Server+ Capstone โ€” Visual Guide

4 weeks. 1 blade server. Full enterprise stack. Here's everything you need to understand, plan, and ship the project โ€” explained with diagrams, step-by-step walkthroughs, and checklists you can tick off as you go.

Your progress 0%

๐ŸŽ“ Start Here โ€” No Server Experience Required

New to servers? This section uses analogies you already know. By the end you'll understand what you're actually building before touching any real config.

Think of a server as an apartment building

That one big metal box in the rack isn't really "a computer running one thing." Modern servers run many separate "tenants" at once. Here's the mental model:

๐ŸขApartment building
=

The blade server

One physical box with lots of power (CPU, RAM, disk). Just like a building has plumbing, power, and walls shared by all tenants.

๐Ÿง‘โ€๐Ÿ’ผProperty manager
=

Proxmox (the hypervisor)

Software that decides which tenant gets how much CPU / RAM / disk. Hands out "apartments," keeps tenants isolated, collects rent in the form of resources.

๐Ÿ Individual apartment
=

A Virtual Machine (VM)

Feels like its own complete computer โ€” has its own OS, IP address, users, files. But it's actually just a slice of the big building.

๐ŸšชHallway
=

A virtual bridge (vmbr1, vmbr2...)

A hallway lets tenants on the same floor talk to each other. A bridge lets VMs on the same "floor" exchange network traffic.

๐Ÿ’‚Doorman / security
=

The firewall (OPNsense, iptables)

Checks every person entering or leaving. "You can go to the lobby, but not the residential floors unless you're on the list."

๐Ÿ›Ž๏ธHotel lobby
=

The DMZ (vmbr1)

Anyone from outside can walk in. That's where your public website lives. Designed to be safely exposed.

๐Ÿ”Residents-only floors
=

The Private LAN (vmbr2)

No guests allowed. Your databases, AD, file shares live here โ€” the stuff you absolutely don't want a random internet stranger reaching.

๐Ÿ“‡Mailroom + building directory
=

DNS + Active Directory

DNS says "the apartment called mailserver.local is at unit 192.168.0.10." AD keeps the list of who's allowed in each apartment.

๐Ÿ“ธPhotocopying everything nightly
=

Backups

If an apartment burns down (server crash, ransomware), you can rebuild it exactly from the copies.

๐ŸŽฅSecurity cameras
=

IDS / IPS (Snort, Suricata)

Watches all traffic. Alerts if someone jiggles the locks or carries something suspicious. IPS goes further โ€” it physically blocks them.

The whole building, at a glance

Here's the apartment-building analogy as an actual picture. Every room has a real counterpart in what you're building.

๐ŸŒ The Internet (outside world) ๐Ÿšถ ๐Ÿ‘ค ๐Ÿ˜ˆ ๐Ÿข Your Server (ML350p Gen8) ๐Ÿ” Floor 4 โ€” Residents Only (Private LAN) ๐ŸชŸ AD / DNS ๐Ÿ—„๏ธ Database ๐Ÿ“ File Shares ๐Ÿ’‚ Inner Firewall โ€” checks who can visit upstairs Rules like: "only NGINX can talk to the DB on port 3306" ๐Ÿ›Ž๏ธ Floor 2 โ€” Public Lobby (DMZ) ๐ŸŒ NGINX / IIS ๐Ÿฆ˜ Jump Box ๐Ÿ“Š Monitor ๐Ÿ’‚ Outer Firewall โ€” front door Public traffic hits here first ๐Ÿง‘โ€๐Ÿ’ผ Basement โ€” Property Manager (Proxmox) Assigns CPU, RAM, disk to every apartment Keeps tenants isolated from each other ๐ŸŽฅ IDS cameras watching all

Why bother with all these zones?

Imagine a thief breaks the lobby window. If the lobby connects directly to the vault, game over. But if the lobby is walled off and every door between lobby and vault has a guard checking IDs โ€” now the thief is stuck in the lobby.

That's what segmentation is: making it so one compromise doesn't become total compromise.

๐Ÿ˜ˆ Attacker ๐Ÿ’‚ Firewall ๐Ÿ›Ž๏ธ DMZ / Web ๐Ÿ’‚ Firewall ๐Ÿ” Private / Vault ๐Ÿ›‘ BLOCKED here

The 4-week journey, in 4 sentences

Week 1 โ€” Build the building โ†’ Week 2 โ€” Move tenants in & set up services
Week 3 โ€” Hire security & install cameras โ†’ Week 4 โ€” Run fire drills & give tours

Watch a request travel through the system

Click the button. You'll see exactly what happens when someone from the outside internet visits your web site.

๐Ÿ‘ค Internet user ๐ŸŒ School LAN ๐Ÿ”ฅ Firewall ๐ŸŒ NGINX (DMZ) ๐Ÿ”ฅ Rule check ๐Ÿ—„๏ธ Database (LAN)
(click the button to start)

๐Ÿ” How a name becomes an IP (DNS explained)

When you type mail.capstone.local, your computer has no idea where that is. It asks DNS. Watch how the lookup unfolds:

Still fuzzy on a word?

Jump to the Glossary tab โ€” every acronym and jargon term explained in plain English. Or check the Learn tab for YouTube videos.

Goal

In 4 weeks, your team builds a standard Server+ enterprise environment on a physical blade server. You will install, configure, secure, monitor, back up, and present a complete server environment.

New tabs: Lab Guide has the click-by-click install instructions (Parts 1โ€“9) from your instructor, Asset Tracker has the hardware/software inventory, and Week 1 Report is your fillable submission form.
Repair HWโ†’ Install Proxmoxโ†’ Build Networkโ†’ Deploy Servicesโ†’ Harden & Monitorโ†’ Backup & Demo

What you'll build

  • A Proxmox hypervisor on real hardware
  • Virtual networks: Mgmt / DMZ / Private LAN
  • OPNsense firewall controlling traffic
  • Windows Server (AD, DNS, DHCP, IIS, SQL)
  • Linux server (NGINX, MongoDB, cron, logs)
  • Backups, IDS, monitoring, and docs

Skills you'll practice

  • Hardware troubleshooting
  • Virtualization & bridge networking
  • Windows + Linux administration
  • Firewall rules & segmentation
  • Backup / restore / DR procedures
  • Documentation & presentation

Two difficulty tracks

Level 1 โ€” Server+ Core install + services. Enough to pass the Server+ outcomes.

Level 2 โ€” Advanced Adds AD, Docker, Wazuh, SIEM, Suricata IPS, full audit trail.

Start at Level 1. Add Level 2 bonuses once core works.

๐Ÿ“… The 4-Week Timeline

Each bar is a team role. Diamonds are milestones / weekly deliverables.

WEEK 1 WEEK 2 WEEK 3 WEEK 4 ๐ŸชŸ Windows OS + static IP AD โ€ข DNS โ€ข DHCP โ€ข IIS NTFS โ€ข Backup โ€ข GPO Restore test โ€ข Demo ๐Ÿง Linux OS + logging NGINX โ€ข MongoDB โ€ข cron SSH harden โ€ข rsync backup Logs โ€ข restore test ๐ŸŒ Network vmbr1 / vmbr2 / NAT Routing โ€ข segmentation Snort / Suricata IDS Firewall audit ๐Ÿ“‹ Lead Docs โ€ข topology โ€ข assets Integration report Security assessment Final report + demo Deliverable Topology Services Security Demo

๐Ÿ› ๏ธ Every service you'll touch, at a glance

This is every real piece of software that lives somewhere in your build. Hover for a one-line reminder of what it does.

๐ŸชŸActive Directorywho's who, who can access what
๐Ÿ“‡DNSname โ†’ IP lookup
๐Ÿ“ฌDHCPauto IP assignment
๐ŸŒIISWindows web server
๐Ÿ“SMB / Sharesnetworked file storage
๐Ÿ—ƒ๏ธSQL Expressrelational DB
๐Ÿ“œGPOWindows policy
๐ŸŒNGINXLinux web server
๐ŸƒMongoDBdocument DB
๐Ÿ”‘SSHremote admin
๐Ÿ›ก๏ธUFWLinux firewall
โฐcronscheduled scripts
๐Ÿ”rsyncbackup sync
๐Ÿ“syslogcentral log collector
๐Ÿ”ฅOPNsensefirewall + router
โš™๏ธiptablesLinux packet filter
๐ŸšจSuricataIDS / IPS engine
๐Ÿšชvmbr*virtual switch
๐Ÿ–ฅ๏ธProxmoxhypervisor
๐Ÿ’กiLOHP remote mgmt

The 4-Week Flow (Big Picture)

WEEK 1 Hardware + Proxmox Repair โ€ข Install โ€ข Bridges WEEK 2 Core Services Windows + Linux + DB WEEK 3 Security + Monitoring Hardening โ€ข IDS โ€ข Backups WEEK 4 Audit + Demo Restore โ€ข Report โ€ข Present

Choose Your Role

Pick one. Every team needs all four roles filled. Click a card for what you'll own.

๐ŸชŸ

Windows Specialist

Windows Server, AD, DNS/DHCP, IIS, file shares, backups

  • Install Windows Server
  • Configure Active Directory, DNS, DHCP
  • Stand up IIS web sites
  • Create file shares with NTFS permissions
  • Install SQL Server Express
  • Configure Windows Server Backup
  • Harden with Group Policy
Show details +Hide details โˆ’
๐Ÿง

Linux Specialist

Linux installs, NGINX, MongoDB, services, scripts, monitoring agents

  • Install Debian / Ubuntu
  • Configure NGINX web server
  • Install MongoDB
  • Manage systemd services
  • Schedule cron jobs
  • Collect and rotate logs
  • Write rsync / tar backup scripts
  • SSH hardening (port, key-only, no root)
Show details +Hide details โˆ’
๐ŸŒ

Networking Specialist

Proxmox networking, DMZ/Private LANs, firewall, IDS

  • Build Proxmox bridges (vmbr1, vmbr2)
  • Configure firewall โ€” OPNsense or iptables NAT/PAT on the host
  • Create DMZ + Private LAN segments
  • Set up routing between subnets
  • Deploy Snort / Suricata IDS
  • Test segmentation with a matrix
  • Configure Cisco switch gear
  • Level 2: VPN (WireGuard)
Show details +Hide details โˆ’
๐Ÿ“‹

Team Lead / Analyst

Docs, diagrams, reports, presentation, audit evidence

  • Coordinate the team, run standups
  • Maintain the documentation folder
  • Build network topology diagrams
  • Populate the IT Asset Tracking spreadsheet
  • Write weekly integration reports
  • Collect screenshots as evidence
  • Draft the security assessment
  • Prepare and run the final demo
Show details +Hide details โˆ’

Who does what, by week

Windows Linux Networking Team Lead Install OS, IP, DNS/DHCP Install OS, logging basics Proxmox bridges and topology Docs setup and plan IIS, file shares, SQL Express NGINX + database Routing + monitoring Integration report Security + backups Hardening + backup scripts IDS + segmentation tests Security + backup assessment Final verification and demo Logs + test results Firewall validation Final report and presentation W1 W2 W3 W4

Network Architecture

Everything runs inside your blade server. Four Proxmox bridges (vmbr0โ€“vmbr3) split traffic into safe zones.

๐Ÿซ School LAN 10.10.10.0/24 vmbr0 โ€” Management only no services allowed ๐Ÿ–ฅ๏ธ Proxmox Host (Hypervisor) Physical blade server vmbr1 โ€” DMZ 172.16.0.0/24 vmbr2 โ€” Private LAN 192.168.0.0/24 vmbr3 โ€” Physical Cisco network gear DMZ workloads โ€ข Web servers (NGINX/IIS) โ€ข Jump box โ€ข Monitoring UI reachable from outside Private LAN workloads โ€ข Active Directory + DNS โ€ข DHCP โ€ข Databases, File shares never exposed directly Physical network โ€ข Cisco switches โ€ข Uplinks โ€ข VLAN trunks real hardware
Management DMZ (exposed) Private LAN (internal) Physical

vmbr0 โ€” Management

Proxmox web UI (:8006), SSH to host. No VMs serve traffic here.

Why: if an attacker pops a web server, they should NOT be one hop from the hypervisor.

vmbr1 โ€” DMZ

Anything reachable from outside lives here: NGINX, IIS, jump box, monitoring dashboards. Range 172.16.0.0/24.

vmbr2 โ€” Private LAN

Crown jewels: AD, DNS, DHCP, SQL, MongoDB, file shares. Never talks directly to the internet. Range 192.168.0.0/24.

vmbr3 โ€” Physical

Bridges Proxmox to the Cisco switches for real-world VLANs and uplinks.

Rule of thumb: Traffic flows DMZ โ†’ Private LAN only through OPNsense firewall rules you explicitly allow. Default stance: deny everything, allow only what the app needs.

๐Ÿ—บ๏ธ IP subnet map โ€” what lives where

Three address ranges, three very different trust levels. Memorize these โ€” you'll type them a hundred times.

๐Ÿซ School LAN

10.10.10.0/24  ยท  gateway 10.10.10.1  ยท  up to 254 hosts

The school's existing network. This is where laptops, the school switch, and your Proxmox management IP live. Treat like "the outside world" from your VMs' point of view.

๐Ÿ–ฅ๏ธProxmox host 10.10.10.50 ๐Ÿ’กiLO 10.10.10.51 ๐Ÿ’ปStudent laptops 10.10.10.x

๐Ÿ›Ž๏ธ DMZ (vmbr1)

172.16.0.0/24  ยท  gateway 172.16.0.1  ยท  up to 254 hosts

Publicly-exposed services โ€” the hotel lobby. If one of these gets compromised, the firewall still stands between the attacker and the vault.

๐Ÿฆ˜Jump Box 172.16.0.10 ๐ŸŒNGINX 172.16.0.20 ๐Ÿ“ŠMonitoring 172.16.0.30

๐Ÿ” Private LAN (vmbr2)

192.168.0.0/24  ยท  gateway 192.168.0.1  ยท  up to 254 hosts

Crown jewels. Never directly reachable from outside. All internal VMs point to the Windows Server's IP as their DNS.

๐ŸชŸWindows / AD 192.168.0.10 ๐ŸงLinux / DB 192.168.0.20 ๐Ÿ“File server 192.168.0.30

๐Ÿงฑ Firewall rule matrix โ€” who can talk to whom

Read it as: "from the ROW to the COLUMN, is traffic allowed?". This is the stance you want your OPNsense / iptables rules to enforce.

โ†’ School LAN โ†’ DMZ โ†’ Private LAN โ†’ Internet
From School LAN โ€” LIMITEDonly published ports (80/443) DENYnever direct ALLOWnormal browsing
From DMZ DENYno calling back out โ€” LIMITEDonly the app's DB port LIMITEDupdates only
From Private LAN DENY ALLOWfor monitoring โ€” DENYproxy only
From Internet ALLOWit IS the internet LIMITEDpublished services DENYabsolutely not โ€”
Why "deny from DMZ โ†’ School LAN"? If someone roots your NGINX server, they'll try to pivot into the school network. A firewall rule that silently drops that traffic shuts that down.

๐ŸŽฏ How a firewall actually matches a packet (live demo)

Rules are evaluated top-to-bottom. The first match wins โ€” remaining rules are skipped. This is why rule order matters: a broad "allow all" at the top will make every rule below it useless.

Click a button above to send a packet through the rules.
1. ALLOW tcp any โ†’ DMZ:80,443 (public web)
2. ALLOW tcp 10.10.10.0/24 โ†’ DMZ:22 (SSH from school LAN only)
3. ALLOW tcp DMZ โ†’ PrivateLAN:3306 (NGINX โ†’ DB)
4. ALLOW tcp PrivateLAN โ†’ DMZ:80,443 (monitoring)
5. DENY any any โ†’ any (default deny)

๐ŸŸฆ Week 1 โ€” Hardware, Install, Network Setup

Server+ focus: Hardware โ†’ Virtualization โ†’ OS Install โ†’ Basic Networking

Goal by Friday: Proxmox runs, three bridges exist, OPNsense filters traffic, one VM of each OS boots with a static IP.

1
All Teams

Inspect and repair the blade server

Pop the chassis. Document every component: CPUs, RAM sticks, drives, NICs, PSU, serial numbers. Reseat RAM, verify drives pass SMART, replace bad thermal paste if needed.

CPURAM ร— 4NICPSU
Take photos of every step. They go into your Week 1 deliverable.
2
Networking

Install Proxmox VE

Download Proxmox VE ISO, flash to USB (balenaEtcher or Rufus). Boot the server from USB. Accept licenses. Pick a static mgmt IP on the school LAN (e.g. 10.10.10.50). Set a strong root password.

# After install, from any browser on the school LAN:
https://10.10.10.50:8006
# Login as root / password you set
3
Networking

Create the three virtual bridges

Datacenter โ†’ Node โ†’ System โ†’ Network โ†’ Create โ†’ Linux Bridge.

Proxmox โ†’ Network tabvmbr010.10.10.50/24Bridge ports: eno1Active โœ“vmbr1no IP (DMZ)Bridge ports: noneActive โœ“vmbr2no IP (Private)Bridge ports: noneActive โœ“

Click Apply Configuration when done. Bridges only take effect after apply.

4
Networking

Deploy OPNsense firewall

Download OPNsense ISO, upload to Proxmox local โ†’ ISO Images. Create a VM:

  • 2 vCPU, 2 GB RAM, 20 GB disk
  • Three NICs: one on vmbr0 (WAN), one on vmbr1 (DMZ), one on vmbr2 (LAN)
  • Boot the ISO, run the installer, assign interfaces in that order
OPNsense is the ONLY thing that routes between segments. Without it, DMZ and Private LAN are islands.
5
Windows Linux

Install one VM of each OS

Windows Server 2022 on vmbr2 (Private LAN). Debian 12 or Ubuntu 22.04 on vmbr1 (DMZ). Give each a static IP.

# Example static IPs
Windows (vmbr2):  192.168.0.10 / 24   gw 192.168.0.1  (OPNsense LAN)
Linux   (vmbr1):  172.16.0.10  / 24   gw 172.16.0.1   (OPNsense DMZ)
6
Team Lead

Draw the topology + organize docs

Open draw.io or Lucidchart. Re-create the diagram on the Network tab of this guide. Create a shared Google Drive / OneDrive folder:

Capstone/
โ”œโ”€โ”€ 01-Hardware/        # inventory, photos
โ”œโ”€โ”€ 02-Proxmox/         # install screenshots
โ”œโ”€โ”€ 03-Network/         # topology, IP plan
โ”œโ”€โ”€ 04-Windows/         # AD, IIS configs
โ”œโ”€โ”€ 05-Linux/           # NGINX, scripts
โ”œโ”€โ”€ 06-Security/        # hardening evidence
โ”œโ”€โ”€ 07-Backups/         # restore proof
โ””โ”€โ”€ 08-Reports/         # weekly write-ups

Week 1 Checklist

  • Blade server powered on, hardware inventory saved
  • Proxmox VE installed, reachable on https://IP:8006
  • vmbr0, vmbr1, vmbr2 created and Applied
  • OPNsense VM running with 3 NICs
  • Windows VM boots with static IP on vmbr2
  • Linux VM boots with static IP on vmbr1
  • Can ping from Windows โ†’ Linux through OPNsense
  • Topology diagram committed to docs folder

Level 2 Bonus Promote Windows to a domain controller (dcpromo era command is now Add Roles โ†’ AD DS โ†’ Promote). Install MongoDB on Linux. Create first VLAN tags.

๐ŸŸฉ Week 2 โ€” Core Services Deployment

Server+ focus: Server Roles โ†’ Web / File / DB Services โ†’ Basic Monitoring

1
Windows

DNS + DHCP roles

Server Manager โ†’ Add roles and features โ†’ DNS Server and DHCP Server.

After install:

  • In DNS, create a forward lookup zone (capstone.local)
  • In DHCP, create scope 192.168.0.100 โ€“ 192.168.0.200, router 192.168.0.1, DNS 192.168.0.10
  • Authorize DHCP in AD (right-click server โ†’ Authorize)
2
Windows

IIS web server

Add the Web Server (IIS) role. Drop an index.html into C:\inetpub\wwwroot. Test from the Linux VM:

curl http://192.168.0.10
3
Windows

File shares + SQL Express

Create C:\Shares\Team. Right-click โ†’ Properties โ†’ Sharing โ†’ advanced sharing โ†’ share as Team$ (hidden share) โ†’ permissions: Domain Users read, Admins full. Set NTFS ACLs to match.

Install SQL Server Express + SSMS. Create a test DB CapstoneDB.

4
Linux

NGINX site

sudo apt update && sudo apt install -y nginx
sudo systemctl enable --now nginx
# Replace default page
echo "<h1>Capstone DMZ - $(hostname)</h1>" | sudo tee /var/www/html/index.html

Visit http://172.16.0.10 from your laptop (you may need a firewall rule in OPNsense first).

5
Linux

MongoDB + cron + logs

sudo apt install -y mongodb-org
sudo systemctl enable --now mongod
# Simple cron job: log disk every 10 min
(crontab -l; echo "*/10 * * * * df -h >> /var/log/disk.log") | crontab -

Confirm logs rotate via /etc/logrotate.d/.

6
Networking

Routing + segmentation check

In OPNsense, open Firewall โ†’ Rules โ†’ LAN and DMZ.

  • Allow LAN โ†’ DMZ port 80/443 (for monitoring)
  • Block DMZ โ†’ LAN by default (default deny is enough)
  • Allow DMZ โ†’ WAN 80/443/53 (DNS + web updates)

Test: from Linux, curl 192.168.0.10 should fail. From Windows, curl 172.16.0.10 should work.

7
Team Lead

Integration report

Write a 2-page doc with screenshots of: DNS console, DHCP scope, IIS default page, NGINX page, segmentation test results. Save to 08-Reports/Week2.md.

Week 2 Checklist

  • Windows DNS zone resolves capstone.local
  • DHCP hands out IPs to a test client
  • IIS default page visible from another VM
  • File share accessible with correct ACLs
  • SQL Express running, test DB created
  • NGINX serves a page on DMZ
  • MongoDB reachable on localhost
  • OPNsense rules enforce LAN/DMZ separation
  • Integration report submitted

Level 2 Bonus Dockerize the NGINX site, deploy a Wazuh agent, export Prometheus metrics, enable NetFlow on OPNsense, stand up WireGuard VPN.

๐ŸŸง Week 3 โ€” Security & Monitoring

Server+ focus: Hardening โ†’ Permissions โ†’ Backup Scripts โ†’ Logs

1
Windows

NTFS permissions + Windows Firewall

Review share + NTFS on Team$. Apply least privilege. In Windows Defender Firewall, block all inbound except SMB (445) from LAN only, and RDP (3389) from the jump box IP only.

2
Windows

Windows Server Backup

Install the feature, schedule a nightly backup of C:\Shares and System State to a second disk. Test a one-file restore to a temp folder โ€” screenshot the result.

3
Linux

Backup scripts (rsync / tar)

#!/bin/bash
DATE=$(date +%F)
DEST=/backups/$DATE
mkdir -p $DEST
rsync -aAX --delete /etc /var/www $DEST/
tar czf $DEST/mongo-$DATE.tgz /var/lib/mongodb
find /backups -type d -mtime +14 -exec rm -rf {} +

Save as /usr/local/bin/capstone-backup.sh, chmod +x, add to root's crontab at 0 2 * * *.

4
Linux

SSH hardening

Edit /etc/ssh/sshd_config (use nano):

Port 2222
PermitRootLogin no
PasswordAuthentication no
AllowUsers capstoneadmin
MaxAuthTries 3

Restart: sudo systemctl restart ssh. Test from another VM before closing your current session.

Always keep an open session while you restart SSH. If the new config is broken you still have a foothold.
5
Networking

Snort IDS + segmentation re-test

Enable Suricata/Snort in OPNsense (Services โ†’ Intrusion Detection). Subscribe to the ET Open ruleset. Point it at the WAN and DMZ interfaces. Watch the alerts tab while your Linux specialist runs curl loops.

Re-run the segmentation matrix โ€” document every src/dst/port and expected result.

6
Team Lead

Security assessment

Produce a short report listing every hardening step: firewall rules, account lockouts, password policy, SSH keys, backup schedule, IDS alerts observed. Rank residual risks High/Med/Low.

Week 3 Checklist

  • NTFS + share ACLs audited, least privilege applied
  • Windows firewall rules restrict SMB/RDP
  • Nightly Windows backup runs + tested restore
  • Linux backup script installed and cron-scheduled
  • SSH on port 2222, key-only, root disabled
  • Snort / Suricata alerts visible in OPNsense
  • Segmentation matrix documented with pass/fail
  • Security assessment submitted

Level 2 Bonus WSUS patch server, advanced GPO baselines (CIS), Bacula CE scheduled backups, SIEM rules in Wazuh, Suricata in IPS mode.

๐ŸŸช Week 4 โ€” Backup Validation, Audit, Demo

Server+ focus: Backup โ†’ Restore โ†’ DR โ†’ Documentation โ†’ Demo

1
Windows Linux

Full restore dry run

Pick one VM. Snapshot it. Delete a file or a DB row. Restore it from backup. Record time-to-restore (RTO) and what data was lost (RPO). This is your DR evidence.

2
Networking

Final firewall + routing review

Export the OPNsense rule set to PDF. Walk through each rule โ€” if you can't explain why it exists, delete it. Re-run the segmentation matrix one last time.

3
Team Lead

Final report

Stitch all weekly reports into one PDF. Structure:

  • Executive summary (1 page)
  • Architecture overview with diagram
  • Services deployed
  • Security controls
  • Backup + DR test results
  • Residual risks & recommendations
  • Appendix: screenshots, configs, scripts
4
All Teams

Live demo

15-minute walkthrough. Suggested flow:

  1. Show topology slide
  2. Log into Proxmox, show the VMs running
  3. Open the DMZ web page from outside
  4. Show segmentation: attempt DMZ โ†’ LAN, watch OPNsense block it
  5. Show an IDS alert
  6. Restore a file from backup live
  7. Q&A
Rehearse once end-to-end. Have a teammate play "surprise evaluator" and ask a question mid-demo. Know your recovery steps if a VM misbehaves.

Week 4 Checklist

  • Windows restore dry run โ€” RTO/RPO documented
  • Linux restore dry run โ€” RTO/RPO documented
  • Firewall rule review complete
  • Routing tests pass
  • Final report PDF compiled
  • Demo rehearsed at least once
  • Docs folder is the single source of truth

Level 2 Bonus Full DR simulation (power off a VM, rebuild from backup on a fresh VM), MISP โ†’ OpenCTI threat intel flow, audit log exports.

๐Ÿงช Hands-On Lab Guide โ€” Server+ Week 1โ€“5

This is the actual click-by-click walkthrough from your instructor's config guide. Follow it in order. Screenshot every major step for your docs folder.

Heads up โ€” two topologies exist. The one-page overview PDF shows 3 bridges + OPNsense. This lab guide uses 2 bridges (vmbr1, vmbr2) + iptables NAT on the Proxmox host itself, with a Jump Box in the DMZ. When in doubt, this lab guide is what you're actually expected to build.
Disclaimer from the instructor: All highlighted IPs depend on your own network setup. The ones shown here are examples โ€” confirm actual IPs with your instructor.

๐Ÿ“ธ Inside-the-chassis reference diagrams

These are the service labels printed inside your ML350p Gen8. Keep this tab open while you're working with the hardware โ€” the diagrams tell you exactly which slot goes where.

ML350p Gen8 system board layout

System board layout

31 numbered components: PCIe slots (1โ€“12), DIMM slots, both processor sockets, Mini SAS connectors (A, B), cache module slot, SATA connectors, SD card slot, TPM connector, iLO connector, and the system maintenance switch (30) โ€” the one you flip to disable iLO security or clear passwords if you're ever locked out.

ML350p Gen8 DIMM population chart

DIMM (RAM) population order

Critical when adding or reseating RAM. Rules at a glance:

  • White DIMM slots = first slot of each channel โ€” fill these first
  • 1 CPU installed? Alphabetical: A, B, C, D, E, F
  • 2 CPUs? Alternate: P1:A, P2:A, P1:B, P2:Bโ€ฆ
  • Don't mix UDIMMs, RDIMMs, LRDIMMs in the same system
  • Max 2 UDIMMs per channel
ML350p Gen8 front panel LED guide

Front-panel components + LED meanings

Systems Insight Display, drive cages, USB, serial number pull-tab, power button. LED color legend:

  • Green = normal / link up
  • Amber = degraded / attention needed
  • Red flashing = health critical
  • Blue (UID) = server is being managed remotely via iLO โ€” useful for locating in a rack
Click any image to open the full-size version in a new tab โ€” zoom in when you need to read small print like connector labels or switch settings.

๐Ÿ–ฅ๏ธ Your server, simplified

Here's a stylized front + rear view of the ML350p Gen8 so you know what each port does before you touch a cable.

Front SID display โป Power / UID / Health Drive bays (up to 8 SFF) USB Pull-tab (serial #) Mesh bezel (airflow) Status LEDs + power Hot-swap drive bays Rear PSU 1 (redundant) PSU 2 (redundant) Embedded ports 1 2 3 4 4ร— 1 Gbps data NICs ๐Ÿ’ก iLO VGA Serial USB USB PCIe expansion slots (9 total) Dual PSUs โ€” pull one, still runs 4 data NICs โ€” vmbr0/1/2 here ๐Ÿ’ก iLO (separate!) PCIe โ€” RAID, extra NICs

Part 1 โ€” Flash a USB drive with the Proxmox ISO (Rufus)

1

What you'll need

  • USB drive, at least 2โ€“4 GB
  • Rufus installed on your Windows PC
  • Proxmox VE ISO from the official Proxmox download page
2

Flash the USB

  1. Plug the USB drive into a school computer.
  2. Open File Explorer and type \\itsdc3\its in the address bar.
  3. Open Rufus-4.7.
  4. Under Device, select your USB drive (check the box to list USB devices if needed).
  5. Click SELECT, navigate to \\itsdc3\its, pick the Proxmox 6.4-1 ISO.
  6. Partition scheme: MBR for BIOS or GPT for UEFI (depends on target).
  7. File system: FAT32.
  8. Click START. When prompted, choose DD mode (required for Proxmox).
  9. Wait for Rufus to finish.

Part 2 โ€” Access BIOS & set USB boot (HP ProLiant ML350p Gen8)

Your hardware: HP ProLiant ML350p Gen8 tower. Key differences from Dell: HP uses F9 for BIOS (not F2), F8 for the RAID Option ROM (not Ctrl+R), and has an extra F10 "Intelligent Provisioning" menu that can do most of the install for you.
1

HP POST key cheat sheet

Watch the bottom of the screen right after power-on โ€” HP shows which keys do what for a few seconds. Tap the key you want as soon as you see POST:

Key What it opens Use it for
F9System Utilities (RBSU)BIOS settings, boot order, date/time
F10Intelligent ProvisioningGuided RAID + OS install in one place
F11One-time Boot MenuPick USB for this boot only
F8Smart Array Option ROMRAID configuration (see Part 3)
2

Enter BIOS / System Utilities

Plug in keyboard and monitor. Power on. When you see the HP splash screen, tap F9 repeatedly until you see "System Utilities" load. (On older firmware you'll see "ROM-Based Setup Utility" โ€” same thing.)

3

Configure boot order

  1. In System Utilities: System Configuration โ†’ BIOS/Platform Configuration (RBSU) โ†’ Boot Options โ†’ Standard Boot Order (IPL).
  2. Move USB DriveKey (or your USB stick) to the top with the + / - keys.
  3. Press F10 to save, then Exit.
Shortcut: if you only need USB boot for this one install, skip changing the order โ€” just tap F11 at POST, pick the USB from the one-time boot menu, and keep your normal boot order intact.
4

Bonus โ€” configure iLO (do this once)

The ML350p Gen8 has iLO 4 (Integrated Lights-Out) โ€” a tiny computer inside the server that lets you power it on/off and see the console remotely, even when the OS is dead. Worth setting up.

  1. During POST press F9 โ†’ System Configuration โ†’ iLO 4 Configuration Utility.
  2. Under Network Options, set a static IP on your school LAN (e.g. 10.10.10.51).
  3. Under User Administration, set a strong password for the default user.
  4. Save. Plug the dedicated iLO RJ-45 port into the school switch (it's a separate NIC labeled iLO, not one of the four data NICs).
  5. Reach it from any school laptop: https://10.10.10.51
Default iLO creds are printed on a pull-out tag on the front of the server. If someone already changed them and you don't know the new password, you'll need to reset iLO via the physical jumper on the system board.

Part 3 โ€” Configure RAID (HP Smart Array P420i)

Deleting a logical drive (HP calls VDs "logical drives") erases ALL data on those disks. Be certain before confirming.

On the ML350p Gen8 you have two ways to configure RAID:

  • Option A โ€” F8 Option ROM (ACU/ORCA): quick text menu at POST. Good for simple arrays.
  • Option B โ€” F10 Intelligent Provisioning: friendlier graphical wizard. Walks you through RAID + OS install together. Recommended if this is your first time.

Before you pick โ€” what each RAID level actually does

RAID 0 โ€” Stripe

๐Ÿ’พ
Disk 1
๐Ÿ’พ
Disk 2

Pro: fastest, 100% capacity usable

Con: ONE disk fails โ†’ ALL data gone

Use for: scratch space only. Not for this lab.

RAID 1 โ€” Mirror

๐Ÿ’พ
Disk 1
๐Ÿ’พ
Disk 2
(copy)

Pro: full redundancy, simple

Con: only 50% capacity usable

Use for: OS / boot drive on a 2-disk setup. Great default.

RAID 5 โ€” Stripe + Parity

๐Ÿ’พ
Disk 1
๐Ÿ’พ
Disk 2
๐Ÿ’พ
Disk 3

Pro: survives one disk failure, ~67% usable

Con: slow writes, rebuilds are risky

Use for: 3+ disks, balanced cost / safety. Good for data drive.

RAID 10 โ€” Mirror + Stripe

๐Ÿ’พ
1a
๐Ÿ’พ
1b
๐Ÿ’พ
2a
๐Ÿ’พ
2b

Pro: fast + redundant, survives multi-disk failures

Con: only 50% capacity, needs 4+ disks

Use for: databases. Best if you have 4+ disks.

This lab's recommendation: if you have 2 disks, use RAID 1. If you have 4+, use RAID 10. Don't use RAID 0 โ€” the server will be running services, and one disk failure shouldn't take the whole project down.

Option A โ€” Smart Array Option ROM (F8)

1

Enter the RAID utility

Reboot. During POST watch for: "Slot 0 HP Smart Array P420i Controller โ€” Press <F8> to run Option ROM Configuration for Arrays Utility." Tap F8 as soon as you see it.

2

Delete old logical drives (if any)

From the main menu pick Delete Logical Drive. Highlight an existing drive โ†’ press F8 to confirm delete โ†’ Enter. Repeat until the list is empty.

3

Create a new logical drive

  1. From the main menu: Create Logical Drive.
  2. Under Available Physical Drives, select disks with the arrow keys + Space.
  3. Under RAID Configurations, pick a level:
    • RAID 1 (mirror, 2 disks) โ€” simple redundancy, good for an OS drive
    • RAID 5 (striping + parity, 3+ disks) โ€” capacity + one-disk failure tolerance
    • RAID 10 (4+ disks) โ€” best performance + redundancy, uses 50% capacity
  4. Accept the defaults for stripe size and sector size.
  5. Press Enter to create โ†’ F8 to save.
4

Exit and reboot

Press Esc โ†’ confirm exit. No separate "initialize" step is needed on the HP controller โ€” the drive is ready once created. If asked, let a quick format run.

Option B โ€” Intelligent Provisioning (F10)

1

Launch Intelligent Provisioning

Reboot โ†’ at POST, tap F10. First launch asks for basic setup (language, date, network, admin contact). Fill it in and continue.

2

Perform Maintenance โ†’ Smart Storage Administrator

From the main menu: Perform Maintenance โ†’ HP Smart Storage Administrator (SSA). Pick your Smart Array P420i controller on the left.

3

Create the array

  1. Click Create Array.
  2. Check the boxes for each physical drive you want in the array.
  3. Pick a RAID level (same options as Option A above).
  4. Accept defaults on strip size / cache.
  5. Click Create Logical Drive โ†’ Save.

Exit SSA, then from IP's main menu pick Configure and Install โ€” it can drive the Proxmox install next if you want a one-shot flow.

Part 4 โ€” Install Proxmox

1

Run the installer

  1. Insert USB into the server.
  2. Reboot, hit F11 for the boot menu, pick the USB.
  3. At the Proxmox VE Installer menu: Install Proxmox VE.
  4. Select the RAID virtual disk as the target (will wipe it โ€” expected).
  5. Set username, password, hostname.
2

Network settings

Hostname:   [your team hostname]
Static IP:  10.10.10.X/24   # ask instructor for your assigned X
Gateway:    10.10.10.1      # school router
3

Verify web UI

Remove USB, reboot. From a school desktop browser:

https://10.10.10.X:8006

Log in with your Proxmox credentials.

Part 5 โ€” Upload ISO images to Proxmox

1

Upload flow

  1. Open dashboard: https://10.10.10.X:8006
  2. Left sidebar: Datacenter โ†’ TeamX โ†’ local (teamx).
  3. Center panel: ISO Images โ†’ click Upload.
  4. Click Select file, navigate to \\itsdc3\its, pick the ISO.
  5. Repeat for every ISO you'll need (Windows Server, Ubuntu Server, etc.).

Part 6 โ€” Create two virtual bridges (vmbr1 & vmbr2)

1

vmbr1 โ€” Jump Box / DMZ bridge

On the Proxmox host CLI (use nano):

nano /etc/network/interfaces

Add:

auto vmbr1
iface vmbr1 inet static
    address 172.16.0.X
    netmask 255.255.255.0
    bridge_ports none
    bridge_stp off
    bridge_fd 0

This establishes the 172.16.0.0/24 subnet for your Jump Box zone.

2

vmbr2 โ€” Private LAN bridge

In the same file, add:

auto vmbr2
iface vmbr2 inet static
    address 192.168.0.1
    netmask 255.255.255.0
    bridge_ports none
    bridge_stp off
    bridge_fd 0

This establishes the 192.168.0.0/24 subnet for internal-only VM traffic.

3

Apply changes

Pause or shut down critical VMs before restarting networking.
systemctl restart networking
# or full reboot
reboot

Part 7 โ€” Deploy and harden the Jump Box VM

1

Create the VM

  • Proxmox GUI โ†’ Create VM.
  • Ubuntu Server (lightweight).
  • 2 vCPU, 2 GB RAM, 25 GB disk.
  • NIC on vmbr1.
  • Static IP 172.16.0.X, gateway 172.16.0.1.
2

Install SSH

sudo apt update
sudo apt install openssh-server
sudo systemctl enable ssh
sudo systemctl start ssh
3

Harden SSH access

Create a non-root admin:

sudo adduser <username>
sudo passwd <username>

Edit the SSH config (use nano):

sudo nano /etc/ssh/sshd_config

Find and change these lines (remove the leading # if present):

PermitRootLogin no
PasswordAuthentication yes

Save: Ctrl+O then Enter. Exit: Ctrl+X.

Keep your current SSH session open while you restart sshd โ€” if the new config is broken, you still have a way in.
4

Firewall rules (UFW)

Restrict SSH to trusted subnets (example values โ€” adjust to your setup):

sudo ufw allow from 10.10.10.0/24 to any port 22
sudo ufw allow from 192.168.0.0/24 to any port 22
sudo ufw allow from 172.16.0.0/24 to any port 22
sudo ufw enable

Part 8 โ€” Enable routing between subnets (iptables NAT + PAT)

1

Turn on IP forwarding

echo 1 > /proc/sys/net/ipv4/ip_forward
echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf
2

Add NAT / PAT / forwarding rules

iptables -t nat -A POSTROUTING -s 172.16.0.0/24 -d 192.168.0.0/24 -j MASQUERADE
iptables -A FORWARD -s 172.16.0.0/24 -d 192.168.0.0/24 -j ACCEPT

# Port-forward 2222 on the host to the internal SSH jump target
iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 2222 \
  -j DNAT --to-destination 192.168.0.2:22
iptables -A FORWARD -p tcp -d 192.168.0.0/24 --dport 22 -j ACCEPT
iptables -A INPUT -p tcp --dport 2222 -j ACCEPT

iptables -t nat -A POSTROUTING -o vmbr1 -j MASQUERADE
iptables -t nat -A POSTROUTING -o vmbr0 -j MASQUERADE

This lets traffic from the School LAN and Jump Box subnet reach the internal network.

3

Persist the rules

apt install iptables-persistent
netfilter-persistent save
# or:
iptables-save > /etc/iptables/rules.v4
4

Test connectivity

# From Proxmox host โ†’ Jump Box
ssh [email protected]

# From the Jump Box โ†’ internal VM
ssh <user>@192.168.0.X

Part 9 โ€” Deploy Windows & Linux servers on the Private LAN

1

Windows Server VM

  • Proxmox GUI โ†’ Create VM โ†’ Windows Server ISO.
  • 2 vCPU, 2 GB RAM, 25 GB disk.
  • NIC on vmbr2.
  • Static IP 192.168.0.X, gateway 192.168.0.1.
2

Linux Server VM

  • Same shape: 2 vCPU, 2 GB RAM, 25 GB disk.
  • Ubuntu Server ISO, NIC on vmbr2.
  • Static IP 192.168.0.X, gateway 192.168.0.1.
DNS setting on all machines = the IP you assign to the Windows Server (e.g. 192.168.0.10). That box will become your AD / DNS server.
3

Add static route back to the Jump Box

So internal VMs can reach the Jump Box at 172.16.0.X:

Windows (PowerShell as Administrator):

route add 172.16.0.0 mask 255.255.255.0 192.168.0.1

Linux:

sudo ip route add 172.16.0.0/24 via 192.168.0.1

Lab Guide Checklist

  • Part 1 โ€” USB flashed with Proxmox ISO (DD mode)
  • Part 2 โ€” BIOS (F9) set to boot from USB
  • Part 2 โ€” iLO 4 static IP set, web UI reachable at https://10.10.10.X
  • Part 3 โ€” Smart Array P420i logical drive created (F8 or F10/SSA)
  • Part 4 โ€” Proxmox installed, web UI reachable at :8006
  • Part 5 โ€” ISO images uploaded to local storage
  • Part 6 โ€” vmbr1 (172.16.0.0/24) and vmbr2 (192.168.0.0/24) created
  • Part 7 โ€” Jump Box deployed, SSH hardened, UFW enabled
  • Part 8 โ€” IP forwarding on, iptables NAT/PAT rules persisted
  • Part 9 โ€” Windows + Linux servers on vmbr2 with static routes back

๐Ÿ”ง ML350p Gen8 โ€” Quick Reference

Distilled from the official HPE ProLiant ML350p Gen8 User Guide (Part 661082-008R, Edition 9). Every table here is the answer to a question you'll have during the lab โ€” what does this LED mean, which key do I press, how do I populate RAM, etc.

๐Ÿ“„ Full manual (139 pages): ML350p-Gen8-User-Guide.pdf โ€” open in a new tab, searchable.

Your unit's serial #: 2M251705M9 โ€” printed on the pull-tab at the front of the chassis; record this on every deliverable (Week 1 report, asset sheet, iLO config).

โŒจ๏ธ POST key reference

Watch the bottom of the screen right after power-on. These keys are only active for a few seconds during POST.

KeyOpensUse when you want toโ€ฆ
F9RBSU / System UtilitiesChange BIOS settings, boot order, configure iLO, re-enter serial #
F10Intelligent ProvisioningGuided RAID + OS install, run SSA, view Active Health log
F11One-time boot menuBoot once from USB without changing boot order
F12PXE network bootNet-install without any media
F8Smart Array Option ROM (ORCA)Create/delete logical drives on the P420i from text menu
On first-ever boot the auto-configuration process runs ORCA automatically: 1 drive โ†’ RAID 0, 2 drives โ†’ RAID 1, 3โ€“6 drives โ†’ RAID 5, more than 6 โ†’ no default. If the boot drive isn't empty, ORCA skips auto-config and waits for you.

๐Ÿšฅ Front-panel LED decoder

Four LEDs on the front bezel tell you the server's health without you having to plug in a monitor. Memorize these โ€” when something's wrong, this is the first thing a technician reads.

LEDStateWhat it means
PowerSolid greenSystem is on and running
Flashing green (1 Hz)Performing power-on sequence
Solid amberStandby (plugged in, not on)
OffNo power โ€” check cord, PSU, power button cable
NICSolid greenLinked to network
Flashing greenNetwork activity
OffNo network activity
HealthSolid greenNormal
Flashing amberSystem degraded โ€” check Systems Insight Display
Flashing red (1 Hz)System critical
Fast-flashing red (4 Hz)Power fault
UIDSolid blueActivated โ€” lets you find this server in a rack
Flashing blue (1 Hz)Remote mgmt via iLO OR firmware upgrade in progress
OffDeactivated

๐Ÿ”Œ Rear panel port map

PortPurpose
NIC 1 โ€“ 4Four 1 Gbps data NICs (HP 331i or 361i embedded). These carry your vmbr0/1/2 traffic.
iLOSeparate dedicated NIC for remote management. Not one of the four above โ€” it's labeled with the iLO icon.
Video (VGA)Plug in a monitor directly. Also available virtually via iLO Remote Console.
SerialDB-9 serial console port โ€” old-school admin, still useful when nothing else works.
USB ร— 4Keyboards, boot media, licensing dongles. Front has 4 more.
PSU 1 โ€“ 4Up to four hot-swap redundant power supplies. 460W / 750W / 1200W options.
PCIe slots 1 โ€“ 9Slots 1โ€“4 belong to Processor 1, slots 5โ€“9 to Processor 2 (slots 5โ€“9 only work with 2nd CPU installed).
Kensington lockPhysical theft deterrent.

โš™๏ธ System maintenance switch (SW 30 on the board)

A bank of DIP switches on the system board. Defaults are all Off. You flip these only to recover from being locked out or to force firmware recovery.

SwitchOff (default)On
S1iLO 4 security enablediLO 4 security disabled (recovery)
S2System config can be changedSystem config locked
S5Power-on password enabledPower-on password disabled
S6No functionROM reads config as invalid = clears CMOS + NVRAM
S3, S4, S7โ€“S12Reserved โ€” do not change
To enter redundant ROM recovery mode: set S1, S5, and S6 to On. Clearing CMOS/NVRAM (S6 on) wipes config โ€” you'll need to reconfigure boot order, serial number, iLO, etc.

๐Ÿง  DIMM population rules

Your ML350p has 24 DIMM slots total โ€” 12 per processor. Populating them wrong = the server won't POST or runs in degraded mode.

The golden rules:
  1. Install DIMMs only if the corresponding processor is installed (slots 13โ€“24 stay empty unless CPU 2 is in).
  2. White slots = first slot of each channel. Fill white slots before black.
  3. 1 CPU: alphabetical A, B, C, D, E, F, G, H, โ€ฆ
  4. 2 CPUs: alternate P1:A, P2:A, P1:B, P2:B, P1:C, P2:C, โ€ฆ
  5. Don't mix UDIMMs, RDIMMs, or LRDIMMs in the same server.
  6. Max 2 UDIMMs per channel. RDIMMs allow up to 3.

AMP modes (Advanced Memory Protection) โ€” set in RBSU:

  • Advanced ECC (default) โ€” corrects single-bit + some multi-bit failures
  • Online Spare โ€” reserves memory; auto-fails-over on degraded DIMM

๐Ÿ’พ Hot-plug drive LEDs

Each drive caddy has 4 LEDs. When you're troubleshooting a RAID issue or swapping a failed disk, this is your decoder.

LEDStateMeaning
Locate (1)Solid blueDrive being identified by a host app (e.g. SSA "locate")
Flashing blueDrive firmware update in progress
Activity (2)Rotating greenDrive is active (I/O happening)
OffNo drive activity
Do not remove (3)Solid whiteDo not remove โ€” pulling this drive fails a logical drive
OffSafe to remove
Drive status (4)Solid greenMember of one or more logical drives
Flashing greenRebuilding / migrating / expanding / erasing
Flashing amber/greenDrive is active but predicted to fail soon โ€” replace proactively
Flashing amberUnconfigured, predicted to fail
Solid amberDrive has failed
OffNot configured by a RAID controller

๐Ÿฉบ Systems Insight Display (SID) LED combinations

When the front Health LED goes amber or red, the SID tells you which subsystem is unhappy. Common combinations:

SID LEDHealth LEDPower LEDCondition
Processor (amber)RedAmberCPU failed / not installed / unsupported
Processor (amber)AmberGreenCPU pre-failure
DIMM (amber)RedGreenOne or more DIMMs failed
DIMM (amber)AmberGreenDIMM pre-failure
Overtemp (amber)AmberGreenCautionary temperature
Overtemp (amber)RedAmberCritical temperature โ€” server may shut down
Fan (amber)AmberGreenFan failed but still meets minimum redundancy
Fan (amber)RedGreenFan failed, no longer meeting minimum
PSU (amber)AmberGreenRedundant PSU failed (server still runs)
If more than one DIMM LED is lit, isolate the bad stick: pull all DIMMs from the bank, swap each one with a known-good DIMM one at a time.

๐Ÿ’จ Fans

  • 4 hot-plug fans total (numbered 1โ€“4).
  • Fans 2, 3, 4 = primary (always required).
  • Fan 1 = redundant only when Processor 2 is installed.
  • Fan louvers must be present for redundancy to work. Missing louvers = all fans treated as non-redundant.

๐Ÿงฐ The HP software stack โ€” what each tool does

ToolWhen it runsWhat it's for
iLO 4Always (independent of OS)Remote power, remote console, virtual media, Active Health System log, SNMP alerts. Reach via https://iLO-IP.
Active Health SystemContinuousPassive monitoring. Records model, serial, CPU, storage, memory, firmware changes. Log can be exported via iLO or IP.
Integrated Management Log (IML)ContinuousEvent log with 1-minute timestamps. View from iLO web UI or HPE SIM.
Intelligent Provisioning (IP)Offline (F10 at POST)Guided OS install, RAID setup via SSA, maintenance tasks. Replaces old SmartStart CD.
RBSU (ROM-Based Setup)Offline (F9 at POST)Traditional BIOS โ€” boot order, AMP memory mode, primary controller, serial # re-entry.
Smart Storage Administrator (SSA)Online or offline via IPGraphical RAID config. Online array expansion, rebuilds, SmartSSD wear gauge.
ORCA (Option ROM Config for Arrays)Offline (F8 at POST)Text-menu RAID โ€” create/delete logical drives, set boot controller.
Service Pack for ProLiant (SPP)Online or offlineBundled firmware + drivers update for the whole server. Run once a year.
HP Smart Update Manager (SUM)OnlineDeploy firmware/drivers across many servers from one place.
Automatic Server Recovery (ASR)AlwaysWatchdog timer. If OS hangs, server auto-restarts after a timeout.
ROMPaqOfflineSystem firmware (BIOS) upgrade from USB.

โป Safe power procedures

Power up

Press the front Power On/Standby button. System goes from standby โ†’ on. Watch the power LED: flashing green = boot sequence running, solid green = running.

Power down (soft)

  1. Shut down the OS (gracefully โ€” shutdown /s or sudo systemctl poweroff).
  2. Press and release the front Power On/Standby button.
  3. Wait for power LED to turn amber (standby).

Emergency power down

Hold the Power On/Standby button for 4+ seconds. Only use this when the OS is frozen โ€” data loss possible.

Even when the power LED is amber/off, facility power may still be present on the system board. Always unplug both power cords before touching internal components.

๐Ÿ“Š Key specifications

CPU

Up to 2ร— Intel Xeon E5-2600 v1/v2
Up to 8 cores per socket
LGA 2011 socket

RAM

24 DIMM slots total (12 per CPU)
DDR3 ECC, up to 768 GB
AMP modes in RBSU

Storage

Up to 24ร— 2.5" SFF or 18ร— 3.5" LFF
Smart Array P420i onboard
SAS / SATA hot-plug

Network

4ร— 1 Gbps embedded NICs
Dedicated iLO 4 management NIC
PCIe expansion available

PSU

Up to 4 hot-swap PSUs
460 W / 750 W / 1200 W options
92โ€“94% efficiency (Gold/Platinum)

Form factor

5U tower
Rack-convertible (rails available)
4 hot-plug fans

๐Ÿ›Ÿ Troubleshooting cheat sheet

  • Server won't POST โ†’ check PSU LEDs (rear), reseat RAM following the population rules above, clear CMOS (S6 on โ†’ boot โ†’ off).
  • Forgot iLO password โ†’ set S1 On to disable iLO security โ†’ boot โ†’ log in without password โ†’ reset password โ†’ power down โ†’ set S1 Off.
  • Health LED amber โ†’ open the chassis, check SID LEDs for which subsystem. Cross-reference SID table above.
  • Drive predicted to fail โ†’ drive status LED flashing amber/green. Order a spare and swap proactively.
  • OS hung โ†’ iLO Remote Console โ†’ Power โ†’ Cold Boot, or short the NMI header for a crash dump.
  • Firmware feels old โ†’ download SPP, boot from it, let SUM update everything.

๐Ÿ“‹ IT Asset Tracker

The Team Lead owns this spreadsheet. Populate it with host + VM info in Week 1; update every time hardware or software changes. Export a snapshot for each weekly report.

The source file lives at /Users/haktang/Downloads/IT-Asset-Tracking-Spreadshee.xlsx. Three sheets: Hardware Vendor List, Hardware Asset, Software Asset Installation.

Sheet 1 โ€” Hardware Vendor List

Vendor Product Description Cost Contact Address
CISCO 2960 Switch โ€” Anthony Pena
[email protected]
6300 La Calma Dr Ste 350
Austin, TX 78752
HPE ProLiant ML350p Gen8 Tower server (Proxmox host) $300 Anthony Pena
[email protected]
6300 La Calma Dr Ste 350
Austin, TX 78752

Sheet 2 โ€” Hardware Asset (current inventory)

Total asset value: $710

Item # Name Type Location Qty Unit $ Total $ Condition
100 Cisco 2960 Switch Storage Room โ€” โ€” $0 Poor
101 TP-Link TL-SG1024D
Main class switch
Switch Server Room 1 $110 $110 Normal
102 HPE ProLiant ML350p Gen8
Proxmox / web server (2x Xeon E5-2600, Smart Array P420i, iLO 4)
Server Server Room 2 $300 $600 Excellent

Sheet 3 โ€” Software Asset Installation

Host Item # Hardware OS Program Version Remarks
102 HPE ProLiant ML350p Gen8 (Web) Fedora 39 NGINX 1.72.2 NGINX Plus R33
102 HPE ProLiant ML350p Gen8 (Web) Fedora 39 MySQL 1.0.1 Internal database

What to add to the spreadsheet for your team

  • Hardware Asset sheet: add one row per VM you create โ€” Proxmox host, Jump Box, Windows Server, Linux Server. Assign item numbers sequentially starting from 103.
  • Software Asset sheet: every time you install a service (DNS, DHCP, IIS, NGINX, MongoDB, etc.), add a row with host item #, OS, program, version.
  • Vendor list: stays as-is unless your team buys new gear.

๐Ÿ“ Week 1 Report โ€” Form & Deliverables

This mirrors the Capstone Week1.docx form. Fill it in as you go; submit as PDF or Word.

Date: ___________    Team: ___________

Team members & roles:

  • ๐ŸชŸ Windows Specialist: ___________
  • ๐Ÿง Linux Specialist: ___________
  • ๐ŸŒ Networking Specialist: ___________
  • ๐Ÿ“‹ Team Lead: ___________

๐ŸŽฏ Objective

Physically inspect and assemble the server, install Proxmox, create foundational VMs, and produce a network diagram reflecting a small-school IT environment.

