Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

CloudData CenterRouting & SwitchingSecurityWireless

SNMP vs. Syslog: Understanding Traps, Polling, and When to Use Each

What Is SNMP? SNMP (Simple Network Management Protocol) is built for structured monitoring and device management. It works in two...
Read More
Security

Power Up Your Firewalls: A Guide to Using Palo Alto’s EDL Hosting Service

Managing dynamic threat indicators across firewalls can be challenging—especially when you’re juggling multiple sources of threat intelligence. Palo Alto Networks...
Read More
Security

Palo Alto PCNSE Study Guide

Laptops & DesktopsSecurityServers

Strengthening TLS Security: Why Strong Ciphers Should Be Non-Negotiable

In today’s digital landscape, securing data in transit is a critical priority for any organization. The Transport Layer Security (TLS)...
Read More
Laptops & DesktopsSecurityServers

Understanding and Configuring TLS Versions in a Windows Environment

Transport Layer Security (TLS) is a critical cryptographic protocol designed to secure communications over computer networks. As cyber threats evolve,...
Read More
Security

Cisco VPN Tunnel Troubleshooting – IKEv1 and IKEv2 – ASA and ASR1001 (with VRF examples)

Phase 1 = IKE / Phase 2 = IPsec. Examples use a peer 198.51.100.10 and a VRF named CORDERO. ASA...
Read More
Laptops & DesktopsRouting & SwitchingSecurityServers

Using Chrome’s Net Export Tool for Network Diagnostics

As network engineers, we often find ourselves at the crossroads of application and infrastructure troubleshooting. While packet captures and network...
Read More
Security

Troubleshooting ECDH vs. RSA: A Comparative Approach

When talking about the key differences between ECDH and RS, your approach to troubleshooting TLS issues is generally the same....
Read More
Security

Powershell – Get Enabled Ciphers

function Get-EnabledTlsCipherSuites { $enabledCipherSuites = @() $cipherSuites = Get-TlsCipherSuite foreach ($cipherSuite in $cipherSuites) { $cipherSuiteName = $cipherSuite.Name $regPath = "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\$cipherSuiteName"...
Read More
Security

2024 Security Megatrends: Navigating the Future of the Security Industry

The Security Industry Association (SIA) has released its annual report on the top trends shaping the security industry in 2024....
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results