setting_up_a_lucy_master_slave
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
setting_up_a_lucy_master_slave [2018/12/09 23:14] – [Ports and Updates] lucy | setting_up_a_lucy_master_slave [2019/03/01 13:04] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
===== Introduction ===== | ===== Introduction ===== | ||
- | If you setup LUCY within your own infrastructure you don't want users from the internet to access the phishing simulation directly within your intranet. If the server gets compromised, | + | If you setup LUCY within your own infrastructure you don't want users from the internet to access the phishing simulation directly within your intranet. If the server gets compromised, |
{{ setup_lan.png? | {{ setup_lan.png? | ||
Line 12: | Line 12: | ||
===== What is a master/ | ===== What is a master/ | ||
- | LUCY's master/ | + | LUCY's master/ |
* **Master/ | * **Master/ | ||
- | * **Reflective Master/ | + | * **Reflective Master/ |
Please note: There is a caveat with HTTPS - if you generate SSL on master, you have to put it to proxy by hands, as the proxy doesn' | Please note: There is a caveat with HTTPS - if you generate SSL on master, you have to put it to proxy by hands, as the proxy doesn' |
setting_up_a_lucy_master_slave.txt · Last modified: 2020/09/21 08:55 by lucy