Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Routing & SwitchingSecurity

VLANs and Access Control

I’m writing this post because I’ve been in many environments where a VLAN is brought up as if it’s securing...
Read More
Routing & Switching

RFC5737 – IPv4 Address Blocks Reserved for Documentation

This post shows three IPv4 address blocks that are available for documentation purposes. Predefined address ranges for documentation and examples...
Read More
Servers

IIS Log File Type Sets the Time Zone

The other day, I worked with IIS, which has been a while. I looked at the logs with a coworker...
Read More
Data CenterLoad Balancing

F5 – Items Not Synced During ConfigSynch Between Device Group Members

During a configuration synchronization (ConfigSync) procedure, BIG-IP elements that are not synced amongst device group members are discussed in this...
Read More
Security

Palo Alto How and When APP-ID Works

The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...
Read More
SecurityServers

Microsoft Recommended Block Rules

From Microsoft:...
Read More
Data Center

VDC vs VRF

What is the Difference Between VDC and VRF? Virtual Device Contexts (VDCs) and Virtual Routing and Forwarding (VRFs) are two...
Read More
Security

High Level Security Involvement at the Top

Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Evaluating IT Network Costs: OpEx, CapEx, and TCO

Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
Read More
Routing & Switching

EIGRP and OSPF Path Selection Manipulation

I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results