CANES 2 Flashcards
Main references for CANES Core
CANES SW4 IETM – EE689-2X-IEM-004- AN/USQ-208C(V)
C5ISR
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:
Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:
2 CANES online resources
Naval Information Warfare Systems Command (NAVWAR) Acquisition Integrated Logistics Online Repository (SAILOR)
Navy Enterprise Service Desk (NESD)
CDS provides
Cross Domain Solutions (CDS) provides client access to the UNCLAS, SR, and SECRET enclaves
CDS Transfer Guard provides the capability to disseminate data from systems accredited at the same or lower classification levels
Sanitizes and downgrades data for release to systems withdifferent classification levels
Fault Isolation Strategy Six Step Process:
- Recognize symptom(s)
- Define symptom(s)
- List probable faulty function
- Localize the faulty function
- Localize trouble to the faulty component
- Analyze the failure
The hardware components used in CANES can be broken down into the following four functional areas:
Data Processing
Data Storage
Data Transfer
Power Distribution
Servers are installed in the CANES equipment racks and provide VMware vSAN storage for hoste apps and virtual machines.
The HP DL380 G10
One of this is the Witness server and is installed in the SECRET enclave only. It enables MAC-1 failover/failback to occur automatically.
As such it is considered critical equipment and must always remain powered on.
HP DL20 G10 this unit is located in the VTC rack (Unit 51 or 52) depending on the installation
Most likely not connected
The Line Console 0 (con 0) in the Cisco IOS represents the physical console port, and is configured via the Line Interface:
Access the Line Interface from Global Config Mode by typing: Line Con 0 followed by the Enter key
Changing the Line Interface configuration without required proper approvals in not authorized
To verify the configuration is unchanged from baseline settings
From Privileged EXEC mode type: show running-config | begin line
Compare the Line Con 0 configs to the ship’s network template
Viewing Local Accounts
Cisco Switch and Router
From Privilege EXEC mode, type: show run | include username
Verify local accounts list and privilege level
Cisco Default Privilege Levels
Level 0: log out, enable, disable, help, and exit commands
Level 1: Read-only access
Level 15: Full router or switch control
Cisco Local Account Creation
From Global Config mode, type: Username <new> privilege <privilege> password <new></new></privilege></new>
Local Account Deletion
From Global Config mode, type: no username <username></username>
Show Running Config | Section OSPF
command shows the OSPF section of the running configuration
Results can be used to compare baseline settings
Show IP OSPF Neighbors
command shows the state of adjacency; OSPF requires full adjacency to function
Results show ip address ospf neighbors’ connecting interface – the CANES Border Firewall interface that connects to the Backbone router-switch
Show IP OSPF Interface
command: shows OSPF information per interface
Show IP OSPF Database
command: shows all router IDs in the OSPF area
Show IP Route
command: shows directly connected, static, link local, and OSPF learned network routes
Exchange Troubleshooting
The _____ Diagram is a helpful resource when errors occur
Exchange Troubleshooting
The Email and Calendar Service Troubleshooting Fault Isolation Diagram is a helpful resource when errors occur
Exchange Toolbox is installed on
CANES EX01/02 and IAEXET
It is a Microsoft Management Console (MMC) snap-in that you can use to view information about and act on queues and messages in queues
Exchange Toolbox includes Queue Viewer
System Admins can use Queue Viewer to perform the following actions
Remove messages
Suspend messages
Resume messages
Redirect messages
Accessing Queue Viewer
Log in to IAEXET with System Administrator credentials
Navigate to Start > Microsoft Server Exchange 2016 > Exchange Toolbox and click on Queue Viewer
Click on Queue Viewer under Mailflow Tools
Exchange Troubleshooting (cont.)
There are five areas of importance
Network
Hardware
Services
Configurations
Off ship Connectivity
Exchange Troubleshooting
Configuration Items to monitor from the Security Information and Event Management (SIEM) or the Systems Center Operations Management (SCOM) dashboard
Mail transport - Replication
Name resolution service
Encryption Service - Processes
Message Application Programming Interface (MAPI) and Mail submission
Active Directory Remote Procedure Call (RPC) Access
Directory Inquiry
Rights management
Alternate client access for Standard Mail Transfer Protocol (SMTP) Clients
Active directory Global catalogue
EdgeSync
Hub transport
Directory Queries
Lightweight Directory Access Protocol (LDAP) global catalogue queries
Registry access
Clustering
CANES is preconfigured to support the implementation of River City procedures in all enclaves
There are four OPSECON groups
OPSECON 1 - CO, XO, CMC, TAO
OPSECON 2 - OPS, EMO, CHENG
OPSECON 3 - All Officers, All Chiefs
OPSECON 4 - E-6 and Junior
Generating and Exporting ACAS Report to VRAM
From ACAS SecurityCenter, navigate to Scans > Active Scans and select desired scan to upload
Select Post Scan and then select the report configured to publish
Click Submit to save the scan, and then navigate to Reporting Report > Results to access report
Select report and click Download to save locally with a meaningful name
Select Submit button and a dialog box is displayed, indicating the upload has been sent
Server that bypasses wsav
ADNS
Encryption for CANES
Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption is used to restore removable drive encryption to reimaged computers
Disk encryption recovery with BitLocker:
BitLocker Recovery Key is found under Active Directory Users and Computers (ADUC) in the Trusted Platform Module (TPM)
Access the ADUC <FQDN> CANES Users and Computers > Computers
Select the computer and click on the BitLocker Recovery tab to find the BitLocker Recovery Key</FQDN>
All Federal DoD information systems are required to use devices protected by the _____ and maintain encryption standard of _____ encryption Federal Information Processing Standards (FIPS)-140-2n
All Federal DoD information systems are required to use devices protected by the TPM and maintain encryption standard of AES 256-bit encryption Federal Information Processing Standards (FIPS)-140-2n
SEE
Symantec Endpoint Encryption
Is used for hard drive encryption
Bitlocker
Is used for removable media encryption
WinZip Secure Burn
DAR
Data at rest
Three Bitlocker status
Protection Status 0 – Protection OFF
Protection Status 1 – Protection ON (Unlocked)
Protection Status 2 – Protection ON (Locked)
is used to restore removable drive encryption to reimaged computers
Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption
NCVI
Navy Certificate Validation Infrastructure