The Border Gateway Protocol (BGP) is the backbone routing protocol of the internet, allowing different autonomous systems (AS) to exchange...
JoinedMay 2, 2023
Articles637
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Palo Alto Networks’ firewall technology includes the capability to identify applications with App-ID and control the traffic based on Service...
To use the curl command to search for a PDF file on a website, you can use the following command:...
Table of Contents 1. Objectives 2. Stakeholders 3. RTO/RPO Targets 4. Hurricane Trigger Points 5. Communication Plan 6. Pre-Hurricane...
Cisco’s Virtual Port Channel (vPC) technology has been a cornerstone in modern data center network designs, offering device-level redundancy. While...
When you try to use UNC (Universal Naming Convention) to access a share on a different server, multiple components come...
Broadcom’s acquisition of VMware for $61 billion has prompted questions about what Broadcom plans to do with the virtualization giant’s...
If you operate Palo Alto Networks firewalls, are you taking full advantage of the critical log data they generate? Palo...
COR-PALO-A# show location ip 8.8.8.8 United States...
The world of networking is in constant evolution. Among the players steering this transformation are Cisco Nexus switches, renowned for...