IT Security & Network Engineering Knowledge Base

Practical documentation and technical guides on network security, firewalls, Linux systems, monitoring, and automation.
We feature technical articles across the entire IT spectrum - Built from real-world experience and continuously updated.

Brocade ADX – The Dynamic Weighted Predictor

The ADX provides a number of loadbalancing methods (also known as predictors) such as round robin and least connections.Within this article we will look at the Dynamic Weighted loadbalancing method. Summary The Dynamic Weighted balancing method is a dynamic predictor that allows you to distribute traffic based upon the resource usage of your server (such … Read more

Serve Multiple Domains from a Single Django Project

Introduction Within this article we will be showing you the necessary steps required to serve multiple domains from within a single Django project. This example will based upon a project named ‘myproject’ and 2 domains named ‘domain1’ and ‘domain2’. Below shows the file structure. /opt/ `– django     |     `– myproject         |– __init__.py … Read more

How do I configure Django to serve my Robots.txt file ?

Within this article we will look at how to configure Django to serve your ‘robots.txt’ file. Though there are a number of methods available to achieve this, this example we will only look at the Django urls.py method. In that only the the urls.py file within your Django project will need to be changed. Example … Read more

How do I import a python module from another folder ?

Within this article we will show you how to import a python module that is located within a different folder. This example will be based upon your folder structure including a folder named ‘module’ and the path ‘/opt/django/myproject/’ already being within your python system path. Example Folder Structure Below shows you a quick example of … Read more

Juniper SRX – How do I configure LACP (802.3ad) ?

IEEE 802.3ad (LACP) is a technology that provides a method of aggregating multiple Ethernet links into a single logical channel. Configuration To configure LACP the following commands are used. This example aggregates the interfaces fe-0/0/3 and fe-0/0/4 into a logical interface named ‘ae1’. This logical interface is then configured as an access port and assigned … Read more

Configure F5 to Equally Distribute HTTP Requests

Question How do I configure my F5 to equally distribute HTTP requests so that each request goes to a different server ? Answer To ensure that each request goes to a different server rather then all requests for a single connection going to the same server you will need to: Disable CMP Clustered Multi-Processing (CMP) … Read more

F5 LTM – Cookie Persistence between HTTP and HTTPS

BACKGROUND In order to to maintain persistence between services (such as HTTP and HTTPS) on a single Virtual Server two persistence methods are available ; Cookie Hashing and Source IP. In order to perform “true” Cookie (insert) persistence across services an iRule is required. Note : Though cookie persistence (insert) can be performed within the … Read more

Brocade ADX – The keepalive command

Within this article we will look into the ‘keepalive’ command. As this command isn’t greatly documented I thought this would be a good opportunity to explain in a little more detail how it works. Keepalive vs Keep-alive First of all it is worth noting that the ‘keepalive’ command (which is configured under the real server) … Read more

Cisco ASA IPSEC VPN using Certificates via SCEP enrollment

Within this article we will be showing the various steps required in configuring a Cisco ASA IPSEC VPN using digital certificates. These certificates will be signed by a CA (Cisco Router) and downloaded by the Client/ASA using SCEP (Simple Certificate Enrollment Protocol). Time/Date On the client, router and firewall ensure that NTP is configured and … Read more