Anda di halaman 1dari 27

Configurar Servidor

Ubuntu
Actualizar Servidor
>> sudo apt-get update && sudo apt-get upgrade -y

OPenSSH
Instalar OpenSSH-Server para administracin con Putty y SFTP:
>> sudo apt-get install openssh-server

Configurar OpenSSH
>> sudo nano /etc/ssh/sshd_config

VirtualBox
OS : Ubuntu 14.04 LTS Server (No GUI)
IP Address : 10.1.1.5/24

Preparing Ubuntu 14.04 LTS server

Actualizar Servidor:
>> sudo apt-get update && sudo apt-get upgrade -y

Instalar componenten necesarios:


>> sudo apt-get install build-essential dkms unzip -y

Reboot your server once to take effect all the changes.

Installing VirtualBox
Edit /etc/apt/sources.list file:
>> sudo nano /etc/apt/sources.list

Add the latest oracle virtualbox repository to your Ubuntu server. You can
download the oracle virtualbox latest repository from here.
[...]
deb http://download.virtualbox.org/virtualbox/debian trusty contrib

Add the virtualbox public key:


>> wget -q http://download.virtualbox.org/virtualbox/debian/oracle_vbox.asc
-O- | sudo apt-key add -

Now, update the repository and install latest oracle virtualbox version.

>> sudo apt-get update


>> sudo apt-get install VirtualBox-4.3 -y

After installing virtualbox, add the system user sk to the vboxusers group. sk is
the system normal user that I have created already. You can create and use a
separate new user as your wish. If you use different user, log out and log in
back to that user and do the rest of the steps.
>> sudo usermod -aG vboxusers manager

Now, run the following command to check if virtualbox kernel modules are
loaded or not.
>> sudo /etc/init.d/vboxdrv status
Sample output:
VirtualBox kernel modules (vboxdrv, vboxnetflt, vboxnetadp, vboxpci) are
loaded.

If it, not loaded, run the following command to load them:


>> sudo /etc/init.d/vboxdrv setup

Install Oracle VirtualBox Extension pack


Starting with VirtualBox 4.0, we should install Extension pack that will help us
to manage and connect our remote guest consoles via web interface. This
Extension pack provides the following functionalities to the VirtualBox guests.
The virtual USB 2.0 (EHCI) device
VirtualBox Remote Desktop Protocol (VRDP) support
Host webcam passthrough
Intel PXE boot ROM
Experimental support for PCI passthrough on Linux hosts

VirtualBox extension pack should be same version as VirtualBox base package.


Download Extension pack for VirtualBox 4.3 from here.
>> wget
http://download.virtualbox.org/virtualbox/4.3.12/Oracle_VM_VirtualBox_Extensio
n_Pack-4.3.12-93733.vbox-extpack
>> wget
http://download.virtualbox.org/virtualbox/4.3.22/Oracle_VM_VirtualBox_Extensio
n_Pack-4.3.22-98236.vbox-extpack

Then, Install Extension pack as shown below.


>> sudo VBoxManage extpack install Oracle_VM_VirtualBox_Extension_Pack4.3.12-93733.vbox-extpack
>> sudo VBoxManage extpack install Oracle_VM_VirtualBox_Extension_Pack4.3.22-98236.vbox-extpack

Thats it Oracle VirtualBox and Extension pack have been installed successfully
on our Ubuntu 14.04 LTS server. Start using Oracle VirtualBox! For creating and
managing virtual machines from the command line, refer the official manual.
http://www.virtualbox.org/manual/ch08.html

Install Apache

Apache is an open-source multi-platform web server. It provides a full range of


web server features including CGI, SSL and virtual domains.

To install Apache, enter the following command from your terminal:

sudo apt-get install apache2

Test Apache:

Open your web browser and navigate to http://localhost/ or http://server-ipaddress/.

Install PHP

PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely used


open-source general purpose scripting language that is especially suited for
web development and can be embedded into HTML.

Install PHP with following command:

sudo apt-get install php5 libapache2-mod-php5

To test PHP, create a sample testphp.php file in Apache document root folder.

sudo nano /var/www/html/testphp.php

Add the following lines.

<?php
phpinfo();
?>

Restart apache2 service:

sudo service apache2 restart

Navigate to http://server-ip-address/testphp.php. It will display all the details


about php such as version, build date and commands etc.

Install phpVirtualBox

Before installing phpVirtualBox, we have to install Apache web server and PHP.
To install Apache, PHP refer the following link.

