Dedicated Hosting

Elasticsearch Distributed NoSQL Database – What Is It and Should You Use It?

Sam Guiliano February 2, 2016 by under Dedicated Hosting 0 Comments

Are you trying to decide whether or not Elasticsearch might be right for your company? Here is a look at its benefits.

  • What is Elasticsearch?
  • Features
  • One Programmer’s Perspective
  • Strong Elasticsearch Hosting

What is Elasticsearch?

Elasticsearch is a full-text, distributed NoSQL database. In other words, it uses documents rather than schema or tables. It’s a free, open source tool that allows for real-time searching and analyzing of your data. People appreciate this system because it allows you to run metrics on your data immediately, so you can understand it right away, on an ongoing basis.

Read More

How to Configure LVM (Logical Volume Management) on DRBD (Distributed Replicated Block Device)

Paul Cortes January 26, 2016 by under Dedicated Hosting 0 Comments
Verified and Tested 1/20/16


This how-to will help walk you through adding LVM to DRBD. Distributed Replicated Block Device (DRBD) is a block level replication between two or more nodes and is used as a replacement for shared storage by created a networked mirror. DRBD is used in environments that require systems or data to be Highly Available.


* Two servers running Debian GNU/Linux Distribution. Other versions of Linux will work as well, but the installation packages may be different.
* Both servers should be directly cross-connected together, or have a separate Network Interface for private communication.
* Both servers should have the same partitioning. This walkthrough assumes that both systems have a single /dev/sdb device that is going to be used as the
DRBD volume.

Configuring LVM on DRBD

Before we start adding LVM to DRBD you should disable the LVM cache by setting:

write_cache_state = 0

After you disable the LVM cache, make sure to remove any stale cache entries by deleting the following:


You must repeat the above steps on all DRBD nodes.

Now that we have our DRBD volume in Primary/Primary mode we need to add LVM to this device.


LVM Filters

Update your lvm.conf:

You will need to update the filter section in the LVM configuration. This needs to be done on both nodes:

nano /etc/lvm/lvm.conf

# By default we accept every block device:

filter = [ "r|/dev/sdb|", "r|/dev/disk/|", "r|/dev/block/|", "a/.*/" ]

Note: if you device is not /dev/sdb update this according to your system


Physical Volume Creation

Create the physical volume for LVM:

On one node, create the physical volume:

proxmox-host01:~# pvcreate /dev/drbd0
Physical volume "/dev/drbd0" successfully created

Check your physical volumes, they should look like similar to this:

proxmox-host01:~# pvscan
PV /dev/drbd0 lvm2 [100.00 GB]
Total: 1 [100.00 GB] / in use: 1 [100.00 GB] / in no VG: 1 [4.00 GB]


Volume Group Creation

Create the volume group:

On one node, create the volume group:

proxmox-host01:~# vgcreate vg_vm100 /dev/drbd0
Volume group "drbdvg" successfully created

Check your physical volumes again, they should look like similar to this:

proxmox-host01:~# pvscan
PV /dev/drbd0 VG vg_vm100 lvm2 [149.04 GB / 149.04 GB free]
Total: 1 [100.00 GB] / in use: 1 [100.00 GB] / in no VG: 1 [4.00 GB]

Logical Volume Creation

Create a logical volume for your VM:

proxmox-host01:~# lvcreate --name vm100 --size 50G vg_vm100

The above command will create a new 50GB Logical Volume named  vm100 and assign it to the vg_vm100 volume group. From here, you’re ready to add a new VM using your LVM as your storage partition (/dev/vg_vm100/vm100).

In order to check that things are fully working, create a new KVM VM and store the VM disk on the previously created DRBD storage.

Check out our Community article for DRBD Replication and Configuration!


