Tyler Made

  • Cloud
  • Virtualization
  • Linux Server
  • Windows Server

Networking

Linux Server

Block IP from accessing your Linux Server using IP tables

Syntax to block an IP address under Linux using IP tables: iptables -A INPUT -s 123.45.67.89 -j DROP Replace 123.45.67.89 with the IP in which you would like blocked. For example, if you wish to block IP address 123.45.67.89 iptables -A INPUT -s 123.45.67.89 -j DROP If you just want Read more…

By Tyler Woods, 8 yearsOctober 4, 2017 ago
Networking

Set up OpenVPN Server on Synology NAS

This one is pretty easy, but some of the quirks of the “Synology way” may lead you to a failed OpenVPN attempt. Mainly after exporting the configuration, it’s not clear that you should have to modify it in any way before trying to use it.   If you want to Read more…

By Tyler Woods, 8 yearsSeptember 29, 2017 ago
Cloud

The Perfect Reverse Proxy (NGINX, SSL, WebUI Management)

Reverse Proxy.  I’ve been implementing reverse-proxy solutions in lab and in production for some time now, but I always come across the same problem; It’s not the easiest type of a system to manage, especially when there are SSL certificates involved. Now, before I started looking for an easy-to-manage SSL Read more…

By Tyler Woods, 8 years ago
Amazon AWS

netdata: A remarkable server monitoring utility.

I wanted to write a short introduction to a tool that I’ve been using a lot on my newest servers and development projects. This tool seriously provides the most amazing way of monitoring and comprehending your server’s performance and other metrics that I’ve seen in such a simple, lightweight installation. Read more…

By Tyler Woods, 8 yearsMay 2, 2017 ago
Linux Server

How to install NGINX, get a free SSL certificate, and configure a reverse proxy (part two)

This is part two, the final part of configuring NGINX with SSL as a reverse proxy. Now that you have successfully installed NGINX and obtained a free SSL cert, you can proceed.   There is one important thing to note when configuring reverse proxy: For each “subfolder” you want to Read more…

By Tyler Woods, 8 yearsApril 28, 2017 ago
Cisco Meraki

How to provide Guest WiFi network access securely with Cisco Meraki Appliances

If you have an office, facility, or residence with a lot of guest traffic and are needing to provide the guests with their own network using your existing Meraki equipment, this is the best way to do it. For this example the environment is using the following devices: Cisco Meraki Read more…

By Tyler Woods, 8 yearsMarch 15, 2017 ago
Networking

What ports (TCP and UDP) are required for remote access to ESXi with vSphere Client?

I manage a large number of ESXi hosts. These are at remote locations and it’s sometimes extremely difficult for me to gain access to the vSphere console unless we have a site-to-site VPN connection with the client. One of my recent challenges (hah) was remotely accessing and managing an ESXi Read more…

By Tyler Woods, 8 yearsJanuary 26, 2017 ago
Networking

Secure your Sophos Network: Use Network Groups for Trusted Remote Hosts.

My primary concern lately as my internet presence has grown has been in the general realm of security. How do I know that no one is accessing my port-forwarded server? How do I know that no one is logging into my router? […] An easy answer to this has always Read more…

By Tyler Woods, 8 yearsDecember 20, 2016 ago
Networking

How to fix Sophos UTM 9.4 install.tar wasn’t found on the installation media

I’ve been deploying Sophos Virtual Appliances recently and so I was presented with a bit of a challenge when the install was failing on physical hardware. Error: install.tar wasn’t found on the installation media. Error: install.tar wasn’t found on the installation media. This happens because during part of the installation Read more…

By Tyler Woods, 8 yearsDecember 19, 2016 ago
Networking

Terminology: Understanding MDFs and IDFs

Many times, early on in my tinkering or trying to learn about computer systems, I would wonder about certain terms or ideas that would come up on a “higher level”. The capabilities of my brain sometimes couldn’t wrap up the thoughts that make up an idea or a concept into a Read more…

By Tyler Woods, 8 years ago

Posts navigation

1 2 Next
Search
Recent Comments
  • Chris Findley on Powershell script to monitor DFS replication backlog
  • karenl on How to install Docker on an unsupported Synology NAS (updated 2020)
  • Al on Synology DS416play has an (unused) eSATA port hiding inside!
Archives
  • May 2018
  • April 2018
  • January 2018
  • October 2017
  • September 2017
  • August 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
Categories
  • Active Directory
  • Amazon AWS
  • Bare Metal
  • Cisco Meraki
  • Cloud
  • DigitalOcean
  • Docker
  • File Services
  • FreeNAS
  • Google Cloud
  • Group Policy
  • Hardware Appliances
  • Hyper-V
  • Linux Server
  • Microsoft Azure
  • Networking
  • Opinion
  • Other
  • PowerShell
  • Scripting
  • Security
  • Security Appliances
  • Shell
  • Software Appliances
  • Sophos UTM
  • Storage
  • Synology
  • Uncategorized
  • Virtualization
  • VMWare ESXi
  • Vultr
  • Web
  • Windows Server
Recent Articles
  • Customize your Linux or bash shell style with PS1 definitions in .bashrc May 10, 2018
  • How to downgrade virtual machine hardware version – VMWare April 25, 2018
  • How to install Heimdall Application Dashboard on Ubuntu 16.04 April 25, 2018
  • Install Dell OpenManage Server Administrator 9.1 for VMWare vSphere ESXi 6 and 6.5 January 15, 2018
  • How to fix Shockwave Flash crashing with vSphere Web Client 6.X October 19, 2017
Recent Comments
  • Chris Findley on Powershell script to monitor DFS replication backlog
  • karenl on How to install Docker on an unsupported Synology NAS (updated 2020)
  • Al on Synology DS416play has an (unused) eSATA port hiding inside!

  • Cloud
  • Virtualization
  • Linux Server
  • Windows Server
Hestia | Developed by ThemeIsle