Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Services and APP-ID

Palo Alto Networks’ firewall technology includes the capability to identify applications with App-ID and control the traffic based on Service...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

BCP – Business Continuity Plan for Data Center Hurricane Failover & Failback Example

  Table of Contents 1. Objectives 2. Stakeholders 3. RTO/RPO Targets 4. Hurricane Trigger Points 5. Communication Plan 6. Pre-Hurricane...
Read More
Security

Palo Alto – Content Update Best Practices

Best Practices for Palo Alto Content Updates 1. Understanding Content Updates: • Content updates provide new application and threat signatures....
Read More
Security

Firewalls – Stateful vs Stateless

Stateful Firewall Definition: Stateful firewalls maintain a state table that tracks all active connections and sessions passing through it. Session...
Read More
Security

DigiCert Root and Intermediate Certificates

Source: https://www.digicert.com/kb/digicert-root-certificates.htm Download DigiCert root and intermediate certificates DigiCert root certificates are widely trusted and used for issuing TLS Certificates to DigiCert customers—including educational,...
Read More
Security

Palo Alto – Log Forwarding Cards

If you operate Palo Alto Networks firewalls, are you taking full advantage of the critical log data they generate? Palo...
Read More
Security

Palo Alto – Get Geolocation for an IP Address

COR-PALO-A# show location ip 8.8.8.8 United States...
Read More
Security

Palo Alto – Category Testing and Decryption

Using CLI Commands “test security-policy-match” & “test decryption-policy-match” test security-policy-match command allows you to determine which security policy rule would...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Planning – IT Naming Convention

This post provides a consistent naming convention for your enterprise resources to ensure clarity, consistency, and easy identification.   Importance of...
Read More
Load BalancingSecurity

Security – WAF Implementation Best Practices and Recommendations

A Web Application Firewall (WAF) is designed to protect web applications by filtering and monitoring HTTP traffic between a web...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results