Skip to content

Commit

Permalink
Corrected Setting up an SSL/TLS certificate links
Browse files Browse the repository at this point in the history
  • Loading branch information
Alayn Sanchez Nuñez committed Feb 1, 2024
1 parent b990c72 commit f431f25
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 2 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
_site/
/vendor
.bundle/
.*-*/
2 changes: 1 addition & 1 deletion Installation/MasterServerInstallation.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ To learn more about the specific firewall rules you need to create for UTMStack,

## Step 6: Installing and Configuring an SSL/TLS certificate

Go to **<a href="./FirewallRules">Configuring an SSL/TLS certificate</a>** section for detailed instructions.
Go to **<a href="./SSLConfiguration">Configuring an SSL/TLS certificate</a>** section for detailed instructions.

## Step 7: Accessing the UTMStack Platform
Once you have successfully installed the UTMStack master server, you can now access the platform and start using it for your cybersecurity needs. Follow these steps to log in to the UTMStack platform:
Expand Down
2 changes: 1 addition & 1 deletion _site/Installation/MasterServerInstallation.html
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@
</code></pre></div></div> <h2 id="step-3-grant-execution-permissions"> <a href="#step-3-grant-execution-permissions" class="anchor-heading" aria-labelledby="step-3-grant-execution-permissions"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 3: Grant Execution Permissions </h2> <p>Change to the root user to ensure proper execution of the installer script:</p> <div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="nb">sudo </span>su
</code></pre></div></div> <p>Set execution permissions for the installer script using the following command:</p> <div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="nb">chmod</span> +x installer
</code></pre></div></div> <h2 id="step-4-run-the-installer"> <a href="#step-4-run-the-installer" class="anchor-heading" aria-labelledby="step-4-run-the-installer"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 4: Run the Installer </h2> <p>Now, you are ready to run the installer script and begin the installation process.</p> <p>Execute the installer without parameters:</p> <div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>./installer
</code></pre></div></div> <p>The installer script will take care of downloading the necessary packages.</p> <p>Please note that the installation process may take some time depending on the system and the options selected.</p> <p class="important">Trubleshooting: If you find any errors during the installation, please check the installation log for more details: /var/log/utm-setup.log</p> <p class="note">You can find the password and other generated configurations in /root/UTMStack.yml</p> <h2 id="step-5-configuration-of-utmstack"> <a href="#step-5-configuration-of-utmstack" class="anchor-heading" aria-labelledby="step-5-configuration-of-utmstack"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 5: Configuration of UTMStack </h2> <p>After successfully installing UTMStack on your servers, it is important to configure the necessary services to ensure proper functionality. This step involves setting up best-practice firewall rulesets to control network traffic effectively. Additionally, you have the option to integrate third-party applications like M365 to enhance UTMStack’s capabilities.</p> <p>To learn more about the specific firewall rules you need to create for UTMStack, please refer to the <strong><a href="./FirewallRules">Firewall Rules</a></strong> section for detailed instructions.</p> <h2 id="step-6--installing-and-configuring-an-ssltls-certificate"> <a href="#step-6--installing-and-configuring-an-ssltls-certificate" class="anchor-heading" aria-labelledby="step-6--installing-and-configuring-an-ssltls-certificate"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 6: Installing and Configuring an SSL/TLS certificate </h2> <p>Go to <strong><a href="./FirewallRules">Configuring an SSL/TLS certificate</a></strong> section for detailed instructions.</p> <h2 id="step-7-accessing-the-utmstack-platform"> <a href="#step-7-accessing-the-utmstack-platform" class="anchor-heading" aria-labelledby="step-7-accessing-the-utmstack-platform"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 7: Accessing the UTMStack Platform </h2> <p>Once you have successfully installed the UTMStack master server, you can now access the platform and start using it for your cybersecurity needs. Follow these steps to log in to the UTMStack platform:</p> <p>Open your preferred web browser.</p> <p>Enter the HTTPS URL of your server’s name or IP address in the browser’s address bar. For example, if your server’s IP address is 192.168.0.100, you would enter https://192.168.0.100.</p> <p>Press Enter to load the UTMStack login page.</p> <p><img title="UTMStack Installer Capture" alt="UTMStack Installer Capture" src="./Images/Images/../../../Images/UTMStacklogin.png" /></p> <p>Once UTMStack is installed, use admin as the user and the password generated during the installation for the default user to login. You can find the password and other generated configurations in /root/UTMStack.</p> <p class="note">Note: Use HTTPS in front of your server name or IP to access the login page.</p> <p>Click on the “Sign In” button to authenticate and access the UTMStack platform.</p> </div> </div> <div class="search-overlay"></div> </div> </body> </html>
</code></pre></div></div> <p>The installer script will take care of downloading the necessary packages.</p> <p>Please note that the installation process may take some time depending on the system and the options selected.</p> <p class="important">Trubleshooting: If you find any errors during the installation, please check the installation log for more details: /var/log/utm-setup.log</p> <p class="note">You can find the password and other generated configurations in /root/UTMStack.yml</p> <h2 id="step-5-configuration-of-utmstack"> <a href="#step-5-configuration-of-utmstack" class="anchor-heading" aria-labelledby="step-5-configuration-of-utmstack"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 5: Configuration of UTMStack </h2> <p>After successfully installing UTMStack on your servers, it is important to configure the necessary services to ensure proper functionality. This step involves setting up best-practice firewall rulesets to control network traffic effectively. Additionally, you have the option to integrate third-party applications like M365 to enhance UTMStack’s capabilities.</p> <p>To learn more about the specific firewall rules you need to create for UTMStack, please refer to the <strong><a href="./FirewallRules">Firewall Rules</a></strong> section for detailed instructions.</p> <h2 id="step-6--installing-and-configuring-an-ssltls-certificate"> <a href="#step-6--installing-and-configuring-an-ssltls-certificate" class="anchor-heading" aria-labelledby="step-6--installing-and-configuring-an-ssltls-certificate"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 6: Installing and Configuring an SSL/TLS certificate </h2> <p>Go to <strong><a href="./SSLConfiguration">Configuring an SSL/TLS certificate</a></strong> section for detailed instructions.</p> <h2 id="step-7-accessing-the-utmstack-platform"> <a href="#step-7-accessing-the-utmstack-platform" class="anchor-heading" aria-labelledby="step-7-accessing-the-utmstack-platform"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 7: Accessing the UTMStack Platform </h2> <p>Once you have successfully installed the UTMStack master server, you can now access the platform and start using it for your cybersecurity needs. Follow these steps to log in to the UTMStack platform:</p> <p>Open your preferred web browser.</p> <p>Enter the HTTPS URL of your server’s name or IP address in the browser’s address bar. For example, if your server’s IP address is 192.168.0.100, you would enter https://192.168.0.100.</p> <p>Press Enter to load the UTMStack login page.</p> <p><img title="UTMStack Installer Capture" alt="UTMStack Installer Capture" src="./Images/Images/../../../Images/UTMStacklogin.png" /></p> <p>Once UTMStack is installed, use admin as the user and the password generated during the installation for the default user to login. You can find the password and other generated configurations in /root/UTMStack.</p> <p class="note">Note: Use HTTPS in front of your server name or IP to access the login page.</p> <p>Click on the “Sign In” button to authenticate and access the UTMStack platform.</p> </div> </div> <div class="search-overlay"></div> </div> </body> </html>

0 comments on commit f431f25

Please sign in to comment.