One ASN is usually given to the Regional Internet Register (RIR) when two companies merge. Each organization must maintain its...
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
I was installing Ubuntu in Windows 11 using WSL. I was getting the error below: “Please enable the Virtual Machine...
So what is Akamai prolexic routed DDOS protection? Prolexic Routed is a simple and effective approach for businesses to secure...
This post shows three IPv4 address blocks that are available for documentation purposes. Predefined address ranges for documentation and examples...
During a configuration synchronization (ConfigSync) procedure, BIG-IP elements that are not synced amongst device group members are discussed in this...
Finding Spanning Tree Protocol (STP) topology changes in a network is not always straightforward. However, it is critical to identify...
There’s been reports of RADIUS issues when dealing with the cloud because of out of order packets and fragmentation. On...
I’m writing this post because I’ve been in many environments where a VLAN is brought up as if it’s securing...
The other day, I worked with IIS, which has been a while. I looked at the logs with a coworker...
The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...