Home LookingPoint Blog

Blog

In today’s digital landscape, ensuring the security of your network is more critical than ever. With cyber threats evolving rapidly, organizations must adopt robust security measures to protect their sensitive data and systems. One powerful tool in the cybersecurity arsenal is Nessus, a widely used vulnerability scanner. In this blog, we'll explore what Nessus is, how to effectively use it, and...

Continue reading

In network environments, security is a top priority. One of the critical aspects of securing Cisco devices is controlling who can access them and what level of permissions they have. Authentication, Authorization, and Accounting (AAA) is a Cisco framework designed to provide a robust and scalable security mechanism to manage access control on network devices. In this blog, we'll focus on using AAA

Continue reading

In today’s interconnected world, the need for robust cybersecurity measures in industrial environments has never been more critical. With the rise of Industry 4.0 and the integration of IoT devices into manufacturing processes, the Purdue Model provides a structured approach to securing operational technology (OT). In this blog, we’ll explore the Purdue Model, its significance, and how...

Continue reading

Recently, I was asked an interesting question: Can the Microsoft Teams app automatically update a user’s status—like showing when they’re on a call or set to “Do Not Disturb”—based on activity from a Call Manager-registered phone?

Continue reading

In an age where connectivity is paramount, having a clear understanding of your network is more crucial than ever. Network discovery—the process of identifying and mapping devices on a network—plays a vital role in managing IT infrastructure effectively. Whether you're an IT professional, a business owner, or just someone interested in technology, grasping the fundamentals of network discovery...

Continue reading

In this post I am going to focus on the Queuing and Policing aspects of QoS.  To reiterate the scenario I started with in the first part, we will focus on a very common deployment of QoS; support of end to end voice and video deployments.  Additionally, I will focus on Cisco's newer MQC way of deploying QoS rather than the older MLS QoS.

Continue reading

Thanks to Cisco’s push to deploy more Thousand Eyes agents, the Catalyst team has given us an easy button for deploying agents to the Catalyst 9300 and 9400 switches using Catalyst Center, formally DNA Center. The agent is deployed as a docker container using the App-hosing framework built natively into the 9300 and 9400 series platforms. Catalyst Center streamlines the deployment of the...

Continue reading

OSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...

Continue reading

My latest project has been a switch refresh and a deployment of a Catalyst Center with Assurance only for a customer across all of their sites. Now the task I had at hand was how can I use Catalyst Center to automate as much configuration on the switches as possible. Because we were only licensed for Assurance we did not have access to use any of the SD-Access fabric automation that Catalyst...

Continue reading

It’s been a long time coming. I’ve been searching for a reason to do it…and I finally did it! I solved my first real world networking problem using automation!

I know, I know. The many of you out there who do this every day all day don’t care, but for me, someone who is an expert network engineer and a n008 at python (programming in general), I’ve been waiting for the day that it made sense to...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets