Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
  • See all results
Home
Wireless
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Wireless

CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

BCP – Business Continuity Planning

Business Continuity Planning (BCP) for IT Networking is a crucial aspect of ensuring the availability and resilience of network infrastructure...
Read More
Wireless

Cisco Wireless Local vs FlexConnect

In Cisco wireless networks, “FlexConnect” and “Local Mode” are two different deployment options for Cisco Lightweight Access Points (LAPs) that...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Certificate Chains

HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Common Ports

Wireless

WiFi Signal Strengths

Wireless signal strength is measured in dBm (decibel milliwatts). 0-60 = GOOD 60-80 = WEAK 80-100 = BAD...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersWireless

Certificates Self Signed vs 3rd Party

Here’s an explanation of the importance of self-signed certificates and third-party certificates in the context of certificate chains: Self-Signed Certificates:...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

IT – COST CAPEX OPEX TCO

COST: The cost is frequently a significant restriction in projects when it comes to network architecture. If we look at...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersWireless

Purchasing Hardware & Software (Information Technology)

The responsibility for handling the procurement of hardware and software in an IT environment typically involves collaboration among various stakeholders...
Read More
Data CenterLaptops & DesktopsRouting & SwitchingSecurityServersWireless

SNMP Polling vs Traps

The difference between these is who is initiating the conversation. In Polling, the monitoring server is initiating the conversation asking...
Read More
Wireless

Wireless Security Preference Summary (Highest to Lowest)

Preference Summary (Highest to Lowest): WPA2 + AES WPA + AES WPA + TKIP+AES WPA + TKIP Disabled (no security)...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Kali M&A macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PCI PDF Planning Policy Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
To The Top
© 2023 cordero.me • All Rights Reserved

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Kali M&A macOS Microsoft IIS Microsoft SQL Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PCI PDF Planning Policy Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco ASA
See all results