CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
JoinedMay 2, 2023
Articles665
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
ROUTE DOMAIN Route Domains in F5 BIG-IP are a powerful feature that allows for the segmentation of network traffic, thus...
Cisco Optics-to-Device Compatibility Matrix...
There are three phases to setting up the F5’s SSL Bridge configuration. 1. Install Certificates 2. SSL Profiles (Client and...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
New and Changed Information The following table provides an overview of the significant changes up to the current release. The...
SSL Offloading (or SSL Termination) In this method, SSL traffic is terminated at the F5 BIG-IP system, decrypted and inspected,...