Scenario: We have a subnet configured in the “Allowed prefixes,” a /16. You can’t change the size of a subnet...
JoinedMay 2, 2023
Articles647
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
ROUTE DOMAIN Route Domains in F5 BIG-IP are a powerful feature that allows for the segmentation of network traffic, thus...
Cisco Optics-to-Device Compatibility Matrix...
When configuring health monitors for a web application, targeting the appropriate HTTP status codes is crucial to ensure that the...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
New and Changed Information The following table provides an overview of the significant changes up to the current release. The...