Small Web Hosting Company Study Case Windows 2016 Web Server Public/Private IP 103.28.251.162/192.168.0.1 Windows 2016 Server Public/Private IP 103.28.250.99/192.168.0.2 Web Server Firewall Configurations HTTP : HTTP uses port 80 for communications. Thus port 80 has to be open. From the firewall settings, the World Wide Web Services (HTTP) should be on so it can respond for… Continue reading Firewall Rule Based Management
Blog Feed
Lab 8 Accessing iSCSI Storage
Add VMKernel Port Group to a Standard Switch Go to your vSphere web client and Hosts and Clusters. Click on the ESXi host form the navigator pane and then select the Configure tab from the middle pane. Select VMKernel Adapters under Networking. Figure 1. VMKernel adapters configuration Click on Add host networking icon. Select VMKernel… Continue reading Lab 8 Accessing iSCSI Storage
Lab 7 Using Standard Switches
View the Standard Switch Configuration First of all, access your vSphere Web Client and go to Hosts and Clusters tab from the navigation pane and select an ESXi host. On the center pane, choose the Configure tab and select Virtual switches. Click on one of the switch on the list. Figure 1. Virtual switch information… Continue reading Lab 7 Using Standard Switches
Lab 6 Creating Folders in vCenter Server Appliance
Create a Host and Cluster Folder To start with the task, go in to your vCenter web client. In the Hosts and Clusters page, right-click the datacenter on the left pane and go to New Folder > New Host and Cluster Folder. Figure 1. Create new host and cluster folder A window will appear and… Continue reading Lab 6 Creating Folders in vCenter Server Appliance
NAT and OpenSSH
NAT Firewall NAT stands for Network Address Translation which is a process of providing access of private network computers using a public IP to connect to the internet. The main idea of NAT is to assign private IPs in the network so that it would use the NAT for any communications to the internet. This… Continue reading NAT and OpenSSH
Managing Certificates
AD Certificate Services and CA Web Enrollment Active Directory Certificate Services equips a server with the ability to establish and manage certificate authority (CA) and certificates. Depends on what services will be installed in a server, AD certificate services also provides enrollment services to help the interaction between clients and CA regarding certificates. One of… Continue reading Managing Certificates
Credibility Check
Computational Thinking Topic Computational thinking and thinking about computing URL : https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2696102/ Search term : Computational thinkingHow it was found : Google scholar searchAuthor : Jeanette M. WingPublishing date : 31 July 2008Publication type : Online JournalCredibility : Credible. It is published by a credible author whom journals have been cited more than 1000 times.… Continue reading Credibility Check
Understanding PKI Concepts
Root CA and Subordinate CA We will hear these terminology from the PKI authentication happening in various communication made between server and users. Certificate Authority (CA) is basically a company or an organization who has the rights to create a certificate for a certain server for its public key validity. Users will rely on certificates… Continue reading Understanding PKI Concepts
Lab 2 Configuring ESXi Host
In this post, we will cover the basic introduction of an ESXi machines and the network configuration of it. It is a really simple configuration and we will go through step by step here. As we power on the machine, we will be greeted with a gray and yellow display. Press F2 to enter your… Continue reading Lab 2 Configuring ESXi Host
Lab 1 Installing ESXi
Installing an ESXi is mostly done on bare metal which means it does not need an OS installed. However, in this tutorial, I will cover the steps to install ESXi on a virtual machine in vSphere. Preparing the VM We will start by creating a new virtual machine (VM) to meet the requirements for ESXi.… Continue reading Lab 1 Installing ESXi