Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Managing Services and Security

Task

Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offer services to a user base.

The Virtual Machines can be implemented using any hypervisor e.g. VMWare Player, Virtual Box or anything else you think is appropriate.

You can use bridged or host only networking when setting up these Virtual Machines. When implementing the Virtual Machines, rather then obtaining an address from the HyperVisors DHCP server you should ensure the addresses used are static and assigned from your network. YOU WILL NEED TO WORK OUT WHAT ADDRESS SPACE YOU ARE USING AND HOW IT WILL IMPACT YOUR LAN.

Part 1: Virtual Machine One - DNS & SSH Server

The first Virtual Machine should be installed and have the BIND (DNS) server installed on it. While you do not own any address space/ name space your name server should manage the following domains:

The name server should answer queries for this domain. In addition to the saffioti.org.au zone, a zone should be set up for the reverse zone - the reverse zone would be whatever the address range is of your virtual machine. You should do some research on how Bind handles reverse zones.

You should set up the saffioti.org.au zone with the usual information including SOA, NS and other records where appropriate. The address used for this should be the address of the virtual machine. You should give this Virtual Machine an A record with the name server1. You should also create a A record for server2 (part 2 of this task)

In addition to this you should create an CNAME record with the name www. When a user does a lookup on www.saffioti.org.au- the address returned should be that of the other virtual machine (Virtual Machine Two).

Be sure to create the appropriate reverse (PTR) records for the machines and to help other administrators be sure to put in place appropriate TXT records.

Once complete, you should fine tune your DNS Servers Virtual machine. Do this by disabling services that were installed but are not required. Be very careful not to break anything here. As a tip you will want to keep both DNS and SSH services active. Ensure both DNS and SSH are invoked at startup.

Finally harden this Virtual Machine using a firewall. Set up filters which allow access to the services possibly being access on the Virtual Machine from other hosts - specifically SSH and DNS. You can assume this incoming traffic can come from anywhere. You will need to make sure these rules always take affect at boot.

Test your virtual machine by setting your Host computer (i.e. the computer that is running the VM) Name Server to the address of the Virtual Machine. See if you can resolve queries for the A records create in saffioti.org.au i.e. server1 and www.

Document the entire process and challenges you experienced. You can install BIND from source or using your package manager.

Part 2: Virtual Machine Two

The second Virtual Machine is to have the LAMP software package installed. LAMP is a standard bundle in the Ubuntu Server platform.

Once complete set up this Virtual Machine to host a website using the Apache Web Server.

The Virtual Machine should have a statically assigned address which matches that specified in the A record for host www.

Test your Apache Server Virtual Machine by using a web browser on another host and trying to browse the website saffioti.org.au.

Once you have set up the web server and tested it, install a FTP server. The FTP server would allow users to upload/ download files to the web server. Configure the server appropriately and then test from another host.

Finally harden this host so that only services being used can be accessed by other machines. You will need to use IPTables.

Document the entire process and challenges you experienced.

Part 3: Simple Web Services

In Virtual Machine Two you set up a web server for the DNS name www.saffioti.org.au. The server is implemented using the HTTP protocol listening on port 80. Your challenge is to make the same site accessible using the HTTPS protocol. To do this set up SSL with a self signed certificate for the site.

Once configured correctly you should be able to access www.saffioti.org.au on both HTTP/HTTPS ports. Naturally you will need to make appropriate changes to your firewall rules.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93128582
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Management Information System

Protected assets please respond to the followingduring a

"Protected Assets" Please respond to the following: During a disaster certain assets must be protected, and for industrial companies, this is not only for the company but also for the surrounding community. Read the arti ...

Assignmentsuppose your college or organization is

Assignment Suppose your college or organization is considering a new project to develop an information system that would allow all employees, students, and customers to access and maintain their own human resources infor ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

Suppose host a wants to send a file of size f 1500 bytes

Suppose Host A wants to send a file of size F = 1500 bytes to Host B. The path from Host A to Host B has three links having rates R 1 = 500 kbps, R 2 = 1 kbps, and R 3 = 2 Mbps, respectively. Assume there is no other tra ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Linux is the best-known and most-utilized open source

Linux is the best-known and most-utilized open source operating framework. As an operating framework, Linux is programming that sits underneath the greater part of the other programming on a PC, getting demands from thos ...

Question 1 please post the hyperlink to one federal statute

Question : 1. Please post the hyperlink to one federal statute which discusses cybercrime on the internet and summarize in not less than 100 words what that statute accomplishes. 2. Please post the hyperlink to one feder ...

Assignmentwrite on any topic related to technology security

Assignment Write on any topic related to technology security. (Choose one among these topics: Importance of Information security, Different types of Social Engineering attacks and how to overcome, IT Governance Planning ...

Assignment1the following statement applies to snow flaked

Assignment 1. The following statement applies to snow flaked schemas: a. Large savings in storage space b. Normalized structures are more difficult to update and maintain c. Schema is less intuitive and end-users are put ...

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As