Premium Essay

Dump File

In:

Submitted By kennguyenusa
Words 749
Pages 3
TDC463 –Lab01: IP Static Routing

Learning Objective:
1. 2. 3. Learn the basics of Cisco IOS commands. Configure static routing paths on Cisco router Learn the Linux tools to test route paths

2. Network Diagram
Host1 fa0/1 R1 s0/1/0 s0/1/0 R2 s0/1/1 R3 s0/1/1 Host2 fa0/0
192.168.2.10

192.168.1.10

3. Lab Configuration Procedure
Preliminary ‐ IP address Assignment Machine Host1 Host2 R1 R2 R3 You will be shown steps later to configure these addresses. Make sure that you do not change configuration of interfaces other than the ones mentioned above. Step 1: Make a reservation for this lab like you did in the preliminary lab. Step 2: When it’s your reserved time slot, connect to the DL Pod as you did in the preliminary lab. Interface eth1 eth1 fa0/1 s0/1/0 s0/1/0 s0/1/1 fa0/0 s0/1/1 IP Address (Mask) 192.168.1.10/24 192.168.2.10/24 192.168.1.1/24 192.168.10.1/24 192.168.10.2/24 192.168.20.2/24 192.168.2.3/24 192.168.20.3/24

Summer II 2012

TDC463 – lab01

Page 1 of 4

Step 3: Configure the IP addresses on the routers Remember that you need to enter the following commands to get into the configuration mode: enable conf term R1 int fa0/1 ip address 192.168.1.1 255.255.255.0 no shutdown int s0/1/0 ip address 192.168.10.1 255.255.255.0 no shutdown exit Step 4: Configure the Static Routes. R1 ip route 192.168.20.0 255.255.255.0 192.168.10.2 ip route 192.168.2.0 255.255.255.0 192.168.10.2 exit R2 int s0/1/0 ip address 192.168.10.2 255.255.255.0 no shutdown int s0/1/1 ip address 192.168.20.2 255.255.255.0 no shutdown exit R3 Configure R3 with the IP addreses given in the table on page 1. (Follow the examples of R1 and R2)

R2 ip route 192.168.1.0 255.255.255.0 192.168.10.1 ip route 192.168.2.0 255.255.255.0 192.168.20.3 exit R3 ip route 192.168.1.0 255.255.255.0

Similar Documents

Free Essay

Engineering

...production requirements of an open pit mine. The method of analysis was first to determine the cycle time for each truck which led to calculating the amount of each dump truck necessary to meet the waste removal requirement of 70 Mt/pa. Secondly, an expected cost for ten years was conducted on each Komatsu dump truck and cross analysed to determine the most cost efficient option. It was found that the Komatsu 930E-4 had the least expected cost over the ten years. Then cross analysing, each loader with the Komatsu 930E-4 truck, it was determined that the Hitachi EX8000-6 was the most efficient loader for a fleet of Komatsu 930E-4 trucks. Once these were completed, a full haul truck cycle time and expected cost analysis for each year was calculated. It revealed that thirty four Komatsu 930E-4 dump trucks were needed for a single Hitachi EX8000-6 loader. However, the above analysis was limited by the fact that it didn’t account for truck and loader break downs. By taking into account a 10% threshold on the number of trucks and loaders needed it gave some costs accounting for time where not all trucks are operational. This analysis yielded that a fleet of thirty seven Komatsu 930E-4 dump trucks and two Hitachi EX8000-6 loaders would be best suited for the Kangaroo Mining Corporation. The expected costs for both loaders and dump trucks were calculated (refer to table 1.9) and showed that the average expected cost per year of hauling and loading would be $142 613 457/pa and $11 869 288/pa...

Words: 4499 - Pages: 18

Free Essay

Hurray

...PROCEDURES FOR CONDUCTING PRACTICAL ICT TESTS The Supervisor A suitably competent supervisor, who may be the candidates’ tutor, is responsible for the administration of the practical tests according to these instructions. The supervisor is responsible for the preparation of the hardware and software for the test. Timetabling of the Practical Tests CIE does not timetable the practical tests in the same way as most IGCSE and AS & A Level written papers. The IGCSE and AS & A Level timetable will specify a period within which candidates must take the two practical tests for each syllabus. Within this period, Centres may conduct the practical tests at any convenient time or times. Candidates must complete each practical test in a single session. Wherever possible, candidates from the same Centre should sit their assessment at the same time. If more than one session is necessary to accommodate all candidates, these sessions should follow on from each other. However, Centres do not need to sequester candidates until other candidates have taken the test. When arranging examination dates, Centres should take into account the time needed to set up the system and should allow contingency planning (e.g. to reschedule examination times due to possible hardware failure) wherever possible. Preparation for the Practical Tests Before the candidates take a practical test, the supervisor must work through a past/specimen paper, using the hardware and software that the candidates will be using...

Words: 2393 - Pages: 10

Premium Essay

An Analysis of Ecb

...This customer data file is for 60,000 customer records in the restaurant category. Clean up the data: As with most customer data files, there is incomplete information. Address how you handle incomplete data. (I suggest completely eliminating records in Acquisition Channel with “NULL” or “Uncategorized”.) Also eliminate any records with blank in Ethnicity. Note in Ethnicity African-Americans is also coded as Afr. Am. so these two should be combined. In Age of Kids there are cells coded as Pre-teen &? I suggest combining with “Age Mix” or “Preteen & Teenagers”. After cleaning up the file, we are left with 26,352 records which should still be an adequate sample size.) Questions for analysis: 1. Calculate the profitability of each customer. Assume the average Cost of Goods Sold (COGS) for all vouchers (with promotional discounts factored in) is 20% of the total revenue. Assume the average one-time Cost per Acquisition (CPA) for each channel is: $12 for Advertising, $10 for Affiliate, $5 for Email, $8 for ILS, $7 for Paid Search and $5 for Social Media. Assume there are no additional costs. You may find the Excel VLOOKUP function helpful for this (https://support.office.com/en-sg/article/VLOOKUP-function-0bbc8083-26fe-4963-8ab8-93a18ad188a1). 2. What does the “average” ECB.com customer look like? Is the “average” customer desirable or undesirable? Why? 3. Describe each segment (new, engaged, lapsed, inactive). How much revenue does each segment...

Words: 517 - Pages: 3

Free Essay

Forensic Studies Volatility

...Forensicc studies volatility 1. List the processes that were running on the victim’s machine. Which process was most likely responsible for the initial exploit? Figure 1 seeking the profile As shown in figure one, when the command “vol imageinfo –f /root/Desktop/BF.vmem” is applied, the result shows the suggested profile which is WinXPSP2x86 and WinXPSP3x86.With that we can able to identify the profile victim is using. Figure 2 Result of Pslist By using the “Pslist” command, we are able to trace the process running in the victim and based on the scenario provided, the user was emailed a link to a suspicious PDF by a co-worker. The chaos happened after the PDF file is opened. As shown in figure 2, “AcroRd32.exe” with PID 1752 is most likely responsible for the exploit. The PPID (parent PID) of AcroRd32.exe is 888 which indicate firefox.exe. 2. List the sockets that were open on the victim’s machine during infection. Are there any suspicious processes that have sockets open? Figure 3 Result of listing Sockets Figure 3 shows the list of socket that were opened on the victim’s machine during the exploitation Figure 4 Result of Connection The figure above shows the list of connection found in victim’s machine and the most suspicious connection to external website is the AcroRd32.exe (PID 1752) and svchost.exe (PID 880). These application caught our attention because it does not have any outbound HTTP connections. Figure 5 Information of IP After finding...

Words: 1584 - Pages: 7

Free Essay

Linux Shortcut

...*** Getting help: # View the manual for target command man command # Get help with a target command (probably the same as above, but not always): command -h # In case you forget the name of a command, print possible commands relating to any given word: apropos word # View index of help pages: info *** Command Line Utilities: **** Basic File and Directory Operations: # Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a # Recurse into subdirectories and list those as well: ls -R # List files by modification time, most recent first. ls -lt # Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination # Delete target forever (be very careful), use -r recursive flag for directories: rm target # Copy file or directory: cp source destination # Mount filesytem: mount /dev/device_name /media/device_name # Unmount: umount /media/device_name # Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration: # Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command # Become system administrator: sudo -s # Quit system administration: ...

Words: 1920 - Pages: 8

Free Essay

Nt1430

...a new user |   | | arch | Print machine architecture | | | awk | Find and Replace text within file(s) |   | | bc | An arbitrary precision calculator language |   | | cal | Display a calendar | | | cat | Concatenate files and print on the standard output | | | chdir | Change working directory | | | chgrp | Change the group ownership of files | | | chkconfig | Tool for maintaining the /etc/rc[0-6].d directory hierarchy |   | | chmod | Change the access permissions of files and directories |   | | chown | Change the user and group ownership of files | | | chroot | Change root directory |   | | cksum | Print CRC checksum and byte counts |   | | clear | Clear terminal screen |   | | cmp | Compare two files |   | | comm | Compare two sorted files line by line |   | | cp | Copy one or more files to another location |   | | cron | Daemon to execute scheduled commands |   | | crontab | Schedule a command to run at a later time |   | | csplit | Split a file into context-determined pieces |   | | cut | Divide a file into several parts |   | | date | Display or change the date & time |   | | dc | Desk Calculator |   | | dd | Data Dump - Convert and copy a file |   | | df | Display free disk space |   | | diff | Display the differences between two files |   | | diff3 | Show differences among three files |   | | dir | Briefly list directory contents |   | |...

Words: 924 - Pages: 4

Premium Essay

Lyt2 Task 1

...office. This limits access to files and puts a dependency on repeated personal communication for document access wasting time and efficiency. Lastly, administrative tasks continue to be reliant on a paper based system producing possible processing and communication delays. How Identified Challenges Affect Key Stakeholders Managers and executives are the key stakeholders affected by outdated or incorrect documentation. Individuals or teams could be under the impression that business decisions are being made with information that is helpful and pertinent while in fact the information could be detrimental. When multiple managers and executives are involved confusion could arise about the needed information compounding the problem and leading to lengthy debates and discussion that are not required and create a confusion in business direction. This potential for errors in decision making puts the company at a considerable danger for loss of profitability, unsatisfied customers, and an uncertain future. Separate file servers and email servers affect two key stakeholders. The employees and the managerial and executive group both find themselves dependent on personal communication to gain access to documents that are not local to that individual’s office. For the employee this could result in delayed interactions with customers causing a dissatisfied client base. Employee time is wasted on trying to track down other staff members for access to files. Employee frustration and...

Words: 2045 - Pages: 9

Premium Essay

Is-3440 Unit 1 Lab Answers

...use Make it easier to recover a corrupted file system or operating system installation. Performance Smaller file systems are more efficient. You can tune file system as per application such as log or cache files. Dedicated swap partition can also improve the performance (this may not be true with latest Linux kernel 2.6). Security Separation of the operating system files from user files may result into a better and secure system. Restrict the growth of certain file systems is possible using various techniques. Backup and Recovery Easier backup and recovery. Stability and efficiency You can increase disk space efficiency by formatting disk with various block sizes. It depends upon usage. For example, if the data is lots of small files, it is better to use small block size. Testing Boot multiple operating systems such as Linux, Windows and FreeBSD from a single hard disk. 6. It serves as 'backup' RAM. That is, should your computer run out of RAM, it will use the swap area as a temporary source of more memory, Swap space can be a dedicated swap partition (recommended), a swap file, or a combination of swap partitions and swap files. I wouldn’t recommend one over the other I believe that a balanced use of both is a good idea. 7. File system size, Extents, Delayed and Multi block allocation, Online defragmentation and fsck speed, Backward compatibility, Inodes / Timestamps and Persistent preallocation. 8. /etc/passwd file stores essential information, which is required...

Words: 497 - Pages: 2

Premium Essay

Perimeter Network Security System

...permission. Taking advantage of Ext3 journaling file system in a forensic investigation AD Copyright SANS Institute Author Retains Full Rights Taking advantage of Ext3 journaling file system in a forensic investigation fu ll r igh ts. Taking advantage of Ext3 journaling file system in a forensic investigation rr eta ins GCFA Gold Certification Author: Gregorio Narváez, gnarvae@yahoo.com Adviser: Paul Wright th 07 ,A ut ho Accepted: December 30 , 2007 © SA NS In sti tu te 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Gregorio Narváez © SANS Institute 2007, 1 As part of the Information Security Reading Room Author retains full rights. Taking advantage of Ext3 journaling file system in a forensic investigation TABLE OF CONTENT 1. INTRODUCTION............................................................................................................................... 3 1.1 Lab Setup .................................................................................................................................... 3 2. EXT3FS JOURNAL FUNDAMENTALS......................................................................................... 4 fu ll r igh ts. 2.1 Journal Life Cycle....................................................................................................................... 6 2.2 File Deletion Process: Ext2 Vs Ext3....................

Words: 15276 - Pages: 62

Free Essay

Assignment 1

...#include #include #include // global definitions // macros unsafe, use enums enum { MAXSIZE = 65536, LINE_LN = 16, CHUNK_SZ = 1, }; // Assignment 1.c // Usage- ./Assignment\ 1 "filename" // Output- Dumps the hex data of a file // Returns- 2 on error, 1 on warning, 0 on success int main(int argc, char** argv) { // local definitions // file to read FILE* fpFile; // binary data of file unsigned char acByte[MAXSIZE]; // nBytes read is value returned by fread // nCurbyte is the current line being printed as a multiple of 16 // nByteOffset is the current byte being read minus nCurByte // nRet is a value returned by a function int nBytesRead, nCurByte, nByteOffset, nRet; if(argc < 2) { fprintf(stderr, "Error; please enter a file name.\n"); exit(2); } // fopen is unsafe and nReturns an error if((nRet = fopen_s(&fpFile, argv[1], "rb"))) { fprintf(stderr, "Error; fopen_s(&fpFile, %s, \"rb\") = %d\n", argv[1], nRet); exit(2); } // load the entire file into acByte nBytesRead = fread(acByte, 1, MAXSIZE, fpFile); fclose(fpFile); // nBytesRead cannot exceed MAXSIZE so we do not do ultimate bounds checking for (nCurByte = 0; nCurByte < nBytesRead; nCurByte += LINE_LN) { // prints the line number as a multiple of 16 printf("%04x\t", nCurByte); for (nByteOffset = 0; nByteOffset + nCurByte < nBytesRead; nByteOffset++) { // prints the current byte printf("%02x", acByte[nByteOffset + nCurByte]); ...

Words: 256 - Pages: 2

Premium Essay

Unit 1 Lab

...(Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this account to modify the system in any way desired and to grant and revoke access permissions (eg. the ability to read, modify and execute specific files and directories) for other users, including any of those that are by default reserved for root. 3. During the install, X-Window and a Desktop Manger were installed. However, in a production environment it is recommended NOT to run the X-Window...

Words: 1655 - Pages: 7

Free Essay

Uefi Shell Specification

...UEFI Shell Specification September 25, 2008 Revision 2.0 The material contained herein is not a license, either expressly or impliedly, to any intellectual property owned or controlled by any of the authors or developers of this material or to any contribution thereto. The material contained herein is provided on an "AS IS" basis and, to the maximum extent permitted by applicable law, this information is provided AS IS AND WITH ALL FAULTS, and the authors and developers of this material hereby disclaim all other warranties and conditions, either express, implied or statutory, including, but not limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses and of lack of negligence, all with regard to this material and any contribution thereto. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." The Unified EFI Forum, Inc. reserves any features or instructions so marked for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR NON-INFRINGEMENT WITH REGARD TO THE SPECIFICATION AND ANY CONTRIBUTION THERETO. IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THIS...

Words: 35960 - Pages: 144

Free Essay

Lab 1 Is3440 Linux Security

...----------------------------------------- 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? The most interesting importance of NTP would be the auto key system, if your system doesn’t keep correct time a attacker who needs to change time so that a replay attack can happen could be very damaging, that is why today’s version of NTP shields against this in several ways. 2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account? It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories. 3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this recommendation? In a production environment hardware requirements and not to run the X-Windows Environment may sometimes vary, X-Window is intended for primarily workstation use only example personal computing on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by itself doesn’t even have an interface. 4. During the install process it asks what the options given to create the partition are? Name them? It asked would I like to create Primary or an extended...

Words: 1158 - Pages: 5

Premium Essay

Is3440 Linux Security Lab 1

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...

Words: 1494 - Pages: 6

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates...

Words: 2158 - Pages: 9