Network technologies and trends:

Network Documentation Policy


July 13, 2008  6:03 AM

Sample I.T. Security Policy – Internet Security



Posted by: Yasir Irfan
Cisco, Exchange, Internet Security, Linux, Microsoft Windows, Mobile, Network Documentation, Network Documentation Policy, Network Policies, Networking, Policies, Routers, Security, Servers, Switches

Finally we are completing this series; here we go with the last topic. It’s Internet Security Policy which is very important to have for any organization. I would welcome your comments which may encourage me to come up with more interesting stuff....

July 8, 2008  8:20 AM

Sample I.T. Security Policy – Remote Access Security



Posted by: Yasir Irfan
Cisco, Microsoft Windows, Network Documentation Policy, Network Policies, Network Security, Networking, Policies, Remote Access Secuirty, Security, Server Security, Servers

Finally we are almost proceeding towards the completion of the Sample I.T Security policy, we have just two more topics to cover. Coming days I will try to complete that, here we are with Remote Access Security


July 5, 2008  6:35 AM

Sample I.T Security Policy – Data Security



Posted by: Yasir Irfan
Backup, Data Security, DataCenter, Exchange, Linux, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Routers, Security, Switches

As we are proceeding ahead, and we have two more topics to be covered to complete this Sample I.T Security Policy, hope fully it will be good and useful to you all. I would like to have some comments which may boost my morale to take up more interesting things in future. Here we are with Data...


July 1, 2008  7:25 AM

Sample I.T Securty Policy – Server Security



Posted by: Yasir Irfan
Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Routers, Server Security, Servers, Switches

Now we are proceeding towards the Server Security Policy, which was quite tiresome to draft. 6‐SERVER SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Limit the number of protocols in use throughout the network to the extent possible. 2. Use connection-monitoring software like the performance...


June 28, 2008  12:25 PM

How to configure ASA/PIX firewall to collect Net flow data from an external router to the netflow collector located in Inside Network.



Posted by: Yasir Irfan
ASA/PIX, Cisco, Netflow, Network Documentation Policy, Networking, PIX 525, Routers

This article provides an example of Net flow configurations in a Cisco Router, ASA/PIX firewall to collect the Net flow data in the internal network.

Bookmark and Share     5 Comments     RSS Feed     Email a friend


June 28, 2008  5:24 AM

Sample I.T Secuirty – Network Security



Posted by: Yasir Irfan
Cisco, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Network Security, Networking, Policies, Routers, Security, Switches

We are continuing our series on Sample I.T Security Policy, so far we have covered Physical, Human, User Secuity and Client. Today lets concentrate on Network security which is as follows 5‐NETWORK SECURITY “IS” CONSIDERED THE FOLLOWING: 1. The network must be designed and configured to...


June 25, 2008  4:48 AM

Sample I.T Security Policy – CLIENT SECURITY



Posted by: Yasir Irfan
Client Security, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Policies, Security

Today there is a seminar organized by Cisco , Data Center 3.0 Statergy event at Meridian. Hopefully I get more info which I can post here. The last Cisco Expo I attended was held two months back. Which was simply outstanding. Ok now lets get back to out Series of Security Policies, today I am going...


June 24, 2008  5:19 AM

Sample IT Security Policy – User Security



Posted by: Yasir Irfan
Cisco, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Policies, Routers, Security, Switches, User Security

As promised I am trying to cover the topics I posted in my first post, now we are proceeding towards the User Security. We should consider the following while drafting the User Security policy. 3‐USER POLICY “IS” CONSIDERED THE FOLLOWING: 1. Networked systems shall update regularly with...


June 23, 2008  5:41 AM

Sample IT Security Policy – Human Security



Posted by: Yasir Irfan
Cisco, DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Physical Security, Policies, Security

In my previous post on IT Securty Policy I did discussed about the Physical Security, now we will continue our journey and lets see what things should be considered while drafting the Human Security Policy. 2‐HUMAN SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Several studies and...


June 22, 2008  12:59 PM

Cisco Cool Tips – Series 1-Cutting and Pasting config via Hyperterminal



Posted by: Yasir Irfan
Cisco, Cisco Tips, HyperTerminal, Network Documentation Policy, Networking, Routers, Switches

If you cut and paste your config onto an IOS-based switch using Hyperterminal, it breaks down about midway. This occurs because Hyperterminal sends the text too quickly for the switch, particularly if a command returns a message, such as portfast. To avoid this, in Hyperterminal, select File –...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: