Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Disable Client Probing Now

Palo Alto advises against turning it on. While the documentation warns against using it on “high-security networks,” this could be...
Read More
Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
CloudSecurity

Okta Event-Type Logging Filters

These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Read More
Security

Palo Alto – Perform FIB Lookup for a Specific Destination

This command is a good one that I use often. There are time I want to see if a route...
Read More
Routing & SwitchingSecurity

Palo Alto – Display Port Information (media type, interface counter, speed/duplex, etc…)

There are two good commands to run:...
Read More
Security

CISA Free Cybersecurity Services and Tools

Security

Packet Capture – Free PCAP Files for Learning

There are several repositories and websites where you can find free PCAP files for learning purposes: Wireshark Sample Captures: The...
Read More
Security

Cisco ASA Netflow Configuration

flow-export destination inside [SERVER IP ADDRESS] 9996 or 2055 flow-export template timeout-rate 1 flow-export delay flow-create 60 access-list NETFLOW_EXPORT_ACL extended...
Read More
Security

Palo Alto User Agent/ID Troubleshooting

Security

Free Online Tools for Looking up Potentially Malicious Websites

Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results