Webmin Ppt

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Webmin Ppt as PDF for free.

More details

  • Words: 1,796
  • Pages: 62
Aravindan Arun, JRF

Contents at a Glance  Introduction of WEBMIN  Installing WEBMIN  Secure Your WEBMIN Server  User and Groups  Disk and Network File System  NFS File Sharing  Disk Quotas  Partitions, RAID and LVM  Bootup and Shutdown  Scheduled Commands  Process Management  Software Packages  System Logs  File System Backup  Network Configuration



Webmin is a web-based system configuration tool for Open Solaris, Linux and other Unix-like systems.



Webmin running as its own process and web server. It defaults to TCP port 10000 for communicating.



Webmin is a web-based interface for system administration for Unix.



It is built around modules, which have an interface to the configuration files and the Webmin server. This makes it easy to add new functionality without much work.



Webmin also allows for controlling many machines through a single interface, or seamless login on other webmin hosts on the same subnet or LAN.



No compilation/compilers required.

• •

Platform Independent Architecture. Runs over multiple platforms.

INSTALLING WEBMIN

The Webmin configuration directory The Webmin log directory Your Operating system type Web server port Web server login and password Web server hostname Use SSL Start Webmin at boot time

EXERCISE 1 WEBMIN

INSTALLING

EXERCISE 1 WEBMIN

INSTALLING

EXERCISE 1 WEBMIN

INSTALLING

SECURE YOUR WEBMIN SERVER Network Security Unless you are running Webmin on a system that is never connected to any other network, it is a wise idea to restrict which client network addresses are allowed to log in. Because Webmin is so powerful, anyone who manages to log in will have total control over your system as though they had root shell access. Even though a username and password is always required to log in, it is always good to have an additional layer of security in case an attacker guesses your password. IP access control also protects you from any bugs in Webmin that may show up in future that will allow an attacker to log in without a password some older releases have had just this problem.

SECURE YOUR WEBMIN SERVER SSL Encryption If you are accessing your Webmin server over an untrusted network such as the Internet, you should be aware that, by default, an attacker can capture your login and password by listening in on network traffic. This is particularly easy if you are using a non-switched Ethernet network shared by people that you do not fully trust, such as those in offices or universities.

USERS AND GROUPS

• The Webmin module Users and Groups that is found under the System category can be used to create, edit, and delete all the LINUX users and groups on your system. • You should always be careful when using this module to edit existing system users like root and daemon because changing or deleting them could stop your system from working. •

Some users have their home directory set to / (the root directory).



Deleting such a user would cause all the files on your system to be deleted!

EXERCISE 2 - CREATE USERS AND GROUPS

EXERCISE 2 - CREATE USERS AND GROUPS

EXERCISE 2 - CREATE USERS AND GROUPS

DISK AND NETWORK FILESYSTEMS

• The set of files that is actually mounted at a mount point is called a filesystem. • Webmin directly modifies this file to manage filesystems that are mounted at boot time, and calls the mount and unmount commands to immediately activate and deactivate filesystems. • The Disk and Network Filesystems Webmin module also manages with virtual memory.

EXECRISE – 3 NETWORK

DISK AND FILESYSTEMS

NFS FILE SHARING

NFS is the most common protocol for sharing files between UNIX systems over a network. NFS servers export directories from their local hard disks to NFS clients, which mount them so that they can be accessed like any other directory. Unlike other file sharing protocols, such as Windows networking, Netware, and AppleShare, NFS was designed to support client systems that have multiple users. This means that a client never logs into a server, and that the server almost completely trusts the client to authenticate users.

DISK QUOTAS

• A Disk Quota is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems. • An administrator can prevent one user from consuming an entire file system's resources, or create a system of tiered access, whereby users can have different levels of restriction. • Disk quotas are typically implemented on a per-user or per-group basis. That is, a system administrator defines.

EXERCISE 4 QUOTAS

-

DISK

PARTITION, RAID AND LVM

All hard disks used by Linux and other operating systems on PC hardware are divided into one or more non-overlapping regions called partitions. Sometimes an entire hard disk will be taken up by one partition, but usually your system will have at least two partitions on the primary disk—one for the root filesystem, and one for virtual memory (also known as swap space). Each partition can be used for either a single filesystem or for virtual memory. The Amount of free disk space will be displayed as well. If a partition is being used for software RAID, the raid device that it is part of will be shown. Similarly, if a partition is part of an LVM volume group, the group name will be displayed under the Use column.

EXERCISE 5 RAID AND LVM

PARTITION,

EXERCISE 5 RAID AND LVM

PARTITION,

EXERCISE 5 RAID AND LVM

PARTITION,

BOOTUP AND SHUTDOWN

• This piece of code is called a boot loader, and is responsible for displaying a menu of operating systems to the user and loading one of them. There are several boot loaders available for Linux, such as LILO and GRUB, but they all do basically the same thing. • At shutdown time, a series of scripts is also run to shut down servers and unmount filesystems. • These scripts also have a fixed order so that the deactivation of networking and other basic services happens last. If requested and supported by the hardware, the last step in the shutdown process will be the powering off of the system by the kernel.

EXECRISE 6 - BOOTUP AND SHUTDOWN

EXECRISE 6 - BOOTUP AND SHUTDOWN

EXECRISE 6 - BOOTUP AND SHUTDOWN

EXECRISE 6 - BOOTUP AND SHUTDOWN

EXECRISE 6 - BOOTUP AND SHUTDOWN

EXECRISE 6 - BOOTUP AND SHUTDOWN

SCHEDULED COMMANDS

• A Cron job is a UNIX term for a command that is run on a regular schedule by the cron daemon. • Cron jobs are very useful for performing regular system tasks, such as cleaning up log files, synchronizing the system time, backing up files, and so on. • If multiple commands to execute are entered on separate lines, some may fail due to extra newline characters being added to the at job. • Scheduled commands created from within Webmin will use environment variables set by Webmin itself, which are not be the same as the variables that would have been set if the command was created by its owner at the shell prompt.

EXECRISE 7 COMMANDS

-

SCHEDULED

EXECRISE 7 COMMANDS

-

SCHEDULED

EXECRISE 7 COMMANDS

-

SCHEDULED

EXECRISE 7 COMMANDS

-

SCHEDULED

PROCESS MANAGEMENT • Every program, server, or command running on a Linux system is a process. At any time, there are dozens of processes running on your system, some for programs that you are interacting with graphically. • Each process is identified by a unique ID known as the PID, or process ID. • Each is owned by a single user and is a member of multiple groups, which determine the privileges that the process. • A process will run until it chooses to exit, or until it is killed by a signal from another process.

EXECRISE 8 MANAGEMENT

PROCESS

EXECRISE 8 MANAGEMENT

PROCESS

EXECRISE 8 MANAGEMENT

PROCESS

EXECRISE 8 MANAGEMENT

PROCESS

EXECRISE 8 MANAGEMENT

PROCESS

EXECRISE 8 MANAGEMENT

PROCESS

SOFTWARE PACKAGES All Linux systems use some kind of software packaging system to simplify the process of installing and removing programs. A package is a collection of commands, configuration files, man pages, shared libraries, and other files that are associated with a single program, combined into a single package file. When it is installed, the package system extracts all the component files and places them in the correct locations on your system. Because the system knows which package every file came from, when you want to remove a package it knows exactly which files to delete.

EXECRISE 9 - SOFTWARE PACKAGES

EXECRISE 9 - SOFTWARE PACKAGES

EXECRISE 9 - SOFTWARE PACKAGES

EXECRISE 9 - SOFTWARE PACKAGES

EXECRISE 9 - SOFTWARE PACKAGES

EXECRISE 9 - SOFTWARE PACKAGES

SYSTEM LOGS

• Linux servers generate log messages requests, and diagnostic information.

for

errors,

warnings,

• Logs can be written to a file, sent to another server, passed to another program via a pipe, or even broadcast to all users logged into the system. • Normally logs are written to files in the /var/log directory. • On most Linux distributions the file /var/log/messages contains general information, error and warning messages, the file /var/log/ mail records incoming and outgoing mail, and /var/log/secure records successful and failed logins.

FILE SYSTEM BACKUP

• All Unix and Linux Systems come with the tar Command, which can backups multiple file and directories into a single file, with all permissions and ownership information preserved. • Tar is the most common Unix backup format, and although it was originally designed for backups to tape (tar stands for tape archive), it words just as well to local or remote files.

EXERCISE 10 BACKUP

- FILE SYSTEM

EXERCISE 10 BACKUP

- FILE SYSTEM

EXERCISE 10 BACKUP

- FILE SYSTEM

EXERCISE 10 BACKUP

- FILE SYSTEM

NETWORK CONFIGURATION • A Linux system can be connected to a network or the Internet in several different ways—for example, via an Ethernet network card, a token ring card, or a PPP (Point-to-Point Protocol) connection over a dial-up modem. • Every Ethernet network card, PPP connection, wireless card, or other device in your system that can be used for networking is known as an interface. • Interfaces are usually associated with a piece of hardware (like a network card), but they can also be dynamically created (like PPP connections). • For an interface to be used, it must first have an IP address assigned, which may be fixed and set from a configuration file on your system or dynamically assigned by a server.

EXERCISE 11 - NETWORK CONFIGURATION

EXERCISE 11 - NETWORK CONFIGURATION

EXERCISE 11 - NETWORK CONFIGURATION

EXERCISE 11 - NETWORK CONFIGURATION

EXERCISE 11 - NETWORK CONFIGURATION

REFERENCE • Web: http://www.webmin.com • Books: webmin - joe coper webmin - jamiecameron

THANK YOU BY

BY

ARAVINDAN ARUN

Related Documents

Webmin Ppt
November 2019 3
Webmin
November 2019 6
Webmin Guide
October 2019 5
Bekerja Dengan Webmin
June 2020 11
Ppt
November 2019 88
Ppt
December 2019 96