Install LAMP Server On Ubuntu 14.04 LTS


Lo primero que vamos a hacer es crear un usuario para el producto. Creamos
un usuario llamado vbox y lo aadimos al grupo vboxusers:
sudo useradd -m vbox -G vboxusers

Creemos una contrasea para dicho usuario:


sudo passwd vbox

v4lm3x

Ahora creamos el fichero /etc/default/virtualbox y le agregamos la siguiente


linea VBOXWEB_USER=vbox (des esta forma la API SOAP de VirtualBox usada
por el proceso vboxwebsrv se ejecuta como el usuario vbox):
>> sudo nano /etc/default/virtualbox
VBOXWEB_USER=vbox

Additionally, install php-soap extension which is required by phpVirtualBox to


work well.

sudo apt-get install php-soap

Restart the web server to take effect the changes.

sudo /etc/init.d/apache2 restart

Now, Download the latest version from the phpVirtualBox official site.

wget http://sourceforge.net/projects/phpvirtualbox/files/phpvirtualbox-4.3-2.zip

Extract the zip file using the following command:

unzip phpvirtualbox-4.3-2.zip

Move the extracted folder to your apache root folder.

sudo mv phpvirtualbox-4.3-2 /var/www/html/phpvirtualbox

Configure phpVirtualBox

Edit phpVirtualBox config.php file:

sudo cp /var/www/html/phpvirtualbox/config.php-example
/var/www/html/phpvirtualbox/config.php
sudo nano /var/www/html/phpvirtualbox/config.php

Change the username/password for system user that runs VirtualBox. In our
case, the username/password is sk/ubuntu.

[...]
var $username = 'vbox';
var $password = 'v4lm3x';
[...]

Save and close the file.

Create a file called /etc/default/virtualbox:

sudo nano /etc/default/virtualbox

Append the following line:

VBOXWEB_USER=sk

Now, start vboxweb-service, and make it to start automatically on every reboot.

sudo /etc/init.d/vboxweb-service start

Access phpVirtualBox Web console

Now, go to any client systems that has installed with GUI desktop
environements, and try to access the URL http://ip-address-of-virtualboxheadless-server/phpvirtualbox from the web browser.

Now, try again the same URL mentioned above. The following screen should
appear. Enter the username/password.

The default username/password is admin/admin.

Activar SSL en Apache2 (Ubuntu


10.04)

julio 21, 2010

Queriendo hacer pruebas de conexiones SSL?

Aqui va el mtodo rpido para habilitarlo en Apache2

# Instalamos Apache
sudo aptitude install apache2

# Habilitamos el mdulo SSL


sudo a2enmod ssl

# Habilitamos la configuracin SSL por default

sudo a2ensite default-ssl

# Reiniciamos el servidor
sudo /etc/init.d/apache2 restart

Ya con esto queda habilitado, puedes probarlo entrando al localhost con


https://127.0.0.1
Para crear nuestro certificado, debemos seguir los siguientes pasos

# Creamos las llaves

cd /etc/apache2

sudo openssl genrsa -des3 -out server.key 1024

# Creamos el certificado con la llave

sudo openssl req -new -key server.key -out server.csr

# Creamos nuestro certificado, contestando las preguntas que nos indique


recordando la contrasea

sudo openssl x509 -req -days 365 -in server.csr -signkey server.key -out
server.crt

#Cambiamos de carpeta la llave y certificado

sudo cp server.crt /etc/ssl/certs/


sudo cp server.key /etc/ssl/private/

# Abrimos el archivo de configuracion default-ssl

cd /etc/apache2/sites-available
sudo vim default-ssl

# reemplazamos y habilitamos la siguiente configuracion


SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
SSLCertificateFile /etc/ssl/certs/server.crt
SSLCertificateKeyFile /etc/ssl/private/server.key

# habilitamos el archivo

sudo a2ensite default-ssl

# Reiniciamos apache y listo!!


sudo /etc/init.d/apache2 restart

PHPSysinfo
Phpsysinfo: es una herramienta web, que permite ver el estado de nuestros
servidores web en tiempo real, nos permite monitorear: procesos, estado y
espacio en disco, estado de la memoria, cache, procesador, tarjetas de red,
etc... La instalacin en ubuntu es muy fcil, solo tenemos que escribir en una
terminal:
sudo apt-get install phpsysinfo

