Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 Linux Ecosystem and Virtual Machines ( 3 0 % ) 1 . Install on your computer one of the two virtual machine hypervisors: Oracle

1 Linux Ecosystem and Virtual Machines (30%)
1. Install on your computer one of the two virtual machine hypervisors: Oracle Virtual Box 7.0.12 or VMware Fusion Player 13(if you have an Apple M1/M2/M3 computer install VMware Fusion Player 13 or UTM).
2. Download an Ubuntu Server 22.04.3 LTS iso image (if you have Apple M1/M2/M3 computer you might need to download an Ubuntu Server 22.04.3 LTS ARM64 image).
3. Create a Linux virtual machine on the installed hypervisor with the following specifications: 2 cores, 2GiB of RAM, 50GB virtual disk, a custom NAT network interface and a host-only network interface. The custom NAT network interface will be used for Internet communication, while the host-only will be used to connect the host computer to the virtual machine.
4. Install Ubuntu Server on the new virtual machine and configure a username and password.
5. Turn on the firewall, enable SSH access to the virtual machine (with password-based authentication) and open the SSH port on the firewall. 6. Log in from a terminal, opened on the host machine, to the virtual machine using SSH.
7. Create a public-private key pair on your host computer (not on the virtual machine) and enable password-less authentication from the host.
Answer the following questions in your report:
1. Give an example of one or more commands that you can use to retrieve the total number of cores, the total amount of RAM and the total amount of disk storage on a Linux operating system. Add screenshots to the report, showing the output of the commands run inside the virtual machine that you created.
2. What command(s) did you use to enable SSH access to the virtual machine? Provide screenshots of the commands used and the output.
3. What commands did you use to turn on the firewall and to open the SSH port on the firewall? Provide screenshots of the commands used and the output.
4. What is an IP (Internet Protocol) address? What is a TCP/UDP port? What port does SSH use by default? What IP address does your virtual machine have? What commands did you use to retrieve the IP address of your virtual machine? Provide screenshots of the commands used to retrieve the IP address of your virtual machine and the output.
5. What command did you use to generate a private-public key pair? Provide screenshots of the command used and the output.
6. Give an example of a set of commands that you can use to enable passwordless authentication from the host to the virtual machine. Include in the response screenshots of the commands used, the output and proof that you can log in without entering a password.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases In Networked Information Systems 6th International Workshop Dnis 2010 Aizu Wakamatsu Japan March 2010 Proceedings Lncs 5999

Authors: Shinji Kikuchi ,Shelly Sachdeva ,Subhash Bhalla

2010th Edition

3642120377, 978-3642120374

More Books

Students also viewed these Databases questions