CIT 470: Advanced Network & System Administration Syslog Configuration Introduct

CIT 470: Advanced Network & System Administration
Syslog Configuration
Introduction:
In this lab, you will configure syslog on two VMs, with one (the server) being configured to accept remote logs and the other (the client) to send them to the server. You will write two scripts to configure many of these settings. While you are permitted to use any programming language, bash is strongly recommended; it will make performing the tasks below easier.
Requirements:
Part 1: Server Configuration
On one of your VMs, configure it to accept remote logs from TCP port 514 (do not configure the firewall yet). In root’s home directory, create a file named remotelog.conf and copy the content from the documentation below into it (make sure you replace the given port with 514).
After you create the file, please create a script that performs the following:
Verify that the root user is signed in. If it is not, terminate the script.
Disable SELinux on the VM. Use text transformation to do this.
Ensure the rsyslog service is running.
oCreate a verification check to do this. If the service is found to not be running, start and enable it. If it is running, just enable it.
Open TCP port 514 on the firewall. Restart it after doing so.
Move the remotelog.conf file from root’s home directory to the appropriate location (check the documentation).
Restart the rsyslog service after making your configurations.
Part 2: Client Configuration
On a different VM, configure it to send its syslog messages to the syslog server. In root’s home directory, create a file named 10-remotelog.conf and copy the content from the documentation below into it (make sure you replace the given port with 514 and provide the server’s IP address in place of the given domain name).
After you create the file, please create a script that does the following:
Verify that the root user is signed in. If it is not, terminate the script.
Install the ipcalc utility on the VM (use the -y option to ensure the install happens automatically).
After this, have the script give the user the option to either perform the configuration steps below or send a test syslog message to the server.
oFor the user response, ask him or her to provide words such as “configure” and “test”, or letters such as “c” and “t”.
§You may support both words and letters if you wish, but it is not required.
oMake sure that the option the user selects is the only one performed. For example, if the user selects “test”, the configuration steps below should not be run.
If the user selects the test option, the script should do the following:
oRequest your syslog server’s IP address from the user and store it as a variable.
oVerify the IP address with ipcalc -c to ensure only valid ones are used. If the address is valid, have the script continue. If it is not, terminate the script.
oSend a test message using the logger command. This message should include your client’s IP address.
If the user selects the configuration option, the script should do the following:
oDisable SELinux on the VM. Use text transformation to do this.
oEnsure the rsyslog service is running.
§Create a verification check to do this. If the service is found to not be running, start and enable it. If it is running, just enable it.
oCopy the 10-remotelog.conf file from root’s home directory to the appropriate location mentioned in the documentation.
oRestart the rsyslog service after making your configurations.
If the user provides an invalid option, tell him or her and exit the script.
Documentation & Tips:
We strongly recommend the following documentation to complete this lab. Note that other guides contain configuration methods that no longer work, so we recommend this one:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/configuring-logging_configuring-basic-system-settings
oUse the steps that configure the server and client to use TCP. Skip the optional steps to use a custom port, as well as the others for TLS and UDP.
Here are some tips to keep in mind as you work on this lab:
To edit the SELinux files with your scripts, consider using Python’s replace() function or the sed command if writing with bash.
To check if the rsyslog service is running, consider using the exit status or the output of a command that can check it. The systemctl command has specific options that make the former easy to do.
Submission Instructions:
When you are finished, submit a Word document that contains the following:
The text you copied into both configuration files you made in root’s home directory.
The text from both of your scripts.
After configuring everything, send a logger message from the client, then run the following command on the server and capture its output with the following command:
ocat /var/log/remote/msg/[hostname]/cit470.log
§Replace hostname with your client’s name (this will most likely be localhost).
§If cit470.log does not exist, use root.log.
oThis screenshot should show one or more timestamped messages from the client’s logger commands.
oIf you are having trouble receiving the messages, reboot both VMs, then try again.

Do some Internet research on flow control in data communications networks. Ident

Do some Internet research on flow control in data communications networks. Identify common examples of why flow control is needed and how it ensures reliable data transfer between senders and receivers. Provide 2-3 references. Instructions:
The total word count must be 250 to 300
Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater Please provide references and in-text citations for your original postings in APA format.

Assignment Topic: Research frequency-division multiplexing. Identify three every

Assignment Topic:
Research frequency-division multiplexing. Identify three everyday examples of FDM use. Each of these examples shows how FDM is used and how it works. Summarize your findings in a brief paper.
Instructions (from the syllabus):
Cases allow you to demonstrate your understanding and ability to apply course concepts. You must use at least two (2-3) appropriate sources (other than your course textbook) that are correctly cited in APA style; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:
Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss facts pertinent to the abovementioned issues.
Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation based on the knowledge you have gained in this course? Support your recommendation by citing references in the text and the supplementary readings. You should also draw on references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
Word count is 500 words, not including references and figures. References must be in the APA style.

1-For multipoint configuration, only one device at a time can transmit. Why and

1-For multipoint configuration, only one device at a time can transmit. Why and what is that terminology called. Explain in maximum 2 paragraphs and cite your work? (10 Point)
2- Cost-2-Cost is a famous radio show broadcast from Los Angeles, California. The broadcast use AM stereo at 1320 kHz by the time it reaches Maryland, Rockville WWDC-F2 (@101.1 kHz) Monday – to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength. Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (10 points)
3- Hulu and YouTube offer regular TV broadcast, and Time Shift service for their customers. As promotion to encourage subscribers to the service providers. FXX movie channel broadcast a new 4K movie with Dolby Atmos for subscribers. Answer the following Questions and Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (20 points)
What is the required bandwidth to watch a 4K HDR10 12-Bit color movie stream? (10 points)
How much data is needed for the Time Shift of 1.5 hour and what is the compressed Value in? (10 points
Need to explain the details the steps of your answer and calculations.
Need to mention references and citations for all the above questions

Q1)List the different network management standards mentioned in the slides? Whic

Q1)List the different network management standards mentioned in the slides? Which of them is the most widely implemented?
Q2)1. What is the purpose of the network layer in the OSI model? 2. How does network layer handle errors?
Q3)1. What is the difference between MDB and MIB? 2. Give two examples of managed object.
Q4)
1. What is the figure below? 2. Explain the information giving in the figure.

Scenario: Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get all of her computer devices connected to the network and the Internet.
Your sister and her family have the following devices:
2 laptops: one for work, one for gaming and video streaming
2 mobile devices: one Apple-iPad, one Samsung Android tablet
2 mobile phones: one iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be used as projectors
Instructions:
For this assignment, you must diagram a network depicting the physical device configuration of your sister’s home network using cloud services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network diagram.)
You must then create a second diagram of the floor layout with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the router and each device should be configured so they have access to the Internet and file-sharing capability.
Length: 3-5 page pager with an embedded original network diagram
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,

Develop a findings report on the company’s ability to close a project effectivel

Develop a findings report on the company’s ability to close a project effectively and efficiently. this report will provide a gap analysis to project managers and company management on the areas of their project management framework that require development. Needs to include: listing and description of the deliverables and work products project managers will use in project closure management.; an executive summary and conclusion, this summary must offer a high-level description of your consulting effort and a summary of your findings, the conclusion should focus on the organizational changes necessary to implement your recommendations. Provide a gap analysis and recommendations for the following documents that I have attached: Project charter, scope management plan & WBS, and the risk and change management plan. This paper must be 8 pages long and include 8 credible references.

The Wireless Access Point (WPA) is a critical device, which serves as a connecti

The Wireless Access Point (WPA) is a critical device, which serves as a connection between the wired, and the wireless network. Discuss the similarities and differences of a WAP and a wireless router. As a system/network administrator, discuss in detail the steps that you would take to implement security at the WAP?
What is encryption? Discuss why encryption is necessary when transmitting data in wireless networks. As a network or systems administrator, discuss how you would create and enforce an encryption policy for the network that you are administering.
Discuss security protocols used in wireless networks. Why are they necessary? Compare and contrast the Wired Equivalent Privacy (WEP), and the Wi-Fi Protected Access (WPA) security protocols. When would you use WEP or WPA? What are the advantages and disadvantages of using WEP or WPA?
Please be sure to validate your opinions and ideas with citations and references in APA format.

On your personal computer at home that you use to complete your Herzing work, pe

On your personal computer at home that you use to complete your Herzing work, perform a condensed risk management analysis by addressing the items below. Be sure to list the elements pertaining to your system, the major vulnerabilities that you discovered, and how you intend to mitigate the risks/threats.
Asset identification
Vulnerability and threat assessment
Threat mitigation
Please be sure to validate your opinions and ideas with citations and references in APA format.