ip based virtual hosting in linux
Most Relevant Content
IP Based Virtual Hosting on CentOS 7 with Apache Server
Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based Virtual Hosting, each domain is mapped on a dedicated IP address. In my previous article, I discussed how to configure Named Based Apache Virtual Web Hosting on CentOS 7 Linux. In this article, I will discuss how to configure IP Based Apache Virtual Hosting on CentOS 7 Linux. IP Based Apache Virtual Hosting Configuration We are now going to start Virtual Hosting configuration with apache web server. It is assumed that you have already installed CentOS 7 Server on your physical or virtual machine. If you don’t have CentOS 7 Server installed, take a look of my previous article about CentOS 7 installation and configuration with GNOME Desktop and install CentOS 7 accordingly and then follow this article. [...]
- »
Port Based Apache Virtual Hosting on RHEL 7 | July 26, 2019
Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the [...]
- »
Virtual Web Hosting with Apache on CentOS 7 (Name Based) | July 15, 2019
Virtual Hosting is a method of hosting multiple domains on single server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on a webserver, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based [...]
- »
MikroTik Blocking All Websites Except a Few Websites | May 7, 2019
A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to [...]
- »
MikroTik Blocking Websites with TLS Host Firewall Matcher | April 29, 2019
Most of the websites now use https and blocking https websites is so much harder with the MikroTik RouterOS version less than 6.41. But from RouterOS v6.41, MikroTik Firewall introduces a new property named TLS Host that is capable to match https websites so easily. So, blocking https websites like Facebook, YouTube etc. can be easily done with MikroTik Router if RouterOS version is greater than 6.41. In my previous article, I discussed how to block websites with MikroTik Router [...]
- »
How to Block VPN Access with MikroTik Router | May 14, 2019
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]
- »
MikroTik SSTP VPN Server Configuration with Windows 10 | April 27, 2020
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]
- »
System Restore in Windows 10 | August 30, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]
- »
MikroTik Site to Site GRE Tunnel Configuration with IPsec | March 26, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]
- »
Linux Text Editor | September 7, 2017
Everything is file in Linux operating system. So, anyone who wants to work with Linux operating system (specially, Red Hat or CentOS) must learn how to edit files in Linux operating system. Because, it is always prefer to avoid graphical user interface (GUI) for changing system configuration parameters in Linux operating system unlike Windows operating system. You should be expert enough to edit any file in Red hat Linux operating system otherwise you will face a lot of difficulty to [...]
More Similar Content
You May Also Like