Network IT Leads and Network IT Managers are two important roles in any organization with a network infrastructure. However, there...
JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
The Border Gateway Protocol (BGP) is the backbone routing protocol of the internet, allowing different autonomous systems (AS) to exchange...
Palo Alto Networks’ firewall technology includes the capability to identify applications with App-ID and control the traffic based on Service...
To use the curl command to search for a PDF file on a website, you can use the following command:...
Table of Contents 1. Objectives 2. Stakeholders 3. RTO/RPO Targets 4. Hurricane Trigger Points 5. Communication Plan 6. Pre-Hurricane...
VPC-2-L3_VPC_UNEQUAL_WEIGHT: Layer3 peer-router is enabled. Please make sure both vPC peers have the same L3 routing configuration The L3_VPC_UNEQUAL_WEIGHT message...
When you try to use UNC (Universal Naming Convention) to access a share on a different server, multiple components come...
Broadcom’s acquisition of VMware for $61 billion has prompted questions about what Broadcom plans to do with the virtualization giant’s...
If you operate Palo Alto Networks firewalls, are you taking full advantage of the critical log data they generate? Palo...
COR-PALO-A# show location ip 8.8.8.8 United States...