Yes, another server. 🙂 However this one is going to be the new home of my current Hyper-V server. It won’t have many drives in it, but it will have 2 raid’d 1tb drives for the os and some files & ISO’s. The virtual servers will be stored on a new 2008r2- Storage server with 8 2tb drives in a Raid 5 config, using ISCSI.
Spec’s of the new server :
Intel Quad Core Xeon 2.4 with Hyper threading.
32 gigs of DDR3 ECC memory
2 x 1tb drives In Raid config.
Windows 2008R2 With Hyper-V Enabled.
Lexmark training was a blast, the teacher was awesome, great guy and very helpful.
One of the beasts i worked on, stripped down to chassis and re-assembled..
What they arrived in, so they survive.
One beast apart.
Powered back on, did some tests, calibrations.
I think I was suppose to be shipped back to Lexmark ?
Got me a new APC UPS, rack mounted of course, “AND” a 1500. Last week my 10 port basic PDU arrived, soon I’ll purchase a network controllable PDU, but for now ill use the one I have.
How to setup untangle a few different ways at home. Personally, im a fan of multiple subnets to “separate” interfaces.
As you will see a perfect example of Untangle running 5 interfaces 1 in ( from isp ) and 4 out.
Looking at this we have : 4 internal interfaces. Typical setups at home that people have used is just 2 interfaces one ( isp ) and one to internetwork then into a multi port switch.
“mine” is not setup like that, i have 4 internal interfaces, each has it’s own ip address into each own subnet.
I have :
192.168.9.1 ( DMZ )
The reason for this is so i can block and stop traffic on each subnet to each other or allow it. As it stands all i have a WAP ( wireless access point ) connected to interface 3.1, anything that is wireless in my house ie laptops cell phones etc etc gets a 3.x address.
Interface 192.168.2.1 is connected to a gigabit switch 24 port to be exact, this has my servers nas drives and other units connected to it.
Interface 192.168.4.1 is connected to a 24 port 10/100 switch, the reason for this is so when i work on computers they get connected to this switch OR my wireless, reason for this ? If i have a windows machine that is heavily infected and it gets connected to the network, it won’t infect any machine on my network ie my servers etc etc. Perfect way to sto malware viruses from attacking / infecting my personal home computers & network.
Another reason why i have the wireless on another subnet, ever have friends or guests over that want to use your wireless, but you just never know if they have a virus or malware. Well, i never have to worry because they can’t see or get to my other network’s. I have created access rules to block all traffic from other subnets. I do have a ALLOW rules for my laptop to gain access to my NAS drives & one server for monitoring and working on.