Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Data CenterLaptops & DesktopsSecurityServers

DNS Authoritative vs Non-Authoritative (Recursive) and DNS Flows

DNS name servers are usually split into two categories:...
Read More
Routing & SwitchingSecurity

Palo Alto Routing Verification Basics

Security

High Level Security Involvement at the Top

Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Common Ports

Routing & SwitchingSecurity

Palo Alto and Asymmetric Routing

Another fun topic, asymmetric routing.  One thing to keep in mind when it comes to Palo Alto firewalls is that...
Read More
Security

Cross-Sector Cybersecurity Performance Goals Checklist

“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Read More
Security

CyberArk – applicationHost.config vs web.config

Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Read More
Security

Palo Alto – Content Update Best Practices

Best Practices for Palo Alto Content Updates 1. Understanding Content Updates: • Content updates provide new application and threat signatures....
Read More
CloudSecurityServers

SAML

SAML (Security Assertion Markup Language) is an XML-based open standard used for exchanging authentication and authorization data between parties, primarily...
Read More
Security

Palo Alto How and When APP-ID Works

The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results