Si tienen problemas y no pueden visualizar despus de instalar, ejecuten en


una terminal:
ln -s /usr/share/phpsysinfo /var/www/

Configurar en:
>> sudo nano /etc/phpsysinfo/config.php
Nota: la ruta final, puede cambiar dependiendo de la configuracin de tu
servidor. Para instalar la ultima versin o instalarlo en otro sistema,
descargamos el paquete de la siguiente direccin:

http://phpsysinfo.sourceforge.net/

Despus de descargar el paquete lo descomprimimos en nuestr servidor web, y


accedemos a el desde un navegador, de la siguiente manera:

http://tu_servidor/phpsysinfo

Screenshot Demo http://phpsysinfo.sourceforge.net/phpsysinfo/index.php

Antivirus CLAMAV
1. Install clamav and clamav-daemon. Clamav daemon is for automated use.

ehowstuff@ubuntu14:~$ sudo apt-get install clamav clamav-daemon -y

2. Update the clamav pattern file :

ehowstuff@ubuntu14:~$ sudo freshclam

3. Check files in the all users home directories:

ehowstuff@ubuntu14:~$ sudo clamscan -r /home


[sudo] password for ehowstuff:
/home/ehowstuff/v3.1.12.zip: OK
/home/ehowstuff/.mysql_history: OK
/home/ehowstuff/.bash_logout: OK
/home/ehowstuff/.bash_history: OK
/home/ehowstuff/.profile: OK
/home/ehowstuff/.bashrc: OK
/home/ehowstuff/.cache/motd.legal-displayed: Empty file
/home/ehowstuff/.viminfo: OK
/home/ehowstuff/jcameron-key.asc: OK
/home/ehowstuff/.rnd: OK
/home/ehowstuff/index.html: OK
/home/ehowstuff/.ssh/known_hosts: OK

----------- SCAN SUMMARY ----------Known viruses: 3383485

Engine version: 0.98.1


Scanned directories: 4
Scanned files: 11
Infected files: 0
Data scanned: 4.66 MB
Data read: 1.04 MB (ratio 4.47:1)
Time: 20.139 sec (0 m 20 s)
ehowstuff@ubuntu14:~$

4. Download test virus :

ehowstuff@ubuntu14:~$ wget http://www.eicar.org/download/eicar.com


--2014-05-24 15:05:13-- http://www.eicar.org/download/eicar.com
Resolving www.eicar.org (www.eicar.org)... 188.40.238.250
Connecting to www.eicar.org (www.eicar.org)|188.40.238.250|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 68 [application/octet-stream]
Saving to: eicar.com

100%
[===============================================
===========>] 68
--.-K/s in 0s

2014-05-24 15:05:13 (8.12 MB/s) - eicar.com saved [68/68]

5. Check again the directory should contain the downloaded test virus :

ehowstuff@ubuntu14:~$ sudo clamscan -r /home


/home/ehowstuff/v3.1.12.zip: OK
/home/ehowstuff/.mysql_history: OK

/home/ehowstuff/.bash_logout: OK
/home/ehowstuff/.bash_history: OK
/home/ehowstuff/.profile: OK
/home/ehowstuff/.bashrc: OK
/home/ehowstuff/.cache/motd.legal-displayed: Empty file
/home/ehowstuff/.viminfo: OK
/home/ehowstuff/jcameron-key.asc: OK
/home/ehowstuff/.rnd: OK
/home/ehowstuff/index.html: OK
/home/ehowstuff/.ssh/known_hosts: OK
/home/ehowstuff/eicar.com: Eicar-Test-Signature FOUND

----------- SCAN SUMMARY ----------Known viruses: 3383485


Engine version: 0.98.1
Scanned directories: 4
Scanned files: 12
Infected files: 1
Data scanned: 4.66 MB
Data read: 1.04 MB (ratio 4.47:1)
Time: 19.874 sec (0 m 19 s)

6. Scan and remove virus files :

ehowstuff@ubuntu14:~$ sudo clamscan --infected --remove --recursive /home


/home/ehowstuff/eicar.com: Eicar-Test-Signature FOUND
/home/ehowstuff/eicar.com: Removed.

----------- SCAN SUMMARY ----------Known viruses: 3383485

Engine version: 0.98.1


Scanned directories: 4
Scanned files: 12
Infected files: 1
Data scanned: 4.66 MB
Data read: 1.04 MB (ratio 4.47:1)
Time: 20.930 sec (0 m 20 s)

7. Scan again home directory. The downloaded virus file should be remove
now :

ehowstuff@ubuntu14:~$ sudo clamscan -r /home


/home/ehowstuff/v3.1.12.zip: OK
/home/ehowstuff/.mysql_history: OK
/home/ehowstuff/.bash_logout: OK
/home/ehowstuff/.bash_history: OK
/home/ehowstuff/.profile: OK
/home/ehowstuff/.bashrc: OK
/home/ehowstuff/.cache/motd.legal-displayed: Empty file
/home/ehowstuff/.viminfo: OK
/home/ehowstuff/jcameron-key.asc: OK
/home/ehowstuff/.rnd: OK
/home/ehowstuff/index.html: OK
/home/ehowstuff/.ssh/known_hosts: OK

----------- SCAN SUMMARY ----------Known viruses: 3383485


Engine version: 0.98.1
Scanned directories: 4
Scanned files: 11

Infected files: 0
Data scanned: 4.66 MB
Data read: 1.04 MB (ratio 4.47:1)
Time: 20.151 sec (0 m 20 s)

8. Start clamav-daemon (clamd):

ehowstuff@ubuntu14:~$ sudo /etc/init.d/clamav-daemon start


* Starting ClamAV daemon clamd

[ OK ]

9. Check clamd status :

ehowstuff@ubuntu14:~$ sudo /etc/init.d/clamav-daemon status


* clamd is running

10. Start and check the status of clamav-freshclam :

ehowstuff@ubuntu14:~$ sudo /etc/init.d/clamav-freshclam start


* Starting ClamAV virus database updater freshclam
[ OK ]

ehowstuff@ubuntu14:~$ sudo /etc/init.d/clamav-freshclam status


* freshclam is running

11. Verify ClamAV version number :

ehowstuff@ubuntu14:~$ sudo clamdscan -V


ClamAV 0.98.1/19025/Sat May 24 10:04:32 2014

12. See more option for clamscan by issue sudo clamscan help command:

ehowstuff@ubuntu14:~$ sudo clamscan --help

Clam AntiVirus Scanner 0.98.1


By The ClamAV Team: http://www.clamav.net/team
(C) 2007-2009 Sourcefire, Inc.

--help
--version

-h

Print this help screen

-V

--verbose

Print version number

-v

--archive-verbose

Be verbose
-a

Show filenames inside scanned archives

--debug

Enable libclamav's debug messages

--quiet

Only output error messages

--stdout

Write to stdout instead of stderr

--no-summary
--infected

Disable summary at end of scanning


-i

Only print infected files

--suppress-ok-results -o
--bell

Skip printing OK files


Sound bell on virus detection

--tempdir=DIRECTORY

Create temporary files in DIRECTORY

--leave-temps[=yes/no(*)]

Do not remove temporary files

--database=FILE/DIR -d FILE/DIR

Load virus database from FILE or load

all supported db files from DIR


--official-db-only[=yes/no(*)]
--log=FILE

-l FILE

--recursive[=yes/no(*)] -r
--allmatch[=yes/no(*)] -z
match
--cross-fs[=yes(*)/no]

Only load official signatures


Save scan report to FILE
Scan subdirectories recursively
Continue scanning within file after finding a
Scan files and directories on other filesystems

--follow-dir-symlinks[=0/1(*)/2]
direct, 2 = always)

Follow directory symlinks (0 = never, 1 =

--follow-file-symlinks[=0/1(*)/2]
2 = always)

Follow file symlinks (0 = never, 1 = direct,

--file-list=FILE

-f FILE

Scan files from FILE

--remove[=yes/no(*)]

Remove infected files. Be careful!

--move=DIRECTORY

Move infected files into DIRECTORY

--copy=DIRECTORY

Copy infected files into DIRECTORY

--exclude=REGEX

Don't scan file names matching REGEX

--exclude-dir=REGEX
--include=REGEX

Don't scan directories matching REGEX


Only scan file names matching REGEX

--include-dir=REGEX

Only scan directories matching REGEX

--bytecode[=yes(*)/no]

Load bytecode from the database

--bytecode-unsigned[=yes/no(*)]
--bytecode-timeout=N

Load unsigned bytecode


Set bytecode timeout (in milliseconds)

--bytecode-statistics[=yes/no(*)]
--detect-pua[=yes/no(*)]

