A long long time ago in a convention hall not so far away from my dark, cozy office….(cue music by composer John Williams)
Continue readingHome LookingPoint Blog
A long long time ago in a convention hall not so far away from my dark, cozy office….(cue music by composer John Williams)
Continue readingIf you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu. Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change. In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...
Continue readingFebruary 24th is coming up fast and those of us working on our certifications are scrambling to complete them before the change. But for those who may not get it done before the deadline, you may need to start studying for the new exams. But what is on the new exams, what topics are covered, and most importantly what training material is out there. Today I will be comparing the certification...
Continue readingAll major server manufactures have a built-in baseboard management controller (BMC) for remote server management. These are great tools for onboarding a server and maintaining the server throughout its lifetime. Most of my day to day experience has been using the Cisco IMC, Dell iDRAC, HPE iLO, and IBM IPMI. Some of the server vendors require an additional license to unlock the full features of...
Continue readingHello loyal LP blog cats. In this week’s quick post, I’m going to show you a tactic I use to ensure that you never lock yourself out while making changes to a Cisco router or switch configurations.
Continue readingWireless networking is now considered a must have in nearly all industries. It’s no surprise I get a lot of comments from clients who believe they are experiencing wireless trouble in some form or fashion. They aren’t sure if it’s related to wireless controller configuration, AP placement, coverage gaps, interference, or even client machine problems. Even though Wi-Fi is nearly as prevalent as...
Continue readingAs an experienced Cisco network engineer, you have often saved yourself from being locked out of a router when you make a change with a “reload in x” command. This handy command reboots most Cisco devices (routers, switches, firewalls) in the x number of minutes that you had specified. Thus, if you made a change that killed your connection to it, then you just have to wait until the time expires...
Continue readingWhat is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...
Continue readingYou are a great boss. You want to enable your team with the best tools to collaborate with so, in your infinite benevolence, you purchased a Cisco Webex Endpoint or maybe even a few of them. Your team is thrilled with the experience and ease of use.
Continue readingRecently, I have been working to upgrade Cisco network devices, mainly routers and switches, for a client. A recent network audit identified fragmentation in the IOSes and also security advisories. As a result, all the routers and switches required upgrades and it was a good opportunity for the client to standardize the IOSes for the different type of network devices in the...
Continue reading
Looking Point Inc. 2019