Home Default HubSpot Blog

Blog

Nov 13
Meraki SD-WAN
Posted by Rick Wong

If you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu.   Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change.  In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...

Continue reading

February 24th is coming up fast and those of us working on our certifications are scrambling to complete them before the change. But for those who may not get it done before the deadline, you may need to start studying for the new exams. But what is on the new exams, what topics are covered, and most importantly what training material is out there. Today I will be comparing the certification...

Continue reading

All major server manufactures have a built-in baseboard management controller (BMC) for remote server management. These are great tools for onboarding a server and maintaining the server throughout its lifetime.  Most of my day to day experience has been using the Cisco IMC, Dell iDRAC, HPE iLO, and IBM IPMI.  Some of the server vendors require an additional license to unlock the full features of...

Continue reading

Hello loyal LP blog cats. In this week’s quick post, I’m going to show you a tactic I use to ensure that you never lock yourself out while making changes to a Cisco router or switch configurations.

Continue reading
Sep 25

Wireless networking is now considered a must have in nearly all industries. It’s no surprise I get a lot of comments from clients who believe they are experiencing wireless trouble in some form or fashion. They aren’t sure if it’s related to wireless controller configuration, AP placement, coverage gaps, interference, or even client machine problems. Even though Wi-Fi is nearly as prevalent as...

Continue reading
Sep 11

As an experienced Cisco network engineer, you have often saved yourself from being locked out of a router when you make a change with a “reload in x” command.  This handy command reboots most Cisco devices (routers, switches, firewalls) in the x number of minutes that you had specified.  Thus, if you made a change that killed your connection to it, then you just have to wait until the time...

Continue reading

What is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...

Continue reading

You are a great boss. You want to enable your team with the best tools to collaborate with so, in your infinite benevolence, you purchased a Cisco Webex Endpoint or maybe even a few of them. Your team is thrilled with the experience and ease of use.

Continue reading

Introduction

Recently, I have been working to upgrade Cisco network devices, mainly routers and switches, for a client.   A recent network audit identified fragmentation in the IOSes and also security advisories.  As a result, all the routers and switches required upgrades and it was a good opportunity for the client to standardize the IOSes for the different type of network devices in the...

Continue reading

As promised, in this entry to our ISE blog series we are going to begin our adventure into Cisco TrustSec, or CTS for short.  When I am approaching a new technology, I find it helpful to not only understand what it is, but also why it exists.  So, in this post, we’re going to attempt to cover just that; what is Cisco TrustSec and why do I care?

Continue reading