Table of Contents
LAB 1
Description
In the Lab 1,
Part A, I will be comparing the differences of the installation and post installation of the CentOS and the post installation includes like configuring the IPv4 address, firewall, apache http server and installing some other packages needed by the users for doing some operations using the installed linux distribution.
Part B, In this part, I will be providing the differences in the security settings of the two linux distributions such as configuring the firewall in both CentOS and Ubuntu. I will explain the specific reasons why the CentOS is more stable and secure than Ubuntu.
Part C, In this part we will discuss why the clients, users or organizations use these two linux distributions and what are the other applications we can use in these and what weakness do we have in the CentOS when compared with the Ubuntu.
PART A
Preparation
Creating a virtual machine – Ubuntu and Centos 7 by using Vsphere for comparing the differences and similarities and record the documentation using the screen captures.
Observations
CentOS
CentOS is affiliated to red hat enterprise Linux OS and is an open-source Linux distribution. Centos is more stable and secure because of the less frequent updates.
Installation process
Figure 1 – A new virtual machine is created with a Linux OS version –CentOS 7.
A new virtual machine is created with a Virtual machine name – Centos – 8671760 with customized hardware such as CPUsdemkf – 4, memory – 8 GB and ROM – 16 GB.
Figure 2 – New VM machine summary
The root user is created by default with the installation of the OS and a new user is created with condor ID – 8671760. The root user can create as many users as the requirement of the project and the organization.
Figure 3 – Installation and configuration of CentOS
Post Installation information – CentOS 7
The post-installation process has several operations or functions to execute, but the first step is to assign the IPv4 address to the virtual machine by using the command – nmtui. So that it can access the internet.
IPv4 address – 10.174.77.10
Gateway – 10.174.77.21
DNS server – 10.144.6.3
Figure 4 – IPv4 configuration
Figure 5 – ping google DNS server
Figure 6 – installing package file: python
Figure 7 – install package files – links
Ubuntu
Ubuntu is also an open source Linux distribution and is based on debian architecture. Ubuntu is mainly used for both personal and professional use. Because of the frequent updates, most of the bugs that are found in the Ubuntu will be patched for the next updated version of the Ubuntu.
Installation process
A new virtual machine is created using the Vsphere and named it using the condor ID: Ubuntu – 8671760
Figure 8 – A new VM machine – Ubuntu
Figure 9 – summary of the VM machine – Ubuntu
Figure 10 – Configuring the root user of Ubuntu
Figure 11
Post-installation information
The post-installation process or information has a lot to do with the Ubuntu desktop installed. We need to install the updated software available from the software updater tab. So that all the bugs will be fixed and the Linux operating system remains safe and secure (Pradeep kumar, 2018 April 29).
Figure 12 – The software update available for the Ubuntu
Figure 13 – IPv4 configuration for the Ubuntu
Command – Sudo apt update.
Figure 14 – installing package files and updating the Ubuntu manually
Figure 15 – Installing gnome-tweak-tools in the Ubuntu
Figure 16
Reflections
In this Part A, I learned the differences in the installation and the post installation process of the Ubuntu Desktop version and the centos server version. This part helped to know the differences in the security setting configured in different linux distributions.
Part B
Preparation
The main difference between CentOS and Ubuntu is its architecture. CentOS is highly secure and stable than Ubuntu because of the less frequent updates on its release. The differences in the Ubuntu desktop and the CentOS security settings are its configuration and settings.
Observations
Ubuntu:
By default, the UFW refuses or denies or restricts all the incoming connections on the network. To have a secured connection, we can enable the SSH by the command – sudo ufw allow ssh. So the firewall will listen to the port 22 – file /etc/services.
So if we want to connect ufw with the http. We will use the following command (sudo ufw allow http) or (sudo ufw allow 80). Since 80 is the port number of the http. sudo ufw allow https or Sudo ufw allow 443. Since 443 is the port number of the https. sudo ufw allow 6000:6003/tcp, sudo ufw allow 6000:6003/udp command is used to specify a range so that the ufw can listen to all the ports on the range of ports we mentioned in our command (Idan Cohen, 2018, September 06).
Figure 17
Figure 18 – Installing the package – ufw
CentOS
By default, the firewalld is inactive in the CentOS. The command used in CentOS is #firewall-cmd –add-service=http. The commands used below in the CentOS command-line interface is used to start the service of the firewalld and to enable it. It also includes to stop the service of the firewalld and to disable it when not required (Linode, 2019 August 23).
Figure 19 – firewalld configuration in CentOS
The commands used below in the CentOS CLI is to check the status of the firewalld, as it is mentioned it is not running in the CentOS Linux distribution. So we can first stop the firewalld service and start the service of the firewalld and we can check the status of the firewalld and now we can see it is mentioned as running in the VM machine.
Figure 20 – status of the firewalld – running
Reflections
In this part b, this part helped to know the differences in the security setting configured in different linux distributions.
PART C
I will choose CentOS over Ubuntu because of its stability and corporate security reasons. The reason for its stable and secure is the less frequent updates. We can download the packages with the help of a RedHat packet manager and yellowdog update manager. The reason for CentOS is stable and secure is because the CentOS software is tested for a longer period of time to fix all the bugs before it goes to the users and organizations as a real-time interface (ThisHosting.Rocks, 2019, July 15).
Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our academic writing services
One of the weaknesses of the CentOS 7 is the access weakness, because of this, the administrator will not be able to change the username and the password in the system settings. The reason for this can maybe it is exploited by a man in the middle attack or by a malicious person who is able to access the internal network of the system environment.
Another weakness is the obsolete weakness with the common weakness enumeration code 676. This weakness arises when someone uses an outdated or disapproval function or softwares while building a system like CentOS using a virtual machine.
LAB 2
Description
In this lab, we will add a new hard disk to an existing centos server and will execute some commands to check the output for the input changes we are giving in the CLI of the centos server. We will be creating a new partition and mount the partition to the new directory that is added.
Observations:
By editing the machine settings, I added a new 1 gb harddisk to the CentOS server.
Figure 21 – A hard disk of 1gb is created
A new hard disk is being displayed in the centos server by using the command – ls /dev/sd*
Figure 22 – sdb1 is the new harddisk created in the device files
The command lsblk helps to find the device name and the size allotted to the new device, type of the device added and the mount point.
Figure 23 – The lsblk is the command used for getting the size of the partions and their mount point
Figure 21, 22, 23 shows the steps involved for creating a new partion with maximum disk size for the new device added to the sentos server by using fdisk and the command used is fdisk –uc /dev/sdb
Figure 24
Figure 25 – creating a new partion in thye sdb with maximum size of 1 GB
Figure 26- Printed the partion table by showing it as sdb1
Figure 27 – The command blkid is used to show the file system tyoe of the new device created as sdb1
Created a new directory with the command (mkdir /mnt/vpola) in the root directory and now mounting the new partition onto the /mnt/vpola.
Figure 28 – Mounting the new partion sdb1 on to the /mnt/vpola
Figure 29 – mounting the new partition onto the /mnt/vpola
Figure 30 – copied the home directory in to the new partion – new hard disk
Figure 31 – displaying the amount of size used after copying the home directory in to the new partition
Figure 32 - tar and gzip commands
Figure 33
Figure 34 – size of the disk used after compressing al the data in the new parttion disk
Reflections
There are many benfits of having multiple partitions – we can reinstall the backup file of the existing operating system in the computer, when it is crashed. The partition of a hard disk helps to keep the data safe from the malware and cyber attacks. After partition, it has more chance of keeping the data safe even while reinstalling the operating system secure. For an organization, partition helps to keep their data organized based on their requirements like client details, employee details, user details, log on details. We can install multiple operating systems when we have a hard disk dived in to two partitions.
The drawbacks of having a partitioning a hard drive is may be we have many partitions but physically they are stored in one single hard drive. So, if there is any physical damage or if it stops working then the user will lose all the data that is stored in the physical device. The recommendation for this problem is that we have to have a back up file either in cloud storage or in any other separate physical drive which has a strong security settings bultin it.
When we are having multiple partitions divided in to equal space, then there will be wastage in the space as not all programs or files occupy same size. It totally depends on the organization or even on the single person requirements (Ben Stegner 2018, December 31).
LAB 3
Description
In this lab, we will be learning how to install apache server by using the yellowdog update manager, checking the status of the httpd service and creating a html file and In this lab we will be able to display the contents of a html file the machine 1 from the web browser of the machine 2.
