Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Search Filter for Security Polices

There are times I need to search Security rules.  Below is great way to filter in to what you are...
Read More
Security

IPSEC VPN Timeout Issue between Cisco ASA and PA

Issue A Cisco ASA router initiates an IPSEC VPN tunnel to a Palo Alto Networks firewall. The tunnel drops and...
Read More
SecurityServers

RFC 6761 – Special-Use Domain Names

The acronym “RFC” stands for Request for Comments. These documents are part of a series that describes how the Internet...
Read More
Security

Most Common L2L and Remote Access IPsec VPN Troubleshooting Solutions

Security

Okta MFA O365 Email – Do Not Use Basic Auth

Basic Auth – requires only username/password and not compatible with 2-step authentication  (LEGACY – Bypasses MFA requirements)...
Read More
Security

Software Development Lifecycle (SDLC) Methodologies (Waterfall, Agile, Scrum)

The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
Read More
Laptops & DesktopsSecurityServers

Strengthening TLS Security: Why Strong Ciphers Should Be Non-Negotiable

In today’s digital landscape, securing data in transit is a critical priority for any organization. The Transport Layer Security (TLS)...
Read More
Laptops & DesktopsSecurity

A list of SMTP and POP eMail Settings

Security

Packet Capture – ASA and SNMP

Here are the exact capture commands you can run on the ASA to check SNMP traffic to/from NMS(192.0.2.101). #CAPTURE CONFIG...
Read More
Laptops & DesktopsSecurity

A list of SMTP and IMAP eMail Settings

Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results