Home LookingPoint Blog

Blog

May 29

Today we're talking about Cisco's Webex. We are going to show you how you can save time and improve your overall experience. Essentially, making Webex your best friend!

Continue reading

We have all been there; sitting down to dinner on a Sunday night, when you get an alert that one of your branches has gone offline. You politely excuse yourself from the table, open your laptop and start troubleshooting. The problem, you can’t access any of the gear to troubleshoot the issue, and the gear you can access isn’t providing any answers to why the site went down. Now you are faced with...

Continue reading
Feb 19

Now in talking about all these video systems, they're controlled by a single device, and that device is the Touch 10 (seen below).  

Continue reading

Notepad++ for the Modern Network Engineer

Continue reading
Aug 2

Platform requirements

The migration tool requires the following to run:

Continue reading

Welcome back!  In our previous entry on Cisco TrustSec (CTS) we answered the question of why CTS is needed in the first place.  Now that we understand why we need it; we need to understand how to do it!  So how do you do it?  In short, first you classify, then you propagate, and finally enforce. In this entry to our ISE blog series we are going to cover some baseline context on all three of these in...

Continue reading

This past week I have been working on a new campus build-out for one of our customers and came across some interesting behavior regarding 100Gbps and 25Gbps uplinks between switches.

Continue reading

In the modern networking world routing protocols fall into two distinct camps, Link-state and Distance Vector. Being a network consultant I often have customers asking me which routing protocol is better so I figure I would create a post comparing the different routing protocols.

Continue reading

A long long time ago in a convention hall not so far away from my dark, cozy office….(cue music by composer John Williams)

Continue reading
Nov 13
Meraki SD-WAN
Posted by Rick Wong

If you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu. Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change. In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets