Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
Security

Palo Alto Test a Sample Malware File

Step 1: Download one of the malware test files. You can select from PE, APK, MacOSX, and ELF. If you...
Read More
Security

Palo Alto – Search Filter for Security Polices

There are times I need to search Security rules.  Below is great way to filter in to what you are...
Read More
Laptops & DesktopsSecurity

Palo Alto Ignore List and the Windows Run-As Command

You may run across a time when Window’s service accounts come across your Palo Alto FW taking over the logged...
Read More
Security

Cisco ASA VPN Filters

ACL looks like this: access-list VPN-FILTER permit {remote-IP} [remote-Port] {local-IP} [local-Port] Examples: LOCAL:              ...
Read More
Security

Advantages of Using Palo Alto Firewalls Over Traditional Proxies

Simplified Deployment and Management No Client-Side Configuration: Ease of Deployment: Palo Alto Firewalls do not require configuring each workstation individually,...
Read More
Laptops & DesktopsSecurityServers

Understanding and Configuring TLS Versions in a Windows Environment

Transport Layer Security (TLS) is a critical cryptographic protocol designed to secure communications over computer networks. As cyber threats evolve,...
Read More
Security

Palo Alto – Authenticity Assured: Safeguarding Your Network Against Non-Genuine Products

Palo Alto Networks, a renowned global cybersecurity leader, is well-known for its high-quality firewall products. These appliances form the first...
Read More
Routing & SwitchingSecurity

Palo Alto – Incomplete , Not-Applicable, Unknown-tcp/udp , Insufficient Data , tcp-rst-from-client , tcp-rst-from-server

Incomplete = The three-way TCP handshake didn’t complete. (Routing issue or destination server not listening on the port) Not-applicable =...
Read More
Security

Palo Alto – SSL Decrypt Test Which Policy is Used CLI

Used the “test decryption-policy-match” command: corderoPA-A(active)> test decryption-policy-match source {SOURCE-IP} destination {DESTINATION-IP} Matched rule: 'Do Not Decrypt' action: no-decrypt...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results