0% found this document useful (0 votes)
24 views17 pages

CHAPTER1

The document outlines the objectives and foundational concepts of system and network administration, emphasizing the roles and responsibilities of various administrators. It covers key areas such as system and network administration definitions, typologies, expectations, and decision-making levels, along with ethical considerations. The document serves as a comprehensive guide for understanding the operational management of computer systems and networks, aimed at enhancing skills in administration, security, and maintenance.

Uploaded by

LI NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views17 pages

CHAPTER1

The document outlines the objectives and foundational concepts of system and network administration, emphasizing the roles and responsibilities of various administrators. It covers key areas such as system and network administration definitions, typologies, expectations, and decision-making levels, along with ethical considerations. The document serves as a comprehensive guide for understanding the operational management of computer systems and networks, aimed at enhancing skills in administration, security, and maintenance.

Uploaded by

LI NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

System Administration

& Networks

DR. ALLAMA OUSSAMA


Higher School of Computer Science and Digital
Technologies
Field: Cyber Security
EMAIL : [email protected]

Public Domain (deprecated): http://creativecommons.org/licenses/publicdomain/4.0/fr/ March 2025


5.0
Table of contents
Objectives 3

I - Chapter 1: Introduction to System and Network Administration 4

1. Definition and purpose ................................................................................................................................... 4


1.1. System Administration .................................................................................................................................................................. 4
1.2. Network Administration ............................................................................................................................................................... 5
1.3. Ethical Issues in SA/NA ............................................................................................................................................................... 5
1.4. What is a Network Operating System? .......................................................................................................................................... 5

2. Typology of Computer Network Administration ............................................................................................ 7


2.1. Network Administrator ................................................................................................................................................................ 7
2.2. System Administrator ................................................................................................................................................................... 8
2.3. Security Administrator ................................................................................................................................................................. 8
2.4. Database Administrator (DBA) .................................................................................................................................................... 8
2.5. Web Administrator ....................................................................................................................................................................... 9
2.6. Network Operations Center (NOC) Engineer ................................................................................................................................ 9
2.7. Network Architect / Network Engineer ......................................................................................................................................... 9
2.8. Cloud Network Administrator / Virtualization Specialist ............................................................................................................ 10
2.9. Delegated or Local Administrators ............................................................................................................................................. 10

3. Expectations of a Computer Network Administrator ................................................................................... 11


3.1. Diverse Role and Scope .............................................................................................................................................................. 11
3.2. Infrastructure Management and Deployment ............................................................................................................................. 11
3.3. Security and Resilience ............................................................................................................................................................... 11
3.4. Comprehensive Skill-set and Continuous Learning ..................................................................................................................... 11
3.5. Strategic Planning and Policy Documentation ............................................................................................................................ 11
3.6. Ethical and Professional Responsibility ...................................................................................................................................... 12

4. IT Network Administration Decision-Making Levels .................................................................................. 13


4.1. IT Network Administration Decision-Making Levels .................................................................................................................. 13
4.2. Integration with System Administration ...................................................................................................................................... 14
4.3. Conclusion and Key Takeaways ................................................................................................................................................ 14

Glossary 15

Abbreviation 16

References 17
Objectives

Learn how to use and administer a network environment, plan network installation and
upgrades, and perform computer network monitoring, optimization, and maintenance.
The primary objectives typically include:

1. Understanding Core Concepts: Grasping the fundamental principles of system


and network administration, including the roles and responsibilities of
administrators. Operating System Installation and Configuration: Learning to
install, configure, and manage various operating systems, particularly Unix-like
and Windows systems.
2. Server and Client Management: Developing skills to administer servers and
clients, including user and group management, file system administration, and
process control.
3. Network Configuration and Troubleshooting: Acquiring the ability to
configure network interfaces, manage IP addressing (IPv4 and IPv6), and utilize
network troubleshooting tools.
4. Service Deployment: Gaining proficiency in setting up and managing essential
network services such as DHCP, DNS, web servers, proxy servers, FTP, and
mail servers.
5. Security Implementation: Understanding and applying security measures to
protect systems and networks from internal and external threats.
6. Automation and Scripting: Learning to automate routine tasks using scripting
languages to enhance efficiency and reduce manual intervention.
7. Monitoring and Maintenance: Developing strategies for regular system
monitoring, maintenance, and performance tuning to ensure optimal operation.

3
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
Chapter 1: Introduction to System and Network Administration

Chapter 1: Introduction
to System and Network I
Administration

1. Definition and purpose

Network and system administration is a branch of engineering that is concerned with the operational
management of human–computer systems.

It is unusual as an engineering discipline in that it equally addresses the technology of computer systems and
its users.

The terms network administration and system administration exist separately and are used both variously and
inconsistently by industry and by academics.

1.1. System Administration

- System administration is the term used traditionally by mainframe and Linux engineers to describe the
management of computers whether they are coupled by a network or not.
- Today, System Administration is the design, installation, configuration, operation, and support of these
servers to support the operational needs of an organization's information technology infrastructure.

1.1.1. System Administrator

Definition
- Generally, it is planning, installing, and maintaining computer systems involving servers and clients that
work together in a network environment using an operating system like Windows 2022 Server or Linux
platform.
- A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and
reliable operation of computer systems; especially multi‐user computers, such as servers.

1.1.2. Duties of a System Administrator

1. User administration (setup and maintaining account)


2. Maintaining system

3.

4
Network Administration

3. Verify that peripherals are working properly


4. Quickly arrange repair for hardware in the event of hardware failure
5. Monitor system performance
6. Create file systems
7. Install software
8. Create a backup and recovery policy
9. Monitor network communication
10. Update system as soon as a new version of OS and application software comes out
11. Implement the policies for the use of the computer system and network
12. Setup security policies for users. A sysadmin must have a strong grasp of computer security (e.g.,
firewalls and intrusion detection systems)
13. Install patches
14. Review system logs
15. Report malicious or suspicious activity on systems to ISO immediately
16. Report sensitive information stored on systems to ISO
17. Maintain user access administration
18. Disaster recovery planning
19. Physical security
20. Disable unnecessary services on servers
21. Generate/Retain system backups
22. Identify secondary system administrator(s)
23. Comply with password requirements
24. Access control
25. Environmental protection (i.e., protection from possible exposure to water damage, excessive heat, etc.)
26. Security training will be required every three (3) years

1.2. Network Administration

Definition
- Network administration means the management of network infrastructure devices (routers and
switches).
- A network administrator is an individual that is responsible for the maintenance of computer hardware
and software systems that make up a computer network, including the maintenance and monitoring of
active data network or converged infrastructure and related network equipment.
- The actual role of the network administrator will vary from place to place, but will commonly include
activities and tasks such as network address assignment, management and implementation of routing
[p.16] [p.16] [p.16]
protocols such as ISIS *

, OSPF *

, BGP *

, routing table configurations, and certain


[p.15]
implementations of authentication (e.g., challenge response, etc.). It can also include maintenance
*

of certain network servers: file servers, VPN gateways, intrusion detection systems, security, etc.

1.3. Ethical Issues in SA/NA


Because computer systems are human–computer communities, there are ethical considerations involved in their
administration. Even if certain decisions can be made objectively, e.g., for maximizing productivity or
minimizing cost, one must have a policy for the use and management of computers and their users.

1.4. What is a Network Operating System?

5
Windows Server

Network operating system refers to software that implements an operating system of some kind that is
oriented to computer networking. For example, one that runs on a server and enables the server to manage
data, users, groups, security, applications, and other networking functions. The network operating system is
designed to allow shared file and printer access among multiple computers in a network, typically a local area
network (LAN), a private network, or other networks.

1.4.1. Windows Server

Definition
Windows Server is a brand name for a group of server operating systems released by Microsoft. It includes all
Windows operating systems branded "Windows Server", but not any other Microsoft product. The first
Windows server edition to be released under that brand was Windows Server 2003. However, the first server
edition of Windows was Windows NT 3.1 Advanced Server, followed by Windows NT 3.5 Server, Windows
NT 4.0 Server, and Windows 2000 Server; the latter was the first server edition to include Active Directory,
DNS Server, DHCP Server, Group Policy, as well as many other popular features used today.

While this historical overview remains accurate, modern deployments typically use Windows Server 2019,
2022, or 2025 which offer enhanced security, hybrid cloud integration, and improved management tools

Example
Windows Server 2012 R2 is the sixth version of the Windows Server family of operating systems. It was
released on October 18, 2013. According to the Windows Server 2012 R2 datasheet published on May 31,
2013, there are four editions of this operating system: Foundation, Essentials, Standard, and Data center. Unlike
its predecessor, Windows Server 2012 can switch between "Server Core" and "Server with a GUI" installation
options without a full re-installation.

Advice
For current best practices, refer to later versions such as Windows Server 2019, 2022, or 2025, which include
additional features and security enhancements.

1.4.2. Solaris

Definition
Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS
in 1993. Oracle Solaris, so named as of 2010, has been owned by Oracle Corporation since the Sun acquisition
by Oracle in January 2010.

Solaris remains in use in some legacy systems but is less common in modern new deployments compared to
Linux-based systems.

6
Mac OS X Server

1.4.3. Linux Server

Definition
- Linux Server is a high-powered variant of the Linux open-source operating system designed to handle the
more demanding needs of business applications such as network and system administration, database
management, and Web services.
- Linux servers are frequently selected over other server operating systems for their stability, security, and
flexibility advantages. Leading Linux server operating systems include CentOS, Debian, Ubuntu Server,
Slackware, and Gentoo.

Note
Note that CentOS Linux has transitioned to CentOS Stream; many enterprises now consider alternatives such
as Rocky Linux or AlmaLinux for a free, RHEL-compatible platform.

1.4.4. Mac OS X Server

Definition
- Mac OS X Server, formerly Mac OS X Server and OS X Server, is a separately sold operating system add-
on which provides additional server programs and management and administration tools for macOS.
- Before version 10.7 (Lion), OS X Server was a separate but similar Unix [3] server operating system from
Apple Inc., architecturally identical to its desktop counterpart OS X.

Note
- With the release of version 10.7 (Lion), Mac OS X and Mac OS X Server were combined into one release
and re-branded as OS X.
- In recent years, macOS Server has seen a significant reduction in functionality, with many traditional
servers features now integrated into macOS or replaced by cloud-based solutions.

2. Typology of Computer Network Administration

Effective network administration in modern organizations depends on a well-defined division of labor. In large
and complex environments, it is impractical for a single individual to cover all aspects of network
management. Consequently, role‐based classifications are widely adopted in both practice and academic
[p.17]
literature (Limoncelli et al., 2007; Nemeth et al., 2017)1 . Below, we describe several key roles along with
*

their core responsibilities and relevant academic references.

2.1. Network Administrator

Definition:Responsibilities:
- Infrastructure Management: Design, configure, and maintain network devices (routers, switches,
firewalls) and connectivity (LAN, WAN, VPN).

7
System Administrator

- Monitoring & Troubleshooting: Proactively monitor network performance and quickly address
connectivity or performance issues using tools based on protocols such as SNMP.
- Configuration Management: Implement firmware upgrades, software patches, and changes to network
configurations to ensure stability and security.

Extra
[p.17]
(Limoncelli et al. 2007)1 emphasize that robust network administration is built on clear operational roles
*

that focus on both proactive monitoring and rapid remediation of network issues.

2.2. System Administrator

Definition:Responsibilities:
- Server & OS Management: Oversee installation, configuration, and maintenance of multi-user systems
and servers, including routine patch management and system backups.
- Resource Optimization: Ensure optimal performance by balancing computing resources and handling
user access across the enterprise.
- User Account Management: Manage user accounts, permissions, and policy enforcement across the
system.

Extra
[p.17]
(Nemeth et al. (2017)2 detail best practices in system administration that stress the importance of distinct
*

roles for maintaining server reliability and user support in a scalable IT environment.

2.3. Security Administrator

Definition:Responsibilities:
- Threat Prevention & Response: Deploy and manage security solutions such as firewalls, intrusion
detection/prevention systems, and antivirus software to protect network assets.
- Policy Enforcement: Develop and enforce security policies and procedures to mitigate unauthorized
access and data breaches.
- Risk Management: Continuously assess the network for vulnerabilities and oversee incident response to
maintain system integrity.

Extra
[p.17] [p.15]
Sandhu et al. (1996)5 describe how access control models like RBAC
*

can support security


*

administration by structuring permissions around well-defined roles, an approach that underpins many modern
security practices.

2.4. Database Administrator (DBA)

Definition:Responsibilities:
- Database Maintenance: Install, configure, and maintain database systems that support networked
applications.
- Data Integrity & Security: Ensure data integrity through regular backups and security measures tailored
to protect sensitive information.

8
Web Administrator

- Performance Tuning: Optimize database performance through query analysis and system configuration
adjustments.

Extra
Research in database management highlights that separating database administration from other network tasks
[p.17]
improves both performance and security (Limoncelli et al., 2007).1 *

2.5. Web Administrator

Definition:Responsibilities:
- Web Server Management: Configure and maintain web server environments (e.g., Apache, Nginx, IIS)
to ensure high availability and responsiveness.
- Application Deployment & Security: Oversee the deployment of web applications and implement
security measures (SSL/TLS, access controls) to protect web assets.
- Performance Monitoring: Monitor website performance and troubleshoot issues that impact user
experience.

Extra
[p.16] [p.16] [p.17]
Studies on web-based administration and RBAC
*

integration (Ferraiolo et al. 2003)4


* *

demonstrate the benefits of structured role assignment in maintaining secure and efficient web services.

2.6. Network Operations Center (NOC) Engineer

Definition:Responsibilities:
- Real-Time Monitoring: Continuously monitor the network from a centralized operations center to detect
outages or performance degradation.
- Incident Response: Serve as the first line of defense by addressing network incidents and escalating
issues as needed.
- Reporting & Documentation: Maintain logs, analyze performance trends, and produce reports to
support proactive network management.

Reminder
The importance of real-time monitoring and structured incident management in network environments is well
[p.17]
documented in the literature on network and system administration (Limoncelli et al. 2007).1 *

2.7. Network Architect / Network Engineer

Definition:Responsibilities:
- Design & Planning: Develop comprehensive network blueprints that balance scalability, performance,
and security.
- Strategic Infrastructure: Evaluate organizational requirements and design network architectures that
integrate emerging technologies (e.g., SDN, cloud networking).
- Project Leadership: Lead large-scale network deployment projects, coordinate with vendors, and guide
infrastructure upgrades.

9
Cloud Network Administrator / Virtualization Specialist

Extra
Academic research on network design underscores the value of specialized roles in planning robust network
[p.17]
architectures that meet long-term organizational goals (Nemeth et al., 2017).2 *

2.8. Cloud Network Administrator / Virtualization Specialist

Definition:Responsibilities:
- Cloud Infrastructure Management: Deploy and manage virtual network resources on cloud platforms
[p.16]
(AWS, Azure, GCP ) and integrate them with on-premises systems.
*

- Virtualization Technologies: Oversee virtual machines, containers, and orchestration platforms to


optimize resource allocation and network performance.
- Hybrid Integration: Ensure seamless connectivity between traditional network environments and cloud-
based resources.

Note
Recent academic work has addressed the challenges of cloud networking and virtualization, highlighting the
[p.17]
need for specialized roles to manage hybrid environments efficiently (Limoncelli et al., 2007).1 *

2.9. Delegated or Local Administrators

Definition:Responsibilities:
- Localized Management: In large, distributed networks, local administrators manage specific segments or
branches of the network while aligning with central policies.
- Rapid Troubleshooting: Address issues within their designated segments swiftly to minimize downtime.
- Policy Coordination: Work in coordination with central IT teams to ensure consistency in security
policies and configurations across the organization.

Note
The delegation of administrative tasks has been identified as a key strategy for scaling network management in
[p.17]
large enterprises (Nemeth et al., 2017).2 *

10
Diverse Role and Scope

3. Expectations of a Computer Network Administrator


3.1. Diverse Role and Scope
A Computer Network Administrator's role is inherently multifaceted. Much like the broader concept of system
administration—which covers everything from servers to mobile devices—the network administrator focuses
on the intricate web of connectivity. This includes:

- Network Troubleshooting & Maintenance: Handling day-to-day issues, performing regular system
checks, and ensuring that connectivity is seamless.
- Adaptability: Recognizing that responsibilities can vary greatly across organizations—even within the
same company, roles can differ significantly.

3.2. Infrastructure Management and Deployment


Network administrators are expected to:

- Design and Deploy Networks: Plan and implement network infrastructure, including routers, switches,
and cabling, in a way that is both scalable and secure.
- Maintain Integration: Ensure that the network integrates smoothly with other IT components, reflecting
the notion of a “computer-human system” where technology supports broader organizational goals.

3.3. Security and Resilience


In an age where threats evolve rapidly:

- Security First: Implement firewalls, intrusion detection systems, and routine security audits to guard
against breaches.
- Resilience and Recovery: Establish robust protocols for fault diagnosis and recovery—paralleling case
studies like the /dev/null bug—to minimize downtime and protect data integrity.

3.4. Comprehensive Skill-set and Continuous Learning


Expectations extend beyond technical know-how:

- Diverse Expertise: From hardware assembly and cabling to software troubleshooting and network
protocol management, a network administrator must juggle multiple skills simultaneously.
- Ongoing Professional Development: Given the dynamic nature of technology, staying updated with
emerging trends and new tools is a constant expectation. This mirrors the field's evolution from
informal practices to a more structured, professional discipline.

3.5. Strategic Planning and Policy Documentation


Beyond the operational aspects:

- System Design Principles: Emphasizing scalability, security, and simplicity (as highlighted by the
“Three Pillars of System Design”), network administrators must plan for future growth while
maintaining a streamlined, secure network environment.
- Documentation and Standards: Clear documentation of configurations, policies, and troubleshooting
procedures is vital. This practice ensures consistency and helps guide future network improvements.

11
IT Network Administration Decision-Making Levels

3.6. Ethical and Professional Responsibility


Lastly, the role carries a deep ethical dimension:

- Stewardship of the Digital Ecosystem: Network administrators are not only technical experts but also
custodians of an organization's digital communications. Their work ensures that information flows
efficiently and securely—safeguarding both organizational goals and user trust.
- Bridging Technology and Humanity: Their responsibilities underscore the importance of managing
complex computer-human systems, ensuring that technical decisions are aligned with broader societal
and ethical considerations.

Extra
In essence, the expectations of a Computer Network Administrator are to blend technical mastery with strategic
vision and ethical stewardship. They are tasked with building and maintaining a resilient, secure network
environment that not only meets today's operational demands but is also agile enough to adapt to future
challenges.

12
IT Network Administration Decision-Making Levels

4. IT Network Administration Decision-Making Levels


4.1. IT Network Administration Decision-Making Levels

In IT network administration, decision-making is organized into a hierarchical framework that aligns technical
actions with business objectives. This framework is divided into three distinct levels: strategic, tactical, and
operational. Together, these levels ensure that technical decisions support the overall goals of the organization
while maintaining clear communication between management and technical teams, and providing a
[p.15][p.15] [p.15] [p.15]
road * *

map *

for scalability *

, security, and performance.

4.1.1. Strategic Level

Fundamental
At the strategic level, decisions are made with a long-term vision in mind. This level sets the overall goals and
policies for the network by focusing on:

- Long-Term Planning: Anticipating future needs such as cloud integration or the implementation of
[p.15]
SD-WAN . *

- Policy and Governance: Establishing security policies and disaster recovery plans that guide the
network's evolution.
- Business Alignment: Ensuring that network strategies directly support and enhance business goals.

Example
A practical example is the transition from an on-premises system to a hybrid cloud model, a change that reflects
both a forward-looking strategy and a commitment to scalability.

4.1.2. Tactical Level

Fundamental
The tactical level translates the strategic vision into actionable plans. It involves decisions that include:

- Resource Allocation: Evaluating available technologies and budgeting appropriately to meet the
network's needs.
- Network Design: Implementing specific network topologies and configuration standards.
- Integration: Coordinating with system administrators to select and implement authentication methods
and other supporting technologies.

Example
For instance, deploying a secure remote access solution such as multifactor authentication illustrates how
tactical decisions are used to address immediate technical requirements while staying aligned with broader
strategic goals.

13
Integration with System Administration

4.1.3. Operational Level

Fundamental
At the operational level, the focus is on day-to-day management and maintenance. This includes:

- Real-Time Monitoring: Utilizing tools like SNMP, NetFlow, and SIEM systems to continuously track
network performance.
- Configuration Management: Performing routine updates and patch management to ensure the network
remains secure and efficient.
- Incident Response: Activating predefined protocols during outages or breaches, such as mitigating a
DDoS attack by limiting traffic and isolating affected segments.

Example
This level addresses the immediate challenges of network administration, ensuring that systems run smoothly
daily.

4.2. Integration with System Administration

Method
Effective network administration requires integrating these decision-making levels with broader system
administration practices. This integration is achieved by:

- Strategic Alignment: Understanding long-term goals to enable seamless integration.


- Tactical Coordination: Ensuring that server configurations are consistent with network standards.
- Operational Execution: Carrying out tasks within established frameworks to maintain continuity.

Automation tools, such as Ansible or Terraform, support this integrated approach by promoting consistency and
efficiency, while ongoing learning keeps administrators updated with evolving protocols and frameworks.

4.3. Conclusion and Key Takeaways


In summary, the decision-making process in IT network administration is structured into three levels:

- Strategic Level: Sets the vision and policies.


- Tactical Level: Converts the vision into concrete plans.
- Operational Level: Manages day-to-day activities.

This integrated approach ensures that technical decisions support the organization's objectives, enhancing
resilience, security, and scalability. It also establishes a clear pathway for continuous

improvement, promoting an interdisciplinary collaboration between network and system administration.

14
Glossary

Glossary
Authentication

is the process of verifying the identity of a user, device, or system before granting access to resources. It
ensures that only authorized entities can access a network, application, or data.

RBAC (Role-Based Access Control)

RBAC (Role-Based Access Control) is a widely used access control mechanism for managing user
permissions to system resources. The core idea of RBAC is to assign permissions through roles rather than
directly assigning them to users. This approach simplifies permission management and enhances system
security and maintainability.

roadmap

roadmap: is a strategic plan that outlines the steps, tools, and milestones needed to manage, maintain, and
improve an organization's IT infrastructure. It helps sysadmins prioritize tasks, allocate resources, and ensure
systems are secure, efficient, and scalable.

Scalability

Scalability: refers to the ability of a system, network, or process to handle growth—whether it's an increase
in users, data, workload, or complexity—without compromising performance or reliability. In the context of
IT and system administration, scalability ensures that infrastructure can adapt to growing demands efficiently.

Software-Defined Wide Area Network

SD-WAN (Software-Defined Wide Area Network) is a technology that simplifies the management and
operation of a WAN by decoupling the networking hardware from its control mechanism. It uses software to
intelligently route traffic across the WAN, improving performance, reducing costs, and enhancing security.

15
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
Abbreviations meaning

Abbreviation
BGP : Border Gateway Protocol

GCP : Google Cloud Platform

ISIS : Intermediate System to Intermediate System

OSPF : Open Shortest Path First

RBAC : Role-Based Access Control

16
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
References

References
1
Limoncelli, T. A., Hogan, C., & Chalup, S. R. (2007). The Practice of System and Network Administration.
Addison-Wesley Professional.

2
Nemeth, E., Snyder, G., Hein, T. R., Whaley, B., & Mackin, D. (2017). UNIX and Linux System Administration
Handbook (5th ed.). Prentice Hall.

4
Ferraiolo, D. F., Kuhn, D. R., & Sandhu, R. (2003). Role-Based Access Control: Policy Specification, Modeling,
and Analysis. IEEE Computer, 36(9), 40–47.

5
Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR),
28(1), 241-243.

17
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/

You might also like