Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Evaluating IT Network Costs: OpEx, CapEx, and TCO

Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
Read More
Security

CyberArk – Push and Pull Methods

The “push” and “pull” methods in CyberArk are primarily used for managing service accounts. However, they are not exclusive to...
Read More
Security

DigiCert Root and Intermediate Certificates

Source: https://www.digicert.com/kb/digicert-root-certificates.htm Download DigiCert root and intermediate certificates DigiCert root certificates are widely trusted and used for issuing TLS Certificates to DigiCert customers—including educational,...
Read More
Security

Palo Alto User-ID Ignore List Notes

There are times you’ll want to create an ignore list on the Palo Alto. Basically what this is doing it...
Read More
Security

Palo Alto – URL Filtering with Service/URL Tab vs URL Filtering Profile in Security Profile

Setting up rules on a Palo Alto firewall requires a clear understanding of URL Filtering, especially when comparing the Service/URL...
Read More
Laptops & DesktopsRouting & SwitchingSecurity

Saving Cisco Configurations Using Putty and Removing -more-

When saving device configurations using PuTTY, you’ll got a lot of –more–’s in the configuration file and it’s annoying. To...
Read More
Laptops & DesktopsSecurity

Packet Capture – Microsoft Windows Built-in Packet Capture PKTMON (Older NETSH TRACE)

Yes, both Windows 10 and 11 include a built-in command-line tool for packet capturing named “Packet Monitor” or pktmon. It...
Read More
Security

Palo Alto – Search Filter for Security Polices

There are times I need to search Security rules.  Below is great way to filter in to what you are...
Read More
Load BalancingSecurity

Security – WAF Implementation Best Practices and Recommendations

A Web Application Firewall (WAF) is designed to protect web applications by filtering and monitoring HTTP traffic between a web...
Read More
Security

Certificate Testing Site

This site is good for testing thinks like TLS versions and Untrusted Root. https://badssl.com/ https://untrusted-root.badssl.com https://tls-v1-0.badssl.com/ https://tls-v1-1.badssl.com/ https://tls-v1-2.badssl.com/...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting LAG Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python Spanning-Tree Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
To The Top
© 2023 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting LAG Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python Spanning-Tree Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 DNS
See all results