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

How to Enable MySQLi in cPanel/WHM with EasyApache 3

Jason Mazzota January 25, 2016 by under Dedicated Hosting 0 Comments
Verified and Tested 1/11/16


In this tutorial we will walk you through enabling MySQLi in cPanel/WHM by using EasyApache. MySQLi is an extension used for PHP coding so PHP can interface directly to MySQL.


A server with cPanel/WHM installed and using EasyApache 3.

Note: EasyApache 4 is still listed as a Technology Preview. Because of this, not all features or security updates are available should you replace the EasyApache 3. It is not recommended that you enable EasyApache 4 at this time.

Enabling MySQLi in cPanel/WHM with EasyApache 3

Installing the MySQLi extension is a simple process in cPanel/WHM. The first thing you will want to do is log into WHM and in WHM’s search bar, enter “EasyApache.” From here you will need to select EasyApache 3. If you do not have the latest cPanel/WHM update, your option may just say “EasyApache.”

WHM EasyApache options

WHM EasyApache options

EasyApache 3

With EasyApache 3, once you click on it, it will load the current settings. You will want to edit your current build by clicking the gear icon located in the below picture.

EasyApache settings

EasyApache settings

From here, you can continue to where MySQLi is located by clicking the options in the red box in the pictures below.

First step

First step

And then here.

Second step

Second step

And finally here.

Third step

Third step

Once in the Exhaustive Options List, you want to look for the MySQLi option below, check the box next to it, and then go to the bottom of the page and click “Save and Build.”

MySQLi option

MySQLi option

And that’s it. You now have the MySQLi extension enabled and ready to use.


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

What is: Networking Basics – Switches, Routers, and Firewalls

John Papiewski December 28, 2015 by under Dedicated Hosting 0 Comments
Target Audience

This article is intended for those looking for a primer on basic networking terms and concepts.


Switches, routers, and firewalls are electronic devices used to build data networks. They serve as essential components of the Internet, ferrying information rapidly from one computer to the next. In many commercial networks, a separate piece of hardware handles each of these functions. For small office/home office use, the switch, router, and firewall are typically combined into one convenient, low-cost unit.


A switch connects multiple computers and mobile devices together into a local network.

It serves as a central point through which computers on that local network communicate with each other. A switch can handle simultaneous connections between dozens of computers, with no connection interfering with any other. However, a switch cannot connect to other networks by itself–it requires a router to communicate with other networks.

A network is a group of computers that exchange data. Networks may be simple, such as a home office with PCs and mobile devices, or they may be large and complex, like the Internet.


A router connects separate networks, allowing information to route from one to the other. The networks may be physically separate, such as a home office network and the Internet, or logically separate, such as subnetworks that share cabling. In this sense, a router forwards data between networks in much the same way as a postal distribution center forwards mail between cities. Routers can also create logically separate networks from physically connected ones, preventing broadcast traffic on one subnetwork from interfering with another.

A broadcast sends data from a single device to all other devices on a network (one-to-all). Broadcasts are used to manage data communications between computers rather than data transfers. A common use of broadcasts is an ARP (Address Resolution Protocol) request, in which a computer broadcasts a request on its network to learn what device has a particular IP ad


A network firewall is a security device that puts up a barrier between a local network and the Internet. The firewall acts as a filter, allowing or restricting data traffic between the network it protects and other networks. Firewalls are flexible, allowing you to modify the blocking rules, such as by IP address, by protocol (TCP, UDP, ICMP), by port, or for software applications and services.

 An IP (Internet Protocol) address is a number that identifies a particular computer or networked device, much as a street address identifies an individual building. IP addresses come in two main types. The most common, IPv4, consists of four numbers, from 0 to 255, separated by periods–e.g., IPv6 is newer and allows a much greater number of unique addresses (IPv4 currently faces the problem of running out of unique addresses). An IPv6 address is made up of 8 hexadecimal numbers of four digits each, separated by colons, such as 2001:DB8:2AE1:1:3622:104:9050:1


A network protocol is a set of rules describing how networks handle the transfer of data. Common examples include Transfer Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Message Control Protocol (IMCP).


A port is a number (between 0 and 65535) that identifies a logical “slot” or pigeonhole through which data passes on its way to or from an application or program. The IP address and port number often go together, making the port a “sub address” similar to an apartment number that distinguishes one unit in a building. Many ports have been traditionally designated for certain uses–for example, Web traffic most commonly uses ports 80 and 443.


Software Firewall

Microsoft Windows, Apple’s Mac OS X, and other modern computer operating systems come with a software firewall built in. A software firewall performs the same task as the hardware version, protecting the computer from intruders over the Internet. In many instances, the software is turned on by default, providing security for computer users who don’t have a hardware firewall. Software and hardware firewalls can coexist without any trouble on the same network, improving security through redundancy.

Combination Devices

Modern home network devices now provide the functionality of a firewall, router, and switch in a single unit. Combining these services has greatly lowered the cost of home networks as well as simplified setup and maintenance. The switch allows local devices to communicate with each other and share a common Internet service; the router sends data to the Internet from the home network; and the firewall keeps the local network safe.



Since 1995, Atlantic.Net has been providing reliable internet service to thousands of customers.   From Dial-up and Broadband access we have moved into offering the best in dedicated hosting as well as other types of hosting solutions.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!


How to Install Drupal on CentOS 7 with Apache

Jose Velazquez October 15, 2015 by under Dedicated Hosting 0 Comments
Verified and Tested 09/28/15


In this How-To, we will walk you through the install and configuration of Drupal on CentOS 7 with Apache. Drupal is a free content management system that will facilitate the way your content is organized and managed. It has a user-friendly interface that makes customizing your content easy and simple with little effort.


– You need a CentOS 7 server that is configured with a static IP address.

– You will also need to have LAMP (Linux, Apache, MySQL, PHP) installed. If your server doesn’t have LAMP installed already, see our guide here for a quick installation run through.

Installing Drupal on CentOS 7 with Apache

To get started, log in to your CentOS 7 server via SSH or Console. If you are using the Atlantic.Net cloud service, note that they are setup with minimal installations to avoid having unnecessary packages from being installed and never used. If some software packages that you’re used to using aren’t installed by default, feel free to install them as needed.

Let us download wget and unzip so we can simplify this tutorial.

sudo yum install wget unzip

Before moving on, let’s make sure the system is up to date:

sudo yum update

Creating a Database and User for Drupal on CentOS 7

For Drupal to function, we must create a database in MySQL. Let us begin access MySQL with the following command:

mysql -u root -p

Now, we must first begin creating the database that Drupal will use. This can be done by running the following command, replacing yourdbname with your desired database name:




With the database created we must now create a user so it can access the Database. Again, this can be done by running the following command, replacing yourdrupaluser with your desired username and yourdrupalpassword with your desired password.



@localhost IDENTIFIED BY '



Now that we have a new database and database user, we must grant access to your recently created user so that it can make changes to your database. This is done by running the following command:



.* TO



Additionally, we must refresh MySQL so the system can flush the newly added privileges and for the changes to take effect, then exit your session. This can be accomplished with the following commands:


Installing Drupal on CentOS 7

The system is now ready for us to download and install Drupal. Start by downloading the latest version from the Drupal site:


Next, install the necessary PHP dependencies so that Drupal can function properly after the install is completed:

yum install php-mbstring php-gd php-xml php-pear php-fpm

After we have installed the requires dependencies, we can continue with the installation of Drupal. Run the following command to unzip the Drupal package that we downloaded.


