When saving device configurations using PuTTY, you’ll got a lot of –more–’s in the configuration file and it’s annoying. To...
When configuring App-ID in Palo Alto Networks firewalls, it is crucial to pay attention to the “Depends on:” section in...
*Do not just implement this into a production environment. If can, test this in test environment first. Basic threat detection...
As an IT network architect, I like having a short, paste-ready runbook for common site-to-site VPN tasks: validate Phase 1/Phase...
# Author: Kerry Cordero # Version: 1.0.0 # Description: This script will scan a text document "dr-dns.txt", get the SSL...
Below I’ll show you how easy it is to get the cpassword. There are environments where this password could be...
Cisco Nexus switches use a slightly different syntax compared to the ASA series for packet capturing, which is accomplished through...
If you’re looking to improve your network security by inspecting encrypted traffic using Palo Alto firewalls, you’re in the right...