0% found this document useful (0 votes)
19 views1 page

18 Session Mid

The document discusses questions related to configuring a Squid proxy server and Apache web server on Red Hat Enterprise Linux and CentOS platforms. It includes configuring Squid for internal and external networks, firewall rules, caching, blocking websites, and authentication. For Apache, it includes virtual hosts, SSL certificates, and authentication.

Uploaded by

shahrbano 14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views1 page

18 Session Mid

The document discusses questions related to configuring a Squid proxy server and Apache web server on Red Hat Enterprise Linux and CentOS platforms. It includes configuring Squid for internal and external networks, firewall rules, caching, blocking websites, and authentication. For Apache, it includes virtual hosts, SSL certificates, and authentication.

Uploaded by

shahrbano 14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

SYSTEM PROGRAMMING MID 18 SESSION

Q1 What is the meaning of the term "deployment" in LINUX? Describe different


methods of deployment software in Redhat enterprise LINUX and Debian platforms
along with benefits and limitations of each method.

Q2: Question: You need to configure the Squid server in RedHat Enterprise CENTOS
LINUX platform for the following given below scenarios.
a) Set the hostname of your CENTOS LINUX PC as your name along with uet e.g.,
zahiduet.
b) Install two LAN cards in your CENTOS LINUX PC and configure one LAN card (Use
for Squid Internal Network) with any class B network of your choice and configure
second LAN card (Use for Squid External Network) with any class A network of your
choice.
c) Verify that Squid server is installed and running on your PC at system startup
automatically (install Squid server if it is not installed after querying at RedHat
Enterprise LINUX platforms).
d) Add Squid Server port in LINUX Firewall.
e) Configure squid server so that It can share internet on clients computers
according to the requirements of part b of Q1.
f) Setup squid server cache log and access log.
g) Configure squid server as transparent proxy server.
h) Configure squid server so that it can block 5 websites of your choice on clients
PC’s while rest of the internet access is allowed on client PC’s.
i) Configure squid server to block whole internet access on client PC by using any
specific IP address of your choice.
j) Configure squid server to block whole internet access on client PC by using any
specific MAC address of your choice.

KEEP IN MIND TO PREPARE WEB SERVER AND private SSL certificate ALSO POSSIBLE
QUESTIONS ARE

1. You need to configure the apache web hosting server in RedHat Enterprise CENTOS
LINUX platform
for the following given below scenarios; (15 Marks) (CLO-2)
a) Set the hostname of your CENTOS LINUX platform PC as your name along with uet
e.g. aliuet.
b) Install four LAN cards in your CENTOS LINUX/Debian platform PC and setup IP
addresses for
each LAN card.
c) Verify that apache webhosting server is installed and running on your PC at
system startup
automatically (install apache server if it is not installed after verifying).
d) Create 16 port based virtual hosts for web hosting of 16 different web sites
that listen on 16
different ports and test that it all works.
e) Create 16 named based virtual hosts for web hosting of 16 different web sites
that all listen on
port 80 and test that it all works.
f) First 8 web sites will ask for authentication of user name and password before
displaying their
website contents while rest 8 websites will not ask for authentication for
displaying their
website contents. (Note: Use different user accounts for authentication of 1st
eight websites.)
g) You need to generate and configure private SSL certificate for each name based
and port-based
website individually.

You might also like