Since, Drupal is currently in the root directory, let us copy the folder and move it into the default httpd directory:

cp -r ~/cp -r ~/drupal-7.39/* /var/www/html

Now to finalize the configurations on the servers side, we must change the create a settings file in the sites default directory. Let’s change to that directory with the following command:

cd /var/www/html/sites/default/

Copy the default.settings.php file and rename it to settings.php with the following command:

cp -p default.settings.php settings.php

We need to modify the permissions so that the Drupal installer can edit

chmod 666 settings.php

We also need to make a files directory, do so with the following command:

mkdir files

Modify the permissions of files with the following command:

chmod 777 files

We need to restart Apache since we installed the PHP extensions.

systemctl restart httpd.service

Drupal’s Web Configuration on CentOS 7

Your server is now configured correctly to run the web-based installation by going to the following:


You will see the Drupal installation procedure’s initial page. Select the standard install.

This is the Drupal's web installation wizard on CentOS 7

This is the Drupal’s web installation wizard on CentOS 7. Select the standard install.

Choose the language of your choice.

Select the language of your choice.

Select the language of your choice.

On the next screen, we need to enter in the Database information that we created from before. Enter the Database name, username and password, once done hit “Save an continue.”


Add the MariaDB database, user and password into their designated fields.

Add the MariaDB database, user and password into their designated fields.

After entering the Database info, all you need to do now is answer Drupal’s questions for your site.

From here just follow along Drupal's install for site information.

From here just follow along Drupal’s install for site information.

Whats Next?

Congratulations! You have just installed and configured Drupal with Apache on your CentOS 7 Server. Thank you for following along in this How-To and check back with us for any new updates.


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

HTTP vs. HTTPS : What is the difference?

Wolfram Donat October 14, 2015 by under Dedicated Hosting 0 Comments
Target audience

This article is geared toward a general reader with a basic understanding of how the Internet works.


When you surf the Internet, most web pages are delivered to your computer using a communications protocol called HTTP, which serves the vast majority of web pages on the World Wide Web. However, it can be a vulnerable communications scheme, which is where HTTPS comes into play.


When a user types a web address into the browser’s address bar and presses ‘Enter’, a lot happens behind the scenes before the web page is displayed in the browser window. The client computer first queries a DNS (Domain Name System) server for the actual numerical IP address of the web server associated with the web address. Once it knows the IP address, the client computer makes a request for the requested resource from the web server. The server then responds and the web page is delivered to the user’s computer. All of this usually happens within milliseconds and uses a protocol called HTTP.

HTTP (HyperText Transfer Protocol) is the mechanism by which the vast majority of web pages are delivered over the World Wide Web. It is a server/client request protocol, in which the client (usually the user’s computer) requests a data package (usually a web page) from the server.   For Example, When a cloud server hears a request, it responds with a status response, normally “HTTP/1.1 200 OK”. It then follows with the requested data. So a request/response from a client to a server might look something like this:

GET /index.html HTTP/1.1
User-agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:42.0) Gecko/20100101 Firefox/42.0

HTTP/1.1 200 OK
Date: Wed, 16 Sept 2015 23:59:59 GMT
Server: Apache (Unix)
Content-Type: text/html
Content-Length: 1922
<title>Welcome to my site!</title>
This is a very simple web page, written in HTML.

The protocol has been in use since 1991, and is a recognized, valid, useful communications protocol. However, it was never designed with security in mind. The exchange is unencrypted, meaning that if it is intercepted, anyone can read the contents of both the request and the response. It is particularly vulnerable to the ‘man-in-the-middle’ attack, in which an unauthorized computer acts as an intermediary between the user’s computer and the Internet, reading and logging all messages sent and received.

Securing the Web with HTTPS

There is another protocol, however, that works similarly to HTTP but is significantly more secure: HTTPS, which stands for HyperText Transfer Protocol Secure. HTTPS uses TLS (Transport Layer Security) to encrypt the communications between the client computer and the server, rendering the data useless and unreadable if it is intercepted. You may also hear TLS called SSL (Secure Socket Layer). SSL was the predecessor to TLS and many still use that term when talking about the technology that helps to secure HTTPS.

