Monday, January 19, 2009

SUN SOLARIS 10

UnixCBT feat. Solaris® 10 Edition focuses on the enterprise-trusted, Solaris® 10 Operating System (OS).

Published at Saturday 27 October 2007 @ 4:54 pm by dittys

UnixCBT feat. Solaris® 10 Edition focuses on the enterprise-trusted, Solaris® 10 Operating System (OS).

The coursework focuses on traditional Unix features including: Bourne/BASH shells, user/group management, file permissions, disk management, Cron, Network Time Protocol (NTP), Network File System (NFS), SendMail, and File Transfer Protocol (FTP).

UnixCBT feat. Solaris® 10 Edition also covers Solaris® 10-specific features, including but not limited to: Custom installations, Service Management Facility (SMF) framework, Package & Patch management, Unix File System (UFS) management, Volume management (RAID-0/1/5), Solaris® Management Console (SMC), Solaris® Zones, and the Zettabyte File System (ZFS).

Additionally, UnixCBT feat. Solaris® 10 Edition covers the integration of key Open Source technologies, including, but not limited to: Grand Unified Boot Loader (GRUB), GNOME Desktop, Samba, Apache HTTPD, MySQL, PHP (SAMP), BIND (DNS), Secure Shell Version 2 (SSHv2), GNU Privacy Guard (GPG (PGP-compliant encryption tools), TCPDump, Snort® NIDS, and Nmap.

Recommended Prerequisites for:

  • Any LinuxCBT OS Edition such as LinuxCBT feat. SUSE® Enterprise Edition
    • Open mind & determination to master Linux and related open-source applications
    • Basic MS Windows skills
    • Basic understanding of networking concepts
    • Access to a PC to perform all of the installations and exercises.


Installations

  • Local Media (CDROM) Text-based Installation on Dell PowerEdge Hardware
    • Discuss features of Solaris® 10
    • Explore system BIOS
    • Configure BIOS for local media booting
    • Boot local media and discuss default GRUB options for installation
    • Boot installation and discuss installation options
    • Discuss system requirements for text & GUI installations
    • Discuss single-user mode access
    • Boot text-based installation and explain hardware detection process & assignment
    • Configure network parameters
    • Configure time & locale parameters
    • Explore software companion DVD components
    • Select appropriate installation package group (Entire Distribution)
    • Customize file system slices - /, /export/home, SWAP
    • Complete installation of Entire Distribution
    • Reboot and confirm boot to the GUI screen
  • Pre-Execution (PXE) Nework-based Installation on Dell PowerEdge Hardware
    • Explain PXE installation requirements (TFTP, DHCP, etc.)
    • Prepare an alternate Solaris® server to become an Install Server - ./setup_install_server
    • Share Install Server source files using Network File System (NFS)
    • Configure SuSE® Linux DHCP Server to support the PXE client (Solaris® server) using a reservation
    • Configure Solaris® Install server to support the Solaris® client - ./add_install_client
    • Explore files created by ./add_install_client to support PXE
    • Explain PXE-boot process
    • Boot PowerEdge server and configure BIOS to boot using PXE
    • Reboot and install Solaris® 10 across the network without local media
    • Install using Solaris® Interactive option
    • Configure GUI (KVM) settings for graphical installation
    • Configure network parameters
    • Configure time & locale parameters
    • Confirm additional parameters and NFS path to source files
    • Customize file system slices - /, /export/home, /var, SWAP
    • Complete installation of Entire Distribution
    • Reboot and explore the Grand Unified Boot Loader (s) menu items
    • Discuss Service Management Facility (SMF) initial starup process
    • Confirm GUI Login
  • Console-based (Serial Cisco Firewall Rollover Cable) Installation
    • Discuss requirements of serial installation
    • Execute ./add_install_client to setup console installation option on appropriate com port
    • Boot PowerEdge server and confirm PXE boot
    • Select console boot option and confirm GRUB boot option
    • Connect to SuSE® Linux and use kermit to connect via com1 to the PowerEdge server
    • Continue PXE-Console(Serial) installation
    • Alter kermit console to resemble a mainframe terminal
    • Configure network parameters
    • Configure time & locale parameters
    • Customize file system slices - /, /export/home, /var, /usr, /opt, SWAP
    • Complete installation of Entire Distribution
    • Configure X.org GUI parameters using kdmconfig
  • Sysidcfg (phase 1) & JumpStart-based (phase 2) Installation - Unattended Installs
    • Explain the directives(network,locale,etc.) and application of the ‘sysidcfgfile
    • Define the ’sysidcfg’ file
    • Execute ./add_install_client to provide support for ’sysidcfg’ file
    • Reboot using PXE and install using ‘sysidcfg‘ file, confirming auto-population of directives - phase 1
    • Discuss rules regarding JumpStart installation method - phase 2
    • Introduction to the ‘rules.ok‘ file
    • Discuss ‘rules.ok’ profile development for classes of users (marketing, development, etc.)
    • Define ‘rules.ok’ profile file with appropriate criteria, validae, and store in NFS-accessible location
    • Reboot server, and confirm ’sysidcfg’ and ‘rules.ok’ files in GRUB entry
    • Continue JumpStart, unattended installation
  • Desktop Console-based Installation with PXE
    • Boot using ’sysidcfg’ and ‘rules.ok’ files incorporated in JumpStart option
    • Configure X.org using kdmconfig
    • Complete unattended remainder of installation
  • Flash-based (Snapshot) Installation with PXE and JumpStart Integration
    • Discuss ideal environment for implementing flash installations
    • Identify the current runlevel and enter single-user mode to prepare flash archive
    • Use the ‘flar‘ utility to take a snapshot of the system
    • Use Secure Copy (scp) to copy flash archive to NFS server
    • Reboot PowerEdge server and perform flash installation
    • Compete installation, reboot and confirm initial startup
    • Configure JumpStart and flash archive installation
    • Configure X.org GUI parameters using kdmconfig
    • Customize file system slices - /, SWAP
    • Complete installation
    • Confirm results - GUI Login

System Administration

  • Grand Unified Boot Loader (GRUB) Implementation
    • Describe the boot process (BIOS - GRUB - Solaris® Kernel - Sched - Init - SMF - Runlevel)
    • Discuss the default GRUB menu items
    • Explain how GRUB references bootable media
    • Boot into single-user mode by modifying GRUB
    • Explore the GRUB startup environment
  • System Initialization (INIT - PID 1)
    • Describe init’s invocation
    • Peruse init’s default configuration file /etc/inittab
    • Explain runlevels
    • Compare & contrast Solaris® & Linux runlevels
    • Explore /etc/init.d and /etc/rc* directories
  • Service Management Facility (SMF) Framework
    • Discuss the adavantages and features of SMF
    • Discuss the service configuration database
    • Explain support for legacy services
    • Discuss the role of service restarters - ‘svc.startd’ & ‘inetadm
    • Describe support for INETD-controlled daemons
    • Enumerate services configured on the system, including state information
    • Discuss & examine Fault Management Resource Identifiers (FMRIs)
    • Discuss service dependencies
    • Use ‘svcadm‘ to manage (disable/enable) services
    • Break dependencies and evaluate the results
    • Use ‘inetadm’ to manage INETD-related services
    • Convert legacy INETD service to SMF-managed service
  • GNOME Desktop Environment
    • Explore GNOME Desktop
    • Identify key features
    • Explore the Control Panel interface
    • Browse the filie system using Nautilus explorer
    • Correlate GNOME Desktop items to files in the user’s home directory
    • Customize GNOME Desktop
    • Create GNOME Desktop launchers (Shortcuts)
    • Save configuration
  • Shell-based User & Group Management
    • Enumerate key user & group management tools
    • Analyze the fields in /etc/passwd, /etc/shadow, /etc/group
    • Correlate /etc/passwd to /etc/shadow entries
    • Create and modify users and groups
    • Alter the default encryption algorithm used for passwords
    • Add users to groups and evaluate results
  • Solaris® Management Console (SMC) - Consolidated GUI System Management
    • Confirm that ‘wbem’ is running
    • Launch SMC and connect to local ‘wbem’ instance
    • Authenticate and explore the SMC GUI interface
    • Peruse key system metrics
    • Explore the log viewer interface
    • Manage users & groups using SMC
    • Define user templates and create users based on those templates
    • Examine scheduled jobs and correlate to crontab entries
    • Explore mounted file systems
  • Bourne Again Shell (BASH)/Bourne Shell Basics
    • Distinguish between privileged and non-privileged uses
    • Identify the default shell for a given user
    • Discuss features of BASH
    • Execute BASH
    • Discuss pseudo-terminals and how to identify connected terminals
    • Modify user’s accounts to default to BASH using shell & SMC
    • Use ‘su‘ to switch users
    • Explore key BASH commands
    • Focus on BASH input, output, and error redirection
    • Explore BASH command chaining
    • Use logical BASH operators (&&, ||) to control program logic
    • Discuss and alter BASH global and user-specific configuration files
    • Reveal key information using system info commands
  • Package Management
    • Discus options for managing packages
    • Discuss package nomenclature
    • Use ‘installer‘ script in GUI & text modes to install packages
    • Install packages from the Software Companion DVD sources
    • Use ‘prodreg‘ to display currently-installed software
    • Install packages using prodreg and evaluate results
    • Enumerate existing packages using ‘pkginfo
    • Echo package metadata using pkginfo
    • Use ‘pkgchk‘ to enumerate package’s contents
    • Use pkgchk to discover discrepancies in file locations and permissions - auditing
    • Determine package membership of files using pkgchk
    • Use ‘pkgadd‘ to install packages
    • Add packages to the local pacakage repository for subsequent installs
  • Patch Management
    • Discuss options for managing patches
    • Register server with sun.com to obtain patches automatically
    • Resolve outstanding patches using Update Manager
    • Install selected patches and reboot if necessary
    • Confirm patch application
    • Analyze patch level using ’smpatch’ from the BASH shell
    • Install specific patches using ‘smpatch
  • Unix File Permissions
    • Analyze permissions in ‘ls -l’ output
    • Discuss common Unix file types (files, directories, links, named-pipes, etc.)
    • Correlate symbolic permissions values to octal values
    • Use ‘chmod‘ to alter file & directory permissions
    • Use ‘chown & chgrp‘ to alter file & directory ownership
    • Apply SETUID & SETGID permissions to files & directories
    • Discuss the rules of symbolic & hard links
    • Create hard and soft links - symlinks
    • Discuss and examine inodes
  • Devices & Drivers Overview
    • Explore & correlate logical & physical device locations
    • Identify & discuss default driver locations
  • Disk, Slice & File System Management
    • Explain disk terminology (Tracks/Cylinders/Sectors/Partitions/Slices)
    • Examine existing disk layout, including slices using prtvtoc
    • Discuss x86 partition constraints - Volume Table of Contents (VTOC) & FDISK
    • Illustrate the disk-FDISK-slice hierarchy
    • Explain the disk nomenclature: c0t0d0s* (controller, target, disk, slice)
    • Identify logical and physical disk/slice locations
    • Use ‘format‘ to enumerate connected controllers & disks
    • Manipulate slices using ‘format’
    • Rectify disk geometry issues using fdisk option of ‘format’
    • Manipulate FDISK partitions with fdisk option of ‘format
    • Discuss ‘newfs’ rules
    • Create Unix File Systems (UFSs) using ‘newfs
    • Mount newly-created file systems at various locations
    • Confirm available storage
    • Updated /etc/vfstab, ensuring persistence
    • Recap file system provisioning process
    • Provision memory-based, Temporary File System (TEMPFS)
    • Provision and manage additional SWAP storage (files & file systems)
  • Volume Management - State Database Replicas, RAID-0/1/5, Volume Extenstion (growfs)
    • Introduction to volume management
    • Discuss Replicas, RAID Volumes, Hot Spare Pools, and Soft Partitions
    • Create required state database replicas on available slices, using SMC
    • Provision RAID-0 (Stripe) using SMC and available disks
    • Create UFS file system on RAID-0 volume, mount, and confirm results
    • Provision RAID-1 (Mirror) using SMC and available disks
    • Create UFS file system on RAID-1 volume, mount, and confirm results
    • Provision RAID-5 (Stripe with Parity) using SMC and available disks
    • Create UFS file system on RAID-5 volume, mount, and confirm results
    • Extend an in-use volume dynamically, using ‘growfs
    • Confirm extended volume results
  • Quota Implementation
    • Discuss the benefits of implementing quotas
    • Discuss soft & hard limits
    • Discuss inodes and blocks usage
    • Examine ‘edquota
    • Use ‘quotacheck‘ to confirm quotas
    • Enable quotas on a per-file system basis & confirm results
    • Test soft & hard limits by generating I/O
    • Use ‘repquota‘ to confirm current disk & slice usage
  • CRON - Process Scheduling - Automation
    • Discuss the benefits of automation & scheduling
    • Explore at, and Cron’s directory layout
    • Explain Cron scheduling fields
    • Examine user’s cron entries
    • Schedule per-user jobs and confirm execution
  • SYSLOG - Configuration
    • Discuss features & benefits
    • Identify key binaries and configuration files
    • Discuss Syslog rule components: selectors (facilities & levels) and actions
    • Peruse predefined selectors & actions
    • Explain options for facilities, levels and actions
    • Configure new selectors & actions for Cisco® PIX® firewall logging
    • Confirm logging results
  • Log Rotation - logadm
    • Discuss features & benefits
    • Identify key binaries and configuration files
    • Explore default log rotation schedule and items
    • Discuss available logadm criteria
    • Examine log rotation and effects on inodes
  • Zettabyte File System (ZFS) Implementation
    • Discuss the features (RAID-0/1/Z, Pools, etc.) and benefits of ZFS
    • Discuss ZFS prerequisites
    • Create ZFS pools using the Command Line Interface (CLI)
    • Set quotas on provisioned ZFS file systems atop the hierarchy and evaluate results
    • Manage ZFS storage pools from the CLI
    • Extend ZFS storage pools dynamically, while mounted
    • Manage ZFS storage pools using the web GUI

Network Administration

  • NETSTAT
    • Explain ‘netstat‘ applications
    • Identify key output features including: address families & protocols
    • Use ‘netstat’ to return the current IP routing table
    • Correlate service names in output to /etc/services
    • Return protocol-specific entries
    • Return active sockets and attached processes
    • Reveal DHCP-configured plumbed interfaces
  • Network Configuration
    • Discuss network configuration modes
    • use ‘dladm‘ to reveal the status of connected network interfaces - layer 1
    • Explain network interface nomenclature
    • Use ‘ifconfig‘ to return layer 2(MAC) & 3(IP) information for network interfaces
    • Identify key network services using Service Management Facility (SMF)
    • Enumerate key network configuration files for the configuration modes
    • Transition from DHCP to static configuration, creating the requisite files
    • Reboot and confirm static configuration
    • Reveal DHCP-configured plumbed interfaces using ‘ifconfig’
    • Plumb(Initiate) physical interfaces, commit configuration for persistence & test comms
    • Plumb(Initiate) logical interfaces associated with physical interfaces & test comms from Linux
    • Explore ‘/etc/nsswitch.conf‘ name service configuration file
  • Network Time Protocol (NTP) Client/Server Implementation
    • Configure Network Time Protocol (NTP) to perform client/server time synchronization
    • Synchronize NTP with additional Stratum 2 NTP server
    • Synchronize against Stratum 1 NTP servers
  • Network File System (NFS) Implementation
    • Implement NFS Server
    • Export shares and discuss options
    • Mount NFS exports on remote Linux Hosts
    • Explore AutoFS configuration
    • Configure AutoFS mount points
  • Samba Implementation
    • Focus on key Samba (SMB/CIFS) clients
    • Integrate with Windows via Samba
    • Explore Samba Configuration files
    • Enable Samba Server support
    • Explore Samba Web-based Administration Tool (SWAT)
    • Configure Samba file sharing
    • Configure Samba with multiple NETBIOS aliases
  • WUFTPD File Transfer Protocol (FTP) services
    • Implement anonymous FTPD
    • Implement user-level FTPD access
    • Implement FTPD banners
    • Disable anonymous access
    • Configure WUFTPD to chroot jail users into their home directories
    • Configure virtual FTP hosts
  • Dynamic Host Configuration Protocol (DHCP)
    • Explain DHCP Concepts & Applications
    • Explore DHCP confiuration files
    • Configure DHCP subnet with applicable options
    • Configure DHCP Reservation based on layer-2 address
  • Domain Name System (DNS)
    • Identify BIND packages & key files
    • Construct a standard ‘named.conf‘ configuration file with root hints, forward, and reverse zones
    • Download (Check the links before you download)

      latest root hints file as ‘db.cache‘ using ‘wget

    • Construct appropriate zone files to match defined zones in ‘/etc/named.conf’
    • Configure BIND as a caching-only DNS server
    • Implement Master DNS Zone
    • Configure Master/Slave Zones with Linux Server
    • Evaluate results of BIND configuration using DIG & host
  • Sendmail Message Transfer Agent (MTA)
    • Introduction to Sendmail Implementation
    • Explore the directives in the Sendmail configuration files
    • Explre aliases
    • Test messaging using ‘sendmail‘ binary
    • Identify relay-related configuration files
    • Configure Virtual Domains
  • Internet Message Access Protocol (IMAP) Implementation
    • Explain POP3 & IMAP applications
    • Download (Check the links before you download)

      & Install IMAP server using ‘wget‘ , ‘gunzip‘ & ’pkgadd

    • Configure IMAP server to be managed by INETADM (SMF)
    • Invoke & test mail retrieval
  • Apache Web Server Implementation
    • Identify the versions of Apache included with Solaris® 10 using SMF & pkg* tools
    • Discuss Apache server’s features and concepts
    • Explore key binaries, configuration files, and documentation
    • Discuss key sections & directives in the Apache ‘httpd.conf‘ file
    • Setup Apache 2 support
    • Implement Apache Mod Alias and ScriptAlias
    • Discuss and implement the File, Location & Directory directives
    • Explore Apache logging semantics
    • Configure IP-based Virtual Hosts
    • Configure Name-based Virtual Hosts
    • Implement Apache logging system per virtual host
    • Webalizer Log Analysis software Implementation
    • Generate web reports using Webalizer
  • Trivial File Transfer Protocol (TFTP) Implementation
    • Install TFTP server
    • Backup Cisco PIX firewall configuration using TFTP
    • Update Cisco PIX firewall configuration using TFTP
  • MySQL® Relational Database Management System
    • Install MySQL® Relational Database Management System
    • Explore key configuration files
    • Secure access to MySQL®
    • Discuss security framework
    • Discuss default table storage engine, MyISAM, file types
    • Explore MySQL® monitor shell-based interface

  • PHPMyAdmin - MySQL® Web-based Management Interface
    • Install PHPMyAdmin for web-based management of MySQL instances
    • Explain & Secure access to PHPMyAdmin
    • Explore PHPMyAdmin’s interface
  • Postfix Message Transfer Agent (MTA)
    • Configure Postfix as default MTA
    • Introduction to Postfix Message Transfer Agent (MTA)
    • Explore the directives in the Postfix configuration files
    • Define default values for the FQDN
    • Alter myorigin and examine results
    • Configure Postfix to route messages using a Smarthost
    • Examine how Postfix delivers mail locally
    • Configure SMTP Relaying in Postfix
    • Use Mutt to demonstrate outbound mail handling using Postfix
    • Define SMTP Virtual domains for hosting multiple DNS domains
    • Configure Postfix with a production UnixCBT DNS domain
    • Examine Virtual domain routing with production and non-production DNS domains

Security Implementation Techniques

  • System Security Overview
    • Discuss key areas related to security in a vanilla Solaris® 10 installation
    • Peruse the ‘sulog‘ log file to identify ’su’ instances & explain fields
    • Test using ’su’ and examine results in ‘/var/adm/sulog’
    • Record failed logins in the ‘/var/adm/loginlog‘ file
    • Test login failures and examine results in ‘loginlog’
    • Peruse the directives in ‘/etc/default/login’
    • Adjust ‘login’ file directive to capture failed login attempts
    • Test failed logins using SSH - Compare SSH threshold to system threshold
    • Explore system-wide account-policy information using ‘logins‘ command
    • Identify the default password encryption algorithm
    • Upgrade default password encryption algorithm to MD5 and Blowfish
    • Test user-account modifcation of passwords and evaluate encryption strings
  • Secure Shell Version 2 (SSHv2)
    • Discuss the features and benefits of SSHv2
    • Identify SSHv2 SMF FMRI
    • Identify global and per-user configuration files
    • Explain SSHv2 config file precedence order
    • Identify key directives in global and per-user configuration files
    • Discuss ‘~/.ssh/known_hosts‘ file
    • Execute ‘ssh‘ in debug mode and evaluate output, including psuedo-terminal (pty) assignment
    • Execute remote commands and return output to local system using ’ssh’
    • Use Secure Copy (SCP) to copy files securely and non-interactively between systems
    • Use Secure File Transfer Program (SFTP) to copy files securely interactively between systems
    • Generate SSHv2 DSA & RSA usage keys for PKI login
    • Configure SSHv2 to support PKI (password-less) logins
    • Test password-less login to remote systems
    • Execute ’ssh’ in debug mode and evaluate output, including PKI, password-less login
    • Implement ‘~/.ssh/authorized_keys‘ file
    • Discuss using SSHv2 as a psuedo-VPN via port forwarding
    • Use SSHv2 to forward local TCP ports & test communications
    • Use SSHv2 to forward remote TCP ports & test communications
    • Enable the sharing of locally & remotely forwarded TCP ports
  • GNU Privacy Guard (GPG) - Pretty Good Privacy (PGP)-compatible Facility
    • Discuss the features and benefits of GPG
    • Download (Check the links before you download)

      GPG package from sunfreeware.com

    • Install GPG
    • Explore GPG files
    • Generate DSA public/private key pair
    • Identify available, per-user public/private key pairs on keychains
    • Import G/PGP public key and evaluate results
    • Sign imported public key and verify signature associated with downloaded content
    • Encrypt ASCII text file with appropriate public key and evaluate output
    • Decrypt ASCII text with appropriate private key and evaluate output
  • Snoop - Packet Sniffing
    • Discuss the features and benefits of snoop
    • Explain default interface behavior
    • Execute ‘snoop‘ and evaluate packet headers
    • Capture snoop output to log file
    • Use ‘snoop‘ to playback captured packets
    • Playback ranges of packets
    • Return layers 2-7 of OSI model and evaluate output
    • Apply filters, similar to Berkelye Packet Filters (BPFs), and evaluate results
    • Adjust time output, relative to current, and first packet captured
    • Source FTP traffic from Windows 2003 and snoop credentials passed in clear-text
    • Evaulate results
  • TCPDump - Packet Sniffing
    • Discuss the features and benefits of tcpdump
    • Install tcpdump from the Software Companion DVD
    • Identify installed package & man pages
    • Discuss tcpdump-supported qualifiers for creating expressions & capturing packets
    • Execute ‘tcpdump‘ and evaluate captured packets
    • Bind tcpdump to specific interfaces for capturing packets
    • Apply Berkeley Packet Filters (BPFs) to capture sessions to suppress traffic
    • Dump ‘tcpdump’ capture to log file and evaluate results
    • Use ‘tcpdump’ to playback captured packets
    • Source FTP traffic from Windows® 2003 host and sniff credentials passed in clear-text
    • Source Telnet traffic from Windows® 2003 host and sniff credentials passed in clear-text
    • Evaluate results
  • Snort® 2.x Network Intrusion Detection System (NIDS) - Packet Sniffing & Logging
    • Discuss the features and benefits of Snort® NIDS
    • Discuss Snort® NIDS pre-requisites (libpcap/libpcre/compiler/etc.)
    • Obtain, compile and install the Snort® Network Intrusion Detection System (NIDS)
    • Identify and explain key operating modes (Sniffer/Logger/NIDS)
    • Invoke Snort® in network sniffer mode
    • Explore Snort® in Binary (TCPDUMP) logging mode
    • Output logs to binary format and examine the results
    • Implement Snort® with BPF to filter traffic
    • Generate traffic from remote Windows 2003 and Linux hosts
    • Use Snort® with Berkeley Packet Filter (BPF) to parse logs
  • Network Mapper (Nmap)
    • Discuss the features and benefits of Nmap
    • Download (Check the links before you download)

      Nmap bzip2 source package from insecure.org

    • Compile & install Nmap
    • Discuss default TCP-connect scan mode
    • Discuss SYN-based scanning
    • Use Nmap to perform reconnaisance testing
    • Evaluate results
  • Solaris® Zones - Containers - Virtualization - Instances
    • Discuss the features, benefits and limitations of Solaris® Zones
    • Discuss Global and Non-Global zones
    • Identify file system location to house non-global zones
    • Use ‘zonecfg‘ to provision non-global zones
    • Verify zone configuration using ‘zonecfg’
    • Install non-global zones using ‘zoneadm‘ and evaluate results
    • Login to non-global zones and explore
    • Evaluate results
    • Manage zones using ‘zoneadm

Rapidshare Download (Check the links before you download)

Link’s :-

rapidshare.com/files/45054175/Sol-x10.part01.rar
rapidshare.com/files/45057266/Sol-x10.part02.rar
rapidshare.com/files/45060239/Sol-x10.part03.rar
rapidshare.com/files/45064088/Sol-x10.part04.rar
rapidshare.com/files/45067686/Sol-x10.part05.rar
rapidshare.com/files/45071241/Sol-x10.part06.rar
rapidshare.com/files/45075147/Sol-x10.part07.rar
rapidshare.com/files/45078621/Sol-x10.part08.rar
rapidshare.com/files/45210928/Sol-x10.part09.rar
rapidshare.com/files/45124860/Sol-x10.part10.rar
rapidshare.com/files/45119410/Sol-x10.part10.rar
rapidshare.com/files/45216935/Sol-x10.part11.rar
rapidshare.com/files/45130476/Sol-x10.part12.rar
rapidshare.com/files/45135668/Sol-x10.part13.rar
rapidshare.com/files/45141798/Sol-x10.part14.rar
rapidshare.com/files/45147398/Sol-x10.part15.rar
rapidshare.com/files/45153356/Sol-x10.part16.rar
rapidshare.com/files/45159392/Sol-x10.part17.rar
rapidshare.com/files/45165552/Sol-x10.part18.rar
rapidshare.com/files/45172085/Sol-x10.part19.rar
rapidshare.com/files/45178498/Sol-x10.part20.rar
rapidshare.com/files/45185153/Sol-x10.part21.rar
rapidshare.com/files/45191167/Sol-x10.part22.rar
rapidshare.com/files/45234880/Sol-x10.part23.rar
rapidshare.com/files/45240654/Sol-x10.part24.rar
rapidshare.com/files/45247360/Sol-x10.part25.rar
rapidshare.com/files/45252737/Sol-x10.part26.rar
rapidshare.com/files/45257008/Sol-x10.part27.rar
rapidshare.com/files/45260057/Sol-x10.part28.rar
rapidshare.com/files/45262732/Sol-x10.part29.rar
rapidshare.com/files/45265303/Sol-x10.part30.rar
rapidshare.com/files/45267682/Sol-x10.part31.rar
rapidshare.com/files/45270738/Sol-x10.part32.rar
rapidshare.com/files/45273149/Sol-x10.part33.rar
rapidshare.com/files/45275755/Sol-x10.part34.rar
rapidshare.com/files/45277871/Sol-x10.part35.rar
rapidshare.com/files/45280215/Sol-x10.part36.rar
rapidshare.com/files/45283871/Sol-x10.part37.rar
rapidshare.com/files/45285765/Sol-x10.part38.rar
rapidshare.com/files/45288118/Sol-x10.part39.rar
rapidshare.com/files/45290237/Sol-x10.part40.rar
rapidshare.com/files/45292271/Sol-x10.part41.rar
rapidshare.com/files/45294198/Sol-x10.part42.rar
rapidshare.com/files/45296272/Sol-x10.part43.rar
rapidshare.com/files/45298357/Sol-x10.part44.rar
rapidshare.com/files/45300204/Sol-x10.part45.rar
rapidshare.com/files/45303452/Sol-x10.part46.rar
rapidshare.com/files/45307288/Sol-x10.part47.rar
rapidshare.com/files/45311435/Sol-x10.part48.rar
rapidshare.com/files/45315510/Sol-x10.part49.rar
rapidshare.com/files/45319940/Sol-x10.part50.rar
rapidshare.com/files/45324830/Sol-x10.part51.rar
rapidshare.com/files/45329465/Sol-x10.part52.rar
rapidshare.com/files/45334041/Sol-x10.part53.rar
rapidshare.com/files/45338787/Sol-x10.part54.rar
rapidshare.com/files/45344067/Sol-x10.part55.rar
rapidshare.com/files/45349346/Sol-x10.part56.rar
rapidshare.com/files/45354488/Sol-x10.part57.rar
rapidshare.com/files/45360208/Sol-x10.part58.rar
rapidshare.com/files/45365129/Sol-x10.part59.rar
rapidshare.com/files/45370811/Sol-x10.part60.rar
rapidshare.com/files/45376566/Sol-x10.part61.rar
rapidshare.com/files/45381898/Sol-x10.part62.rar
rapidshare.com/files/45387999/Sol-x10.part63.rar
rapidshare.com/files/45394187/Sol-x10.part64.rar
rapidshare.com/files/45399594/Sol-x10.part65.rar
rapidshare.com/files/45407993/Sol-x10.part66.rar
rapidshare.com/files/45413175/Sol-x10.part67.rar
rapidshare.com/files/45418442/Sol-x10.part68.rar
rapidshare.com/files/45424409/Sol-x10.part69.rar
rapidshare.com/files/45436925/Sol-x10.part70.rar
rapidshare.com/files/45452818/Sol-x10.part71.rar
rapidshare.com/files/45447584/Sol-x10.part72.rar
rapidshare.com/files/45051474/Sol-x10.part73.rar

No comments: