You can install BIND from source or using your package manager.

Part 2: Virtual Machine Two

The second Virtual Machine is to have the LAMP software package installed. LAMP is a standard bundle in the Ubuntu Server platform.

Once complete set up this Virtual Machine to host a website using the Apache Web Server.

The Virtual Machine should have a statically assigned address which matches that specified in the A record for host www. Test your Apache Server Virtual Machine by using a web browser on another host and trying to browse the website saffioti.

Finally harden this host so that only services being used can be accessed by other machines. You will need to use IPTables.

Document the entire process and challenges you experienced.

Part 3: Remote File Access

Once you have set up the web server (in part 2) and tested it, install any FTP server. The FTP server would allow users to upload/ download files to the web server. Configure the server appropriately and then test from another host. You will need to make changes to your firewall configuration. In addition to this add a CNAME for ftp on the name server pointing to server2.

Document the entire process and challenges you experienced.

Part 4: Making DNS Robust

You are to also install bind on Virtual Machine Two and make it a secondary for the above domain. You can install this service from a package or configure from source.

Document the entire process and challenges you experienced.

Part 5: Simple Web Services

In Virtual Machine Two you set up a web server for the DNS name saffioti. The server is implemented using the HTTP protocol listening on port 80. Your challenge is to make the same site accessible using the HTTPS protocol. To do this set up SSL with a self signed certificate for the site.

Once configured correctly you should be able to access saffioti.org.au on both HTTP/HTTPS ports. Naturally you will need to make appropriate changes to your firewall rules.

Document the entire process and challenges you experienced.

Rationale - This assessment task will assess the following learning outcome/s:

  • be able to apply technical knowledge to manage servers.
  • be able to investigate the layout of server file systems.
  • be able to plan, create and manage information services.
  • be able to design and write scripts to automate various server management tasks.
  • be able to justify an appropriate protection strategy for data and services.
  • be able to critically evaluate security policies and procedures.

In this assignment students will develop a understanding and appreciation for building complex services whilst considering impacts on security.

Attachment:- Assignment File.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93119591
  • Price:- $75

Priced at Now at $75, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Hayley motorcycle company just paid a dividend of 14 today

Hayley Motorcycle Company just paid a dividend of $1.4 today, and is expected to pay a dividend in year 1 of $1.8, a dividend in year 2 of $2.3, a dividend in year 3 of $2.9, and a dividend in year 4 of $3.8. After year ...

A different ethanol processing facility costs 800000 to

A different ethanol processing facility costs $800,000 to construct but will instead last forever. Every year (starting the year after  construction), it produces 10,000 barrels of ethanol and can charge a price of $4 pe ...

When is a subclass a subclasswhen programming or solving

When is a Subclass a Subclass When programming, or solving any sort of problem for that matter, abstraction plays a key role in the decision-making process. It allows you to remove irrelevant details in order to understa ...

An equally weighted portfolio consists of 64 assets which

An equally weighted portfolio consists of 64 assets which all have a standard deviation of 0.276. The average covariance between the assets is 0.106. Compute the standard deviation of this portfolio. Please enter your an ...

A restaurant offers a 12 dinner special that has 7 choices

A restaurant offers a? $12 dinner special that has 7 choices for an? appetizer, 13 choices for an? entrée, and 4 choices for a dessert. How many different meals are available when you select an? appetizer, an? entrée, an ...

1 investment risk and default risk are interchangeable

1. Investment risk and default risk are interchangeable terms and essentially mean the same thing.   2. Disadvantages of the Capital Asset Pricing Model include that you are using the past to predict the future and that ...

Assume that these data are seven random observations taken

Assume that these data are seven random observations taken from a larger population whose values are normally distributed. (even if this assumption makes little sense) Using this assumption, coupled with prior computatio ...

Question suppose a large array is maintained with the

Question : Suppose a large array is maintained with the following policy. The array is initially sorted. When new elements are added, they are inserted at the end of the array and counted. Whenever the number of new elem ...

What are the best practices to follow for microsoft windows

What are the best practices to follow for Microsoft Windows network security. Which two would you start with and why?

Question research some of the issues engineering managers

Question: Research some of the issues engineering managers must consider when deciding on the best door hardware for the most cost-effective security for their facility. Write a minimum of 1 page(title abstract, body, co ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As