D087 Tips and Examples

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

1000

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

27

Uploaded by LieutenantHackerSeaUrchin7664

Report
D087 Tips and Examples Hello! Thank you for taking the time to review this resource! This document was created to address the common questions and concerns encountered when working on the performance assessment. Performance assessments are evaluated by another team and not by your instructor. Unlike Objective Assessments which have a maximum number of 4 attempts, performance assessments (which this course uses) have no maximum on attempts, so this may relieve some of the stress when learning the material. If you are catastrophizing, overthinking, running into analysis paralysis , or get stuck for longer than 10 minutes, please reach out and ask for help. We are always happy to help! You are not limited to or required to use the course learning resources to complete the Performance Assessment. You are free to use any resources as you see fit to complete the performance assessment, and we recommend working on it as you go through the course so you know what you need to learn to complete it. In fact, it is very common to research how to perform a task using google, stack overflow, and vendor documentation when you are developing a solution as an engineer. Learning how to learn is a key skill to being successful in many IT and engineering jobs! To help with learning the material, I highly recommend embracing a growth mindset (the audiobook can be found on youtube ). Below are tips and examples that you may find helpful when working on the Performance Assessment: Table of Contents Table of Contents Table of Contents ........................................................................................................................ 1 Tips and General Info .................................................................................................................. 1 A. Systems analysis of current environment ................................................................................ 1 B. Virtualization Solution .............................................................................................................. 1 C. Security ................................................................................................................................... 1 D. Implementation Process .......................................................................................................... 1 E. Performance Tuning ................................................................................................................ 1 F. Load Balancing ........................................................................................................................ 1 G. Proof-of-Concept Implementation Build .................................................................................. 1 H. Presentation of Proof of Concept ............................................................................................ 1
PFsense ................................................................................................................................... 1 NLB setup ................................................................................................................................ 1 IIS ............................................................................................................................................ 1 NIC Team setup: ...................................................................................................................... 1 Domain Controller setup: .......................................................................................................... 1 DHCP installation and scope config ..................................................................................... 1 I. Acknowledge sources ............................................................................................................... 1 J. Professional Communication ................................................................................................... 1 Unexpected Lab or VM issues (missing VM or content, can't launch lab, etc.) ............................ 1 Unable to reach pfsense web console .................................................................................. 1 Add an allow all WAN rule from the shell ................................................................... 1 Disable the Firewall ......................................................................................................... 1 the specified domain does not exist or cannot be contacted ............................................. 1 The RPC server is unavailable .............................................................................................. 1 NICs with duplicated mac addresses ................................................................................... 1 VMs randomly shutdown / power off .................................................................................... 1 VMs have no internet connectivity ....................................................................................... 1 Unable to send keys to esxi vms .......................................................................................... 1 How to get help ............................................................................................................................ 1 Tips and General Info We recommend reviewing the performance assessment to get familiar with expectations of the assessment. As you do this, you will notice that this course is organized to closely follow the assessment, so you may decide to work on the course resources and the assessment at the same time, allowing you to continually build and test. We recommend that you avoid developing solutions from scratch as there is a good chance someone has already solved the problem. Github, googling, and stack overflow are good resources. With that being said, some modifications will be required, ensure that you understand the solution that is used, and avoid questionable sources which may lead to bad questionable practices . For the Performance assessment, you will have to design and build a virtualization solution to expand your company’s data center in order to meet the needs of the
