Final group Assignment SNA
Final group Assignment SNA
Administration
ASSIGNMENT
TECHNOLOGY PARK MALAYSIA
CT106-3-2-SNA
SYSTEMS AND NETWORK ADMINISTRATION
NPT1F2309IT
HAND IN DATE :
WEIGHTAGE :
Asia Pacific
university
Group Assignment Group 8 System and Network
Administration
Table of Contents
Installation Process of Ubuntu in VMware Workstation...............................................................................1
Step 1: Download Ubuntu ISO..................................................................................................................1
Step 2: Install VMware Workstation (if not installed)...............................................................................2
Step 3: Create a New Virtual Machine......................................................................................................2
Step 4: Adjust VM Settings.......................................................................................................................3
Step 5: Specify the Ubuntu ISO.................................................................................................................4
Step 6: Customize Hardware (Optional)....................................................................................................4
Step 9: Start the Virtual Machine...............................................................................................................5
File and Directory Management..................................................................................................................15
C. Network Configuration...........................................................................................................................17
Setting/Changing an IP address...............................................................................................................17
1. Determine the Name of Your Network Interface............................................................................17
2. Install network Manager :................................................................................................................17
3. Verify Installation:...........................................................................................................................18
4. Edit the Network Manager Configuration:......................................................................................18
5. Check device status..........................................................................................................................18
6. Setting/Changing an IP address.......................................................................................................19
Setting up/Changing Hostname...............................................................................................................20
Editing a host file:....................................................................................................................................20
Firewall configuration..................................................................................................................................21
Network File System (NFS) Configuration.................................................................................................24
Install NFS Server....................................................................................................................................24
Create a Shared Directory........................................................................................................................24
Set Directory Permissions........................................................................................................................25
Configure NFS Exports File....................................................................................................................25
Restart the NFS Server.............................................................................................................................26
Configure the Firewall.............................................................................................................................26
Verify Firewall Status..............................................................................................................................26
Install NFS Client....................................................................................................................................26
Create a Mount Point on the Client..........................................................................................................27
Mount the NFS Share on the Client.........................................................................................................27
Verify NFS Connection...........................................................................................................................27
Asia Pacific
university
Group Assignment Group 8 System and Network
Administration
Persistent Mounting of NFS Share..........................................................................................................28
Creating a Certificate Authority (CA) on Ubuntu.......................................................................................29
Install Easy-RSA......................................................................................................................................29
Set Up PKI Directory...............................................................................................................................29
Initialize PKI............................................................................................................................................30
Configure Variables.................................................................................................................................31
Build CA..................................................................................................................................................32
Verify CA Files........................................................................................................................................33
Appendix......................................................................................................................................................34
Workload Matrix:.....................................................................................................................................34
Asia Pacific
university
Group Assignment Group 8 System and Network
Administration
Through VMware Workstation users can run two or more Virtual Machines (VMs)
simultaneously on their physical computing device. The software allows multiple operating systems
including Windows Linux and macOS to operate in parallel through single machine hardware. Software
development and testing along with application running takes advantage of this program in separate
contained environments.
The open-source operating system Ubuntu uses Linux distribution to run applications. The
operating system dominates personal computing along with providing stable performance for servers and
always maintaining security while being simple to utilize. The Ubuntu platform exists in multiple
versions through which users can select Ubuntu Desktop for personal utilization while Ubuntu Server
serves businesses and clouds, and Ubuntu Core operates IoT devices.
1
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
ii. Download the latest version of Ubuntu (choose Ubuntu Desktop for general use).
iii. Save the ISO file to a location on your computer.
2
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Step 4: Adjust VM Settings
i. Designate a name for the VM (for example, "Ubuntu").
ii. Allocate RAM (which should be at least 50 GB to ensure smooth performance). Assign CPU
cores (according to assignment)
iii. Create a Virtual Hard Disk (with a minimum of 50GB recommended). Depending on your
internet preference, choose either NAT or Bridged network
3
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Step 5: Specify the Ubuntu ISO
i. Choose the option labeled “Installer disc image file (iso)” and then click on “Browse.”
ii. Proceed to the directory where you have saved the Ubuntu ISO file and select it. However, ensure
that you are in the correct folder, because this step is crucial for the installation process. Although
it may seem simple, this action is essential for moving forward.
4
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
5
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Then, If you want to update , Click on Update to the new installer otherwise choose Continue without
Updating as given below:
6
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Click on Done
7
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
If you want to set Proxy Configuration, you can set. If you don’t want just to click done. It will make
default proxy address.
8
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
9
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Now, Set Username, Server name, username as you want and Click on Continue.
Click on Continue.
Click on Done.
10
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Click on “Done”
On here, after complete view full log, There will be Reboot now option. Then you will able to login into
Ubuntu.
11
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The command “sudo neofetch” is used to run to displays system information and confirm
environment Setup.
A new user named amer is created using the command sudo adduser amer, which includes a
home directory and default configurations.
12
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The command ‘echo “amer:deco | sudo chpsswd” changes the password for amer to “deco” by
providing the password and username to the chpsswd command, which modifies the password
database on the system.
