Aller au contenu

Certification Linux LPI/Administrateur système avancé/Examen 202/Objectifs détaillés

Leçons de niveau 15
Une page de Wikiversité, la communauté pédagogique libre.
Début de la boite de navigation du chapitre
Objectifs détaillés
Icône de la faculté
Chapitre no 1
Leçon : Examen 202
Retour auSommaire
Chap. suiv. :Gestion de réseaux
fin de la boite de navigation du chapitre
En raison de limitations techniques, la typographie souhaitable du titre, « Examen 202 : Objectifs détaillés
Certification Linux LPI/Administrateur système avancé/Examen 202/Objectifs détaillés
 », n'a pu être restituée correctement ci-dessus.

Voici les objectifs détaillés tels que définis par LPI. Ce cours n'a pas une approbation officielle de LPI.

Voici le minimum requis pour le niveau 2 de la certification LPI. Cela recouvre les tâches d'administration avancée du systéme qui sont communes à toutes les distributions Linux.

Chaque objectif est pondéré par un poids. Les poids s'étendent de 1 à 10, et indiquent l'importance relative de chaque objectif. Les objectifs avec les poids les plus élevés seront représentés dans l'examen par plus de questions.

Topic 205: Configuration des réseaux

[modifier | modifier le wikicode]

2.205.1 Configuration de base du réseau

[modifier | modifier le wikicode]
Weight
5

Description: Le candidat doit être capable de configurer un périphérique réseau, de se connecter à un reseau local ainsi qu’à un reseau distant. Cela englobe la capacité à communiquer entre plusieurs sous-réseaux à l'interieur d’un même réseau, de configurer un accès dialup en utilisant mgetty, de configurer un accès dialup en utilisant un modem ou ISDN, de configurer les protocoles d'authentification tels que PAP et CHAP, et de configurer les connexions TCP/IP logging.

fichier, termes, and commandes inclus :

/sbin/route 
/sbin/ifconfig 
/sbin/arp 
/usr/sbin/arpwatch
/etc/

2.205.2 Configuration avancée du réseau et dépannage

[modifier | modifier le wikicode]
Poids
3

Description : Le candidat doit être capable de configurer un périphérique réseau et implémenter différents méthodes d'authentification réseau. Cet objectif inclut la configuration d’un périphérique avec plusieurs interfaces, d’un réseau privé virtuel (VPN) et de résoudre les problèmes de réseaux et de communication.

fichier, termes, and commandes inclus :

/sbin/route 
/sbin/route 
/sbin/ifconfig 
/bin/netstat 
/bin/ping 
/sbin/arp 
/usr/sbin/tcpdump 
/usr/sbin/lsof 
/usr/bin/nc

Topic 206: Messagerie & Forums

[modifier | modifier le wikicode]

2.206.1 Configuration des listes de diffusion

[modifier | modifier le wikicode]
Weight
1

Description: Install and maintain mailing lists using majordomo. Monitor majordomo problems by viewing majordomo logs.

Key files, terms, and utilities include:

Majordomo2 

2.206.2 Utiliser Sendmail

[modifier | modifier le wikicode]
Weight
4

Description: Candidates should be able to manage a Sendmail configuration including email aliases, mail quotas, and virtual mail domains. This objective includes configuring internal mail relays and monitoring SMTP servers.

Key files, terms, and utilities include:

/etc/aliases 
sendmail.cw 
virtusertable 
genericstable 

2.206.3 Gérer le trafic messagerie

[modifier | modifier le wikicode]
Weight
3

Description: Candidates shold be able to implement client mail management software to filter, sort, and monitor incoming user mail. This objective includes using software such as procmail on both server and client side.

Key files, terms, and utilities include:

procmail 

2.206.4 Gérer des forums

[modifier | modifier le wikicode]
Weight
1

Description: Candidates should be able to install and configure news servers using inn. This objective includes customizing and monitoring served newsgroups.

Key files, terms, and utilities include:

innd

Topic 207: DNS

[modifier | modifier le wikicode]

2.207.1 Configuration de base de BIND 8

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure BIND to function as a caching-only DNS server. This objective includes the ability to convert a BIND 4.9 named.boot file to the BIND 8.x named.conf format, and reload the DNS by using kill or ndc. This objective also includes configuring logging and options such as directoryh location for zone files.

Key files, terms, and utilities include:

/etc/named.conf 
/usr/sbin/ndc 
/usr/sbin/named-bootconf 
kill 

2.207.2 Créer et gérer des zones DNS

[modifier | modifier le wikicode]
Weight
3

Description: The candidate should be able to create a zone file for a forward or reverse zone or root level server. This objective includes setting appropriate values for the SOA resource record, NS records, and MX records. Also included is adding hosts with A resource records and CNAME records as appropriate, adding hosts to reverse zones with PTR records, and adding the zone to the /etc/named.conf file using the zone statement with appropriate type, file and masters values. A candidate should also be able to delegate a zone to another DNS server.

Key files, terms, and utilities include:

contents of /var/named 
zone file syntax 
resource record formats 
dig 
nslookup 
host 

2.207.3 Sécuriser un serveur DNS

[modifier | modifier le wikicode]
Weight
3

Description: The candidate should be able to configure BIND to run as a non-root user, and configure BIND to run in a chroot jail. This objective includes configuring DNSSEC statements such as key and trusted-keys to prevent domain spoofing. Also included is the ability to configure a split DNS configuration using the forwarders statement, and specifying a non-standard version number string in response to queries.

Key files, terms, and utilities include:

SysV init files or rc.local 
/etc/named.conf 
/etc/passwd 
dnskeygen 

Topic 208: Services web

[modifier | modifier le wikicode]

2.208.1 Mettre en place un serveur web

[modifier | modifier le wikicode]
Weight
2

Description: Candidates should be able to install and configure an Apache web server. This objective includes monitoring Apache load and performance, restricting client user access, configuring mod_perl and PHP support, and setting up client user authentication. Also included is configuring Apache server options such as maximum requests, minimum and maximim servers, and clients.

Key files, terms, and utilities include:

access.log 
.htaccess 
httpd.conf 
mod_auth 
htpasswd 
htgroup 

2.208.2 Gérer un serveur web

[modifier | modifier le wikicode]
Weight
2

Description: Candidates should be able to configure Apache to use virtual hosts for websites without dedicated IP addresses. This objective also includes creating an SSL certification for Apache and defining SSL definitions in configuration files using OpenSSL. Also included is customizing file access by implementing redirect statements in Apache's configuration files.

Key files, terms, and utilities include:

httpd.conf 

2.208.3 Mettre en place un serveur proxy

[modifier | modifier le wikicode]
Weight
2

Description: Candidates should be able to install and configure a proxy server using Squid. This objective includes impelementing access policies, setting up authentication, and utilizing memory usage.

Key files, terms, and utilities include:

squid.conf 
acl 
http_access

Topic 210: Gestion des clients réseau

[modifier | modifier le wikicode]

2.210.1 Configuration du DHCP

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure a DHCP server and set default options, create a subnet, and create a dynamically-allocated range. This objective includes adding a static host, setting options for a single host, and adding bootp hosts. Also included is to configure a DHCP relay agent, and reload the DHCP server after making changes.

Key files, terms, and utilities include:

dhcpd.conf 
dhcpd.leases

2.210.2 Configuration de NIS

[modifier | modifier le wikicode]
Weight
1

Description: The candidate should be able to configure an NIS server and create NIS maps for major configuration files. This objective includes configuring a system as a NIS client, setting up an NIS slave server, and configuring ability to search local files, DNS, NIS, etc. in nsswitch.conf.

Key files, terms, and utilities include:

nisupdate, ypbind, ypcat, ypmatch, ypserv, ypswitch, yppasswd, yppoll, yppush, ypwhich, rpcinfo
nis.conf, nsswitch.conf, ypserv.conf 
Contents of /etc/nis/: netgroup, nicknames, securenets 
Makefile

2.210.3 Configuration de LDAP

[modifier | modifier le wikicode]
Weight
1

Description: The candidate should be able to configure an LDAP server. This objective includes configuring a directory hierarchy, adding group, hosts, services and other data to the hierarchy. Also included is importing items from LDIF files and add items with a management tool, as well as adding users to the directory and change their passwords.

Key files, terms, and utilities include:

slapd 
slapd.conf

2.210.4 Authentification avec PAM

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure PAM to support authentication via traditional /etc/passwd, shadow passwords, NIS, or LDAP.

Key files, terms, and utilities include:

/etc/pam.d 
pam.conf

Topic 212 Securité du système

[modifier | modifier le wikicode]

2.212.2 Configurer un routeur

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure ipchains and iptables to perform IP masquerading, and state the significance of Network Address Translation and Private Network Addresses in protecting a network. This objective includes configuring port redirection, listing filtering rules, and writing rules that accept or block datagrams based upon source or destination protocol, port and address. Also included is saving and reloading filtering configurations, using settings in /proc/sys/net/ipv4 to respond to DOS attacks, using /proc/sys/net/ipv4/ip_forward to turn IP forwarding on and off, and usingtools such as PortSentry to block port scans and vulnerability probes.

Key files, terms, and utilities include:

/proc/sys/net/ipv4 
/etc/services 
ipchains 
iptables
routed

2.212.3 Sécuriser un serveur FTP

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure an anonymous download FTP server. This objective includes configuring an FTP server to allow anonymous uploads, listing additional precautions to be taken if anonymous uploads are permitted, configuring guest users and groups with chroot jail, and configuring ftpaccess to deny access to named users or groups.

Key files, terms, and utilities include:

ftpaccess, ftpusers, ftpgroups 
/etc/passwd 
chroot

2.212.4 Secure Shell (OpenSSH)

[modifier | modifier le wikicode]
Weight
2

Description: The candidate should be able to configure sshd to allow or deny root logins, enable or disable X forwarding. This objective includes generating server keys, generating a user's public/private key pair, adding a public key to a user's authorized_keys file, and configuring ssh-agent for all users. Candidates should also be able to configure port forwarding to tunnel an application protocol over ssh, configure ssh to support the ssh protocol versions 1 and 2, disable non-root logins during system maintenance, configure trusted clients for ssh logins without a password, and make multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes.

Key files, terms, and utilities include:

ssh, sshd
/etc/ssh/sshd_config 
~/.ssh/identity.pub and identity, ~/.ssh/authorized_keys 
.shosts, .rhosts

2.212.5 TCP_wrappers

[modifier | modifier le wikicode]
Weight
1

Description: The candidate should be able to configure tcpwrappers to allow connections to specified servers from only certain hosts or subnets.

Key files, terms, and utilities include:

inetd.conf, tcpd 
hosts.allow, hosts.deny 
xinetd

2.212.6 Tâches de sécurité

[modifier | modifier le wikicode]
Weight
3

Description: The candidate should be able to install and configure kerberos and perform basic security auditing of source code. This objective includes arranging to receive security alerts from Bugtraq, CERT, CIAC or other sources, being able to test for open mail relays and anonymous FTP servers, installing and configuring an intrusion detection system such as snort or Tripwire. Candidates should also be able to update the IDS configuration as new vulnerabilities are discovered and apply security patches and bugfixes.

Key files, terms, and utilities include:

Tripwire 
telnet 
nmap

Topic 214 Dépannage réseau

[modifier | modifier le wikicode]

2.214.7 Problèmes de dépannage réseau

[modifier | modifier le wikicode]
Weight
1

Description: The candidate should be able to identify and correct common network setup issues to include knowledge of locations for basic configuration files and commands.

Key files, terms, and utilities include:

/sbin/ifconfig 
/sbin/route 
/bin/netstat
/etc/network || /etc/sysconfig/network-scripts/ 
system log files such as /var/log/syslog && /var/log/messages 
/bin/ping
/etc/resolv.conf 
/etc/hosts 
/etc/hosts.allow && /etc/hosts.deny 
/etc/hostname || /etc/HOSTNAME 
/sbin/hostname 
/usr/sbin/traceroute 
/usr/bin/nslookup 
/usr/bin/dig 
/bin/dmesg 
host