diff --git a/.gitignore b/.gitignore index a936208..39ff614 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,4 @@ _site/ /vendor +.bundle/ .*-*/ \ No newline at end of file diff --git a/Installation/MasterServerInstallation.md b/Installation/MasterServerInstallation.md index 4743102..5b44514 100644 --- a/Installation/MasterServerInstallation.md +++ b/Installation/MasterServerInstallation.md @@ -79,7 +79,7 @@ To learn more about the specific firewall rules you need to create for UTMStack, ## Step 6: Installing and Configuring an SSL/TLS certificate -Go to **Configuring an SSL/TLS certificate** section for detailed instructions. +Go to **Configuring an SSL/TLS certificate** section for detailed instructions. ## Step 7: Accessing the UTMStack Platform Once you have successfully installed the UTMStack master server, you can now access the platform and start using it for your cybersecurity needs. Follow these steps to log in to the UTMStack platform: diff --git a/_site/Installation/MasterServerInstallation.html b/_site/Installation/MasterServerInstallation.html index 3474abc..337aaba 100644 --- a/_site/Installation/MasterServerInstallation.html +++ b/_site/Installation/MasterServerInstallation.html @@ -5,4 +5,4 @@
Change to the root user to ensure proper execution of the installer script:
sudo su
Set execution permissions for the installer script using the following command:
chmod +x installer
Now, you are ready to run the installer script and begin the installation process.
Execute the installer without parameters:
./installer
-
The installer script will take care of downloading the necessary packages.
Please note that the installation process may take some time depending on the system and the options selected.
Trubleshooting: If you find any errors during the installation, please check the installation log for more details: /var/log/utm-setup.log
You can find the password and other generated configurations in /root/UTMStack.yml
After successfully installing UTMStack on your servers, it is important to configure the necessary services to ensure proper functionality. This step involves setting up best-practice firewall rulesets to control network traffic effectively. Additionally, you have the option to integrate third-party applications like M365 to enhance UTMStack’s capabilities.
To learn more about the specific firewall rules you need to create for UTMStack, please refer to the Firewall Rules section for detailed instructions.
Go to Configuring an SSL/TLS certificate section for detailed instructions.
Once you have successfully installed the UTMStack master server, you can now access the platform and start using it for your cybersecurity needs. Follow these steps to log in to the UTMStack platform:
Open your preferred web browser.
Enter the HTTPS URL of your server’s name or IP address in the browser’s address bar. For example, if your server’s IP address is 192.168.0.100, you would enter https://192.168.0.100.
Press Enter to load the UTMStack login page.
Once UTMStack is installed, use admin as the user and the password generated during the installation for the default user to login. You can find the password and other generated configurations in /root/UTMStack.
Note: Use HTTPS in front of your server name or IP to access the login page.
Click on the “Sign In” button to authenticate and access the UTMStack platform.