Using NAS4Free as network attached storage for vmware over iSCSI
Using iSCSI connected disks for vmware shared storage is pretty painless using NAS4Free to turn a spare computer into a NAS device. This instruction focuses on how to setup NAS4Free with a brief mention at the end on any vmware configuration specifics.
Build a local RHEL updates repository
This article will instruct on how to build a local RHEL software repository that is capable of providing updates to other Red Hat machines on a local network, without having to use RHN for each one.
Configuring an ASA 5505 using current best practices - Part II
Part 2 of a series describing up to date configuration practices for a Cisco ASA in small office environments. This time we are focusing on building an initial firewall policy and examining how it works.
Configuring an ASA 5505 using current best practices
Part 1 of series describing up to date configuration practices for a Cisco ASA in small office environments
Two Factor Authentication for Linux Console and ssh Logins
This article will explain how to authenticate users on a Linux machine using a RADIUS server for central authentication. In this particular example, RADIUS is being used to authenticate users in RSA Authentication Manager for two-factor authentication, specifically local for ssh and console logins.
DIY Checkpoint Firewall Log Analysis
An example of putting together a solution using simple tools for analyzing log data from a Checkpoint firewall. In this example, we take a 5Gb logfile and import only data for a single host into a sqlite database. From there, we run queries to determine what communication goes through the firewall either sourced or destined to this host.