business. You will complete a prototype of the virtualization solution as a proof of concept. This will be completed and documented in the Proof-of-Concept Design Template document found in the supporting documents section on the task overview page. Regarding the required configurations for the proof of concept: vNET1 and vNET2 should be on a NIC team and configured to permit inbound requests from any IP address. This terminology is more consistent with Hyper-V, The task is talking about network adapters instead of VLANs. So think network interface configurations, instead of VLANs. The firewall rules for the 2 windows server 2019 datacenter installs can be configured within the respective operating systems. Just make sure both “inbound” and “outbound” rules are configured appropriately. You dont have to block all traffic not specifically permitted: There is an intro to pfSense video in the course that will serve as a good start if you don't have experience with pfSense. You don’t have to focus on the “via vNet#” piece. The important thing is that you block specific services from coming into the environment. The virtual network configurations don't have to be VLANs. vNet1, vNet2, vNet3, and vNet4 are just separate network adapters. The lab environment used for the PA can be found here . The username/password to log into the W10-Admin VM and ESXi host is the same one used in the labs from the course. Use CORPADMIN / Passw0rd! To log into W10-Admin, root / Passw0rd! To log into the ESXi host). ESXi can be reached from the win10 admin machine by going to: http://172.16.0.213 . The 2 windows server 2019 datacenter installations should be domain members of augustacrissy.lab , not augustacrissy.com. The augustacrissy.com mentioned in the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
scenario document in red below is a typo: A. Systems analysis of current environment Provide a brief summary of why virtualization is needed given the company requirements and provide a justification based on three limitations of the current configuration. 3-5 paragraphs of content should do. You can write this by dedicating one paragraph to each of the following: Intro and summary including 3 limitations Discussion of limitation 1 Discussion of limitation 2 Discussion of limitation 3 Summary and conclusion of what was discussed above. Below is an example : Due to the popularity of their new virtual reality escape room game, the anticipated server resources required to run Augusta Crissy Detective Games’ will increase in the future. Additional servers will need to be installed and brought online to support this increase in demand. Due to data center limitations, adding additional physical servers in the future will not be feasible. Transitioning to a hybrid cloud featuring local servers in addition to cloud servers will allow the company to overcome these limitations. Additionally, according to “The Advantages and Disadvantages of Virtualization”, deploying cloud servers requires less capital investment and results in reduced downtime when compared to installing new physical servers. Finally, managing physical servers is more difficult than managing virtual servers.
In order to bring new servers online to support the increase in demand, additional physical space will be required to support the server hardware, power, and cooling systems. However, there is no additional leasable space available to support this expansion. The proposed solution is a hybrid cloud expansion where virtualized server instances are brought online to support the increase in demand. By deploying additional servers to a virtualized environment, these additional resources will not be necessary. Traditionally, deploying physical servers requires a high upfront capital investment. In contrast, virtualization does not require this same capital investment due to the sharing of hardware. Additionally, virtualization can extend the life of existing hardware (“The Advantages and Disadvantages of Virtualization”, 2015). According to “The Advantages and Disadvantages of Virtualization”, managing a virtualized server is easier than managing a physical server. Installing and maintaining software is a virtualized environment is easier than a physical environment. Additionally, virtualized environments experience less downtime and faster recovery. B. Virtualization Solution Describe a proposed configuration solution to meet the business and technical requirements outlined in the “Company Overview and Requirements” attachment. A diagram is not required, though we recommend making one to plan out your solution for the proof of concept build in the lab. 3-5 paragraphs of content describing how each of the requirements are used will do. Below is a list of the requirements from the scenario you should describe being used: 1 x windows 10 enterprise - JMP01 1 x windows server 2019 standard - Domain Controller (DC) 2 x windows server 2019 datacenter - This is called IIS1 / IIS2 (NOT to be confused with the domain controller - DC) 1 x vsphere 6.7 esxi free version 1 x pfsense You can use the configuration details from the scenario document to describe how each is being used. You can structure each paragraph in the following way describing how each of the above requirements are implemented and used (you do not have to do it this way, this is only an example): Paragraph 1 summarizing the solution and how each of the above requirements are used Paragraph 2 describing how windows 10 enterprise is implemented and used Paragraph 3 describing how windows server 2019 standard is implemented and used Paragraph 4 describing how windows server 2019 datacenter is implemented and used Paragraph 5 describing how pfsense is implemented and used You can discuss how esxi is being used to run each instance in each of the respective paragraphs above. Below is an example :
A virtualized environment will be deployed to an ESXi host in compliance with the configuration outlined in the Company Overview and Requirements document. HOW THE SOLUTION MEETS BUSINESS NEEDS This solution outlines some of the benefits of virtualization and should therefore provide an adequate demonstration of the merits of virtualization. In order to fully meet business needs this solution should be deployed alongside a vSphere Datacenter. This would enable full active directory integration and a much larger feature set than is available in the free release of ESXi. HOW THE SOLUTION MEETS THE TECHNICAL REQUIREMENTS The system that has been deployed follows the requirements outlined in the provided requirements document. Full details on the specifics of the implementation specifics are listed below. VIRTUAL HOSTS The following hosts will be deployed: DC01 This system will act as the domain controller for augustacrissy.lab. Additionally it hosts DNS and DHCP for the DEV and SysAdmin subnets (described in the networking section) IIS01 and IIS02 These virtual machines each host a web server and have been configured with the remote access role. The two network interfaces that are remotely accessible on each host have first been teamed and then configured to load balance requests on their shared IP address: 192.168.0.30 *Note: IIS01 and IIS02 have been configured to load balance web requests between one another and listen on the shared IP 192.168.0.30 WIN10 This virtual machine acts as the bastion host for access to internal services. PfSense This virtual machine has been configured as the remote access endpoint as well as the main gateway for the virtual environment. NETWORKING A vSwitch per VLAN will be deployed without an external network adapter assigned to assist with layer 2 isolation. These vSwitches and the subnets they support are shown in the attached diagram. SYSTEM DRAWING Static IP addresses that have been assigned to the virtual hosts are listed here. If an IP address is not listed DHCP has been configured for that vSwitch via either DC01 or the PFSense Appliance. The external client listed here is the current management machine from which this solution will be deployed. C. Security Describe a security plan for this migration for each of the following requirements. Its ok if this does not match your actual implementation from the lab, just discuss how your solution would address each of the requirements. 2-3 sentences addressing each section will do. How you choose to approach each of the following is completely open and up to you: C.1. Virus Scan System C.2. Firewall Rules
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
C.3. Network Access Control Lists C.4. Security Groups C.5. Information Security Management For C.2 Firewall Rules: please mention how you will apply the firewall rules mentioned in the scenario doc. For C.3 Network Access Control Lists: please use a table to list out what acls will be applied to each Vlan For C.5 Information security management, discuss your strategy for information security management. You can do research to get some ideals regarding policies, standards or methods you’ll use. For example, if you do a google search for “information security management examples”, it will return articles that discuss what information security management is and some examples of implementation and policies that you can use for this section. Below is an example : The following section outlines the security plan for the full implementation of the proposed hybrid-cloud solution. C.1. VIRUS SCAN SYSTEM Unless regulations require an alternative solution, the default windows defender antivirus solution can be used. Virus definitions for windows defender can be pushed via the existing enterprise WSUS solution and alerts can be configured for higher than usual threats/scan results. Alternatively, the existing enterprise solution may be able to extend into the virtual environment. This assumes that there are no licensing constraints on the enterprise A/V solution. C.2. FIREWALL RULES Firewall rules can and should be enforced via active directory on windows based instances. An automated configuration management framework (terraform or similar) should be used to ensure that the networking level controls that are applicable to the virtual infrastructure are enforced and configured as designed. Principles of least privilege should be enforced at all points of networking ingress. If a decision point requires the choice between a stateful and stateless firewall stateful should be chosen. This will reduce the management overhead required for outbound rule management should a stateless firewall be chosen. The following port numbers will be kept open for inbound traffic on both datacentre servers (Data center 1& Data centre 2): Port 80,Port 443 and TCP port 1723 for Point-to-Point Tunneling Protocol (PPTP). In the domain controller (win server 2019 standard), the following port numbers will be kept open to permit inbound traffic: Port 80,Port 443, port 53 and port 67. C.3. Network ACCESS CONTROL LISTS Access control should be enforced via principles of least privilege. Only administrators should have direct access to the underlying virtual infrastructure. Additionally, the virtualization
administration credentials should be separate from standard server (or virtual appliance) administrator credentials. In order to enable granular control over these resources the underlying hosts that provide the virtual infrastructure should be domain joined. This will require the use of enterprise licenses for VMware’s vSphere and the mapping of Active Directory security groups with vSphere defined permission sets. The following Network-based ACLs will be applied to each vlan: Windows Server 2019 Standard -Vlan-DEV: access to only win10 guest -Vlan-SysAdmin: access to only datacenter 1 and 2 Windows Server 2019 Data Center -Vlan-Public: access to datacenter 1 and 2 Windows 10 Enterprise -Vlan-DEV: access to only win10 guest -Vlan-SysAdmin: access to only datacenter 1 and 2 C.4. SECURITY GROUPS Windows Security Groups should be used liberally to support principles of least privilege and separation of duties. No one user should have absolute control over security group membership. Security Group membership should have written approval from the user’s supervisor and the ISSO in order to ensure the user requires access. C.5. INFORMATION SECURITY MANAGEMENT This system will adhere to any and all applicable standards that are currently adhered to within the organization. The final deliverable should adhere to ISO/IEC 27000:2018. In order to ensure the standards outlined in this publication are met ACDG’s Information security management staff should expand its ranks to include a new position that requires a virtualization specialization. This new team member will be responsible for expanding the existing ACDG ISM guidance to include provisions for virtualization. Elements of all aspects outlined in the security section of this document should be considered and accounted for. D. Implementation Process Discuss the implementation phases, the project implementation milestones for the proposal, and the dependencies of each phase. This can be done by providing a summary of what will be done in each phase along with the dependency (work done before / pre requirements) and milestone (what will be completed in that phase) required. Don't overthink this section, the milestones and dependencies can be anything you choose. You can include a paragraph that discusses each phase and use a table like the one below providing 2-3 sentences per cell : Phase Name Milestones Dependencies Phase 1 - Description
Phase 2 - Description Phase 3 - Description Phase 4 - Description Below is an example : The table below shows the different phases of the project and what will be done in each phase. The phases are broken down into two different categories, milestones and dependencies. The milestone will be what is achieved at the end of the phase and the dependencies is what needs to happen for that milestone to be achieved. The first phase will see the decision made on which cloud provider we will move forward with to host the new infrastructure. Phase 2 will see the setup of the network portion of the new infrastructure with the servers, ip addressing, vlans, and security firewalls put in place. The third phase will be the implementation of users and groups in active directory so those objects can be assigned specific roles and access levels. Our fourth phase will be to deploy a chosen application to the cloud and test performance to determine if there is truly a benefit in doing so. Our last phase will be to have the users fully test and verify functionality of all aspects of the new environment so we can move to our routine support method of the new virtualization environment. PHASE MILESTONE DEPENDENCIES PHASE 1 - Vendor Selection Choose a Cloud Service Provider Perform research on the different cloud providers available and choose the one that best fits the needs of the company with the results they are looking to achieve. PHASE 2 - Network Implement the networking infrastructure Setup the servers, map out the ip addressing, create the individual vlans with firewall rules and the domain setup PHASE 3 - User Access Assign users and group functions and network access roles Assign both standard and administrative active directory accounts and verify that they have the required access and those that needs to have remote access as well.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PHASE 4 - Deployment Deploy a chosen application to the cloud Determine an application that we feel would give better performance migrated to the cloud and perform benchmark testing to prove that it does indeed provide better performance. PHASE 5 - Testing and Verification Verification of a fully functioning virtualization environment The new virtualization environment installation has been completed and users have had a chance to test and give feedback on functionality and performance E. Performance Tuning Discuss the method that will be used for discovering and reporting anomalies within the proposed solution, including the criteria to assess each anomaly . 2-3 paragraphs should do. Below is an example : Windows Server 2019 provides many tools and features relating to performance tuning and diagnosing performance issues. One method we will be using to tune performance in ACDG’s new virtual network will be NIC teaming on IIS01 and IIS02. Each will have two public network adapters as a team. By doing this, network traffic will have multiple physical adapters to utilize which will increase throughput. Another tool that is included with Windows is the Performance Monitor. This will allow network administrators to monitor performance on CPU and memory utilization. Performance Monitor also allows reports to be generated, which can then be reviewed to fine tune the network. By using Performance Monitor, administrators will be able to find bottlenecks or wasted resources, and then redirect those resources to the appropriate areas to increase performance. Low Average High CPU 10-40 percent 41-80 percent 81-100 percent
usage usage usage Memory 27-40 percent usage 41-85 percent usage 85-100 percent usage Network 10-45 percent throughput 46-87 percent throughput 88-100 percent throughput The above table tells us our ranges of resources categories. If any one resource moves into the “ high ” category for over 10 mins, a report will be auto generated and sent to the system administrators. If the particular resource is under an unusual load, there may be cause to add additional temporary resources. If not an usual time/load, there will be a reviewed and possibly new or additional resources added. If resources remain in the “ average ” category, there will be no reporting as this will be the target usage. The wide range will give us flexibility without having too many resource being paid for that are not used. If any resources move and stay in the “ low ” category for over 1 hours, a report will be generated. If the system admin has reviewed the report and cause and found no errors, there will be a procedure to follow on the possibility of removing excess resources, to not overpay. F. Load Balancing Describe a load balancing strategy to balance the virtualized systems for game player performance, including the testing strategy and acceptance criteria for the strategy to be successful (make it obvious). 1-2 paragraphs should do. Below is an example: Game assets can and should be deployed to a full cloud solution. Localized load balancing is possible but not at the scale, simplicity, and low overhead that a cloud based load balancer can provide. Assuming game assets are deployed to AWS, a Network Load Balancer can be placed upstream of the game servers. Client location, IP address, and request type can all be used to determine how and where their traffic should be balanced across the target application. Metrics for these load balancing decisions can be forwarded to s3 and in turn passed to the vROPs instance. TESTING STRATEGY test : Have a test user connect to the game system via a load balancer and power cycle the game system host the user is currently connected to. acceptance criteria : The user should be automatically migrated to a healthy host backed by the load balancer. test : have two users connect to game resources from alternate locations. Ideally one connection should originate on the west coast and the other on the east coast.
