Integrated Project - 2010 Revision

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

19003 Certificate III in IT, Network

Administration
Semester 1, 2010

This project covers Modules:


• ICAI3020A Install and Optimise Operating System Software
• ICAI3101A Install and Manage Network Protocols
• ICAS3024A Provide Basic System Administration
• ICAS3032A Provide Network System Administration
• ICAS3034A Determine and Action Network Problem
• ICAS3120A Configure and Administer a Network OS
You work for an IT consultancy firm DubboIT.com. You have been engaged to
install and configure a network system for ABC Agricultural Products. There is
currently no networking infrastructure in place.

This project has two parts:

1. Background theory – complete the questions


2. Practical project.

As you work through the practical project, you need to keep track of all
network related issues in a helpdesk database. This could be created using
Access, Excel or a simple word processing document. Details to record would
include date & time, what computer experienced the problem, the problem
itself and what you did to rectify. Details of any diagnostic tests undertaken
should also be recorded (e.g. IPCONFIG, TRACERT, PING).

The database needs to be handed in with your completed portfolio.

Project Submission

Project documentation cover page is to contain DubboIT.com logo and titled


“Project Documentation for ABC Agricultural Products”.

Completed project is to be submitted in .PDF or .DOC format, via email to


your facilitator: [email protected]

Do not submit documentation in .DOCX or .ODT format.

Files may be archived using ZIP format, please do NOT use RAR. All pages
must be numbered.

Copyright © 2005-9 Dubbo TAFE, IT Section Page 1


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
Network Protocols.

1) Investigate the following protocols. Describe what they are used for
PROTOCOL PORT DESCRIPTION
NUMBER(s)
FTP

TFTP

TELNET

DNS

Reverse-DNS

DHCP

DHCP IPv6

SMTP

SNMP

NNTP

POP3

IMAP

FINGER

2) What is meant by a well-defined port?

3) Define the following terms – in your OWN words:


Scope (DHCP)

C-Name (DNS)

Copyright © 2005-9 Dubbo TAFE, IT Section Page 2


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
Alias (DNS)

“A” record (DNS)

“AAAA” record
(DNS)

Router

Gateway

Hub

Switch

Socket

TCP/IP

Netbios

Appletalk

NAT

ICS

Copyright © 2005-9 Dubbo TAFE, IT Section Page 3


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
4) What is the OSI Reference model?

5) What are the 7 layers of the OSI RM, and name 3 protocols at each level?
7

Copyright © 2005-9 Dubbo TAFE, IT Section Page 4


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
6) At what layer would the following be, and why?:
Switch

Hub

router

7) What is the advantage of the OSI RM?

8) What is the DOD model? How many layers does it have, and what are
they?

9) In IPv4, TCP/IP has classes. Complete the following table:


Class Address Start Address Finish Used for
A 0.0.0.0 126.255.255.255 Public internet

B 128.0.0.0 191.255.255.255 Public internet

C 192.0.0.0 223.255.255.255 Public internet

D 224.0.0.0 239.255.255.255 Multicasting

E 240.0.0.0 255.255.255.255 Reserved

Copyright © 2005-9 Dubbo TAFE, IT Section Page 5


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
10) Each IPv4 class has a private range as well.
Class Address Start Address Finish # Available IPs
A 10.0.0.0 10.255.255.255

LOOPBACK 127.0.0.0 127.255.255.255

B 172.16.0.0 172.31.0.0

C 192.168.0.0 192.168.255.255

D 224.0.0.0 224.?????

11)What is the difference between a public and a private IP address range?

12)Give two advantages of IPv6 over IPv4

13)How many bits in an IPv4 address?

14)How many bits in an IPv6 address?

Copyright © 2005-9 Dubbo TAFE, IT Section Page 6


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
15)What are the two special addresses in IPv6?

16) What does the %13 indicate in the following IPv6 address?
fe80::3005:2467:88f3:872e%13

17)Define the following IPv6 address types:


Identified By Description
Link Local Unicast

Site-local unicast

Unique-local unicast

Global unicast

Multicast

Anycast

18) Complete the table, identify what each component is, and the number of
bits of each component:
Typical IPv6 Address
fe80:0000:0000: 0000: 8d85:c351:f336:ab8a

bits bits bits

Answers to the following two questions can be found at:


• “Security Information for IPv6”
http://technet2.microsoft.com/windowsserver/en/library/904598b2-
c3ed-439b-b89a-9f96915013b11033.mspx?mfr=true
• “IPv6 address autoconfiguration”
http://technet2.microsoft.com/windowsserver/en/library/5a528933-
a78d-4588-8aa1-b158957ba2d51033.mspx?mfr=true

Copyright © 2005-9 Dubbo TAFE, IT Section Page 7


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
19)What is auto-configuration in IPv6 and what possible security issue does
this present?

20)What is the difference between IPv6 Stateful and IPv6 Stateless auto-
configuration?

21)What is DNS forwarding?

Copyright © 2005-9 Dubbo TAFE, IT Section Page 8


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
22)What is the difference between a primary and a secondary DNS server?

23)What is the weakness of the primary/secondary DNS model and how is the
AD Integrated model a possibly better solution?

24)What commands do the following:


a. Renew a IPv4 DHCP address?

b. Display your MAC address?

c. Flush the DNS cache?

d. Release a IPv4 DHCP address?

25)What is the purpose of an operating system?

Copyright © 2005-9 Dubbo TAFE, IT Section Page 9


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
26)Define the following terms:
real-time system
batch system
multi-tasking

27) Once you have installed a computer system for a client, what should you
do (and how often) to ensure the system meets their requirements?

Copyright © 2005-9 Dubbo TAFE, IT Section Page 10


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Copyright © 2005-9 Dubbo TAFE, IT Section Page 11
E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Practical Project

Task Date Date


Completed Assessed
1. Create a network plan (assuming the local
room) of how you will set up the network for
the above organization. Attach supporting
documentation which shows which protocols
you will be using and why. If your protocol
involves address ranges, you need to
choose an address range and justify your
choice.
2. Obtain specifications for the version of
Windows Server you are using and ensure
the computer you intend to install Server on
meets those requirements. Attach a copy of
the specifications to your portfolio.
3. Investigate licensing methods of Windows. If
each person were to have a computer
running XP Professional, how many CAL’s
would be required to make the computer set-
up legal? Your portfolio needs to include a
brief summary of the different licensing
methods of Windows (per server or per
user).
4. Install Windows 2003 Server.

Partition instructions:
* Allow room for bitlocker (1.5 gig)
* You need 3 partitions of approximate equal
size for your data.

Whilst Windows is installing, locate 3


different sites on the Internet which detail
vulnerabilities in Windows and/or Linux, and
summarise in your words how these
vulnerabilities work.
5. [Optional] Install Windows recovery console.
What command is used to do this?

6. Install Active Directory. Your domain name is


to be based on your name (e.g. renee.local).

Create an OU called computers, with 2 child


OUs, Desktop PCs and Laptops.

Create an OU for company employees.

Copyright © 2005-9 Dubbo TAFE, IT Section Page 12


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed

7. Install loopback adaptor. Configure your


networks as follows:

Internal:
192.168.10.200+”your computer number”

External:
192.168.100+”your computer number”.0
8. Install Virtual PC on your server, and install
Windows XP as a virtual machine. Configure
VPC to use lookback adaptor.
9. Configure DHCP. Ensure XP gets valid
addresses and has proper functionality.
10. [optional] Configure DNS protocol for your
domain for www and for www2. Setup 2 IIS
websites to use these domains.
11. Join XP to the domain. Move the computer
account to the correct place in AD.
12. Install administration tools and GPMC on
your XP workstation. Create a console and
save to desktop.
13. Create a group policy and use GPMC to
import WSUS settings from our domain
controller (wilab1-dc).

What do you type to force windows to


update immediately?
14. Create home data folders for users on the D:
drive. Each division of the business requires
a folder for their division. Security
permissions MUST be configured so that
automatic folder creation with the correct
permissions occurs when adding users.
15. Create an account creation form on which
requests for user accounts are recorded.
The appropriate manager of each division
must sign off each form. You need to record
the type of access granted (which groups,
which OUs, etc). For audit purposes it is
required that you record the date on which
the account was actually created and by
whom. It is beneficial that you record the
initial password, generated by yourself, on
this form as well.

16. Create appropriate security groups

Copyright © 2005-9 Dubbo TAFE, IT Section Page 13


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed
17. Requests have come in for the following
users:
payroll jim, james
accounting monte, karen
research jack, renee, jenny
manufacturing ron, dave, stephen, amy
Sales Kerrie, liz
Web Design Troy, JamesB

Fill in the appropriate forms


Create accounts (create template users
first) and place in appropriate groups.

Completed copies of ALL user account


creation forms need to be submitted in your
portfolio (scanned images).
18. Check home folders on the D: drive to
ensure each user can only access his/her
own folder.
19. Ensure each group can only access their
own folders
20. Document file system structure and
permissions for your system (e.g. where is
IIS located? Where is SYSVOL located?
Where are the active directory database
files? Where are user home and group
folders?)
21. Configure Windows auditing for the group
home folders. Access can be verified by
reviewing log files.
22. Create a software registry, auditing a
standard classroom computer hard disk. You
registry needs to be thorough, and include
details of license number and location. If any
illegal software is found, it needs to be
reported to your supervisor.
23. Download and configure a software audit
program (e.g AuditWizard, EzAudit). The
program needs to be configured to run in a
network login script. Both your server and at
least 1 workstation attached to your network
need to be audited.

Your portfolio needs to include:


• details on how you created the login
script
• A brief description of what the program

Copyright © 2005-9 Dubbo TAFE, IT Section Page 14


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed
does and how it works (in your own
words)
• A screen shot of AuditWizard showing
several computers having been audited

Once completed, update Q20 (document the


file systems) to accommodate file
configuration for AuditWizard.

24. If the organization has any existing policies


or procedures for computer usage, these
need to be examined. If not, create
appropriate policies and/or procedures for:

 Virus Management
 Backup and Restore
 Desktop lockdown (e.g. company logo
on background, screensaver, mp3/wma
CD ripping, etc)
 Password security
 User management, detailing what to do
when a user leaves a company. Is the
account disabled or deleted? What
problems might exist if EFS is being
used?
 Network use policy – e.g. downloading
from the Internet, taking floppy disks
home, installing software, viewing
users’ emails.

Copies of above policies &/or procedures


need to be included in your portfolio. If no
policies exist, write some.

Where possible, use operating system


tools to enforce the above policies.

25. Create a log-on banner which advises users


that use of the system is subject to the
computer usage policy.
26. Identify and implement methods of enforcing
desktop settings (company logo on desktop).
27. Run a password audit tool (e.g. LCP504en,
LC5, ophcrack, Pro-active Password
Auditor) to check password strengths. Your
portfolio should include screen shots of this.

Copyright © 2005-9 Dubbo TAFE, IT Section Page 15


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed
28. Create a backup schedule for your network.
Also provide details of media rotation
schemes.
29. Create a backup log register, which details
when back-ups were done, what was backed
up, who did the backup and the ID of the
tape or disk or DVD containing the backup.
30. Create a restore log register. This details
when a restore is made, who requested it,
why it was necessary, what was needed to
be restore and who restored it.
31. Use MS-BACKUP to create a system state
backup. Create a complete system back-up.
(Use MS BACKUP, Acronis true-image, or
Ghost to backup the C: drive to the E:).

For a more challenging experience, use


DriveImage XML and create a Bart PE boot
disk for recovery purposes.

Once you have worked out the procedure,


document it, including screen shots.

Ensure you know the difference between the


following backup types:
• Differential
• Complete
• Incremental
32. Call your facilitator now to corrupt your C:
drive, thereby necessitating a system
restore. Once you have perfected the
procedure, document it using step-by-step
instructions and screen shots if necessary.
33. Infect your computer with viruses. (ask
teacher for disk). Research each virus,
providing BRIEF details, in your OWN
words, on what it damages, how it spreads
and how to control it. Include references to
any websites used.
34. Follow removal instructions to clean your
system.
35. Install Norton Anti-Virus corporate edition on
your computer. Configure it to deploy
software and updates to workstations on the
network.
36. Prepare a disaster recovery plan for your
network. You don’t need to go into a lot of

Copyright © 2005-9 Dubbo TAFE, IT Section Page 16


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed
legal fine print, what is required is a list of:
* possible threats,
* likelihood of occurrence (risk),
* downtime
* cost factor (taking into account downtime,
etc.)
* preventative measures
* cost of preventative measures
* Whose responsibility each risk is and
contact details
* What procedure is to be followed if the
specified risk occurs
37. You need to test whatever disaster recover
procedures can be tested.
38. Review procedures and policies from Step
24, documenting weaknesses in
management tools that prevent automatic
enforcement of policy.
39. Install and/or configure a performance
monitoring tool in Windows. Also create
benchmarks for hard disk, cpu and memory.
Identify any weaknesses and provide
recommendations.

• investigate bottleneck thresholds (disk


queue length, cpu utilization and
paging)

• set an alert so a message pops up on


the screen when cpu utilization hits
60%

• Gather ping benchmarks to several


sites around the world
40. On another computer, install Linux as a
Network server, configured with Open Office.
Ensure it has connectivity to your Windows
server. Document tools used to test for
connectivity. Create accounts for the five
users as listed above.
41. Install a Windows-based graphical X client
and log into Linux computer.
42. Compare the use of Windows and Linux as
possible servers to meet the requirements of
the company. You need to identify the
general features, relative strengths and
weaknesses of each Network operating

Copyright © 2005-9 Dubbo TAFE, IT Section Page 17


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Task Date Date
Completed Assessed
system. A balanced conclusion is expected.

Copyright © 2005-9 Dubbo TAFE, IT Section Page 18


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Linux Presentation Choices:
• Users and Groups (how to add, how they differ from windows, the
passwd file)
• Samba (What is it, history, configuration and usage)
• Integrating Linux and Windows
• WINE and Virtualisation
• EXT2/EXT3/Reiser FS/NFS
• Updating your Linux
• What is Linux?
• Microsoft Windows Services for UNIX, Interix (SUA), Cygwin
(What are they, how to install and usage)
• SELinux, Linux Firewall and IPTables
• Telnet, SSH, and Tunelling X through SSH

The portfolio to be handed in needs to include:


 Assessment cover sheet
 Network map
 Server portfolio:
* hardware configuration
* software configuration
* any settings in Group Policy required to enforce corporate policy
(RSOP and/or GPMC will be useful for this).
 Completed and signed off account creation forms
 Network timing baselines
 Disaster Recovery Plan
 Helpdesk database printout listed all network problems encountered
 Backup schedule and logs
 Restore schedule and logs
 Screenshots of password audit tool
 Computer virus research
 Details of Windows licensing (per server/per seat)
 Windows system requirements for the version of Server you have
installed.
 Comparison of Windows Vs. Linux

Copyright © 2005-9 Dubbo TAFE, IT Section Page 19


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
Marking Grid Name: _____________
1 Network Map

2 Slipstream Windows

3 Install Server, AD, Service Packs.

Locate 3 security sites

Install recovery console


4 Create folders to be shared for each
group

5 Create security groups

6 Group folder permissions

7 Account Creation Form

8 and 9 Create user accounts

Use template account for copying.

User folders created using permissions


as recommended by Microsoft
10 Audit access to folders

11 CALs

12 Software Registry

13 Audit Wizard installed.

Network logon script created and tested


functional.

Workstation’s showable in AuditWizard.


14 Policies/Procedures

15 Creation of log-on banner

16 Enforce desktop settings

17 Password audit tool

18 Backup register

Copyright © 2005-9 Dubbo TAFE, IT Section Page 20


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3
19 Restore log register

20 Complete system backup

21 Complete system restore

22 Infect with virus

23 Virus removal

24 Install NAV corporate

25 Disaster recovery plan

26 Automatic enforcement of policies

27 Benchmarking Windows

28 Install and configure Linux

Create 5 Users
29 Install Windows based X-Server/Tunnel
into Linux

30 Compare Linux Vs. Windows

Install Software to Network Computers


1 Identify and obtain required software

2 Obtain hardware requirements for


software
3 Create MSI for office

Office is slipstreamed
4 Download/Configure firefox as MSI

5 Install Dreamweaver

6 Project/Visio installation

7 RIS/MSI comparison – pros and cons

8 One on One instruction

Copyright © 2005-9 Dubbo TAFE, IT Section Page 21


E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:42 a3/p3
Copyright © 2005-9 Dubbo TAFE, IT Section Page 22
E:\Certificate 3 IT 2010\Handouts\19003 Integrated Project - 2010 revision.docPrinted:
16/03/201019:26:43 a3/p3

You might also like