Why You Should Avoid Using VLAN 1 in Cisco Networks VLAN 1 is one of those topics that every network...
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
What Is SNMP? SNMP (Simple Network Management Protocol) is built for structured monitoring and device management. It works in two...
Phase 1 = IKE / Phase 2 = IPsec. Examples use a peer 198.51.100.10 and a VRF named CORDERO. ASA...
Where the ports live The ports defined in the App Segment (e.g., TCP 1–65535 except 53) are remote ports —...
ZPA to Palo Alto Terminology Mapping ZPA Concept Palo Alto Firewall Equivalent Technical Alignment Notes Application Address Object (FQDN or...
What is a MIB? A MIB is essentially a dictionary of things a device can report via SNMP. It defines...
When deploying Zscaler Private Access (ZPA), it’s tempting to take shortcuts during early rollouts: one giant wildcard app segment (*.corp.local),...
What the Client Does The end user’s browser only ever connects to https://app1.cordero.me → TCP 443. That’s the real traffic...
ZIA: Overview Zscaler Internet Access (ZIA) is a cloud-delivered secure internet and web gateway designed to protect users, applications,...