I like to look a the CIS guides and use them as starting point. They are great and you can...
There are times I need to search Security rules. Below is great way to filter in to what you are...
Setting up a Virtual Private Network (VPN) can be tedious. There are multiple phases involved and numerous parameters to be...
Below I am going to give some examples for Policy Static NATs and Regular Basic NATs. Configuring Policy Static NAT...
This post is a high-level design questionnaire that can be used to gather information from a customer’s environment to plan...
HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
I ran accross an issue where a Cisco VCSE device was setup by another engineer but the Palo Alto FW...