OPS705 Lab 6 (2211)
- 1 LAB PREPARATION
- 2 INVESTIGATION 1: Setting Up An IIS Web Server
- 3 INVESTIGATION 2: Routing Through Your Linux Server
- 4 Lab Submission
Purpose / Objectives of Lab 6
In this lab, you will set up an IIS web server on your Windows Server VM, and learn how to set up port forwarding through your Linux Server VM to allow access to the IIS web server on the Internet.
If you encounter technical issues, please contact your professor via e-mail or in your section's Microsoft Teams group.
Before beginning, you must have:
- Successfully completed Lab 5
- Watched the Week 6 video lecture
- Read through the Week 6 slides, and have them handy as a reference for concepts
- Your Azure-based Linux VM
- Your Azure-based Windows VM
INVESTIGATION 1: Setting Up An IIS Web Server
Setting up an Internet Information Services web server on an Azure VM is incredibly easy, especially in contrast to Lab 4's Apache setup.
Part 1: Installing IIS
- Spin up your Windows Server VM, and wait until it's fully started up.
- In the Azure blade for your Windows Server VM, click on the Manage artifacts item in the menu bar to the left.
- In this new window, click on the Apply artifacts button. This will bring you to the Add artifacts screen.
- In the Add artifacts search field, type IIS.
- Click on Internet Information Services (IIS) in the results listing, then click Add in the next window.
- You'll be returned to the Add artifacts window. Simply click OK.
- The Manage Artifacts window will return, and a new entry for Internet Information Services (IIS) will appear. Its status will cycle through Pending, Installing, and finally Succeeded.
- Remotely connect to your Windows Server, open a browser in the VM, and navigate to
http://localhost. You should see the IIS default splash page. Congratulations!
Part 2: Editing Your IIS Website
- Connect to your VM remotely.
- In a new file explorer window, find the View menu item near the top, and click File name extensions.
- Open Server Manager and click on the Local Server menu bar option.
- Towards the top of the window, click Tools > Internet Information Services (IIS) Manager
- In the new window in the Connections menu column on the left, expand the Sites folder and click on Default Web Site.
- In the Actions menu column on the right, click Explore. This will open a new folder where your IIS web pages are stored.
- Right-click anywhere in that window, click New > Text Document. Name it index.html.
- Open the text file, and write the same HTML code as Lab 4, changing the title tag to OPS705 IIS Web Server - Winter 2021.
- Refresh your browser page from Part 1. You should see your new code.
- On your host computer, open a browser and navigate to the URL you used to remotely connect to your Windows Server VM. Unlike the Linux Server in Lab 5, the web page you created does not appear. We still have some work to do.
INVESTIGATION 2: Routing Through Your Linux Server
In this investigation, you'll set up your Linux Server VM to forward requests to your Windows VM's IIS web server. This is an advanced topic. Reviewing the Week 5 and Week 6 material is highly recommended. The following investigation assumes you understand the concepts discussed in those lectures.
Part 1: Setting Up Your Firewall
- Remote SSH into your Linux Server VM.
- Replace firewalld with iptables: Lab 4 instructions
- Secure your firewall: Lab 4 instructions
Part 2: Enabling Forwarding on Your Linux Server
- Remote SSH into your Linux Server VM.
- Elevate to root.
- Use vim to open /etc/sysctl.conf
- Add the line:
net.ipv4.ip_forward = 1Make sure it's a new line, and that it doesn't start with a # symbol.
- Save and quit vim.
- At the command prompt, run:
- Confirm you've properly enabled system-level forwarding with the following command:
- The response from the command above should say net.ipv4.ip_forward = 1. If not, revisit the steps in Part 2.
Part 3: Port Forwarding Using NAT
- Remote into your Windows Server VM, open Command Prompt, and run
ipconfigWrite down the 10.x.x.x IP address displayed.
- Remote SSH into your Linux Server VM, and elevate to root.
- Confirm you can access the web server on your Windows VM by running:
curl IP-address-from-step-1If you see plain HTML code displayed, move to the next step.
- We're going to be working with the NAT table. Let's look at the NAT rules listing with the following command:
iptables -t nat -nvL --line
- Set up a port forwarding rule so all requests to your Linux VM on port 8080 get sent to your Windows VM on port 80. Run the following:
iptables -t nat -A PREROUTING -p tcp --dport 8080 -j DNAT --to-destination windows-server-ip-from-step-1:80
- Set up NAT for all forwarded traffic:
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
- Confirm your new NAT table rules with the command from Step 4.
Part 4: Adding Forwarding Firewall Rule Exceptions
- Create a firewall rule to allow forwarded traffic destined for TCP port 80:
iptables -A FORWARD -p tcp --dport 80 -j ACCEPT
- Create a firewall rule to allow forwarded traffic sent from TCP port 80:
iptables -A FORWARD -p tcp --sport 80 -j ACCEPT
- Watch your firewall rules and their packet counters with the following command:
watch iptables -nvL --line
- In a browser on your own computer, paste the URL for your Linux VM, adding :8080 to the end of the address, then hit Enter.
- If you've done your work right, the Windows IIS web page should appear!
- Review the packet count from your watch command in Step 3. Notice the new forward rules are working! Keep this in mind for troubleshooting.
- In your SSH session, use the keyboard combination Ctrl and c to halt the watch program.
- Now that you know your new rules work, save your new rules
Submit to Blackboard full-desktop screenshots (PNG/JPG) of the following:
- Browser window showing the Windows IIS page (on your computer, not displayed on your VM).
- SSH session window with your iptables rules listed. (Both normal and NAT rules)
Your professor will review your page directly; the screenshots are a backup in case of catastrophic issues.
Your professor will not check your lab until the screenshots have been submitted.
Make sure to shut down your virtual machines when you're done!