Home LookingPoint Blog

Blog

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In modern network environments, providing seamless communication and service discovery for Apple devices is essential. Bonjour, Apple’s zero-configuration networking protocol, is widely used for device discovery, resource sharing, and communication in local area networks (LAN). It allows devices such as printers, cameras, speakers, and computers to automatically detect and connect to each other...

Continue reading

Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.

Continue reading

In today’s digital landscape, ensuring the security of your network is more critical than ever. With cyber threats evolving rapidly, organizations must adopt robust security measures to protect their sensitive data and systems. One powerful tool in the cybersecurity arsenal is Nessus, a widely used vulnerability scanner. In this blog, we'll explore what Nessus is, how to effectively use it, and...

Continue reading

In network environments, security is a top priority. One of the critical aspects of securing Cisco devices is controlling who can access them and what level of permissions they have. Authentication, Authorization, and Accounting (AAA) is a Cisco framework designed to provide a robust and scalable security mechanism to manage access control on network devices. In this blog, we'll focus on using AAA

Continue reading

In today’s interconnected world, the need for robust cybersecurity measures in industrial environments has never been more critical. With the rise of Industry 4.0 and the integration of IoT devices into manufacturing processes, the Purdue Model provides a structured approach to securing operational technology (OT). In this blog, we’ll explore the Purdue Model, its significance, and how...

Continue reading

Recently, I was asked an interesting question: Can the Microsoft Teams app automatically update a user’s status—like showing when they’re on a call or set to “Do Not Disturb”—based on activity from a Call Manager-registered phone?

Continue reading

In an age where connectivity is paramount, having a clear understanding of your network is more crucial than ever. Network discovery—the process of identifying and mapping devices on a network—plays a vital role in managing IT infrastructure effectively. Whether you're an IT professional, a business owner, or just someone interested in technology, grasping the fundamentals of network discovery...

Continue reading

In this post I am going to focus on the Queuing and Policing aspects of QoS.  To reiterate the scenario I started with in the first part, we will focus on a very common deployment of QoS; support of end to end voice and video deployments.  Additionally, I will focus on Cisco's newer MQC way of deploying QoS rather than the older MLS QoS.

Continue reading

Thanks to Cisco’s push to deploy more Thousand Eyes agents, the Catalyst team has given us an easy button for deploying agents to the Catalyst 9300 and 9400 switches using Catalyst Center, formally DNA Center. The agent is deployed as a docker container using the App-hosing framework built natively into the 9300 and 9400 series platforms. Catalyst Center streamlines the deployment of the...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets