user

How-to-Access-Cisco-Catalyst-&-Switch-CLI

How to Access Cisco Catalyst & Switch CLI

This article is explain How to Access Cisco Catalyst & Switch CLI , Cisco catalyst switches & Accessing the cisco IOS CLI. Cisco uses the concept of a command-line interface (CLI) with its router products and most of its Catalyst LAN switch products. The CLI may be a text-based interface during which the user, typically a network engineer, enters a text command and presses Enter. Pressing Enter sends the command to the switch, which tells …

How to Access Cisco Catalyst & Switch CLI Read More »

All-You-Need-To-Know-About-Accessing-CLI-with-Telnet-and-SSH

All You Need To Know About Accessing CLI with Telnet and SSH

All You Need To Know About Accessing CLI with Telnet and SSH in this article explain how to access CLI with telnet and SSH using user and enable (privileged) modes, password security for CLI access from the console. For many years, terminal emulator applications have supported much more than the power to speak over a serial port to a local device (like a switch’s console). Terminal emulators support a variety of TCP/IP applications also , …

All You Need To Know About Accessing CLI with Telnet and SSH Read More »

How-to-Configuring-Cisco-IOS-Software

How to Configuring Cisco IOS Software

How to Configuring Cisco IOS Software first you will want to configure every switch in an Enterprise network, even though the switches will forward traffic even with default configuration. This section covers the essential configuration processes, including the concept of a configuration file and therefore the locations during which the configuration files are often stored. Although this section focuses on the configuration process, and not on the configuration commands themselves, you must know all the …

How to Configuring Cisco IOS Software Read More »

LAN-Switching-Concepts

What are the LAN Switching Concepts

LAN Switching Concepts A modern Ethernet LAN connects user devices also as servers into some switches, with the switches then connecting to every other, sometimes during a design like Figure 7-1. a part of the LAN, called a campus LAN, supports the end user population as shown on the left of the figure. user devices connect to LAN switches, which in turn connect to other switches so that a path exists to the rest of …

What are the LAN Switching Concepts Read More »

Introduction-to-the-Command-Line-Interface-(CLI)-with-the-help-of-Features

Introduction to the Command Line Interface (CLI) with the help of Features

Introduction to the Command Line Interface (CLI) with the help of Features In this article is explaining CLI Features , how to use CLI & how to debug CLI. If you printed the Cisco IOS Command Reference documents, you’d end up with a stack of paper several feet tall. nobody should expect to memorize all the commands—and nobody does. you’ll use several very easy, convenient tools to assist remember commands and save time typing. As …

Introduction to the Command Line Interface (CLI) with the help of Features Read More »

ISO-27001-Annex-A.9.2.5-Review-of-User-Access-Rights

ISO 27001 Annex : A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights

In this article ISO 27001 Annex : A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights these two topic has been explained. A.9.2.5 Review of User Access Rights Control- Access rights of users should be reviewed regularly by asset owners. Implementation Guidance- The following should be considered while reviewing the access rights:- Access rights of users should be reviewed at regular intervals and after any changes, such as promotion, demotion …

ISO 27001 Annex : A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights Read More »

ISO-27001-Annex-A.9.2.3 Management-of-Privileged-Access-Rights

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users these two topic is explained in this article. A.9.2.3 Management of Privileged Access Rights Control- A.9.2.3 Management of Privileged Access Rights The allocation and usage of exclusive access privileges will be limited and controlled. Implementation guidance- A structured authorizing procedure in accordance with the appropriate access management policies should monitor the allocation and usage of delegated …

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users Read More »

ISO-27001-Annex-A.9.2-User-Access-Management

ISO 27001 Annex : A.9.2 User Access Management

ISO 27001 Annex : A.9.2 User Access Management Its objective is to ensure approved user access and avoid unauthorized access to systems and facilities. A.9.2.1 User registration and de-registration Control- In order to allow the assignment of access rights, a systematic process of user registration and de-registration should be enforced. Implementation guidance- The process to manage user IDs should include: Use unique user IDs to encourage users to be connected to and hold accountable for …

ISO 27001 Annex : A.9.2 User Access Management Read More »

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2) in this article you will learn different types of EC2 Services like AWS Systems Manager, Placement Groups, AWS Elastic Beanstalk and Amazon Elastic Container Service and AWS Far gate etc. EC2-Related Services This section will briefly introduce you to a few more EC2 features. Some of these features won’t necessarily play a large role in the solutions architect exam but could definitely come in handy for you in your …

Services Related Elastic Compute Cloud (EC2) Read More »