Home LookingPoint Blog

Blog

Efficient network management is crucial for scaling and securing modern networks. Cisco Catalyst Center (formerly DNA Center) offers powerful tools for automating the deployment of device configurations using templates, composite templates, and Jinja2 scripting. In this guide, we will walk through creating and deploying templates, including interface configurations, NTP, SNMP, ACLs, and more, for...

Continue reading
May 21

When thinking about optimizing a workspace, you're mostly thinking: How can users be their most productive selves in this room, and what tools can I provide to help them collaborate, brainstorm, share ideas, and produce results? Designing workspaces is challenging; no two spaces are the same. Each one comes with its own difficulties and requires a certain level of creativity to bring everything...

Continue reading

Multicast DNS (mDNS) has become a critical protocol for modern networks, enabling service discovery across network segments without the need for traditional DNS servers. With the proliferation of IoT devices, Apple products, and various other devices requiring seamless connectivity, implementing an effective mDNS gateway solution has never been more important. In this blog post, we'll explore...

Continue reading

At LookingPoint, we understand that even the best technical teams sometimes need a second set of eyes, faster escalation paths, or just a bit of extra support when it matters most. That’s why we’re excited to introduce Express Support—our enhanced support offering designed to work alongside your existing Cisco SMARTnet.

Continue reading

In today’s modern network security landscape, protecting your organization’s resources requires more than just securing IP addresses. The key to a robust and adaptive security strategy is integrating user identity (User-ID) with your firewall. Palo Alto Networks offers a powerful and flexible User-ID feature, allowing you to associate network traffic with user identities, rather than relying...

Continue reading

When it comes to securing a network, firewalls play an indispensable role. Among the leading firewall vendors, Palo Alto Networks stands out for its advanced, feature-rich solutions that go beyond traditional security to offer next-generation firewall capabilities. From small businesses to large enterprises, Palo Alto firewalls provide an effective defense mechanism to safeguard sensitive data...

Continue reading

When upgrading or transitioning from a Palo Alto Networks PA-820 to a PA-1410, it's important to ensure that your configuration settings are seamlessly transferred. The PA-1410 offers higher performance and more features than the PA-820, but transferring configurations can sometimes be tricky. This blog post will guide you through the necessary steps to copy configurations from a PA-820 to a...

Continue reading

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In modern network environments, providing seamless communication and service discovery for Apple devices is essential. Bonjour, Apple’s zero-configuration networking protocol, is widely used for device discovery, resource sharing, and communication in local area networks (LAN). It allows devices such as printers, cameras, speakers, and computers to automatically detect and connect to each other...

Continue reading

Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets