JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Let’s first talk about what happens when a router receives a unicast IP Packet. In order for the router to...
When configuring App-ID in Palo Alto Networks firewalls, it is crucial to pay attention to the “Depends on:” section in...
I noticed that the Okta Voice Call Authentication callback option for MFA was not working for my Cell phone number....
When setting up your system, it’s crucial to understand how this algorithm operates. It utilizes priority and response time to...
In this post I’m going to jot down some notes I have sitting around for DDOS. I’ll list some things...
DNS rewrite or DNS Doctoring has been around on the Cisco ASA’s for a while. Palo Alto firewalls received this...
The key difference is the Elastic IP does NOT change if you terminate or restart an instance. Think of it...
1. Programs with cached credentials 2. Changed password in a service account 3. Having a bad password limit that’s too...