Home LookingPoint Blog

Blog

The migration to cloud-based communication solutions offers significant advantages. However, organizations can maintain a measured pace and seamlessly integrate existing on-premises PBX or PSTN infrastructure with Webex Calling through Local Gateway Deployment. This approach allows you to capitalize on your previous investments while enjoying the benefits of cloud calling.

Continue reading

As you saw in a previous post, DHCP Hacking Made Easy, poorly configured networks can serve as an attack vector for “The Attacker”. In this entry, we continue this exploration with another dead simple attack on the network, ARP spoofing. ARP is the protocol responsible for informing hosts within a given LAN, which IP addresses belong to which MAC addresses. What happens when we provide bad...

Continue reading
Apr 10

Using DNA Center (Catalyst Center) LAN Automation to make your life easier.

I am currently deploying an SD-Access fabric using Cisco's DNA Center, now rebranded as Catalyst Center. As part of this project we used the LAN automation process to build the network to all of the access switches. We had about 15 different switches in 15 different IDFs so using this process made quick work of...

Continue reading

Understanding Switch Stacking

Switch stacking is a technology which will allow multiple switches to become a single logical switch. Which will allow you to manage them as a single switch. Cisco has Stackwise. Stackwise architecture allows stacking up to eight switches. Other Vendors has their own stacking technology which is similar. In this discussion, we are only going to go through adding a...

Continue reading

Another year and another Webex One event! This event was promised to have the most innovative announcements and by the looks of it, Webex could be on its way to be the most feature UCaaS product out there.

We will go over the key announcements in this article and what’s refreshing about these announcements is that Webex isn’t creating feature for the niche people out there, they are reinventing...

Continue reading

Poorly configured networks are vulnerable to many attacks. Easy attacks. In this blog we will demonstrate how easy it is to perform a DoS attack on a DHCP scope. Afterwards, we will remediate our poorly configured network devices with a security feature that you should include on every deployment to protect against this type of attack.

Continue reading

Once logged into the wireless controller, creating a WLAN is very simple. Configuring the WLAN’s setting is where it can become difficult. Creating the WLAN is as easy as entering one command in configuration mode. That command is the wlan command. In this blog I will be covering some basic commands for you to create and configure some general properties of a Wireless network.

Continue reading

Starting with Firepower 7.2, Cisco announced the ability to manage these firewalls using a Cisco hosted Cloud-Delivered Firewall Management Center (cdFMC). I recently had a project setting up cdFMC for the first time so I figure I would go over what I learned and show how to access cdFMC, how to import policies, and join your first Firepower firewall.

Continue reading

If you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...

Continue reading
Check out our comprehensive guide on simplifying your network configuration with Switch Templates! Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets