Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Choosing the right Software for your Palo Alto Devices

When managing a network secured by Palo Alto Networks, choosing the correct software version for your devices is critical for...
Read More
Security

Security – DDOS

Distributed Denial-of-Service (DDoS) attacks are indeed a prevalent type of cyberattack. In a DDoS attack, the attacker overloads a network,...
Read More
Security

Palo Alto HTTP/2 Inspection

If you’re doing SSL Offloading, you may run across sites that don’t behave well when HTTP/2 Inspection is enabled. You...
Read More
Security

Palo Alto Global Protect Client Software Not Upgrading

If you are trying to upgrade your Palo Alto GlobalProtect APP and notice it’s not getting upgraded, a good place...
Read More
Security

Cisco Site-to-Site VPN Troubleshooting Commands (ASA & IOS-XE ASR1001-HX)

Data CenterLaptops & DesktopsSecurityServers

DNS Authoritative vs Non-Authoritative (Recursive) and DNS Flows

DNS name servers are usually split into two categories:...
Read More
Security

Palo Alto GlobalProtect Timeout Settings

Below are a couple of timeouts but Login Lifetime will disconnect your end users no matter what. If it’s set...
Read More
Laptops & DesktopsSecurityServers

Data Flow – HTTPS Traffic and Cipher Suites

Here’s a step-by-step breakdown of the data flow: DNS Resolution: The user enters “https://cordero.me” into their browser’s address bar. The...
Read More
Security

Keeping Up-to-Date with Application Changes: The Key to Avoiding Outages

In today’s rapidly evolving technological landscape, staying up-to-date of application and security updates is not just beneficial—it’s critical for avoiding...
Read More
Security

Palo Alto – Importing an Intermediate CA

There might be times where you need to import an Intermediate CA because the FW is restricting access to a...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results