[{"content":"What is vPC? Virtual Port Channel (vPC) lets two Nexus switches appear as a single logical switch to downstream devices. Connected hosts or switches see one port-channel spanning both peers — if one peer fails, traffic continues through the other with no STP reconvergence.\nKey components:\nvPC Peer Link — carries BPDUs, HSRP, control traffic, and orphan port traffic between the two peers. Always a port-channel with at least two 10G/40G/100G members vPC Peer Keepalive — a lightweight heartbeat …","date":"2026-04-08","permalink":"/posts/vpc-nexus-9k/","summary":"What is vPC? Virtual Port Channel (vPC) lets two Nexus switches appear as a single logical switch to downstream devices. Connected hosts or switches see one port-channel spanning both peers — if one …","tags":["vpc","nexus","datacenter","network","cisco","nxos","ccnp"],"title":"vPC on Cisco Nexus 9000"},{"content":"Overview This lab builds a full MPLS L3VPN service across an ISP core (AS 35500) with OSPF Area 0 as the IGP, LDP for label distribution, and MP-BGP (VPNv4) for customer route exchange. Two VPNs — RED (AS 25942) and BLUE (AS 48273) — carry overlapping address space through the same physical infrastructure, demonstrating VRF isolation.\nKey design choices:\nP1 and P4 act as BGP Route Reflectors — PEs only peer with these two, no full-mesh iBGP required as-override on all PE-CE peerings since both …","date":"2026-04-01","permalink":"/posts/mpls-l3vpn-small-lab/","summary":"Overview This lab builds a full MPLS L3VPN service across an ISP core (AS 35500) with OSPF Area 0 as the IGP, LDP for label distribution, and MP-BGP (VPNv4) for customer route exchange. Two VPNs — RED …","tags":["mpls","vpn","network","ccnp","cisco"],"title":"MPLS L3VPN Lab"},{"content":"Hi everyone, in this lab I\u0026amp;rsquo;ll walk you through how to configure a Dual Hub DMVPN Phase3 - IPSec topology.\nThis is a pre-ready topology — I\u0026amp;rsquo;ve already configured basic interface IP addresses and underlay routing, so I\u0026amp;rsquo;ll focus on exactly the relevant parts of this lab.\nI\u0026amp;rsquo;ll start by configuring the Hubs.\nHere is the topology:\nHUB-1: IPSEC: HUB-1(config)#crypto isakmp policy 10 HUB-1(config-isakmp)#? ISAKMP commands: authentication Set authentication method for protection …","date":"2026-04-01","permalink":"/posts/dmvpn-phase3-ipsec1-ospf/","summary":"Hi everyone, in this lab I\u0026rsquo;ll walk you through how to configure a Dual Hub DMVPN Phase3 - IPSec topology.\n","tags":["dmvpn","vpn","ospf","ipsec","network","ccnp","cisco"],"title":"DMVPN Phase 3 Dual Hub with IPSec Lab"},{"content":"Hi everyone, in this article I will walk you through how to configure OSPF Route Filtering through a lab in the exhibit.\nBy default, there is no configuration for route filtering, so routers accept all advertisements and write them into their routing table.\nBut what if we do not want to see any specific route in our routing table?\nThis is where Route Filtering comes in. Route filtering is used to prevent unwanted routes from being written into the routing table.\nImportant Note: In OSPF, …","date":"2026-02-16","permalink":"/posts/ospf-route-filtering/","summary":"Hi everyone, in this article I will walk you through how to configure OSPF Route Filtering through a lab in the exhibit.\n","tags":["ospf","routing","network","cisco"],"title":"OSPF Route Filtering"},{"content":"ICMP Request and Reply icmp.type==8 #Request icmp.type==0 #Reply icmp.type==8 or icmp.type==0 #BothTCP Flags URG (Urgent) ACK (Acknowledgement) PSH (Push) RST (Reset) SYN (Synchronize) FIN (Finish) ECN (Explicit Congestion Notification)SYN Request tcp.flags.syn==1SYN+ACK Reply tcp.flags.syn==1 and tcp.flags.ack==1TCP Null Scan tcp.flags==0x00TCP RST tcp.flags.reset==1SYN and FIN Flags tcp.flags==0x003OS Fingerprinting (tcp.flags==0x02) \u0026amp;amp;\u0026amp;amp; (tcp.window_size \u0026amp;lt; 1025)FTP Brute Force …","date":"2026-02-16","permalink":"/posts/wireshark-filters/","summary":"ICMP Request and Reply","tags":["wireshark","soc","networkforensics"],"title":"Wireshark Filters"},{"content":"This guide will walk you through setting up ClamAV antivirus integrating it with Wazuh for centralized security monitoring. This setup enables automatic malware detection, detailed logging through the Wazuh security platform.\nPart 1: Install ClamAV Step 1: Install ClamAV and Dependencies Update your package list and install ClamAV along with its daemon, update tool, and inotify utilities:\nsudo apt update sudo apt install clamav clamav-daemon clamav-freshclam inotify-tools -yPackage descriptions: …","date":"2026-01-20","permalink":"/posts/wazuh-clamav/","summary":"This guide will walk you through setting up ClamAV antivirus integrating it with Wazuh for centralized security monitoring. This setup enables automatic malware detection, detailed logging through the …","tags":["wazuh","clamav","linux","soc"],"title":"Wazuh ClamAV Monitoring"},{"content":"Velociraptor is a powerful digital forensics and incident response (DFIR) platform that allows security teams to collect, monitor, and hunt across endpoints. This guide will walk you through installing both the Velociraptor server and client components.\nPart 1: Server Installation Step 1: Download Velociraptor Create a setup directory and download the latest Velociraptor binary:\nmkdir ~/velociraptor_setup \u0026amp;amp;\u0026amp;amp; cd ~/velociraptor_setup # Download the latest version (check GitHub for the …","date":"2026-01-05","permalink":"/posts/velociraptor-installation/","summary":"Velociraptor is a powerful digital forensics and incident response (DFIR) platform that allows security teams to collect, monitor, and hunt across endpoints. This guide will walk you through …","tags":["velociraptor","dfir","soc"],"title":"Velociraptor Installation"},{"content":"Hi everyone! In this article, I would like to share my latest research about a script I\u0026amp;rsquo;ve recently observed on my honeypot project.\nRecently, I spun up an AI-supported honeypot called Beelzebub, a simple, AI-supported honeypot, to hunt bad actors and analyze their behaviors after gaining access to a machine.\nI used a simple SSH configuration file with a valid ChatGPT API key to make this machine AI-supported.\napiVersion: \u0026amp;#34;v1\u0026amp;#34; protocol: \u0026amp;#34;ssh\u0026amp;#34; address: \u0026amp;#34;:2222\u0026amp;#34; …","date":"2025-11-16","permalink":"/posts/a-honeypot-research/","summary":"Hi everyone! In this article, I would like to share my latest research about a script I\u0026rsquo;ve recently observed on my honeypot project.\n","tags":["honeypot","soc","hetzner","linux","beelzebub"],"title":"A Honeypot Research"},{"content":"Hi everyone, in this article I would like to introduce you to my new project about visualizing Beelzebub logs, which is an AI-supported open-source honeypot solution that I modified slightly to achieve higher efficiency.\nRecently I spun up a cloud machine where I run a Beelzebub honeypot to collect IOCs, attack types, malware samples, etc., and I was having some difficulty dealing with log files to see the big picture.\nThen I decided to create a project to increase the observability, efficiency, …","date":"2025-11-11","permalink":"/posts/beelzebub-dashboard/","summary":"Hi everyone, in this article I would like to introduce you to my new project about visualizing Beelzebub logs, which is an AI-supported open-source honeypot solution that I modified slightly to …","tags":["honeypot","soc","hetzner","linux","beelzebub"],"title":"Beelzebub Dashboard"},{"content":"Hi everyone! In this article I’ll walk you through installing and configuring Fail2Ban and then show you how to integrate it with Wazuh.\nFail2Ban scans log files for repeated authentication failures and automatically bans the offending IP address. Pairing Fail2Ban with Wazuh gives you centralized visibility over those bans and unbans across all of your monitored hosts.\nInstallation Update your package index and install Fail2Ban:\nsudo apt update sudo apt install fail2banVerify the installation: …","date":"2025-11-07","permalink":"/posts/wazuh-fail2ban/","summary":"Hi everyone! In this article I’ll walk you through installing and configuring Fail2Ban and then show you how to integrate it with Wazuh.\n","tags":["wazuh","soc","fail2ban","linux"],"title":"Wazuh Fail2ban Integration"},{"content":"Hi everyone! In this article I’ll walk you through installing Auditd on a Linux system and integrating it with Wazuh.\nAuditd (the Linux Auditing System) records security-relevant activity so you can understand what is happening on your hosts. By tailoring the ruleset, you can increase visibility and build detections that match your environment.\nInstallation Install Auditd on Debian/Ubuntu with the following command:\nsudo apt -y install auditdStart the service and enable it at boot:\nsudo …","date":"2025-11-07","permalink":"/posts/wazuh-auditd/","summary":"Hi everyone! In this article I’ll walk you through installing Auditd on a Linux system and integrating it with Wazuh.\n","tags":["wazuh","linux","auditd","siem"],"title":"Wazuh Auditd Integration"},{"content":"Hi everyone! In this article I will walk you through installing Suricata on Ubuntu 24.04 and integrating its logs with Wazuh for centralized monitoring.\nInstalling Suricata Start by adding the official Suricata PPA, then update the package cache and install Suricata:\nsudo add-apt-repository ppa:oisf/suricata-stable -y sudo apt update sudo apt install suricata -yEnable Suricata to start automatically and launch the service:\nsudo systemctl enable suricata sudo systemctl start suricataSuricata …","date":"2025-11-07","permalink":"/posts/wazuh-suricata/","summary":"Hi everyone! In this article I will walk you through installing Suricata on Ubuntu 24.04 and integrating its logs with Wazuh for centralized monitoring.\n","tags":["wazuh","suricata","soc","linux"],"title":"Wazuh Suricata Integration"},{"content":"Hi everyone, in this article I\u0026amp;rsquo;ll introduce you to Wazuh\u0026amp;rsquo;s File Integrity Monitoring feature.\nFIM is one of Wazuh\u0026amp;rsquo;s most powerful features that monitors your environments for new files, changes, and more.\nWith this feature, you have great monitoring, visibility, and awareness capabilities over your environments.\nYou can also integrate it with YARA, VirusTotal, ClamAV, and CDB Lists to identify whether files are harmful or not. This is a great capability, and I\u0026amp;rsquo;ll show you …","date":"2025-11-07","permalink":"/posts/wazuh-fim/","summary":"Hi everyone, in this article I\u0026rsquo;ll introduce you to Wazuh\u0026rsquo;s File Integrity Monitoring feature.\n","tags":["wazuh","fim","linux"],"title":"Wazuh File Integrity Monitoring (FIM)"},{"content":"Hi everyone. In this article, I\u0026amp;rsquo;ll walk you through my research on an AI-powered honeypot project that I deployed in the cloud to observe various attacker Tactic and Technics.\nI built a honeypot in a cloud environment using Beelzebub, an AI-supported honeypot, to evaluate how effective it is—and it performed very well.\nBefore AI honeypots, you typically had two choices: convert a real machine into a honeypot (very effective but risky), or deploy traditional honeypots (safer but easier for …","date":"2025-10-29","permalink":"/posts/a-honeypot-story/","summary":"Hi everyone. In this article, I\u0026rsquo;ll walk you through my research on an AI-powered honeypot project that I deployed in the cloud to observe various attacker Tactic and Technics.\n","tags":["honeypot","soc","hetzner","linux","beelzebub"],"title":"A Honeypot Story"},{"content":"Hi everyone, in this article I will guide you how to install Splunk Enterprise on Linux server and Universal Forwarder on Ubuntu Client.\nSplunk is one of the best SIEM solution that stands out with its comprehensive, valuable and strong features. Splunk is a Cisco company which means it has a strong development background.\nWe can install and use Splunk for free with trial version.\nHere is how to download and install.\nSplunk Enterprise Installation The first thing we should do is download the …","date":"2025-10-02","permalink":"/posts/splunk-installation/","summary":"Hi everyone, in this article I will guide you how to install Splunk Enterprise on Linux server and Universal Forwarder on Ubuntu Client.\n","tags":["soc","siem","splunk"],"title":"Splunk Installation"},{"content":"Hi everyone!\nIn this article, I will walk you through the complete process of setting up a Network Address Translation (NAT) network on Proxmox. This setup will allow your virtual machines to access the internet through your Proxmox host while maintaining network isolation.\nCreate a Linux Bridge The first step is to create a Linux Bridge interface. This will serve as the foundation for our NAT network.\nConfigure IPv4/CIDR Address Next, we need to assign an IPv4/CIDR address to the new Linux …","date":"2025-10-02","permalink":"/posts/proxmox-nat-configuration/","summary":"Hi everyone!\n","tags":["virtualization","network","proxmox","nat"],"title":"Proxmox NAT Configuration"},{"content":"Hi everyone, in this article I will discuss the second way of migration from VMware to Proxmox.\nIt is of course easier and more effortless than the manual way.\nThe migration process will be as follows.\nMigration Steps As you can see, the VM has been successfully imported automatically. However, you should install the necessary drivers and remove VMware Tools from the VM when you import a Windows machine.\nThank you for taking the time to read this article. I hope you found it helpful.\nKeep up the …","date":"2025-10-02","permalink":"/posts/vmware-proxmox-migration-auto/","summary":"Hi everyone, in this article I will discuss the second way of migration from VMware to Proxmox.