Network technologies and trends:


June 24, 2008  5:19 AM

Sample IT Security Policy – User Security

Posted by: Yasir Irfan
Cisco, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Policies, Routers, Security, Switches, User Security

As promised I am trying to cover the topics I posted in my first post, now we are proceeding towards the User Security. We should consider the following while drafting the User Security policy. 3‐USER POLICY “IS” CONSIDERED THE FOLLOWING: 1. Networked systems shall update regularly with...

June 23, 2008  8:27 AM

Cisco Cools tips – Series 2,Using Privilege Mode Commands in Global Configuration Mode

Posted by: Yasir Irfan
Cisco, Cisco 6500, Cisco Tips, Networking, Routers, Switches

Begining with IOS version 12.3, Cisco has finally added a command to the IOS that allows you to view the configuration and statistics from within configuration mode. Here’s a handy tip when using the show, ping, and telnet commands. Instead of switching back and forth between global...

June 23, 2008  5:41 AM

Sample IT Security Policy – Human Security

Posted by: Yasir Irfan
Cisco, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Physical Security, Policies, Security

In my previous post on IT Securty Policy I did discussed about the Physical Security, now we will continue our journey and lets see what things should be considered while drafting the Human Security Policy. 2‐HUMAN SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Several studies and...

June 22, 2008  12:59 PM

Cisco Cool Tips – Series 1-Cutting and Pasting config via Hyperterminal

Posted by: Yasir Irfan
Cisco, Cisco Tips, HyperTerminal, Network Documentation Policy, Networking, Routers, Switches

If you cut and paste your config onto an IOS-based switch using Hyperterminal, it breaks down about midway. This occurs because Hyperterminal sends the text too quickly for the switch, particularly if a command returns a message, such as portfast. To avoid this, in Hyperterminal, select File –...

June 21, 2008  5:42 AM

What is SSH ? and how it can be configured in a Cisco Switch.

Posted by: Yasir Irfan
Cisco, Network Documentation Policy, Networking, Security, SSH, Switches

Secure Shell (SSH) - TCP Port 22 SSH stands for "Secure Shell". SSH commonly uses port 22 to connect your computer to another computer on the Internet. It is most often used by network administrators as a remote login / remote control way to manage their business servers. Examples would be:...

June 17, 2008  6:48 AM

Introduction to Cisco port security and the reasons to implement

Posted by: Yasir Irfan
Cisco, Cisco 2950, Cisco 3560, Cisco 3560-E, Cisco 3750-E, Cisco 6500, Networking, Port security, Switches

A growing challenge facing network administrators is determining how to control who can access the organization's internal network—and who can't. For example, can anyone walk into campus LAN , plug in a laptop, and access the network? You might argue that the wall jack has no connection to a...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: