VCP 6 5 Training
VCP 6 5 Training
03 Install Role
- Active Directory
- DNS Service
- Activate Remote Registry (Services -> Remote Registry -> Startup Automatic)
- Server Manager -> Upper right Alert -> Promote this server to a domain
Controler
- Add a new forest
- Specify root name (rdm.local) -> Next
- Specifiy domain controller capabilities (DNS, GC)
- Type the Directory Service Restore Mode (DSRM) password (for
recovery) -. Next
- Error will appear. This error is normal because we do not have any
DNS server yet. Next
- Leave default for the NetBIOS name -> Next
- Paths for Database NTDS, Logs NTDS and SYSVOL
NOTE: Leave if you don't have any location
- Review the installation and click Next.
NOTE: You can view the script and save it or use this script to
install AD DS
Import-Module ADDSDeployment
Install-ADDSForest `
-CreateDnsDelegation:$false `
-DatabasePath "C:\Windows\NTDS" `
-DomainMode "Win2012R2" `
-DomainName "rdm.local" `
-DomainNetbiosName "RDM" `
-ForestMode "Win2012R2" `
-InstallDns:$true `
-LogPath "C:\Windows\NTDS" `
-NoRebootOnCompletion:$false `
-SysvolPath "C:\Windows\SYSVOL" `
-Force:$true
NOTE: MAKE SURE PUT NETWORK LOCATION AWARENESS TO DELAYED START or the
Network NIC will be on Public Network and Unidentified network
- Services.msc -> Network Location Awareness (Delayed Start)
This is due to the fact the domain controllers are still trying
to use the old PDC Emulator as their time source.
You can quickly rectify this by running the command:
- w32tm /resync /rediscover
POWERSHELL
You will see that this key has listed a bunch of diagnostic features,
all set to zero. You can enable the logging for each
of these events by changing the number to anything up to 5. A
list of what each number does can be found here.
Now keep your eye on the Event Log for event ID 2889, which will
contain the IP Address of the client connecting with these binds.
Alternately, if you disable these binds, the server will post one log
event every 24 hours with ID 2888.
After a few days, or hours, or no time depending upon how patient you
are, you may check the Event Log and find these entries, or not.
To make things easier you could create a custom log in event
viewer, and filter in only event id’s 2886, 2888, and 2889.
As you can see, my filter is only finding event id 2886, which is the
security for the bind warning. I am not seeing any 2888 or 2889,
which would mean that clients were connecting using these binds.
So let’s go ahead and correct the security vulnerability less privilege is more.
- Right click your domain, and click Create a GPO and link it here…
- Then open the GPO by right clicking it and selecting Edit. Now drill
down to:
- Server Manager -> Add roles and features -> Add Roles and Features
Wizard (Menu) -> Next
- Select Role-based or feature-base installation -> Next
- Select DHCP Server -> Next - Features -> Select .NET Framework 3.5
Feautres -> Next
- DHCP Server -> Next -> Confirm Installation Selection -> Install
- Open Server Manager and click NOTIFICATIONS ICON. Small window will
appear. Click Complete DHCP configuration
STARWIND
- https://www.starwindsoftware.com/download-starwind-products <// Download
Starwind and check for installation instruction
Server 2012 iSCSI SAN feature to configure shared storage for fail-over
clustering for Hyper V and VMware VSphere, and other.
LAB Environment
- Memory 6144 MB
- Processor 2x2
- Hard Disk (SATA) 60 GB
- Hard Disk 2 (SATA) 100 GB
- Hard Disk 3 (SATA) 60 GB
- CD/ DVD (SATA) Using file
- Network Adapater VMNet 3 (Host Only)
- USB Present
- Display Auto detect
INSTALLATION
a. Server Manager -> Manage -> Add Roles and Features -> Add Roles and
Features Wizard (Next)
b. Select Installation Type -> Role-based or feature-based installation
-> Next
c. Select Destinaton Server Option -> Select a Server from the Server
pool -> Next
d. Select Server Roles Pages, (Expand) File and Storage Service role ->
(Expand) File and iSCSI Services feature ->
(Select) iSCSI Target Server feature -> Next
e. Feature Page -> Next
f. Review the confirmation page and INSTALL -> After installation is
complete (Finish)
NOTE: Before creating any virtual disk or LUNs the disks needs to be online
and create a NTFS partition on these disks.
