apache virtual host multiple ip addresses

Most Relevant Content

  • IP Based Virtual Hosting on CentOS 7 with Apache Server

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based Virtual Hosting, each domain is mapped on a dedicated IP address. In my previous article, I discussed how to configure Named Based Apache Virtual Web Hosting on CentOS 7 Linux. In this article, I will discuss how to configure IP Based Apache Virtual Hosting on CentOS 7 Linux. IP Based Apache Virtual Hosting Configuration We are now going to start Virtual Hosting configuration with apache web server. It is assumed that you have already installed CentOS 7 Server on your physical or virtual machine. If you don’t have CentOS 7 Server installed, take a look of my previous article about CentOS 7 installation and configuration with GNOME Desktop and install CentOS 7 accordingly and then follow this article. [...]

    READ MORE »

  • More Similar Content

  • »

    Port Based Apache Virtual Hosting on RHEL 7 |   July 26, 2019

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the [...]

    READ MORE »

  • You May Also Like

  • »

    Getting Started with Red Hat Linux |   May 20, 2017

    Red Hat Linux is an open source server operating system.  Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported  server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]

    READ MORE »

  • »

    CAPsMAN Channel Planning with Non-Overlapping Frequency |   March 16, 2020

    MikroTik CAPsMAN is an excellent application for managing multiple CAPs (Controlled Access Point) in a Wireless Network. But multiple APs create frequency overlapping issue if channels are not configured properly. Channel overlapping is required for smooth connection while roaming but there should not be frequency overlapping because frequency overlapping makes wireless performance so poor. In my previous article, I discussed MikroTik CAPsMAN basic configuration with default channel configuration. In this article, I will discuss how to configure CAPsMAN channel to [...]

    READ MORE »

  • »

    MikroTik WiFi Frequency Band and Channel Width Explanation |   January 10, 2020

    MikroTik WiFi frequency, band and channel width tuning is an important task in any wireless network. If we fail to setup WiFi frequency and channel width parameter properly, we will notice a poor performance of wireless network. WiFi is aimed at use within unlicensed spectrum and the unlicensed spectrum that is usually used for WiFi is 2.4 GHz and 5 GHz band.  2.4 GHz and 5 GHz bands have multiple channels and these channels must be setup properly to get [...]

    READ MORE »

  • »

    How to Bind Hotspot User to MAC and Static IP in MikroTik |   November 6, 2020

    MikroTik Hotspot is usually a user based Hotspot access controlling system. Internet access and bandwidth can easily be maintained with Hotspot user based system. But sometimes we may require more control on Hotspot system which is not possible only username based system. So, we may need to bind hotspot user to MAC and static IP address. If we can bind hotspot user to static IP address, it is easy to control Hotspot users with MikroTik Router and Firewall. So, in [...]

    READ MORE »

  • »

    ISP Bandwidth Management with MikroTik PCQ |   June 25, 2016

    MikroTik is an excellent router for managing ISP Bandwidth. For this, most of the ISPs are now using MikroTik Router for managing client bandwidth. The service used to manage bandwidth in MikroTik RouterOS is QUEUE. There are various types of queue services in MikroTik Router for managing internet bandwidth. Among these, PCQ can specially be used for maintaining ISP bandwidth. In this article, we will see how to manage ISP Bandwidth with MikroTik PCQ. MikroTik PCQ Service PCQ stands for [...]

    READ MORE »

  • »

    Essential Networking Skills for Job Seekers in IT industry |   March 18, 2025

    The Information Technology (IT) industry is one of the most dynamic and rapidly evolving fields in the modern job market. With continuous advancements in technology, businesses are always on the lookout for skilled IT professionals who can adapt to new trends, troubleshoot complex systems, and enhance cybersecurity measures. However, technical knowledge alone is not enough to secure a job in the IT industry. One of the most critical factors in landing a job and advancing in an IT career is [...]

    READ MORE »

  • »

    Mikrotik Router Basic Configuration Using Winbox |   August 24, 2015

    MikroTik is one of the most popular routers. MikroTik Router has a lot of networking services that help to build a stable and smooth network so easily. It is said that any ISP Company or any Enterprise Office cannot go a single day without MikroTik Router. So, system administrators who are not using MikroTik Router yet, they will soon start using MikroTik Router, I think. As a system administrator, I am also using MikroTik Router about 5 years in my network [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »