Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – SSL Decrypt Test Which Policy is Used CLI

Used the “test decryption-policy-match” command: corderoPA-A(active)> test decryption-policy-match source {SOURCE-IP} destination {DESTINATION-IP} Matched rule: 'Do Not Decrypt' action: no-decrypt...
Read More
Security

Palo Alto – Perform FIB Lookup for a Specific Destination

This command is a good one that I use often. There are time I want to see if a route...
Read More
Security

Bouncing VPN Tunnels

#####PALO ALTO —–GUI: Refresh or restart an IKE gateway. 1. Select Network > IPSec Tunnels and select the tunnel for...
Read More
Laptops & DesktopsSecurityServers

Finding Public IP Ranges using DIG

This is one way to find public IP Ranges for email using DIG. This is used if you want to...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Common Ports

Routing & SwitchingSecurity

Palo Alto – Display Port Information (media type, interface counter, speed/duplex, etc…)

There are two good commands to run:...
Read More
Security

Palo Alto – Source Ping

Something to keep in mind is when you ping from a Palo Alto firewall via the CLI, it’s going to...
Read More
Security

Palo Alto – Importing an Intermediate CA

There might be times where you need to import an Intermediate CA because the FW is restricting access to a...
Read More
Security

Palo Alto Application Dependency

When configuring App-ID in Palo Alto Networks firewalls, it is crucial to pay attention to the “Depends on:” section in...
Read More
Security

Okta Voice Call Authentication MFA Being Blocked – Tmobile Spam Blocking

I noticed that the Okta Voice Call Authentication callback option for MFA was not working for my Cell phone number....
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results