Case Study On RLES

Decent Essays
1. Goal

The primary goal of this lab was to establish a base network in RLES that will be built on in future labs. We worked with new PFSense, a routing interface with which I was unfamiliar. I learned how to configure internal and external interfaces with PFSense, and was able to modify the rest of the necessary settings via the Web GUI. We learned how to configure RHEL, and also got to experiment with setting up a Wiki. Finally, we had a chance to configure and work with a monitoring application. This lab was also a good introduction to RLES, providing us with an opportunity to learn the ropes of the interface before throwing anything too complicated our way. This was only the first lab, so the majority of the tasks were fairly straightforward. However, the infrastructure we deployed is
…show more content…
This code is needed to activate your copy of RHEL. Until you enter your serial code, you will be unable to install packages using yum. In this case, the serial code was obtained from redhat.rit.edu – one of the four licenses provided to each student was used for activation.

Deploying and Configuring Dokuwiki
Before Dokuwiki can be deployed, a number of dependencies must be installed. One excellent guide can be found at here: https://timothy-quinn.com/building-dokuwiki-on-centos-7/. This guide provides the commands needed to install the required dependencies and configure Dokuwiki.
The first step is disabling SELinux, so that it doesn’t block certain processes that are needed to install and launch Dokuwiki. In the long run it may be necessary to change SELinux configuration to allow Dokuwiki to run, so that SELinux can be re-enabled for added security.
Next, the command yum update -y is used to update the server. A number of prerequisites are downloaded and installed using yum, and auto-updates are enabled to keep these dependencies up to date. Next, a number of firewall configuration commands are entered. Finally, it’s time to download

Related Documents

  • Decent Essays

    The Docker Chapter Summary

    • 1565 Words
    • 7 Pages

    You might also be asked to provide the username for your system. After providing these, just press the button written “Install Software” and the installation process will continue. This is shown…

    • 1565 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Tartan Case Study

    • 969 Words
    • 4 Pages

    Reading question 1: 1. CH4 exercise question 1: One activity is critical to me and needs to be added to the “code-and-fix model”[1] is the design review. This design review should be added after Problem statement and before Code. It could be done by the software engineer himself, or the software engineer could also invite others to review his design. This is important since we will spend less effort to find design bugs if we filter those bugs as early as possible.…

    • 969 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Reading the deployment and the maintenance part gives the reader knowledge about the installation, installation and user guidelines. The conclusion part tells the reader about the advantages and limitations of the project. It also includes extendability of the project in terms of future scope this will help the reader decide whether to go for the software or not. 5.3 Project Scope We developed a system, which can handle an isometric non-linear distortions…

    • 1824 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    UUIDs fit the bill here, so each device was identified by a UUID (Leach, Mealling, & Salz, 2005). The value in the dictionary had to be customized to store data for a client. Therefore, I created a class that could hold a variety of information regarding the client. The next step was to create the handlers for each command. I created a “connect” URL that clients visited the first time they connected to the botnet, a “checkin” URL that they check in to every 30 seconds, and a “fileupload” URL where the client sends a file and metadata to the server.…

    • 2049 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    g. User awareness and training should be periodically done to inform users of the risks associated with obtaining files and software either from non-trusted websites, or on any other medium, indicating what protective measures should be taken. Bulletins and other informational messages should be regularly released for this purpose. h. Regular update of the operating system and applications should be done to avoid vulnerabilities to these malicious…

    • 1344 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    During this experience at ClientServer technologies, my knowledge in programming and database have been improved. I was told to create a database and execute complex queries. In the initial stages, it was difficult for me to follow industry standard. With the help of other employees, I could learn many new technologies and could implement them in the project. I learnt how to use Dreamweaver to create and design many web pages.…

    • 1873 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Kelly's Salon Case Study

    • 1186 Words
    • 5 Pages

    Because SaaS is a web-based solution, configuration will be done by an IT expert on HTTPS to allow uses authenticate data transfer location. Subsequently, this kind of configuration guarantees data integrity and privacy important aspects of Kelly’s saloon. Alternatively, the system might be configured on PostgreSQL, which directly backs up data to the servers. d. Testing Testing of SaaS integrates different techniques such as Agile that accelerates the procedure. SaaS has an automated vendor that offers testing services.…

    • 1186 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Minitab Essay

    • 1014 Words
    • 5 Pages

    Try to retrieve the backup file of the project – When we open a project file, Minitab automatically creates and saves a backup file in the same project folder with a specific file format. For example is the project file is PROC.mpj then the backup file would be PROC.mpj.BAK. ii. Try recovering individual worksheets – if we are not able retrieve the backup copy, we can try recovering individual worksheets. iii.…

    • 1014 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    As media strategist it is extremely important for us to know the flow of content strategy. Each content on a website, social media, or any other platform is planned out before hand. However, content is not published on the spot if you’re a media strategist, perhaps, it will run through a phase of strategy in order to maximize its value. As a matter of fact, the Lynda UX: Content Strategy course is a useful tool to understand how content strategy works and how to begin the process. With that being said, I took the proceeded to learn how content strategy works by providing a summary of the content learned in the course and the areas I will like to work on and how I will apply it to my current project as a Media Communications student at Full…

    • 778 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Workers will get training on ways of using the system and detecting threat to ensure that there is no loop hole for data manipulation. In terms of maintenance, the company will update the system; antivirus software’s and change passwords regularly as a way of improving the control…

    • 1257 Words
    • 6 Pages
    Decent Essays