Home LookingPoint Blog

Blog

Apr 10

Using DNA Center (Catalyst Center) LAN Automation to make your life easier.

I am currently deploying an SD-Access fabric using Cisco's DNA Center, now rebranded as Catalyst Center. As part of this project we used the LAN automation process to build the network to all of the access switches. We had about 15 different switches in 15 different IDFs so using this process made quick work of...

Continue reading

Understanding Switch Stacking

Switch stacking is a technology which will allow multiple switches to become a single logical switch. Which will allow you to manage them as a single switch. Cisco has Stackwise. Stackwise architecture allows stacking up to eight switches. Other Vendors has their own stacking technology which is similar. In this discussion, we are only going to go through adding a...

Continue reading

Another year and another Webex One event! This event was promised to have the most innovative announcements and by the looks of it, Webex could be on its way to be the most feature UCaaS product out there.

We will go over the key announcements in this article and what’s refreshing about these announcements is that Webex isn’t creating feature for the niche people out there, they are reinventing...

Continue reading

Poorly configured networks are vulnerable to many attacks. Easy attacks. In this blog we will demonstrate how easy it is to perform a DoS attack on a DHCP scope. Afterwards, we will remediate our poorly configured network devices with a security feature that you should include on every deployment to protect against this type of attack.

Continue reading

Once logged into the wireless controller, creating a WLAN is very simple. Configuring the WLAN’s setting is where it can become difficult. Creating the WLAN is as easy as entering one command in configuration mode. That command is the wlan command. In this blog I will be covering some basic commands for you to create and configure some general properties of a Wireless network.

Continue reading

Starting with Firepower 7.2, Cisco announced the ability to manage these firewalls using a Cisco hosted Cloud-Delivered Firewall Management Center (cdFMC). I recently had a project setting up cdFMC for the first time so I figure I would go over what I learned and show how to access cdFMC, how to import policies, and join your first Firepower firewall.

Continue reading

If you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...

Continue reading
Check out our comprehensive guide on simplifying your network configuration with Switch Templates! Continue reading

Recently I captured a Wi-Fi survey for a customer. While looking at the data in Ekahau. I noticed a small area that had lower data rate than the rest of the building. While trying to figure out why I checked the normal suspects like signal strength, noise, signal to noise ratio, co-channel interference, and channel width. The data from these categories all looked good and there was no clear...

Continue reading

In the dynamic landscape of modern telecommunications, the role of a Collaboration Engineer is one filled with continuous evolution and challenges. Throughout the course of their career, these professionals often find themselves at the forefront of critical transitions within an organization's communication infrastructure.

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets