Azure

How To Configure Virtual Network Peering in Azure

In this tutorial, I will be guiding you on how to set up a virtual network peering in Azure. Why do we need to set up the virtual network peering? When we have different virtual networks with resources in each network and we need the resources in those different networks to communicate with each other over a low-latency, high-bandwidth connection using the Microsoft backbone network. When we are done creating the virtual network peering it will enable us to connect two or more Virtual Networks in Azure and the resources in those networks will communicate with each other.

How To Configure Virtual Network Peering in Azure Read More »

How to Configure Site-to-Site VPN Connection on Azure

This post will show you how to create a Site-to-Site VPN gateway using Azure. And I will not just stop at creating it, I will also show a test sample of the connection working. Yes, that’s how I roll, you have to see what you’re configuring working in real-time. Things to consider before creating a site-to-site VPN: If you’re unfamiliar with the IP address ranges located in your on-premises network configuration, you need to coordinate with someone who can provide those details for you. When you create this configuration, you must specify the IP address range prefixes that Azure will route to your on-premises location. None of the subnets of your on-premises network can overlap with the virtual network subnets that you want to connect to.

How to Configure Site-to-Site VPN Connection on Azure Read More »

How to Configure Point-to-Site VPN on Azure

Point-to-Site VPN helps us connect through a secure network from a client computer to an Azure virtual network. This simply means you can connect to a compute resource using their private IP on the Azure Virtual Network. What is Point-to-Site VPN A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client’s computer. This solution is useful for telecommuters who want to connect to Azure VNets from a remote location, such as from home or a conference. P2S VPN is also a useful solution to use instead of S2S VPN when you have only a few clients that need to connect to a VNet.

How to Configure Point-to-Site VPN on Azure Read More »

How to Configure Azure File Sync

Over the years there have different ways files are shared and how access is given to people. One of the popular ways of sharing files has been mapping drives from servers to domain-joined computers in the organization. I will be showing how files can be shared using Azure File Sync making the files to be highly available across the organization. The files are automatically replicated on the server to a central Azure storage location, allowing cloud tiering which allows files that are not often used to be moved from on-premises to Azure Storage while the frequently accessed files are cached on the local server and the amount of local disk space used for caching can be controlled. Administrators continue to support local data access and permissions.

How to Configure Azure File Sync Read More »

Cloud Computing Explained

If you’re about to start your journey to the cloud, this post is right for you. You probably might have heard someone talking or mentioning cloud computing, and you’re here to understand what cloud computing is. Let me give a little scenario, you have an organization, with a physical data center where you have servers, switches, storage devices, and networks all set up and ready for business. Imagine you do have an event that comes up once annually that will consume a lot of those resources which will require you to get either more servers or other resources to handle the services you will be providing and after the event those servers will be under use, from the narration you can see that you will have to spend more to handle a one-time service you needed to provide, this method of running software and hardware is what is referred to as On-Premises.

Cloud Computing Explained Read More »

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://abcofcloud.com.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymised string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service Privacy Policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognise and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Verified by MonsterInsights