Below is a good slide deck from Cisco Live:...
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
If you are trying to upgrade your Palo Alto GlobalProtect APP and notice it’s not getting upgraded, a good place...
One ASN is usually given to the Regional Internet Register (RIR) when two companies merge. Each organization must maintain its...
I was installing Ubuntu in Windows 11 using WSL. I was getting the error below: “Please enable the Virtual Machine...
So what is Akamai prolexic routed DDOS protection? Prolexic Routed is a simple and effective approach for businesses to secure...
Locations: Persistence (sticky) Profiles: Local Traffic > Profiles > Persistence Virtual Servers (Where you apply the Persistence Profile): Local traffic...
#PEERS Internal BGP (iBGP) peers and external BGP (eBGP) peers are the two types of peers used by BGP. BGP...
Finding Spanning Tree Protocol (STP) topology changes in a network is not always straightforward. However, it is critical to identify...
There’s been reports of RADIUS issues when dealing with the cloud because of out of order packets and fragmentation. On...
I’m writing this post because I’ve been in many environments where a VLAN is brought up as if it’s securing...