Mantra Networking

Latest posts

Git: Commit Code to Repo

Committing New Code to Existing Repo Everything you need to know Table of Contents: * Why Version Control Matters * The Basic Git Workflow * Common Git Commands for Daily Use * Handling Merge Conflicts Understanding Git Workflows: A Beginner's Guide to

Azure Functions with Web Application Gateway & WAF

This article discusses how to allow an application function within a Microsoft Azure environment using a Web Application Gateway with a Web Application Firewall (WAF) to allow traffic between Azure resources: Allowing Azure Function Traffic via Web Application Gateway with

Azure Portal: Renewing SSL Certificate on Application Gateway V1

Currently there's no official Azure documentation on updating an SSL certificate on an application gateway V1. After extensive troubleshooting, the support resource that I worked with was able to find the deprecated documentation allowing for the SSL certificate

Declarative VS Imperative

Differences Focus: * Declarative programming focuses on describing the desired result or logic, without specifying the control flow or implementation details. * Imperative programming focuses on explicitly defining the step-by-step instructions or algorithms to achieve the desired outcome. Abstraction Level: * Declarative languages

F5 LTM Pools

Guide to F5 LTM Pools Everything you need to know Table of Contents: * Create LTM Nodes * Create LTM Pools * View Existing Pools * View Pool Health Monitors * Enabling & Disabling Pool Members * Activating Priority Groups on Pool Members * Load Balancing Methods

Fortigate IKEv2 IPsec VPN CLI Templates

IKEv2 (Internet Key Exchange version 2) is the latest protocol for establishing IPsec VPN tunnels, offering improved performance, reliability and security over IKEv1. This blog post provides a comprehensive guide to configuring IKEv2 VPN tunnels on FortiGate firewalls, including templates

Fortigate IKEv1 IPsec VPN CLI Templates

IKEv1 (Internet Key Exchange version 1) is a widely used protocol for establishing IPsec VPN tunnels. This blog post provides a comprehensive guide to configuring IKEv1 VPN tunnels on FortiGate firewalls, including templates for various scenarios and security requirements. To

Troubleshooting FortiGate VPN Tunnels: A Comprehensive Guide

Establishing a secure VPN tunnel between FortiGate firewalls is important for enabling secure remote access and site-to-site connectivity. However, issues can arise during the setup or operation of these tunnels, calling for thorough troubleshooting. This guide will walk you through

Azure Landing Zones

Azure Landing Zones provide a structured approach to streamline the deployment and management of resources in Microsoft Azure[2]. They act as a blueprint for creating well-architected environments in Azure, tailored to meet the specific requirements of an organization and

Azure Network Security Groups (NSG)

An Azure Network Security Group (NSG) is a fundamental security resource that acts as a virtual firewall for controlling inbound and outbound network traffic to and from Azure resources. It allows you to define security rules that filter traffic based

IKEv1 vs IKEv2

IKE Versions and VPN Negotiations Internet Key Exchange (IKE) is a protocol used to establish secure communication channels between devices for Virtual Private Network (VPN) connections. There are two main versions of IKE: IKEv1 and IKEv2. IKEv1 Negotiations IKEv1 negotiations