Network Operations and Management logbook
VerifiedAdded on 2023/01/23
|66
|5403
|75
AI Summary
This logbook provides a detailed account of the installation and configuration of Windows Server, DNS, and IIS in a Network Operations and Management lab. It includes step-by-step instructions, screenshots, and explanations of the process. The logbook covers topics such as installing the virtual machine, setting up the network, installing Windows Server, configuring DNS, and managing the Microsoft IIS.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network Operations and Management logbook
Student Name
College
Student Name
College
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Lab-2 Network Operations and Management
Installing Windows Server and Configuring DNS and IIS in Windows
The task which was to be performed in this particular lab session was administrative tasks which
is done in a windows server 2016 version, the configuration of the DNS is also done in the same
windows server 2016.
The main objectives of the session includes the following
i. Installation and configuration of the Microsoft windows server 2016 version on a
virtual machine.
ii. Installation and configuration of the DNS on the Microsoft windows server 2016
version together with setting up of the DNS on the virtual machine for the domain:
eng657testdomain74.com.
I. Installation of the Virtual Machine
For the above to be achieved, then the very first step is to download the virtual machine ware
direct from the Netserve website. After downloading, the VMware is then installed from the
terminal chmod 755 VMware-Player-14.1.0-6661328.x86_64.bundle
#./VMware-Player-7.1.0-2496824.x86_64.bundle.
The process of downloading and terminal installation is shown in the below diagram.
Installing Windows Server and Configuring DNS and IIS in Windows
The task which was to be performed in this particular lab session was administrative tasks which
is done in a windows server 2016 version, the configuration of the DNS is also done in the same
windows server 2016.
The main objectives of the session includes the following
i. Installation and configuration of the Microsoft windows server 2016 version on a
virtual machine.
ii. Installation and configuration of the DNS on the Microsoft windows server 2016
version together with setting up of the DNS on the virtual machine for the domain:
eng657testdomain74.com.
I. Installation of the Virtual Machine
For the above to be achieved, then the very first step is to download the virtual machine ware
direct from the Netserve website. After downloading, the VMware is then installed from the
terminal chmod 755 VMware-Player-14.1.0-6661328.x86_64.bundle
#./VMware-Player-7.1.0-2496824.x86_64.bundle.
The process of downloading and terminal installation is shown in the below diagram.
Just after the command is executed in the terminal, then we went to the installation page in order
to install the VMware as shown below.
After the installation of the virtual machine is complete, the below shows how the later looks
like.
to install the VMware as shown below.
After the installation of the virtual machine is complete, the below shows how the later looks
like.
In order to correctly set up the virtual machine network, then the following files have to be
modified in the local host
/etc/vmware/vmnet8/dhcpd/dhcpd.conf
/etc/vmware/vmnet8/nat/nat.conf
/etc/vmware/networking
In the very first step, we went directly to the file named dhck.conf and the ip address in that file is
modified. This is shown in the screenshot below as follows.
modified in the local host
/etc/vmware/vmnet8/dhcpd/dhcpd.conf
/etc/vmware/vmnet8/nat/nat.conf
/etc/vmware/networking
In the very first step, we went directly to the file named dhck.conf and the ip address in that file is
modified. This is shown in the screenshot below as follows.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In the networking file we changed the ip address for Host Only Netmask and Subnet shown in the
screenshot below.
After the change in the IP address, then we went directly to the nat.conf file, the gateway is
modified in the nat.conf file as shown in the screesnshot which can be seen below.
screenshot below.
After the change in the IP address, then we went directly to the nat.conf file, the gateway is
modified in the nat.conf file as shown in the screesnshot which can be seen below.
Now, the files have been modified, the next step is to check the network which is customized.
This is done by typing the command #service vmware start
Then we ran the command #ifconfig in order to check the network configuration. ifconfig is a
framework organization utility in Unix-like working frameworks for system interface setup. The
utility is a direction line interface device and is additionally utilized in the framework startup
contents of many working frameworks. This is which is shown in the below screenshot.
II. Installing Windows server 2016 on a Virtual Machine
This is done by typing the command #service vmware start
Then we ran the command #ifconfig in order to check the network configuration. ifconfig is a
framework organization utility in Unix-like working frameworks for system interface setup. The
utility is a direction line interface device and is additionally utilized in the framework startup
contents of many working frameworks. This is which is shown in the below screenshot.
II. Installing Windows server 2016 on a Virtual Machine
For the installation of the windows server 2016 on the VMware, the command vmplayer is typed
on the terminal which now launches the virtual machine.
The commands is responsible for triggering the VM machine to start. This is shown in the below
screenshot.
After the virtual machine has create, then we clicked on the create new virtual machine as shown
in the below screenshot.
on the terminal which now launches the virtual machine.
The commands is responsible for triggering the VM machine to start. This is shown in the below
screenshot.
After the virtual machine has create, then we clicked on the create new virtual machine as shown
in the below screenshot.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
We created a virtual machine using ISO image, which is available at the following locations on
the host’s file system:
/root/ENG657.install/windows2016server.iso
Following the set of instruction s which were given in the lab sheet, we changed the name which
was in the windows server 2016 version. This is shown in the below screenshot.
the host’s file system:
/root/ENG657.install/windows2016server.iso
Following the set of instruction s which were given in the lab sheet, we changed the name which
was in the windows server 2016 version. This is shown in the below screenshot.
After that, we then saved the operation in the location /vmware/win2016server.
A host memory of 2GB was then created to the virtual machine.
We then created a new virtual disk of 60 GB in size.
A host memory of 2GB was then created to the virtual machine.
We then created a new virtual disk of 60 GB in size.
After the allocation of the disks and memories, the installation process was completed, then the
virtual machine for windows server 2016 was then ready. The same is shown in the screenshot
below when we can see the vmware being launched.
The very first task which we need was the installation and setting op of the IP address which was
done by going to the setting and the set up was done. We also set up the gateway for the windows
virtual machine to its default as 192.168.1.2 this gateway corresponds to the gateway of the
virtual network device which is on the linux host in the directory device /dev/vmnet8.
virtual machine for windows server 2016 was then ready. The same is shown in the screenshot
below when we can see the vmware being launched.
The very first task which we need was the installation and setting op of the IP address which was
done by going to the setting and the set up was done. We also set up the gateway for the windows
virtual machine to its default as 192.168.1.2 this gateway corresponds to the gateway of the
virtual network device which is on the linux host in the directory device /dev/vmnet8.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
We then went to the command prompt and we used the command ping and the ipconfig in order
to check the configuration of the network which in this case can be clearly seen in the screenshot
below.
#ping which is a software utility administration of a computer network which is purposed at
testing if the host is reachable in the IP network. The ping is available in the all types of virtual
operating system for this case including the windows server version 2016 which is being
installed. The ping measures the round trip time for the text messages which are sent direct from
the host which the messages are originating to the destination computer which in turn echoes
back to the sender of the message.
to check the configuration of the network which in this case can be clearly seen in the screenshot
below.
#ping which is a software utility administration of a computer network which is purposed at
testing if the host is reachable in the IP network. The ping is available in the all types of virtual
operating system for this case including the windows server version 2016 which is being
installed. The ping measures the round trip time for the text messages which are sent direct from
the host which the messages are originating to the destination computer which in turn echoes
back to the sender of the message.
Then after #ping is done, #ipconfig is followed as shown in the below screenshot.
III. Installation and Configuration of the DNS in Windows Server 2016
Our errand is to set up the DNS for eng657testdomain74.com.To do this we went to the server
oversaw and clicked Add jobs and highlights. At that point we chose DNS server in the select
III. Installation and Configuration of the DNS in Windows Server 2016
Our errand is to set up the DNS for eng657testdomain74.com.To do this we went to the server
oversaw and clicked Add jobs and highlights. At that point we chose DNS server in the select
server jobs page as appeared in the screen capture beneath. At that point we finished rest of the
systems and Finished the establishment.
In the wake of introducing DNS, our tasK was to arrange it. The primary system was to set up
Forward Lookup Zone document for the eng657testdomain74.com domain. At that point set up
switch query zone document in comparable way.As appeared in the screen capture beneath we
effectively made another zone for Forward Lookup and Reverse Lookup zones
systems and Finished the establishment.
In the wake of introducing DNS, our tasK was to arrange it. The primary system was to set up
Forward Lookup Zone document for the eng657testdomain74.com domain. At that point set up
switch query zone document in comparable way.As appeared in the screen capture beneath we
effectively made another zone for Forward Lookup and Reverse Lookup zones
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
At that point our assignment in designing DNS is to include the host records. You added to two
host
Win2016server at 192.168.1.3 educating at 192.168.2.74
host
Win2016server at 192.168.1.3 educating at 192.168.2.74
At that point we chose the Primary server for as SOA appeared in the screen capture underneath.
At that point we made sanctioned named www which is a false name for our PC which can be
found in the screen capture beneath.
Designing Client-Side DNS in Windows
At that point we made sanctioned named www which is a false name for our PC which can be
found in the screen capture beneath.
Designing Client-Side DNS in Windows
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Our next undertaking was to include customer side DNS in Windows. we arranged Windows PCs
to utilize the DNS server which we just made to determine names.
We gave the ip address - 192.168.1.74
At that point we set the Preferred DNS server address as 192.168.1.3 and substitute as
148.197.28.1 which can be found in the screen capture beneath.
to utilize the DNS server which we just made to determine names.
We gave the ip address - 192.168.1.74
At that point we set the Preferred DNS server address as 192.168.1.3 and substitute as
148.197.28.1 which can be found in the screen capture beneath.
At that point we pinged win2016server.eng657testdomain74.com and
teaching.eng657testdomain74.com.The screen capture beneath demonstrates that the pings were
effective.
At that point We did the nslookup test that is appeared in the screen capture beneath.
teaching.eng657testdomain74.com.The screen capture beneath demonstrates that the pings were
effective.
At that point We did the nslookup test that is appeared in the screen capture beneath.
#nslookup win2016server.eng657testdomain74.com
#nslookup teaching.eng657testdomain74.com
At that point our next undertaking was to make an additional host.We named it staff and ip
address - 192.168.1.174 as appeared in the screen capture beneath.
#nslookup teaching.eng657testdomain74.com
At that point our next undertaking was to make an additional host.We named it staff and ip
address - 192.168.1.174 as appeared in the screen capture beneath.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
At that point we made an assumed name support for our PC. To enable instructing and staff to
work, we add the IP address to our PC.
work, we add the IP address to our PC.
IV. Installation and management of the Microsoft IIS
For the installation of the IIS in the windows server 2016, we logged in to the windows server
2016 as an administrator an local level and we had to set up the passwords for the server
administrator as Localhost1. The process of setting up the passwords as described above is shown
in the screenshot t which is attached below.
For the installation of the IIS in the windows server 2016, we logged in to the windows server
2016 as an administrator an local level and we had to set up the passwords for the server
administrator as Localhost1. The process of setting up the passwords as described above is shown
in the screenshot t which is attached below.
In this assignment we have to set up IIS from the server supervisor. So we went to server
supervisor and chose server roles. In the select server jobs menu we tapped on Web server (IIS)
and clicked next as appeared in the screen capture beneath.
At that point we finished the remainder of the, methodology for the establishment and afterward
the establishment started which can be found in the screen capture underneath.
supervisor and chose server roles. In the select server jobs menu we tapped on Web server (IIS)
and clicked next as appeared in the screen capture beneath.
At that point we finished the remainder of the, methodology for the establishment and afterward
the establishment started which can be found in the screen capture underneath.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point we downloaded google chrome to test our webserver. After establishment google
chrome , we opened it and composed "http://localhost/" in the URL to test.The screen capture
beneath demonstrates the outcome we got after we ran the web server.
After this we made a html page and spared it in the wwwroot organizer.
chrome , we opened it and composed "http://localhost/" in the URL to test.The screen capture
beneath demonstrates the outcome we got after we ran the web server.
After this we made a html page and spared it in the wwwroot organizer.
At that point we composed our host name: http://www.eng657testdomain74.com and our
program will show the page which we just made which can be found in the screen capture
underneath:
At that point we made another registry test74 .So as a matter of first importance, we have to make
another catalog on the record framework . We tapped the default web server in the Internet
Information Services Manager board we right-clicked, and pick "Include Virtual Directory".
program will show the page which we just made which can be found in the screen capture
underneath:
At that point we made another registry test74 .So as a matter of first importance, we have to make
another catalog on the record framework . We tapped the default web server in the Internet
Information Services Manager board we right-clicked, and pick "Include Virtual Directory".
At that point we made a html document named VDtest 74 and spared it in the site envelope
appeared in the screen capture beneath.
At that point we opened the program window and composed in the URL:
http://win2016server.eng657testdomain74.com/test**/VDtest**.htm which open the our
VDtest74 document that we made as appeared in the screen capture beneath.
Conclusion
In conclusion, the for the installation and management of the Microsoft IIS, then must be
procedures which are to be followed in correctness. The process began by installing the virtual
machine in the computer. The virtual machine in the Linux operating system will hence give a
platform for the running different operating system on top of the Linux operating system. After
the installation of the virtual machine, then the windows server operating system is installed in
appeared in the screen capture beneath.
At that point we opened the program window and composed in the URL:
http://win2016server.eng657testdomain74.com/test**/VDtest**.htm which open the our
VDtest74 document that we made as appeared in the screen capture beneath.
Conclusion
In conclusion, the for the installation and management of the Microsoft IIS, then must be
procedures which are to be followed in correctness. The process began by installing the virtual
machine in the computer. The virtual machine in the Linux operating system will hence give a
platform for the running different operating system on top of the Linux operating system. After
the installation of the virtual machine, then the windows server operating system is installed in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
the virtual machine. It is the virtual machine which now contain the windows server and the
virtual machine is contained by the Linux Operating system. At this point, the installation and
configuration of the windows server as to be systematic to ensure that it is done will utmost
correctness since the command of the system are a bit confusing. The installation and
configuration of the DNS in the windows is then done using the commands. After the installation
of the DNS is well the IIS is installed.
virtual machine is contained by the Linux Operating system. At this point, the installation and
configuration of the windows server as to be systematic to ensure that it is done will utmost
correctness since the command of the system are a bit confusing. The installation and
configuration of the DNS in the windows is then done using the commands. After the installation
of the DNS is well the IIS is installed.
Lab 3-Network Operations and Management Laboratory
LY-3: Implementing Virtual Hosting in IIS and Apache
IP Based Virtual Hosting in Apache
The very first task here is to do the configuration of the apache httpd, this is done on the machine
that hosts the virtual machine. The configuration of the apache HTTP server is done by placing
the directives inside the text which is plain, this text is the config file. The main file for
configuration is normally called the httd.conf. the file location is always set as the time for
compilation though it might be overridden by the line flag of the –f command . in addition to the
above, the addition of other files might be done by the use of the include directive , also the
wildcard might be used in the addition of as many config files as possible.
After the configuration of the apache httpd, then the block is added then defined servername is
performed together with the DocumentRoot which are within the httpd.conf file.
Exercise 1: We were supposed to set up the DNS, the very first task is creation of the directories
and also a simple we page for the purpose of hosting it virtually.
www.eng657IPdomainone74.com and www.eng657IPdomaintwo74.com, then we have to
configure the IP Based Virtual Hosts on our real machine and not the virtual machine, by the use
the IP addresses indicated below 192.168.0.74 ( www.eng657IPdomainone74.com ) and
192.168.0.74 ( www.eng657IPdomaintwo74 ) which we have already assigned. Then opened a
Web browser to test it.
For the above to take place then we have to create a HTML file which is for the domain one and
also for the domain two which we already saved in the folder which was created in the htdocs
folder. The html file was named portsmouth.html and london.html.
LY-3: Implementing Virtual Hosting in IIS and Apache
IP Based Virtual Hosting in Apache
The very first task here is to do the configuration of the apache httpd, this is done on the machine
that hosts the virtual machine. The configuration of the apache HTTP server is done by placing
the directives inside the text which is plain, this text is the config file. The main file for
configuration is normally called the httd.conf. the file location is always set as the time for
compilation though it might be overridden by the line flag of the –f command . in addition to the
above, the addition of other files might be done by the use of the include directive , also the
wildcard might be used in the addition of as many config files as possible.
After the configuration of the apache httpd, then the block is added then defined servername is
performed together with the DocumentRoot which are within the httpd.conf file.
Exercise 1: We were supposed to set up the DNS, the very first task is creation of the directories
and also a simple we page for the purpose of hosting it virtually.
www.eng657IPdomainone74.com and www.eng657IPdomaintwo74.com, then we have to
configure the IP Based Virtual Hosts on our real machine and not the virtual machine, by the use
the IP addresses indicated below 192.168.0.74 ( www.eng657IPdomainone74.com ) and
192.168.0.74 ( www.eng657IPdomaintwo74 ) which we have already assigned. Then opened a
Web browser to test it.
For the above to take place then we have to create a HTML file which is for the domain one and
also for the domain two which we already saved in the folder which was created in the htdocs
folder. The html file was named portsmouth.html and london.html.
At that point we made a record name named.eng657ipdomainone74.com and
named.eng657ipdomaintwo.com.We composed the required in data in the document appeared in
the screen captures beneath.
At that point we altered the named.28.197.148 record .We included the ip address and the
piquet.eng657ipdomainone74.com and piquet.eng657ipdomaintwo74.com in the document
appeared in the screen capture beneath.
named.eng657ipdomaintwo.com.We composed the required in data in the document appeared in
the screen captures beneath.
At that point we altered the named.28.197.148 record .We included the ip address and the
piquet.eng657ipdomainone74.com and piquet.eng657ipdomaintwo74.com in the document
appeared in the screen capture beneath.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point we went to the httpd.conf document and included the accompanying in data which
can be found in the screen capture beneath.
At that point we included the required zones in the named.conf document appeared in the screen
capture beneath.
At that point we ran the webserver to test it.And as should be obvious we the test was fruitful
can be found in the screen capture beneath.
At that point we included the required zones in the named.conf document appeared in the screen
capture beneath.
At that point we ran the webserver to test it.And as should be obvious we the test was fruitful
Name Based Virtual Hosting
Our next errand was to design a solitary IP address to have multiple Web locales, we arranged
each Web website, to utilize a similar IP address, yet an alternate host name.
To do this we went to named.conf record and included another zone.We named the site
eng657portsmouth.com and spared it in domainone envelope
At that point we ran it in the internet browser to test it and the screen capture beneath
demonstrates that it was effective
At that point ou task was to have multiple destinations by port numbers. In exercise 2,we have
two domains setting off to a similar IP. So as to serve diverse ports for each host, you could
characterize the port number as pursues:
Our next errand was to design a solitary IP address to have multiple Web locales, we arranged
each Web website, to utilize a similar IP address, yet an alternate host name.
To do this we went to named.conf record and included another zone.We named the site
eng657portsmouth.com and spared it in domainone envelope
At that point we ran it in the internet browser to test it and the screen capture beneath
demonstrates that it was effective
At that point ou task was to have multiple destinations by port numbers. In exercise 2,we have
two domains setting off to a similar IP. So as to serve diverse ports for each host, you could
characterize the port number as pursues:
We set the port number as 8080 which we altered in the httpd.conf.
At that point we tried it in the webbrowser and it was fruitful.
Our assignment 4 was to make virtual hosts for two of the offices in Faculty of Technology at
University of Portsmouth. Each Web webpage ought to have their very own log documents to log
any blunder the website experiences and record all solicitations prepared by the webpage. First
we made move one_log page in and spared it in the logs envelope.
At that point we went to httpd.conf page to change it which can be found in the screen capture
underneath.
At that point we tried it in the webbrowser and it was fruitful.
Our assignment 4 was to make virtual hosts for two of the offices in Faculty of Technology at
University of Portsmouth. Each Web webpage ought to have their very own log documents to log
any blunder the website experiences and record all solicitations prepared by the webpage. First
we made move one_log page in and spared it in the logs envelope.
At that point we went to httpd.conf page to change it which can be found in the screen capture
underneath.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Our last errand was to arrange our Web server to serve a similar substance from a similar domain
for example www.ipdomaintheree74.com on two diverse IP addresses : 192.168.1.5 and
192.168.1.4. To do this we included the zone appeared in the screen capture underneath:
The we made a record named named.eng657ipdomainthree74.com in the content tool. We
included the ip address 192.168.1.4 and 192.168.1.5 appeared in the screen capture beneath.
At that point we made a html page and named it domain three.html
for example www.ipdomaintheree74.com on two diverse IP addresses : 192.168.1.5 and
192.168.1.4. To do this we included the zone appeared in the screen capture underneath:
The we made a record named named.eng657ipdomainthree74.com in the content tool. We
included the ip address 192.168.1.4 and 192.168.1.5 appeared in the screen capture beneath.
At that point we made a html page and named it domain three.html
At that point we ran the ip address in the internet browser which took us to the domain three.html
which we made as appeared in the screen capture underneath 192.168.1.4
At that point we ran the ip address in the internet browser which took us to the domain three.html
which we made as appeared in the screen capture underneath 192.168.1.5
which we made as appeared in the screen capture underneath 192.168.1.4
At that point we ran the ip address in the internet browser which took us to the domain three.html
which we made as appeared in the screen capture underneath 192.168.1.5
Conclusion
This lab sheet was on implementation of the virtual hosting in the IIS and apache. The
configuration of ache is also discussed in this lab sheet. The practical demonstrated how apache
is configured and how virtual hosting is done. This process is very important in network
operations and management as it equips the learner with proper knowledge on how the hosting is
done and how the httpd work.
This lab sheet was on implementation of the virtual hosting in the IIS and apache. The
configuration of ache is also discussed in this lab sheet. The practical demonstrated how apache
is configured and how virtual hosting is done. This process is very important in network
operations and management as it equips the learner with proper knowledge on how the hosting is
done and how the httpd work.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Network Operations and Management
Laboratory LY-4: Creating User Web Sites and Securing Apache Web Server
For this particular lab, we learned on how the web sites are created on apache web server, also
how the user management tool is provided in the apache web server and the method of restricting
the access based on the user the client ip address and the domain name.
Our very first task here is to set up the apache in order to allow the web sites for the user. In order
for this to be achieved , then we have to modify the httpd.conf file. The modification is done by
adding the following below information as shown in the screenshot.
We are therefore required to uncomment all those line Load Module modules/mod_userdir.
Therefore, by the action of removing the hashtag, the modification is thereby done, then we have
to save the file and then make sure that the server is restarted.
After that, we had to open the terminal for the window then type add user Nash after which we
pressed the enter button. We also typed passwd Nash and we also pressed enter button. The
system then prompted us to enter the new password, we entered the password localhost1. Then
the system also prompted us to renter the password then we typed the same password then
followed by chmod 711 /home/Nash and then pressed enter key. This is shown in the below
screenshot.
Laboratory LY-4: Creating User Web Sites and Securing Apache Web Server
For this particular lab, we learned on how the web sites are created on apache web server, also
how the user management tool is provided in the apache web server and the method of restricting
the access based on the user the client ip address and the domain name.
Our very first task here is to set up the apache in order to allow the web sites for the user. In order
for this to be achieved , then we have to modify the httpd.conf file. The modification is done by
adding the following below information as shown in the screenshot.
We are therefore required to uncomment all those line Load Module modules/mod_userdir.
Therefore, by the action of removing the hashtag, the modification is thereby done, then we have
to save the file and then make sure that the server is restarted.
After that, we had to open the terminal for the window then type add user Nash after which we
pressed the enter button. We also typed passwd Nash and we also pressed enter button. The
system then prompted us to enter the new password, we entered the password localhost1. Then
the system also prompted us to renter the password then we typed the same password then
followed by chmod 711 /home/Nash and then pressed enter key. This is shown in the below
screenshot.
At that point we made the public_html index for nash and Gave Nash ownership of public_html
by composing chown Nash/home/Nash/public_html and clutched enter.
At that point we set access authorizations for this catalog by composing the direction: chmod
755/home/Nash/public_html and after that we squeezed enter which can be found in the screen
capture beneath.
Our next errand was to make a Web page and test the arrangement. We changed client to Nash
and made a straightforward website page under public_html catalog and spared the document as
index.html.
Index.html page
by composing chown Nash/home/Nash/public_html and clutched enter.
At that point we set access authorizations for this catalog by composing the direction: chmod
755/home/Nash/public_html and after that we squeezed enter which can be found in the screen
capture beneath.
Our next errand was to make a Web page and test the arrangement. We changed client to Nash
and made a straightforward website page under public_html catalog and spared the document as
index.html.
Index.html page
The belows screen capture demonstrates the testing of the setup which we had simply done.We
went to the internet browser and composed localhost/~Nash which demonstrated to us the page
which we made named index.html.
Designing client Authentication in Apache
In this undertaking we needed to set up validation on a Web server for the entire Web webpage or
just for chose registries.
In this tas we got IP address (148.197.28.81)from other understudy server (customer machine) on
the network.we made an index beneath the record foundation of our Web server called test. In the
registry, we make a Web page called secure.html with the message "This is a Secure Area".Then
we designed our web server to enable access to the test index to the customer from the customer
machine and deny access to every other person.
The screen capture underneath demonstrates the website page that we made named secure.html.
went to the internet browser and composed localhost/~Nash which demonstrated to us the page
which we made named index.html.
Designing client Authentication in Apache
In this undertaking we needed to set up validation on a Web server for the entire Web webpage or
just for chose registries.
In this tas we got IP address (148.197.28.81)from other understudy server (customer machine) on
the network.we made an index beneath the record foundation of our Web server called test. In the
registry, we make a Web page called secure.html with the message "This is a Secure Area".Then
we designed our web server to enable access to the test index to the customer from the customer
machine and deny access to every other person.
The screen capture underneath demonstrates the website page that we made named secure.html.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
To design our web server to enable access to the test index to the customer from the customer
machine and deny access to every other person we went to httpd.conf document and included the
accompanying data
On our server we opened a program again and composed http://localhost/test/secure.html and it
gave us this page.
machine and deny access to every other person we went to httpd.conf document and included the
accompanying data
On our server we opened a program again and composed http://localhost/test/secure.html and it
gave us this page.
At that point the customer (148.197.28.81 ) ran http://localhost/test/secure.html in the internet
browser and it gave him access to the site page as appeared in the screen capture underneath.
Our content assignment was to make clients and gatherings for School of Engineering at UOP.
Make three gatherings: Academic, Support, Research. Include five clients for each gathering.
To do this first we went to httpd.conf document and included the accompanying data for every
one of the three groups.The screen capture belows demonstrates the data for Academic Area.
browser and it gave him access to the site page as appeared in the screen capture underneath.
Our content assignment was to make clients and gatherings for School of Engineering at UOP.
Make three gatherings: Academic, Support, Research. Include five clients for each gathering.
To do this first we went to httpd.conf document and included the accompanying data for every
one of the three groups.The screen capture belows demonstrates the data for Academic Area.
At that point we made a record name d.htaccess for every one of the gatherings and included the
accompanying data.
At that point to make client we made a record named .htgroup and included the username as
appeared in the screen capture beneath.
At that point we set the secret key for all the client made by making another record
named .htpasswd as appeared in the screen capture underneath.
accompanying data.
At that point to make client we made a record named .htgroup and included the username as
appeared in the screen capture beneath.
At that point we set the secret key for all the client made by making another record
named .htpasswd as appeared in the screen capture underneath.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point we went to the internet browser and took a stab at running it , yet we couldn't as we
had set the Authentication. We composed the client name and the secret key that we set to get
confirmation. At that point we composed the username and secret phrase which we set to gain
admittance to the website page.
had set the Authentication. We composed the client name and the secret key that we set to get
confirmation. At that point we composed the username and secret phrase which we set to gain
admittance to the website page.
At that point our assignment was to make an index underneath the report base of our Web server
called encouraging that just scholastic staff could get to. Arrange your web server. To do this we
went to httpd.conf record and altered it,as appeared in the screen capture underneath.
We at that point made .htaccess , .htgroup document and we set the secret word by
made .htpasswd record.
At that point we went to the internet browser and ran it with the client name which was not from
Academic Area. At that point we took a stab at signing in from the client in Academic Area and it
gave us the entrance to the instructing website page.
called encouraging that just scholastic staff could get to. Arrange your web server. To do this we
went to httpd.conf record and altered it,as appeared in the screen capture underneath.
We at that point made .htaccess , .htgroup document and we set the secret word by
made .htpasswd record.
At that point we went to the internet browser and ran it with the client name which was not from
Academic Area. At that point we took a stab at signing in from the client in Academic Area and it
gave us the entrance to the instructing website page.
Our next errand was to make a catalog underneath the archive base of our Web server considered
administration that all staff could get to. We arranged our web server to limit access to every
single substantial client utilizing fundamental confirmation conspire.
First we made .htaccess document structure word processor.
At that point we set the clients by made a document name .htgroups
administration that all staff could get to. We arranged our web server to limit access to every
single substantial client utilizing fundamental confirmation conspire.
First we made .htaccess document structure word processor.
At that point we set the clients by made a document name .htgroups
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
At that point we set the secret word for the clients.
At that point we went to httpd.conf document and included the index for Management Area
At that point we made a html page and took a stab at getting to it yet we could as we need the
confirmation for it.
At that point we went to httpd.conf document and included the index for Management Area
At that point we made a html page and took a stab at getting to it yet we could as we need the
confirmation for it.
At that point we composed in the username and the secret word to gain admittance to the site
page.
At that point we changed our arrangement document to give free access to the executives index to
all staff and clients originating from the customer machine as we did in exercise one. The screen
capture underneath demonstrates that our customer could access to our website page from his PC.
The last undertaking was this lab was to utilize .htaccess document to re-arrange our web server
for exercise 3),4) and 5) in area 2. The purpose of the .htaccess instrument is that we can change
setup orders without restarting the server. For instance, in exercise 5), when we change our
page.
At that point we changed our arrangement document to give free access to the executives index to
all staff and clients originating from the customer machine as we did in exercise one. The screen
capture underneath demonstrates that our customer could access to our website page from his PC.
The last undertaking was this lab was to utilize .htaccess document to re-arrange our web server
for exercise 3),4) and 5) in area 2. The purpose of the .htaccess instrument is that we can change
setup orders without restarting the server. For instance, in exercise 5), when we change our
arrangement record .htaccess, you don't need to restart our Web server. To do this first we made a
serve.html page.Then and afterward we ran it in the internet browser.
At that point we made the .htpasswd ,and ,htgroups files.After this we made the .htaccess
document and changed it.
At that point we didn't enlist the server and ran the page in the internet browser. In the wake of
running it we were requested the confirmation which implies our arrangement was effective.
serve.html page.Then and afterward we ran it in the internet browser.
At that point we made the .htpasswd ,and ,htgroups files.After this we made the .htaccess
document and changed it.
At that point we didn't enlist the server and ran the page in the internet browser. In the wake of
running it we were requested the confirmation which implies our arrangement was effective.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Conclusion
Electronic applications entirely rely upon web servers, consequently on the off chance that you
have a server with a default setup or that is mis-designed, you are bound to be a casualty of
hacking. It is the obligation of a site director to play out a customary security filter for the site to
recognize online dangers. As the colloquialism goes, "counteractive action is superior to a fix"; it
is constantly insightful to make a move before a programmer gains admittance to your server.
There is a wide scope of web servers. Out of every one of them, Apache is the most well known
and a larger part of sites use Apache. Because of its far reaching use, Apache is progressively
helpless against malevolent assaults. Appropriate solidifying empowers us to verify Apache
servers from digital dangers.
Modules, for example, mod_securityand mod_evasive ought to be introduced to reinforce Apache
security. mod_evasivedetects DDoS assaults and avoids broad harm caused due to DDoS
assaults.
mod_security is a firewall worked for web applications to anticipate savage power assaults. This
module screens the traffic on an ongoing premise.
On the off chance that the comparing file page does not exist, Apache shows every one of the
records in a catalog. This ought to be killed as there is an opportunity it can show classified data
to unapproved clients. To do this, at first make another section with an alternatives order for the
specific registry in Apache's arrangement record.
To limit the impacts of a DDoS assault, change the accompanying catalogs:
Limit Request Fields ought to be brought down dependent on your prerequisites. This restrains
the quantity of HTTP demands acknowledged from customers.
Break ought to be set low as the web server requires more opportunity to execute certain web
demands.
Max Clients ought to be arranged considering the site's traffic and the quantity of associations
with be served at once. This empowers new associations with hold up in a line when as far as
possible is come to.
Electronic applications entirely rely upon web servers, consequently on the off chance that you
have a server with a default setup or that is mis-designed, you are bound to be a casualty of
hacking. It is the obligation of a site director to play out a customary security filter for the site to
recognize online dangers. As the colloquialism goes, "counteractive action is superior to a fix"; it
is constantly insightful to make a move before a programmer gains admittance to your server.
There is a wide scope of web servers. Out of every one of them, Apache is the most well known
and a larger part of sites use Apache. Because of its far reaching use, Apache is progressively
helpless against malevolent assaults. Appropriate solidifying empowers us to verify Apache
servers from digital dangers.
Modules, for example, mod_securityand mod_evasive ought to be introduced to reinforce Apache
security. mod_evasivedetects DDoS assaults and avoids broad harm caused due to DDoS
assaults.
mod_security is a firewall worked for web applications to anticipate savage power assaults. This
module screens the traffic on an ongoing premise.
On the off chance that the comparing file page does not exist, Apache shows every one of the
records in a catalog. This ought to be killed as there is an opportunity it can show classified data
to unapproved clients. To do this, at first make another section with an alternatives order for the
specific registry in Apache's arrangement record.
To limit the impacts of a DDoS assault, change the accompanying catalogs:
Limit Request Fields ought to be brought down dependent on your prerequisites. This restrains
the quantity of HTTP demands acknowledged from customers.
Break ought to be set low as the web server requires more opportunity to execute certain web
demands.
Max Clients ought to be arranged considering the site's traffic and the quantity of associations
with be served at once. This empowers new associations with hold up in a line when as far as
possible is come to.
ENG657 Network Operations and Management Laboratory
LY 5: Extending the Web Environment and Setting Up a Secure Web Server
Installing and configuring PHP
In this particular session of the lab, we did the configuration of the PHP. This is the server side
scripting language which in cooperation with other web servers which in this case includes
apache. The engine of the PHP is developed as a filter for apache 2.0 that processes pages which
contains the code just before the client is serviced with the same code.
Downloading PHP
Our very first task was downloading the php from the website below.
http://www.php.net.The file we download is named as php-7.2.17.tar.gz.
Uncompressing the source code
In order to uncompress the file, the command tar –zxvf php-7.2.17.tar.gz was typed to
uncompress and unpack the software
LY 5: Extending the Web Environment and Setting Up a Secure Web Server
Installing and configuring PHP
In this particular session of the lab, we did the configuration of the PHP. This is the server side
scripting language which in cooperation with other web servers which in this case includes
apache. The engine of the PHP is developed as a filter for apache 2.0 that processes pages which
contains the code just before the client is serviced with the same code.
Downloading PHP
Our very first task was downloading the php from the website below.
http://www.php.net.The file we download is named as php-7.2.17.tar.gz.
Uncompressing the source code
In order to uncompress the file, the command tar –zxvf php-7.2.17.tar.gz was typed to
uncompress and unpack the software
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
At that point we type the order cd php-7.2.17 to get to the registry.
At that point we introduced libxml2 by composing the direction yum introduce libxml2-
devel.x86_64
Building and Installing PHP
To assemble php from apache we entered the command# ./arrange - prefix=/select/php - with-
apxs2=/pick/apache/container/apxs in the terminal
At that point we introduced libxml2 by composing the direction yum introduce libxml2-
devel.x86_64
Building and Installing PHP
To assemble php from apache we entered the command# ./arrange - prefix=/select/php - with-
apxs2=/pick/apache/container/apxs in the terminal
Next we composed make direction, trailed by make introduce order in the terminal.
#make
#make install
#make
#make install
At that point we duplicated the conveyed adaptation of php.ini to its default area by composing
the direction #cp php.ini-advancement/pick/php/lib/php.ini
Incorporation PHP with Apache on Linux
To guarantee that PHP and Apache coexist with each other, we went to httpd.conf design record
and searched for the line LoadModule php7_module modules/libphp7.so.Then we included one
more line:AddType application/x-httpd .php .phtml .html which can be found in the screen
capture beneath.
the direction #cp php.ini-advancement/pick/php/lib/php.ini
Incorporation PHP with Apache on Linux
To guarantee that PHP and Apache coexist with each other, we went to httpd.conf design record
and searched for the line LoadModule php7_module modules/libphp7.so.Then we included one
more line:AddType application/x-httpd .php .phtml .html which can be found in the screen
capture beneath.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point we spared the document and restarted the server by composing the direction
:/pick/apache/receptacle/apachectl restart
Testing the establishment
To test the establishment we made a php document utilizing content manager , named it
phpinfor.php and spared it in the htdocs envelope.
At that point we got to the document by means of our Web program. We composed the
accompanying connect to get to it http://localhost/phpinfo.php which disped the php site that we
introduced.
:/pick/apache/receptacle/apachectl restart
Testing the establishment
To test the establishment we made a php document utilizing content manager , named it
phpinfor.php and spared it in the htdocs envelope.
At that point we got to the document by means of our Web program. We composed the
accompanying connect to get to it http://localhost/phpinfo.php which disped the php site that we
introduced.
Joining HTML and PHP
To do this we composed in the accompanying model and spare it as first.php as appeared in the
screen capture below. Then we spared it and ran it from the internet browser.
To do this we composed in the accompanying model and spare it as first.php as appeared in the
screen capture below. Then we spared it and ran it from the internet browser.
Activities 1
At that point we utilized PHP scripts which utilizes .php3 as an augmentation. For in reverse
similarity, we made some arrangement changes.
We went to the httpd.conf record and included .php3 in the AddType line as appeared in the
screen capture underneath.
At that point we made a php page for php3 in the content tool and named it second.php3 and
spared it in the htdocs document.
At that point we tried whether an individual perusing our Web webpage can peruse the source
code of PHP script you have effectively introduced.
At that point we utilized PHP scripts which utilizes .php3 as an augmentation. For in reverse
similarity, we made some arrangement changes.
We went to the httpd.conf record and included .php3 in the AddType line as appeared in the
screen capture underneath.
At that point we made a php page for php3 in the content tool and named it second.php3 and
spared it in the htdocs document.
At that point we tried whether an individual perusing our Web webpage can peruse the source
code of PHP script you have effectively introduced.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
At that point we ran the script in the internet browser as appeared in the screen capture
underneath.
At that point to design script itself gives us a rundown of accessible choices, including the ones
we utilized From the PHP appropriation directory,we composed the accompanying order :
./arrange – help in the terminal
underneath.
At that point to design script itself gives us a rundown of accessible choices, including the ones
we utilized From the PHP appropriation directory,we composed the accompanying order :
./arrange – help in the terminal
The direction gave was every one of the setups lists.Then we composed the order ./arrange – help
> phpoptions.txt
At that point the phpoption.txt record was transferred in the php-7.2.17 organizer as appeared in
the screen capture beneath.
Setting Up a Secure Web Server
Acquiring and Installing SSL Tools
SSL support is given by mod_ssl. This module requires the OpenSSL library—an open source
usage of the SSL/TLS conventions.
First we downloaded the right document named openssl-1.1.0j.tar.gz
> phpoptions.txt
At that point the phpoption.txt record was transferred in the php-7.2.17 organizer as appeared in
the screen capture beneath.
Setting Up a Secure Web Server
Acquiring and Installing SSL Tools
SSL support is given by mod_ssl. This module requires the OpenSSL library—an open source
usage of the SSL/TLS conventions.
First we downloaded the right document named openssl-1.1.0j.tar.gz
At that point we composed the order yum introduce libtool perl-center zlib-devel - y to introduce
the some libtool.
Also, for the decompression we composed the order tar - zxvf OpenSSL_1_1_0g.tar.gz
At that point we composed the order compact disc openssl-OpenSSL_1_1_0g to add to the index.
the some libtool.
Also, for the decompression we composed the order tar - zxvf OpenSSL_1_1_0g.tar.gz
At that point we composed the order compact disc openssl-OpenSSL_1_1_0g to add to the index.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point to design and aggregate OpenSSL we composed the order ./config - prefix=/pick/ssl
- openssldir=/select/ssl shared zlib in the terminal.
At that point we composed the direction #make
- openssldir=/select/ssl shared zlib in the terminal.
At that point we composed the direction #make
Pursued by #make introduce
At that point we checked if the mod_ssl is assembled statically into Apache by composing the
command#/select/apache/canister/httpd – l
At that point we checked if the mod_ssl is assembled statically into Apache by composing the
command#/select/apache/canister/httpd – l
What's more, the mod_ssl was added to the design which can be found in the screen capture
beneath which demonstrates the httpd.conf document.
Making a Key Pair
To do this we composed the order #/pick/ssl/receptacle/openssl genrsa - des3 - out
www.eng657testdomain.com.key 1024 in the terminal.
To confirm we composed the direction: openssl rsa - noout - content - in
www.eng657testdomain.com.key
beneath which demonstrates the httpd.conf document.
Making a Key Pair
To do this we composed the order #/pick/ssl/receptacle/openssl genrsa - des3 - out
www.eng657testdomain.com.key 1024 in the terminal.
To confirm we composed the direction: openssl rsa - noout - content - in
www.eng657testdomain.com.key
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Making a Certificate Signing Request
To get a testament issued by a CA, we should submit what is known as an endorsement marking
demand. To make a solicitation, we issued the accompanying direction: ./openssl req - new - key
www.eng657testdomain.com.key - outwww.eng657testdomain.com.csr in the terminal. Also, We
gave the required data, for example, Country name which can be found in the screen capture
beneath.
Making a Self-Signed Certificate
To do this we composed the order # ./openssl x509 - req - days 90 - in
www.eng657testdomain.com.csr - signkey www.eng657testdomain.com.key - out
www.eng657testdomain.com.cert
To get a testament issued by a CA, we should submit what is known as an endorsement marking
demand. To make a solicitation, we issued the accompanying direction: ./openssl req - new - key
www.eng657testdomain.com.key - outwww.eng657testdomain.com.csr in the terminal. Also, We
gave the required data, for example, Country name which can be found in the screen capture
beneath.
Making a Self-Signed Certificate
To do this we composed the order # ./openssl x509 - req - days 90 - in
www.eng657testdomain.com.csr - signkey www.eng657testdomain.com.key - out
www.eng657testdomain.com.cert
At that point we spared the duplicate of self-marked testament page in pick/ssl/certes envelope as
appeared in the screen capture underneath.
what's more, our key to/select/ssl/ssl/private
SSL Configuration
appeared in the screen capture underneath.
what's more, our key to/select/ssl/ssl/private
SSL Configuration
To begin the design we went to httpd.conf document and uncommented the line Include
conf/additional/httpd-ssl.conf
At that point we uncomented the line LoadModule socache shmcb modules/mod_socache
shmch.so
At that point we uncommented SSLCertificateKeyFile
"/pick/ssl/private/www.eng657testdomain.com.key" and SSLCertificateKeyFile
"/select/ssl/certs/www.eng657testdomain74.com.crt
conf/additional/httpd-ssl.conf
At that point we uncomented the line LoadModule socache shmcb modules/mod_socache
shmch.so
At that point we uncommented SSLCertificateKeyFile
"/pick/ssl/private/www.eng657testdomain.com.key" and SSLCertificateKeyFile
"/select/ssl/certs/www.eng657testdomain74.com.crt
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
At that point we can ceased the server , and began it once more. As our key was secured by a
passphrase, we needed to enter the passphrase as appeared in the screen capture underneath.
At that point we had the capacity to associate safely to it by means of the
https://www.eng657testdomain.com/
passphrase, we needed to enter the passphrase as appeared in the screen capture underneath.
At that point we had the capacity to associate safely to it by means of the
https://www.eng657testdomain.com/
Conclusion
This lab session was all about configuration of the PHP from the terminal. The PHP is seen to be
the backend or the server side scripting language which also works in harmony with apache
server.
This lab session was all about configuration of the PHP from the terminal. The PHP is seen to be
the backend or the server side scripting language which also works in harmony with apache
server.
1 out of 66
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.