Designing and building server infrastructure at scale involves planning, implementing, and managing servers that support applications, databases, high-traffic websites, large...
JoinedMay 2, 2023
Articles664
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Both `BPDU Filter` and `BPDU Guard` are features of the Spanning Tree Protocol (STP) used to control the behavior of...
When looking at logs, they are usually UTC. This script helps convert the time zone from EST to UTC &...
In the world of networking, segregating traffic and maintaining isolated environments within a single piece of hardware is often crucial....
The terms “Log at Session Start” and “Log at Session End” are used to describe the practice of creating logs...
Designing and building network infrastructure at scale involves planning, implementing, and managing computer networks that support wireless network services, high-traffic...
Dell’s commitment to network efficiency and security has ushered in an innovative feature in its MX configuration – Ethernet with...
In the context of networking and the TCP (Transmission Control Protocol), RST (Reset) and ACK (Acknowledgment) are flags within the...
# Author: Kerry Cordero # Version: 1.0.0 # Description: This script prompts for domain and gets the TLS version for...
If you’re looking to improve your network security by inspecting encrypted traffic using Palo Alto firewalls, you’re in the right...