top of page

Where Networking Meets Insight

Category ✅
Search


AWS Networking
AWS Networking Amazon Virtual Private Cloud: Amazon VPC is a virtual network service that lets you launch AWS resources in a logically...
-
Apr 11, 20249 min read


Cheatsheets
All network security Cheatsheets available on below link https://drive.google.com/drive/folders/1UmDwuM3z_rPpu4qoim-S2y1jlWhe7Z2k?usp=sha...
-
Apr 7, 20241 min read
Azure fundamentals
Introduction Azure is a cloud computing platform with an ever-expanding set of services to help you build solutions to meet your business...
-
Mar 31, 202496 min read


SOC Interview
SOC Intervie w What do you have in your home network ?I set up a very strong user name and password for my router and Wi-Fi . its...
-
Jan 29, 202425 min read
How To Test Security, NAT, and PBF Rules via the CLI in Paloalto
If we know the src , dst, port, protocol The following arguments are always required to run the test security policy, NAT policy and PBF...
-
Jan 23, 20241 min read
ISE BYOD: Dual vs Single SSID Onboarding
In general it is recommended to minimize number of ' SSIDs. Also, if the guest access is using hotspot access then single-SSID BYOD is...
-
Jan 19, 20242 min read


commonly used f5 irule
Host and URL Rewrite, Content Matching and Redirecting Below are some example iRules used for redirecting and rewriting URL and Host...
-
Jan 12, 20241 min read


Event logging in F5 ASM
Configuring Event Logging in BIG-IP ASM In this article, we will explore the importance and configuration of event logging in BIG-IP ASM...
-
Dec 23, 20232 min read
Username and session awareness tracking
Let's say you are building an awesome web application. You want to have as many visitors as possible, but you want to keep your...
-
Dec 23, 20235 min read


Data Guard in F5
Data Guard As we all know, we need to protect the personal and sensitive information of our users. So back in the day, some super-smart...
-
Dec 23, 20234 min read
F5 ASM Geolocation
The ASM can do lots of great things to protect your application, not the least of which is the Geolocation features it offers....
-
Dec 23, 20234 min read


Ip address intelligence of f5 ASM
This article will discuss some really cool ASM features: IP address intelligence and whitelisting. It's hard to defend against all the...
-
Dec 23, 20237 min read
concepts of XML and how the BIG-IP ASM provides security for XML
concepts of XML and how the BIG-IP ASM provides security for XML XML Concepts XML Concepts The Extensible Markup Language (XML) provides...
-
Dec 23, 20234 min read
What Is An Attack Signature in F5 ASM ?
What Is An Attack Signature? What Is An Attack Signature? Attack signatures are rules and patterns that identify attacks against your web...
-
Dec 23, 20236 min read


The Importance of File Types, Parameters, and URLs of F5 ASM
The Importance of File Types, Parameters, and URLs- This third article in the series will discuss the importance of File Types,...
-
Dec 23, 20236 min read
What Is A Security Policy in F5
What Is A Security Policy? What Is A Security Policy? A security policy is a collection of settings that secures traffic for a web...
-
Dec 4, 20237 min read
F5 ASM basic understanding
The Basics The BIG-IP ASM is a Layer 7 ICSA-certified Web Application Firewall (WAF) that provides application security in traditional,...
-
Nov 27, 20233 min read
Zscaler Client Connector Errors
Zscaler Client Connector Errors Error Message — Failed to Initialize Authentication: PAC Download Failed- This error occurs when the...
-
Nov 4, 20232 min read
XXE attack questions and answers
XXE attack questions and answers XXE attack questions and answers Certainly, here are answers to the questions about XML External Entity...
-
Nov 1, 20234 min read


Cisco AnyConnect VPN Troubleshooting
Scenario 1- Unable to access the VPN website If you cannot access the VPN website https://vpn.sandybrown-stingray-351145.hostingersite.co...
-
Oct 31, 20234 min read
bottom of page