Home LookingPoint Blog

Blog

Michael Lorincz

Recent Posts

Access lists and SVIs have been around forever, and while applying access lists to physical interfaces seems to logically sink it quite easily, access lists on SVIs interfaces seem to trip people up. This blog will cover that scenario as well as some other access list basics, hopefully by the end you’ll find the concepts cemented.

Continue reading

Firepower FTD Remote Access VPN SSO using SAML and Azure AD, with Azure AD Conditional Access to Duo 2FA, and Cisco ISE for Authorization and Group Policy Assignment

There are multiple components to this solution, and while there are a few different approaches to accomplish the end goal, I wanted to focus on a solution that didn’t require an onsite Duo Authentication Proxy server. This blog will...

Continue reading
Jun 29

This is a follow-up Blog to the outstanding high level introduction to SASE presented by Lookingpoint President, Sean Barr, if you haven’t seen it, check it out here! For anyone interested in getting into the weeds a bit further, feel free to stick around!

Continue reading

Hi People, welcome to another exciting edition of my blog. Today I will be covering IOS best practices (some of them at least). While these will be specific to Cisco IOS they’re also applicable to other types of Cisco devices. You’ll also find many of these best practices are also seen on IOS-XE/NX-OS platforms, however the syntax may differ (please verify before attempting to apply).

Continue reading

<Insert Creative/Witty/Charming Intro Here>.

How to Setup Anyconnect Remote Access VPN w/ Cisco FMC and FTD Firewalls, utilizing ISE & Duo 2FA for authentication and authorization, that’s a mouthful, isn’t it? For those who aren’t sure what I’m talking about, the goal of this blog is to pass along what I learned getting Anyconnect remote access VPN working with ISE and Duo 2FA for...

Continue reading

Notepad++ for the Modern Network Engineer

Continue reading
Sep 25

Wireless networking is now considered a must have in nearly all industries. It’s no surprise I get a lot of comments from clients who believe they are experiencing wireless trouble in some form or fashion. They aren’t sure if it’s related to wireless controller configuration, AP placement, coverage gaps, interference, or even client machine problems. Even though Wi-Fi is nearly as prevalent as...

Continue reading

Take one look at me and you’ll quickly identify me as someone who loves pi (and pie). Specifically, the Raspberry Pi, they are a permanent accoutrement to my workspaces. With the Pi 4 now officially out what better time to dust off those old Pis and put them to work in your network tool kit. Chances are you already have all the components laying around.

Continue reading

Have you ever found yourself in a position where throughput between devices, either local or across a WAN, seemed lower than expected? You may start by checking the configuration and logs on the network devices along the path, hoping to identify something out of the ordinary or unusual. Often a smoking gun isn’t immediately identifiable which then requires a coordinated approach to...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets