Home LookingPoint Blog

Blog

In the modern networking world routing protocols fall into two distinct camps, Link-state and Distance Vector. Being a network consultant I often have customers asking me which routing protocol is better so I figure I would create a post comparing the different routing protocols.

Continue reading

A long long time ago in a convention hall not so far away from my dark, cozy office….(cue music by composer John Williams)

Continue reading
Nov 13
Meraki SD-WAN
Posted by Rick Wong

If you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu. Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change. In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...

Continue reading

February 24th is coming up fast and those of us working on our certifications are scrambling to complete them before the change. But for those who may not get it done before the deadline, you may need to start studying for the new exams. But what is on the new exams, what topics are covered, and most importantly what training material is out there. Today I will be comparing the certification...

Continue reading

All major server manufactures have a built-in baseboard management controller (BMC) for remote server management. These are great tools for onboarding a server and maintaining the server throughout its lifetime. Most of my day to day experience has been using the Cisco IMC, Dell iDRAC, HPE iLO, and IBM IPMI. Some of the server vendors require an additional license to unlock the full features of...

Continue reading

Hello loyal LP blog cats. In this week’s quick post, I’m going to show you a tactic I use to ensure that you never lock yourself out while making changes to a Cisco router or switch configurations.

Continue reading
Sep 25

Wireless networking is now considered a must have in nearly all industries. It’s no surprise I get a lot of comments from clients who believe they are experiencing wireless trouble in some form or fashion. They aren’t sure if it’s related to wireless controller configuration, AP placement, coverage gaps, interference, or even client machine problems. Even though Wi-Fi is nearly as prevalent as...

Continue reading
Sep 11

As an experienced Cisco network engineer, you have often saved yourself from being locked out of a router when you make a change with a “reload in x” command. This handy command reboots most Cisco devices (routers, switches, firewalls) in the x number of minutes that you had specified. Thus, if you made a change that killed your connection to it, then you just have to wait until the time expires...

Continue reading

What is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...

Continue reading

You are a great boss. You want to enable your team with the best tools to collaborate with so, in your infinite benevolence, you purchased a Cisco Webex Endpoint or maybe even a few of them. Your team is thrilled with the experience and ease of use.

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets