Network technologies and trends:

Switches


June 22, 2008  12:59 PM

Cisco Cool Tips – Series 1-Cutting and Pasting config via Hyperterminal



Posted by: Yasir Irfan
Cisco, Cisco Tips, HyperTerminal, Network Documentation Policy, Networking, Routers, Switches

If you cut and paste your config onto an IOS-based switch using Hyperterminal, it breaks down about midway. This occurs because Hyperterminal sends the text too quickly for the switch, particularly if a command returns a message, such as portfast. To avoid this, in Hyperterminal, select File –...

June 22, 2008  6:08 AM

Sample I.T Security Policy



Posted by: Yasir Irfan
DataCenter, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Physical Security, Security, Switches

Dear Folks Now I am going to concentrate on the SAMPLE I.T. Security policy for any Organization, I will try to cover in brief some important aspects in the forthcoming weeks, as we all know how important a Security Policy is. I did get an inspiration to draft a sample security policy after...


June 21, 2008  5:42 AM

What is SSH ? and how it can be configured in a Cisco Switch.



Posted by: Yasir Irfan
Cisco, Network Documentation Policy, Networking, Security, SSH, Switches

Secure Shell (SSH) - TCP Port 22 SSH stands for "Secure Shell". SSH commonly uses port 22 to connect your computer to another computer on the Internet. It is most often used by network administrators as a remote login / remote control way to manage their business servers. Examples would be:...


June 17, 2008  7:02 AM

Configuring HSRP in Cisco 6500 Switch



Posted by: Yasir Irfan
Cisco 6500, HSRP, Networking, Switches

Configuring HSRP in a Cisco 6500 Switch Yasir Personel Website:www.yasirirfan.com


June 17, 2008  6:48 AM

Introduction to Cisco port security and the reasons to implement



Posted by: Yasir Irfan
Cisco, Cisco 2950, Cisco 3560, Cisco 3560-E, Cisco 3750-E, Cisco 6500, Networking, Port security, Switches

A growing challenge facing network administrators is determining how to control who can access the organization's internal network—and who can't. For example, can anyone walk into campus LAN , plug in a laptop, and access the network? You might argue that the wall jack has no connection to a...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: