Http Security Headers In IIS

Http Security Headers setting in IIS to Prevent Vulnerabilities.

In this article I will talk about Http Security Headers types and I will show you the steps to secure WebPages and IIS server from Clickjacking, code injection, MIME types, XSS, etc

I will show you how to add HTTP Response Headers using GUI in IIS Manager or add to the web.config file:

more..

DevOps

What is DevOps and what was the need behind it?

DevOps methodology come as a response to this need for better collaboration and faster delivery. DevOps enables continuous software delivery and faster resolution of problems.

more…

 

Site to Site VPN behind router (ADSL)

In most cases, a branch (remote) office uses a static outside IP address to connects to a main office and we covered that in a previous post.

We configured a site-to-site IPsec VPN between two Cisco ASA firewalls with static IP address on both end, and also we covered site-to-site VPN with Dynamic IP on one end.

What if one of the remote ASA firewall at branch office is behind provider router (ADSL) and have a dynamic public IP from the ISP?

In this post I will take you through the steps to configure a PPPoE, IPsec/GRE VPN tunnel behind provider router (ADSL) with dynamic IP in the remote office.

more …

 

Cisco Site to Site VPN (Dynamic to Static)

In most cases, a branch office uses a static outside IP address to connects to a main office by configuring a site-to-site IPsec VPN between two Cisco ASA firewalls with static IP address on both end, But what if one of the remote ASA firewalls has a dynamic IP address?

more …

Cisco Router – Switch DHCP server configuration

DHCP server on a Cisco router or switch.

DHCP is an application layer protocol used to distribute network configuration parameters, such as IP addresses, subnet masks, default gateways, etc.. to devices on the network. a DHCP client send request to a DHCP server. A DHCP server is assigns network parameters (IP address) to the DHCP client from configured IP addresses pool.

Cisco router and switches can be configured as a DHCP server, In this post I will walks you through the configuration process.

more …

How to Log Windows Firewall Activity

Firewall Logging is Useful to verify if newly added firewall rules are working or not, to identify malicious activity,  and to determine if the firewall is dropping packet which causes application  failures.

By default, the Firewall log is disabled.

more …

Create Vagrant Box from Existing VM

How to create a Vagrant Box from Existing VM

There are a many of amazing boxes out there available on vagrantcloud.com and other site, But there is still a need to build a custom box.
Maybe we want to add a few extra things to the customized base for example development tools or automation tools for QA team etc.and Instruction or ReadMe file for new employees ..

Vagrant Machine

Vagrant is a tool for building and managing virtual machine environments and focus on automation, Vagrant lowers environment setup time,

Vagrant helps you create virtual machines on-the-fly by a set of reusable configuration files.

Why Vagrant?

Vagrant provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology utilities for managing the lifecycle of machines

To achieve its magic, Vagrant stands on the shoulders of giants. Machines are provisioned on top of VirtualBox, VMware, AWS, Hyper-v or any other provider. Then, industry-standard provisioning tools such as shell scripts, Chef, or Puppet, can automatically install and configure software on the virtual machine.

more .. VAGRANT Installation and VAGRANT OFFLINE SETUP