Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Search Filter for Security Polices

There are times I need to search Security rules.  Below is great way to filter in to what you are...
Read More
Laptops & DesktopsSecurityServers

Finding Public IP Ranges using DIG

This is one way to find public IP Ranges for email using DIG. This is used if you want to...
Read More
Security

Palo Alto AD Server Synch Troubleshooting

To verify the connectivity and synchronization status of your Active Directory (AD) servers on a Palo Alto Networks firewall, you...
Read More
Security

Palo Alto – What Settings Don’t Sync in Active/Passive HA?

Security

Palo Alto – Monitoring GlobalProtect VPN User Logins

When monitoring GlobalProtect VPN user logins on a Palo Alto firewall, you can find the following details in the authentication...
Read More
Laptops & DesktopsSecurity

Quick way to host files using Kali

Sometimes when your in Kali you want a quick and easy way to share files.  One of the ways I...
Read More
Security

Palo Alto – URL Filtering

URL Filtering, an essential component of Palo Alto firewalls, provides granular control over web access by categorizing URLs according to...
Read More
Routing & SwitchingSecurity

Packet Capture – Cisco Nexus

Cisco Nexus switches use a slightly different syntax compared to the ASA series for packet capturing, which is accomplished through...
Read More
Security

Okta HealthInsight Tasks and Recommendations

HealthInsight provides the following security tasks to improve security for an org. Security Task Why is this recommended? Security Impact...
Read More
SecurityServers

Data Flow – Windows UNC Access to Share Ports (SMB)

When you try to use UNC (Universal Naming Convention) to access a share on a different server, multiple components come...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results