Continue to explore OPNsense and Azure with Part 2 of the Site-2-Site VPN configuration series. Learn how to set up a route-based VPN between OPNsense and Azure Virtual WAN.

Continue to explore OPNsense and Azure with Part 2 of the Site-2-Site VPN configuration series. Learn how to set up a route-based VPN between OPNsense and Azure Virtual WAN.
Interested in setting up a Site-2-Site VPN between OPNsense and Azure VWAN? Check out this informative article series! Part 1 explains policy-based VPNs, and it’s just the beginning.
Are you struggling with secure connectivity to your Azure virtual machines? In our latest blog entry article, we make a case for a centralized, secured, and restricted Azure Bastion deployment in an Azure Virtual WAN spoke. This solution offers many benefits, including centralized deployment, traffic control, and network security.
There is no perfect solution to bypass MFA for specific users when introducing Network Policy Server (NPS) Extension for Azure MFA, but there is a great workaround to address it.
Despite vendors like Microsoft automating many processes in their solutions, including network configuration, vulnerabilities may still threaten your security. For example, you still need some fine-tuning when routing traffic via an App Gateway to a private backend application in an Azure VWAN environment.
Mutual Transport Layer Security (mTLS) in Azure Application Gateway and Application Servers / Web App is a mandatory modern security layer. It allows the server and the client to mutually identify each other’s identity and credibility to enhance cybersecurity. But what it is exactly, what does it do and how does it help your IT security?
The Private Endpoint / Private Link / Private Link Service solution was launched by Microsoft mostly because of the need for private, more secure connectivity to its Azure services. Since its launch, the number of Azure services supporting Private Link has grown, and the list today is extensive. But what are they exactly?
In Part 1, we discussed the technology behind Duo Multi-Factor Authentication (MFA) and how to configure it to protect the credentials for a Veeam hardened repository. We continue the cybersecurity topic, following the steps necessary for adding a public key authentication and making sure it works with the established configuration.
Protection is vital in both real and digital environments. An irresponsible approach to cybersecurity, especially with remote work, will ultimately lead to compromise. Security compromise can lead to credentials being phished and ransomware getting in. Veeam Backup & Recovery, Multi-Factor Authentication (MFA), and Cisco Duo can help avoid that.
There is a huge list of servers one could use as backup targets. So much so, that there isn’t really one right option. It depends on an organization’s requirements, wants, and needs. However, like with many things in life, there’s always a go-to scenario. We’ve distilled the necessary tips and configurations for your reading pleasure in a short form.