Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Kerry Cordero
JoinedMay 2, 2023
Articles667
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Load Balancing

F5 – TCP Connection Management: Sessions, Pool-Level & Node-Level Actions

In F5 BIG-IP, you can manage how traffic flows to your servers either at the pool-member level or at the...
Read More
Routing & SwitchingSecurity

Palo Alto Routing Verification Basics

CloudData CenterLaptops & DesktopsRouting & SwitchingServersVOIPWireless

Using iperf3 to Help Troubleshoot Speed and Throughput Issues

There are many cool options you can use with iperf but I think it’s important to use multiple simultaneous streams....
Read More
Routing & Switching

Dasan Zhone Commands

Security

Cisco ASA Syslog Messages

Alert Messages, Severity 1 Critical Messages, Severity 2 Error Messages, Severity 3 Warning Messages, Severity 4 Notification Messages, Severity 5...
Read More
Load Balancing

F5 – Redis Load Balancing Settings

This blog post will discuss some crucial configurations for integrating an F5 load balancer with a Redis setup using Sentinel...
Read More
Security

Palo Alto User-ID Ignore List Notes

There are times you’ll want to create an ignore list on the Palo Alto. Basically what this is doing it...
Read More
Routing & SwitchingSecurity

Palo Alto and Asymmetric Routing

Another fun topic, asymmetric routing.  One thing to keep in mind when it comes to Palo Alto firewalls is that...
Read More
Security

Splunk Queries

Here’s a short list but I plan on added more in the near future....
Read More
Security

Cisco ASA Threat Detection

*Do not just implement this into a production environment. If can, test this in test environment first. Basic threat detection...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results