๐Ÿ”ง Phase 1 โ€” Hardware Inspection & Proxmox Install

Step 1: Examine server hardware

Your hardware: HPE ProLiant ML350p Gen8. Typical specs: 2ร— Intel Xeon E5-2600 series (up to 8 cores each), DDR3 ECC RAM (24 DIMM slots, up to 768 GB), HP Smart Array P420i RAID controller, 4ร— embedded 1 Gbps NICs (HP 331i/361i), iLO 4 management port. 5U tower form factor. Fill the "Actual spec" column below by opening System Utilities (F9) โ†’ System Information, or look at the front pull-out tag for model / serial.
Component Expected requirement Actual spec Notes
CPU coresโ‰ฅ 4 virtualizable cores4 cores ยท 1ร— Xeon E5-2609 v2 @ 2.5 GHzSingle CPU; socket 2 empty
Virtualization supportIntel VT-x / AMD-VIntel VT-x + VT-d โœ“Confirmed in BIOS
RAMโ‰ฅ 16 GB32 GB ยท 4ร— 8 GB DDR3L-1600 ECC RDIMMQuad-channel; 4 of 24 slots used
Storageโ‰ฅ 200 GB local3 TB total ยท 3ร— 1 TB SATA in RAID 5Hardware RAID via Smart Array P420i; 1 drive of capacity reserved for parity
NICsโ‰ฅ 2 (1 mgmt, 1 VMs)4ร— 1 GbE ยท HP 331i (Broadcom BCM5719)+ iLO 4 dedicated RJ-45 for remote mgmt

Step 2: Install Proxmox VE

  • Set up RAID: RAID 5 ยท 3ร— 1 TB SATA ยท ~3 TB total (built in HP ORCA via F8)
  • Rufus ISO used: Proxmox VE 8.2.2 (DD mode, FAT32, MBR)
  • Partition scheme (BIOS / GPT / UEFI): Legacy BIOS ยท MBR
  • File system: ext4 on /dev/sda (LVM thin pool for VM disks: local-lvm)
  • Hostname: tctmachine
  • Static IP: 10.10.10.10/16 ยท Gateway 10.10.10.1 ยท DNS 1.1.1.1
  • Web UI verified at: https://10.10.10.10:8006

Installation issues or notes:

HP ORCA auto-starts parity initialization in the background โ€” no separate F2 โ†’ Initialize step required (that's Dell PERC behavior). Drives are mismatched ages (WD Blue 2018, WD RE3 2010) โ€” weekly SMART checks recommended.

๐Ÿ”ง Phase 2 โ€” VM Provisioning & Network Bridge

Step 3: Bridge configuration Networking

  • Bridge name (mgmt): vmbr0 (bridges eno1 to school LAN)
  • Static IP given to Proxmox physical host: 10.10.10.10/16 ยท GW 10.10.10.1
  • Additional bridges built (Week 2 prep): vmbr1 ยท DMZ 172.16.0.0/24 ยท host IP 172.16.0.10  |  vmbr2 ยท LAN 192.168.0.0/24 ยท host IP 192.168.0.10
  • Ping test to internet (8.8.8.8): ___________ ms
  • Ping test to gateway (10.10.10.1): ___________ ms

Step 4: Create base VMs

VM name OS & version Static IP Assigned role Responsible
jumpbox (VM 101)Ubuntu Server 24.04 LTS172.16.0.2/24 (vmbr1)Hardened SSH jump host ยท DMZ entry point๐ŸŒ Networking
WindowsServer01 (planned Wk 2)Windows Server 2022192.168.0.2/24 (vmbr2)DNS / DHCP / IIS / AD๐ŸชŸ Windows
LinuxServer01 (planned Wk 2)Ubuntu Server 24.04192.168.0.3/24 (vmbr2)NGINX ยท MariaDB ยท NTP ยท Syslog๐Ÿง Linux
  • Ping response Windows โ†’ Linux: ___________ ms
  • Ping response Linux โ†’ Windows: ___________ ms

Step 5: Documentation & reporting Team Lead

  • Populate the IT Asset Tracking spreadsheet with host + VM info
  • Export a snapshot for the Week 1 report

๐Ÿ“ Network diagram requirement

Create a diagram showing the Proxmox host, vmbr0, and your two base VMs. Pick one tool:

  • Cisco Packet Tracer โ€” recommended for exposure to network simulation
  • Paper sketch โ€” photo acceptable
  • draw.io or Visio

๐Ÿ“„ Week 1 report โ€” submit as PDF or Word

Include:

  1. Proxmox host screenshot โ€” dashboard showing both VMs running
  2. Network diagram โ€” from Phase 3
  3. Asset tracking snapshot โ€” top entries from your spreadsheet
  4. Short reflection โ€” 2โ€“3 sentences per question:
    • Were your hardware specs adequate for virtualization?
    • What installation or network issues did your team encounter?
    • Is your environment ready to begin service setups next week?

Week 1 Report Checklist

  • Team roles filled in at top of form
  • Hardware inspection table completed with actual specs
  • Proxmox install details (RAID, ISO, partition, FS) recorded
  • Bridge and host static IP captured
  • Both base VMs listed with IPs
  • Cross-VM ping results recorded
  • Asset tracking spreadsheet populated
  • Network diagram created (Packet Tracer / draw.io / paper)
  • Proxmox dashboard screenshot captured
  • Three reflection answers written
  • Report exported to PDF/Word and submitted

Weekly Deliverables

Every deliverable = a document + supporting screenshots in your docs folder.

Week 1: Topology diagram, Proxmox setup screenshots, documentation folder skeleton.
Week 2: Core services running proofs (DNS resolve, DHCP lease, IIS page, NGINX page), updated diagram with IPs.
Week 3: Security assessment, hardening evidence, backup scripts + schedules, monitoring outputs / IDS alerts.
Week 4: Final report, DR test results, live demo.

Expectations (graded)

  • Communicate as a team โ€” daily 10-minute standup, even if async in chat
  • Document everything โ€” if it's not written down, it doesn't exist
  • Screenshots for every configuration โ€” more is better than less
  • Test your services โ€” claims without proof lose points
  • Final presentation โ€” the environment actually works on the day

๐Ÿ“บ Learn โ€” Curated Video Searches

Each tile opens a YouTube search for that exact topic in a new tab. I'm using search links instead of hardcoded videos so you always get the most recent / highest-rated tutorials instead of dead links.

Tip: Filter YouTube results by Upload date โ†’ This year and sort by View count to find the most-watched recent tutorial.

Glossary โ€” the acronym swamp, drained

Proxmox VE
A free hypervisor. It runs multiple VMs on one physical server. You manage it via a web UI on port 8006.
Hypervisor
Software that hosts virtual machines. Type-1 (Proxmox, ESXi) runs on bare metal; Type-2 (VirtualBox) runs on top of an OS.
VM (Virtual Machine)
A software-emulated computer. Behaves like a separate PC but shares the host's CPU / RAM / disk.
vmbr*
A Linux bridge in Proxmox. Acts like a virtual network switch โ€” VMs plugged into the same bridge can talk.
DMZ
Demilitarized Zone. A network segment that holds anything exposed to the outside world. Designed to be expendable โ€” if it's popped, the attacker is still one firewall away from your crown jewels.
Private LAN
Internal-only network for AD, databases, file shares. Never directly reachable from the internet.
OPNsense
An open-source firewall/router (FreeBSD-based). Routes and filters traffic between your segments.
AD (Active Directory)
Microsoft's directory service. Stores users, groups, computers. Handles authentication for the domain.
DNS
Maps names (server.capstone.local) to IPs.
DHCP
Hands out IP addresses automatically to clients.
IIS
Internet Information Services โ€” Microsoft's web server.
NGINX
A popular open-source web server and reverse proxy.
MongoDB
A NoSQL document database.
NTFS permissions
File-level access control on Windows. Separate from share permissions โ€” both apply, most restrictive wins.
IDS / IPS
Intrusion Detection / Prevention. IDS alerts on suspicious traffic, IPS blocks it.
Snort / Suricata
Two common open-source IDS engines. Suricata is multi-threaded; Snort is older/classic.
Wazuh
Open-source SIEM / host monitoring platform. Agents report to a central server.
rsync
Linux tool that syncs files efficiently โ€” only changed blocks are copied. Great for backups.
cron
Linux scheduler. Lines like 0 2 * * * /path/script.sh run a script at 2am daily.
RTO / RPO
Recovery Time Objective (how fast you restore) and Recovery Point Objective (how much data you're willing to lose).
SIEM
Security Information and Event Management โ€” collects logs from everything and alerts on patterns.
GPO
Group Policy Object โ€” Windows-native way to enforce settings across many machines via AD.
VLAN
Virtual LAN. Tags frames so one physical switch can carry multiple isolated networks.
Jump box
A hardened intermediate server. You SSH/RDP here first, then hop to internal systems. Single audit chokepoint.