avatar

Creating a Reverse Proxy with Docker

Introduction This blog post will explain the concept of a reverse proxy, and will demonstrate the steps that need to be taken in order to create a Nginx reverse proxy inside of Docker. The concept of a reverse proxy is very simple, a client computer will connect to a central point that will pass their connection on to the desired destination. For example, lets take a look at the diagram below.

Setting Up Active Directory Network From Scratch

Introduction This blog post will show step by step how to setup a basic Active Directory network. The network will consist of four computers, two servers and two clients. There will be a Domain Controller, a DHCP server, a central management station, and of course a desktop for the clients. This can all be seen in the diagram below. The purpose of the central management desktop for the administrator to easily manage multiple servers at once.

OpenVPN with LDAP + 2-Factor Authentication and Network Access Polices

Introduction This blog post will explain the steps taken to configure OpenVPN to authenticate users using LDAP authentication and 2-Factor authentication. LDAP authentication will be performed against Active Directory, and 2-Factor authentication will be performed with a Time-based One-Time password (TOTP). Furthermore, the network access of users will be restricted to only what the administrator wants them to access. This post is split up into 5 sections: VPN Server Initial Configuration Base OpenVPN Configuration Configuring LDAP Authentication 2-Factor Authentication with TOTP User Based Network Access Polices The first section will configure the server on which the VPN server will be setup on.