OPS335 Assignment 1a - Murray Saul

From CDOT Wiki
Revision as of 06:56, 15 January 2017 by Msaul (talk | contribs)
Jump to: navigation, search

Purpose

In this assignment you will set up the basic functionality for a virtual machine to act as a cloning source to make it easier for the student to create other servers (VMs) in later assignments. Whenever you clone another server (in later assignments), you MUST make certain to configure the cloned server in order to make it function in the network correctly and meet the requirements of future assignments. All of the assignments for this course are interdependent of each other and belong to the same Virtual Private Network called 335assign.

General Requirements

Weight: 5% of the overall grade

Due Date: During Week 6 (in class)


Detailed Requirements

Set-up a Virtual Network (335assign)

Create a new virtual network on your Host Machine.

  • Assign a newly-created virtual network the name: 335assign, and set forwarding to any physical device
    (refer to lab setup. You can have have 2 different network names: "335assign" and "ops335" without causing any problems).
  • Addresses in this network will start with 10.161 followed by the last two digits of your student number (just as your main virtual network). The subnet mask must be 255.255.255.0
  • There must NOT be a DHCP server running for this network!
  • All the machines for this assignment will be connected to your newly-created virtual network called: 335assign


Create a "Cloning Source" VM (335assign Virtual Network)

Create a virtual machine that you will use as a template (i.e. a cloning source). It should have a command-line interface only. Configure it to be a good cloning source, making certain it has all the following elements prior to cloning:

  1. Don't make the virtual drive too big: you will need space for it as well as space for the clones you from your cloning source
    (2GB should be enough for any cloning source and clone VM that you create for this assignment).
  2. Make certain that SELinux is set to enforcing.
  3. Make certain that you can login to your cloning source. The minimum commands required are: host, dig, netstat, links.
  4. Do not install software on your cloning source: you are expected to install other software on your "cloned" VMs instead. For example, if you are required to install bind in a clone, install it in the clone as opposed to the "cloning source".
  5. Configure your network with a static configuration. Refer to the table below for IP address and hostname.
  6. If you have created a regular user when you installed the machine, delete that regular user (you are to use only the root account).
  7. Set up an SSH server on this "cloning source". Make sure that the root account is only permitted to log in using key authentication. If user users are required to be created later, they should be permitted to log in with a their username and password.
  8. Generate a new key pair on your Host Machine (don't delete the existing one), called: id_rsa_asg1
  9. Make sure you can log in from your regular user on your Host Machine to root on the "cloning source" virtual machine using specifically that key.
  10. Do not place that newly-generated private key on the "cloning source" VM.


Set-up Firewall Rules for your Cloning Source

Perform the following steps for this section:

  1. Make certain that you have iptables services enabled and running instead of Firewalld.
  2. The default iptables rules should be OK, so you are NOT required to make any iptables rules for this portion of the assignment.


Reference Materials: List of Servers

The servers in the table below are used for this assignment (i.e. the host machine and a VM which will be the cloning source). In future assignments, this table will grow to show other servers such as DNS, Email, and Samba.

Name Address Purpose
host.ops335a1.org 10.161.X.1 Your host machine
source.ops335a1.org 10.161.X.254 Cloning source used to create other servers for other assignments.


Assignment Submission

The student is required to prove to their professor that their set-up works correctly during the regularly-scheduled lab period.

Assignment Evaluation Details

  1. Demonstrate working assignment to your instructor in class:
    1. Students need to demonstrate their assignment functionality to their professor during a lab period (like you would for any lab for "sign-off").
    2. Students are required to prepare everything ahead of time so that you can quickly demonstrate to your instructor that all required parts of your assignment are working.

  2. Download and run a shell script that will check your set-up:
    1. Issue the command: wget URL
    2. Set execute permissions to the shell script called:
    3. Run the shell script and redirect standard output to a file
      Issue the command: ./shellscriptname.bash > assn1p1.txt
    4. Submit the file assn1p1.txt to the dropbox for assignment #1 - Part 1 by the required due date and time.

      1. Evaluation Rubric

        Here is an evaluation rubric (in table form) showing you how you will be evaluated for this assignment. Part of the rubric is marked from professor observation from student demonstration of assignment in class, and the other part is based on output from the results of an assignment checking script that the student will download and run.

        Evaluation Item Comment Mark
        x /1
        x /1