Step-by-Step Guide: Setting Up Juniper vSRX3 Appliance
The Juniper vSRX3 is a virtual firewall appliance that delivers next-generation security services in virtualized and cloud environments. It runs…
Set up a Central Log Server with syslog-ng daemon on SUSE Linux Enterprise Server
Centralized logging is essential for monitoring, troubleshooting, and securing enterprise systems. On SUSE Linux Enterprise Server (SLES), the syslog-ng daemon…
Step-by-Step Guide: Setting Up Check Point GAiA as Security Gateway
Gaia is the Check Point next generation operating system for security applications. In Greek mythology, Gaia is the mother of all, which represents closely integrated parts…
Mastering Azure Firewall Forced Tunneling Configuration
In my previous post we saw how to set up an Azure Hub-Spoke Network Architecture by using Azure Firewall and…
Set up an Azure Hub-Spoke Network Architecture by using Azure Firewall and S2S IPSec VPN Cross-premises Network Connection
A hub-spoke network architecture in Azure provides a scalable and secure way to centralize shared services (like Azure Firewall) in a hub virtual…
Mastering Azure Managed Identities
Managing credentials securely is a crucial aspect of building applications in the cloud. Azure Managed Identities simplify this process by…
How to install Azure CLI on Linux
To install Azure CLI on SUSE/OpenSUSE, choose one of the following methods: For other distributions you will find in the…
How to install Azure PowerShell on Linux
To install Azure PowerShell on Linux we first need install PowerShell Core (PowerShell 7 or later) and then install the…
Mastering NFS Protocol Versions and analyze required Traffic
When firewalls are in place between NFS clients and servers, it can be complex when providing NFS version 3 and…
Introduction to Azure Service Principals – How to create and how to use them
In Azure, secure access to resources is a top priority. Two essential tools for achieving this are Service Principals and…
Follow me on LinkedIn
