Blog Feed

Firewall Rule Based Management

Small Web Hosting Company Study Case Windows 2016 Web Server Public/Private IP 103.28.251.162/192.168.0.1 Windows 2016 Server Public/Private IP 103.28.250.99/192.168.0.2 Web Server Firewall Configurations HTTP : HTTP uses port 80 for communications. Thus port 80 has to be open. From the firewall settings, the World Wide Web Services (HTTP) should be on so it can respond for… Continue reading Firewall Rule Based Management

Lab 8 Accessing iSCSI Storage

Add VMKernel Port Group to a Standard Switch Go to your vSphere web client and Hosts and Clusters. Click on the ESXi host form the navigator pane and then select the Configure tab from the middle pane. Select VMKernel Adapters under Networking. Figure 1. VMKernel adapters configuration Click on Add host networking icon. Select VMKernel… Continue reading Lab 8 Accessing iSCSI Storage

Lab 7 Using Standard Switches

View the Standard Switch Configuration First of all, access your vSphere Web Client and go to Hosts and Clusters tab from the navigation pane and select an ESXi host. On the center pane, choose the Configure tab and select Virtual switches. Click on one of the switch on the list. Figure 1. Virtual switch information… Continue reading Lab 7 Using Standard Switches

Lab 6 Creating Folders in vCenter Server Appliance

Create a Host and Cluster Folder To start with the task, go in to your vCenter web client. In the Hosts and Clusters page, right-click the datacenter on the left pane and go to New Folder > New Host and Cluster Folder. Figure 1. Create new host and cluster folder A window will appear and… Continue reading Lab 6 Creating Folders in vCenter Server Appliance

Managing Certificates

AD Certificate Services and CA Web Enrollment Active Directory Certificate Services equips a server with the ability to establish and manage certificate authority (CA) and certificates. Depends on what services will be installed in a server, AD certificate services also provides enrollment services to help the interaction between clients and CA regarding certificates. One of… Continue reading Managing Certificates

Credibility Check

Computational Thinking Topic Computational thinking and thinking about computing URL : https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2696102/ Search term : Computational thinkingHow it was found : Google scholar searchAuthor : Jeanette M. WingPublishing date : 31 July 2008Publication type : Online JournalCredibility : Credible. It is published by a credible author whom journals have been cited more than 1000 times.… Continue reading Credibility Check

Understanding PKI Concepts

Root CA and Subordinate CA We will hear these terminology from the PKI authentication happening in various communication made between server and users. Certificate Authority (CA) is basically a company or an organization who has the rights to create a certificate for a certain server for its public key validity. Users will rely on certificates… Continue reading Understanding PKI Concepts