This post shows three IPv4 address blocks that are available for documentation purposes. Predefined address ranges for documentation and examples...
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
During a configuration synchronization (ConfigSync) procedure, BIG-IP elements that are not synced amongst device group members are discussed in this...
Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
The other day, I worked with IIS, which has been a while. I looked at the logs with a coworker...
The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...
What is the Difference Between VDC and VRF? Virtual Device Contexts (VDCs) and Virtual Routing and Forwarding (VRFs) are two...
Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...