You are on page 1of 5

Experiment:- 1

Aim:- Management of user and the domain.


User Management :- User Management is an authentication feature that
provides administrators with the ability to identify and control the state
of users logged into the network. This includes, but is not limited to, the
ability to query and filter users that are currently logged into the
network, manually log out users, and control user login counts and login
times.
Why should I implement User Management?
Most security-conscious enterprises today implement some form of
authentication and authorization for accessing network resources. The
benefits to this approach are clear user permissions can be verified
before granting access to resources, and user activity can be monitored
through various logging mechanisms. This solution is not without its
limitations however.
How does User Management work?
User Management is based on the concept of users logging in and
logging out of the ProxySG appliance. A login is the combination of a
unique IP address with a unique username in a unique realm. A user is
considered logged in when first authenticated to the ProxySG appliance.
Identifying users as logged in, or active, allows administrators to create
flexible User Management policies to fine tune user access and control.
Typical Use Cases:1.
2.
3.
4.
5.
6.

Log out users after a period of inactivity.


Provide a logout URL for users to manually log out
Limit the number of IP addresses associated with a single username.
Limit the number of logins associated with a single IP address.
Force a re-authentication to gain access to a particular network resource.
Limit the login session time allowed in a particular timeframe.

Experiment:- 2

Aim:- Configuring of DHCP.


The Dynamic Host Configuration Protocol (DHCP) is a network
service that enables host computers to be automatically assigned settings
from a server as opposed to manually configuring each network host.
Computers configured to be DHCP clients have no control over the
settings they receive from the DHCP server, and the configuration is
transparent to the computer's user.
The most common settings provided by a DHCP server to DHCP clients
include:
1. IP address and netmask
2. IP address of the default-gateway to use
3. IP adresses of the DNS servers to use
However, a DHCP server can also supply configuration properties such
as:
1. Host Name
2. Domain Name
3. Time Server
4. Print Server
The advantage of using DHCP is that changes to the network, for
example a change in the address of the DNS server, need only be
changed at the DHCP server, and all network hosts will be reconfigured
the next time their DHCP clients poll the DHCP server. As an added
advantage, it is also easier to integrate new computers into the network,

as there is no need to check for the availability of an IP address.


Conflicts in IP address allocation are also reduced.

A DHCP server can provide configuration settings using the following


methods:
Manual allocation (MAC address)
This method entails using DHCP to identify the unique hardware
address of each network card connected to the network and then
continually supplying a constant configuration each time the
DHCP client makes a request to the DHCP server using that
network device. This ensures that a particular address is assigned
automatically to that network card, based on it's MAC address.
Dynamic allocation (address pool)
In this method, the DHCP server will assign an IP address from a
pool of addresses (sometimes also called a range or scope) for a
period of time or lease, that is configured on the server or until the
client informs the server that it doesn't need the address anymore.
This way, the clients will be receiving their configuration
properties dynamically and on a "first come, first served" basis.
When a DHCP client is no longer on the network for a specified
period, the configuration is expired and released back to the
address pool for use by other DHCP Clients. This way, an address
can be leased or used for a period of time. After this period, the
client has to renegociate the lease with the server to maintain use
of the address.
Automatic allocation
Using this method, the DHCP automatically assigns an IP address
permanently to a device, selecting it from a pool of available
addresses. Usually DHCP is used to assign a temporary address to
a client, but a DHCP server can allow an infinite lease time.

Experiment:- 3
Aim:- Setting Up the local security policy in windows.
This procedural topic for the IT professional describes steps to configure
a security policy setting on the local computer, on a domain-joined
computer, and on a domain controller.
This topic pertains to the versions of Windows designated in the Applies
To list Below. Some of the user interface elements that are described in
this topic might differ from version to version.
You must have Administrators rights on the local computer, or you must
have the appropriate permissions to update a Group Policy Object
(GPO) on the domain controller to perform these procedures.
Applies To: Windows 7, Windows 8, Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, Windows
Vista.
To configure a setting for your local computer
1. To open Local Security Policy, click Start, type, secpol.msc.
2. Navigate the console tree to Local Computer Policy\Windows
Settings\Security Settings
3. Under Security Settings of the console tree, do one of the
following:

o Click Account Policies to edit the Password


Policy or Account Lockout Policy.
o Click Local Policies to edit an Audit Policy, a User Rights
Assignment, or Security Options.
4. When you find the policy setting in the details pane, double-click
the security policy that you want to modify.
5. Modify the security policy setting, and then click OK.

Experiment:- 4
Aim:- Start and stop services from user windows and
command prompt.

You might also like