Network technologies and trends:

Server Security


November 22, 2008  12:56 PM

How to configure DHCP Snooping in a Cisco Catalyst Switches.

Posted by: Yasir Irfan
802.1 Q, CCNP, Cisco, Cisco 2950, Cisco 2960, Cisco 3560, Cisco 3560-E, Cisco 3750-E, Cisco 6500, Cisco 6500 Series Catalyst Switch, Cisco 6503, Cisco Catalyst 6503-E Switch, Cisco Catalyst 6506-E Switch, Cisco Catalyst 6509-E Switch, Cisco Catalyst 6509-V-E Switch, Cisco Catalyst 6513 Switch, Cisco IOS, Cisco Learning, Cisco Systems, Cisco Tips, Configuring DHCP Snooping, DHCP, DHCP Snooping, HSRP, IOS commands, Networking, Routing and Switching, Server Security, Switches, Switching, Trunk Ports

 So here we go, with the configuration of DHCP snooping on a Cisco Switch. This feature protects the network by allowing the Cisco Switches to accept DHCP response message only from the authorized servers connected to the trusted interfaces in a Cisco...

July 8, 2008  8:20 AM

Sample I.T. Security Policy – Remote Access Security

Posted by: Yasir Irfan
Cisco, Microsoft Windows, Network Documentation Policy, Network Policies, Network Security, Networking, Policies, Remote Access Secuirty, Security, Server Security, Servers

Finally we are almost proceeding towards the completion of the Sample I.T Security policy, we have just two more topics to cover. Coming days I will try to complete that, here we are with Remote Access Security

July 1, 2008  7:25 AM

Sample I.T Securty Policy – Server Security

Posted by: Yasir Irfan
Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Routers, Server Security, Servers, Switches

Now we are proceeding towards the Server Security Policy, which was quite tiresome to draft. 6‐SERVER SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Limit the number of protocols in use throughout the network to the extent possible. 2. Use connection-monitoring software like the performance...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: