Complete the following steps from a shell as root or sudo, on server2 and server 3:...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Complete the following steps from a shell as root or sudo, on server2 and server 3: 1. Create a new group Inxgrps2 with GID 6000 on server2 and Inxgrps3 on server3. 2. Create user userp1s2 with UID 5000 and GID 6000 on server2 and userpls3 with UID 5000 and GID 6000 on server3. 3. Assign this user a password and establish password aging attributes so that this user cannot change their password within 4 days after setting it and with a password validity of 30 days. This user should start getting warning messages for changing password 10 days prior to account lock down. This user account needs to expire on the 20th of the December in the next calendar year. 4. Then, add a rule for userp ls2 on server2 and userp1s3 on server3 to the /etc/sudoers file to allow this user full root access on the system. Make sure that this user is not prompted for a password when they use sudo to execute a command. 5. On server2 switch into the userp1s2 account and try running the following commands. Do the same on server3. a. sudo users. Confirm the id of the user accounts created in step 2. b. sudo groups. Confirm the gid of Inxgrp group created in step 1. Type date in the same shell you used to complete step 5 and take a screenshot of the output from step 5a and 5b and the date command. Do this for server2 and server3. Part Two - Networking Note: We need to pay careful attention to our virtualization configuration. The following steps assume you are using VirtualBox. If you are using a different product, use the equivalent features. Preparation a. Make sure server2 and server3 are powered off. b. Click Settings at the top and then Network on the window that pops up. c. Click on "Adapter 1" and ensure the "Enable Network Adapter" box is checked. d. Select "Host-only Adapter" from the drop-down list besides "Attached to" e. Ensure the same Host-only Adapter is selected under "Name:" on both server2 and server3. If, for some reason there is no adapter available, select Networking and click on the Host-only Networks tab: i. ii. Click on the icon to add a new host-only adapter (plus sign) Then, confirm the IP address and Mask assigned by VirtualBox on the new host-only adapter by selecting it and click on the edit icon (the screwdriver) a. Write down the Address and Mask - this will be your gateway and network definition for the virtual machines. Networking Configuration Finally, power on the virtual machines and perform the following steps: Add a new network interface to server2. 1. As userpls2 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.212/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Add a new network interface to server3. 1. As userpls3 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.213/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Type date in the same shell you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Do this for server2 and server3. Part Three - Security through SSH 1. As root on server2, generate a private/public key pair without a passphrase using the ssh- keygen command. 2. Distribute the public key to server3 with the ssh-copy-id command. 3. Use SSH (ssh server3 or server3's IP address) to log on to server3 and accept the fingerprints for the server if presented. 4. On subsequent log in attempts from server2 to server3, you should not be prompted for a password. If you are prompted or encounter an error, include that in your work product submission. Type date in the same shell(s) you used to complete the above steps and take a screenshot showing the output from steps along with the date command. 5. As root with sudo on server3, edit the /etc/ssh/sshd_config file and change the value of the directive PermitRootLogin to "no". 6. Use the systemctl command to activate the change. 7. As root on server2, run ssh server 3 (or its IP address). a. Note: It is expected that you'll get permission denied message. 8. Reverse the change on server3 and retry ssh server 3. a. Note: It is expected that you should be able to log in again. Type date in the same shells you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Complete the following steps from a shell as root or sudo, on server2 and server 3: 1. Create a new group Inxgrps2 with GID 6000 on server2 and Inxgrps3 on server3. 2. Create user userp1s2 with UID 5000 and GID 6000 on server2 and userpls3 with UID 5000 and GID 6000 on server3. 3. Assign this user a password and establish password aging attributes so that this user cannot change their password within 4 days after setting it and with a password validity of 30 days. This user should start getting warning messages for changing password 10 days prior to account lock down. This user account needs to expire on the 20th of the December in the next calendar year. 4. Then, add a rule for userp ls2 on server2 and userp1s3 on server3 to the /etc/sudoers file to allow this user full root access on the system. Make sure that this user is not prompted for a password when they use sudo to execute a command. 5. On server2 switch into the userp1s2 account and try running the following commands. Do the same on server3. a. sudo users. Confirm the id of the user accounts created in step 2. b. sudo groups. Confirm the gid of Inxgrp group created in step 1. Type date in the same shell you used to complete step 5 and take a screenshot of the output from step 5a and 5b and the date command. Do this for server2 and server3. Part Two - Networking Note: We need to pay careful attention to our virtualization configuration. The following steps assume you are using VirtualBox. If you are using a different product, use the equivalent features. Preparation a. Make sure server2 and server3 are powered off. b. Click Settings at the top and then Network on the window that pops up. c. Click on "Adapter 1" and ensure the "Enable Network Adapter" box is checked. d. Select "Host-only Adapter" from the drop-down list besides "Attached to" e. Ensure the same Host-only Adapter is selected under "Name:" on both server2 and server3. If, for some reason there is no adapter available, select Networking and click on the Host-only Networks tab: i. ii. Click on the icon to add a new host-only adapter (plus sign) Then, confirm the IP address and Mask assigned by VirtualBox on the new host-only adapter by selecting it and click on the edit icon (the screwdriver) a. Write down the Address and Mask - this will be your gateway and network definition for the virtual machines. Networking Configuration Finally, power on the virtual machines and perform the following steps: Add a new network interface to server2. 1. As userpls2 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.212/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Add a new network interface to server3. 1. As userpls3 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.213/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Type date in the same shell you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Do this for server2 and server3. Part Three - Security through SSH 1. As root on server2, generate a private/public key pair without a passphrase using the ssh- keygen command. 2. Distribute the public key to server3 with the ssh-copy-id command. 3. Use SSH (ssh server3 or server3's IP address) to log on to server3 and accept the fingerprints for the server if presented. 4. On subsequent log in attempts from server2 to server3, you should not be prompted for a password. If you are prompted or encounter an error, include that in your work product submission. Type date in the same shell(s) you used to complete the above steps and take a screenshot showing the output from steps along with the date command. 5. As root with sudo on server3, edit the /etc/ssh/sshd_config file and change the value of the directive PermitRootLogin to "no". 6. Use the systemctl command to activate the change. 7. As root on server2, run ssh server 3 (or its IP address). a. Note: It is expected that you'll get permission denied message. 8. Reverse the change on server3 and retry ssh server 3. a. Note: It is expected that you should be able to log in again. Type date in the same shells you used to complete the above steps and take a screenshot showing the output from steps along with the date command.
Expert Answer:
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these computer network questions
-
Find the magnitude of the reaction at A and the tension in cable CD using (a) the con- cepts of three-force bodies (closed polygon method discussed in chapter 2). (b) Check your answers by doing sum...
-
Two atomic particles approach each other in a head-on collision. Each particle has a mass of 2.16 10-25 kg. The speed of each particle is 2.10 108 m/s when measured by an observer standing in the...
-
Does my purchase of 100 shares of stock in Meta add to the nations GDP? Why?
-
The weight of milk powder in a "1 kg" package is normal(, 2 ) distribution (where it is known that the mean = 1015 g). Let a random sample of 10 packages be taken and weighed. The weights are (a)...
-
Crystal Clear Products produces two types of water filters. One attaches to the faucet and cleans all water that passes through the faucet. The other is a pitcher-cum-filter that only purifies water...
-
11 12 13 14 Height of a plant is regulated by: a) DNA which is directly influenced by growth hormone. b) Genes which regulate the proteins directly. Growth hormones under the influence of the enzymes...
-
Mr. Varun furnished the following particulars of his income for the financial year 2020-21. 15000 p.m. Salary 1250 p.m. 1000 p.m. 24000 each DA Entertainment Allowance Employer's and employee's...
-
You are the payroll office of Wamco. You are new to the role. When reconciling the payroll reports, you noticed that employee Lisa Jones has had her superannuation guarantee underpaid for twelve...
-
1. A block of mass 2.0 kg passes at point A with a speed of 10 m/s. The length of |AB| is 2.0 m and |BC| is L. Coefficient of kinetic friction for the entire path is 0.2. What must L be so that the...
-
The market for stocks of small companies is less efficient than the market for stocks of large companies." Can you suggest a possible explanation for this observation?
-
Create an HTML and JavaScript documents to create and validate the following form: Personal Information Name (letters only-first letter capital): Date of Birth: Year (1960-2018): Month (01-12): | Day...
-
Sheffield Corporation had the following shareholders' equity on December 31, 2022: Common shares, 1,240,000 shares authorized, issued and outstanding Contributed surplus (Common Shares) Retained...
-
You have just sold the company you started and want to 'invest' your gains and help a new start-up get off the ground. You are faced with the following 2 options. Each depends on how well the economy...
-
The diameter of a sphere is 18 in. Find the largest volume of regular pyramid of altitude 15 in. that can be cut from the sphere if the pyramid is (a) square, (b) pentagonal, (c) hexagonal, and (d)...
-
How much of each of the following prizes or awards is taxable? a. Cheline received a $50,000 gift bag at the Oscars in 2012. b. Jon received a gold watch worth $350 for 25 years of service to his...
-
On February 2, 2012, Alexandra purchases a personal computer for her home. The computer cost $3,000. Alexandra uses the computer 80 percent of the time in her accounting business, 10 percent of the...
-
David and Darlene Jasper have one child, Sam, who is 6 years old. The Jaspers reside at 4639 Honeysuckle Lane, Los Angeles, CA 90248. David's Social Security number is 577-11-3311, Darlene's is...
-
According to the ACFE 2016 Report to the Nations, which of the following is the most frequent source of initial fraud detection? 1. A call to the police 2. Tips 3. Accidental discovery 4. The...
-
Select the statement that is most accurate with regard to materiality. 1. Materiality does not create discretionary choices for managers, executives, and auditors. 2. Earnings management is not...
-
Which of the following is not considered a red flag (indicator) of fraud? 1. Accounting anomalies 2. Analytical inconsistencies 3. Nonfinancial numbers 4. Behavioral anomalies
Study smarter with the SolutionInn App