Wednesday, December 17, 2014

How to check your secondary server is resolving your domain queries for secondary zone


1. query your domain
Nslookup yourdomain.com

2. To find all the DNS servers this will resolve the query
set q=any

3.set your secondary server IP as DNS server
Server A.B.C.D

4.now query your domain again

If fails ,

It means your secondary domain doesn't have copies of your zone
If it is bind server check following on /etc/named.conf
Note: your master server is 192.168.0.1
zone "yourdomain.com" IN {
type slave;
file "/var/named/yourdomain.com.zone";
// allow-update { none; };
allow-transfer { 192.168.0.1/32; };
masters { 192.168.0.1; };
};


Sunday, November 23, 2014

Harvard vs Von Neumann Architectures

There are two CPU architectures for the CPUs. Here briefly i'm trying to show the basic differences of those architectures  .
Controlling process unit is where input data get arithmetic calculation form the instruction code.
Data & instruction resides in same location at Von Neumann architecture means data and address bus have to use one path to transfer data.There is a la of communication because of that

But in Harvard it originally have two locations for data & instructions and that lag issue is not relevant to the this architecture.


Friday, November 14, 2014

DEMAND MANAGEMENT


No matter what business is running underneath, Value creation for the customer is the key factor that should consider in the business. The value which has created at customer end defines the demands of the service. Here demand management comes into the picture along with capacity management which is the processes which define major roles in business.

Demand management needs following aspects to identify the demands
Activity based demand management
Patterns of the business activity
In Business, Patterns of the business & user profiles which have identified asa Business relationship management process will pass as demand patterns in service process. It enables the requirement of capacity management to deliver the required service which has generated by the demands. Anyhow decrements & increments in capacity management will drive up or down to the pattern of the business activity.
Following are few scenarios that demand management’s focus on arising matters.
  1. High demand makes service degrades
  2. Some faults in configurations or hardware might cause to partial interruptions to the service
  3. High demand as well as Higher cost to serve.
  4. Less capacity to serve for sudden demand
Well, capacity must be assigned to the business priorities first. And according to the circumstances capacity should redistribute to ensure critical services which has not been affected. In another scenario service delivering need to divide to difference phases or Business relationship management need to assure customer’s satisfaction. However increment in capacity also effects on the cost of the services.

Network Access control (NAC)

Network access control is an embedded device or a virtual appliance which monitor network traffic and identify the data flow via network layers.After monitoring the patterns ,policies can apply on devices as well as users.It take over the control of the network environment & ease to manage whole network by a centralize console.

To get a brief idea what NAC is capable of ,following areas can discuss

1. Assets management
2. Compliance check
3  Corporate /Guest user access management
4. Threat management
5. Security management
6. Audit report

NAC is in a position where it can monitor traffic by using trap device or a span port which has configured with promiscuous mode.The best position is to place NAC connecting to the root switch.Where root switch is the always best path that traffic will flow through.

There are two methods to enforce the policies to the endpoints.
       Agent less
       with Agent

Basically a guest's endpoint information can't reach without administrative power of the host.Therefore NMAP,NBT Scans will run through the network to get the information.To get further
information agent can deploy to the endpoint via http .So agent can run as a process until guest goes out from the network.
Same scenario can run on hosts where domain admin have the privilege to send WMI data without use of the agent

When comparing with a syslog server or a log management server,remediation actions can proceed with a NAC  & which is a huge advantage .That is the main reason NAC is going to be a trend in organizations which try align with compliance  .Following are some of remediation actions a NAC can deploy.
              Assign to quarantine VLAN
              Update pushing
              Honeypot  counter attacks
              IP ACL blocking
              inline firewall rules

Technology Involvement

              Span /Mirroring Port
              Promiscuous Mode
              NMAP/WMI/NBT
              IP ACL
              Port Blocking

Compliance checking 

              HIPAA
              GLBA
              SOX
              PCI
              FISMA