apache needs open port 80

Most Relevant Content

  • Port Based Apache Virtual Hosting on RHEL 7

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the other hand, in IP Based Virtual Hosting, each domain is hosted on single server but on a dedicated IP address and in Port Based Virtual Hosting, multiple domains are hosted on different ports. In my previous article, I discussed how to configure Named Based and IP Based Apache Virtual Web Hosting on CentOS 7 Linux. In this article, I will discuss how to configure Port Based Apache Virtual Hosting on CentOS 7 Linux. Port Based Apache Virtual Hosting Configuration We are now going to start Port Based Virtual Hosting configuration with apache web server. It is assumed that you have already installed CentOS 7 Server on your physical or virtual machine. If you don’t have CentOS 7 Server installed, take [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    MikroTik Hotspot Server Configuration in RouterOS 7 |   April 25, 2023

    MikroTik Hotspot is an awesome service to run a captive portal network. You can run a public Wi-Fi network, Hotel Network, Airport network, CAMP Wi-Fi network, Shopping Mall Network and so on using MikroTik Hotspot and even can monetize your network for earning if you use Hotspot Billing Software like GalaxyRAD which is specially designed for MikroTik Hotspot network. GalaxyRAD helps to monetize your any network providing online payment gateway as well as integrating voucher-based system. It also helps to [...]

    READ MORE »

  • »

    MikroTik WebProxy Log Analyzer Configuration |   August 30, 2016

    MikroTik RouterOS generally logs various system events and status information. Logs are mainly saved in router’s memory (RAM) or disk. MikroTik logs can also be sent by email or even can be sent to a remote syslog server. All logs those are saved in router’s local memory can be viewed from Log menu. Any log entry that is saved in local memory contains time and date when event occurred, topics that this message belongs to and message itself. But local [...]

    READ MORE »

  • »

    How to Secure MikroTik RouterOS Login Users |   February 19, 2021

    MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.

    READ MORE »

  • »

    MikroTik VRRP Configuration with Load Sharing |   November 19, 2018

    MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high availability internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]

    READ MORE »

  • »

    WireGuard VPN Setup in MikroTik RouterOS7 with Windows OS |   August 14, 2022

    VPN (Virtual Private Network) is one of the most popular services in MikroTik RouterOS. A lot of VPN services (IPsec, EoIP, OpenVPN, PPTP, L2TP, IPIP etc.) are available in MikroTik RouterOS but in RouterOS7, a new VPN service named WireGuard has been introduced which is extremely simple yet first, secure and modern VPN. WireGuard uses cryptography to make it secure. In RouterOS7, WireGuard can be used either Client-Server (Road Warrior) VPN tunnel or site to site VPN tunnel. Using Client-Server [...]

    READ MORE »

  • »

    Getting Started with Red Hat Linux |   May 20, 2017

    Red Hat Linux is an open source server operating system.  Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported  server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]

    READ MORE »

  • »

    MikroTik RADIUS Server (User Manager) Installation |   October 28, 2017

    RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]

    READ MORE »

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »