Nowadays, one of the main entry points for cyberthreats is the corporate email. In my years of experience I have been able to verify how…
2 CommentsCategory: Networking
In this post we will see how to configure an IPSEC VPN tunnel between two remote locations through Fortigate firewalls. The scenario that we will…
2 CommentsIn the previous post we were configuring an active/standby cluster with Corosync and Pacemaker. However, we saw that a functional cluster needs file replication between…
3 CommentsWhen setting up robust production systems, minimizing downtime and service interruptions is often a high priority. Regardless of how reliable your systems and software are,…
4 Comments