Home LookingPoint Blog

Blog

Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

I recently set up SSO on our Rubrik backup device and had a hard time finding a thorough walkthrough, so I put this together in hopes that it will help someone else out. My suggestion would be to read it over once paying attention to the notes I threw in there before starting. Ready? Ok, let’s do it!

We’ll start with configuring an Identity Provider (IDP) in Rubrik, then we’ll jump back and forth...

Continue reading

Video conferencing was becoming the new norm even pre-covid. However, the pandemic did accelerate many businesses’ adoption of this technology. In this section, I will go over a deployment that will enable your on-prem Cisco video endpoints to dial other video endpoints registered to remote companies and dial into a Cisco Webex Meeting Room.

Continue reading

It’s been a while, but we’re finally back to close this blog series on Cisco TrustSec (CTS). If you haven’t yet, go check out the other entries in this series.

Learn what Cisco TrustSec is and why we care here.

Dip your toes into the components involved here.

Begin your Cisco TrustSec classification journey here.

Propagate yourself over here to learn about Cisco TrustSec propagation.

Now that...

Continue reading

Hello world! Today I bring you a short, but informative nugget on how to successfully implement SNMP on your Cisco Firepower Management Center (FMC). SNMP, at a very high level, is a UDP based protocol, using port 161, that is used to monitor communication between Network devices. This protocol is extremely helpful for Network Admins, as it not only gives you visibility of the traffic going...

Continue reading

How secure are your logins to your bank, credit cards, email, online stores, social media, password safe, or accounts you use for work? Do you use authentication apps like Duo, Google Auth, or Authy? How many different factors do you use today to get access to your devices and services? Once you’ve thought about your answers to these questions, let’s see if I can introduce any new ideas to you.

Continue reading

Hello World,

I was able to work on a feature that was introduced in version 6.1. This feature is High Availability for FMC. The version of FirePower Management Center that this work was done on was 6.7. Also, a few caveats or things we need to know for this integration to be successful. Directly from Cisco.

Continue reading

Welcome back! In this blog we’re going to continue where we left off in the last entry where we looked at using Microsoft Intune to provision the native wired 802.1x supplicant on Windows 10. This time, we shift our focus to the wireless 802.1x supplicant. If you missed that one, be sure to check it out! OK! Let’s go!

Continue reading

Recently I noticed a new warning message on one of our CUCM 14 lab clusters. It showed up after we had a power outage. Unfortunately, this server did not have a secondary power supply or a connection to a UPS, so it experienced an ungraceful shutdown. The warning stated the following:

Continue reading

Today we are getting a little SASE 😊 We are talking about the Secure Access Service Edge. Before I talk about the components of SASE, let's talk a little bit about what it is. It moves these secure access services to the edge, which I know sounds pretty obvious right, but what's the edge? You may have remote users working out of their homes, maybe they are not near an office location. SASE moves...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets