Step-by-Step Guide: Setting up a route-based S2S IPSec VPN Tunnel between Azure and On-Premise by using the Check Point GAiA Security Gateway for the on-premise VPN Device
In one of my last posts we saw how to set up the Check Point GAiA as Security Gateway appliance…
Step-by-Step Guide: Setting Up Juniper vSRX3 Appliance
The Juniper vSRX3 is a virtual firewall appliance that delivers next-generation security services in virtualized and cloud environments. It runs…
Step-by-Step Guide: Setting Up Check Point GAiA as Security Gateway
Gaia is the Check Point next generation operating system for security applications. In Greek mythology, Gaia is the mother of all, which represents closely integrated parts…
Mastering Azure Managed Identities
Managing credentials securely is a crucial aspect of building applications in the cloud. Azure Managed Identities simplify this process by…
Introduction to Azure Service Principals – How to create and how to use them
In Azure, secure access to resources is a top priority. Two essential tools for achieving this are Service Principals and…
How to use a SubCA Certificate issued by our internal AD CS PKI for the Squid Forward Proxy to generate dynamic Host Certificates
In this post we will see how to create and configure a subordinate CA certificate issued by our Active Directory…
Set up the Squid Proxy Server as a Transparent Proxy on SUSE Linux Enterprise
In my previous post we saw the basics about how to setup Squid on SUSE Linux Enterprise (SLES 15 SP5). Now in this…
Set up the Squid Proxy Server on SUSE Linux Enterprise
Squid is a powerful, open-source caching and forwarding web proxy server that can significantly enhance network performance, improve security, and…
How to boot Linux from an Installation/Live CD to either repair a broken System or just to reset the Root Password
When your Linux system fails to boot or you’ve forgotten the root password, a Live CD, USB or ISO for virtual…
How to enable Remote Desktop by using Group Policies
In enterprise environments, enabling Remote Desktop manually on multiple machines can be time-consuming. Instead, Group Policies (GPOs) provides a centralized…
Follow me on LinkedIn
