This blog consists of configurations and processes I have performed in a lab environment. In no way do I recommend or imply these processes need to be followed or are the correct way to execute on any network. Perform at your own risk. Also, please feel free to leave comments if my configurations are too old/need updating.
What's Popular
-
1. You can perform this either from user mode or privileged mode: a. SW1>ssh -l user_name ip_address b. SW1#ssh -l user_name ip_a...
-
Step 1: UCS-A# scope security Step 2: UCS-A /security # scope keyring default Step 3: UCS-A /security/keyring # set regenerate yes Step 4: U...
-
Via GUI: • Click on Device tab > Setup link > Operations tab • Click on shutdown device under device operations on the right...
Meh, Whatever is Featured
Linking Active Directory to Palo Alto
###First you need to create a server profile under the LDAP section. DEVICE>Server Profiles>LDAP then click on the Add down at the bo...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment