Rajesh Deodhar
IPCop Add-ons

Guard Your Network with IPCop, Part 2: Add-ons

A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To convert it into a complete Unified Threat Management (UTM)…

The cop's patrolling

Guard Your Network with IPCop, Part 1: Installation Basics

The classic version of IPCop 1.4.20, which was released on July 24, 2008, was immediately upgraded to the 1.4.21 ISO installer. The much awaited version 2.0 has been out since September 23, 2011….


Storage Management using Openfiler, Part 4

In the previous article in the series on Openfiler, we discussed configuring RAID. Here, we will proceed with the installation and configuration of iSCSI. This article assumes that Openfiler 2.3 has been configured…

It's time we file

Storage Management using Openfiler, Part 3

The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1 data storage, with some important setup instructions and troubleshooting…

Open File(er)

Storage Management using Openfiler, Part 2

The first part of this series gave readers step-by-step instructions to build Openfiler from scratch. This second part covers two additional important features of Openfiler: bonded interfaces and software RAID. We also have…

Storage management using Openfiler

Storage Management using Openfiler, Part 1

Many companies use the file-sharing features of a popular proprietary desktop operating system. The main constraint is the limit on simultaneous connections to a single file share (10). The proprietary solution is to…

Network monitoring time

Quick Setup Guide to Network Monitoring using Zenoss Core

Today’s businesses demand 24×7 uptime of IT infrastructure. To meet this need, a number of technologies are used, which include failover, clustering, redundant devices and high availability. Despite having more fault-tolerant and rugged…

A Recap

Advanced Nmap: A Recap

This final article in the series consolidates information from the previous articles, looks at NMap’s future possibilities, and at the new tools from the development team. Beginning its life as a simple port-scanner,…

Nmap scripts

Advanced Nmap: NMap Script Scanning

In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it’s time to study NMap script scanning. Nmap.org describes the Scripting Engine (NSE)…

Verify firewall security

Advanced Nmap: Scanning Firewalls Continued

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead to various vulnerabilities. Based on the scan results, several…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.