article thumbnail

Technology Short Take #50

Scott Lowe

This is kind of cool, and (in my humble opinion) a sign of changing times: Juniper has Vagrant boxes as well as a Vagrant plugin for working with vSRX (virtual firewall) VMs (via this article from Matt Oswalt). Here are some general guidelines for configuring syslog forwarding on a Cisco ASA firewall. Servers/Hardware.

Vmware 60
article thumbnail

Fountainhead: Profiling questions nobody's asking re: cloud.

Fountainhead

N Apps manipulating government data, e.g., where laws require direct data oversight Many government databases are required to be maintained within government facilities behind government firewalls. And most of all, curious to hear whether (and if so, which) service providers & consultancies are currently using guidelines such as these.

Cloud 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 145

Scott Lowe

Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Better patch your vCenter Server instances, as VMware released a security advisory with a long list of CVEs , including one with a severity score of 9.8/10. Networking. are affected).

article thumbnail

Technology Short Take 145

Scott Lowe

Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Better patch your vCenter Server instances, as VMware released a security advisory with a long list of CVEs , including one with a severity score of 9.8/10. Networking. are affected).

article thumbnail

Technology Short Take #57

Scott Lowe

Kirk Byers has a helpful article that provides some suggestions and guidelines for how to make your network automation/network scripts become more than just your own personal hobby at work. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy.

Windows 60