\n","tags":["virtualization","proxmox","vmware"],"title":"Vmware to Proxmox Migration Automatically"},{"content":"Hi everyone! In this article, I\u0026amp;rsquo;d like to introduce you to YARA rules, which are powerful detection rules widely used in cybersecurity to identify malware and other suspicious patterns.\nWhat are YARA Rules? YARA rules are pattern-matching rules that help security professionals detect specific characteristics in files, such as malware signatures, suspicious strings, or other indicators of compromise. They\u0026amp;rsquo;re essential tools in the cybersecurity analyst\u0026amp;rsquo;s toolkit.\nBasic YARA Rule …","date":"2025-08-31","permalink":"/posts/yara-rules/","summary":"Hi everyone! In this article, I\u0026rsquo;d like to introduce you to YARA rules, which are powerful detection rules widely used in cybersecurity to identify malware and other suspicious patterns.\n","tags":["yara","soc"],"title":"Understanding YARA Rules"},{"content":"Hi everyone,\nIn this article, I will walk you through Windows Logon Types.\nWindows operating systems support multiple logon types, each designed for specific authentication scenarios. Understanding these logon types is crucial for system administrators, security professionals, and anyone managing Windows environments.\nBelow is a concise overview of the main logon types, along with real-world examples for each.\n1. Interactive Logon (Type 2) Description:\nOccurs when a user logs on to a computer …","date":"2025-08-31","permalink":"/posts/windows-logon-types/","summary":"Hi everyone,\n","tags":["windows","logontypes","soc"],"title":"Windows Logon Types"},{"content":"Hi everyone,\nIn this article, I will walk you through how to delete a user from Wazuh server. There are a few ways to do this.\nHere is one of the simple way to delete a client from Wazuh server.\nDeleting the Client You can delete a user by following the commands that are shown in the images below.\nThank you for taking time to read this article, I hope you will find it helpful.\nKeep up the great work!\n","date":"2025-08-31","permalink":"/posts/removing-client-wazuh/","summary":"Hi everyone,\n","tags":["wazuh","siem"],"title":"Remove a Client on Wazuh Server"},{"content":"Hi everyone,\nIn this article, I will walk you through how to install DHCP Server Role in Windows Server.\nSteps will be as follows\n1 - Install DHCP Server Role Server Manager \u0026amp;gt; Add roles and features\n2 - Configure DHCP Server Server Manager \u0026amp;gt; DHCP\nThat\u0026amp;rsquo;s all.\nThank you for taking time to read this article, I hope you will find it helpful.\nKeep up the great work!\n","date":"2025-08-31","permalink":"/posts/windows-dhcp-server/","summary":"Hi everyone,\n","tags":["windows","dhcp"],"title":"DHCP Server Installation On Windows Server 2022"},{"content":"Hi everyone! In this article, I will take you through my Security Operation Center environment on Hetzner, which is a German company that provides web hosting services and data centers.\nI want to start by sharing my excitement with you.\nI have been interested in IT for some time and have built several lab environments, ranging from small to large. After gaining experience, I wanted to build my own SOC environment to gain more real-life experience.\nI have learned many things that have sharpened …","date":"2025-08-17","permalink":"/posts/soc-setup/","summary":"Hi everyone! In this article, I will take you through my Security Operation Center environment on Hetzner, which is a German company that provides web hosting services and data centers.\n","tags":["soc","proxmox","wazuh","firewall","pfsense","volacilaptor","thehive","cortex","network","windows","linux","honeypot","checkmk"],"title":"Security Operation Center Setup"},{"content":"Hi everyone, in this article I will guide you how to integrate Sysmon and Wazuh SIEM tool.\nSysmon is a tool that allows us to collect and analyse logs easier in a center. Sysmon has also some other benefits that makes our investigations easier.\nSysmon is used in Linux systems as well. (https://github.com/microsoft/SysmonForLinux)\nIn this article I will show you how to download, install Sysmon and then how to send Sysmon logs into Wazuh SIEM tool.\nSteps will be as follows.\nDownload the Sysmon …","date":"2025-08-12","permalink":"/posts/wazuh-sysmon-integration/","summary":"Hi everyone, in this article I will guide you how to integrate Sysmon and Wazuh SIEM tool.\n","tags":["wazuh","windows","sysmon"],"title":"Wazuh Sysmon Integration"},{"content":"Hi everyone, in this article I will guide you through how to integrate Fortigate firewall with the Wazuh SIEM tool for centralized logging and monitoring.\nFortigate is one of the best firewall solutions used in networks of all sizes worldwide. Wazuh is also one of the best open-source SIEM platforms available.\nIn this article, I will show you how to send Fortigate logs to the Wazuh SIEM platform to centralize all environment logs in one location.\nThe integration will be done in the following …","date":"2025-07-19","permalink":"/posts/fortigate-wazuh-integration/","summary":"Hi everyone, in this article I will guide you through how to integrate Fortigate firewall with the Wazuh SIEM tool for centralized logging and monitoring.\n","tags":["fortigate","wazuh","soc","siem","syslog","firewall"],"title":"Fortigate Wazuh Integration"},{"content":"Hi everyone, in this article I will guide you through how to integrate Cisco devices (switches and routers) with the Wazuh SIEM tool for centralized logging and monitoring.\nThe integration will be done in the following steps:\nCisco Switch Configuration # VLAN Configuration for Switch Switch\u0026amp;amp;gt;enable Switch#configure terminal Switch(config)#interface vlan1 Switch(config-if)#ip address 10.1.5.100 255.255.255.0 Switch(config-if)#no shutdown Switch(config-if)#exit # Default Gateway …","date":"2025-07-19","permalink":"/posts/cisco-wazuh-integration/","summary":"Hi everyone, in this article I will guide you through how to integrate Cisco devices (switches and routers) with the Wazuh SIEM tool for centralized logging and monitoring.\n","tags":["cisco","switch","router","wazuh","siem","syslog"],"title":"Cisco Device Syslog Integration with Wazuh SIEM"},{"content":"In modern networks, accurate time synchronization is crucial for tasks such as logging, authentication, and system coordination. Network Time Protocol (NTP) is a widely used protocol that allows devices on a network to synchronize their clocks with a reliable time source. This guide will walk you through the configuration of NTP on Cisco devices, including manual time setup, using a device as an NTP server, authentication, and debugging.\nUDP Port: 123 The closest router to the Atomic Clock is …","date":"2025-05-13","permalink":"/posts/ntp/","summary":"In modern networks, accurate time synchronization is crucial for tasks such as logging, authentication, and system coordination. Network Time Protocol (NTP) is a widely used protocol that allows …","tags":["ntp","cisco"],"title":"Network Time Protocol (NTP)"},{"content":"Hi everyone,\nIn this article, I will walk you through Network Address Translation (NAT)—what it is, how it works, why we use it, and how to configure it using a lab.\nNAT (Network Address Translation) is a method used in routers and firewalls that allows private IP addresses within a local network to access the public internet using a single or a few public IP addresses.\nSince private IP addresses (e.g., 192.168.x.x, 10.x.x.x, 172.16.x.x–172.31.x.x) are not routable on the internet, NAT …","date":"2025-05-13","permalink":"/posts/nat/","summary":"Hi everyone,\n","tags":["nat","pat"],"title":"Network Address Translation (NAT)"},{"content":"Hi everyone, in this article I will show you two methods for migrating virtual machines from VMware to Proxmox.\nThere are two ways to perform a VMware to Proxmox migration:\nManual Method: In this approach, you need to export the .vmdk and .ovf files from the ESXi host and import them into Proxmox using the following command:\nqm importdisk \u0026amp;lt;VM-ID\u0026amp;gt; \u0026amp;lt;TheNameOfvmdk\u0026amp;gt; \u0026amp;lt;StorageName\u0026amp;gt; -format raw|qcow2 qm importdisk 100 Win22.vmdk local-lvm -format raw Automatic Method: This method …","date":"2025-04-19","permalink":"/posts/proxmox-vmware-migration/","summary":"Hi everyone, in this article I will show you two methods for migrating virtual machines from VMware to Proxmox.\n","tags":["proxmox","virtualization"],"title":"Vmware to Proxmox Migration"},{"content":"Hi everyone, in this article I will show you how to migrate virtual machines between nodes where in the cluster.\nI have 2 virtual machines running, one of them is Centos-7 on node-1 and the other one is WIN-SERVER-2022 on node-2.\nI will migrate them vice versa at the same time and will start a ping in case to be able to see any outage.\nSteps will be as follows.\nThe IP address of Centos-7 is 192.168.1.214/24 The IP address of WIN-SERVER-2022 is 192.168.1.215/24\nEach of them is running right now …","date":"2025-04-19","permalink":"/posts/proxmox-live-migration/","summary":"Hi everyone, in this article I will show you how to migrate virtual machines between nodes where in the cluster.\n","tags":["proxmox","virtualization "],"title":"Proxmox Live Migration"},{"content":"Hi everyone, in this article I will show you how to configure LACP between Proxmox and a L2 Cisco Switch.\nLACP (Link Aggregation Control Protocol) is used to combine multiple physical interfaces into a single logical interface. This provides benefits such as load balancing, redundancy, and high availability.\nWhen aiming for load balancing, redundancy, and high availability, LACP becomes an essential configuration.\nHere\u0026amp;rsquo;s how to configure:\nL2 Cisco Switch I will use Fa0/1, Fa0/2 interfaces …","date":"2025-04-19","permalink":"/posts/proxmox-lacp/","summary":"Hi everyone, in this article I will show you how to configure LACP between Proxmox and a L2 Cisco Switch.\n","tags":["proxmox","virtualization"],"title":"Proxmox LACP"},{"content":"Hi everyone, in this article I will show you how to create Proxmox Cluster and how a node joins to the cluster.\nCreating Cluster on Proxmox is not that hard or complex thing.\nI have 2 single Proxmox nodes, node-1 and node-2. I will create cluster on node-1 and will add node-2 to the cluster.\nSteps are as follows.\nCreating the Cluster Joining a Node to the Cluster The cluster has been successfully installed. It is time to join.\nFirst we need to have \u0026amp;ldquo;join information\u0026amp;rdquo; token.\nnode-2\nI …","date":"2025-04-19","permalink":"/posts/proxmox-cluster-creation/","summary":"Hi everyone, in this article I will show you how to create Proxmox Cluster and how a node joins to the cluster.\n","tags":["proxmox","virtualization"],"title":"Proxmox Cluster Creation"},{"content":"Hi everyone, in this article, I will explain what DTP is and how it works.\nDTP is a protocol that allows switch ports to be configured automatically.\nIn simple terms, if you change the mode of one port on a switch, the corresponding port on the connected switch will automatically adjust its mode. You can refer to the table below to see the possible mode combinations.\nFor example, if one port of a switch is dynamic auto and the port to which the other switch is connected is trunk, the ports will …","date":"2025-04-02","permalink":"/posts/dynamic-trunking-protocol/","summary":"Hi everyone, in this article, I will explain what DTP is and how it works.\n","tags":["cisco","dtp"],"title":"Dynamic Trunking Protocol (DTP)"},{"content":"Hi everyone, in this article I will show you how to configure dynamic routing in Junos.\n[edit] root# edit protocols ospf area 0 [edit protocols ospf area 0.0.0.0] root# set interface ge-0/0/0 OR\n[edit] root# set protocols ospf area 0.0.0.0 interface ge-0/0/0 Verification root# show |compare [edit] + protocols { + ospf { + area 0.0.0.0 { + interface ge-0/0/0.0; + } + } + }Thank you for taking the time to read this article. I hope you found it useful.\nKeep up the great work!\n","date":"2025-04-02","permalink":"/posts/juniper-dynamic-routing/","summary":"Hi everyone, in this article I will show you how to configure dynamic routing in Junos.\n","tags":["juniper","junos","ospf"],"title":"Junos Dynamic Routing"},{"content":"In Junos devices static routing configuration will be done in the following way.\nRouting Preferences - Direct/Local 0 - Static Route 5 - OSPF Internal 10 - ISIS Internal L1/L2 15-18 - RIP 100 - OSPF External 150 - ISIS External L1/L2 160/165 - BGP 170Static Route Configuration [edit] root# edit routing-options [edit routing-options] root# set static route 10.10.10.0/24 next-hop 9.9.9.1OR\n[edit] root# set routing-options static route 10.10.10.0/24 next-hop 9.9.9.1Adding a backup route with …","date":"2025-04-02","permalink":"/posts/juniper-static-routing/","summary":"In Junos devices static routing configuration will be done in the following way.\n","tags":["juniper","junos"],"title":"Junos Static Routing"},{"content":"In this article I will show you user accounts in Junos.\nLogin Classes:\nIn Junos you can create a login class to assign detailed privileges per class and add user to that class.\nAuthorization:\nsuper-user: all permissions operator: clear, reset, trace, view read-only: view unauthorized: nothing Allowed or denied commands can be specified for each class.\nUser Authentication:\nIn Junos you can authenticate users by;\nLocal Database, Radius Server, Tacacs Server. User Creating:\n[edit] root# set system …","date":"2025-04-02","permalink":"/posts/juniper-user-accounts/","summary":"In this article I will show you user accounts in Junos.\n","tags":["juniper","junos"],"title":"Junos User Accounts"},{"content":"Hi everyone, in this article I will cover on how to make initial configuration in Junos.\nRoot Password: root\u0026amp;gt; configure Entering configuration mode [edit] root# set system root-authentication plain-text-password New password: Retype new password:Hostname: [edit] root# set system host-name ssnrshnn System Time: root\u0026amp;gt; set date 202503241608 date: connect: Can\u0026amp;#39;t assign requested address Mon Mar 24 16:08:00 UTC 2025 root\u0026amp;gt; show system uptime Current time: 2025-03-24 16:08:11 UTC Time …","date":"2025-04-02","permalink":"/posts/juniper-initial-configuration/","summary":"Hi everyone, in this article I will cover on how to make initial configuration in Junos.\n","tags":["juniper","junos"],"title":"Junos Initial Configuration"},{"content":"Hi everyone, in this article I will show you how to install the Active Directory Domain Controller role on a Windows Server 2022.\nBefore starting the installation, we need to configure a few things.\nStatic IP Address First, we need to assign a static IP address to our server.\nHostname Configuration Next, we need to assign a hostname. Please note that this process will require a restart.\nUpdates After rebooting, let\u0026amp;rsquo;s check for updates.\nTime \u0026amp;amp; Date Configuration While updating, …","date":"2025-03-18","permalink":"/posts/ad-dc-installation/","summary":"Hi everyone, in this article I will show you how to install the Active Directory Domain Controller role on a Windows Server 2022.\n","tags":["activedirectory","domaincontroller","windows"],"title":"Active Directory Domain Controller Installation"},{"content":"Hi everyone,\nIn this article, I will cover how to create a virtual machine on an ESXi node.\nESXi nodes are typically not used as standalone servers; they are usually managed centrally with vCenter, which allows for easier management of multiple ESXi nodes.\nHowever, in this article, I will show you how to create a virtual machine directly on an ESXi node.\nI will walk you through the process of creating, installing, and configuring Windows Server 2022 as an AD-DC (Active Directory Domain …","date":"2025-03-18","permalink":"/posts/esxi-vm-creating/","summary":"Hi everyone,\n","tags":["esxi","virtualization","vmware"],"title":"ESXi Creating Virtual Machine"},{"content":"Hi everyone, in this article I will show you ESXi initial configuration and demonstrate how to install Windows Server 2022 as a virtual machine.\nAfter installing ESXi, we need to configure some essential things such as NTP, Licence, Users, Roles etc.\nAdditionally, I will show you how to upload an ISO image and how to install a virtual machine.\nLicense First, I will show you how to assign a license to an ESXi node. To obtain a license, you can visit the Broadcom Website. I will use a license that …","date":"2025-03-18","permalink":"/posts/esxi-initial-configuration/","summary":"Hi everyone, in this article I will show you ESXi initial configuration and demonstrate how to install Windows Server 2022 as a virtual machine.\n","tags":["esxi","vmware","virtualization"],"title":"ESXi Initial Configuration"},{"content":"In this article I will show you how to install ESXi that a commonly used virtualization software in the industry providing lots of feature to solve issues that help IT guys quite a lot.\nESXi is one of the famous virtualization software used on servers. When it comes to talking about virtualization software, it is like a cornerstone because virtualization software helps us to virtualize our hardware, easy management, efficiency, cost benefits, isolation, fast deployment and more.\nHere is a brief …","date":"2025-03-09","permalink":"/posts/esxi-installation/","summary":"In this article I will show you how to install ESXi that a commonly used virtualization software in the industry providing lots of feature to solve issues that help IT guys quite a lot.\n","tags":["esxi","virtualization","vmware"],"title":"ESXi Installation"},{"content":"Hello everyone, in this LAB I will configure GRE over IPSec Tunnels with following topology.\nIn this topology some configurations have been done. So networks can already reach with each other. I will just focus on GRE over IPSec Tunnels between the networks of Customer-A and Customer-B.\nGRE Subnet for Customer-A: 192.168.1.0/24\nGRE Subnet for Customer-B: 192.168.2.0/24\nR1 #GRE CONFIGURATION R1(config)#int tunnel 1 R1(config-if)#ip addr 192.168.1.10 255.255.255.0 R1(config-if)#tunnel source e0/1 …","date":"2025-02-21","permalink":"/posts/gre-over-ipsec-lab/","summary":"Hello everyone, in this LAB I will configure GRE over IPSec Tunnels with following topology.\n","tags":["gre","ipsec","cisco","ios"],"title":"GRE Over IPSEC LAB"},{"content":"Hello everyone, in this LAB I will configure GRE Tunnels.\nI will implement the following topology. In this topology some configurations have been done. So networks can already reach with each other. I will just focus on GRE Tunnels between the networks of Customer-A and Customer-B.\nI will use 192.168.1.0/24 subnet for Customer-A, 192.168.2.0/24 subnet for Customer-B.\nR1 #TUNNEL CONFIGURATION R1\u0026amp;amp;gt;en R1#conf t R1(config)#int tunnel 1 R1(config-if)#ip addr 192.168.1.10 255.255.255.0 …","date":"2025-02-21","permalink":"/posts/gre-lab/","summary":"Hello everyone, in this LAB I will configure GRE Tunnels.\n","tags":["gre","cisco"],"title":"GRE LAB"},{"content":"Hello everyone, in this LAB I will configure GRE Tunnels with following topology.\nR1 #INTERFACE CONFIGURATION R1#conf t R1(config)#int e0/0 R1(config-if)#ip addr 10.0.1.1 255.255.255.0 R1(config-if)#no sh R1(config-if)#int e0/1 R1(config-if)#ip addr 1.1.1.2 255.255.255.252 R1(config-if)#no sh R1(config-if)#exit #OSPF R1(config)#router ospf 1 R1(config-router)#network 1.1.1.0 0.0.0.3 area 0 R1(config-router)#network 10.0.1.0 0.0.0.255 area 0 R1(config-router)#exitR2 #INTERFACE CONFIGURATION …","date":"2025-02-21","permalink":"/posts/vrf-lite-lab/","summary":"Hello everyone, in this LAB I will configure GRE Tunnels with following topology.\n","tags":["vrf","cisco"],"title":"VRF-Lite Configuration"},{"content":"Hi everyone, in this article, I will show you how to configure an SSH server in detail.\nSSH (Secure Shell Protocol) is a widely-used protocol that securely connects and manages remote servers. In this tutorial, you will learn how to set up and configure an SSH server from scratch.\nTo set up an SSH server, you need to install the openssh-server package on the server and the openssh-client package on the client.\nFor this demonstration, I will use a Fedora server and an Ubuntu client.\nAlthough …","date":"2025-02-08","permalink":"/posts/ssh-server-configuration/","summary":"Hi everyone, in this article, I will show you how to configure an SSH server in detail.\n","tags":["ssh","linux"],"title":"SSH Server Configuration"},{"content":"Hi there, in this article, I will show you how to switch netplan to NetworkManager to manage network interfaces on Ubuntu.\nAs you know, Ubuntu uses netplan as the default tool for network management. However NetworkManager is often a better choice due to its advanced features and ease of use.\nIn this guide, I’ll walk you through the steps to install and configure NetworkManager on an Ubuntu Server.\nStep 1: Install NetworkManager First, we need to install the network-manager package on our Ubuntu …","date":"2025-01-24","permalink":"/posts/network-manager-installation/","summary":"Hi there, in this article, I will show you how to switch netplan to NetworkManager to manage network interfaces on Ubuntu.\n","tags":["linux","networkmanager"],"title":"NetworkManager Installation"},{"content":"Hello there!\nIn this article, I’m going to show you how to install and configure a DHCP server.\nI’m going to install the DHCP server role on an Ubuntu server. However, the process is almost the same for all distributions.\nInstalling the Package We need to install the isc-dhcp-server package for DHCP role.\nLet\u0026amp;rsquo;s get started.\nubuntu@ubuntu:~$ sudo apt install isc-dhcp-serverAfter the package is installed, let’s check the service called isc-dhcp-server.\nubuntu@ubuntu:~$ systemctl status …","date":"2025-01-23","permalink":"/posts/dhcp-server/","summary":"Hello there!\n","tags":["dhcp","linux","ubuntu"],"title":"DHCP Server Configuration"},{"content":"In this article I am going to talk about Linux process Prioritization.\nSometimes we may want to prioritize our more important processes in Linux.\nWe prioritize process or processes that are more important for us with \u0026amp;ldquo;NICE\u0026amp;rdquo; parameters.\nEach process has a \u0026amp;ldquo;NICE\u0026amp;rdquo; value. This value prioritizes processes.\nThe lower we set this value, the higher the priority of the process. However, this value can only be set between \u0026amp;ldquo;+20\u0026amp;rdquo; and \u0026amp;ldquo;-20\u0026amp;rdquo;.\nWe can arrange this …","date":"2025-01-11","permalink":"/posts/linux-process-prioritization/","summary":"In this article I am going to talk about Linux process Prioritization.\n","tags":["linux"],"title":"Linux Process Prioritization"}]