Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Kerry Cordero
JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Security

Cisco ASA Syslog Messages

Alert Messages, Severity 1 Critical Messages, Severity 2 Error Messages, Severity 3 Warning Messages, Severity 4 Notification Messages, Severity 5...
Read More
Laptops & DesktopsServers

Microsoft Windows Net Use Command

Sometimes people forget that you don’t need to use a drive letter when using the “net use” command. Also it’s...
Read More
Security

Palo Alto Cheat Sheet – Panorama

Security

Palo Alto Cheat Sheet – Device Management

Show general system health information. > show system info...
Read More
Laptops & DesktopsServers

CTRL+ALT+DEL in a RDP Session

If for some reason you need a user that’s RDP’ed into a Server or Workstation to do a CTRL+ALT+DEL, here...
Read More
Security

Cisco ASA Threat Detection

*Do not just implement this into a production environment. If can, test this in test environment first. Basic threat detection...
Read More
Security

Palo Alto Cheat Sheet – VSYS

Find out if the firewall is in multi-vsys mode...
Read More
Security

Palo Alto Cheat Sheet – User-ID

View all User-ID agents configured to send user mappings to the Palo Alto Networks device:...
Read More
Security

Palo Alto Cheat Sheet – Networking

General Routing Commands...
Read More
Routing & Switching

Basic Understanding of Over-Subscription

Over-subscription in IT, specifically in network design, refers to the practice of selling or provisioning more resources than are physically...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results