Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Importing an Intermediate CA

There might be times where you need to import an Intermediate CA because the FW is restricting access to a...
Read More
Security

Sonatype – Keeping Open Source Secure

Sonatype Nexus Lifecycle is a part of the Sonatype Nexus platform, a suite of tools designed to help automate open-source...
Read More
Security

Palo Alto – What Settings Don’t Sync in Active/Passive HA?

Load BalancingSecurity

Security – WAF Implementation Best Practices and Recommendations

A Web Application Firewall (WAF) is designed to protect web applications by filtering and monitoring HTTP traffic between a web...
Read More
CloudSecurityServers

SAML

SAML (Security Assertion Markup Language) is an XML-based open standard used for exchanging authentication and authorization data between parties, primarily...
Read More
Security

Palo Alto – Category Testing and Decryption

Using CLI Commands “test security-policy-match” & “test decryption-policy-match” test security-policy-match command allows you to determine which security policy rule would...
Read More
Security

Cisco ASA AnyConnect SSL VPN with Hairpinning and ONE Public IP for Web Servers

In this post I am configuring AnyConnect SSL VPN Users access to a remote location that happens to be configured...
Read More
Security

Palo Alto – Get Geolocation for an IP Address

COR-PALO-A# show location ip 8.8.8.8 United States...
Read More
Security

Transition from Certificate Classes to DV, OV, and EV

Historically, certain Certificate Authorities (CAs) utilized a “Class” system to categorize digital certificates. For instance, VeriSign classified them as: Class...
Read More
Security

Cisco ASA VPN Filters

ACL looks like this: access-list VPN-FILTER permit {remote-IP} [remote-Port] {local-IP} [local-Port] Examples: LOCAL:              ...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results