Difference between revisions of "OPS335 Assignment 1a - Murray Saul"

From CDOT Wiki
Jump to: navigation, search
Line 29: Line 29:
 
# The hostname for this server will be called: '''source'''
 
# The hostname for this server will be called: '''source'''
 
# Don't make the virtual drive too big: you will need space for it as well as space for the clones you from your cloning source<br>('''2GB''' should be enough for any cloning source and clone VM that you create for this assignment).
 
# Don't make the virtual drive too big: you will need space for it as well as space for the clones you from your cloning source<br>('''2GB''' should be enough for any cloning source and clone VM that you create for this assignment).
# Make certain that SELinux is set to '''enforcing'''.
 
 
# Make certain that you can login to your cloning source.
 
# Make certain that you can login to your cloning source.
# Do not install software on your cloning source: you are expected to install other software on your "cloned" VMs instead.<br>(For example, if you are required to install bind in a clone, install it in the clone as opposed to the "cloning source")
+
# Configure your network interface for this cloning-source with a '''static''' configuration. Refer to the table below for IP address and hostname.<br>
# Configure your network with a '''static''' configuration. Refer to the table below for IP address and hostname.<br>
 
  
 
{| class="wikitable" | style="margin-left:50px;"
 
{| class="wikitable" | style="margin-left:50px;"
Line 43: Line 41:
 
|}
 
|}
  
 +
# Make certain that SELinux is set to '''enforcing'''.
 +
# Do not install software on your cloning source: you are expected to install other software on your "cloned" VMs instead.<br>(For example, if you are required to install bind in a clone, install it in the clone as opposed to the "cloning source")
 
# If you have created a regular user when you installed this machine, delete that regular user (you are only to access this server via root account).
 
# If you have created a regular user when you installed this machine, delete that regular user (you are only to access this server via root account).
 
# Set up an SSH server on this "cloning source". Make sure that '''PermitRootLogin''' is set to '''yes''' for this server. Also make sure that only the root account is permitted to login using key authentication. If other users are required to be created in a later assignment, they should be permitted to log in with a their username and password.
 
# Set up an SSH server on this "cloning source". Make sure that '''PermitRootLogin''' is set to '''yes''' for this server. Also make sure that only the root account is permitted to login using key authentication. If other users are required to be created in a later assignment, they should be permitted to log in with a their username and password.

Revision as of 02:22, 16 January 2017

Purpose

In this assignment you will set up the basic functionality for a virtual machine to act as a cloning source to make it easier for the student to create other servers (VMs) in later assignments. Whenever you clone another server (in later assignments), you MUST make certain to configure the cloned server in order to make it function in the network correctly and meet the requirements of future assignments. All of the assignments for this course are interdependent of each other and belong to the same Virtual Private Network called 335assign.

General Requirements

Weight: 5% of the overall grade

Due Date: During Week 6 (in class)


Detailed Requirements

Set-up a Virtual Network (335assign)

Create a new virtual network on your Host Machine.

  • Assign a newly-created virtual network the name: 335assign, and set forwarding to any physical device
    (refer to lab setup. You can have have 2 different network names: "335assign" and "ops335" without causing any problems).
  • Addresses in this network will start with 10.161 followed by the last two digits of your student number (just as your main virtual network). The subnet mask must be 255.255.255.0
  • There must NOT be a DHCP server running for this network!
  • All the machines for this assignment will be connected to your newly-created virtual network called: 335assign


Create a "Cloning Source" VM (335assign Virtual Network)

Create a virtual machine that you will use as a template (i.e. a cloning source). It should have a command-line interface only. Configure it to be a good cloning source, making certain it has all the following elements prior to cloning:

  1. The hostname for this server will be called: source
  2. Don't make the virtual drive too big: you will need space for it as well as space for the clones you from your cloning source
    (2GB should be enough for any cloning source and clone VM that you create for this assignment).
  3. Make certain that you can login to your cloning source.
  4. Configure your network interface for this cloning-source with a static configuration. Refer to the table below for IP address and hostname.
Hostname Address Purpose
c7host.ops335.org 10.161.X.1 Your host machine
source.ops335.org 10.161.X.254 Cloning source used to create other servers for other assignments.
  1. Make certain that SELinux is set to enforcing.
  2. Do not install software on your cloning source: you are expected to install other software on your "cloned" VMs instead.
    (For example, if you are required to install bind in a clone, install it in the clone as opposed to the "cloning source")
  3. If you have created a regular user when you installed this machine, delete that regular user (you are only to access this server via root account).
  4. Set up an SSH server on this "cloning source". Make sure that PermitRootLogin is set to yes for this server. Also make sure that only the root account is permitted to login using key authentication. If other users are required to be created in a later assignment, they should be permitted to log in with a their username and password.
  5. Generate a new key pair on your Host Machine (don't delete the existing one), called: id_rsa_asg1
  6. Make sure you can log in from your regular user on your Host Machine to root on the "cloning source" virtual machine using specifically that key.
  7. Do not place that newly-generated private key on the "cloning source" VM.


Set-up Firewall Rules for your Cloning Source

Perform the following steps for this section:

  1. Make certain that you have iptables services enabled and running instead of Firewalld.
  2. The default iptables rules should be OK, so you are NOT required to make any iptables rules for this portion of the assignment.


Reference Materials: List of Servers

The servers in the table below are used for this assignment (i.e. the host machine and a VM which will be the cloning source). In future assignments, this table will grow to show other servers such as DNS, Email, and Samba.

Hostname Address Purpose
c7host 10.161.X.1 Your host machine
source 10.161.X.254 Cloning source used to create other servers for other assignments.


Assignment Submission

The student is required to prove to their professor that their set-up works correctly during the regularly-scheduled lab period.

Assignment Evaluation Details

  1. Demonstrate working assignment to your instructor in class:
    1. Students need to demonstrate their assignment functionality to their professor during a lab period (like you would for any lab for "sign-off").
    2. Students are required to prepare everything ahead of time so that you can quickly demonstrate to your instructor that all required parts of your assignment are working.

  2. Download and run a shell script that will check your set-up:
    1. Issue the command: wget URL
    2. Set execute permissions to the shell script called:
    3. Run the shell script and redirect standard output to a file
      Issue the command: ./shellscriptname.bash > assn1p1.txt
    4. Submit the file assn1p1.txt to the dropbox for assignment #1 - Part 1 by the required due date and time.


Evaluation Rubric

Here is an evaluation rubric (in table form) showing you how you will be evaluated for this assignment. Part of the rubric is marked from professor observation from student demonstration of assignment in class, and the other part is based on output from the results of an assignment checking script that the student will download and run.

Evaluation Item Comment Mark
x /1
x /1