Submitted by: Submitted by brucelaspinasr
Views: 76
Words: 2421
Pages: 10
Category: Business and Industry
Date Submitted: 09/02/2014 07:19 AM
Bruce Laspina
SECURE FTP ANSDSECURE SHELL (SSH)
DEVRY UNINVERSITY OF NEW YORK
6/2/14
Table of Contents
Document Reference: 2
1.0 Introduction: 2
2.0 Equipment required for this lab: 3
2.0 EQUIPMENT REQUIRED : 3
3.0 Hardware and software: 3
4.0 key TERMs: 3
5.0 Open a Terminal and logon as root: 4
6.0 Update /etc/hosts: 4
7.0 Configure the ftp server: 7
8.0 Perform a secure remote session on host11 to host12: 17
Conclusion: 19
Document Reference:
These documents are required to perform management procedures:
* Unix and Linux administration Handbook.
* DeVry University Student Installation Handout. http://www.devryu.net/re/DotNextLaunch.asp
* http://searchnetworking.techtarget.com/definition/TCP-IP
1.0 Introduction:
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously.
2.0 -------------------------------------------------
Equipment required for this lab:
2.0 EQUIPMENT REQUIRED :
* Software: VirtualBox (4.0.10) or higher, Fedora 20 with only 768 MB allocated...