Chapter 3, Administering TCP/IP
--------------------------------------------------------------- Client utilities Server daemon --------------------------------------------------------------- ftp(TC) ftpd(ADMN) rcmd(TC) and rcp(TC) rshd(ADMN) rlogin(TC) rlogind(ADMN) telnet(TC) telnetd(ADMN)You can use these utilities and daemons in a Kerberos Version 5 realm or DCE cell to provide authenticated TCP/IP services as described below. NOTE: You cannot use the Kerberos authentication features of these utilities unless you have a Kerberos Version 5 Security Server such as the SCO Security Services (supplied with the SCO Distributed Services Release 1.0.3). The utilities will function without providing Kerberos authentication if you do not have such a server.
Configuring the Secure TCP utilitiesTo use these utilities with Kerberos Version 5 authentication, you must first define the users (interactive principals) and host systems (machine principals) on the Security Server(s) for the Kerberos realm or DCE cell where they are to operate:
Obtaining Kerberos session credentialsBefore a user can use the Secure TCP utilities, they must obtain Kerberos session credentials. Because the current versions of login(M) and scologin(XC) do not support Kerberos authenticated login, there are two alternative methods by which a user may obtain these credentials: Obtaining session credentials using kinitLog in locally using unauthenticated login and then obtain session credentials using kinit(TC). The kinit command will authenticate the user's session with the Security Server and obtain a Ticket Granting Ticket for the user's session provided the user can supply the correct password for their interactive principal name. To monitor their credentials, the user must run the ksession(TC) command which will warn when the credentials are about to expire. The user can also use the klist(TC) command to view their credentials and their expiry date. WARNING: If a user performs an authenticated connection to another host (gamma) from a host (beta) to which they already connected remotely from a machine (alpha), their password will be transmitted in clear text across the network from alpha to beta. Obtaining session credentials using ktadd and kinitTo avoid the possibility that passwords can be transmitted in clear text, root can use the ktadd(ADMN) command to create user keys on the various machines that different users are allowed to access. Alternatively a user can use ktadd to create a user key on each of the machines that they need to use. WARNING: You should only invoke ktadd(ADMN) on the system to which you are directly logged in. This is to prevent passwords being passed in clear text across the network.
For example, to obtain a user key for the interactive principal
chuck with password ``clydenw''
for the cell local_cell, enter the following commands:
This creates a private key table .v5srvtab for chuck in their home directory and changes its permissions so only chuck and root can read from or write to this file. (Note that this example assumes that the shell being used is either ksh or csh.)
To use their private key table when obtaining session credentials, the
user calls kinit from their .profile or
.login file. This example also shows ksession
being run to monitor chuck's credentials:
For more information about using the SCO Security Services, see the SCO Security Services Release and Installation Notes. For more information about using the SCO DCE Executive, see the SCO DCE Executive Release and Installation Notes. |
Networking
guide Call : 800-519- 2267
Vibrant boot camp offers MCSE, CCNA, CCNP Certification back to back
Vibrant
offers
MCSE
certification
training
boot camp
for $5400
all inclusive,
instructor
led at
California
and
Baltimore.
|
Additional Administrative Tasks
Address Resolution Protocol (ARP)
Addressing at the Data Link Layer
Advantages of Packet Switching
Assigning File-Level Permissions on an NTFS Partition
Asynchronous Transfer Mode (ATM)
Band Usage (Baseband or Broadband)
Characteristics of Transmission Media
Coax and Fire Code Classifications
Communications Devices and OSI
Comparing Contention and Token Passing
Configuring Network Adapter Cards
Connection-oriented and Connectionless Modes
Creating and Assigning Permissions to a Shared Folder on Windows NT
Defining a Network Adapter Card
Error and Flow Control at the Data Link Layer
Establishing Troubleshooting Connectivity and Communication
Exercise 1.1: Logging on as a Peer
Exercise 1.2: Windows NT Access Permissions
Exercise 1.3: Exploring the NT Workstation Service
Exercise 10.1: Network Adapter Resource Settings
Exercise 10.2: Windows NT Diagnostics
Exercise 11.1: Mapping a Network Drive
Exercise 12.1: Using Network Monitor
Exercise 12.2: Creating a Chart in Performance Monitor
Exercise 12.3: Performance Monitor Alerts, Logs, and Reports
Exercise 13.1: Modem Troubleshooter
Exercise 13.2: Windows NT Books Online
Exercise 2.1: Gateway Services for NetWare
Exercise 2.2: SLIP and PPP in Dial-Up Networking
Exercise 3.1: Shopping for Network Cabling
Exercise 4.1: Matching Topologies to Applications
Exercise 5.1: Installing Network Protocols in Windows NT
Exercise 5.2: Network Bindings
Exercise 6.1: Enabling IPX Routing
Exercise 7.1: Accessing an X.25 Network Through NT Dial-Up Networking
Exercise 8.1: Creating a User Account in Windows NT
Exercise 8.2: Creating Groups on Windows NT
Exercise 8.3: Sharing a Directory on a Windows NT FAT Partition
Exercise 8.4: Setting NTFS Permissions on a Shared Folder
Exercise 8.5: Sharing a Directory Using Share-Level Security
Exercise 8.6: Sharing a Directory Using User-Level Security
Exercise 8.7: Creating a Local Printer with Windows NT
Exercise 8.8: Sharing a Printer on the Network with Windows 95
Exercise 9.1: Exploring Windows NTs Disk Administrator
Extended LANs (Wireless Bridging)
Finding Resources on Microsoft Networks
Frequency-Division Multiplexing
Handling Other Network Problems
Hardware Access at the Data Link Layer
IEEE 802.3 and IEEE 802.5 Media
Implementing a Fault-Tolerant Design
Implementing Security on Windows 95
Implementing Security on Windows NT
Initiating the Troubleshooting Process
Installing Network Adapter Cards
Internet Control Message Protocol (ICMP)
Managing and Securing a Microsoft Network
Managing User Accounts and Groups Using Windows NT
Narrow-Band Radio Transmission
Network Models: Comparing Server-Based and Peer-to-Peer Configurations
Network Topologies and Architectures
Networking Concepts and Components
Open Shortest Path First (OSPF)
OSI Application Layer Concepts
OSI Presentation Layer Concepts
Physical and Logical Topologies
Printer Sharing with Windows 95
Printer Sharing with Windows NT
Recovering from System Failure
Remote Terminal Emulation (TELNET)
Routing Information Protocol (RIP)
Rules and the Communication Process
Security for Printer Resources
Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP)
Session Layer Session Administration
Share-Level Security on Windows 95
Shielded Twisted-Pair (STP) Cable
Simple Mail Transfer Protocol (SMTP)
Spread-Spectrum Radio Transmission
Standards Organizations and the ISO
Summary of Cable Characteristics
Transmission Control Protocol (TCP)
Transport Layer Connection Services
Troubleshooting Cables and Connectors
Troubleshooting Hubs and MSAUs
Troubleshooting Network Adapter Cards
Troubleshooting Network Performance
Unshielded Twisted-Pair (UTP) Cable
User-Level Security on Windows 95
Virtual Circuit Packet Switching
Wireless Communications with LANs
MCSE CCNA CCNP Boot Camp Schedule by Vibrant boot camps
MCSE Boot Camp Proven MCSE Boot camp Training for MCSE Certification Fast
MCSE CCNA CCNP Boot Camp Schedule by Vibrant boot camps
MCSE Boot Camp - Proven Boot camp for MCSE at Baltimore, Maryland
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
CCNA 801 Boot Camp by Vibrant boot camps, join MCSE camps
CCNA Boot Camp by Vibrant boot camps, join MCSE camps
CCNP Boot Camp by Vibrant boot camps, join CCNP camps
MCSE Boot Camp compare Vibrant boot camps, join MCSE camps
Comptia Security+ Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp contact Vibrant boot camps, join MCSE camps
MCSE Boot Camp course fees Vibrant boot camps, join MCSE camps
MCSE Boot Camp FAQ by Vibrant boot camps, join MCSE camps
MCSE Boot Camp location by Vibrant boot camps, join MCSE camps
MCSE Boot Camp location by Vibrant boot camps, join MCSE camps
MCSE Boot Camp MCSE Certification also MCSE Training Boot Camp
MCSE Boot Camp by Vibrant boot camps, join MCSE camps, MCSE Cert
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp MCSE 14days all_incl MCSE Certifiation boot camp
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
MCSE Boot Camp Testimonials by Vibrant boot camps
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCSE Boot Camp MCSE Certification also MCSE Training Boot Camp
Microsoft Vista Certification Boot Camp for Vista training boot camps
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
MCSE Boot Camp all inclusive bootcamp Vibrant boot camps, join MCSE camps
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
reason_to_join_vibrant_boot_camp.php
mta-it-infrastructure-windows-server-training-certification.php
msce-windows-2008-to-2016-upgrade.php
microsoft-mcse-messaging-certification-training-course.php
microsoft-certification-courses.php
mcse-productivity-exchange-server-2016.php
mcse-cloud-platform-infrastructure-azure-track.php
mcsa-windows-server-2016-training-certification-boot-camp.php
mcsa_server_2012_r2_boot_camp.php
comptia-certification-courses.php
comptia_a+_network+_boot_camp.php
comptia_a+_bootcamp_course.php
cisco-certification-courses.php
certified-ethical-hacker-ceh-certified-EC-council.php