Time duration: 1 week Password policies

tải về 0.65 Mb.
Chuyển đổi dữ liệu22.11.2022
Kích0.65 Mb.
Lab 3. Authentication

Lab 03. Authentication
You will compose a lab report that documents each step you take, including screenshots to illustrate the effects of commands you type, and describing your observations. Simply attaching code without any explanation will not receive credits
Time duration: 1 week

  1. Password policies

  1. Linux:Ubuntu

Step 1. Install package: PAM (lib-pamquality)
$ sudo apt install libpam-pwquality
Step 2. Edit the configuration:
$sudo vi /etc/pam.d/common-password
retry: No. of consecutive times a user can enter an incorrect password.
minlen: Minimum length of password
difok: No. of character that can be similar to the old password
lcredit: Min No. of lowercase letters
ucredit: Min No. of uppercase letters
dcredit: Min No. of digits
ocredit: Min No. of symbols
reject_username: Rejects the password containing the user name
enforce_for_root: Also enforce the policy for the root user
password requisite pam_pwquality.so retry=4 minlen=9 difok=4 lcredit=-2 ucredit=-2 dcredit=-1 ocredit=-1 reject_username enforce_for_root
Verify the configuration:
Create an account: $sudo useradd testuser
$sudo passwd testuser
Step 3. Edit the configuration:
$sudo vi /etc/login.defs
Verify the configuration

  1. MS Windows:

Create an account and test some functionalities:

Step 1. Set up the network topology
Step 2. Upgrade Server to domain controller (HCMUTE.VN) & create an account (testuser)
Step 3. Join PC to Domain Controller (account: testuser)
Step 4. Configure the password policy in Domain Controller
Step 5. Verify the configuration on the PC client

  1. WiFi authentication (WPA2)

Network topology

Step 1. Configure DHCP server

  • IP address:

  • DHCP server:

    • Network:

    • IP range: –

    • Default gateway:

    • DNS:

Step 2. Configure AP


  • Authentication: WPA2 – Personal

  • Password: Lab03@spkt

Step 3. Verify the configuration
Test on the Laptop: IP address, ping to other PCs.

  1. Authentication with Radius server (802.1X)

Network topology:

Lab environment: Cisco Packet Tracer
Step 1. Configure IP address & DHCP server

  • DHCP server:

  • Configure DHCP server

    • Network:

    • IP range: –

    • Default gateway:

    • DNS:

Step 2. Configure AP’s IP address

  • AP’s IP address:


  • Authentication (radius server): WPA2 - Enterprise

Step 3. Configure RADIUS server

  • Set the IP address of the Radius client (the authenticator – AP’s IP address)

  • Set the key-ID

  • Create accounts

Step 4. Configure RADIUS client ( authenticator) on the AP

Step 5. Verify the configuration - test on the supplicant

  • Check IP address information and ping to other PCs

tải về 0.65 Mb.

Chia sẻ với bạn bè của bạn:

Cơ sở dữ liệu được bảo vệ bởi bản quyền ©tieuluan.info 2022
được sử dụng cho việc quản lý

    Quê hương