Setup VoIP Phone System at Home or Office in 4 EASY STEPS | FreePBX and Zoiper Guide

Setting up a VoIP (Voice over Internet Protocol) phone system at home or in an office with FreePBX involves several steps. FreePBX is an open-source PBX (Private Branch Exchange) software that can be used to manage and control VoIP phone calls. Here is a basic guide to help you set up a VoIP phone system using FreePBX:

1. Requirements:

  • A computer or server to host FreePBX (can be a physical machine or a virtual server).
  • A reliable internet connection with sufficient bandwidth for VoIP calls.
  • IP phones or softphones for users to make and receive calls.
  • VoIP service provider for external call routing.

2. Install FreePBX:

  • Download the FreePBX ISO from the official website: https://www.freepbx.org/downloads/
  • Install FreePBX on your chosen hardware or virtual machine following the installation instructions provided on the website.

3. Access FreePBX Web Interface:

  • Once the installation is complete, access the FreePBX web interface using a web browser. The default login credentials are usually:
    • Username: admin
    • Password: admin

4. Configure System Admin Module:

  • In the FreePBX web interface, go to the “Admin” menu and select “System Admin.”
  • Set the time zone, hostname, and other necessary system settings.

5. Configure Extensions:

  • Extensions represent individual phone lines or users in the FreePBX system.
  • Navigate to the “Applications” menu and select “Extensions.” Add extensions for each user or device, specifying the type of device (SIP phone, softphone, etc.).

6. Set Up Trunks:

  • Trunks are used to connect FreePBX to external VoIP providers for making and receiving calls.
  • In the FreePBX web interface, go to the “Connectivity” menu and select “Trunks.” Configure trunks with the details provided by your VoIP service provider.

7. Create Inbound and Outbound Routes:

  • Inbound routes determine how incoming calls are handled, and outbound routes determine the path for outgoing calls.
  • Navigate to the “Connectivity” menu and select “Inbound Routes” and “Outbound Routes.” Configure routes based on your requirements.

8. Set Up IVR (Interactive Voice Response):

  • If needed, create an IVR to provide callers with menu options for call routing.
  • In the FreePBX web interface, go to the “Applications” menu and select “IVR.”

9. Configure Voicemail:

  • Set up voicemail boxes for users who need voicemail services.
  • In the FreePBX web interface, go to the “Applications” menu and select “Voicemail.”

10. Test the System:

  • Once everything is configured, test the system by making internal and external calls to ensure that the setup is working as expected.

11. Security Considerations:

  • Implement security measures such as firewall rules, strong passwords, and regular system updates to protect your VoIP system.

Remember to consult the documentation provided by FreePBX and your VoIP service provider for specific configuration details and troubleshooting tips. Additionally, configuring a VoIP system may require a good understanding of networking concepts and VoIP protocols, so be prepared to address any technical challenges that may arise.

FortiGate Radius Configuration

Hello everyone , in this video I am going to integrate fortigate firewall with radius server , after that fortigate administrators can login and manage fortigate by using their active directory username and password.

Step 1: Log into FortiGate

Access your FortiGate device through a web browser or SSH client.

Step 2: Navigate to System Settings

  1. Go to System > Settings in the FortiGate web interface.

Step 3: Configure RADIUS Server

  1. Under Authentication Settings, click Create New to add a RADIUS server.
  2. Fill in the following details:
    • Name: A descriptive name for the RADIUS server.
    • Server: Enter the IP address or hostname of your RADIUS server.
    • Secret: This is a shared secret key that must match the one configured on the RADIUS server for authentication. It ensures secure communication between FortiGate and the RADIUS server.
    • Authentication Port: Usually set to 1812 for RADIUS authentication.
    • Accounting Port: Typically set to 1813 for RADIUS accounting, if needed.
  3. Click OK to save the RADIUS server configuration.

Step 4: Define a RADIUS Server Group

  1. Under Authentication Settings, click Create New to add a RADIUS server group.
  2. Give the group a descriptive name to identify it later.
  3. Add the previously configured RADIUS server(s) to the group. You can use multiple RADIUS servers for redundancy and load balancing.
    • Select the RADIUS servers from the list and use the right arrow button to move them to the “Selected” column.
  4. Click OK to save the RADIUS server group.

Step 5: Configure User Groups for RADIUS Authentication

  1. If you want to use RADIUS for user authentication, navigate to User & Device > User Groups.
  2. Edit an existing user group or create a new one based on your needs.
  3. In the user group settings, go to the Remote Groups section and select the RADIUS server group you created in Step 4.
  • This configuration ensures that users in this group will be authenticated against the RADIUS server.

Step 6: Testing

  1. It’s essential to test your RADIUS configuration to verify that it’s functioning correctly. You can do this by attempting to log in using user accounts associated with the RADIUS server.

Step 7: Monitoring and Troubleshooting

  1. FortiGate provides various monitoring tools under Log & Report where you can review RADIUS authentication and accounting logs. These logs can be instrumental in troubleshooting any issues with the RADIUS configuration.

Step 8: Additional Configuration

  1. Depending on your specific requirements, you may need to configure additional options such as RADIUS accounting, timeout settings, and other advanced features. Consult the FortiGate documentation for comprehensive details on these options.

Step 9: Save Configuration

  1. Make sure to save your configuration changes to ensure they are preserved across device reboots and updates.

By following these detailed steps, you can set up FortiGate to authenticate and authorize users through a RADIUS server effectively. This configuration enhances network security by centralizing user authentication and access control.

Install Web Deploy on IIS (Export and Import Websites With Application Pools)

Hello everyone , in this video I will show you how can migrate Websites in IIS from one server to another servers with all required components by using Web Deploy tools. Let me describe Web Deploy Tools: Web Deploy (also known as MSDeploy) in IIS refers to a technology developed by Microsoft that enables seamless deployment, migration, and synchronization of web applications, websites, and web server configurations across IIS servers. It streamlines the process of exporting and importing IIS configurations and content, making it easier to move web applications between different servers or environments. Web Deploy provides a set of tools and utilities that allow you to Export IIS Configuration and Content, You can use Web Deploy to create a deployment package that includes not only the web application’s files but also the IIS server’s configuration settings. This package captures everything needed for the application to run correctly on another server. Second provided option is  Import and Deploy, On the target server, you can use the same Web Deploy tool to install the application and its associated configurations using the deployment package. This process ensures that the target server’s IIS configuration matches the source server’s configuration. Also you can use Web Deploy to synchronize changes between a source and target server. For example, if you’ve made updates to a web application on your development server, you can use Web Deploy to sync those changes to your staging or production server.

Step 1: Installing Web Deploy

  1. Download Web Deploy:
  2. Install Web Deploy:
    • Run the downloaded installer with administrative privileges (right-click and choose “Run as administrator”).
    • Follow the installation wizard:
      • Accept the license terms.
      • Choose the installation location (you can leave it as the default).
      • Select the components to install. Make sure to select at least the following:
        • Web Deployment Tool
        • IIS Deployment Handler
        • Management Service Delegation UI
      • Click “Install” to begin the installation.

Step 2: Configuring IIS for Web Deploy

  1. Open IIS Manager:
    • Press Win + R, type inetmgr, and press Enter to open the Internet Information Services (IIS) Manager.
  2. Enable Management Service:
    • In IIS Manager, select your server node (usually the top node in the Connections pane on the left).
  3. Double-Click on “Management Service” under the “Management” section in the middle pane.
  4. Configure Management Service:
    • Check the “Enable remote connections” checkbox to allow remote management of the IIS server.
    • Set the “Start Type” to “Automatic” to ensure the service starts automatically with Windows.
    • Specify a unique port for the management service (default is 8172).
    • You can also configure other settings like SSL and client certificates if needed.
  5. Configure Permissions:
    • Under “Management Service Delegation,” you can configure permissions for various users and roles. Click “Add User…” to specify the users or groups that should have permission to deploy websites.
  6. Apply Changes:
    • Click the “Apply” button to save your configuration.

