Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
12 views

Week 2 Part 2

System Commands Notes from IIT Madras BS Degree
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Week 2 Part 2

System Commands Notes from IIT Madras BS Degree
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Networking commands and

SSH
Type 📒 Lecture
Date @March 14, 2022

Lecture # 4

Lecture https://youtu.be/SxDIXtxR33c
URL

Notion https://21f1003586.notion.site/Networking-commands-and-SSH-
URL 9593fb49c2374246b525faff24f19091

Week
8
#

Network & SSH


Accessing remote machines on command line

IPv4 address range


localhost

Networking commands and SSH 1


127.0.0.0/8

Private network

Class A: 10.0.0.0/8

16,777,216

Class B: 172.16.0.0/12

1,048,576

Class C: 192.168.0.0/16

65,536

Public network

Ways to gain remote access


VPN access

SSH tunnelling

Remote desktop: x2go, rdp, pcoip

Desktop over browser: Apache Guacomole

Commercial, over internet: Teamviewer, AnyDesk, Zoho assist, ...

Some important ports

Networking commands and SSH 2


Firewall
Ports open on my machine

Ports needed to be accessed on remote machine

Network routing over the port

Firewall controls at each hop

Protecting a server

SELinux

Networking commands and SSH 3


Security Enhanced Linux mode available on Ubuntu too, apart from server grade
flavours like CentOS, Fedora, RHEL, SuSE Linux, etc.

Additional layer of access control on files to services

Role Based Access Control

Process sandboxing, least privilege access for subjects

Check using ls -lZ and ps -eZ

RBAC items:

user (unconfined_u)

role (object_r)

type (user_home_t)

level (s0)

Modes:

disabled

enforcing

permissive

Tools:

semanage

restorecon

SELinux is recommended for all publicly visible servers

Network tools

Networking commands and SSH 4


High Performance Computing
Look at www.top500.org for statistics

Accessing a remote HPC machine is usually over SSH

Long durations jobs are submitted to a job scheduler for execution

Raw data if large needs to be processed remotely before being transferred to


your machine

Comfort with the command line is a must

Using 3rd party DNS lookup tool

Networking commands and SSH 5


Tool used here: https://tools.keycdn.com/dig

Networking commands and SSH 6


To do a reverse lookup

Networking commands and SSH 7

You might also like