TLS works via digital certificates. Upon request, a Certificate Authority (CA) issues a certificate to a server, which serves to authenticate that server to any connected clients. In an HTTPS transaction, a client contacts a TLS-enabled server and requests an encrypted session. The server then responds with a copy of its digital certificate. That certificate includes the trusted CA that issued it and the server’s public key for encryption.

The client receives the server’s certificate information and can verify from the issuing authority that the certificate is valid. Once the client has satisfied itself that the server is authentic, it generates a random number. It then uses that random number to generate a session key. The client then encrypts the random number using the server’s public key, and sends it to the server. Because it’s encrypted using the server’s public key, the server is the only one able to decrypt the message with its private key. Once the server decrypts the client’s message, it has the same random number to generate the same session key client generated. From that point on, all communication between the server and the client is encrypted and decrypted using that session key. The information that is transmitted is just like the HTTP traffic, only now it is encrypted before sending, so if it should happen to be intercepted, the intercepting entity would be unable to decipher the information. Compare what the below HTTPS traffic looks like with the earlier example of HTTP traffic:

...........s.....*...."..*.....r.].di.s0.$. .<...v.b..'.....O..Z|.~$..!N...X...+./.
.................#..zS...$z.W..0.......c...#.;qu..*...3...... -.E;[email protected]/P.rU..0.....5P......#X...n.b.......C.&...tRgW.a.....{v.......)...-1..J9S.V..G.In......|..u..O0.....mU...|..q..Ja.O.n..G..E.W}8E.Q...0..k3t.........h2.spdy/3.1.http/1.1..........
....Q...M..V.Q$._...9.&ye.L.i..T'.l.y..3`]| .<...v.b..'.....O..Z|.~$..!N...X./..................([email protected]#8....u
..........(...........[[email protected]
.....G...z..x.....SzV...H.P...L`...T.....s.{...ip....PY..)Z.[.<N.f}WOv$.>........../.....^.....hc ..e.\..`.L.!.c.m.=`...[....An...c2.N..?......$.|....M.?WA.x......NCIk.....j+VUZ..p...\ZM....=.<....Ra..S..% .o...{....\ nc..~c=.......'.]...D.t..p0.-b.8*g$Yo....!c...y.#......d..H9.o.+..'..xn\.... q.....H}-....Q>..D!...~.yV..v..
.....*.(..h.V.F.K..8..L.M.s...rwdc.{F%o.j....=.C...w.<.|..).3.. =32..g..>...h8(..;\}.h<....yP\6r.y..3.......592.W...r..pT.*.-D....e.]..).....
.....<.i..o`[email protected]_d"....m..!L .G.{........U.....[..r..S....a)?.SY...%....>...jl.....


Obtaining a TLS Certificate from a Certificate Authority

Certificate Authorities offer a wide variety of TLS certificates. Prices vary depending on the extent of authentication desired. A very basic certificate (perhaps used to validate users within an organization, for example) is free. The three most common levels of validation are DV, or Domain Validation, OV, or Organization Validation, and EV, or Extended Validation. DV certificates are the most common, and are usually verified by emailing the controller of a domain name. OV certificates offer a bit more trust; the CA verifies not only control of the domain, but also the business uses that domain. EV certificates are the most trusted, and require significant documentation from the organization to prove that they are legitimate. These certificates are often used by organizations that want to present a secure web experience, particularly if they have a financial relationship with their visitors.

While the encryption process is strong, making the HTTPS messages particularly secure compared to unsecured HTTP transactions, there is one weak link in the chain: the Certificate Authorities operate on trust. If a CA were to be hijacked, for example, it could issue a trusted certificate for any domain that would be accepted as valid and trusted by all browsers. An attacker with such a certificate could then set up a fraudulent copy of that domain that would appear to be trusted with the intention of intercepting traffic to that domain. Such an event happened in 2011, where a Dutch CA was compromised by the government of Iran and used to intercept Iranian citizens’ browsing sessions. It is not a common occurrence, but it is one that security-conscious users should definitely be aware of.

Identifying an HTTPS Connection

The easiest way to verify your HTTPS connection is secure is to look at the address bar of your browser. Most browsers identify HTTPS connections with a padlock icon somewhere near the web address, while unencrypted HTTP connections have no such icon. Below is an example of a regular HTTP connection in Firefox, followed by example HTTPS connections in Firefox and Google Chrome.

HTTP connection in Firefox

HTTP connection in Firefox

HTTPS indicator in Firefox

HTTPS indicator in Firefox

HTTPS indicator in Chrome

HTTPS indicator in Chrome

You may also see a green lock icon that includes the organization or site name next to it. This more noticeable icon shows that the organization has acquired an EV certificate, as below.

HTTPS indicator (with EV TLS Certificate) in Firefox

HTTPS indicator (with EV TLS Certificate) in Firefox



HTTPS fulfills a need that HTTP leaves open — that of security. The exchanges and the protocol used are the same; only HTTPS adds an extra step of encryption that helps protect information passed across the Internet. While nothing is absolutely secure, it’s worth checking to make sure that a website is using HTTPS encryption before sending sensitive information such as passwords or credit card/bank account numbers across the wire.


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

How to Install hMailServer MTA on Windows

Atlantic.Net NOC September 18, 2015 by under Dedicated Hosting 0 Comments
Verified and Tested 09/18/15


HMailserver is a free software that will allow you handle e-mail delivery. MTA, mail transfer agent, is just another name for this process. Since Windows Server 2003, there have not been roles or feature included with the Windows Server operating system to host an MTA, so if you’re looking to run a mail server on a Windows host you need to look at third-party applications, and hMailServer is one of the more popular choices. There are paid versions available, but licensing for them can be very expensive when you can use a free software that can manage multiple domains.


We will be using a Windows 2008 R2 SP1 Datacenter 64-bit. This will also work on Windows 2012 R2 Datacenter 64-bit. Be sure to download the installation files by having the Internet Explorer security changed for the account you are logged in with. You can see a guide on that depending on your OS.


Install hMailServer MTA on Windows

Let’s get started. Visit the download page, and get the Latest Version. Previous versions of the software are also available and can be downloaded here.

In this example, we’re using the Latest Version, 5.6.4 – Build 2283, and we are using the default installation options.

IE HMail download

hMail download

Once you have chosen and downloaded the version, click run if you would like the file to start downloading, and run as soon as the download is finished. You can also click save, to install the program later.

HMail run/save box

hMail run/save

When the download has completed, and the install begins you are prompted with a Setup window. Click next to proceed.

You are then prompted to accept the license agreement. Please be sure to read over the terms of the agreement, and if you accept, click the radio button that corresponds to your selection. Then click next.

HMail license agreement

hMail license

Next you are prompted for the location the program will install. The default is C:\Program Files (x86)\hMailServer. If you would like to change this, click on the browse button and choose the directory you want the program to be installed to. Once you have chosen a directory, click next.

HMail install directory

hMail install folder

Now you can select your components. The default setting is Full installation, providing the Server and the Administrative tools. You can change this by using the drop down at the Full installation line, and choosing Custom installation and only keep the components you want selected. When you have your desired components selected, click next

HMail full or custom install

hMail install options

Going with a standalone model, we will be using the built-in database engine. If you have another host configured as a database server, you can select “Use external database engine”. Keep in mind you will need to provide the database information at a later time to start using the external database. Click next to continue.

hMail database option

hMail database option

Choose whether or not you want a start menu folder. You can also change the name of the folder at this time. If you do not want a start menu folder click the check mark on the bottom left of the window. The folder name window will gray out if you do, this is expected. Click next.

HMail start menu folder

hMail start folder

Now you get to choose a secure password for the hMailServer program. Be sure to enter the same password in both fields. Click next when the password has been entered.