Step 3: Exporting and Importing Websites with Application Pools

Now that Web Deploy is installed and IIS is configured, you can use Web Deploy to export and import websites with application pools.

Export a Website:

  1. Open a Command Prompt:
    • Press Win + X and choose “Command Prompt (Admin)” to open a command prompt with administrative privileges.
  2. Run the Export Command:
    • Use the msdeploy command to export a website. Replace placeholders with actual values:
    bashCopy codemsdeploy -verb:sync -source:webServer,computerName=<ServerName>,userName=<Username>,password=<Password> -dest:package=<PathToPackage.zip> -enableRule:AppPoolExtension
    • <ServerName>: Replace with the server name or IP address.
    • <Username> and <Password>: Replace with the credentials of an account with sufficient permissions.
    • <PathToPackage.zip>: Specify the path where you want to save the exported package.

Import a Website:

  1. Open a Command Prompt:
    • Open a command prompt with administrative privileges.
  2. Run the Import Command:
    • Use the msdeploy command to import a website. Replace placeholders with actual values:
    bashCopy codemsdeploy -verb:sync -source:package=<PathToPackage.zip>,includeAcls=“False” -dest:webServer,computerName=<ServerName>,userName=<Username>,password=<Password>
    • <PathToPackage.zip>: Specify the path to the package you want to import.
    • <ServerName>: Replace with the server name or IP address.
    • <Username> and <Password>: Replace with the credentials of an account with sufficient permissions.
  3. Execute the Command:
    • Execute the command, and the website with its associated application pool will be imported to the target server.

By following these detailed steps, you should be able to successfully install Web Deploy, configure IIS for remote management, and perform website export and import operations with application pools. Always exercise caution when making changes to production servers and ensure you have backups in place.

Generate pfx and Install SSL Certificate in IIS, Enable https in IIS

Hello every one , in this video I will show you how can convert your certificate and key file to pfx format and also how to import that pfx in IIS webserver . as you know import pfx ssl certificate is easiest way to import in IIS.

Acquire an SSL Certificate:

  • You can obtain an SSL certificate from a trusted Certificate Authority (CA) or through a third-party provider.
  • Alternatively, you can create a self-signed certificate for testing purposes, but it won’t be trusted by browsers.

2. Generate a PFX File:

  • Once you have the SSL certificate, you need to generate a PFX (Personal Information Exchange) file. This file will contain both the certificate and the private key.

Using OpenSSL (for Windows):

  • Download and install OpenSSL for Windows if you don’t have it already.
  • Open a command prompt and navigate to the OpenSSL bin directory.
  • Run the following command to generate a PFX file:

openssl pkcs12 -export -out yourdomain.pfx -inkey yourdomain.key -in yourdomain.crt

  • Replace yourdomain.pfx, yourdomain.key, and yourdomain.crt with your actual file names.

3. Install the SSL Certificate in IIS:

  • Open the IIS Manager:
    • Press Win + R, type inetmgr, and press Enter.
  • In the left-hand Connections pane, select your server node.
  • In the right-hand Actions pane, click on “Server Certificates.”

For a Self-Signed Certificate:

  • Click “Create Self-Signed Certificate” on the right-hand side.
  • Follow the wizard, providing a friendly name for the certificate.

For a Commercial Certificate:

  • Click “Import” and follow the wizard, selecting the PFX file you generated.
  • Enter the PFX password when prompted.

