In case there are sources attempting malicious attempts at your environment, we can blacklist them automatically if they exceed a certain severity threshold and tag…
Some websites might not like SSL decryption or due to certificate pinning, There are several ways of doing getting past that, but I’ll be covering…
In this guide, we’ll be covering the best practices for security policies. Explaining the use of App-ID, security profiles, logging options, principles and methodology etc.…
In this article, we’ll be covering how to migrate from a FortiGate firewall to Palo Alto Networks firewalls using the Expedition tool. We can migrate…
QoS (Quality of Service) is used to prioritize certain type of traffic, configure how bandwidth is distributed, allocate a desired amount of performance for a…
In a previous guide, we’ve configured L4-TCP load-balancing in NSX-T and this time around we’ll be configuring the L7-HTTP method with SSL SNI. We’re taking…
In part 1, we’ve configured NSX Advanced Load Balancer with vCenter as the cloud platform and it’s highly recommended starting off with vCenter before attempting…
With the release of NSX-T 3.2, the NSX-T load balancer has been replaced with NSX Advanced Load Balancer (previously known as Avi Networks). NSX ALB…
In this guide we’ll be configuring iSCSI in ESXI with TrueNAS as our storage server. For those who do not have access to another ESXI…
We all have come across this issue when one of our clients fails to connect to our web-server with its public IP address. And everyone…
VRF’s mimic the concept of VLAN’s which break a switch into multiple ‘virtual’ switches or more specifically broadcast domains. VLAN’s operate at layer 2, so…
L2 bridging enables us to migrate VM’s from a classic VDS port group to an overlay-segment. It’s useful to migrate physical workloads to NSX-T in…