Lab 8: Accessing iSCSI Storage

Process:

Task 1: Add a VMkernel Port Group to a Standard Switch

This is the connector for our storage network. In the previous lab, we created a new swith for use by the storage network vSwitch, which will be used here.

To distinguish between LAN and storage, the IP address should be at 172.20.11. *in scope;

Task 2: Configure the iSCSI Software Adapter and Connect It to the Storage

Check name

Select storage network port

Self-laboratory issues

LUN number = 0
Capacity = 86.5 GB
Op State = Attach
Hardware acceleration = not supported

Critical Thinking Analysis:

I now have a virtual shared disk on the server that can be used to store my virtual machine and its files, which means that ESXi hosts can now be better managed.

If the host is running too close to capacity, the machine can be migrated to a different host. , load balancing.

Lab 11: Firewall Rule Based Management

Reflection:

1. Discuss the configuration required on a firewall for a web server providing

1a. HTTP and HTTPS

Http request: It is a hypertext transfer protocol, which is sent in plaintext, without any encryption.

Https request: it is actually http+ssl (secure socket layer), SSL performs encryption and security processing of data

1b. FTP over TLS/SSL

Explicit FTP over TLS, explicit FTP over TLS.

Implicit FTP over TLS, implicit TLS based on TLS.

SFTP, SSH file transfer protocol, port is 22.

1c. SMTP for sending emails from the websites

In this document, we will show you how to use the SMTP service to send emails in VS2005.

By default, the SMTP server recently used port 587 because it is equipped with TLS encryption for secure communication, primarily for mail submission and relaying. Port 25 does not provide secure encryption, but it is still primarily used for mail relay to other web servers. No other services will run on this port. Since the SMTP service of this web server is only used to send e-mail, the outgoing port 25 should be opened.

1d. Remote Administration

Install the Remote Access role

Configure the deployment type as DirectAccess and VPN, DirectAccess only, or VPN only.

Configure the Remote Access server with the security groups that contain DirectAccess clients

Configure the Remote Access server settings.

2.Discuss the configuration required on a firewall for a database server providing

1a. MariaDB

Install MariaDB: 1. Switch to root privileges 2. Use yum installation 3. Installation is complete, start MariaDB 4. Set up to start MariaDB
Configuring MariaDB: Configuring the MariaDB character set
Configure user permissions: 1. Create user 2. Query user permission list

1b. MSSQL

  1. Use a secure password policy
  2. Use a secure account strategy
  3. Strengthen the record of database logs
  4. Manage extended stored procedures
  5. Use protocol encryption
  6. Don’t let people detect your TCP/IP port casually
  7. Modify the port used by TCP/IP
  8. Reject detection from port 1434
  9. IP restrictions on network connections

1c. Remote Administration

  1. HBase X-Pack is a low-cost one-stop data processing platform based on HBase and HBase ecosystem.
  2. HBase X-Pack support: HBase API (including RestServerThriftServer), relational Phoenix SQL, time series OpenTSDB, full-text Solr, space-time GeoMesa, HGraph, and Spark on HBase, is the first distributed database supporting Alibaba Cloud, and The agreement is 100% compatible with open source protocols.
  3. HBase X-Pack realizes the whole process closed loop of data processing, storage and analysis, allowing customers to realize one-stop data processing at the lowest cost.

Critical Thinking Analysis:

From this lab we can learn about the different configuration requirements on different servers.

We can discuss from the school’s point of view that the school firewall network can be implemented on campus to prevent information leakage. There are many complex firewall devices in many commercial areas to protect trade secrets.

Lab 7: Using Standard Switches

Process:

Task 1: View the Standard Switch Configuration

We entered the main business cluster and selected the virtual switch according to the requirements of the laboratory.

My ESXi host 172.20.10.194 has the following settings

Q1: What is the name of the default standard switch?

1.The default virtual switch is named vSwitch0.

Q2: Which physical adapter is the default standard switch connected to?

2.The default switch is connected to the physical adapter vmnic0.

Q3: Which network is your virtual machine connected to?

3.vSwitch0 contains a virtual machine port group named VM Network. Your virtual machine is connected to the VM Network port group.

Q4: Which networks are connected to the default standard switch?

4.VM Network and Management Network are connected to the default standard4.

Task 2: Create a Standard Switch with a Virtual Machine Port Group

Select the connection type of the switch

Task 3: Attach Your Virtual Machines to the New Virtual Machine Port Group

Simply edit the VM settings to attach it to the new Prouction network

Another problem is that I set up a static IP on the machine used for cloning, so all machines have the same IP, which is a minor fix that gives them all the different static IPs.

Pinging another machine on 172.20.10.194 will also never work because the 172.20.10.194 server VM is still connected to the default network.

So, in order for all my machines to connect to eah, they will have to stay on this default network.

Critial Thinking Analysis:

A direct lab can do it, but in our environment it is not possible to prove the connection to the new switch.

The actual lab setup is different from our lab setup, the lab has started the DHCP server, but we don’t. I can build a DHCP server again, as we have taught before, but in order to learn the results, I have not wasted time.

Lab 6: Creating Folders in vCenter Server Appliance

Process:

Task 1: Create a Host and Cluster Folder

I entered the vSphere Web Client and clicked on the host and cluster

Task 2: Create Virtual Machine and Template Folders

Add a new VM and template folder

This lab teaches us how to create a new folder and then combine some important information to make it easier for us to find.

This lab does not have any configuration.

Question:

What is the difference between the menu commands in the drop-down menus of the LabVMs folder and the Lab Servers folder?

1. The Lab Servers folder has menu commands related to host actions whereas the LabVMs folder has menu commands related to virtual machines.

Critical Thinking Analysis:

For this lab, you only need to create some simple tasks for new virtual folders, just like on a standard physical computer.

The advantage of this lab for the company is that it can combine similar information for easy access. Not looking for too many files and very complicated

Lab 4: Woriking with vCenter Server

Process:

Task 1: Deploy vCenter Server Appliance

First, I found the file for VMware-VCSA-all-6.5.0. And add it to Win10

After that we can select the vcsa-ui-installer folder and find the file to installer.exe

Then we can see the installation page and click install

We will display a certificate display box according to the steps. We click yes

After that, we need to enter a password with numbers, symbols, and capitalization:! Silver326

Follow the steps to complete the experiment. Then a window will appear showing that it is being deployed

The final successful completion of the deployment

Task 2: Access and Configure vCenter Server Appliance

Create a new license

I can change the password policy so that the password never expires, or edit other password settings.

Change the longest lifecycle to 0 in Password Policy

A new data center has been added to the ESXi host

Task 3: Add Your ESXi Hosts to the vCenter Server Inventory

Now I can add the ESXi host to the list in vCenter Server.

We need to choose Disabled

The installation is complete

This is some information about the device

Task 4: Configure the ESXi Hosts as NTP Clients

The host will become its own network time protocol client, which will maintain network time based on its own time.

Task 5: Back Up vCenter Server Appliance

We need a location that supports FTP to store backups, we don’t have a location in the lab environment. I’m thinking about building another virtual server to perform this function, and realizing that I can follow the lab instructions to learn the same process without actually completing all the steps. Due to time constraints, I actually completed the experiment to build More virtual machines.

Task 6: Complete the vCenter Server Appliance Deployment

This task is completed after task 1 to allow me to perform tasks 2-5 correctly.

Now I can navigate to 172.20.10.194, the device IP address in the web browser, and I can see the ESXi host I created.

Critical Thinking Analysis:

This lab is challenging. We need to edit the settings in the vSphere Client and then the folder will be displayed for installation in the virtual machine.

In addition, we also need to combine the contents of the previous lab. Determine the IP address of IPv4 for subsequent operations.

We also need to build a static IP on our virtual machine subnet.

We still lack the licenses needed to complete Task 2, and we don’t have a ftp-enabled server on which we can store Task 5 ESXi host backups.

There are many complicated operations in this lab. Sometimes if you don’t successfully create a virtual machine with enough memory. Subsequent operations will not be executed

Lab 2: Configuring ESXi Hosts

Process:

Task 1: Examine the Options in the DCUI

We enter the DCUI to see the option to include password changes in the list of options.

This step is used to verify that the password is correct.

This is the DCUI selection interface.

This step shows that the original password can be modified.

Task 2: Configure the Management Network

We can see the IPv4 static address and DNS related gateway information.

Can change IP and gateway data

We can use the following DNF server addresses and hostname

Task 3: Enable SSH

Enable SSH option

Task 4: View System Logs

We can click 1 to view the system’s diary.

Display the contents of the system diary

Task 5: Clean Up for the Next Lab

This step is to clear the ESXi host we created to facilitate the next Lab 3 operation.

Critical Thinking Analysis:

I forgot my password when I first operated this lab. So I recreated a new virtual machine.

Another difficulty in this lab is the inability to operate the mouse. It can only be operated using the TAB and Enter keys of the keyboard.

Lab 10: Implementing NAT and OpenSSH

Reflection:

NAT Firewall: The state-based SNAT function of the NAT gateway can provide security protection for internal servers. The correct use of NAT gateways can build a more secure cloud-based network.

OpenSSH: OpenSSH is a free, open source implementation of the SSH (Secure SHell) protocol. The SSH protocol family can be used for remote control or transferring files between computers

1.Discuss the use and function of the NAT Firewall

Use:The firewall is used to prevent hackers. It is the boundary between the internal network and the external network. It is used to protect internal servers and networks. It is an information security system.

Function:In the VPC network, there is an enterprise-level product called NAT gateway. There are two important functions in this NAT gateway: SNAT and DNAT. SNAT is actually a state-based security protection that can be used as a simple firewall.Function:

2.Discuss at least two uses of OpenSSH on either Windows or Linux

Use:

① Under linux:On your own Linux machine, follow the quick installation method above to install the openssh program. Of course, you can select the directory you want to install. There is no need to modify the ssh_config configuration file. All you have to do is copy the private key identity file generated by the server to $(HOME)/.ssh/. Set the permissions for this file to allow only access

② Under windows: SecureCRT is a remote login tool that supports the SSH protocol. It can be started by running the executable program SecureCRT.EXE.

Installation:Openssh server installation and configuration Linux

① Server-side installation: There are three main installation methods: 1. When installing the operating system, select the “Security Server” to be installed. 2. rpm package installation 3. Source code installation
② Configure the openssh server: After installing ssh, the next step is to verify (or modify, if necessary) the parameters in the ssh configuration file.
③ Public/private key generation: The client wants to connect to the host using SSH protocol. In addition to having a user, it also needs a pair of keys for this user, one is the public key and the other is the private key.
④ Start sshd: After setting the corresponding configuration parameters, start sshd as root.

Critical Thinking Analysis:

This lab teaches us how to install NAT firewall and OpenSSH

We can find that OpenSSH is installed and used differently in different operating environments. For example, it is different in Windows and Linux.

In addition, we understand the role and function of the firewall. The firewall can be well used to prevent viruses or hackers from invading. This can provide us with a good internet environment.

Lab 9: Managing Certificates

Reflection:

AD: Active Directory is a directory service for Windows Standard Server, Windows Enterprise Server, and Windows Datacenter ServerAD: Active Directory

CA: A Digital Certificate Authority (CA) is a trusted third-party entity that issues digital certificate authorities and manages public keys and certificates that encrypt end-user data. CA’s responsibility is to ensure that a company or user receives a valid identity certificate as the only certificate.

User certificate: A user certificate template is intended to be bound to a single user to provide identity and/or encryption services for that single entity.

1.What is the role or function of AD Certificate Services and CA Web Enrollment

AD Certificate Services:

① The Policy Module supports Network Device Enrollment Service: Using the Policy Module with the Network Device Enrollment Service provides enhanced security so that users and devices can request certificates from the Internet.

② TPM Key Proof: The TPM Key Proof allows the Certificate Authority (CA) to verify that the private key is protected by a hardware-based TPM.

③ Windows PowerShell for Certificate Services: New Windows PowerShell cmdlets are available for backup and restore.

CA Web Enrollment:

① Cryptographic Service Provider (CSP) options: the name of the cryptographic service provider, key size (1024, 2048, etc.), hash algorithm (such as SHA / RSA, SHA / DSA, MD2 or MD5) and key specification (exchange Or signature).

② Key generation options: Create a new key set or use an existing key set, mark the key as exportable, enable strong key protection, and use a local computer to store the generated key.

③ Other options: save the request to the PKCS#10 file or add specific attributes to the certificate

2.What is the role or function of Key Archival and Key Recovery Agent

Key Archival:

The function of the secret key archiving is that the CA server has a copy of all issued certificates, so the lost certificate of the user can be recovered, because the smart card is stolen, and the user workstation that saves the user certificate is accidentally reformatted, among other things.

Key Recovery Agent:

The function of the key recovery agent is to restore the lost key issued by the certificate authority to the users in the domain network.

3.Explain at least two uses of the User Certificate

① Administrator: This certificate template provides signing and encryption services for administrator accounts and account identification and trust list (CTL) management in the domain. Certificates based on administrator templates are stored in Active Directory.

② Code signing: These certificate templates allow developers to create certificates that can be used to sign application code. This provides inspection software for the origin so that the code management system and the end user can be confident that the source of the software is authentic.