4. Bind the SSL Certificate to a Website:

  • In the IIS Manager, expand the Sites node in the Connections pane.
  • Select the website you want to secure with HTTPS.
  • In the right-hand Actions pane, click on “Bindings.”
  • Click “Add” to add a new binding.
  • Set the type to “https” and select the SSL certificate you installed earlier.
  • Choose an appropriate IP address and port (usually 443).
  • Click OK to save the binding.

5. Configure HTTPS in IIS:

  • Make sure the URL Rewrite module is installed in IIS. You can download it if needed.
  • In your website settings, go to the “SSL Settings.”
  • Check the box that says “Require SSL” to force HTTPS.

6. Test the Configuration:

  • Open a web browser and enter your site’s URL with “https://” (e.g., https://yourdomain.com).
  • Ensure that the connection is secure and that your SSL certificate is valid.

By following these steps, you’ll generate a PFX file, install an SSL certificate in IIS, and configure HTTPS for your website. This will help secure the data transmitted between the client and your web server.

Fortigate Active Directory Integration

Hello everyone , in this video I will integrate my fortigate firewall with windows active directory , by doing this I can write the policies based on logged on users to their desktops , for example for one security group I can write a policy that can be access to facebook and for another group facebook will be blocked , or allow internet just for specific users that raised in security. Writing policies is depend on your environment.

1. Understanding Active Directory:

  • Active Directory is a Microsoft directory service that stores information about objects on a network, such as users, computers, groups, and more.
  • It provides centralized authentication and authorization services for network resources.

2. Purpose of Integration:

  • Integrating FortiGate with Active Directory helps streamline user authentication and access control for network resources.
  • It simplifies user management by allowing administrators to use AD user accounts for firewall policies.

3. Steps for FortiGate Active Directory Integration:

a. Configuration in Active Directory: – Ensure your Active Directory is properly configured with user accounts, groups, and organizational units (OUs).

b. FortiGate Web Interface Access: – Access the FortiGate web interface using a web browser.

c. Create a New LDAP Server Object: – Navigate to the “System” menu and select “Authentication” > “LDAP Servers.” – Click “Create New” to add a new LDAP server object. – Configure the LDAP server settings, including the server’s IP address or hostname, port (typically 389 for LDAP, 636 for LDAPS), and authentication credentials (usually a service account in AD).

d. Test LDAP Server Connectivity: – After configuring the LDAP server object, you can test the connectivity to ensure FortiGate can communicate with your AD server.

e. Create LDAP Authentication Group: – Go to “User & Device” > “User Definition” > “LDAP Servers.” – Create an LDAP authentication group and specify the LDAP server you created earlier.

f. Define Firewall Policies: – Create firewall policies that use LDAP authentication groups for user-based access control. – For example, you can define policies that allow or deny access to specific resources based on user group membership.

g. User Authentication: – When a user attempts to access a network resource, FortiGate will use the LDAP server to verify the user’s credentials. – Users will need to enter their AD username and password for authentication.

4. Additional Considerations:

  • Security: Ensure secure communication between FortiGate and Active Directory by using LDAPS (LDAP over SSL/TLS) for encrypted communication.
  • User Mapping: FortiGate can map AD groups to local FortiGate groups, simplifying policy management.
  • Fallback Mechanisms: Configure fallback authentication methods in case the LDAP server is unreachable or for users not in AD.

5. Monitoring and Maintenance:

  • Regularly monitor the integration for any issues, such as LDAP server connectivity problems or changes in AD group memberships.
  • Keep FortiGate and Active Directory servers up-to-date with security patches.

Install and Configuration VMware vSphere Replication

Hello everyone , in this video I am going to install and configure vmware vsphere replication , by using this tools you can replicate virtual machines disks from one one datastore to another datastore. For example you can replicate your disks to disaster center datastore and if your server gets down you can bring up or restore your virtual machine in your disaster center in some seconds ,

Prerequisites:

Before you begin, make sure you have the following prerequisites in place:

  1. VMware Infrastructure: You should have a VMware vSphere environment set up with at least two vCenter Servers or ESXi hosts that you want to replicate VMs between.
  2. Network Connectivity: Ensure that there is proper network connectivity between the source and target vSphere environments. This includes firewalls, routers, and other networking components.
  3. vSphere Replication Appliance: Download the vSphere Replication appliance OVA file from the VMware website or portal.
  4. Licensing: Ensure that you have the necessary licensing for vSphere Replication. It’s typically included with VMware’s vSphere Essentials Plus and higher editions.

Installation and Configuration:

Follow these steps to install and configure VMware vSphere Replication:

  1. Deploy vSphere Replication Appliance:
    • Log in to the vCenter Server where you want to deploy the vSphere Replication Appliance.
    • From the vCenter Web Client, select “Hosts and Clusters.”
    • Right-click on a host or cluster and select “Deploy OVF Template.”
    • Browse to the location of the vSphere Replication Appliance OVA file and follow the deployment wizard, specifying network settings, deployment size, and other necessary configurations.
  2. Configure vSphere Replication Appliance:
    • After deploying the appliance, power it on and access the web-based management interface by entering its IP address in a web browser.
    • Log in with the default credentials (admin/vcdr).
  3. Pair vSphere Replication Appliances:
    • In the vSphere Replication management interface, select the “Configuration” tab.
    • Under “VR Servers,” click on “Add VR Server” to add the remote vSphere Replication Appliance. This pairs the appliances from the source and target sites.
  4. Create Replication VMs:
    • In the vSphere Web Client, navigate to the VM you want to replicate.
    • Right-click on the VM, select “All vSphere Replication Actions,” and then choose “Configure Replication.”
    • Follow the wizard to configure replication settings, including the target location, RPO (Recovery Point Objective), and other options.
  5. Monitor and Manage Replications:
    • In the vSphere Replication management interface, you can monitor and manage replication jobs.
    • You can perform actions like starting, stopping, or deleting replications, monitoring replication status, and configuring email notifications for replication events.
  6. Failover and Recovery:
    • In the event of a disaster or for planned migrations, you can initiate a failover to the replicated VMs in the target site.
  7. Testing and Validation:
    • It’s crucial to periodically test and validate your replication setup to ensure it meets your recovery objectives.
  8. Documentation and Best Practices:
    • Consult VMware’s documentation and best practices guides for vSphere Replication to optimize your setup and ensure data integrity.

Install and Config Mikrotik Router

Hello everyone, in this video I am going to install mikrotik router os on hyper-v and after that I will be configure routerOS to provide internet access for clients by configuring dhcp server , create a nat rule , setup pptp vpn server. Ok lets start

  1. Hardware Requirements:
    • MikroTik router device (such as a MikroTik RouterBOARD)
    • Ethernet cables
    • Computer with an Ethernet port
    • Power source for the router
  2. Initial Setup:
    • Connect the MikroTik router to a power source and to your computer using an Ethernet cable. The router usually has a default IP address for the initial configuration, such as 192.168.88.1. Ensure that your computer is set to obtain an IP address automatically through DHCP.
  3. Access the Router:
    • Open a web browser on your computer and enter the default IP address of the MikroTik router in the address bar (e.g., http://192.168.88.1).
    • You should see the MikroTik login page. The default username is “admin,” and there is no password by default. It is crucial to change the default password during the initial setup for security reasons.
  4. Basic Configuration:
    • Once logged in, you can start configuring the router. Here are some basic configurations:
      • Set a strong password for the “admin” user.
      • Set the router’s hostname.
      • Configure the time zone.
      • Set the DNS servers.
  5. LAN Configuration:
    • Configure the LAN (Local Area Network) settings, including the IP address and subnet mask for the router’s LAN interface.
    • You can create DHCP server pools to assign IP addresses to devices on your local network automatically.
  6. WAN Configuration:
    • Configure the WAN (Wide Area Network) interface, which could be connected to your internet service provider (ISP). This often involves configuring the IP address, subnet mask, gateway, and DNS servers provided by your ISP.
    • Set up NAT (Network Address Translation) if you have multiple devices on your LAN and want them to share a single public IP address.
  7. Firewall Configuration:
    • Create firewall rules to control incoming and outgoing traffic. MikroTik routers have a powerful firewall system that allows you to filter and control traffic based on various criteria.
  8. Security and Access Control:
    • Configure access control lists (ACLs) to restrict or allow specific traffic.
    • Enable SSH or secure Winbox access for remote management and disable insecure services like Telnet.
  9. Additional Features:
    • Depending on your needs, you can configure various additional features such as VPNs, VLANs, QoS (Quality of Service), routing protocols, and more.
  10. Save and Backup Configuration:
    • After configuring your MikroTik router, make sure to save your configuration settings and create regular backups. This can be done through the router’s web interface.
  11. Testing:
    • Test your network to ensure everything is working as expected. Check internet connectivity, LAN connectivity, and any specific services or features you’ve configured.
  12. Documentation:
    • Keep thorough documentation of your MikroTik router’s configuration, including any changes you make over time. This will be helpful for troubleshooting and future reference.

Capture Customized Windows Image by WDS

Step 1: Prepare the Reference Computer
Install Windows on a reference computer.
Customize the Windows installation as needed (install applications, configure settings, etc.).
Step 2: Sysprep the Reference Computer
Open a command prompt with administrative privileges.
Navigate to the Sysprep folder (usually located at C:\Windows\System32\Sysprep).
Run the Sysprep tool with the following options:
bash
sysprep.exe /generalize /oobe /shutdown /unattend:unattend.xml
  • /generalize: Prepares the Windows installation to be imaged.
  • /oobe: Configures the computer to boot to Windows Welcome upon the next restart.
  • /shutdown: Shuts down the computer after Sysprep completes.
  • /unattend:unattend.xml: Specifies an unattend.xml file to automate the Sysprep process. This file is optional but recommended for consistency.

Step 3: Boot the Reference Computer into Windows PE

  • Insert a bootable media (USB drive or DVD) containing Windows PE.
  • Boot the reference computer from the bootable media.

Step 4: Capture the Image

  • In Windows PE, open a command prompt.
  • Use the WDSUTIL command to capture the image. For example:

mathematica
WDSUTIL /Verbose /Progress /Capture-Image /Image:”CustomImage” /Name:”Custom Image” /Description:”Customized Windows Image” /CaptureDir:”D:\Captures”

  • /Image:"CustomImage": Specifies the name for the captured image.
  • /Name:"Custom Image": Specifies a friendly name for the captured image.
  • /Description:"Customized Windows Image": Provides a description for the captured image.
  • /CaptureDir:"D:\Captures": Specifies the directory to store the captured image.

Step 5: Upload the Captured Image to WDS Server

  • After capturing the image, navigate to the WDS server.
  • Use the WDS MMC snap-in or the WDSUTIL command to upload the captured image to the server.

Step 6: Create an Install Image

  • In the WDS MMC snap-in, right-click on “Install Images” and select “Add Install Image.”
  • Specify the location of the captured image file and follow the wizard to create the install image.

Step 7: Deploy the Image

  • Boot a client computer from the network using PXE boot.
  • Select the customized image from the WDS server for deployment.
  • Follow the on-screen instructions to deploy the image to the client computer.

Make sure to test the deployment thoroughly before deploying to production environments.

Install And Configure DHCP Server Cluster

1. Preparing the Environment:

  • Ensure that both servers meet the hardware and software requirements for Windows Server and DHCP.
  • Assign static IP addresses to each server.
  • Ensure that DNS is properly configured and that both servers can resolve each other’s names.

2. Installing the DHCP Server Role:

  • Open Server Manager on both servers.
  • Select “Add roles and features” and proceed with the installation wizard.
  • Select “DHCP Server” as the role to install.
  • Complete the DHCP Server installation wizard.

