We feature technical articles across the entire IT spectrum - CCNA networking, security, operating systems, cloud, and programming.

How to Build Site to Site VPN Between Azure & Cisco ASA

Introduction Within this article we will show you how to build a policy based site to site VPN between Microsoft Azure and a Cisco ASA firewall. Details Before we dive into the steps it is worth mentioning the versions and encryption domain used within this tutorial, Versions Azure Deployment Mode ARM (Azure Resource Manager) ASA … Read more

Microsoft Azure – Virtual Networks (VNets) Explained

vnet-layout

What is a Virtual Network? A Virtual Network, also known as a VNet is an isolated network within the Microsoft Azure cloud. VNets are synonymous to AWS VPC (Virtual Private Cloud), providing a range of networking features such as the ability to customize DHCP blocks, DNS, routing, inter-VM connectivity, access control and Virtual Private Networks … Read more

How to Set the Time Date and Timezone in Ubuntu

In this article we will show you how to set the time, date and timezone within Ubuntu. Steps Set the time zone Set the time and date Sync the hwclock with the current time and date Commands Below are the commands that are required. For the date command this will set the time and date … Read more

How to Configure the UFW Firewall

Introduction The Uncomplicated Firewall (ufw) is a frontend for iptables and is particularly well-suited for host-based firewalls. ufw provides a framework for managing netfilter, as well as a command-line interface for manipulating the firewall. ufw aims to provide an easy to use interface for people unfamiliar with firewall concepts, while at the same time simplifies … Read more

AWS – What is Elastic Compute Cloud (EC2) ?

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud.[1] EC2 is divided into various “families” or instance types. EC2 instances are designed to host different workloads, such as database, web or application services. The customer has root access to the instance, which can be spun up … Read more

How To Adjust the MSS on a Vyatta vRouter

In order to adjust the MSS of your traffic on a vRouter, also known as MSS clamping, a policy route is defined. Once the policy route is created it is then assigned to the outside interface. MSS Clamping is typically used for IPSEC based traffic to ensure that traffic does not exceed the MTU of … Read more

What is SR-IOV (Single Root I/O Virtualization) ?

SR-IOV is a technology, by Intel created to improve the networking performance of virtual machines. Interrupts First of all it is important to explain how interrupts are involved within packet processing. The process to remove and read packets from the wire, in both virtualized and non-virtualized systems is interrupt driven. When a packet is received … Read more

Create Site to Site VPN Between AWS & Vyatta vRouter

Within this article we will show you how to create an IPSEC site to site VPN from a Vyatta vRouter into the AWS cloud. Due to the nature of AWS VPNs, explained further on a tunnel based VPN will be created. The main difference with a route based VPN is that a tunnel interface (VTI) … Read more

AWS S3, Storage Gateways and Import/Export

Simple Storage Service (S3) S3 provides secure, durable and highly scalable object storage. The key features to S3 are, Objects are replicated across availability zones for redundancy. Files can be between 1Byte to 5TB in size Provides unlimited storage Files are stored in Buckets, equivalent to a directory S3 is a universal namespace. i.e buckets … Read more

AWS Virtual Private Cloud (VPC)

VPC (Virtual Private Cloud) allows you to create virtual networks within AWS. This allows you to logically separate resources, add additional security, configure networking attributes (such as routing tables etc) along with build VPNs from your remote site into your AWS solution. Each AWS account comes with a default VPC. Within this VPC subnets are … Read more