In Border Gateway Protocol (BGP), managing how routes are advertised is critical for network stability and efficiency. Two common methods...
JoinedMay 2, 2023
Articles666
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
There might be times where you need to import an Intermediate CA because the FW is restricting access to a...
While looking at the design guide for Akamai’s GRE Technical Guide, you’ll notice that the TCP MSS in their example...
This will allow you to run Bash scripts from ZSH by just doing ./{script}. Shebang – From the CLI, add...
In this post I’m going to jot down some notes I have sitting around for DDOS. I’ll list some things...
#####PALO ALTO —–GUI: Refresh or restart an IKE gateway. 1. Select Network > IPSec Tunnels and select the tunnel for...
Navigating the world of internet addressing and IP allocation can be daunting. Amid the jargon, you might come across the...
This is one way to find public IP Ranges for email using DIG. This is used if you want to...
Let’s first talk about what happens when a router receives a unicast IP Packet. In order for the router to...