Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Laptops & DesktopsSecurityServers

Understanding and Configuring TLS Versions in a Windows Environment

Transport Layer Security (TLS) is a critical cryptographic protocol designed to secure communications over computer networks. As cyber threats evolve,...
Read More
Routing & SwitchingSecurity

Data Flow – TLS

Transport Layer Security (TLS) is a protocol designed to provide secure communications over a computer network. Below is a simplified...
Read More
Security

CyberArk – Push and Pull Methods

The “push” and “pull” methods in CyberArk are primarily used for managing service accounts. However, they are not exclusive to...
Read More
Security

Cisco ASA Site-to-Site VPN Best Practices (IKEv2 – 2026 Update)

Cisco ASA Site-to-Site VPN Best Practices (2026 Update) If you are deploying a site-to-site VPN on Cisco ASA in 2026,...
Read More
Security

Migration Plan – Cisco Nexus SVIs to Palo Alto Firewalls

Step 1: Network Audit Begin with a thorough network audit. Document all VLANs and associated Switch Virtual Interfaces (SVIs) currently...
Read More
Security

Palo Alto – Perform FIB Lookup for a Specific Destination

This command is a good one that I use often. There are time I want to see if a route...
Read More
Security

Power Up Your Firewalls: A Guide to Using Palo Alto’s EDL Hosting Service

Managing dynamic threat indicators across firewalls can be challenging—especially when you’re juggling multiple sources of threat intelligence. Palo Alto Networks...
Read More
Security

Palo Alto BEST PRACTICES FOR RANSOMWARE PREVENTION

From Palo Alto’s Website: Environment All PAN-OS Anti-Virus license   Resolution What is Ransomware? Ransomware is a family of malware...
Read More
Security

Cisco ASA Failover Configuration

For this configuration, I am assuming you already have the Primary ASA configured and working. I’m also assuming the Secondary...
Read More
CloudSecurity

Okta Event-Type Logging Filters

These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results