UK: Google Wi-Fi collection violated data protection laws |
- UK: Google Wi-Fi collection violated data protection laws
- How to respond to an unexpected log on request
- Lock Down Your Android Devices
- ICO orders Google to delete Wi-Fi data
- Clean an infected email address book
- Google’s Bug Bounty Program: Barbarians at the Gate
- Paid app, cloud service secure consumer Android phones
- Tokenization: Five Things CIOs Need To Know
- How FedEx Improved Security, Eased Access
- What You Need to Know About New IE Zero-Day
- Cisco rolls out social network monitoring software
- Basic Cisco Switch Configuration
UK: Google Wi-Fi collection violated data protection laws Posted: 03 Nov 2010 09:00 AM PDT |
How to respond to an unexpected log on request Posted: 03 Nov 2010 09:00 AM PDT |
Lock Down Your Android Devices Posted: 03 Nov 2010 09:00 AM PDT Two years ago almost nobody had heard of Android. Now it's nearly ubiquitous among smartphone users, and it's on track to become the most popular mobile operating system in the United States. When it comes to business use, though, Android still has some growing to do. Here's how to keep your Android phones and tablets safe from malware and hackers. |
ICO orders Google to delete Wi-Fi data Posted: 03 Nov 2010 09:00 AM PDT |
Clean an infected email address book Posted: 03 Nov 2010 09:00 AM PDT |
Google’s Bug Bounty Program: Barbarians at the Gate Posted: 03 Nov 2010 09:00 AM PDT Google is offering hackers the chance to win a cash bounty if they can find vulnerabilities in the search giant's top Web applications such as YouTube, Blogger, Gmail and Google.com. Successful Google invaders can be awarded up to $3,133.70 for their hack as well as get their name added to a Google credit Web page. |
Paid app, cloud service secure consumer Android phones Posted: 03 Nov 2010 09:00 AM PDT |
Tokenization: Five Things CIOs Need To Know Posted: 03 Nov 2010 09:00 AM PDT |
How FedEx Improved Security, Eased Access Posted: 03 Nov 2010 09:00 AM PDT |
What You Need to Know About New IE Zero-Day Posted: 03 Nov 2010 09:00 AM PDT Internet Explorer is under attack again. Microsoft has issued a security advisory explaining a newly-discovered exploit impacting most versions of the Internet Explorer Web browser. The security advisory contains details about the threat, as well as some guidance to protect vulnerable browsers pending a patch from Microsoft to fix the hole. |
Cisco rolls out social network monitoring software Posted: 03 Nov 2010 09:00 AM PDT |
Basic Cisco Switch Configuration Posted: 04 Nov 2010 02:59 AM PDT In my opinion, the Cisco switches are the best in the market. Versatile, reliable, flexible and powerful, the Cisco switch product line (such as the 2960, 3560, 3750, 4500, 6500 etc) offer unparalleled performance and features. Although a Cisco switch is a much simpler network device compared with other devices (such as routers and firewalls for example), many people have difficulties to configure a Cisco Catalyst Switch. Unlike other lower class switch vendors (which are plug-and-play), the Cisco switch needs some initial basic configuration in order to enable management, security and some other important features. In this article I will describe the basic steps needed to configure a Cisco switch from scratch. I don't like graphical GUI or web management at all, so I will show you command line configuration which is much more powerful and makes the administrators learn what they are doing on the device. STEP1: Connect to the device via console Use a terminal emulation software such as PuTTY and connect to the console of the switch. You will get the initial command prompt "Switch>" Type "enable" and hit enter. You will get into privileged mode ("Switch#") Now, get into Global Configuration Mode: Switch# configure terminal STEP2: Set up a hostname for the particular switch to distinguish it in the network Switch(config)# hostname access-switch1 STEP3: Configure an administration password (enable secret password) access-switch1(config)# enable secret somestrongpass STEP4: Configure a password for Telnet access access-switch1(config)# line vty 0 15 STEP5: Define which IP addresses are allowed to access the switch via Telnet access-switch1(config)# ip access-list standard TELNET-ACCESS !Apply the access list to Telnet VTY Lines STEP6: Assign IP address to the switch for management !Management IP is assigned to Vlan 1 by default STEP7: Assign default gateway to the switch access-switch1(config)# ip default-gateway 10.1.1.254 STEP8: Disable unneeded ports on the switch ! This step is optional but enhances security access-switch1(config)# interface range fe 0/25-48 STEP9: Save the configuration access-switch1(config)# wr The above are some steps that can be followed for basic set-up of a Cisco switch. Of course there are more things you can configure (such as SNMP servers, NTP, AAA etc) but those depend on the requirements of each particular network. |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment