(Utilizing virtual machine)
Network Tuning and Analysis
Locate and utilize linux system administration commands to create users and groups. Standard linux commands will be used to allocate specific user and group permissions for files and directories.
For admin tasks you will need to switch to the root user:
Part 1: Networking Topology Analysis
What are the following characteristics of your current network connection?
- Network Adapter Type
- Network Interface Name in Linux
- ip address
- subnet mask
- default route
What is the ip address of your Host Machine? (Machine running Virtual Box, not the Linux partition – i.e. Windows).
Is the ip address of the host machine on the same subnet as the virtual host? Why or why not?
Think of a server on the internet somewhere (i.e. google.com). Ping the server and ctrl-c after 10 or so samples). What was the average round trip time.
Open a second window. From one window, ping the server on the internet again. From the second window, bring down the network interface using the â€œifconfigâ€ command. Watch the ping output. After several samples, bring up the interface using the â€œifconfigâ€ command. Control-C out of the ping commands after watching it for several samples once the interface is up again. Record and comments on the statistics (RTT and Packet Loss).
Can you ping the ip address of the host machine?
Can you ping the ip address of the default route? What machine is responding when pinging the default route?
Open a â€œcommand windowâ€ ( on Windows) or (Terminal on Mac) in your host machine. Can you ping the ip address of your linux virtual host?
How do you view the routing table? What is represented by the rows in the routing table?
Part 2: Adapter Configuration
In your Virtual Box configuration, add a second adapter which uses a â€œbridgedâ€ connection instead of a NAT connection. Set â€œpromiscuousâ€ mode to allow all. Your VM will need to be shutdown to do this.
Startup your VM.
Review your Network interface(s) using ifconfig.
Now that you have multiple network interfaces on your system with ip addresses on different networks, review the routing table again and describe how it is used to route traffic between the two cards?
Which interface is being used as the default route? Change the routing table so that the default route contains the ip address of the drfault gateway used by your host machine. Use ipconfig in windows to get this address. Can you still ping google? Describe how network trafficing has changed.
Part 3: Packet Tracing
Download and install â€œputtyâ€ on your host machine (Machine running Virtual Box â€“ i.e. Windows â€“ this does not get installed on your Linux Virtual Machine). http://www.putty.org
*If you already have a telnet and ssh client you can use those instead.
Using ssh and or telnet, login to your Virtual machine.
*sudo apt-get install openssh-server
*apt-get install telnetd
Using â€œtcpdumpâ€ start a packet trace which sniffs all packets on the bridged interface using port 22 or part 23.
Now, SSH in from your Host Machine using putty. Report the traffic you see. Are you seeing what is expected? Take a couple of packet headera and report what the various fields mean. Name a situation where packet tracing is beneficial to you as a system administrator?
NOTE: A packet may contain connection information, including the server running the TCP service first column, and arrow > shows the clients address and high order port used to establish the TCP connection between the two hosts. Additional TCP information required for handshaking and packaging packets is also included â€“ i.e. seq, ack, win, length, tos, ttl, id.
You will submit a Word or Libre Writer Document which contains results from the above analysis and responses. I do not have access to your system so you need to be sure to provide screenshots for anything I cannot possibly know. Only provide screenshots necessary to prove your responses.
Please insert your screenshots into your word document with supporting documentation which meets all requirements. You will be penalized for any results which are not backed by proof.