HMail Secure password

hMail password

Finally, review all of your settings, and go back to fix any errors. If there are no errors, click install.

HMail settings confirmation

hMail settings

When the install has completed, you can choose to run hMailServer Administrator now, or starting it later. If you do not want to run it now, remove the checkmark. Click Finish to end the installation.

HMail installtion complete

hMail complete

If you choose to run it now and see the following, your installation is successful and complete.

HMailServer Admin

hMailServer Administrator

How to: NIC Teaming Windows Server 2012 R2 with Hyper-V

Verified and Tested 03/10/2015


This How-To will walk you through Configuring Windows Server 2012 R2 NIC Teaming to a Hyper-V Virtual Machine.

NIC Teaming is the name Microsoft gives for the process of combining multiple network interface controllers (NICs) together for speed, redundancy or both.


– A Windows Server 2012 R2 server with the Hyper-V role installed. If you’re interested in purchasing a server to run virtualized systems, please consider a dedicated server from Atlantic.Net.

– Minimum 2 NIC cards installed on your server.

Configuring Windows Server 2012 R2 NIC Teaming

Open the Server Manager. Right click on Hyper-V and select Configure NIC Teaming.

From server manager select hyper-v, proceed to right click your host, and select Configure Nic teaming.

Server Manager: Hyper-V

Locate the Task drop-down and select New Team. (Note: You will see the available NIC’s in the Adapters and Interfaces section).

Under teams Select New Team

NIC Teaming

For Team Name, type the name that want to set it up as. Check the NIC cards that you want to team. In the additional properties drop-down, change the Load Balancing Mode to Hyper-V Port. (Note: Teaming Mode should be defaulted to “Switch Independent” and Standby Adapter should be defaulted to “None(all adapters Active)”

Select the ethernet devices which you'd like to participate in the team.

New Team

You will get a red Fault alert on the status. Don’t worry it will come right up shortly and change to a green OK status.

Sample Team Status

Team Status

Team status

Team status

Click on the Team Interface tab. Right-Click on your Team Name and select Properties.

Team interface properties

Team interface properties

In the Properties, you should see the Description set to “Microsoft Network Adapter Multiplexor Driver”. In the VLAN membership, verify that the Default option is selected and click OK.

General Properties.

General Properties.

Go to Control Panel. Click Network and Internet. Click Network Connections and Right-Click on Your Team Name. Activate the “Microsoft Network Adapter Multiplexor Protocol (If it is not already checked).

Team Properties

Team Properties

Go back to the Server Manager. Right click on your server and select Hyper-V Manager.  Select the Virtual Switch Manager. Click Create Virtual Switch.

Create a Name for the Virtual Switch. Select External Network. Click on the Microsoft Network Adapter Multiplexor Driver. Verify that the “Enable virtual LAN identification for management operating system” is checked. Then Click Apply and OK.

Create a virtual switch from your New multiplexor team

Virtual Switch

Verify that NIC Teaming is working properly. Unplug one of the Network Cables on the NIC and notice that the server will remain with the network connection. Plug the Network Cable back and try it with the other Network Cable. (Note: You can also open up the command prompt while having one of the Network Cables disconnected and PING the Server. You will get a Reply from the Server with no problem).

Congratulations! You have just Configured Windows Server 2012 R2 NIC Teaming to a Hyper-V Virtual Machine. Thank you for following along in this How-To and check back with us for any new updates.

How to install IIS on Windows Server 2008 R2

Atlantic.Net NOC February 25, 2015 by under Dedicated Hosting 0 Comments
Verified and Tested 02/25/2015


This how-to will show you how to set up Internet Information Services (IIS) 7.0 on a Windows Server 2008 R2.


Administrator access

Installing IIS on Windows Server 2008 R2

Open the Server Manager by clicking on the Server Manager icon located at the bottom left of your task bar. If you are unable to locate the icon, click on the Windows start button, click Control Panel. In Control Panel, click System and Security, and then Administrative Tools and lastly click on Server Manager.

In the Server Manager, click on Roles and then Add Roles.

Open Server manager and select add roles

Server Manager: Add Roles


The Add Roles Wizard should open and you can click Next on the Before you begin section.

Before You Begin

Before You Begin


In Server Roles, check the box next to Web Server (IIS) and click Next.

Select Web Server (IIS)

Server Roles: IIS


Click Next on the Web Server (IIS) information page unless you would like to read through it.

Select next in Web Server (IIS)

Web Server (IIS)


Review the Role Services being installed, you can install additional ones if you would like. Once ready, click Next.

Add any additional roles you'd like to install.

Role Services

Review what is being installed. Once you are ready, click Install.

Confirm installation Selections and select Install

Confirm installation Selections


You should see a progress bar. Once complete, then you can click on Close.

Installation Results

Installation Results

IIS 7 is now installed. To open IIS, open Server Manager, expand Roles then Web Server and click on Internet Information Services (IIS) Manager.

Open server manager and verify IIS Manager has been installed

Server Manager: IIS Manager

You can also open IIS by searching for Inetmgr.exe and pressing Enter or going to Start>All Programs>Administrative Tools>Internet Information Services (IIS) Manager.


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

How to Install File Server Resource Manager (FSRM) on Windows 2012 R2 with Quota Enforcement

Andrew Mora February 8, 2015 by under Dedicated Hosting 0 Comments
Verified and Tested 12/31/14


Installation procedure for File Server Resource Manager (FSRM) on Windows 2012R2 and Quota Enforcement example.


The server must have access to the internet.

Installing File Server Resource Manager (FSRM) on Windows 2012 R2 with Quota Enforcement

Open Server Manager -> Manage -> Add Roles and Features

Select next at that Before you begin page

Add roles and features wizard


Select “Next” until you arrive at the “Server Roles selection”, expand “File and Storage Services” section and select “File Server Resource Manager”. A popup window will appear, simply leave the defaults and select “Add features”. At this time, you’ll be dropped back into the main window.

Under Select Server Roles select Files Server Resouce Manager and add features.

Select Server Roles


Select “Next” until you reach the “Confirmation” Page and select “Install”

Confirm the components you've selected and select Install

Confirm Installation Selection

Once the installation completes, you may close the resulting Installation Summary window.

Now we’ll setup “Quota Enforcement”. This function allows the server administrator to restrict the size of a folder so that it cannot grow past a certain size. This is useful for mitigating FTP users such that no one user consumes an excessive amount of storage space.

Acesss the File Server Resource Manager through Server manager Tools

Server Manager: File Server Resource Manager

Open Server Manager -> Tools -> Select “File Server Resource Manager”

Under File Server Resource Manager, expand “Quota Management” and select “Create Quota” as seen below:

Under File Server Resource Manager expand “Quota Management”, select “Create Quota” as seen below.

File Server Resource manager: Create Quota

Select the folder you’d like to place a quota on under “Quota Path”. For this example a folder named “quota-test” has been created on the desktop. We will place a 100MB limit on this folder using this utility.

Browse to the folder you'd like to set a quota on and select it.

Create Quota

Next Select “100MB Limit” Under “How do you want to configure Quota Properties” and select “Create”

Select a quota template or create your own.

Create Quota: Properties

That’s it! You’ve now restricted the size of the folder to a maximum of 100MB. As you can see from above, you are not limited to the templates available within the drop down list for your quotas. You may create your own custom quotas as you please and even set up alert notifications. This functionality, however, goes beyond the scope of this article.


Sample Quota

Sample Quota


Since 1995, Atlantic.Net has been providing internet services to customers, including managed, cloud and dedicated hosting.   In 20+ years of service, our solutions have been focused on providing the very best in web solutions to our valued customers!

New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4