How to be a server administrator? As a server administrator, the daily work should include twelve items including server system management, disk and data management, security management, hardware resource maintenance and management, and software management.
1. Server system management
In general, the management of the server system is the top priority in the entire network management work, especially in the small unit network, the unit network size is relatively small, and the network equipment is relatively simple, which is basically a fool.
The server system here includes network server and application server system. The management of the server system is the most important part of the entire network management work, because it is the core of the entire network, whether it is the network operating system itself, or various network servers and application servers.
Specifically, server system management is mainly to install, configure and manage network operating systems, file servers, DNS, WINS, DHCP and other network servers, as well as application servers such as Web, FTP, E-mail, RAS, NAT and so on. The ultimate goal of server system management is to ensure that the server's various protocols and services are working properly and that the server's performance indicators are functioning properly. In addition, the version or patch of the server system needs to be updated in a timely manner, which is not only related to the performance of the server, but also to the security of the entire network system, because new security vulnerabilities are constantly being discovered in the current operating system. Installing patches can effectively prevent and fill these security holes.
Nowadays, the focus and difficulty in the management of server systems are of course the management of various network operating systems. This includes the management of various versions of mainstream Windows, Linux and UNIX network operating systems. And the specific management work included in each system is very much, very complicated, but these are what the network administrator must master. At least, in most small and medium-sized enterprises, network administrators should master the management of mainstream Windows and Linux network operating systems. In some large enterprises, or in some special industries (such as finance, securities, and insurance), UNIX and Linux systems are the most commonly used, so UNIX and Linux system management is a must for professional network administrators. Mastered. Of course, management of other application servers is also very important and must be mastered.
2. Maintenance and management of key equipment
This is also one of the key points in the entire network management, and is also a very important work, especially in the unit network with a relatively large network scale and relatively high-end network equipment. Because the unit network system is more dependent on the normal operation of these key devices.
The key equipment of a computer network generally includes the core switches, core routers, and servers of the network, which are the "nodes" in the network. In addition to the accumulation of experience, the maintenance and management of these nodes can also monitor their working status through some special network management systems in order to discover problems in time, and perform maintenance and troubleshooting in time.
In addition, in order to improve the availability of the network, redundant configuration of some key equipment is also essential. Redundancy includes two meanings. One is from the perspective of ports. For example, redundant links are connected to key equipment (such as servers and core switches), so that when one port fails, the other redundant link can take over. The faulty link continues to maintain a normal working state; another layer of meaning is to configure dual devices or components, such as power supplies, fans, network cards, and even memory in the server, and two core switches and routers can also be configured. In normal operation, these redundant devices or components play a role in load balancing, and in the event of a failure in a certain part, they also serve as a backup.
In the maintenance and management of key equipment, the monitoring and management of the overall performance of servers and networks is a technical focus and difficulty. Various monitoring and management tools are used, such as traffic monitoring tools MRTG, network performance and communication monitoring Sniffer tools, bandwidth performance monitoring Qcheck and IxChariot tools. Server performance monitoring and management can also be performed using the operating system's own performance and monitoring management tools.
Of course, the configuration and management of network equipment is the focus and difficulty of the maintenance and management of the entire key equipment. This is the consensus of almost all network management and even network engineering technicians. At present, in terms of key equipment, it is mainly based on Cisco, Huawei 3COM and other brands. It is necessary for network administrators to master the configuration and management methods of these two major brand equipment.
3. User management
User management is an important and difficult point in network management, involving many aspects, such as user accounts, passwords, file and network access rights, user rights, user configuration files, and user security policies. It is necessary to ensure that the normal work of each user is not affected, and at the same time, avoid assigning excessively high permissions and bring unnecessary security risks to network security and management.
In the network management, the network administrator requires that under the premise of ensuring the safe and reliable operation of the network, according to the work authority and personnel changes of the unit personnel, set up accounts, passwords and assign different network access permissions for each user; set up a Web server , VPN and other remote access server users' access rights, etc .; limit the number of accounts that the Web server can log in, promptly log off expired users and hung up dial-up users, and close unused network services.
However, it should be noted that in Linux and UNIX systems, user management is not centralized, because the network they form is based on P2P (peer-to-peer) mode, unless other tools are used to implement simulated domain management; and Windows systems In the domain mode, a domain network based on the C / S (client / server) mode can be formed, and centralized user management can be performed. This is an important advantage of the Windows domain network. Moreover, in UNIX and Linux systems, user management (other management is basically the same) is basically based on the terminal mode of the command symbol, which is difficult for beginners to grasp, while the management in the Windows system is basically in the graphical interface mode , Easier to master.
4. File system management
The file system management in the network is one of the most important parts in the entire network management. It not only involves the normal work of each user and network application, but also relates to the security performance of the entire network system. For network administrators, the work done in the file system management mainly has the following aspects:
First, we must select the appropriate network operating system according to the needs of enterprise network applications, deploy the corresponding file server system, DFS (Distributed File System, distributed file system) or NFS (Network File System, network file system). Through the configuration of these file server systems, many advanced file system management and applications can be achieved. For example, through the installation and configuration of the file server system, file sharing and session connection on the file server or other hosts in the network can be monitored at all times; through DFS The deployment can be used to deploy a unified shared resource access point in the entire network to facilitate the use and management of shared resources; through the NFS deployment, you can achieve file access mechanisms with other system types of networks (such as Linux and UNIX systems). These are all server systems related to file system management and must be mastered.
Secondly, it is necessary to set the necessary folder sharing permissions for each user, as well as the security access permissions for files and folders. Of course, the permissions that can be configured for files and folders of different file formats are different. In terms of file formats, the Windows NT platform has FAT (File Allocation Table) and NTFS (New Technology File System) file systems. NTFS is a high-performance, high-reliability and high-security network file system provided by the Windows NT platform. It is adopted as much as possible in the new operating system. In the Linux system, there are currently ext2 and ext3 file types, it is recommended to use the latest version of ext3 format.
Finally, the security of the server's file system needs to be checked regularly. It is best to set up an audit strategy for file permission changes in Group Policy in order to discover and correct illegal changes in file system permissions in a timely manner.
5. Disk and data management
Disk and data management are also very important aspects of the entire network management work, especially in large, foreign-funded enterprises. The disk management mainly includes the basic operation and management of the disk system, such as disk formatting, disk partitioning, drive letter allocation and adjustment, file system conversion, basic / dynamic disk type conversion, RAID (Redundant Array of Inexpensive Disks, The configuration of redundant array of independent disks), and the configuration and management of user disk quota.
The importance of data management in the entire network management is now more prominent, because a large number of enterprise data is stored in the modern enterprise network, including daily office documents, spreadsheets, product information, product databases, financial databases, and marketing databases. These data may be related to the survival and development of the enterprise to a certain extent.
In order to ensure the safety of enterprise data, in addition to having to be equipped with a powerful and safe antivirus software system, RAID is very necessary. On the one hand, it can play the role of accelerating the disk read and write speed and improve the efficiency of disk read and write, more important It can play a role in protecting data security, because some RAID types have mirroring, or parity function, through which you can restore the data on the failed disk. In addition, in the enterprise network, it is also necessary to prevent the loss of files due to power failure. In this case, UPS (Uninterruptible Power Supply) is used. It may also be necessary to equip critical servers with redundant power supplies Fan assembly.
The last line of defense to ensure data security is to develop an effective disaster recovery plan. In the plan for disaster prevention, network administrators should not limit their thinking to ordinary problems, but should consider it more widely. Imagine that a natural disaster, such as an earthquake or fire, completely destroyed the entire network, how network administrators should recover, how much time it takes, and what steps to take to recover. The disaster recovery plan must be detailed, and the feasibility and effectiveness of the plan should be verified through simulation experiments. In the disaster recovery plan, one of the important aspects is the data backup plan, which is the key of the key. The backup plan should include the following information: what to back up, where to back up, when to back up, how often to back up, who is responsible for backing up, where should the backup carrier be placed, how often to check the backup, and what measures should be taken in case of data loss . Reliable data backup is one of the most important tasks for network administrators, and it should be carried out carefully after making a backup plan. As a network administrator, you must make a disaster recovery plan in advance. During the process, you must insist on data backup every day. After that, you must restore the system in time to avoid data loss as much as possible. If it is a large enterprise, or an enterprise with branches, for some key data (such as enterprise database, e-mail and finance, etc.), in order to ensure the validity and security of files and folders in the network system, remote remote Data backup and remote data mirroring storage measures, implementing off-site disaster recovery, so that the ability of enterprises to withstand disasters is far stronger than only performing local data backup.
6. Management of IP addresses
IP address management is the key to the efficient operation of computer networks. If the IP address is not properly managed, the network is prone to IP address conflicts, resulting in legitimate IP address users not being able to normally enjoy network resources and affecting the normal business development of the network.
There are currently two major versions of IP addresses, IPv4 and IPv6. IPv4 is still widely used, but the IPv6 protocol is also beginning to spread. New operating systems such as Window Vista, Windows Server 2008, RedHat Enterprise Linux AS 4.0, and RedHat Enterprise Linux 5.0 have begun to support the IPv6 protocol.
In the small computer network, the 192.168.0.0/16 private network address segment in IPv4 Class C addresses is directly adopted. Each IP subnet can have 256 computers or network devices. And in large and medium-sized enterprises, usually use A (10.0.0.0/8 private network address segment) or B (172.18.0.0/12 private network address segment) IP address. These addresses do not need to be applied and can be used directly. Of course, in the unit network, the allocation of IP addresses is usually not strictly in accordance with the categories specified in the IPv4 protocol, but is usually re-divided using the address prefix.
In the IPv4 protocol, there are generally two ways to assign IP addresses.
Static IP address allocation method: For servers (including domain controllers and all other member servers), computers and network devices that frequently access the Internet, a fixed IP address is generally given.
DHCP dynamic IP address allocation method: For those computers that do not surf the Internet frequently or have strong mobility, dynamic host configuration protocol (DHCP) can be used to dynamically configure IP addresses to save IP address resources. The key here is to set the scope of the address pool.
Reflective Dog Leash (also called a lead, lead line or tether) is a rope or similar material used to control an animal by attaching it to a collar, harness, or halter. In British English, a leash is generally for a larger (possibly dangerous or aggressive) animal, with lead being more commonly used when walking a dog.
Reflective Dog Leash,Elastic Dog Leash,Training Dog Leash,Nylon Training Dog Leash
Yangzhou Pet's Products CO.,LTD , https://www.yzpqpets.com