URL http.host == “api.cordero.me” DNS dns.qry.name == “www.cordero.me” dns.qry.name matches “.cordero.me” dns.qry.name contains “cordero.me” TCP Flags tcp.flags.reset == 1 tcp.flags.push...
*Do not just implement this into a production environment. If can, test this in test environment first. Basic threat detection...
I noticed that the Okta Voice Call Authentication callback option for MFA was not working for my Cell phone number....
When discussing AAA (Authentication, Authorization, and Accounting) in the context of ISE (Identity Services Engine) and Cisco devices, it’s essential...
Another fun topic, asymmetric routing. One thing to keep in mind when it comes to Palo Alto firewalls is that...
Test a security policy rule: test security-policy-match application twitter-posting source-user cordero\kcordero destination 98.2.144.22 destination-port 80 source 10.200.11.23 protocol 6...
Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
When it comes to building out DNS Fully Qualified Domain Names (FQDNs) for application development, it’s important to consider the...