Bringing online, go to Server Manager -> (Click) File and Storage
services tab -> (Select) Disks tab -? (Right Click Disk) -> (Click) Bring Online.
Repeat step for each disks. (Warning will appear after clicking) Bring
Online -> Read and click YES.
CONFIGURATION
a. Create volumes in these disk -> (Right-click the disk) and (Select)
New Volume
b. Volume wizard will pop up -> Next -> Choose the server an disk and
Next
c. (OK) on warning -> Specify size of the volume -> Next
d. Assign drive letter to new volume -> Next
e. Select System -> Next -> Review Confirmation page -> (Click) Create.
f. Repeat the same step for other disk to create. To view the volumes,
(Click) Volumes tab.
PREPARATION OF VCENTER
01 The domain join cannot be completed because the SID of the domain you
attempted to join was identical to the SID of this machine.
- cmd -> C:\Windows\System32\Sysprep\sysprep.exe
- Click on start button and Type ‘RUN’
- In Run Prompt type ‘%WINDIR%\system32\sysprep’
- Double click on ‘sysprep’ and check ‘geberalize’ checkbok as per
below image.
VMWARE
INTRODUCTION
LABORATORY ENVIRONMENT
- HOST - Windows 2016 DataCenter
- Intel i7 3.4Ghz (2nd Gen)
- 32GB Memory
- Hyper Vison VMware Workstation 12PRO
- ISO Image / Windows Server 2012 R2, VMware ESXi 6.5, VMware VSphere 6.5
- Starwind SAN Software/ Microsoft 2012 R2 iSCSI Service
REQUIREMENTS:
- Writable domain controller. AD deployment may include what's known as
a read-only domain controller (RODC).
While it is possible to join a PSC or vCenter to a domain with
read-only domain controller (RODC), scenario is nonetheless
unsupported by VMware.
- Fully Qualified Domain Name (FQDN) must be used for vCenter when
adding it to AD such as vCenterProd.acme.local. You will not
be able to join it if you use an IP address instead.
- Make sure no firewall is restricting vCenter from reaching the
domain's controllers.
- The clocks on all resources must be in sync.
- vCenter must be able to resolve DNS names for the AD domain - and
controllers - it is being joined to
- On vCenter, create a local user account as a member of the
SystemConfiguration.Administrators group.
Alternatively, use the local [email protected]
NOTE: When vCenter is back online, the AD domain to which it's been
added should be listed in the Doman field. to remove vCenter from te AD domain,
Click on the Leave button
You'll need to reenter the credentials-or similar - used to join
it in the first place and reboot it for the change to take effect. If all went
acccordng to plan,
vCenter is now a member of the AD domain. Means that AD security
principals - translated AD users and groups - can be used for authentication
purposes and to assign
permission on vSphere objects. However, we still need to execute
a couple more tasks before we can do this.
ADDING an SSO IDENTITY SOURCE // SSI identity source are the means
through which additional authentication domains are added to vCenter. This makes it
possible to leverage user
accounts and groups from a number of disparate security domains.
A domain local to vCenter is always created by default. This domain is called
vsphere.local
unless you changed it to something elses while installing
vCenter. The [email protected] account you're familiar with, is a member
of this domain hence
the suffix. If you're using vCenter for Windows, you should also
be able to authenticate and set permissions using users and groups local to the
Windows server
where vCenter is installed.
- vSphere Web Client -> Home -> Administration -> Single Sign-on ->
Configuration -> Identity Sources -> + (green plus sign) Add identity Source ->
Add identity Source Menu -> (first option) Active Directory
(Integrated Windows Authentication)
NOTE: Domain name is automatically picked up. Leave the Use Machine
Account option selected. Alternatively, select the SPN option if you're planning on
renaming
vCenter which is something you should avoid doing as it is not
supported by VMware.
- Add identity source menu, Domain Name: rdm.local, Use machine account
-> Next -> Review information -> Finish
NOTE: You should now see the identity source listed. You can also set
any of the identity sources as the default domain. For instance, if you prefer to
log in with
your AD credentials, set the AD identity source as the default
domain. Doing this, voids the need to append the domain bit to the username. If
wanted to log
with AD account, only use rmagistrado instead of
[email protected]
NOTE: With the AD identity source in place, we can now authenticate and
set permissions using users and groups from AD.
Consider for instance the vCenter Server object at the top of the
inventory hierarchy. By default, the inbuilt local Administrators group has full
access
to it and, by propagation, to the remaining objects in the
inventory as the group is automatically added to the Global Permissions list where
it is assigned
the Administrator role. You may wish to assign the same to an AD
user account or group.
- Home -> Administration -> Access Control -> Global Permissons ->
Manage -> Add Permission
- Add Permission Menu -> Add -> Select Users/ Groups Menu -> Domain:
rdm.local -> User/ Group : rmagistrado -> Add -> OK
- Global Permission Root - Add Permission Menu -> (Select)
Administrator -> (Check) Propagate to children -> OK
- Verify -> Home -> Hosts and clusters -> Permissions (See the AD
account or group just added, listed)
REQUIREMENTS: (LAB)
- Processor 2x2
- Memory 5GB
- Hard Disk(SCSI) 40GB
- CD/ DVD (IDE) AutoDetect
- NIC 8 NIC Bridge
- USB CONT. Present
- Display Auto Detect
-> (Press) ESC -> Type :wq (Save and Exit) ifdown ens192 && ifup ens192
-> Open browser -> type IP eg. https://192.168.1.30:9090 -> Advanced ->
(Click) Proceed to 192.168.1.30 (Unsafe)
-> Supply username and password (Credentials) / root/root ->
-> Starwind Virtual SAN Menu -> Change System Time -> (Click System
Time) Select Time Zone -> Set Time Manually -> Change
-> Starwind Virtual SAN Menu -> Storage -> Right Menu (Check the
Available Disk To Add in VSAN Server)
-> Select Disk by Clicking on it -> Create Partition Table -> Format
Disk /dev/sdb (Menu) -> Select in Erase (if New HDD) Don't overwrite existing data
Partitioning: Compatible with all systems and devices (MBR)
Format
-> (Click) Create Partition -> Selection (Erase: Don't overwrite
existing data, Type: XFS - Red Hat Enterprise Linux 7 default, Name: vDisk01,
Mouting: Custom, Mount Point: /mnt/vDisk01, Mount options (Check)
Mount at boot, (Click) Create partition
-> If Disk is not Mounted Select the Disk -> Click the Disk ->
FileSystem -> (Click) Mount (It should mount and display it the system. Follow
steps
If there is additional disk to be configure.
-> Install StarWind Management Console -> Click starwind-v8 -> Accept
the agreement Next -> Select StarWind Management Console/ Configure user account
for Web-access to Management Console -> Software Location Next ->
Desktop Icon Next -> License Key Next -> Install
-> StarWind Management Console -> Add Server -> Supply Host IP/ Port
3261 OK -> Connect
-> Server ->vDos
-> Server -> Add Device -> (Select) Device Type/ Hard Disk Device ->
Disk Type/ Virtual Disk -> Virtual Disk Location/ Name: vDisk-ISO, Location: VSA
Storage\mnt\vDisk01, Size: 15GB
-> Thick-provisioned Next -> Write-Back Next -> No Flash Cache
Next -> Create -> Close
07 Configuring Multi Pathing Network for Storage Access (REDUNDANT ACCESS NETWORK
FOR STORAGE)
NOTE: VMNIC0/ VMNIC01 Management Network
VMNIC2/ VMNIC3 iSCSI Storage Network
-> ESXi Host -> Configure -> Networking -> Virtual Switches -> Select Switch
that are available (eg. vSwitch0)
NOTE: VM Network, either to remove or stay as it is.
-> (Select) Management Network -> (Network Adapter ICON) (Click) Management
the Physical Network Adapters -> Add Adapters -> (Select) Adapters that tobe added
(eg. vmnic1) -> OK
-> Management Network (Select) Edit Settings -> (Select) Teaming and
failover -> (Mask) Unused adapters to Active adapters (eg. vmnic1) -> (Select) OK
NOTE: This is to group the management and have FA
NOTE:
CHECKING PROGRAM USING PORT 80 IN WINDOWS
- netstat -anb >%USERPROFILE%\ports.txt <// CMD run in elevated
- netstat -anb | findstr :80 <// run with filter
- netstat -aon | findstr :80 <// -a displays all
connections and listening ports
-o displays the owning process
ID associated with each connection
-n displays addresses and port
numbers in numerical form
- netstat -ano ^| findstr "0.0.0.0:80
- tasklist /svc /FI "PID eq 1348" <// You can then use the
"tasklist" command with the specific PID that corresponds to a port in question.