Kerry CorderoKISS Design - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
Home
Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

How to view the PSK (pre-shared key) on a Cisco ASA

There are times you might have to find the PSK in order to share it with a 3rd party vendor...
Read More
Security

Cisco ASA Static NAT

Below I am going to give some examples for Policy Static NATs and Regular Basic NATs. Configuring Policy Static NAT...
Read More
Security

Cisco ASA Failover Configuration

For this configuration, I am assuming you already have the Primary ASA configured and working. I’m also assuming the Secondary...
Read More
Security

Cisco ASA AnyConnect SSL VPN with Hairpinning and ONE Public IP for Web Servers

In this post I am configuring AnyConnect SSL VPN Users access to a remote location that happens to be configured...
Read More
Security

Cisco ASA VPN Tunnel Encaps Decaps

If you look below, you can see going over a tunnel that the decaps are at 0 and the encaps...
Read More
Security

Cisco Switch Security

Below I will go over the different security threats that can happen on our network and a way to mitigate...
Read More
Security

Cisco ASA POODLE Mitigation

Google has discovered a vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections...
Read More
Security

Cisco ASA Netflow Configuration

flow-export destination inside [SERVER IP ADDRESS] 9996 or 2055 flow-export template timeout-rate 1 flow-export delay flow-create 60 access-list NETFLOW_EXPORT_ACL extended...
Read More
Laptops & DesktopsRouting & SwitchingSecurity

Saving Cisco Configurations Using Putty and Removing -more-

When saving device configurations using PuTTY, you’ll got a lot of –more–’s in the configuration file and it’s annoying. To...
Read More
Security

Palo Alto URL Filtering Order

Issue What happens when a URL matches multiple patterns (multiple custom URL filtering categories and allow/block-list) within a URL filtering...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Copyright © 2022 Kerry Cordero
  • Home
  • About
  • Disclaimer
  • Links

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows Cisco ASA PDF
See all results