Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto User Agent/ID Troubleshooting

Security

Cisco ASA ISE Posturing Config

Laptops & DesktopsRouting & SwitchingSecurity

Saving Cisco Configurations Using Putty and Removing -more-

When saving device configurations using PuTTY, you’ll got a lot of –more–’s in the configuration file and it’s annoying. To...
Read More
Security

Palo Alto Application Dependency

When configuring App-ID in Palo Alto Networks firewalls, it is crucial to pay attention to the “Depends on:” section in...
Read More
Security

Cisco ASA Threat Detection

*Do not just implement this into a production environment. If can, test this in test environment first. Basic threat detection...
Read More
Security

Cisco VPN Tunnel Troubleshooting & Reset Commands (ASA vs IOS-XE ASR1001-HX)

As an IT network architect, I like having a short, paste-ready runbook for common site-to-site VPN tasks: validate Phase 1/Phase...
Read More
Security

Python – Scan FQDNS, Get the Expiration, and Display Results

# Author: Kerry Cordero # Version: 1.0.0 # Description: This script will scan a text document "dr-dns.txt", get the SSL...
Read More
Security

Windows AD GPP cpassword Exposure

Below I’ll show you how easy it is to get the cpassword.  There are environments where this password could be...
Read More
Routing & SwitchingSecurity

Packet Capture – Cisco Nexus

Cisco Nexus switches use a slightly different syntax compared to the ASA series for packet capturing, which is accomplished through...
Read More
Security

Setting Up SSL Forward Proxy Decryption with Palo Alto Firewalls

If you’re looking to improve your network security by inspecting encrypted traffic using Palo Alto firewalls, you’re in the right...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results