Agenda: exercises-virtual-noc.txt

File exercises-virtual-noc.txt, 3.6 KB (added by admin, 9 years ago)
Line 
1Advanced Registry Operations Curriculum
22       Building Your Virtual NOC
33       
44       Notes:
55       ------
66       * Commands preceded with "$" imply that you should execute the command as
77         a general user - not as root.
88       * Commands preceded with "#" imply that you should be working as root.
99       * Commands with more specific command lines (e.g. "RTR-GW>" or "mysql>")
1010        imply that you are executing commands on remote equipment, or within
1111        another program.
1212      * If a command line ends with "\" this indicates that the command continues
1313        on the next line and you should treat this as a single line.
1414     
1515      Exercises Part I
1616      ----------------
1717     
1818      0. Log in to your PC or open a terminal window as the tladmain user.
1919     
2020      Some Items to Update in Trac
2121      ----------------------------
2222     
2323      1. http://MyMachine/trac/
2424         ----------------------
2525     
2626      Log in to the trac instance as the user "sysadmin" using the password given in
2727      class.
2828     
2929      Fill in a few items on the page...
3030     
3131      For instance, try creating an entry to describe the PCs in your subnet. In
3232      Trac click on "Edit this page" (after you've logged in) at the bottom of the page.
3333      Go down to the "Network Configuration" section and add some lines that look like this:
3434     
3535        * [wiki:PCsGroup1 Group 1 PCs]
3636        * [wiki:PCsGroup2 Group 2 PCs]
3737        * [wiki:Routers Routers]
3838        * [wiki:Switches Switches]
3939       
4040       You need the space before each "*" in order for the items to appear as bullets.
4141       
4242       Click on "Submit changes". You'll notice the new items are greyed out and have a question
4343       mark after them. If you click on one of the items you'll be presented with a new page.
4444       Click on the "Create this page" button and start adding in some information about any of
4545       the items.
4646       
4747       You can use the Network Diagram on the NOC for reference:
4848       
4949       http://noc/trac/wiki/NetDiagram
5050       
5151       To get more information about your PC, in a terminal window you can do some exploring:
5252       
5353       $ df -h                                        [show size of partitions]
5454       $ fdisk -l                                     [list partitions, see disk size]
5555       $ top                                  [current running processes and installed RAM]
5656       $ less /proc/cpuinfo                                   [CPU(s) type and speed]
5757       $ ifconfig                             [network interfaces and their addresses]
5858       
5959       That is probably enough information. If you wish to see all hardware recognized by
6060       Linux on your box you can read through the system startup message:
6161       
6262       $ dmesg | more
6363       
6464       2. Explore Your Local Network
6565          --------------------------
6666         
6767       If you are wondering just what is on your local network segment you can do some scanning
6868       using a tool like nmap. Naturally a tool like nmap is often seen as an attack or potential
6969       security breach, so use with care.
7070       
7171       The address ranges in the classroom are:
7272       
7373       Group 1:       192.168.5.128/27
7474       Group 2:       192.168.5.160/27
7575       Backbone:      192.168.17.0/24
7676       
7777       See what's on your local subnet. Here are a few different ways:
7878       
7979       $ sudo nmap -sP 192.168.5.128/27               [use the address range that corresponds to your group]
8080       $ sudo nmap -v 192.168.5.128/27
8181       $ sudo nmap -sV 192.168.5.128                  [intensive, takes a while and looks like an attack]
8282       $ sudo nmap -O 192.168.5.128/27                [detect OS'es]
8383       
8484       Nmap is a complex tool. Take a look at it's man pages for some more information:
8585       
8686       $ man nmap
8787       
8888       If you are monitoring a network segment sometimes it can be useful to run an nmap scan on
8989       the segment as a reality check to verify that what is on the network is what you think
9090       should be there.