③ EFS Recovery Agent: This type of certificate allows decrypting files encrypted with EFS so that they can be used again. The EFS Recovery Agent Certificate should be part of any disaster recovery plan when designing an EFS implementation.

Critical Thinking Analysis

This lab teaches us how to implement key archival and can manage keys for password recovery.

In addition, it teaches us how to distinguish between key archive and key recovery agents and how to create and register user certificates.

WEEK 4: Computational Thinking AND Virtualisation Technology

Computational Thinking

1. On Computational Tools, Computational Thinking and Computational Methods

(1) URL: https://ieeexplore.ieee.org/document/4958823/

(2) The search terms: Computational thinking

(3) How you found it: Searching in Google Scholar. It is a academic articles.

(4) Who wrote/created it: Xiaofeng Zhang and Hailin Zou.

(5) When it was written/created/recorded/published: 26-05-2009

(6) what kind of ‘publication’ : Article

(7) How ‘credible (believable)’ you think it is: 95%. Because Google scholar is specifically looking for articles about academic categories. And all authors are academics. Therefore, I think the credibility is very high.

has a reserach report structure: introducation, reference, conclusion.

2. Computational Thinking: What is it? How should it be taught?

(1) URL:  https://royalsocietypublishing.org/doi/full/10.1098/rsta.2008.0118

(2) The search terms: Computational thinking

(3) How you found it: Searching in Google Scholar

(4) Who wrote/created it: Jeannette M Wing

(5) When it was written/created/recorded/published:31-7-2008

(6) what kind of ‘publication’ : Article

(7) How ‘credible (believable)’ you think it is:  80%. Because this is an article found on Google. But he also has references to other people’s literature.

3. Computational Thinking Benefits Society

(1) URL: http://people.cs.vt.edu/~kafura/CS6604/Papers/CT-What-And-Why.pdf

(2) The search terms: Computational thinking

(3) How you found it: Searching in Google Scholar

(4) Who wrote/created it:  Jason Togyer

(5) When it was written/created/recorded/published: 06-3-2011

(6) what kind of ‘publication’ : Article

(7) How ‘credible (believable)’ you think it is: 99% .Because this is an article found on Google scholar. The credibility is very high. And this article is an academic article with a high degree of rigor.

Virtualisation Technology

1. Virtualization Technology & Virtual Machine Software

(1) URL:  https://ieeexplore.ieee.org/abstract/document/1430631

(2) The search terms: Virtualization Technology

(3) How you found it: Searching in Google Scholar

(4) Who wrote/created it: R. Uhlig, G. Neiger, D. Rodgers

(5) When it was written/created/recorded/published: 16-5-2005

(6) what kind of ‘publication’ : Ariticle

(7) How ‘credible (believable)’ you think it is:  99%. Because this resource comes from the official website of VMware.

2. Utilizing the Virtualization Technology in Computer Operating System Teaching

(1) URL:  https://ieeexplore.ieee.org/abstract/document/7488689

(2) The search terms: Virtualization Technology

(3) How you found it: Searching in Google Scholar

(4) Who wrote/created it: Fan Yile

(5) When it was written/created/recorded/published:  13-06-2016

(6) what kind of ‘publication’ : Article

(7) How ‘credible (believable)’ you think it is:  99%. Because the IEEE Xplore is  a  professional collection of academic articles database, the authors of articles are  professional scholars, articles included in a certain high standard.

3. Virtualization in Education

(1) URL: https://www.sciencedirect.com/science/article/abs/pii/S0360131516302184

(2) The search terms: Virtualization Technology

(3) How you found it: Following link from Google.

(4) Who wrote/created it: MilanKlement

(5) When it was written/created/recorded/published:  2-2017

(6) what kind of ‘publication’ : White Paper

(7) How ‘credible (believable)’ you think it is:  99%. .Because this is an article found on Google scholar. The credibility is very high. And this article is an academic article with a high degree of rigor.

Lab 1: Installing ESXi

Process:

Task 1: Access Your Student Desktop

We can’t do this because we don’t have access to any form of lab environment.

Task 2: Install ESXi

First we find NET701 from the DVD drive and check VMware-VMvisor-Installer-6.5.0

After that, we open the VM and use the F11 of the keyboard to proceed to the next step.

Displayed and installed

Critical Thinking Analysis:

From this lab we can learn to create EXSI in the virtual machine.

The steps provided by this lab are not complicated. However, the installation process takes a long time and the mouse cannot be used. We can only use the functions of the keyboard to perform the next step.

通过 WordPress.com 设计一个这样的站点
从这里开始