Observations
Machine 1
Installing the apache http server with the command (sudo yum install httpd) and starting, enabling and checking the status of the http by using the following commands used in the below sreen capture.
Figure 35 – installing, starting, enabling and status of the http server
Creating a new html file with a name – canada.html by changing the directory in to the /var/www/html.
The command used to create a html file is (touch Canada.html). To edit a file the command used is – (vi Canada.html)
Figure 36 – create a new html file
Figure 37 – Editing the html file
Figure 38 – configuring the firewall in the machine 1
Figure 39 – IP address of machine 1
Machine 2
Created a new CentOS virtual machine using Vsphere and named it as Machine 2 with IP address – 10.174.77.55
Figure 40 – A new virtual machine – Machine 2
Figure 41 – Configured a Centos GNOME desktop version
Displaying my full name in the machine 2 by using the web browser in the machine 2 and by using the IP address of the machine 1.
Figure 42 – Displaying the my full name in the machine 2
Figure 43 – Display the contents of the /var/log/httpd/access_log
Reflections
The apache http server is used to store all the information of the web brower, right from the intial request through the url to the final output we get from the web browser – server. The apache http server stores all the log details like the time, ip address or any errors occurred by or of the user while trying to access the web site via the server. If anyone can get the access of the httpd is writing a log file. Then the person can almost get all the access of the root user and can get all the information of the clients or can even insert malicious data or can edit the log files which is a security vulnerability or a flaw.
The apache access log files are used to store all the entries of the every user visiting the web site. We can check how the dedicated web server is responding to all the requests it is getting when a visitor tries to get information about the website displayed.
The advantages of the firewall enabled is firstly, it isolates the user or client system from the treat attacks initiated by the non authorized users of the particular or respective network. A firewall is a basic network security tool, enabled for a computer by default and connects directly to the internet connection and the firewall protects from the threats. With the help of firewall, the network administrators can allow the particular ports to secure the information and computers while transmitting and receiving data from outside the internal network of the office or the organization. The firewall is created wholey with a thought of protecting the system from the unwanted intrusion. The firewall blocks the Trojan horses, stops hackers in entering into our network, stops the keyloggers in entering into the network The advantages offered by any firewall technologies of the linux distribution are many and many and priceless (Ryan Cockerham, 2018, November 5).
The disadvantages of firewall being enabled in a linux distribution are the network administrators will not be able to listen to all the ports they need to acess. For every time they want to access, they have to add the port saying that the firewall should allow to access the particular website or else the users or administrators of the following internal network cannot access the other ports other than the default ports initialized during the configuration of the firewall in the linux distributions.
Another drawback of the firewall is that there should be a network administrator who has to scan all the ports that are listening to the internal network connection of the organisation. So that the security administrator can know whether the firewall is allowing all the ports the organization requires and blocking all the unwanted or unautherized users or hackers in entering into the network.
References
Pradeep Kumar(2018, April 29), Top 10 things to do after installing Ubuntu 18.04 LTS desktop [BLOG POST]. Retrieved October 05, 2019, from https://www.linuxtechi.com/top10-things-after-installing-ubuntu-18-04/
Linode (2019, August 23), Introduction to FirewallD on CentOS [BLOG POST]. Retrieved October 05, 2019, from https://www.linode.com/docs/security/firewalls/introduction-to-firewalld-on-centos/
Idan Cohen (2018, September 06), How to Configure Firewall with UFW on Ubuntu 18.04 [BLOG POST]. Retrieved October 05, 2019, from https://hostadvice.com/how-to/how-to-configure-firewall-with-ufw-on-ubuntu-18/
ThisHosting.Rocks (2019, July 15), CentOS vs Ubuntu: Which one is better for a server [BLOG POST]. Retrived October 06, 2019, from https://thishosting.rocks/centos-vs-ubuntu-server/
Ryan Cockerham (2018, November 5), What are the advantages and disadvantages of Using a firewall? [BLOG POST]. Retrived October 06, 2019 from https://www.techwalla.com/articles/what-are-the-advantages-and-disadvantages-of-using-a-firewall
Ben Stegner (2018, December 31), The pros and cons of partitioning a Hard drive: what you need to know [BLOG POST]. Retrived October 07, 2019 from https://www.makeuseof.com/tag/partition-hard-drive-explained/
Cite This Work
To export a reference to this article please select a referencing style below: