Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Evaluating IT Network Costs: OpEx, CapEx, and TCO

Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
Read More
Routing & Switching

EIGRP and OSPF Path Selection Manipulation

I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
Read More
CloudSecurity

Okta Event-Type Logging Filters

These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Read More
Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
Security

CISA Free Cybersecurity Services and Tools

Servers

Migration Plan – Why the Server Team Should Tag Their Servers and Ports

Who’s responsible for tagging and identifying servers and ports in a large-scale network migration? It’s a common point of debate,...
Read More
SecurityServers

Microsoft AD Trusts from a Security Perspective

SEC-NET = Secure Network LESS-NET = The Less Secure Network When it comes to setting up domain trusts between networks...
Read More
Security

Software Development Lifecycle (SDLC) Methodologies (Waterfall, Agile, Scrum)

The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
Read More
Data CenterRouting & Switching

LLDP vs CDP

LLDP and CDP are both network discovery protocols, but they have some key differences: 1. Standardization and Vendor-Neutrality: LLDP is...
Read More
CloudRouting & Switching

AWS “Allowed Prefixes” BGP Routing with More Specific Route

Scenario: We have a subnet configured in the “Allowed prefixes,” a /16. You can’t change the size of a subnet...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Netflow OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results