The current working directory is indicated by the line /home/group8$, which seems to be a
terminal prompt.
Again, amer’s password is changed once more to “mytask” by echoing “amer:mytask” | sudo
chpsswd.
13
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The first command assigns the nickname and second one assigns the value to the np number that
is to be used in other following commands.
The command in the first line “mkdir -p” created a path to the file, the second line command
prints the text” Created directory” where the output appears in third line.
The first command helps to create the file name” Info.doc” in previous created file and the data
“This is my project” is written in it which is redirected by”>” symbol. The second command
gives the output and file has been created.
The first command helps in creating the path. The second command provides the output of a
confirmed message stating that the directory is created.
The first command creates a directory path and the second command confirms the message and
prints the final confirmed output.
14
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The first command “pwd” prints the working directory that appears in the path and the second
command “echo” displays the confirmation message from the file path and adds the data.
The first command helps in creating the “Bukit Jalil” directory, but the second command
confirms the directory and is created.
The first command creates Time.docx file and adds data using “-v timedatectl &>//dev/null” and
the output is redirected.
The first command creates the new file named ”EVENT” with the previously created directory.
The first command is used to create the Sub directory and the second command successfully
creates the directory.
The first command “whoami” create the Mine.txt file and second command creates the file
successfully and adds the data.
The command changes the owner and group for “Info.doc” to “root”.
15
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Finally, the command helps in copying the “Mine.text” to “Big”.
Echo ”Script completed”.
16
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
C. Network Configuration
Setting/Changing an IP address
17
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
3. Verify Installation:
You can check the status of NetworkManager after installation to make sure it's operational by
using command “sudo systemctl status NetworkManager”
18
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
6. Setting/Changing an IP address
The command “sudo nmcli connection edit ens33” is used to edit the network connection
associated with the interfaces ens33 using nmclil.
From this mode, you can view the current settings, modify settings, set static IP or change to
DHCP and save the changes as given below:
By using goto ipv4 inside the nmcli tool to acces the ipv4 settings:
On an Ubuntu system (or any Linux-based system), the IP addresses assigned to each network
interface are shown with the “ip addr show” command. It is a component of the IP command
suite, which is used to manage networks.
19
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
20
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Firewall configuration
Print out a list of three chains, input, forward and output
The INPUT, FORWARD, and OUTPUT chains are among the firewall rules that are currently
displayed by this command.
This command adds a rule to the iptables firewall to allow incoming traffic from a certain IP
address. While other connections might still be blocked by the firewall, these rules ensure that
SSH, HTTP and HTTPS communication is allowed.
This code uses iptables to add firewall rules that allows incoming HTTP(port 80) and SSH(port
22) traffic. The rules are added to the INPUT chain, which anages incoming connections, by
using the -A INPUT option. The TCP protocol is specified by the -p tcp flag, while the
destination port (80 for HTTP and 22 for SSH) are defined by the -- dport option. At last, -j
ACCEPT makes sure that the firewall does not restrict traffic to these ports.
21
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
We can backup our iptables configuration by using the ‘sudo iptables-save > rules.v4’ command,
which saves the current rules to the file called rules.v4.
The ‘sudo iptables-restore < rules.v4’ command, applies the saved setting to restore the firewall
rules from the rules.v4 file. This ensures that firewall settings won’t change even after a system
reboot or modification.
All of the existing iptables firewall rules with extra information are loisted by running ‘sudo
iptables -L -v -n’ command.
Installing the iptables-persistent package with the command sudo apt install iptables-persistent -y
allows firewall rules to be saved and immediately refreshed upon system startup. apt install
installsthe packages, sudo executes it with administrator rigths, and -y automatically verifies the
installation without asking the user. This makes sure that even after a reboot, iptables rules will
continue to function.
The command ‘sudo netfilter-persistent save’ stores the current iptables rules so they remain in
effect following a system reboot.
22
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The command ‘sudo netfilter-persistent reload’ reloads the saved firewall rules without restarting
the system. These commands makes sure that any iptables rules that have been configures stay
active and start up automatically.
23
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Network File System (NFS) Configuration
Install NFS Server
Updating system package lists stands as a prerequisite for NFS server deployment. The process of
updating package index and server NFS software installation requires running these commands:
Running apt update enables users to retrieve the newest version of available packages. Install the NFS
server package by running apt install nfs-kernel-server because it contains all needed tools to configure
and manage NFS file sharing services.
The directory creation process through mkdir -p command operates without errors due to the -p flag when
directories already exist.
24
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Set Directory Permissions
Adequate permissions applied to the directory will enable all client systems to access it.
Using chmod 777 command allows all users to obtain total access which includes reading, writing and
executing.
By setting directory ownership to nogroup nobody through chown nobody:nogroup the directory becomes
usable by all anonymous clients.
The NFS server needs a new entry within the exports file to define both the shared directory and its
permissions specification.
Through rw access authority both reading and writing functions are enabled.
The sync option executes disk writes before allowing any more access to files which makes the system
more stable.
The no_subtree_check option stops the server from performing unneeded checks on directory parents to
increase its speed.
Click CTRL+X to save the file and follow it with Y and Enter.
Export the NFS Directory
The directory requires a set of export settings to become accessible to clients.
Through this command the system shares network-accessible directories as mentioned in the /etc/exports
file.
25
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Restart the NFS Server
Restart the NFS service to apply the changes:
The systemctl restart command ensures that all new configurations take effect immediately.
This command enables the firewall and allows network traffic through the necessary port.
26
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
The nfs-common package contains the necessary tools to mount and access NFS shares.
This directory will act as the access point for the remote NFS share.
This command mounts the shared directory at /mnt/nfs_client, allowing the client machine to access it as
if it were a local folder.
27
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
If the share is mounted successfully, the client should be able to view and modify files inside
/mnt/nfs_client.
This entry ensures that the NFS share is mounted automatically at system startup. Save the file and exit
(CTRL+X, then Y, and Enter).
28
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Install Easy-RSA
The installation of Easy-RSA as your Public-Key Infrastructure (PKI) management tool comes first
when establishing a Certificate Authority (CA) on Ubuntu. Users can set up the Certificate Authority
through running this command.
“sudo apt update && sudo apt install easy-rsa -y”
The command updates package lists while Easy-RSA installation begins since all necessary
dependencies will be installed. The Easy-RSA software suite gives users access to tools with which
they create and handle certificates after installation. The PKI directory setup happens following
installation since it serves as a storage unit for certificates and keys.
29
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Easy-RSA users establish their Public Key Infrastructure (PKI) directory at this point. Running mkdir
~/easy-rsa generates a new file directory specifically for PKI files inside the home folder of the user.
The command ln -s /usr/share/easy-rsa/* ~/easy-rsa/ establishes symbolic links which grant users
access to the Easy-RSA scripts and files that originally reside in the default system directory at
/usr/share/easy-rsa/. The chmod 700 ~/easy-rsa command assigns the current user full control over
this directory for both reading and writing and executing files while preventing all other access. This
prevents unauthorized access during the PKI setup. The user moves into the directory through cd
~/easy-rsa to get ready for the following steps towards Certificate Authority (CA) setup.
Initialize PKI
Starting the initialization process of Easy-RSA Public Key Infrastructure (PKI) occurs when you
execute the ./easyrsa init-pki command into the terminal. The output of this step shows both the
completion of the initialization process along with the creation of a new PKI directory at
/home/group8/easy-rsa/pki. The statement 'Using Easy-RSA configuration: undefined' appears
because the system lacks an active configuration file among vars or other similar variables. The
system must perform this step to prepare the environment for creating a Certificate Authority along
with certificate request generation and managing cryptographic keys. The PKI initialization process
leads to building a CA through the generation of a root certificate alongside its private key.
30
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Configure Variables
Users open the vars configuration file inside nano to set essential Easy-RSA parameters in order to
generate standardized certificates. The variables determine specific details about the environment by
including the country MY, province Kuala Lumpur, city Technology Park, organization TPM and the
email address admin@tpm.edu.my. The organizational unit value within the vars configuration file is
set as "Networking" to effectively organize certificates. The application implements 4096-bit
encryption together with EC cryptography while utilizing SHA-512 for certificate signature hashing.
Multiple important variables must be configured to establish security protocols when requesting
certificates so the Certificate Authority can efficiently administer the platform. Building the CA
follows the variable loading process as the next standard procedure
31
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Build CA
The data shows the execution of the basic ./easyrsa build-ca system command that generates a
Certificate Authority (CA). When executing the next step the already configured vars file performs
the designated settings. The system requires users to establish and verify a CA Key Passphrase
because this phrase controls the signing process of future certificates. During the process the
application asks users to assign a Common Name (CN) to the CA where default naming is set to
"Easy-RSA CA" but users have selected "TPM-Root-CA" instead. The system reports success in CA
certificate generation before saving the ca.crt file at /home/group8/easy-rsa/pki/ location. The CA
certificate maintains its role for verifying and signing additional certificates which belong to the
Public Key Infrastructure (PKI). The production of server and client certificates is normally
performed after the creation step.
32
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Verify CA Files
The verification process of newly created Certificate Authority (CA) must confirm that both its
necessary files and their proper storage positions. The Easy-RSA directory verification begins by
utilizing mkdir ~/easy-rsa and then proceeds to create symbolic links through ln -s /usr/share/easy-
rsa/* ~/easy-rsa/ to achieve file access from the default system location. The setup becomes secure by
issuing the command chmod 700 ~/easy-rsa which allows access to the current user. The cd ~/easy-
rsa command leads the system to the directory which becomes ready for certificate administration.
Verifying CA file creation happens when running ls -l ~/easy-rsa/pki to check the PKI directory
contents because the CA certificate (ca.crt) and private key (private/ca.key) should appear. The
existence of these files confirms the complete setup of Certificate Authority for issuing certificates.
33
Asia Pacific
University
Group Assignment Group 8 System and Network
Administration
Appendix
Workload Matrix:
S. N Name APU Number Task
34
Asia Pacific
University