Our documents are based on successfully executed projects which save you time and money.
networking , sample-it-spreadsheets

Sample Excel – Radware Monitoring Parameters OIDs

February 7, 2015

Free Excel document download Radware Monitoring Parameters OIDs

Tags: , Img
compliances , networking , sample-it-spreadsheets

Sample Excel – Sample Network Wiring Request

February 3, 2015

Free Excel document download Sample Wiring Request

Tags: , Img
compliances , networking , security

Sample – Network UAT Change Policy

January 29, 2015

Network Services is requiring User Acceptance Testing (UAT) on all high risk/high impact changes and/or changes that will result in a known impact or system degradation. The risk scoring of the change is based on information entered in the change record as well as the Enterprise model used for...

Tags: , , Img
firewalls , sample-it-spreadsheets

Sample Excel – PIX Firewall Peer Review Log

January 22, 2015

Free Excel document download PIX Firewall Peer Review Log  

Tags: , Img
networking , sample-it-spreadsheets

Sample Excel – SNMP Fireeye MIB

January 18, 2015

Free Excel document download SNMP Fireeye MIB

Tags: , Img
compliances , data-center-soc-noc , networking

Sample – High Level LAN Architecture Considerations

December 14, 2014

Standards-based: Implementation, Monitoring and Break / Fix. Green Initiatives – reduce power, space, & cable plant requirements. High Speed Backup Infrastructure design. Wireless Standards for Trusted Laptops and BYOD. Deployment in new office build-outs. Implement Global LAN Multicast Architecture Migrate LAN infrastructure of recently acquired sites to corporate standards....

Tags: , , Img
networking , security

Our Cisco Switching Notes

September 12, 2014

Switching is ASIC (hardware) –based, as opposed to bridges (software). Otherwise, a switch is like a bridge with many more ports. A L3 “intelligent” switch is faster than a router and can sort by L3 addresses. Switches perform address learning by reading frames’ source addresses. They make forward-or-filter decisions...

Tags: , Img
visio-stencils

Sample Visio – Citrix XenServer Visio Drawing

August 18, 2014

Simple sample Citrix Netscaler co-location high level design. Citrix XenServer Drawing Free – Visio Document download Citrix_Netscaler.vsd

Tags: , Img
networking , visio-stencils

Sample Visio – NAS Visio Drawing

July 28, 2014

Free sample document NAS – Network-attached storage Visio Download NAS.vsd www.bestitdocuments.com

Tags: , Img
visio-stencils

Sample Visio – Sample DNS Flows

December 20, 2013

Sample approach to a webcommerce DNS design. The webcommerce.local domain will be authoritatively hosted by Active Directory Integrated DNS on at least two DC’s / DNS servers.  One of these servers will be located in Dallas and the other, for fault tolerance reasons, will be located at the San...

Tags: , Img
compliances , networking , sample-it-spreadsheets , security

PowerPoint – SNMP In Depth

November 28, 2013

Free PowerPoint document download SNMP In Depth www.bestitdocuments.com

Tags: , , Img
visio-stencils

Sample Visio – Citrix XenServer Drawing

September 4, 2013

Free Visio Document Download Sample and simple high level design. Citrix XenServer www.bestitdocuments.com

Tags: , Img
compliances , projects , security

IT Strategy and Technology

August 10, 2013

Becoming customer-centric starts with Strategy and is supported with Technology Enablers.  Technology is a means to an end.  Not an end in itself. Strategy and objectives identification. What is our overall mission? The value proposition? Marketing strategy? How will loyalty models be utilized or trigger-based marketing? Develop the customer...

Tags: , , , , , Img
application , security

Enabling – Oracle Audit Configuration for Security Audit Trails

June 22, 2013

Make sure you have enough disk space to support the storage of the event logs and make sure you have a process or strategy for log rotation / retention. The purpose of this document is to define the specific Oracle parameters required to capture the desired Oracle database events...

Tags: , , , Img
application , networking , policies , security , web-services

Network Security Scan Types and Considerations

June 14, 2013

Network Scan Types and Scope This network scanning recommendations defines network scan types, identifies reasons for scanning, identifies times when network scanning is allowed, who should approve network scanning, and specifies who should be notified when network scanning is done. Network device location scan – This scan may use...

Tags: , , Img
networking

Cisco – Short Cryto PIX commands

May 18, 2013

PIX IPSEC Commands isakamp enable interface-name isakamp policy policy-number, authentication pre-share isakamp policy policy-number, encryption 3des isakamp policy policy-number, hash md5 isakamp policy policy-number group 1 isakamp policy policy-number lifetime 1000 crypto ipsec transform-set set-name esp-3des esp-md5-hmac crypto map name priority set peer peer-address crypto map name priority set...

