Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Laptops & DesktopsSecurityServers

Data Flow – HTTPS Traffic and Cipher Suites

Here’s a step-by-step breakdown of the data flow: DNS Resolution: The user enters “https://cordero.me” into their browser’s address bar. The...
Read More
Security

Upgrade Palo Alto HA (High Availability) Firewall Pair

Step-by-step process to upgrade an HA (High Availability) firewall pair to PAN-OS 10.2. Here’s the summarized procedure:   Review the...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

BCP – Business Continuity Planning

Business Continuity Planning (BCP) for IT Networking is a crucial aspect of ensuring the availability and resilience of network infrastructure...
Read More
CloudSecurityServers

DNS for App Dev Prod and Non-Prod

When it comes to building out DNS Fully Qualified Domain Names (FQDNs) for application development, it’s important to consider the...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersWireless

Certificates Self Signed vs 3rd Party

Here’s an explanation of the importance of self-signed certificates and third-party certificates in the context of certificate chains: Self-Signed Certificates:...
Read More
Security

Upgrade Palo Alto Firewalls with Panorama (Internet-connected)

The process to upgrade firewalls when Panorama is Internet-connected involves several steps:   Review the PAN-OS 10.2 Release Notes: Understand...
Read More
Laptops & DesktopsSecurityServers

Architect – Support Management (Help Desk / Service Desk)

Building out a proper help desk with different levels and delegated alerting is critical for several reasons: Efficient Use of...
Read More
Routing & SwitchingSecurity

Forward Proxy vs Reverse Proxy and Where Does Palo Alto FW and F5 LB Fit In

A Forward Proxy and a Reverse Proxy are two different types of proxies with distinct functionalities: Forward Proxy: A forward...
Read More
Security

Python – Scan FQDNS, Get the Expiration, and Display Results

    #This script will scan a text document "dr-dns.txt", get the SSL Certificate Expiration, and show the date. There's...
Read More
Security

Cross-Sector Cybersecurity Performance Goals Checklist

“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting IP Sla Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
To The Top
© 2023 cordero.me • All Rights Reserved

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting IP Sla Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco ASA
See all results