CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
ROUTE DOMAIN Route Domains in F5 BIG-IP are a powerful feature that allows for the segmentation of network traffic, thus...
HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
Cisco Optics-to-Device Compatibility Matrix...
New and Changed Information The following table provides an overview of the significant changes up to the current release. The...
There are three phases to setting up the F5’s SSL Bridge configuration. 1. Install Certificates 2. SSL Profiles (Client and...
SSL Offloading (or SSL Termination) In this method, SSL traffic is terminated at the F5 BIG-IP system, decrypted and inspected,...