Network technologies and trends:

July, 2008


July 6, 2008  6:25 AM

How to restrict the web access to Cisco Switches & Routers.

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 Here in this example I am going to show you how to restrict the web access to any Cisco IOS Switch or Router. If web-based administration of the switch is necessary, then restrict HTTP access to the switch. Configure a standard access-list (e.g., 11) that allows only the administrators’...

July 5, 2008  11:37 AM

Fiber Runner – Great for Data Centers

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Other Day I was in a seminar Data Center Stratergy 3.0 organised by Cisco.Leading local industry pundits attended this seminar and it was a simply great. Cisco officially launched Nexus 5000 in this part of the region. There were some good presentations and case studies on Nexus...


July 5, 2008  6:35 AM

Sample I.T Security Policy – Data Security

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

As we are proceeding ahead, and we have two more topics to be covered to complete this Sample I.T Security Policy, hope fully it will be good and useful to you all. I would like to have some comments which may boost my morale to take up more interesting things in future. Here we are with Data...


July 1, 2008  11:20 AM

Cisco Cool tips- Series 4 -Show modules

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Here is one more cool command which shows a summary of modules installed in a Cisco 6500 Switch. MBGF-DAC-6500-BB02#sho modules Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------...


July 1, 2008  7:25 AM

New CCNA Certifications– CCNA Voice, CCNA Security & CCNA Wireless

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

As the network trends are changing so does Cisco, they came up with three new certifications. The hot new areas for CCNA Certifications are Voice, Security and Wireless. Intorduction of these three certifications can assure and help you to verify the specialized skills that are great demand among...


July 1, 2008  7:25 AM

Sample I.T Securty Policy – Server Security

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Now we are proceeding towards the Server Security Policy, which was quite tiresome to draft. 6‐SERVER SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Limit the number of protocols in use throughout the network to the extent possible. 2. Use connection-monitoring software like the performance...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: