Remove Course Remove Firewall Remove Hardware Remove Linux
article thumbnail

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Servers/Hardware. Here’s a walkthrough to install Arch Linux on VirtualBox. Thinking of virtualizing Linux on Hyper-V? What’s that? See here.). Virtualization.

Linux 60
article thumbnail

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Next, Jason dives a bit deeper on the relationship between network overlays and hardware , and shares his thoughts on where it does—and doesn’t—make sense to have hardware terminating overlay tunnels.

HP 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Next, Jason dives a bit deeper on the relationship between network overlays and hardware , and shares his thoughts on where it does—and doesn’t—make sense to have hardware terminating overlay tunnels.

HP 61
article thumbnail

Technology Short Take #71

Scott Lowe

Dmitri Kalintsev is back with another article in a series of articles on using hardware VXLAN tunnel endpoints (VTEPs) with VMware NSX. Servers/Hardware. The use of VMware NSX for microsegmentation is a really popular use case, and so the topic of scripting distributed firewall (DFW) rules often comes up. Networking.

Vmware 60
article thumbnail

Technology Short Take #53

Scott Lowe

In this post, I’ve gathered links to posts about networking, virtualization, Docker, containers, Linux, configuration management, and all kinds of other cool stuff. Of course, I’m sure there are trade-offs each way. Servers/Hardware. Welcome to Technology Short Take #53. Here’s hoping you find something useful! Networking.

Vmware 60
article thumbnail

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Think about all the controls we have in place on our networks today: firewalls, authentication systems, intrusion detection and prevention systems (network- and host-based), router and switch security, operating system security, data encryption — the list goes on and on. It’s in this domain that we lump the following: Firewalls.

article thumbnail

AWS re:Invent 2019: Day Two Recap

Linux Academy

This is actual AWS hardware and once installed, AWS will take care of monitoring, maintaining, and upgrading your Outposts. All of the hardware is modular and can be replaced in the field without downtime. Andy also announced Amazon S3 Access Points , a new service that helps firewall your S3 buckets within private networks.

Linux 17