Senin, 23 November 2009

Installing Microsoft DNS

Use the following steps to install DNS on your Windows NT 4.0 Server:
  1. Click the Start button, point to Settings, and then click Control Panel. Double-click the Network icon, and then click the Services tab.
  2. Click Add, select Microsoft DNS Server from the Select Network Service dialog box, and then click OK.
  3. Type the location of your Windows NT source files, click OK, and then click Close.

    NOTE: If you have any service packs installed, you will need to re-apply your service pack before restarting your computer.
  4. Restart your computer.

Configuring Microsoft DNS

Gathering Information:

Before you actually begin configuring the DNS server, there is some basic information you will need. Some of this information must be approved by Internic for use on the Internet, but if you are configuring this server for internal use only, you can then decide what names and IP addresses to use. You will need:
  • Your domain name (must be approved by Internic)

  • The IP address of each server for which you wish to provide name resolution

  • The host names of each of the servers in step above
NOTE: The servers in the step above may be your mail servers, any public access servers, FTP servers, WWW servers, and so on.

For example, use the following information (substitute your actual information where appropriate):
   Domain Name: 
Servers: 192.168.50.11
192.168.50.12
192.168.50.12 (notice the same IP
address)
192.168.50.15

Creating Your DNS Server:

Using the information above, configure your Microsoft DNS server by doing the following:
  1. Click the Start button, point to Programs, point to Administrative Tools, and then click DNS Manager.
  2. From the DNS menu, click New Server.
  3. Type the IP address of your DNS server in the Add DNS Server dialog box (192.168.58.15 in the example information), and then click OK.
NOTE: It is not necessary to restart the DNS server for changes to your zones to take effect. All that is required is for the server data files to be updated using the following step:
  • In DNS Manager, right-click your DNS server, and click Update Server Data Files.
Creating Your Reverse Lookup Zone:

Some applications use a reverse query to a DNS server to find the host name of a host when it has the IP address of the computer. You must configure a reverse lookup zone to provide this capability.

NOTE: Reverse lookup zones may not be necessary in your network, but it is recommended that one be present. NSLOOKUP run on the DNS server will fail if no reverse lookup zone is configured.

To create a reverse lookup zone, perform the following steps:
  1. In DNS Manager, right-click your DNS server, and then click New Zone.
  2. Click Primary from the "Creating New Zone for" dialog box, and then click Next.
  3. The Zone Name is derived from your IP network address. In the example information, the Zone Name is 58.168.192.in-addr.arpa. Type your reverse zone name (the least significant part of the IP address, and work toward the most significant part of the address). For example:
       If your network ID is:         Then your reverse zone is:

    10.0.0.0 10.in-addr.arpa
    130.20.0.0 20.130.in-addr.arpa
    250.30.203.0 203.30.250.in-addr.arpa

    NOTE: The syntax of the reverse lookup zone is imperative to its operation.
  4. After you type the reverse lookup zone name, press Tab and the reverse lookup zone file name will automatically fill in using the zone name in step 3 appended by ".dns" (without the quotes).
  5. Click Next, and then click Finish.
Creating Your Forward Lookup Zone:
  1. In DNS Manager, right-click your server, and then click New Zone.
  2. Click Primary Zone, and then click Next.
  3. Type the Zone Name for your DNS domain. This is the domain name that is registered with Internic ( in the example).
  4. Press Tab, click Next, and then click Finish.
When you have created the forward lookup zone, you should see three records automatically created in that zone: the NS record, the SOA record, and an A record. If you do not have all three of these, you may want to verify that your DNS settings in your TCP/IP properties are configured correctly (click the Start button, point to Settings, click Control Panel, and then double-click the Network icon).

NOTE: The A record will only be created if the zone name matches the domain name.

Adding Host Records to Your Forward Lookup Zone:

The A record for your DNS server should have been automatically created. However, DNS Manager does not automatically create the PTR record in the reverse zone for the DNS server. The simplest way to correct this is to use the following steps:
  1. Right-click the A record for your DNS server, and then click Delete Record.
  2. Click Yes in the confirmation dialog box.
  3. Right-click your forward zone, , and then click New Host.
  4. Type the host name of your DNS server and the IP address.
  5. Click Create Associated PTR Record to enable it and click Add Host.
  6. Click Done.
NOTE: Repeat steps 3-5 above for all of the servers that you want to add to your DNS domain.

To verify the PTR records are created successfully, right-click the reverse lookup zone 58.168.192.in-addr.arpa, and then click Refresh.

Configuring Other Record Types

A DNS server can be responsible for several different record types. Some of them include, but are not limited to the following: A, CNAME, HINFO, MX, NS, and SOA. For details on these and other record types, please refer to the DNS white paper mentioned earlier in this article.

Creating A CNAME Record:

A CNAME record allows you to use multiple names for the same IP address. This way, you can have users access the same server for separate functions, such as FTP1.domain.com and WWW.domain.com. Before you can create the CNAME record, you must first have an A record, as described earlier.

To create a CNAME record, perform the following steps:
  1. Right-click your forward zone, , and click New Record.
  2. Select CNAME Record from the Record Type list box in the New Resource Record dialog box.
  3. Type an alternate name for access to this computer. For example, in the sample information earlier in this article, WWW is an alternate name for FTP1.domain.com.
  4. Type the original host name in "For Host DNS Name." For example, .

    NOTE: It is important to use the fully-qualified domain name (FQDN) for the originating host DNS name.
  5. Click OK.
Now when your users make a query for either of these host names, your DNS server will return the same IP address.

Creating an MX Record:

An MX Record is a Mail Exchange record that points mail programs to your mail servers. To create an MX record, perform the following steps:
  1. Right-click your forward lookup zone, and then click New Record.
  2. Select MX Record from the Record Type list box in the New Resource Record dialog box.
  3. The Host Name (Optional) field is used for the host name of the mail server. However, if you want users to be able to send mail to your domain using the format USER@Domain.com, then leave the Host Name field blank. NOTE: If the MX record contains the hostname, sending mail to user@domain.com may not work. There are three ways to resolve this. First, remove the hostname from the MX record as described in step 3. Second, after the MX record is created with the hostname, create an "A" record for the domain that has no hostname. Third, delete the existing MX record and re-create as described in steps one through six in the Creating an MX record section of this article.
  4. Type the FQDN of the mail server in the Mail Exchange Server DNS Name, for example, Mail.domain.com.

    NOTE: There is a trailing dot, ".", after the Mail Exchange Server DNS Name. The FQDN that is used for the Mail Exchange Server must have a corresponding A record for that domain. If the Mail Exchange Server is a different computer than the DNS Server, the DNS Server must know where to redirect the mail traffic.
  5. The Preference Number is any number from 0 to 65535. In the case of multiple mail servers, this number identifies which mail server is to be used first. The lower the preference number, the higher the priority.
  6. Click OK.
For additional information, please see the following article in the Microsoft Knowledge Base:
174419 (http://support.microsoft.com/kb/174419/EN-US/ ) How to Configure a Subnetted Reverse Lookup Zone on Windows NT

Senin, 03 Agustus 2009

server

jaringan dibentuk dengan menggunakan perangkat keras jaringan seperti:
  • Server – Server
  • Adapter Card (Kartu Jaringan)
  • Cables (Kabel)
  • Hub
  • Switch
  • Router
  • Dan perangkat keras jaringan lainnya.
Servers
Komputer – komputer server merupakan sumber hidup pada sebuah jaringan komputer.
Server – server ini menyediakan sharing resource yang dibutuhkan oleh user pengguna jaringan, seperti file storage, database, e-mail, web services, dan lain-lain.

Komponen yang digunakan dalam komputer server biasanya memiliki kualifikasi yang lebih baik dari komponen yang digunakan pada komputer desktop.
Komponen-komponen komputer server yang harus diperhatikan:
  • Motherboard (CPU Type, Chipset, Memory Support, expansion slots, hard drive controller, i/o ports, scsi drive controller, network interface).
  • Processor (jenis prosesor - Itanium 2, Xeon, processor clock speed).
  • Memori (tipe memori, total kapasitas memori yang disupport).
  • Hard drive (SCSI Drives, SATA, IDE / ATA).
  • Network Connection (Build in, Separate Network Card).
  • Video (tidak terlalu digunakan).
  • Power Supply (semakin besar beban server, akan membutuhkan supply power yang semakin besar).
Network Interface Cards
Device wajib yang harus dimiliki oleh setiap komputer yang ingin terhubung ke dalam jaringan.
merupakan physical layer and data link layer device.
  • Setiap NIC memiliki MAC Address.
  • Bisa berupa device built in dalam motherboard, bisa juga berupa separate adapter card yang ditancapkan dalam expansion slot pada motherboard.
Yang harus diperhatikan dalam memilih NIC :
  • Tipe konektor yang akan digunakan (BNC or RJ45)
  • Speed yang disupport oleh NIC
Hub and Switch
Digunakan jika anda membangun jaringan dengan menggunakan Twisted-Pair Cable.
Device yang digunakan dalam topologi Star.

  • Hub adalah physical layer device.
  • Switch adalah data link layer device.
  • Switch dapat bekerja dengan lebih efisien dan lebih cepat dibandingkan Hub.
  • Switch lebih aman daripada Hub.

Kenapa Switch lebih unggul dari hub, terangkan lebih detail dari 4 point diatas !

Keamanan Jaringan Komputer

Jumat, 2009 Juli 31
Keamanan Jaringan Komputer

Tujuan Keamanan Jaringan Komputer
  • Availability / Ketersediaan
  • Reliability / Kehandalan
  • Confidentiality / Kerahasiaan

Cara Pengamanan Jaringan Komputer :
  • Autentikasi
  • Enkripsi

Autentikasi
  • Proses pengenalan peralatan, sistem operasi, kegiatan, aplikasi dan identitas user yang terhubung dengan jaringan komputer.
  • Autentikasi dimulai pada saat user login ke jaringan dengan cara memasukkan password.

Tahapan Autentikasi
  1. Autentikasi untuk mengetahui lokasi dari peralatan pada suatu simpul jaringan (data link layer dan network layer)
  2. Autentikasi untuk mengenal sistem operasi yang terhubung ke jaringan (transport layer)
  3. Autentikasi untuk mengetahui fungsi/proses yang sedang terjadi di suatu simpul jaringan (session dan presentation layer)
  4. Autentikasi untuk mengenali user dan aplikasi yang digunakan (application layer)

NOS ( Network Operating System)


Network Operating System Features

  • Network Support
  • File Sharing Services
  • Multitasking g
  • Directory Services
  • Security Services

Microsoft’s Server Operating System


  • Windows NT Server 4
  • Windows 2000 Server ( Windows 2k Server, Windows 2k Advanced Server, Windows 2k Datacenter.)
  • Windows Server 2003 ( Standard Edition, Web Edition, Enterprise Edition, dan DataCenter Edition).
  • Windows Server 2008.

Other Network Operating System
  • Unix
  • Linux
  • Mac OS
  • BSD
  • Novell Netware

OSI LAYER

Lapisan ke-Nama lapisanKeterangan
7Application layerBerfungsi sebagai antarmuka dengan aplikasi dengan fungsionalitas jaringan, mengatur bagaimana aplikasi dapat mengakses jaringan, dan kemudian membuat pesan-pesan kesalahan. Protokol yang berada dalam lapisan ini adalah HTTP, FTP, SMTP, dan NFS.
6Presentation layerBerfungsi untuk mentranslasikan data yang hendak ditransmisikan oleh aplikasi ke dalam format yang dapat ditransmisikan melalui jaringan. Protokol yang berada dalam level ini adalah perangkat lunak redirektor (redirector software), seperti layanan Workstation (dalam Windows NT) dan jugaNetwork shell (semacam Virtual Network Computing (VNC) atau Remote Desktop Protocol (RDP)).
5Session layerBerfungsi untuk mendefinisikan bagaimana koneksi dapat dibuat, dipelihara, atau dihancurkan. Selain itu, di level ini juga dilakukan resolusi nama.
4Transport layerBerfungsi untuk memecah data ke dalam paket-paket data serta memberikan nomor urut ke paket-paket tersebut sehingga dapat disusun kembali pada sisi tujuan setelah diterima. Selain itu, pada level ini juga membuat sebuah tanda bahwa paket diterima dengan sukses (acknowledgement), dan mentransmisikan ulang terhadp paket-paket yang hilang di tengah jalan.
3Network layerBerfungsi untuk mendefinisikan alamat-alamat IP, membuat header untukpaket-paket, dan kemudian melakukan routing melalui internetworking dengan menggunakan router dan switch layer-3.
2Data-link layerBefungsi untuk menentukan bagaimana bit-bit data dikelompokkan menjadi format yang disebut sebagai frame. Selain itu, pada level ini terjadi koreksi kesalahan, flow control, pengalamatan perangkat keras (seperti halnya Media Access Control Address (MAC Address)), dan menetukan bagaimana perangkat-perangkat jaringan seperti hub, bridge, repeater, dan switch layer 2beroperasi. Spesifikasi IEEE 802, membagi level ini menjadi dua level anak, yaitu lapisan Logical Link Control (LLC) dan lapisan Media Access Control(MAC).
1Physical layerBerfungsi untuk mendefinisikan media transmisi jaringan, metode pensinyalan, sinkronisasi bit, arsitektur jaringan (seperti halnya Ethernet atauToken Ring), topologi jaringan dan pengabelan. Selain itu, level ini juga mendefinisikan bagaimana Network Interface Card (NIC) dapat berinteraksi dengan media kabel atau radio.

Sabtu, 01 Agustus 2009

Keamanan Jaringan Komputer

Tujuan Keamanan Jaringan Komputer
  • Availability / Ketersediaan
  • Reliability / Kehandalan
  • Confidentiality / Kerahasiaan

Cara Pengamanan Jaringan Komputer :
  • Autentikasi
  • Enkripsi

Autentikasi
  • Proses pengenalan peralatan, sistem operasi, kegiatan, aplikasi dan identitas user yang terhubung dengan jaringan komputer.
  • Autentikasi dimulai pada saat user login ke jaringan dengan cara memasukkan password.

Tahapan Autentikasi
  1. Autentikasi untuk mengetahui lokasi dari peralatan pada suatu simpul jaringan (data link layer dan network layer)
  2. Autentikasi untuk mengenal sistem operasi yang terhubung ke jaringan (transport layer)
  3. Autentikasi untuk mengetahui fungsi/proses yang sedang terjadi di suatu simpul jaringan (session dan presentation layer)
  4. Autentikasi untuk mengenali user dan aplikasi yang digunakan (application layer)