📘 قراءة كتاب NETWORK ADMINISTRATION - INSTALLATION AND CONFIGURATION OF eBOX PLATFORM أونلاين
Odunmbaku Sulaimon Abiola Olusanya Foluseke Adurasanmi NETWORK ADMINISTRATION - INSTALLATION AND CONFIGURATION OF eBOX PLATFORM
CONTENTS
ACKNOWLEDGEMENTS .......................................................................................................1
LIST OF TABLES .....................................................................................................................8
ABBREVIATIONS ...................................................................................................................9
1 INTRODUCTION ..............................................................................................................11
1.1 BACKGROUND .......................................................................................................11
1.1.1 TCP/IP Networks ...........................................................................................11
1.1.2 UUCP Networks ............................................................................................12
1.1.3 Linux Networking ..........................................................................................13
1.1.4 System Maintenance .......................................................................................13
2 COMPUTER NETWORK ADMINISTRATION .............................................................15
2.1 TYPES OF COMPUTER NETWORK ....................................................................15
2.2 NETWORK TOPOLOGY ........................................................................................17
2.2.1 Mesh Topology ...............................................................................................17
2.2.2 Star Topology .................................................................................................18
2.2.3 Bus Topology .................................................................................................19
2.2.4 Ring Topology ................................................................................................20
2.3 COMPUTER NETWORK PLANNING ..................................................................21
3 SMALL AND MEDIUM ENTERPRISES NETWORK MODELLING ..........................25
3.1 ENTERPRISE ORGANIZATION ARCHITECTURE ............................................25
3.2 ENTERPRISE NETWORK REQUIREMENT ........................................................26
4. EBOX TECHNOLOGIES SL............................................................................................28
4.1 eBOX PLATFORM, VERSION 4 ............................................................................28
4.2 eBOX CONTROL CENTER ....................................................................................36
5. INSTALLATION AND CONFIGURATION OF EBOX PLATFORM FOR ENTERPRISE ....................................................................................................................38
5.1 eBox CORE ..............................................................................................................38
5.1.1 Logs ................................................................................................................38
5.1.2 Monitoring ......................................................................................................40
5.1.3 Events and Alerts ............................................................................................43
4
5.1.4 Backup ............................................................................................................44
5.1.5 Software Managements ..................................................................................44
5.2 eBox GATEWAY .....................................................................................................46
5.2.1 High Level eBox Network Abstraction ..........................................................46
5.2.2 Firewall ...........................................................................................................51
5.2.3 Routing ...........................................................................................................54
5.2.4 Traffic Shaping ...............................................................................................55
5.2.5 HTTP Proxy Setting .......................................................................................55
5.3 eBox INFRASTRUCTURE ......................................................................................55
5.3.1 Network Configuration Service (DHCP) .......................................................56
5.3.2 Name Resolution Service (DNS) ...................................................................58
5.3.4 Time Synchronization Service (NTP) ............................................................65
5.4 eBox OFFICE ...........................................................................................................65
5.4.1 Directory Service (LDAP) ..............................................................................66
5.4.2 File Sharing Service and Remote Authentication ..........................................72
5.4.3 Printer Sharing Service ...................................................................................76
5.4.4 eGroupware Service .......................................................................................76
5.5 eBOX UNIFIED COMMUNICATIONS .................................................................79
5.5.1 Electronic Mail Service ..................................................................................79
5.5.2 Instant Messaging (IM) Service .....................................................................82
5.5.3 Voice over IP Service .....................................................................................87
5.6 eBOX UNIFIED THREAT MANAGER .................................................................87
5.6.1 Mail Filter .......................................................................................................87
5.6.2 HTTP Proxy Advanced Configuration ...........................................................88
5.6.3 Secure Interconnection between Local Networks ..........................................94
5.6.4 Intrusion Detection System (IDS) ..................................................................99
6. CONCLUSION, CHALLENGES AND RECOMMENDATION ..................................101
6.1 Conclusion ..............................................................................................................101
6.2 Challenges ...............................................................................................................101
6.3 Recommendations ...................................................................................................102
REFERENCES ................................................................................................................
سنة النشر : 2010م / 1431هـ .
حجم الكتاب عند التحميل : 3.5 ميجا بايت .
نوع الكتاب : pdf.
عداد القراءة:
اذا اعجبك الكتاب فضلاً اضغط على أعجبني و يمكنك تحميله من هنا:
شكرًا لمساهمتكم
شكراً لمساهمتكم معنا في الإرتقاء بمستوى المكتبة ، يمكنكم االتبليغ عن اخطاء او سوء اختيار للكتب وتصنيفها ومحتواها ، أو كتاب يُمنع نشره ، او محمي بحقوق طبع ونشر ، فضلاً قم بالتبليغ عن الكتاب المُخالف:
قبل تحميل الكتاب ..
يجب ان يتوفر لديكم برنامج تشغيل وقراءة ملفات pdf
يمكن تحميلة من هنا 'http://get.adobe.com/reader/'