Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Source Ping

Something to keep in mind is when you ping from a Palo Alto firewall via the CLI, it’s going to...
Read More
Security

Palo Alto RMA Replacement

Palo Alto calls the new replacement FW a spare....
Read More
Laptops & DesktopsSecurityServers

Finding Public IP Ranges using DIG

This is one way to find public IP Ranges for email using DIG. This is used if you want to...
Read More
Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
SecurityServers

Microsoft SQL DBO

In SQL Server, DBO refers to the database owner schema. The dbo schema is the default schema for a newly...
Read More
Data CenterSecurityServers

Splunk Architecture and Design

There’s a lot you need to think about when designing your Splunk environment. I’m hoping to keep adding to this...
Read More
SecurityServers

Palo Alto unknown-udp issue for Syslog Traffic

I ran accross an issue where a Cisco VCSE device was setup by another engineer but the Palo Alto FW...
Read More
Data CenterLaptops & DesktopsSecurityServers

NTP Design Stratum Numbers

I already posted about NTP in a Windows domain. I want to briefly talk about stratum numbers. I’ve been in...
Read More
Laptops & DesktopsSecurity

A list of SMTP and IMAP eMail Settings

Security

Palo Alto – SSL Decrypt Test Which Policy is Used CLI

Used the “test decryption-policy-match” command: corderoPA-A(active)> test decryption-policy-match source {SOURCE-IP} destination {DESTINATION-IP} Matched rule: 'Do Not Decrypt' action: no-decrypt...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting IP Sla Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
To The Top
© 2023 cordero.me • All Rights Reserved

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting IP Sla Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco ASA
See all results