Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

TLS and SSL version along with Windows Disabling/Enabling Versions for IIS, SQL, .NET

Let’s first go over TLS and SSL versions....
Read More
Security

10 Malware Protection Best Practices

1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
Read More
Security

IPSEC VPN Timeout Issue between Cisco ASA and PA

Issue A Cisco ASA router initiates an IPSEC VPN tunnel to a Palo Alto Networks firewall. The tunnel drops and...
Read More
Data CenterSecurity

An In-depth Look at TAPs and SPAN Ports

Are you worried about your network’s security? Given the rise in cyber-attacks, many organizations are rightfully focusing on fortifying their...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersWireless

Purchasing Hardware & Software (Information Technology)

The responsibility for handling the procurement of hardware and software in an IT environment typically involves collaboration among various stakeholders...
Read More
Security

Palo Alto – Understanding and Troubleshooting App-ID

The App-ID technology in Palo Alto firewalls is designed to identify the applications running on your network, regardless of the...
Read More
Security

Cisco ASA Site-to-Site VPN Tunnel IKEv1 and IKEv2 Best Options

Below is a good template to use when creating a Site-to-Site VPN Form but the settings are something you want...
Read More
Security

Palo Alto Detect TLS 1.0 and 1.1

UPDATE: In Panorama PAN-OS 10.X: You cannot use the ‘equal-to‘ operator for custom signatures in this use case. The ‘negate‘...
Read More
Security

Cross-Sector Cybersecurity Performance Goals Checklist

“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Read More
Security

Palo Alto Session Logging

The terms “Log at Session Start” and “Log at Session End” are used to describe the practice of creating logs...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results