Collect and print bytecode statistics


Detect Possibly Unwanted Applications

--exclude-pua=CAT

Skip PUA sigs of category CAT

--include-pua=CAT

Load PUA sigs of category CAT

--detect-structured[=yes/no(*)]

Detect structured data (SSN, Credit Card)

--structured-ssn-format=X

SSN format (0=normal,1=stripped,2=both)

--structured-ssn-count=N

Min SSN count to generate a detect

--structured-cc-count=N

Min CC count to generate a detect

--scan-mail[=yes(*)/no]
--phishing-sigs[=yes(*)/no]
--phishing-scan-urls[=yes(*)/no]

Scan mail files


Signature-based phishing detection
URL-based phishing detection

--heuristic-scan-precedence[=yes/no(*)] Stop scanning as soon as a heuristic


match is found
--phishing-ssl[=yes/no(*)]
(phishing module)

Always block SSL mismatches in URLs

--phishing-cloak[=yes/no(*)]
module)

Always block cloaked URLs (phishing

--algorithmic-detection[=yes(*)/no] Algorithmic detection


--scan-pe[=yes(*)/no]

Scan PE files

--scan-elf[=yes(*)/no]

Scan ELF files

--scan-ole2[=yes(*)/no]

Scan OLE2 containers

--scan-pdf[=yes(*)/no]

Scan PDF files

--scan-swf[=yes(*)/no]

Scan SWF files

--scan-html[=yes(*)/no]

Scan HTML files

--scan-archive[=yes(*)/no]

Scan archive files (supported by libclamav)

--detect-broken[=yes/no(*)]

Try to detect broken executable files

--block-encrypted[=yes/no(*)]
--nocerts
in PE files
--dumpcerts

--max-filesize=#n
assumed clean
--max-scansize=#n
each container file (**)
--max-files=#n
container file (**)
--max-recursion=#n
container file (**)
--max-dir-recursion=#n
--max-embeddedpe=#n

Block encrypted archives

Disable authenticode certificate chain verification


Dump authenticode certificate chain in PE files

Files larger than this will be skipped and


The maximum amount of data to scan for
The maximum number of files to scan for each
Maximum archive recursion level for
Maximum directory recursion level
Maximum size file to check for embedded

PE
--max-htmlnormalize=#n
--max-htmlnotags=#n
scan
--max-scriptnormalize=#n
--max-ziptypercg=#n

Maximum size of HTML file to normalize


Maximum size of normalized HTML file to
Maximum size of script file to normalize
Maximum size zip to type reanalyze

(*) Default scan settings


(**) Certain files (e.g. documents, archives, etc.) may in turn contain other
files inside. The above options ensure safe processing of this kind of data.

Done!!

Configurar IP en Ubuntu

Podemos tener la IP configurada de dos formas, por DHCP (Dynamic Host


Configuration Protocol), lo que significa que nuestro router nos asignar una IP
automticamente junto al resto de configuracin, y no tiene porque ser
siempre la misma, y la otra opcin es configurar una IP esttica de forma que
sea siempre la misma. Esto es til si se tiene un servidor o algn ordenador de
la red interna con puertos redireccionados, y no nos interesa que el router
cambie la IP de la noche a la maana, y los puertos ahora estn
redireccionados a otro ordenador.
Voy a explicar como configurar la IP desde el terminal de texto, de ese modo
esto puede ser aplicado a cualquier distribucin, incluidas las que no poseen
interfaz grfico.

El archivo de configuracin de la IP se encuentra en: /etc/network/interfaces

Para editar el fichero abrimos un terminal de texto y editamos el fichero con


cualquier editor de textos, por ejemplo nano:

sudo nano /etc/network/interfaces

Dentro encontraremos dos lineas minimo iguales a estas:

auto lo
iface lo inet loopback

Esas dos lineas no debemos modificaras, son las correspondientes al localhost.

Los parmetros de configuracin que podemos aadir son los siguientes:

Para una configuracin mediante DHCP:

auto ethX
iface ethX inet dhcp

Donde ethX hay que sustituir la X por el numero de la tarjeta de red que se
quiera configurar, por ejemplo, eth0, o eth1...

Configuracin estatica:

auto lo
iface lo inet loopback

auto ethX
iface ethX inet static
address 192.168.0.2
netmask 255.255.255.0
network 192.168.1.0
broadcast 192.168.1.255
gateway 192.168.1.1

De la misma forma que antes, la X de ethX hay que sustituirla por el numero de
la tarjeta de red en cuestin que se quiera configurar.

Las opciones son:

auto: auto seguido de la tarjeta de red hace que la tarjeta arranque


automticamente al iniciar el ordenador.
iface: sirve para especificar si la configuracin IP la recibir mediante DHCP
o a travs de la configuracin local.
address: aqu se pone la IP que tendr el ordenador.
netmask: aqu se especifica la mascara de red.
network: en este campo se pone la direccin IP de la red.
broadcast: en este otro campo la direccin IP del broadcast.
gateway: la direccin de la puerta de enlace.

Reiniciar las tarjetas de red:

Despues de cualquier cambio que se realice hay que reiniciar las tarjetas de
red, para ello se pueden utilizar estos comandos:

Reiniciar todas las tarjetas de red:

sudo /etc/init.d/networking restart

Nota: con este comando reiniciaramos todas las tarjetas de red del ordenador.
Puede sustituirse la palabra restart, por stop o start para pararlas e iniciarlas.

Otra forma de reiniciar las tarjetas de red, es reiniciar concretamente una:


Este comando para parar la tarjeta de red:

sudo ifdown ethX

Y este para iniciarla:

sudo ifup ehtX

Por ejemplo para reiniciar la tarjeta de red eth0 sera primero ifdown eth0, y
luego ifup eth0.

Ver la configuracin:

Por ultimo, para ver la configuracin de red que tenemos, escribimos el


siguiente comando en el terminal:

ifconfig

Nota: si se configura una IP estatica en una red con DHCP, es aconsejable


configurar el DHCP para que de solo dinmicamente desde la IP .5 hasta la
ultima por ejemplo, de esa forma desde la .2 hasta la .5 no las asignar a
nadie, y podremos utilizarlas como estticas con la seguridad de que el DHCP

no va a dar nuestra IP a nadie mas evitando que se duplique y hayan


conflictos.

Zentyal
The preferred way to install Zentyal on a new machine from scratch is using our
tailored CD installer. This CD contains Zentyal and all its dependencies. The 4.0
version is based on Ubuntu Server 14.04 and is available at:

- http://www.zentyal.org/server/

Note: If you want to define the partition layout manually or you need to specify
a proxy to get Internet access, make sure you install using the "expert mode".

Once the installation process is done, you can access the web interface using a
web browser (usually from another machine in the same network):

https://<zentyal-ip-address>:8443/

To log in, a user name and password is asked, this data is asked during the first
stage of the installation. But any other user belonging to the "sudo" group
could be used to log in as well.

Note: The installers are generated from time to time, so maybe some packages
contained on them are outdated. If you have Internet connection during the
installation, the latest version of the packages will be installed from our
repositories.

For a complete step-by-step installation guide, please refer to


http://doc.zentyal.org
Zentyal 4.0 packages

You can also install Zentyal as a "package set" to an already installed version of
Ubuntu. This was developed and tested with Ubuntu version 14.04.

For Ubuntu 14.04 (Trusty). You should install the server edition of Ubuntu.

Add to your /etc/apt/sources.list:

deb http://archive.zentyal.org/zentyal 4.0 main

In order to authenticate the packages in the PPA and Zentyal repository you
can import its public key with the following command:

sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 10E239FF


wget -q http://keys.zentyal.org/zentyal-4.0-archive.asc -O- | sudo apt-key add -

Read the Zentyal_4.0_Announcement for more info.


Installing packages

Zentyal has a modular design that allows you to install or remove modules
depending on your needs.

After editing your sources.list, make sure that your package database is up to
date by running the following command:

sudo apt-get update

After that, you just need to run:

sudo apt-get install zentyal

And then point your browser to the Zentyal IP address and follow the
instructions on screen:

https://<zentyal-ip-address>/

If you want to install the full graphical environment you can install zenbuntudesktop instead of just zentyal:

sudo apt-get install zenbuntu-desktop

After installing zenbuntu-desktop your Ubuntu will be in almost the same state
as if you were used the the official Zentyal Installer, you just need to reboot
your server (simulating the finish of the first stage of the installation) and on
the next boot the Zentyal core packages will be installed and you will be able to
continue the installation from the desktop environment.

You can also use the command line to install the packages.

Example:

sudo apt-get install zentyal-samba

You can also install all the Zentyal packages:

sudo apt-get install zentyal-all

Previous Releases Installer Images

- All files (current and previous releases).

Anda mungkin juga menyukai