Skip to content

Latest commit

 

History

History
390 lines (257 loc) · 7.32 KB

File metadata and controls

390 lines (257 loc) · 7.32 KB

Final Project Bare Metal Server 1

Bare Metal Server 1

Subnet Range: 192.168.10.0/24
VLAN: 10
Name: BMS01
Rack: AH310
Slot: 21
Type: HPE ProLiant Server DL360 Gen9

Documentation: https://support.hpe.com/connect/s/product?language=en_US&kmpmoid=1010007891&tab=driversAndSoftware&manualsFilter=66000035&driversAndSoftwareFilter=8000078

Defaults:
	Username: Administrator
	DNS Name: ILOSGH614V4FJ
	Password: 11222333
	Server Serial: SGH614V4FJ

SATA: 1 x 500GB Port 1 box 1 bay 1
RAID: 0
SET BOOTABLE LOGICAL VOLUME

192GB RAM
24 CPUs x Intel(R) Xeon(R) CPU E5-2673 v3 @ 2.40GHz

iLO: 192.168.99.50 / 24
iLO Gateway: 192.168.99.254 / 24
ilouser: !Tafe@nsw2025

Restful iLO tools: https://support.hpe.com/connect/s/product?language=en_US&kmpmoid=1010007891&tab=driversAndSoftware&manualsFilter=66000035&driversAndSoftwareFilter=8000093

Additional Drivers:

Broadcom NIC.exe
HP Array Config Utility.exe
HP Chipset identifier.exe
HP QLogic 10-25-50GbE driver.exe
iLO 4 Channel Interface driver.exe
iLO 4 Management Controller driver.exe
Matrox G200 Video Drivers.exe
Smart Array Controller HPCISSS3.exe
Smart Array Controller.exe
Storage Fibre channel over ETH.exe

iLO Switch Configuration

iLO Switch: 3 (192.168.99.233)
Type: HP2530 48 Port
Port: 20
Cable: NS1P20

HP Switch Configuration:

configure
vlan 99
  tagged 20
  exit
exit
write memory

Cisco Switch Configuration

Fibre Switch: 1 (192.168.99.231)
Type: Cisco Nexus C3164Q 40GE
Port: 28
Cable: NS2P28

Configuration:

en
conf t
interface Ethernet 1/28
switchport mode access
switchport access vlan 10
exit
exit
copy run start

Windows Server 2025

local Administrator: !Tafe@nsw2025

IPv4: 192.168.10.20 / 24
Gateway: 192.168.10.254
VLAN: 10

Interface: HP InfiniBand FDR/Ethernet 10GB/40GB 2 port 544+ FLR-QS Ethernet Adapter
Embedded Flexible LOM Port: 1

HPE FDR InfiniBand Adapter Manual: https://support.hpe.com/connect/s/product?language=en_US&kmpmoid=1008852053&tab=manuals

Additional Drivers:

Broadcom NIC.exe
HP Array Config Utility.exe
HP Chipset identifier.exe
HP QLogic 10-25-50GbE driver.exe
iLO 4 Channel Interface driver.exe
iLO 4 Management Controller driver.exe
Matrox G200 Video Drivers.exe
Smart Array Controller HPCISSS3.exe
Smart Array Controller.exe
Storage Fibre channel over ETH.exe

Active Directory

Administrator: !Tafe@nsw2025

Name: SRV01
DNS Name: SRV01.dca.com.au

AD: dca.local

DNS: enabled
Global Catalog: enabled

DSRM Password: Route2025!

Create DNS Delegation: yes
Netbios name: DCA

UNP suffix: dca.com.au

Active Directory, you can add additional (alternative) UPN suffixes using the Active Directory Domains and Trusts graphic console or PowerShell.

Powershell Console:

Get-ADForest | Format-List UPNSuffixes

If the list is empty, it means that you are using a default UPN suffix matching your DNS domain name.

To add an alternative UPN suffix:

Get-ADForest | Set-ADForest -UPNSuffixes @{add="dca.com.au"}

Open ICMP port for ping (IPv4) for testing connectivity

Powershell Console:

New-NetFirewallRule -Name 'ICMPv4' -DisplayName 'ICMPv4' -Description 'Allow ICMPv4 Ping' -Profile Any -Direction Inbound  -Action Allow -Protocol ICMPv4 -Program Any -LocalAddress Any -RemoteAddress Any 

Check rule

Get-NetFirewallRule | Where-Object Name -Like 'ICMPv4'

Enable rule:

Enable-NetFirewallRule -Name 'ICMPv4'

Disable rule:

Disable-NetFirewallRule -Name 'ICMPv4'

Add Hyper-V management tools not as a Role Just for Hyper-V Manager to connect to remote servers.

Powershell Console:

add-windowsfeature rsat-hyper-v-tools

DHCP

Name: 192.168.10.0
Scope:
	start: 	192.168.10.100
	end:	192.168.10.120

	length: 24
	mask:	255.255.255.0

	duration: 8 days 0 hrs 0 sec

	router(default gateway): 192.168.10.254

	Time Server: 192.168.99.1

	parent domain: dca.com.au

	DNS:	192.168.10.20
	2DNS: 192.168.10.21

DNS dca.com.au

Add Hosts

	srv01.dca.com.au (192.168.10.20)
	srv02.dca.com.au (192.168.10.21)
	hyperv01.dca.com.au (192.168.10.22)
	hyperv02.dca.com.au (192.168.10.23)
	nas01.dca.com.au (192.168.10.24)

	monitor01.dca.com.au (192.168.10.30)
		cname: zabbix01.dca.com.au

	monitor02.dca.com.au (192.168.10.31)
		cname: nagios01.dca.com.au

SNMP

SNMP Service: installed / running
community: craptrap

Trap Destinations:
192.168.10.30
192.168.10.31

Send Auth:
accepted community name: craptrap / RO

Accept SNMP from hosts:
192.168.10.30
192.168.10.31

SNMP Monitoring {#snmpmon}

https://techwithjasmin.com/monitoring/install-and-configure-snmp-on-hyper-v-server-core/

See if SNMP is installed and running

powershell:

Get-WindowsFeature SNMP*

Install SNMP service:

Install-WindowsFeature SNMP-Service

SNMP WMI Provider:

Install-WindowsFeature SNMP-Service -IncludeAllSubFeature

Check if firewall rules added

Get-NetFirewallRule -DisplayName "*SNMP*"

Configure SNMP Service

There are no PowerShell cmdlets for SNMP administration. Need to access SNMP service from Server Manager or MMC (Microsoft Management Console) on the Windows server 2025.

Windows 2025 Server:

Open Server Manager (Services)

Expand Services and navigate to SNMP Service and then Right click > Properties.

Click on the Security tab to configure community string and ACL.

Click on Add… under Community to create a community string.

Select Accept SNMP packets from these hosts and click Add… to add the IP of your NMS (Network Monitoring Solution).

community: craptrap

Trap Destinations:
192.168.10.30
192.168.10.31

Accept SNMP from hosts:
192.168.10.30
192.168.10.31

Zabbix Windows agent 2 v7.0.11 {#zbxmon}

Packaging:	MSI
Encryption:	No encryption
Linkage:	Static

Checksum:	
sha256:	b324fac33f1cabc272dcddb50b6ed1675642b1d719ac1c630052c34d83eddd7c
sha1: 800fab634d5dfcf9b572533a3ee8ce386f37ab84
md5: 43eee60f24e907504617132c79d8bf80

DOWNLOAD https://cdn.zabbix.com/zabbix/binaries/stable/7.0/7.0.11/zabbix_agent2_plugins-7.0.11-windows-amd64.msi

Manual: https://www.zabbix.com/documentation/7.0/en/manual/concepts/agent2

https://blog.zabbix.com/monitoring-windows-servers-with-zabbix-agent/29945/

Configure host in Zabbix Server

To set up a host on Zabbix Server, go to the Zabbix frontend and go to Data collection > Hosts.

Then, click Create host (located in the top right) and configure the following details:

  • The hostname (SRV01)
  • An identifying display name (such as ‘Windows Server’)
  • The template (select ‘Windows by Zabbix Agent’)
  • The group (assigns the server to an appropriate group)
  • The interface (choose the agent monitoring option and enter the IP of the server)

To install Zabbix Agent 2 client on Windows Sever 2025 host:

Map a network share to p: drive where the zabbix_agent2-7.0.11-windows-amd64-openssl.msi lives.

net use p: \\srv01\installation

Run msiexe.exe to automatically install the client.

msiexec.exe /l*v "C:\zabbix\package.log" /i "p:\zabbix_agent2-7.0.11-windows-amd64-openssl.msi" /qn+ SERVER=192.168.10.30 ADDDEFAULT=ALL ADDLOCAL=ALL ENABLEPATH=1 LISTENPORT=10050

Nagios Monitoring

Installation Instructions: https://assets.nagios.com/downloads/ncpa/docs/Installing-NCPA.pdf

NCPA Client

Token: 7e4dbbad854c285
Log Level: warning
Bind IP: 0.0.0.0
Bind Port: 5693
SSL: TLSv1_2

NRDP Configuration

Send Passive Checks: enabled

URL:
NRDP Token:

Check Interval: 300 seconds