Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto How and When APP-ID Works

The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...
Read More
Security

Palo Alto Templates

Templates in Palo Alto Panorama are essentially configuration containers for devices that are managed by Panorama. These templates allow for...
Read More
Security

Cisco ASA POODLE Mitigation

Google has discovered a vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections...
Read More
Security

Cross-Sector Cybersecurity Performance Goals Checklist

“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Read More
Security

Cisco ASA Netflow Configuration

flow-export destination inside [SERVER IP ADDRESS] 9996 or 2055 flow-export template timeout-rate 1 flow-export delay flow-create 60 access-list NETFLOW_EXPORT_ACL extended...
Read More
Routing & SwitchingSecurity

Cisco SNMPv3 Config

Below is a working config:...
Read More
Security

Palo Alto – Device Groups vs Templates

In the context of Palo Alto Networks’ Panorama, “Device Groups” and “Templates” serve distinct purposes but are essential components of...
Read More
Security

Transition from Certificate Classes to DV, OV, and EV

Historically, certain Certificate Authorities (CAs) utilized a “Class” system to categorize digital certificates. For instance, VeriSign classified them as: Class...
Read More
Security

Palo Alto Get AD Groups with Match

Get all AD Groups: show user group list Get all AD Groups with “admin” in the name: show user group...
Read More
Security

TLS Verification and Testing

HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results