Installing Enterprise-wide Operating System on Virtual Box
VerifiedAdded on  2023/04/21
|19
|1451
|383
AI Summary
Learn how to install an enterprise-wide operating system on Virtual Box with step-by-step instructions. Configure automatic boot, create disk partitions, update and patch the system, mount and unmount file systems, create files and folders, manage users and groups, interact with shells and commands, send text files and output streams, automate scheduling with cron, and use iptables firewall for network security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Task 1 Installing Enterprise-wide Operating System on Virtual Box
To accomplish this task, Ubuntu Server 18.04 was used as the enterprise-wide OS installed on the
virtual box running on Ubuntu 18.04 desktop as the host OS. The steps are described below,
Open the virtual box and create a new virtual machine by clicking the new button as shown below
Give the machine the recommended RAM as shown in the screenshot below
To accomplish this task, Ubuntu Server 18.04 was used as the enterprise-wide OS installed on the
virtual box running on Ubuntu 18.04 desktop as the host OS. The steps are described below,
Open the virtual box and create a new virtual machine by clicking the new button as shown below
Give the machine the recommended RAM as shown in the screenshot below
Give the machine the recommended hard disk space that shall be used by the enterprise-wide OS. This
should be enough to hold most file owned by users and other libraries used by the OS. This is as
shown below
Once the parameter has been set, power on the machine and browse through the .iso file that contains
the bootable file of the new enterprise OS. This is as shown below
should be enough to hold most file owned by users and other libraries used by the OS. This is as
shown below
Once the parameter has been set, power on the machine and browse through the .iso file that contains
the bootable file of the new enterprise OS. This is as shown below
Once all the parameters are set, click the done button to allow the installation of the machine on virtual
box. This is as shown below
box. This is as shown below
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Once the installation is complete, there is a need to create a user account and set the hostname of the
OS In this case, a to is the user account and mainserver is the hostname. This is as shown below,
OS In this case, a to is the user account and mainserver is the hostname. This is as shown below,
Optionally, you can install some packages suggested by Ubuntu 18.04 and hit done. In this case, we are
going to ignore the package suggestions and hit done as shown below,
going to ignore the package suggestions and hit done as shown below,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Allow Ubuntu to use the settings provided to complete the installation as shown below,
Once done, reboot the system and the Ubuntu login terminal will be presented, enter the username and
password to login to the OS as shown below,
password to login to the OS as shown below,
Task 2
In this task, the newly installed ubuntu server 18.04 will be configured to automatically boot once the
host OS is booted successfully. This ensures the various enterprise-level systems are up most times.
The steps followed are as shown below,
First, we create a file named VirtualBox in the etc directory file of the host OS. And in it, the following
variables are added. This is as shown below,
Then we create the vbox.conf file and add the following contents as shown below,
In this task, the newly installed ubuntu server 18.04 will be configured to automatically boot once the
host OS is booted successfully. This ensures the various enterprise-level systems are up most times.
The steps followed are as shown below,
First, we create a file named VirtualBox in the etc directory file of the host OS. And in it, the following
variables are added. This is as shown below,
Then we create the vbox.conf file and add the following contents as shown below,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Now, we need to set the permission for the vboxusers to 1775 as shown below,
Then we add each user to the vbox user group using the command below,
To ensure individual users autostart the virtual machine, the following command is used,
To ensure the changes take effect, we restart the vboxautostart-service using the command shown
below,
Finally, we reboot the system for the machine to boot automatically on host boot.
Task 3 Create disk partition and other file systems. Provide evidence of file management
File management in our newly created enterprise OS involves the use of disk command utility. We will
need to create a partition and format it to a Linux file system so as to be ready for the file from
enterprise-wide applications.
First, let's list the partitions available. This is done as shown in the screenshot below,
Then we add each user to the vbox user group using the command below,
To ensure individual users autostart the virtual machine, the following command is used,
To ensure the changes take effect, we restart the vboxautostart-service using the command shown
below,
Finally, we reboot the system for the machine to boot automatically on host boot.
Task 3 Create disk partition and other file systems. Provide evidence of file management
File management in our newly created enterprise OS involves the use of disk command utility. We will
need to create a partition and format it to a Linux file system so as to be ready for the file from
enterprise-wide applications.
First, let's list the partitions available. This is done as shown in the screenshot below,
The first disk device sda which is 10GB will be the one partitioned further. To list partitions currently
on sda, the following command is used,
Once we know the various devices, we enter the command mode for the file system management using
the following command,
Using the n command, we create a primary partition as shown below,
To write the changes to the disk, we use the w command as shown below,
on sda, the following command is used,
Once we know the various devices, we enter the command mode for the file system management using
the following command,
Using the n command, we create a primary partition as shown below,
To write the changes to the disk, we use the w command as shown below,
Task 4 Update the operating system and patch the system
To get the updates, we use the sudo apt-get update command as and to get patches, we use the sudo
apt-get upgrade as shown below,
To get the upgrade, the command sudo apt-get upgrade is used as shown below,
To continue, type n,
To get the updates, we use the sudo apt-get update command as and to get patches, we use the sudo
apt-get upgrade as shown below,
To get the upgrade, the command sudo apt-get upgrade is used as shown below,
To continue, type n,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task 5: Using the system command, mount and unmount the file system. Provide evidence of
these actions
Here we use the Linux mount command to mount the file systems and the unmount command to
unmount the file systems.
The general syntax is as shown below, mount -t type device dir
If we mount the newly created file system on a directory file created called data, the following
command is used. First, we unmount it from the file system to make changes to it,
To unmount, we use the unmount command as shown below,
Task 6: Use the configuration command to create file, folder and to create a user and add group
I. Create File
To create a file called test.txt in the home directory, we use the touch command as shown
below
II. Folder
To create a director file, use the mkdir command. For example, to create Testdata directory file,
we use the command shown below,
III. User
The general syntax for adding a user is adduser [username]. To add user sysadmins, the following
commands are used
these actions
Here we use the Linux mount command to mount the file systems and the unmount command to
unmount the file systems.
The general syntax is as shown below, mount -t type device dir
If we mount the newly created file system on a directory file created called data, the following
command is used. First, we unmount it from the file system to make changes to it,
To unmount, we use the unmount command as shown below,
Task 6: Use the configuration command to create file, folder and to create a user and add group
I. Create File
To create a file called test.txt in the home directory, we use the touch command as shown
below
II. Folder
To create a director file, use the mkdir command. For example, to create Testdata directory file,
we use the command shown below,
III. User
The general syntax for adding a user is adduser [username]. To add user sysadmins, the following
commands are used
Next, we create a password for the new user and confirm the same
We then create a profile for the new user as shown below.
Confirm the information by typing Y
IV. Group
Here we use sudo groupadd newgroup command syntax as shown below,
To add a group called syadmins,
Task 7: Use the command line interface to interact with the shells and commands. Provide
evidence of the interaction
Here we shall use the chmod and chown shell commands to show the interactions.
chown command is used to change the ownership of a file. The test.txt file belongs to the cto user by
default. We can change that to the newly created sysadmins as shown below,
chmod is used to change the access permission of a file. To make the user group and others have read
write and executable permission on the test.txt file system. The following command is used,
Task 8: use commands to send text files and output streams through text utilities. Provide
evidence of this
First, we need to add some data into the test.txt using the
We then create a profile for the new user as shown below.
Confirm the information by typing Y
IV. Group
Here we use sudo groupadd newgroup command syntax as shown below,
To add a group called syadmins,
Task 7: Use the command line interface to interact with the shells and commands. Provide
evidence of the interaction
Here we shall use the chmod and chown shell commands to show the interactions.
chown command is used to change the ownership of a file. The test.txt file belongs to the cto user by
default. We can change that to the newly created sysadmins as shown below,
chmod is used to change the access permission of a file. To make the user group and others have read
write and executable permission on the test.txt file system. The following command is used,
Task 8: use commands to send text files and output streams through text utilities. Provide
evidence of this
First, we need to add some data into the test.txt using the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
To show the contents of the test.txt file, we use the cat command as shown below,
Task 9: Manage users and group accounts including changing the user profile to be allowed
security access level using appropriate commands. Provide evidence of account management and
profile changes.
Here, we are going to add the newly created user to the sudoers group which gives it more privileges to
run root command using the sudo command. The steps are shown below,
Task 10: Use the system ‘cron' command to automate scheduling. Provide evidence of automated
scheduling
Here the cron jobs are added to automate some of the repeatedly done system administration
commands. The following shows some of its usages.
Let say we want to automate the backup process using the backup script stored in bin/sh/ backup.sh
Task 9: Manage users and group accounts including changing the user profile to be allowed
security access level using appropriate commands. Provide evidence of account management and
profile changes.
Here, we are going to add the newly created user to the sudoers group which gives it more privileges to
run root command using the sudo command. The steps are shown below,
Task 10: Use the system ‘cron' command to automate scheduling. Provide evidence of automated
scheduling
Here the cron jobs are added to automate some of the repeatedly done system administration
commands. The following shows some of its usages.
Let say we want to automate the backup process using the backup script stored in bin/sh/ backup.sh
To schedule the backup crontab to execute every day at 2 AM, we use the following command.
Task 11: Install and use iptables firewall to allow and block unwanted traffic on the enterprise-
wide network
First, let's view the current rules using the command below,
Then we can create protocol specific chains to our TCP, UDP and ICMP traffic. This is done using the
following commands\.
We can go
ahead and
allow ssh
traffic to
pass through the firewall. Ssh uses TCP port 22. So we just need to allow to traffics destined for port 22
using the following command.
Task 11: Install and use iptables firewall to allow and block unwanted traffic on the enterprise-
wide network
First, let's view the current rules using the command below,
Then we can create protocol specific chains to our TCP, UDP and ICMP traffic. This is done using the
following commands\.
We can go
ahead and
allow ssh
traffic to
pass through the firewall. Ssh uses TCP port 22. So we just need to allow to traffics destined for port 22
using the following command.
References
Zheng, J. and Jamalipour, A., 2009. Wireless sensor networks: a networking perspective. John Wiley &
Sons
Haque, I.T. and Abu-Ghazaleh, N., 2016. Wireless software defined networking: A survey and
taxonomy. IEEE Communications Surveys & Tutorials, 18(4), pp.2713-2737
Zheng, K., Zhao, L., Mei, J., Dohler, M., Xiang, W. and Peng, Y., 2015. 10 Gb/s hetsnets with
millimeter-wave communications: access and networking-challenges and protocols. IEEE
Communications Magazine, 53(1), pp.222-231
Zheng, J. and Jamalipour, A., 2009. Wireless sensor networks: a networking perspective. John Wiley &
Sons
Haque, I.T. and Abu-Ghazaleh, N., 2016. Wireless software defined networking: A survey and
taxonomy. IEEE Communications Surveys & Tutorials, 18(4), pp.2713-2737
Zheng, K., Zhao, L., Mei, J., Dohler, M., Xiang, W. and Peng, Y., 2015. 10 Gb/s hetsnets with
millimeter-wave communications: access and networking-challenges and protocols. IEEE
Communications Magazine, 53(1), pp.222-231
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.