Vous êtes sur la page 1sur 29

DISTRIBUTED FILE SYSTEM

A THESIS
Submitted in partial fulfillment of the requirements for the award of the degree of
Master of Technology
In
COMPUTER SCIENCE AND ENGINEERING
(CYBER SECURITY)

BY
ORUGANTI SRINIVASU

Under the Guidance of


Mr. S.CHANDRA SEKHAR M.Tech, (Ph.D)
Assistant Professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


UNIVERSITY COLLEGE OF ENGINEERING
KAKINADA-533003, AP (INDIA)

1
CERTIFICATE

I hereby certify that the work which is being presented in the M.Tech. Thesis entitled
“DISTRIBUTED FILE SYSTEM”, in partial fulfillment of the requirements for the award of
the Master of Technology in Cyber Security and submitted to the Department of Computer
Science and Engineering of JNTU College of Engineering, KAKINADA, AP, is an authentic
record of my own work carried out during a period from DEC 2017 under the supervision of Mr.
S. CHANDRA SEKHAR, Assistant Professor, CSE Department.

Signature of Candidate

ORUGANTI SRINIVASU
Regd No. 17021D2613

This is to certify that the above statement made by the candidate is correct to the best of
my knowledge.

Signature of Supervisor
Mr. S. CHANDRA SEKHAR M.TECH(PH.D)

2
ACKNOWLEDGEMENT

Satisfaction and euphoria that accompany the successful completion of any task would be
incomplete without the mention of people who made it possible, whose constant guidance and
encouragement crowned the efforts with success.

The first person I would like to thanks is my Project Guide Mr. S. CHANDRA SEKHAR,
Assistant Professor, Department of Computer Science and Engineering, who had given
continuous critical suggestions and extension of proper working atmosphere abiding interest that
has finally evolved into this research work.

3
ABSTRACT

Distributed File System (DFS) Namespaces and DFS Replication offer simplified, highly-
available access to files, load sharing, and WAN-friendly replication. In the Windows
Server® 2012 R2 operating system, Microsoft revised and renamed DFS Namespaces (formerly
called DFS), replaced the Distributed File System snap-in with the DFS Management snap-in,
and introduced the new DFS Replication feature. In the Windows Server® 2012 operating
system, Microsoft added the Windows Server 2012 mode of domain-based namespaces and
added a number of usability and performance improvements.

4
TABLE OF CONTENTS

1. Introduction

2. Main concept of routing

3. Way to configure routing in windows server 2012

4. Concept of RIP

5. Way to configure RIP

6. Understanding network address translation(NAT)

7. Way to configure network address translation in windows server 2012

8. Concept of remote access server

9. Configure remote access server

10. Main purpose of VPN and its security

11. Overview of PPTP

12. Configure VPN PPTP

5
1. Introduction

 Modern world scenario is ever changing. Data Communication and


network have changed the way business and other daily affair
works. Now, they highly rely on computer networks and
internetwork.
 A set of devices often mentioned as nodes connected by media link
is called a Network.
 A node can be a device which is capable of sending or receiving
data generated by other nodes on the network like a computer,
printer etc. These links connecting the devices are
called Communication channels.
 Computer network is a telecommunication channel using which we
can share data with other computers or devices, connected to the
same network. It is also called Data Network. The best example of
computer network is Internet.
 Computer network does not mean a system with one Control Unit
connected to multiple other systems as its slave. That is Distributed
system, not Computer Network.
 During initial days of internet, its use was limited to military and
universities for research and development purpose. Later when all
networks merged together and formed internet, the data used to
travel through public transit network. Common people may send
the data that can be highly sensitive such as their bank credentials,
username and passwords, personal documents, online shopping
details, or confidential documents.
 All security threats are intentional i.e. they occur only if
intentionally triggered. Security threats can be divided into the
following categories:
 Interruption is a security threat in which availability of resources is
attacked. For example, a user is unable to access its web-server or
the web-server is hijacked.
 In this threat, the privacy of a user is compromised. Someone, who
is not the authorized person is accessing or intercepting data sent or
received by the original authenticated user.
 This type of threat includes any alteration or modification in the
original context of communication. The attacker intercepts and

6
receives the data sent by the sender and the attacker then either
modifies or generates false data and sends to the receiver. The
receiver receives the data assuming that it is being sent by the
original Sender.
 This threat occurs when an attacker or a security violator, poses as a
genuine person and accesses the resources or communicates with
other genuine users.

2. Main concept of routing

 In internetworking, the process of moving a packet of data


from source to destination. Routing is usually performed by a
dedicated device called a router. Routing is a key feature of
the Internet because it enables messages to pass from one computer
to another and eventually reach the target machine. Each
intermediary computer performs routing by passing along the
message to the next computer. Part of this process involves
analyzing a routing table to determine the best path.
 Routing is often confused with bridging, which performs a similar
function. The principal difference between the two is that bridging
occurs at a lower level and is therefore more of a hardware function
whereas routing occurs at a higher level where
the software component is more important. And because routing
occurs at a higher level, it can perform more complex analysis to
determine the optimal path for the packet.
 Routing is the process of selecting paths in a network where data
will be sent. Configuring Routing required to send traffic from one
subnet to another within an organization, and it is required to send
traffic from one organization to another. A computer running
Windows can act as a router and include its own routing table, so
that you can specify which direction data is sent toward its final
destination.

7
 Routers operate at the OSI Reference Model Layer 3, Network
layer. Therefore, they are sometimes referred to as Layer 3 devices.
Routers join subnets together to form larger networks and join
networks together over extended distances or WANs.
 As larger networks are formed, there may be multiple pathways to
get from one place to another. As WAN traffic travels multiple
routes, the router chooses the fastest or cheapest route between the
source and destination, while sometimes taking consideration of the
current load.
 Routing can also be performed by a layer 3 switch. Layer 2
switches (which operate at the layer 2 OSI model) are used to
connect a host to a network by performing packet switching that
allows traffic to be sent only to where it needs to be sent based on
mapping MAC addresses of local devices. Layer 3 switches can
perform layer 2 switching, but also perform routing based on IP
addresses within an organization. Different from a router, layer 3
switches cannot be used for directly connecting WAN connections.
 A server running Windows can have multiple network cards, each
network card can be connected to a different subnet. To allow
packets to be sent from one subnet to another subnet through the
server, you need to configure routing on the server.

Routing Table

o A routing table is a data table that is stored in a router or


networked computer that lists the routes of particular
network distances and the associated metrics or distances
associated with those routes. The routing tables are
manually created with static routes, or are dynamically
created with routing protocols such as Routing Information
Protocol (RIP), based on the current routing topology.
Microsoft Windows supports the Routing Information
Protocol through RRAS.
o RIP has been a popular distance-vector routing protocol for
small organizations. RIP uses broadcasts where the entire
routing table is sent to the other routers within the network.
To determine the distance or cost between networks, RIP
uses the metric of hop count, which is the count of routers.
The maximum number of hops allowed for RIP is 15. The

8
hop count of 16 is considered infinite distance and
therefore, it is considered nonreachable.
o RIP was improved with RIP version 2 (RIPv2) by using
multicasts to send the entire routing table to all adjacent
routers at the address of 224.0.0.9 instead of using
broadcast. It also incorporates classless routing, which
includes the network mask to allow classless routing
advertisement. Finally, RIPv2 uses authentication to ensure
that routes being distributed throughout the network are
coming from authorized sources.

 Routing can be enabled using RRAS. You will use RRAS to


configure RIP or define static routes. You can also define static
routes using the Route command.

3. Way to configure routing in windows server 2012:

 Open Server Manager.


 Click Tools > Routing and Remote Access.
 Right-click the server and select Configure and Enable Routing and
Remote Access.
 When the Routing and Remote Access Server Setup Wizard opens,
click Next.
 On the Configuration page, select Custom configuration and click
Next.
 On the Custom Configuration page, select LAN routing and click
Next.
 On the Completing the Routing and Remote Access Server Setup
Wizard page,click Finish.
 When the Routing and Remote Access service is ready to use, click
the Start service button.

9
4. Concept of RIP

 The Routing Information Protocol (RIP) was the first dynamic


routing protocol to be used in an internetwork, so it was created and
used primarily with UNIX hosts for the purpose of sharing routing
information.

Use of RIP

o So why do we use RIP at all? Well, we probably shouldn't.


But sadly, there are some routers that don't run anything but
RIP (or OSPF), so we're not always left with a choice.
Maybe lurking somewhere in your network is an old legacy
router, say, a UNIX router. That being the case, you just
might be stuck supporting RIP on the network so this old
horse can participate in the routing updates.

10
5. Way to configure RIP

 When configuring any routing protocol for IPv4, you need to use a
specific prompt. Specifically, we use the router configuration
command to enter the Router (config-router)# prompt. We use the
“router” command to enter the configuration portion specific to a
given routing protocol. Since we are working with RIP, we need to
type router rip in order to configure this protocol.

11
6. Understanding network address translation (NAT)

 Network Address Translation (NAT) is designed for IP address


conservation. It enables private IP networks that use unregistered IP
addresses to connect to the Internet. NAT operates on a router,
usually connecting two networks together, and translates the private
(not globally unique) addresses in the internal network into legal
addresses, before packets are forwarded to another network.
 As part of this capability, NAT can be configured to advertise only
one address for the entire network to the outside world. This
provides additional security by effectively hiding the entire internal
network behind that address. NAT offers the dual functions of
security and address conservation and is typically implemented in
remote-access environments.
 For a computer to communicate with other computers and Web
servers on the Internet, it must have an IP address. An IP
address (IP stands for Internet Protocol) is a unique 32-bit number
that identifies the location of your computer on a network.
Basically, it works like your street address -- as a way to find out
exactly where you are and deliver information to you.
 When IP addressing first came out, everyone thought that there
were plenty of addresses to cover any need. Theoretically, you

12
could have 4,294,967,296 unique addresses (232). The actual
number of available addresses is smaller (somewhere between 3.2
and 3.3 billion) because of the way that the addresses are separated
into classes, and because some addresses are set aside for
multicasting, testing or other special uses.
 With the explosion of the Internet and the increase in home
networks and business networks, the number of available IP
addresses is simply not enough. The obvious solution is to redesign
the address format to allow for more possible addresses. This is
being developed (called IPv6), but will take several years to
implement because it requires modification of the entire
infrastructure of the Internet.

Working of NAT

o Basically, NAT allows a single device, such as a router, to


act as an agent between the Internet (or public network) and
a local network (or private network), which means that only
a single unique IP address is required to represent an entire
group of computers to anything outside their network

13
7. Way to configure network address translation in windows
server 2012

 In the RRAS MMC snap-in, expand Your Server Name. If you are
using Server Manager, expand Routing and Remote Access.
 Expand IPv4, right-click NAT, and then click Properties.
 If you do not have a DHCP server on the private network, then you
can use the RRAS server to respond to DHCP address requests. To
do this, on the Address Assignment tab, select the automatically
assign IP addresses by using the DHCP allocator check box.
 To allocate addresses to clients on the private network by acting as
a DHCP server, in IP address and Mask, configure a subnet address
from which the addresses are assigned. For example, if you
enter 192.168.0.0 and a subnet mask of 255.255.255.0, then the
RRAS server responds to DHCP requests with address assignments
from 192.168.0.1 through 192.168.0.254.
 (Optional) To exclude addresses in the configured network range
from being assigned to DHCP clients on the private network,
click Exclude, click Add, and then configure the addresses.
 To add the public interface to the NAT configuration, right-
click NAT, and then click New Interface. Select the interface
connected to the public network, and then click OK.
 On the NAT tab, click Public interface connected to the
Internet and Enable NAT on this interface, and then click OK.
 If you want to add additional public addresses assigned to this
interface or configure service and port mappings to computers on
the private network.
 To add the private interface to the NAT configuration, right-
click NAT, and then click New Interface. Select the interface
connected to the private network, and then click OK.
 On the NAT tab, click Private interface connected to private
network, and then click OK.

14
8. Concept of remote access server,

 A remote access server (RAS) is a type of server that provides a


suite of services to remotely connected users over a network or the
Internet.
 It operates as a remote gateway or central server that connects
remote users with an organization's internal local area network
(LAN).
 A RAS includes specialized server software used for remote
connectivity. This software is designed to provide authentication,
connectivity and resource access services to connecting users.
 A RAS is deployed within an organization and directly connected
with the organization internal network and systems.
 Once connected with a RAS, a user can access his or her data,
desktop, application, print and/or other supported services.

15
9. Configure remote access server

To install the Remote Access role on Direct Access servers


o On the Direct Access server, in the Server Manager console,
in the Dashboard, click Add roles and features.
o Click Next three times to get to the server role selection
screen.
o On the Select Server Roles dialog, select Remote Access,
and then click Next.
o Click Next three times.
o On the Select role services dialog, select Direct Access and
VPN (RAS) and then click Add Features.
o Select Routing, select Web Application Proxy, click Add
Features, and then click Next.
o Click Next, and then click Install.
o On the Installation progress dialog, verify that the
installation was successful, and then click Close.

16
To deploy Remote Access, you need to configure the server that
will act as the Remote Access server with the following:
 Correct network adapters
 A public URL for the Remote Access server to which client
computers can connect (the Connect to address)
 An IP-HTTPS certificate with a subject that matches the Connect
To address
 IPv6 settings
 Client computer authentication

To configure the Remote Access server


o In the middle pane of the Remote Access Management
console, in the Step 2 Remote Access Server area,
click Configure.
o In the Remote Access Server Setup Wizard, on the Network
Topology page, click the deployment topology that will be
used in your organization.

17
o In Type the public name or IPv4 address used by clients to
connect to the Remote Access server,
o Enter the public name for the deployment (this name
matches the subject name of the IP-HTTPS certificate, for
example, edge1.contoso.com), and then click Next.
o Network adapters for the networks in your deployment. If
the wizard does not detect the correct network adapters,
manually select the correct adapters.
o IP-HTTPS certificate. This is based on the public name for
the deployment that you set during the previous step of the
wizard. If the wizard does not detect the correct IP-HTTPS
certificate, click Browse to manually select the correct
certificate.
o Click Next.
o On the Prefix Configuration page (this page is only visible
if IPv6 is detected in the internal network), the wizard
automatically detects the IPv6 settings that are used on the
internal network. If your deployment requires additional
prefixes, configure the IPv6 prefixes for the internal
network, an IPv6 prefix to assign to Direct Access client
computers, and an IPv6 prefix to assign to VPN client
computers.

18
 On the Authentication page:
o For multisite and two-factor authentication deployments,
you must use computer certificate authentication. Select
the Use computer certificates check box to use computer
certificate authentication and select the IPsec root
certificate.
o To enable client computers running Windows 7 to connect
via Direct Access, select the Enable Windows 7 client
computers to connect via Direct Access check box. You
must also use computer certificate authentication in this
type of deployment.
o Click Finish.

19
10. Main purpose of VPN and its security

 A VPN or Virtual Private Network is a method used to add


security and privacy to private and public networks, like
WiFi Hotspots and the Internet. VPNs are most often used
by corporations to protect sensitive data.
 However, using a personal VPN is increasingly becoming
more popular as more interactions that were previously
face-to-face transition to the Internet.
 Privacy is increased with a VPN because the user's initial IP
address is replaced with one from the VPN provider. This
method allows subscribers to attain an IP address from any
gateway city the VPN service provides.
 For instance, you may live in San Francisco, but with a
VPN, you can appear to live in Amsterdam, New York, or
any number of gateway cities.

VPN Security

o Security is the main reason why corporations have used


VPNs for years. There are increasingly simple methods to
intercept data traveling to a network.
o WiFi spoofing and Firesheep are two easy ways to hack
information. A useful analogy is that a firewall protects your

20
data while on the computer and a VPN protects your data on
the web.
o VPNs use advanced encryption protocols and secure
tunneling techniques to encapsulate all online data transfers.

o Most savvy computer users wouldn't dream of connecting to


the Internet without a firewall and up-to-date antivirus.
Evolving security threats and ever increasing reliance on the
Internet make a VPN an essential part of well-rounded
security.
o Integrity checks ensure that no data is lost and that the
connection has not been hijacked. Since all traffic is
protected, this method is preferred to proxies.

Setting up a VPN

o Setting up a VPN is a straightforward process. It's often as


simple as entering a username and sever address. The
dominant smartphones can configure VPNs using PPTP and
L2TP/IPsec protocols.

21
o All major operating systems can configure PPTP VPN
connections. OpenVPN and L2TP/IPsec protocols require a
small open source application (OpenVPN) and certificate
download respectively.

VPN Protocols

o The number of protocols and available security features


continue to grow with time. The most common protocols
are:
o PPTP - PPTP has been around since the days of Windows
95. The main selling point of PPTP is that it can be simply
setup on every major OS. In short, PPTP tunnels a point-to-
point connection over the GRE protocol. Unfortunately, the
security of the PPTP protocol has been called into question
in recent years. It is still strong, but not the most secure.
o L2TP/IPsec - L2TP over IPsec is more secure than PPTP
and offers more features. L2TP/IPsec is a way of
implementing two protocols together in order to gain the
best features of each.
o In this case, the L2TP protocol is used to create a tunnel and
IPsec provides a secure channel. This makes for an
impressively secure package.

o Open VPN - OpenVPN is an SSL-based VPN that


continues to gain popularity. The software used is open
source and freely available.

22
o SSL is a mature encryption protocol, and OpenVPN can run
on a single UDP or TCP port, making it extremely flexible.

Configuring VPN server

o You can configure your VPN server by running the Routing


and Remote Access Server Setup Wizard. You can use the
wizard to configure the following settings:
o The method by which the VPN server assigns IP addresses
to remote access clients (either using addresses that the
VPN server obtains from a DHCP server or by using
addresses from a specified range of addresses that you
configure).
o Forwarding of authorization and authentication messages to
a Remote Authentication Dial-In User Service (RADIUS)
server (configuration of the VPN server as a RADIUS
client).
o After you run the Routing and Remote Access Server Setup
Wizard, these RRAS settings are automatically configured:
o Network interfaces
o IKEv2, SSTP, PPTP, and L2TP ports (5 or 128 of each,
depending on your choices when running the wizard)

23
o Multicast support using Internet Group Messaging Protocol
(IGMP)
o IP routing
o Installation of the DHCP Relay Agent component

11. Overview of PPTP


 PPTP stands for Point-to-Point Tunneling Protocol. PPTP,
operating on TCP port 1723, is one of the oldest VPN
protocols still in use, having been around since Windows 95
and standard on all versions of Windows since.
 PPTP was developed by a Microsoft initiative to
encapsulate another protocol called PPP (Point-to-Point
Protocol).
 Out of all the VPN protocols, PPTP is one of the most
common, easiest to set up, and computationally fastest. For
that reason, PPTP is useful for applications in which speed
is paramount, like audio or video streaming, and on older,
slower devices with more limited processors.

24
 However, PPTP is also subject to serious security
vulnerabilities. Its underlying authentication protocols,
usually MS-CHAP-v1/v2, are fundamentally insecure, and
have been repeatedly cracked in security analyses since it
was first introduced.

 For this reason, PPTP is NOT recommended except in


cases where security is absolutely non-essential.

25
12. Configure VPN PPTP:

 Many vendors offer customers the ability to build they very


own PPTP VPN. You probably shouldn’t since they are no
longer consider to be secure,
 But there’s no law that says you can’t. Microsoft Windows
Server 2012 and earlier version are no different. With only a
little effort, you can use Windows Server 2012 to make your
very own PPTP VPN server.
 The VPN server should be configured with two network
interfaces; one internal and one external.
 This configuration allows for a better security posture, as
the external network interface can have a more restrictive
firewall profile than the internal interface.
 A server with two network interfaces requires special
attention to the network configuration.
 Only the external network interface is configured with a
default gateway.
 Without a default gateway on the internal network interface,
static routes will have to be configured on the server to
allow communication to any remote internal subnets.

26
 For more information about configuring a multi-homed
Windows server, click here.
 The server does not have to be joined to a domain, but it is
recommended to streamline the authentication process for
VPN clients and to provide better management and security
for the server.
 Many of the steps here are identical to those you would
perform if you were building a secure SSTP VPN on
Windows Server 2012
 If the VPN server is to be deployed in a load-balanced
cluster, IP addresses must be assigned to clients manually.
 The VPN server can authenticate users itself, or forward
authentication requests to an internal RADIUS server.
 For the scope of this article, native Windows authentication
using RRAS will be configured.
 And you chose not to use Anywhere Access to do it. The
Anywhere Access wizard makes building a secure SSTP
VPN almost effortless. The old fashioned way is a little
more difficult, but not much.
 The SSTP VPN adds additional work, compared to PPTP, in
the area of Active Directory Certificate Services (AD CS).

27
 The steps required to configure a Windows PC as a client
are posted elsewhere. Client PCs do not need to be in a
domain. Many vendors offer the ability to make PPTP VPN
servers,
 but all configure exactly the same at the client PC
end. Therefore, to be concise and avoid redundancy, I
posted the client PC set-up instructions here (toward the
bottom), along with a serious warning about the security
issues inherent in PPTP.

28
29

Vous aimerez peut-être aussi