Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Routing & SwitchingSecurity

Palo Alto Routing Verification Basics

Security

Best Practices to Strengthen the Security Posture of your Organization’s Systems

-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
Read More
SecurityServers

Microsoft Recommended Block Rules

From Microsoft:...
Read More
CloudData CenterRouting & SwitchingSecurityServers

AAA (Cisco Device and ISE Specific)

When discussing AAA (Authentication, Authorization, and Accounting) in the context of ISE (Identity Services Engine) and Cisco devices, it’s essential...
Read More
Data CenterSecurityServers

Splunk Architecture and Design

There’s a lot you need to think about when designing your Splunk environment. I’m hoping to keep adding to this...
Read More
Security

Troubleshooting ECDH vs. RSA: A Comparative Approach

When talking about the key differences between ECDH and RS, your approach to troubleshooting TLS issues is generally the same....
Read More
SecurityServers

Splunk – Searches for measuring data ingested

Security

Palo Alto – URL Filtering

URL Filtering, an essential component of Palo Alto firewalls, provides granular control over web access by categorizing URLs according to...
Read More
Routing & SwitchingSecurity

Palo Alto – Incomplete , Not-Applicable, Unknown-tcp/udp , Insufficient Data , tcp-rst-from-client , tcp-rst-from-server

Incomplete = The three-way TCP handshake didn’t complete. (Routing issue or destination server not listening on the port) Not-applicable =...
Read More
Security

Device Sensor vs IP Helper for ISE Profiling

How ISE “Sees” Those Attributes You have two main paths to get that data from the switch to your Profiler....
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results