Tags: , Img
compliances , firewalls , networking , policies

SPLAT – Nokia Appliances IP / IPSO Security Configuration Standards

April 27, 2013

Purpose This document will provide standards for the configuration of Nokia IP Security Appliances.  These standards will provide continuity across the enterprise for all Nokia Appliances. Background Nokia IP Security Appliances are purpose built security devices, which are deployed at strategic locations throughout the Corporate Security to run Check...

Tags: , , Img
compliances , networking , policies , security

Enterprise IT Incident Response – Network Forensic Considerations

April 27, 2013

Network Forensics allows your organization to capture valuable, actionable intelligence to help secure your network and help ensure its availability. By capturing raw network data and using advanced forensics analysis, your IT and security staff can effectively identify how your business assets are affected by network exploits, internal data...

Tags: , , , Img
networking , security

Cisco PIX – Logging Command Reference Shortcuts

April 26, 2013

Logging Message Filtering No logging message buffer-number: Do not manages with “number x” Logging Message Filtering 11101 Configuration mode change messages 11104 11105 11106 11107 11108 11109 502103 Privilege Level Change Message 611103 – 611104 User Logout Messages 304001 HTTP Path Messages Pix Logging – Syntax: loggin on enable...

Tags: , , , Img
networking , security

Sample Visio – TACACs Design Overview

April 24, 2013

Sample Visio Document download Sample – TACACs Design Overview

Tags: , , , Img
networking , security

Sample Word – Network Oversubscription Considerations

April 23, 2013

Sample Word document network document download Sample – Network Oversubscription Considerations

Tags: , , , Img
networking , security

Sample – Device Configuration Backup Network Management Standard

April 23, 2013

Overview Device configuration backup standard means that the running configuration must be saved into the router start-up configuration file first and then it must also be saved to an offline location a regional NMIS Archive server. To maintain the versions of the configuration files on the offline server first...

Tags: , , , Img
networking , sample-it-spreadsheets , security

Sample Excel – Cisco – debug ip http transaction cheat sheet

April 22, 2013

Free Excel document download Cisco – debug ip http transaction cheat sheet

Tags: , , , Img
networking , sample-it-spreadsheets , security

Sample Excel – Cisco – IP Route Cheat Sheet

April 20, 2013

Sample Excel document download Show IP Route Cheat Sheet

Tags: , , , , Img
networking , security

Sample – CDP Network Management Standard

April 20, 2013

CDP Network Management Standard Overview CDP is used to discover the neighbor networking devices. CDP mostly works with Cisco hardware only, but some other vendors have implemented this as well. CDP is critical in network discoveries and it needs to be enabled on the all the devices. CDP is...

Tags: , , , Img
networking , security , visio-stencils

Sample Visio – Cisco – ACL Syntax

March 25, 2013

ACL’s are applied to a specific router interface in a specific direction: interface GigabitEthernet1/2 ip access-group 101 in …. Use different packet filters to control packets coming in and out of a network.  Free Visio document download   – Cisco ACL Syntax

Tags: , , Img
business

Sample – Cisco IOS Command Matrix

March 21, 2013

Move Up or Down Between Different Modes – Prompts. Mode:   Prompt down: up: enter/leave IOS:    none —– —– —– —– —– —– —– user exec: return exit exit quit quit logout logout > —– —– —– —– privileged exec: enable disable     # —– —– —– —– —–...

Tags: , Img
compliances , networking , security

Sample Word – Security Guidelines for Wireless LAN

March 17, 2013

Sample Word Document guideline. Author unknown. Security Guidelines for Wireless LAN

Tags: , , Img
application , compliances , sample-it-spreadsheets , security , web-services

Sample Excel – Certificate Life-Cycle Management Tracking

March 12, 2013

Free – Excel Document download Certificate Life-Cycle Management Tracking www.bestitdocuments.com

Tags: , , Img
application , compliances , security , visio-stencils , web-services

Sample Visio – Certificate Life-Cycle Management (CLM)

March 12, 2013

Free – Visio Document download Certificate Life-Cycle Management www.bestitdocuments.com

Tags: , , Img
business , data-center-soc-noc , networking

Sample eHealth / Spectrum – Network Device Monitoring Considerations

January 28, 2013

Overview: Devices send traps the SDC – Secure Domain Connector  Central trap locations for all devices:  Primary Trap Director          Host-Name: IP Address: Location:  Failover Trap Director   Datacenter Network Devices:  eHealth eHealth Primary snmp-server “Host-Name” snmp-server “community”  Datacenter Network Devices: Host-Name: IP Address: Location:  eHealth eHealth Backup snmp-server “Host-Name” snmp-server...

Tags: , , Img