Free Essay

Deploying a Ftp Server

In:

Submitted By chris0813
Words 964
Pages 4
Lab 4-1 70-643 worksheet Deploying an
FTP Server

This lab contains the following exercises:
Exercise 4-1-1 Installing the Web Server (IIS) Role
Exercise 4-1-2 Creating an FTP6 Site
Exercise 4-1-3 Configuring FTP6 Security
Lab Review: Questions
Lab Challenge: Creating a Combined Web/FTP Site

Estimated lab time: 55 minutes
BEFORE YOU BEGIN
The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A.
To accommodate various types of classroom arrangements, each lab in this manual assumes that the student servers are in their baseline configuration, as described in Lab 1-2, “Preparing an Application Server.” If you have not done so already, complete the initial configuration tasks in Lab 1-2-1 before beginning this lab.
Your instructor should have supplied the information needed to complete the following table: Student computer name (NT2670Srv##A) | | Student account name (Student##) | |
To complete the exercises in this lab, you must access a second student computer on the classroom network, referred to in the exercises as your partner server. Depending on the network configuration, use one of the following options, as directed by your instructor: * For a conventional classroom network with one operating system installed on each computer, your lab partner must perform the same exercises on his or her computer, known as your partner server. * For a classroom in which each computer uses local virtualization software to install multiple operating systems, you must perform the exercises separately on two virtual machines representing your student server and your partner server. * For a classroom using online virtualization, you must perform the exercises separately on two virtual student servers, representing your student server and your partner server, in your Web browser.
Working with Lab Worksheets
Each lab in this manual requires that you answer questions, save images of your screen, or perform other activities that you document in a worksheet named for the lab and task, such as lab4_1_worksheet. Your instructor provided you with lab worksheets. As you perform the tasks and exercises in each lab, open the appropriate worksheet file using WordPad, fill in the required information, and save the file to your computer’s Student##\Documents folder. Print a copy for your instructor.
The procedure for opening and saving a worksheet file is as follows:
1. Open worksheet document opens in WordPad.
2. Complete all of the exercises in the worksheet.
3. In WordPad, choose Save As from the File menu. The Save As dialog box appears.
4. In the File Name text box, key lab##_ worksheet_yourname (where lab##_task## contains the number of the lab and task you’re completing, and yourname is your last name), and click Save.
5. Print a copy for your instructor.

Exercise 4-1-2 | Creating an FTP6 Site | Overview | In this exercise, install the FTP Publishing Service role service, which provides basic FTP site hosting capabilities, and create a site. | Completion time | 15 minutes |

Question 1 | Why can an FTP site co-exist with the Default Web Site already installed on the server if neither one is using a unique host name? Because it not on the same port | Question 2 | Why was the wizard unable to start the new FTP site? Because the default is running |

Question 3 | What happens? 530 user anonymous cannot log in home directory inaccessible log in failed |

Question 4 | What happens now? Takes me to the web page |

30. Press Ctrl+Prt Scr to take a screen shot of the Internet Explorer window. Press Ctrl+V to paste the image on the page provided in the lab4_1_worksheet file.

Exercise 4-1-3 | Configuring FTP6 Security | Overview | In this exercise, configure the security properties available to FTP6 sites. | Completion time | 10 minutes |

Question 5 | What user account does FTP6 use for anonymous connections by default? IUSR_nt2670srv04a |

4. Press Ctrl+Prt Scr to take a screen shot of the Security Accounts tab of the Properties sheet. Press Ctrl+V to paste the image on the page provided in the lab4_1_worksheet file.

12. Press Ctrl+Prt Scr to take a screen shot of the Directory Security tab of the Properties sheet. Press Ctrl+V to paste the image on the page provided in the lab4_1_worksheet file.

Question 6 | What is the result? 230 anonymous user logged in |

Lab REview Questions Completion time | 5 minutes |

1. In Exercise 4-1-3, after you configure the FTP6 security options, why is it unnecessary for you to log on to connect to the FTP site on your server?

Lab Challenge: Creating a Combined Web/FTP Site Completion time | 20 minutes |

Your supervisor wants you to create a combined Web/FTP solution that enables a specific user to access his or her user profile folder on your server. To complete this challenge, create a site that provides both HTTP and FTP access to your Student## account’s user profile folder (C:\Users\Student##), subject to the following restrictions:
The HTTP and FTP sites must be accessible using the URLs http://student##.contoso##.com and ftp://student##.contoso##.com, respectively.
HTTP access must use Windows Authentication.
FTP access must use Basic Authentication.
The site must be accessible only by the Student## user.
The user must be able to see a directory listing, whether connected using HTTP or FTP.
List the tasks you must complete to create and configure the site, and then take two screen shots of the Internet Explorer window showing the HTTP and FTP connections. Paste the image on the page provided in the lab4_1_worksheet file.

Similar Documents

Free Essay

Network Opnet Manual

...home LAN and its ISP. Overview OPNET’s IT Guru provides a Virtual Network Environment that models the behavior of networks, including its routers, switches, protocols, servers, and individual applications. The Virtual Network Environment allows IT managers, network and system planners, and operation’s staff to more effectively diagnose difficult problems, validate changes before they are implemented, and plan for future scenarios such as traffic growth and network failures. You can do “what if” analyses (called scenarios in IT Guru) on network designs, just as you can on spreadsheets with financial business models. However, instead of looking at “bottom line” financial numbers, you will be looking at how response times, latency (delays) and other network performance measures will change under different network design approaches. To create a network simulation (called a project in IT Guru), you specify the nodes (computers, switches, routers, etc.) in your network, the links between nodes, and the applications that will be running on the nodes. In this exercise, the initial simulation (project) has been built for you. It models a family’s ITCE 416: OPNET IT Guru Lab, Page 1 home PC network, which has three PCs connected to the Internet for game playing; web browsing, E-mail, audio streaming, and FTP (file transfer protocol). Your objective will be to conduct a series of what-if simulations (scenarios) to see how performance differs if the family connects to the...

Words: 5307 - Pages: 22

Premium Essay

Window Server 2008

...1. Why Windows server 2008 comes in different versions? What is the significance of each version? • Windows server 2008 comes in different versions for different people different Business and different likes or dislikes for each Editions. • The significance of each version is that it fits the needs for each Individual Person are Business, for example a Business with many Cluster would most likely use Windows HPC Server 2008. 2. What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows 2003? • Technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as Bit-Locker and ASLR; improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. • 2008 has self-healing NTFS file system 2003 do not, In 2003 session creation was a serial operation but with 2008 its parallel.2008 has a better Clean service shutdown.In WS2K8, that 20-second...

Words: 1129 - Pages: 5

Free Essay

Computer Virtualization

...network architecture in the campus there were times that the computer had some troubles including the System Unit and its operating system. So, the researchers decided to make a proposal entitled “Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network”. The proposed project used virtualization for it was essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Using an Ncomputing M300 (thin-client) series connection of network it was possible for the entire project. Thoroughly, the entire project covered up network of computer using this device (Ncomputing M300 series) to connect through a server in a series type of network. Also, using a server with a high specification it will then try to run at least one programming language that can be used by the Bachelor of Science in Information Technology students of Gabaldon Campus. Project Goals/Objectives Project Goal: The goal of the project is to provide low cost but energy saver and is efficient to learning computer laboratory with the use of thin-client (NComputing) network. Objectives: 1. To reduce the costs instead of buying new systems. 2. To provide at least one programming language that can be used not only by the students taking Office Productivity subject but also the Bachelor of...

Words: 8853 - Pages: 36

Premium Essay

Ntuc Case Study

...INTRODUCTION TO CLOUD COMPUTING ARCHITECTURE White Paper 1st Edition, June 2009 Abstract Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. Sun takes an inclusive view of cloud computing that allows it to support every facet, including the server, storage, network, and virtualization technology that drives cloud computing environments to the software that runs in virtual appliances that can be used to assemble applications in minimal time. This white paper discusses how cloud computing transforms the way we design, build, and deliver applications, and the architectural considerations that enterprises must make when adopting and using cloud computing technology. This page intentionally left blank. Sun Microsystems, Inc. Table of Contents Introduction................................................................................................... 1 Sun’s perspective ................................................................................................ 1 The Nature of Cloud Computing ....................................................................... 3 Building on established trends............................................................................. 3 Virtual machines as the standard deployment object ........................................ 3 The on-demand, self-service, pay-by-use model .....................................

Words: 11952 - Pages: 48

Premium Essay

Assignment 2: Identifying Potential Risk, Response, and Recovery

...security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk. As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access control...

Words: 1056 - Pages: 5

Premium Essay

Identifying Potential Malicious Attacks

...security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software.   Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk.  As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access control...

Words: 1060 - Pages: 5

Free Essay

Cisco Ccnp Security Training

...Table of Contents Chapter 1 Evaluating the Cisco ASA VPN Subsystem .......................................3 Chapter 2 Deploying Cisco ASA IPsec VPN Solutions ............................. 42 Chapter 3 Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions..............................109 Chapter 4 Deploying Clientless RemoteAccess SSL VPN Solutions ................148 Chapter 5 Deploying Advanced Cisco ASA VPN Solutions .............................184 CCNP Security VPN 642-648 Quick Reference Cristian Matei ciscopress.com [2] CCNP Security VPN 642-648 Quick Reference About the Author Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems, Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple large enterprise networks, covering the Cisco security, routing, switching, service provider, and wireless portfolios of products. Cristian started this journey back in 2005 with Microsoft technology and finished the MCSE Security and MCSE Messaging tracks. He then joined Datanet Systems, where he quickly obtained his Security and Routing & Switching CCIE, among other certifications and specializations, such as CCNP, CCSP, and CCDP. Cristian has been a Cisco Certified Systems Instructor (CCSI) since 2007, teaching CCNA, CCNP, and CCSP curriculum courses. In 2009, he received a Cisco Trusted Technical Advisor (TTA) award and became certified as a Cisco IronPort Certified Security Professional (CICSP) on E-mail...

Words: 52748 - Pages: 211

Premium Essay

Research Assignment for Active Directory

...Research Assignment 1. Explain the function of the following Windows Server 2008 Services: A. Active Directory Federation Services B. Active Directory Lightweight Directory Services C. Active Directory Certificate Services D. Active Directory Rights Management Services AD FS is composed of three different server components: Federation Server, Federation Proxy server, and ADFS Web Agents. A federation server is the main AD FS component, which holds the Federation Service role. These servers route authentication requests between connected directories. A federation proxy server acts as a reverse proxy for AD FS authentication requests. This type of server normally resides in the demilitarized zone (DMZ) of a firewall, and is used to protect the back-end AD FS server from direct exposure to the untrusted Internet. The Web Agents component of AD FS hosts the claims-aware agent and the Windows token-based agent components that manage authentication cookies sent to web server applications. The Active Directory Lightweight Directory Services server role is a Lightweight Directory Access Protocol directory service. It provides data storage and retrieval for directory-enabled applications, without the dependencies that are required for Active Directory Domain Services. Active Directory Certificate Services provides customizable services for issuing and managing public key infrastructure (PKI) certificates used in software security systems that employ public key technologies...

Words: 1307 - Pages: 6

Premium Essay

Network

...everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype surveillance system, the researchers could track someone wearing Nike+iPod sensors, plot their location on a GoogleMaps-based website and emai and text-messaging real-time surveillance data to anyone.PROJECT FOCUS:You are interested in deploying sensor technology in the cafe to help revamp operations. How would you address the following: * Many cafes are putting sensors on the...

Words: 2881 - Pages: 12

Premium Essay

Server Questions

...Server question Ques 1 :-Which of the following is not a benefit of DHCP? 1.       centralized administration of IP configuration 2.       dynamic host configuration 3.       seamless IP host configuration 4.       portability of workstations ques 2:- Which of the following is not a component of DNS? 1.       DNS namespace 2.       DNS zones 3.       DNS resource records 4.       DNS relay agent Ques 3:- A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? 1.       Class a 2.       Class b 3.       Class c 4.       Class d Ques 4:- Which of the following is not a function of DHCP? 1.       transmitting data from one network to another 2.       bootstrapping diskless workstations 3.       automating the assigning, tracking, and reassigning of IP addresses 4.       dynamically allocating an IP address from a pool of addresses ques 5:-  If a system will be a DHCP server, what type of address should you set? 1.       automatic private IP address 2.       fixed IP address 3.       static IP address 4.       none of the above ques 6:- What is the minimum number of physical computers required to allow you to use a KMS key? 1.       20 Vista and ten Windows Server 2008 computers 2.       20 Vista and five Windows Server 2008 computers 3.       15 Vista and ten Windows Server 2008 computers 4.       25 Vista and five Windows Server 2008 computers Ques 7:- A striped volume uses which type of striping to interleave data across...

Words: 4583 - Pages: 19

Premium Essay

Nat Configuration

...Configuring Network Address Translation: Getting Started Document ID: 13772 Contents Introduction Prerequisites Requirements Components Used Conventions Quick Start Steps for Configuring and Deploying NAT Defining NAT Inside and Outside Interfaces Example: Allowing Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Using Overloading Example: Allowing the Internet to Access Internal Devices Configuring NAT to Allow the Internet to Access Internal Devices Example: Redirecting TCP Traffic to Another TCP Port or Address Configuring NAT to Redirect TCP Traffic to Another TCP Port or Address Example: Using NAT During a Network Transition Configuring NAT for Use During a Network Transition Example: Using NAT in Overlapping Networks Difference between One−to−One Mapping and Many−to−Many Verifying NAT Operation Conclusion Related Information Introduction This document explains configuring Network Address Translation (NAT) on a Cisco router for use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information...

Words: 3234 - Pages: 13

Free Essay

Introduction About Enrolment Grading System

...Course Management System Deployment A Report Submitted to: Project Advisor: Karen Lemone, WPI Professor By: Daniel Pickett __________________________ April 27th, 2006 This project report is submitted in partial fulfillment of the degree requirements of Worcester Polytechnic Institute. The views and opinions expressed herein are those of the authors and do not necessarily reflect the positions or opinions of Worcester Polytechnic Institute. This report is the product of an educational program, and is intended to serve as partial documentation for the evaluation of academic achievement. The reader should not construe the report as a working document. Abstract The WPI OfCourse! course management system provides educators with a set of tools to extend their existent course websites. While this toolset offers great functionality, the installation and configuration of the system is complex and difficult. The project team created a two-tiered installation package that is both simplified and easy to use. User testing was conducted and indicated a significant improvement in the installation procedure. In conclusion, the OfCourse! system was improved by the newly created installer. -i- Executive Summary As the web evolves and grows, educational professionals continue to pursue the use of online tools. While a variety of software exists, educators of average computer literacy seek a feature-rich application that is easy to install and use. Educators...

Words: 6392 - Pages: 26

Premium Essay

Nt1330 Unit 3 Assignment 1

...Windows Server 2008 R2 and also available in some versions of Windows 7. Having BitLocker integrated with the server operating system will address the threats of data theft. Data on a lost or stolen computer will be vulnerable to different unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. It help us to mitigate unauthorized data access by enhancing file and system protections. It help us in rendering the data inaccessible when BitLocker-protected computers are decommissioned or recycled. This Locker provides a very high protection, while using with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component which is installed in many newer...

Words: 1682 - Pages: 7

Free Essay

Student

...NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access points. a. 802.11G b. 802.11A c. 802.16 d. 802.1x 4. Each object that is referenced in an NTFS system is marked by ________ that limits who can and cannot access a resource. a. an access control entry b. a share-level restriction c. an encrypted key d. an access identity limit © ITT Educational Services, Inc. Date: 10/10/07...

Words: 3277 - Pages: 14

Free Essay

Network Design Project

...a longer cable to your computer and dragged it around the office. This contributed to a mess of unsightly cables and multiple connections around an office space that could be connected and reconnected as office layouts changed over time. Even just a few years ago a wireless network was not even worth the effort because of the slow connections and download speeds. Now every coffee shop offers wireless internet with speeds faster than the wired networks of 10 years ago. The company at discussion, You’re Free Inc. is a small law firm that has just experienced some growth and doubled its employee roster as well as double its office space from one floor to two. It is currently using a very slow 10Mbps network to access applications on its server and do video conferencing. As you can imagine there is a big slow down in the network and high latency is experienced during a video conference and during peak business hours. Some employees have even suggested flex scheduling in order to get more work done, as the amount of people using the network will be spread out across the day. The company has finally decided to create a budget for the installation of new network. This network will replace the drinking straw sized 10Mbps network with a sewer sized 1000Mbps network with integrated...

Words: 6239 - Pages: 25