Barge Duty IT Flashcards
Hypervisors Type-1 and Type-2
Hypervisors are critical components of virtualization technology.
Type-1 hypervisors, often called bare-metal hypervisors, run directly on the physical hardware without needing an underlying operating system.
Type-2 hypervisors, also known as hosted hypervisors, operate within a conventional operating system, using it as an intermediary layer between the hardware and virtual machines.
While Type-2 hypervisors are easier to set up for testing and development on personal computers, they introduce additional overhead due to the host OS, resulting in lower performance and resource efficiency.
PuTTy
PuTTY is widely used terminal emulator and network file transfer application that manages and troubleshoots remote systems and devices. It is known for its simplicity and reliability, making it a popular choice for establishing secure and non-secure connections to a wide range of devices and servers.
3 basic troubleshooting steps
- Check the antenna is clear
- Taclane Security Association
- Verify Update Service Advisory
Taclane stands for
“Tactical Local Area Network Encryption.”
TACLANE is a family of network encryption devices used by the United States government and its military agencies to…
secure and protect classified and sensitive information in communication networks. The term “TACLANE” is an acronym that stands for “Tactical Local Area Network Encryption.”
TACLANE devices are manufactured by General Dynamics Mission Systems, a prominent defense and aerospace company.
Unisphere VM management
Compared to
NAS
Unisphere VM management is a specialized tool for managing storage resources within virtualized environments, particularly those using Dell EMC storage solutions. In contrast, NAS (Network Attached Storage) is a more general-purpose technology focused on providing file-level storage and file sharing capabilities over a network, catering to a broader range of use cases beyond virtualization. The choice between the two depends on the specific storage and data sharing requirements of an organization or environment.
What is EMC within the storage solution context
In 2016, Dell Inc. acquired EMC Corporation, forming Dell Technologies. As a result, the EMC brand name is now often associated with Dell EMC, which is the division of Dell Technologies that focuses on data storage, data protection, and other enterprise IT solutions.
ESXi NIPR address
205.68.246.244
ESXi SIPR address
205.2.183.244
NAS NIPR address
205.68.246.241
NAS SIPR address
205.2.183.241
ESXi NAS, NIPR and SIPR address
ESXi
- NIPR 205.68.246.244
- SIPR 205.2.183.244
NAS
- NIPR 205.68.246.241
- SIPR 205.2.183.241
TACLANES Key Installer
Address
172.16.0.1
Miscellaneous Printer Port
184
Printer server & Share drive
FS01
Log into NIPR ESXi using domain name
https://vcsa.ddg82.navy.mil
Loss of Power
3 most general steps
- Turn Off Network
- Report to CDO
- Stand by for stable power (CDO)
3 ways to find a printer (already in network)
-
Printers & Scanners
Or
If printer was not listed - — \fs01 browse
— Find with directory feature
Or - — “Add manually”
— Select a shared printer by name
9 parts+ of F/L2
- Precedence
- LMF
- Classification 4 characters
- CIC
(space) - OSRI
- SSN
(space) - JDTOF
(-) - 3’s redundancy
(- -) - DSRI
.
ASCII
- what does it stand for?
- what is it?
- how many?
- American Standard Code for Information Interchange
- Character encoding format for text
- 128 characters/ control codes
AMCROSS [4]
- Somebody passed away
- Triad signatures required
- Advanced Routing Log
- Not public traffic
3 References for sending messages
NTP 3(J)
NTP 4(E)
JANAP 128
OSRI
DSRI
SSN
Originating Station Routing Indicator
Destination Station Routing Indicator
Station Sequence Number
Publication for in depth info on F/L 2
JANAP 128
JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.
CIC
FRI
Content Indicator Code
Fleet Routing Indicator
MCS
AUTODIN
Message Conversion System
Automatic Digital Network
OSRI is identified by
An assigned AUTODIN or
FRI
When SSN left blank the number will be provided by
GateGuard
CANES backup
BU01
Three systems we use to get ip services while on the ship
NMT: Navy Multi band Terminal
Provides SHF EHF
ATIP: stands for Advanced Technology for Information Processing. It is a method of data transmission that uses advanced algorithms and techniques to improve the speed and efficiency of communication EHF.
CBSP: Comercial Broadband Satellite Program. Provides up services using SHF.
NMT
The Navy Multiband Terminal (NMT) is a secure satellite communication system used by the United States Navy to establish reliable and secure communication links, particularly in naval vessels at sea. NMT is designed to support voice, data, and video communication for naval operations, including command and control, intelligence, surveillance, reconnaissance, and more.
SHD
Special Handling Designator
PLA to RI
Plain Language Address to Routing Indicator
Converts regular address to computer readable.
A DSRI ending in SUU indicates that [2]
The PLA to RI lookup will be performed by NAVCOMPARS or MCS before delivered
NAVCOMPARS
Naval Communications Processing and Routing System (NAVCOMPARS): A Model for Broadcast Performance Analysis.
MCS
MESSAGE CONVERSION SYSTEM (MCS)
The primary purpose of the Regional MCS is to provide PLA-to-Routing Indicator (RI) look up and assignment. After receiving a message from the host NOVA System, the Regional MCS will validate the message, assign the appropriate RI(s) and return the message to NOVA for delivery.
The Defense Message System-Message Conversion System
the Defense
(DMS-MCS) is operational at the DISA DTH located at Fort Detrick
MD. The DMS-MCS is comprised of the Message Conversion System Message Processor (MCSMP), the MCS Directory Component (MDC), the Central Directory Component (CDC), and the Update Authority Component (UAC).
Inventory procedure
Look at _____ & _____ verify _____
Look at serial numbers and quantity; verify key
White Pinnacle
Precedence and what to do
Flash (z)
Take to triad
General CIC
ZYUW
-Personal For- (commander)
Message [2]
- Forward to CO, be succinct
- “Personal For” folder (not for Lassen Traffic)
F/L 4 [2]
- Security Warning
- ZNR UUUUU or ZNY CCCCC
F/L 10
Group count
F/L 5
Priority _ Day Time Month Year
R 120830Z JUN23
After F/L 11
After break (BT)
The first line of F/L 12 is the classification “spelled out” and any special instructions
NAS
Username and password [4 components]
La raíz no
Ve Navy
Steps to receive to send messages
- Hard copy signed by CO
- Verify message CWO server
- Log into “Outgoing Message Release Logs”
- Sign when charge taken
- Sign when sent
- Print comeback receipt
- Signed in log for come back
Last 7 servers to shut down
- FS01
- SQ01
- EX02
- EX01
- DC02
- YUM
- DC01
FS01
Share Drive
Print Server
SQ01
Data Base
POR (Program of Record)
NSIPS SKED aflog (FSM ROM) NIAPS
Turn off Tac Lane
Two power off buttons
Left tac lane power
Right tac lane power
Releasing Authority
And lifecycle of keys
CONAUTH
CONAUTH
And four things they are responsible for
Controlling Authority (CONAUTH) is defined as the command designated as responsible for directing the establishment of a cryptonet/circuit and managing the operational use and control of keying material assigned to that cryptonet/circuit.
The CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issuance, destruction and transfer of COMSEC material under their cognizance.
STATUS OF COMSEC MATERIAL:
The authorized period of use for COMSEC material is
defined by its status (i.e.. one of three possible conditions)
Status for COMSEC material is assigned at the direction of the
CONAUTH or originator of the material.
In the context of the
CMCS, each item of traditional COMSEC material is controlled or managed by a designated official known as a
A CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issue/destruction of COMSEC material under their control.
By definition, a CONAUTH is the command which has designated responsibility for directing the establishment and operation of a cryptonet/circuit and managing the operational use and control of keying material assigned to a cryptonet/circuit. CONAUTH responsibilities are detailed in Annex C. For modern (asymmetric key), there is no Controlling Authority. The responsibilities are performed by a Command Authority.
Local key
CMS-25
To shut down host [3]
- Login ESXi GUI
- Click host
- Click shutdown button
Bring network back on
- Power stability declared by CDO
- Power on UPS wait approx 30 minutes to have 60%+
- NASs will come on by themselves if not disconnected
- Wait until you can ping NAS
- ESXis have a small red power button
- Bring the servers back on in reverse order NIPR and SIPR side
- Check YUM is sync
- Check services to be running
Sync YUM and DC01 [9]
- Remote YUM
- Command Prompt
- ra.scom.scx.mnt
- (shift 1st square no shift 2nd square) x2
- Elevate to root
- Check synced system clocks
- Resync
- Query
- Check DC01 is synchronized
How to check services are running [4]
- Right click windows icon
- Computer management
- Services tab
- All Startup Automatic have to be running
Elevate to root (linux)
sudo su -
sudo (space) su (space) -
At YUM root level, check to what are the system clocks synced to.
chronyc -a sources -v
chronyc (space) -a (space) sources (space) -v
[Command line] -v meaning
Verbose Output: When you run a command with the “-v” option, it might display extra information, messages, or logs that help you understand what the command is doing. This can be especially useful for debugging or troubleshooting.
[Command line] -a meaning
In the context of command-line parameters and options, the “-a” typically stands for “all” or “append” depending on the specific command or program you are using.
NTP and Chrony
Chrony is an open-source computer program and network time protocol (NTP) client and server used to synchronize the system clocks of computers in a network.
From W32Time, command to resync NTP
w32tm /resync /force
Explain w32tm /resync /force
- w32tm: This is the Windows Time service command-line tool used for configuring and monitoring time-related settings.
- /resync: This option instructs the Windows Time service to initiate a time synchronization attempt with its configured time source. It contacts the time source and adjusts the system clock if necessary to bring it into alignment with the time source.
- /force: This option is used to force an immediate synchronization, bypassing the normal synchronization schedule. It ensures that the synchronization process occurs as soon as the command is executed.
PDC
Primary domain controller
The concept of the Primary Domain Controller (PDC) was significant in older versions of Windows, especially Windows NT, where it played a central role in user authentication and directory services. However, with the introduction of Active Directory in Windows 2000 and later versions, the role of the PDC evolved into the PDC Emulator FSMO role, and the multi-master replication model eliminated the need for a single, dedicated PDC.
Query and display the source from which the Windows Time service (W32Time) is currently synchronizing the system clock.
w32tm /query /source
Explain w32tm /query /source
When you run this command, you will receive output indicating the source of time synchronization, which can include:
• An NTP (Network Time Protocol) server address or domain name, indicating that the system is synchronizing its time with an NTP server. • The name of a hardware time source or **reference clock** if the system is using a hardware-based timekeeping source. • “Local CMOS Clock,” which means the system is using its own hardware clock (CMOS clock) as the time source.
Check where DC01 is getting its time from [4]
- ESXi GUI
- Remote into DC01
- Windows Command Prompt
- Query and display time source
NTP
Network Timing Protocol
OR
Naval Telecommunications Procedures
Query and display time clients currently sync to W32Time
w32tm /query /clients
w32tm /query /clients
vs
w32tm /query /source
-
w32tm /query /clients:
- Purpose: This command is used to query and display information about the time clients that are currently synchronized with the local system acting as a time server.
- Use Case: This command is helpful when you want to identify devices or systems in your network that depend on the local system for time synchronization. It helps you monitor which clients are synchronized with the local time server.
-
w32tm /query /source:
- Purpose: This command is used to query and display information about the current time synchronization source from which the local system is obtaining its time.
- Use Case: This command is useful for verifying where the local system is obtaining its time updates from. It helps you ensure that the system is correctly configured to synchronize with a reliable time source, such as an NTP server.
In summary, “w32tm /query /clients” provides information about the clients synchronized with the local system, while “w32tm /query /source” informs you about the source from which the local system is synchronizing its time. They serve different monitoring and diagnostic purposes in managing time synchronization in a Windows environment.
LMF
Language and Media Format
NTP 3 (J)
The purpose of Naval Telecommunications Procedures (NTP) 3, TELECOMMUNICATIONS USER MANUAL, is to provide procedures governing preparation and electronic delivery of organizational naval messages using the Naval Computer and Telecommunications System (NCTS).
NTP 3 is applicable to U.S. Navy, Marine Corps, and Coast Guard activities.
NTP 4 (E)
Who developed it ?
This document was developed through a collaborative effort with Fleet, Numbered Fleet, Type Commanders, and other components of the Naval Netwar Forcenet Enterprise (NNFE)
JANAP 128 applies to what system?
This publication prescribes the operating procedures and practices applicable to the Defense Communications System (DCS) Automatic Digital Network (AUTODIN), and to other US record communications networks as specifically authorized by respective controlling authorities.
JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.
Difference between w32tm and chronyc
You would use “chronyc -a sources -v” on Linux systems (YUM) with Chrony for time source information, and “w32tm /query /source” on Windows systems to check the time synchronization source.
(LINUX) If you want to obtain information about a specific NTP source, you would use the sourcestats command followed by the name or IP address of the specific source, like this:
chronyc sourcestats
(less than)source_name_or_ip (greater than)
What is C4l in the Navy?
Navy Command, Control, Communications, Computers and Intelligence (C4I) consists of policies, procedures, and systems that allow the Navy to conduct command and control using computer systems that are interconnected via different communications links for the purpose of sharing operational intelligence.
Shut Down Steps [7]
- Log into ESXi GUI (244)
- Shut down all but last 7, 5 by 5
- Shut down last 7
- Power Off Host (click on shutdown button)
- Power Off NAS system > service tasks > shutdown & storage system Execute > Switches Routers
- Power off UPSs
- Power off tac lanes
Same for SIPR and NIPR
Last seven: FS01 SQ01 EX02 EX01 DC02 YUM DC01
Set up static IP for printer [5]
- Go to production plan
(Top of column: Default gateway) - Scroll to DNS Servers DC01 DC02
- Note Hostname & IPv4 (default gateway)
(In printer) - Login > admin > 1111 > Device down > connectivity > Ethernet
- IPv4 (Enter from production plan)
Add printer to server [3]
- server
- program
- navigate
- FS01
- Print management Windows key + R printmanagement.msc
- Action > Add printer > TCP/IP > Auto detect > IP address > Printer/Share Name Name > from Production Plan
NGCN (CIC)
CASREP
EX01 EX02
Exchange Service (email)
DC01 DC02
Group Policy Active Directory
VLAN Clients Port
182
Troubleshoot RSUPMAST [3]
NTCSS
Clear login
Reset server
Watch turnover items [9]
Turnover Sheet Checklist
- Clean Space/ Trash
- Inventory
- Visitor Log
- Print (12 o clock Muster)
- 701 Active Security Checklist 702 safe open close
- (Pass down) Ongoing Issues/ trouble tickets
- Upcoming events
- Message log/ Message Traffic Public Folder
- MSL (Master Station Log) EKMS: keys to load/ destroy
How often taclane supersedes
Every 30 days
Who has to be notified about new month
KOAM
Who gives the keys to the operators
KOAM
KOAM
KMI (Key Management Infrastructure) Operating Account Manager
When to load tac lane keys
2 days before end of month
They roll automatically
If not IP services lost
Flooding
Prioritize getting out
What is VCSA in VMware
VMware vCenter Server Appliance
Preconfigured Virtual Appliance provided by VMware that runs vCenter Server central management software for VMware vSphere environments Linux based
MSL
- Signing
- Beginning of
- Turnover time
- End of
Master Station Log
- CHOPS: initials
- 000Z BORD
- 1100Z Turnover
- 2359Z EORD
XORD
Of Ray Day
4 letters that include all the VMs
VCSA
First thing in case of fire
Set Alarm
Provisioning
install “factory” image
VM for home page
WEB
FQDN
Fully Qualified Domain Name
YUM
Time Server from NOC (Network Operation Center)
DC01 pulls time from YUM
and disperses it to everyone
NTCSS
Navy Tactical Command Support System
Assists in managing logistics, maintenance, supply chain operations, personnel financial aspects
If NTCSS (radm) is not working [3]
Check user log, clear, reboot
Crypto device for IP Services
KG-175D
SITREP
Situational report: behavioral, DUI, suicidal.
Doesn’t get “push”‘d
Name of folder for messages that will be sent & how to upload
Public folder > Message Release
Save
..CC DIV > Message Release> Year Month
Import
OIX > batch import > browse > upload
Troubleshoot email
Services
Tool
Application
CLI
Check if it is internal or external
1 - Services: microsoft exchange “Running”
2 - Exchange toolbox
– 0s across the board
3 - Exchange admin center
– Servers > database > status: “mounted”
4 - Exchange Management Shell
– Test-EdgeSynchronization
Sync Status: Normal
Restart Server?
CWO email inbox to what public folder at turn over?
LASSEN’s MESSAGE TRAFFIC
SF 702
The Standard Form (SF) 702 Security Container Check Sheet provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information.
What is EKMS?
Electronic Key Management System
An interoperable collection of systems that automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of COMSEC material. See key management infrastructure (KMI).
KMI
Key Management Infrastructure
The framework and services that provide the generation, production, storage, protection, distribution, control, tracking, and destruction for all cryptographic keying material, symmetric keys as well as public keys and public key certificates.
SF 701
The SF 701 Form, also known as the Activity Security Checklist, is a document used by various organizations, particularly government agencies and branches of the military, to ensure that all security measures have been appropriately taken at the end of the day or shift.
MSL in only in what network
SIPR
CANES
Consolidated Afloat Networks and Enterprise Services
ACAS SC01 Server
The ACAS SC01 server is comprised of the following software components: Nessus (NS), an active scanner and SecurityCenter (SC), which manages Nessus
Back Up Servers (BU01)
BU01 provides the enclave with backup and restore services via the Veeam application
Veeam
Veeam Software is a US-based information technology company that develops software for backup, disaster recovery, and data protection. Veeam’s products are designed for virtual, cloud-native, SaaS, Kubernetes, and physical workloads.
Chat Server (CS01)
CS01 provides collaboration service using OpenFire via Swift client, Skype for Business (SEC only), Sametime Connect (SR only) and Mako Chat (SEC and SCI)
Openfire is an open-source real-time collaboration (RTC) server based on the XMPP (Extensible Messaging and Presence Protocol) protocol.
Sametime Connect
IBM Sametime Connect is a software that allows users to collaborate in real time through instant messaging. It offers a range of real-time collaboration services, including voice, data, and video
Mako Chat
Mako Chat is a tactical chat solution developed by Asynchrony Hubzone LLC that meets the needs of the Naval Afloat user. It provides client and server technology that meets Information Assurance (IA) requirements. MakoChat is used in shipboard tactical environments.
CM01
System Center Configuration Manager (SCCM) is hosted on Windows server CM01. SCCM provides a unified management console with an automated set of administrative tools to
1- Deploy software, protect data, monitor health, and enforce compliance across all devices.
2- Provides Windows Update Services (WSUS)
3- Desktop/laptop provisioning.
WSUS
WSUS is also known as Windows Server Update Services, and its first version is called Server Update Services (SUS). It helps distribute updates, fixes, and other types of releases available from Microsoft Update.
Collaboration at Sea (CAS)
Classification and server
The CAS (SEC) and CS01 (SR) servers provide ship-to-ship and ship-to-shore collaboration services.
CAS
A global collaborative application that uses the SIPRNET and Secret Releasable (SREL) CENTRIXS networks. It provides chat rooms, email, and standardized group websites. CAS is based on the IBM / Lotus collaboration toolset and is used by planning groups to support operations with coalition partners.
Domain Controllers
A domain is a set of network resources (computers, applications, printers, etc.) assigned to a specific group of users in a local network. An authorized user need only logon to the domain to gain access to these resources. The resources can be located on one or many servers and/or workstations throughout the network. The domain controller is a device that controls access to the domain and its resources. CANES networks have three domain controllers, DC01, DC02 and RODC. A domain controller is a server loaded with the Windows Server 2016 software and configured or assigned to perform the domain controller function. A server is assigned as domain controller during the process of loading the Windows Server 2016 operating system.
EM01/02
Systems Center Operations Manager (SCOM) is hosted on EM01 and EM02. SCOM is used for network management and monitors the health and performance of everything from servers to individual applications in Microsoft Windows environments.
Exchange Server (EX01/EX02) [2]
Exchange servers, EX01 and EX02 provide email and calendaring services.
FS01
FS01 provides file and print services and hosts the Definitive Software Library, the Home drives and the Share drive.
IAEXET [6]
- Server Information Assurance Exchange Edge Transport Server provides:
- email edge transport
- DHCP
- endpoint protection (DAR, excluding SR)
- Rivercity (email) services.
- IAEXET also provides RADIUS for the SR enclave only.
IM01/02
System Center Service Manager (SCSM) provides built-in processes for incident and problem resolution, change control, and asset lifecycle management.