3. Configuring DHCP Failover:

  • Open DHCP Manager on one of the servers.
  • Right-click on the DHCP server name and select “Configure Failover.”
  • Follow the wizard to configure DHCP failover.
  • Choose the partner server, configure the shared secret, and set the mode (Load Balance or Hot Standby) and relationship (Primary or Secondary).

4. Installing the Failover Clustering Feature:

  • Open Server Manager on both servers.
  • Select “Add roles and features” and proceed with the installation wizard.
  • Select “Failover Clustering” as the feature to install.

5. Creating the Cluster:

  • Open Failover Cluster Manager on one of the servers.
  • Click on “Create Cluster” and follow the wizard.
  • Add both servers to the cluster.
  • Configure cluster settings such as the cluster name and IP address.

6. Configuring DHCP Server Role in the Cluster:

  • In Failover Cluster Manager, right-click on “Services and Applications” and select “Configure a Service or Application.”
  • Select “DHCP Server” as the service to configure.
  • Follow the wizard to add the DHCP server role to the cluster.

7. Testing Failover:

  • Perform a failover test to ensure that the DHCP server cluster functions correctly.
  • Use the Failover Cluster Manager to initiate a failover and verify that DHCP services remain available during the failover process.

8. Monitoring and Maintenance:

  • Regularly monitor the DHCP server cluster using Failover Cluster Manager to ensure it remains healthy.
  • Perform regular maintenance tasks, such as applying updates and patches, to keep the cluster secure and up-to-date.

Note: Ensure that you have sufficient IP address ranges and leases configured to handle the increased demand that comes with clustering. Additionally, testing failover in a controlled environment is crucial to ensure proper functioning in a production environment.

Install Windows On EVE-NG

  1. Prepare the Windows ISO: Obtain a Windows installation ISO file. You can download these from the Microsoft website or use an existing ISO file you have.
  2. Upload the ISO to EVE-NG: Log in to the EVE-NG web interface. In the top menu, go to “Images” and then click on “Browse” to select the Windows ISO file from your local machine. Click on “Upload” to upload the ISO file to EVE-NG.
  3. Create a QEMU VM: In the EVE-NG web interface, go to the “Node” section and click on “Add Node.” Select the type as “QEMU” and configure the settings for the VM. You can specify the number of CPUs, amount of RAM, and the size of the hard disk.
  4. Map the Windows ISO: In the QEMU VM settings, go to the “Console” tab. Under the “CD/DVD” section, select the Windows ISO file you uploaded earlier as the CD/DVD image.
  5. Start the VM: After configuring the VM settings, click on “Add Node” to create the QEMU VM. Start the VM by clicking on the play button in the EVE-NG interface.
  6. Install Windows: Access the VM console by right-clicking on the VM in the EVE-NG interface and selecting “Console.” The VM will boot from the Windows ISO. Follow the on-screen instructions to install Windows. You may need to format the virtual hard disk and select the installation partition during the process.
  7. Complete the Installation: After Windows is installed, the VM will restart. You can then log in to Windows and configure it as needed.
  8. Optional: Install VirtIO Drivers: For better performance, you can install VirtIO drivers in Windows. These drivers are included in the EVE-NG installation and can be found in the /opt/unetlab/addons/qemu/virtio-win directory. To install the drivers, mount the VirtIO ISO in Windows and run the installer.
  9. Access Windows from EVE-NG: Once Windows is installed and running, you can access it from EVE-NG by right-clicking on the VM in the EVE-NG interface and selecting “Console.”
  10. Activate Windows: After installation, you’ll need to activate Windows using a valid product key. You can do this by going to “Settings” > “Update & Security” > “Activation” in Windows.

Remember to comply with Microsoft’s licensing terms and ensure that you have a valid license for Windows when using it on EVE-NG or any other virtualization platform.