Part One: Users and Groups Complete the following steps from a shell as root or sudo,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Part One: Users and Groups Complete the following steps from a shell as root or sudo, on server2 and server3: 1. Create a new group Inxgrps2 with GID 6000 on server2 and Inxgrps3 on server3. 2. Create user userpls2 with UID 5000 and GID 6000 on server2 and userpls3 with UID 5000 and GID 6000 on server3. 3. Assign this user a password and establish password aging attributes so that this user cannot change their password within 4 days after setting it and with a password validity of 30 days. This user should start getting warning messages for changing password 10 days prior to account lock down. This user account needs to expire on the 20th of the December in the next calendar year. 4. Then, add a for userpls2 on server2 and userpls3 on server3 to the /etc/sudoers file to allow this user full root access on the system. Make sure that this user is not prompted for a password when they use sudo to execute a command. 5. On server2 switch into the userp1s2 account and try running the following commands. Do the same on server3. a. sudo users. Confirm the id of the user accounts created in step 2. b. sudo groups. Confirm the gid of Inxgrp group created in step 1. Type date in the same shell you used to complete step 5 and take a screenshot of the output from step 5a and 5b and the date command. Do this for server2 and server3. Part Two - Networking Note: We need to pay careful attention to our virtualization configuration. The following steps assume you are using VirtualBox. If you are using a different product, use the equivalent features. Preparation a. Make sure server2 and server3 are powered off. b. Click Settings at the top and then Network on the window that pops up. c. Click on "Adapter 1" and ensure the "Enable Network Adapter" box is checked. d. Select "Host-only Adapter" from the drop-down list besides "Attached to" e. Ensure the same Host-only Adapter is selected under "Name:" on both server2 and server3. If, for some reason there is no adapter available, select Networking and click on the Host-only Networks tab: i. ii. Click on the icon to add a new host-only adapter (plus sign) Then, confirm the IP address and Mask assigned by VirtualBox on the new host-only adapter by selecting it and click on the edit icon (the screwdriver) a. Write down the Address and Mask - this will be your gateway and network definition for the virtual machines. Networking Configuration Finally, power on the virtual machines and perform the following steps: Add a new network interface to server2. 1. As userpls2 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.212/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Add a new network interface to server3. 1. As userpls3 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.213/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Type date in the same shell you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Do this for server2 and server3. Part Three-Security through SSH 1. As root on server2, generate a private/public key pair without a passphrase using the ssh- keygen command. 2. Distribute the public key to server3 with the ssh-copy-id command. 3. Use SSH (ssh server3 or server3's IP address) to log on to server3 and accept the fingerprints for the server if presented. 4. On subsequent log in attempts from server2 to server3, you should not be prompted for a password. If you are prompted or encounter an error, include that in your work product submission. Type date in the same shell(s) you used to complete the above steps and take a screenshot showing the output from steps along with the date command. 5. As root with sudo on server3, edit the /etc/ssh/sshd_config file and change the value of the directive PermitRootLogin to "no". 6. Use the systemctl command to activate the change. 7. As root on server2, run ssh server3 (or its IP address). a. Note: It is expected that you'll get permission denied message. 8. Reverse the change on server3 and retry ssh server 3. a. Note: It is expected that you should be able to log in again. Type date in the same shells you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Part One: Users and Groups Complete the following steps from a shell as root or sudo, on server2 and server3: 1. Create a new group Inxgrps2 with GID 6000 on server2 and Inxgrps3 on server3. 2. Create user userpls2 with UID 5000 and GID 6000 on server2 and userpls3 with UID 5000 and GID 6000 on server3. 3. Assign this user a password and establish password aging attributes so that this user cannot change their password within 4 days after setting it and with a password validity of 30 days. This user should start getting warning messages for changing password 10 days prior to account lock down. This user account needs to expire on the 20th of the December in the next calendar year. 4. Then, add a for userpls2 on server2 and userpls3 on server3 to the /etc/sudoers file to allow this user full root access on the system. Make sure that this user is not prompted for a password when they use sudo to execute a command. 5. On server2 switch into the userp1s2 account and try running the following commands. Do the same on server3. a. sudo users. Confirm the id of the user accounts created in step 2. b. sudo groups. Confirm the gid of Inxgrp group created in step 1. Type date in the same shell you used to complete step 5 and take a screenshot of the output from step 5a and 5b and the date command. Do this for server2 and server3. Part Two - Networking Note: We need to pay careful attention to our virtualization configuration. The following steps assume you are using VirtualBox. If you are using a different product, use the equivalent features. Preparation a. Make sure server2 and server3 are powered off. b. Click Settings at the top and then Network on the window that pops up. c. Click on "Adapter 1" and ensure the "Enable Network Adapter" box is checked. d. Select "Host-only Adapter" from the drop-down list besides "Attached to" e. Ensure the same Host-only Adapter is selected under "Name:" on both server2 and server3. If, for some reason there is no adapter available, select Networking and click on the Host-only Networks tab: i. ii. Click on the icon to add a new host-only adapter (plus sign) Then, confirm the IP address and Mask assigned by VirtualBox on the new host-only adapter by selecting it and click on the edit icon (the screwdriver) a. Write down the Address and Mask - this will be your gateway and network definition for the virtual machines. Networking Configuration Finally, power on the virtual machines and perform the following steps: Add a new network interface to server2. 1. As userpls2 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.212/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Add a new network interface to server3. 1. As userpls3 with sudo, run ip a and verify the presence of the new interface (e.g., enp0s8). 2. Use the nmcli command and assign IP x.x.x.213/24 and gateway x.x.x.1. a. Identify the network octets (x's) using preparation steps. 3. Set the network connection to auto-activate on system reboots. Type date in the same shell you used to complete the above steps and take a screenshot showing the output from steps along with the date command. Do this for server2 and server3. Part Three-Security through SSH 1. As root on server2, generate a private/public key pair without a passphrase using the ssh- keygen command. 2. Distribute the public key to server3 with the ssh-copy-id command. 3. Use SSH (ssh server3 or server3's IP address) to log on to server3 and accept the fingerprints for the server if presented. 4. On subsequent log in attempts from server2 to server3, you should not be prompted for a password. If you are prompted or encounter an error, include that in your work product submission. Type date in the same shell(s) you used to complete the above steps and take a screenshot showing the output from steps along with the date command. 5. As root with sudo on server3, edit the /etc/ssh/sshd_config file and change the value of the directive PermitRootLogin to "no". 6. Use the systemctl command to activate the change. 7. As root on server2, run ssh server3 (or its IP address). a. Note: It is expected that you'll get permission denied message. 8. Reverse the change on server3 and retry ssh server 3. a. Note: It is expected that you should be able to log in again. Type date in the same shells you used to complete the above steps and take a screenshot showing the output from steps along with the date command.
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
In the previous problem, assume the equity increases by 1,500 solaris due to retained earnings. If the exchange rate at the end of the year is 1.24 solaris per dollar, what does the balance sheet...
-
Media infiltrate every aspect of our lives from billboards, television, clothes, books, etc. What functions do media have? Do we have power or control over how media influence us? Why or why not?
-
In February 1955, a paratrooper fell 370 m from an airplane without being able to open his chute but happened to land in snow, suffering only minor injuries. Assume that his speed at impact was 56...
-
Which fuels are used for running automobiles? (a) Wood (c) Diesel (b) Coal (d) Charcoal
-
Pike Street Taffy makes and sells taffy in a variety of flavors in a shop located in the local public market. Data for a recent week are as follows: All employees work standard shifts, no matter how...
-
Program for find distance between two Coordinate points of (x1,y1), (x2,y2)?
-
(Note: Your general solution will only be correct if it is a general solution to the differential equation.)
-
b) The volume (V) of an extruded polymer accumulated on a build plate through a brass nozzle was measured as a function of time (t) and was recorded as shown in Table Q1b. Time (s) Volume (cm) Table...
-
Does the City Project Meet the Pareto Efficiency Criterion? Stanley Ryan, Your Supervisor Read the following scenario and then answer the Problem Demonstration Questions below. The allocation of...
-
what makes a manager effective? Think about an effective manager(s) you have worked for, heard, or read about. What made him/her great? Create a list of characteristics or behaviors that distinguish...
-
An annuity, paid in advance, is indexed to inflation at a rate of r% per period. What is the present value of this indexed annuity given a requirement of an effective investment rate of i% per period...
-
Rushing's financial statements were finalized on March 3, 2025. Required: 1. What amount(s) if any, related to the situations described should Rushing report among current liabilities in its balance...
-
PHAROAH's balance sheet at December 31, 2020, is as follows. PHAROAH, INC. BALANCE SHEET AS OF DECEMBER 31, 2020 Assets Liabilities Cash $440 Notes payable $1,000 Inventory 1,790 Pension liability...
-
What are technical skills At what level are they most important and why?
-
Prove that (ab + cd)2 < (a2 + c2)(b2 + d2) for all a, b, c, d R.
-
Find a closed form for each of the following series and the largest set on which this formula is valid. a) b) c) d) kxk_2 00 2
-
Suppose that f: R R is periodic and of bounded variation on [-, ]. Prove that SN f f almost everywhere as N (see Exercise 14.2.8).
-
Solve the differential equation in problem 8 for the following boundary conditions using the Galerkin method: Assume the approximate solution as: where \(\phi_{0}(x)\) is a function that satisfies...
-
Consider a plane truss in figure 1.31. The horizontal and vertical members have length \(l\), while inclined members have length \(\sqrt{2} l\). Assume Young's modulus \(E=100 \mathrm{GPa}\), cross...
-
The fully stressed design is often used for truss structures. The idea is that we should remove material from members that are not fully stressed unless prevented by minimum crosssectional area...
Study smarter with the SolutionInn App