acceptance criteria : each user experiences the same amount of latency across their connection to the load balancer. G. Proof-of-Concept Implementation Build Provide a separate screenshot of each implementation phase completed in the lab environment, including a brief explanation of the process. The screenshots must be clear and show the full view of your screen, including the date and time. Make sure you have the same number of phases here that you have in Section D . G.1. Phase 1 G.2. Phase 2 G.3. Phase 3 G.4. Phase 4 G.5. Phase 5 NOTE : please put your name and date in the bottom right hand corner of each screenshot used. You can use greenshot or the snippet tool in windows to do this, or lightshot if you are on a mac. For example: H. Presentation of Proof of Concept Present your solution in the lab environment by doing the following: 1. Record a walkthrough of your proof of concept in a video addressed to the project manager. Use Panopto to record yourself delivering a presentation describing the proof
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
of concept in the lab environment. Your recording should capture both you and your functioning lab environment and demonstrate appropriate communication skills for the audience, including a professional appearance. 2. Demonstrate in the Panopto recording a walkthrough of the proof of concept solution that includes all of the project manager’s requirements from the “Company Overview and Requirements” document. Below are the requirements from the document you can walk through on your recording: NOTE : for isms solution (row 6), just show and discuss your implementation of security you mentioned in section C. You can cover how your firewall is configured, antivirus used, ACLs used, security groups, etc. for that item. Don’t worry about mentioning standards here.
Note: For instructions on how to access and use Panopto, use the "Panopto How-To Videos" web link provided below. To access Panopto's website, navigate to the web link titled "Panopto Access", and then choose to log in using the “WGU” option. If prompted, log in using your WGU student portal credentials, and then it will forward you to Panopto’s website. To submit your recording, upload it to the Panopto drop box titled “Data Center Virtualization – DNM1 | D087”. Once the recording has been uploaded and processed in Panopto's system, retrieve the URL of the recording from Panopto and copy and paste it into the Links option. Upload the remaining task requirements using the Attachments option. Panopto Access Sign in using the "WGU" option. If prompted, log in with your WGU student portal credentials, which should forward you to Panopto's website. If you have any problems accessing Panopto, please contact Assessment Services at assessmentservices@wgu.edu. It will take up to two business days to receive your WGU Panopto recording permissions once you have referred for the course. Panopto How-To Videos Please note that the video you will make should include yourself as part of the presentation. Performance Assessment Virtual Lab Environment Click the link above to go to the PA Lab environment NOTE : It may be helpful to plan out the lab solution by creating a diagram of the solution before starting on the lab portion. Below is an example:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The lab will give you 6 hours to complete the assessment, but will ask if you need more time 30 minutes before the time is up and you can select yes to add 45 minutes each time it pops up. If you need more time, make sure you extend it once this prompt comes up, otherwise it will cancel the lab and you will lose the work on it. Likewise, if you are done working on it for the day, make sure you save the lab so you can resume it for later. Saved labs can be retained for up to 7 days . You can extend this date by resuming and saving the lab again. NOTE : the screenshot below is an example showing how to extend the lab time. This was taking on an earlier version where the time limit was shorter. The prompt will come up in the last 30 minutes and you can extend it by 45 minutes each time.
The username/password to log into the W10-Admin VM and ESXi host is the same one used in the labs from the course. Use CORPADMIN / Passw0rd! To log into W10-Admin, root / Passw0rd! To log into the ESXi host). ESXi can be reached from the win10 admin machine by going to: http://172.16.0.213 .
The ISO images are located here:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PFsense Video example of pfsense Pfsense tutorials Pfsense documentation
Pfsense book You can access the Pfsense web interface by going to 192.168.1.1 from a VM on the Lan (datacenter1, win 10 enterprise, etc.). Login credentials (username / password): admin / pfsense NLB setup You can use the following article for guidance on setting up the NLB: How to setup network load balancer You only need to setup the NLB on either datacenter 1 or datacenter 2 and you can just add the other node to the system where you created the NLB. If you run into errors, you may have to change the type of NLB from unicast to multicast. You may also need to do NIC teaming before you setup NLB, as setting up NIC teaming after setting up NLB may blow away the NLB nic and config. Also make sure NICs are on the same subnet and that they all have the same gateway. if you get issues with using nic team (172.16.0.x) for load balancer, use sysadmin (10.0.6.x) or the dev network instead. You can test that it is working by running get-nlbcluster and get- nlbclusternode . IIS You can use the following guide to walk through setting up IIS on datacenter 1 and 2 https://www.rootusers.com/how-to-install-iis-in-windows-server-2019/ NIC Team setup: You can use one of the following articles for guidance on setting up the NIC team: Create a New NIC Team on a host computer or VM – start on step 2. Create a new NIC Team Setting up NIC Teaming for Windows Server 2012*/2012 R2*/2016*/2019* - another guide covering NIC team setup Domain Controller setup: You can use one of the following articles for guidance on setting up the Domain controller: Windows Server 2012: Set Up your first Domain Controller (step-by-step) How to setup a domain controller How to create a domain in Windows Server 2012 R2
You may need to add the DNS of the Domain Controller ip (windows server 2019) to the DNS settings for each VM before you can add the VM to the domain: DHCP installation and scope config You can use one of the following articles for guidance on setting up DHCP.  A quick google search for “ windows server dhcp server” will also return similar tutorials: Install and Configure DHCP Server on Windows Server 2019 Install and Configure DHCP Server in Windows Server 2019 Step By Step Guide Configuring a DHCP Server on Windows Server 2016 I. Acknowledge sources Please include in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. You can use APA, MLA, or Chicago citation standards. You can use bibme.org , citation machine , or easybib.com to format the citations for you. For example : IT Operations Management - vRealize Operations. (2019, October 28). Retrieved from
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://www.vmware.com/products/vrealize-operations.html . VMware Docs -Physical Topology of vSphere Data Center. (2019, October 28). Retrieved from https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vcenterhost.doc/ GUID-8BE2902F-AF5D-4493-95E3-B93A8A862192.html VMware Docs - Physical Topology of vSphere Data Center. (2019, October 28). Retrieved from https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vcenterhost.doc/ GUID-8BE2902F-AF5D-4493-95E3-B93A8A862192.html . VMware vSAN. (2019, October 28). Retrieved from https://www.vmware.com/products/vsan.html . J. Professional Communication Demonstrate professional communication in the content and presentation of your submission. Just dot your i’s and cross your t’s here and make sure it reads like something you would present to your boss. Unexpected Lab or VM issues (missing VM or content, can't launch lab, etc.) If you run into an issue with the labs on demand content (VM or other content is missing or not loading), please attempt to reproduce the issue on another computer or browser (example: chrome incognito mode) and make sure that you close all other labs that are running (this includes labs you may have running in other courses that use labs on demand, such as D086). If the issue continues after performing the above, please create a ticket with EdTech and labs on demand discussing the issue and include a screenshot of the issue. You can create a ticket with EdTech by sending an email to servicedesk@wgu.edu or by calling 877.435.7948. You can create a ticket with labs on demand by clicking the “submit a support request” link in the lab’s help tab as shown below. Please take a screenshot that shows the issue and take a screenshot of the support information in the help tab as seen below :
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
You can also create a ticket with program development for any content issues by using the following steps: 1. Click on the “Course Feedback” link in the top right hand corner of the course landing paget: 2. This will take you to the feedback submission page. Please enter the issue you are running into and include a few screenshots of it, and submit the form:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3. After submitting the form, you may get an email regarding the request you created. Please forward that request to you instructor so they are aware of the issue and we will work with you to create a workaround to address the issue in the meantime. Thank you! Unable to reach pfsense web console If you are unable to reach the pfsense web console, which by default is at 192.168.1.1, you can try using the “ troubleshooting access when locked out of the firewall ” article on netgate’s pfsense docs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Add an allow all WAN rule from the shell Another tactic is to temporarily activate an “allow all” rule on the WAN to let a client in. Warning An “allow all” style rule is dangerous to have on an interface connected to a public or untrusted network, such as a WAN interface connected to the Internet. Do not forget to remove the rule added by this script To add an “allow all” rule to the WAN interface, run the following command at a shell prompt: # pfSsh.php playback enableallowallwan Once the administrator regains access and fixes the original issue preventing them from reaching the GUI, remove the “allow all” rule from the WAN. Disable the Firewall An administrator can (very temporarily) disable firewall rules by using the physical console or SSH. Warning This completely disables pf which disables firewall rules and NAT. If the network run by this firewall relies on NAT to function, which most do, then running this command will disrupt connectivity from the LAN to the Internet. To disable the firewall, connect to the physical console or ssh and use option 8 to start a shell, and then type: # pfctl -d That command will disable the firewall, including all NAT functions. Access to the GUI is now possible from anywhere, at least for a few minutes or until a process on the firewall causes the ruleset to be reloaded (which is almost every page save or Apply Changes action). Once the administrator has adjusted the rules and regained the necessary access,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
turn the firewall back on by typing: # pfctl -e the specified domain does not exist or cannot be contacted When adding the VMs to the domain controller (DC01), you may get the error “the specified domain does not exist or cannot be contacted”.  If that occurs, you may need to make sure that each VM’s DNS server is set to the domain controller’s ip address. https://www.wintips.org/fix-specified-domain-either-does-not-exist-or-could-not-be-contacted/ https://social.technet.microsoft.com/Forums/en-US/091a1ea6-88c3-4a43-96eb-3969cd90c20a/ the-specified-domain-either-does-not-exist-or-could-not-be-contacted?forum=winserver8gen The RPC server is unavailable Try making sure the time and date on each VM is in sync. If that does not work, try the suggestions specified in the article here: https://docs.microsoft.com/en-us/troubleshoot/windows-server/user-profiles-and-logon/not-log- on-error-rpc-server-unavailable NICs with duplicated mac addresses Each nic on each VM should have a unique mac address to avoid any conflicts and connectivity issues. If you find that a NIC shows up more than once or that a NIC shows up on multiple vlans or port groups, you may need to manually change the NIC’s mac address in ESXi. You can manually change the mac address or you can try deleting and re-adding each NIC with a duplicated mac address. The following links discuss this issue and the solution in more detail: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.troubleshooting.doc/ GUID-8D7D0126-8E8A-470F-A61E-4197EE32D08F.html https://kb.vmware.com/s/article/1024025 https://www.vladan.fr/what-to-do-when-you-have-duplicate-mac-address-within-vmware- vsphere-environment/ VMs randomly shutdown / power off If you encounter an issue with VMs randomly shutting down or powering off, try checking the power options on the vms to verify that they aren’t set to be suspended after a period.  If you verified that they aren’t set to power off or suspend after a period, try connecting the VMs to the internet so they can update, a license issue may cause this as well.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
If you do not activate your VMs your systems may intermittently restart. Be sure you activate your VMs or run slmgr.vbs /rearm within your windows VMs to continue using them for the assessment. VMs have no internet connectivity If you have no internet connectivity for your VMs, make sure that the DNS settings on each system is set correctly. Unable to send keys to esxi vms If you are unable to send any input to the esxi vms in the lab, try using microsoft edge as discussed in the vmware kb here:  https://kb.vmware.com/s/article/71362 How to get help You can schedule an appointment with your instructor using the “Schedule appointment” link below or on the course landing page, or send us an email with any questions, concerns, or assistance that is needed so we can get this course finished! When sending an email, please include a full screenshot showing the error or issue you are running into. You can still send an email to your instructor when they are out of office and they will respond as soon as possible. You can also send an email to itcloud@wgu.edu with the subject D087 - <subject> and cc your instructor on it to gain assistance if they are out of the office as well. Thank you for your time, and our team looks forward to working with you!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help