In my last post we looked at the steps that a vEdge goes through to bring up its control plane connections and authenticate itself onto the fabric. In this post we will follow on from where we left off and see how we use these control plane connections to exchange topology information, WAN policies and security keys via OMP.
This week is week 3 of National Cybersecurity Awareness Month (NCSAM). Each week of NCSAM is focused around a different theme meant to address specific challenges organizations face and identify how to address those challenges. Week 3 is focused around educating employees of the importance of online security and safety and their role in keeping your organization safe from online threats.
Halloween is coming and most of us are looking forward to haunted houses, scary movie marathons, and spooky decorations. October is about more than the candy, costumes, tricks and treats for IT teams and cybersecurity experts – it’s National Cybersecurity Awareness Month.
It’s our favorite time of year again – October. This love for October is more than the fall weather, leaves changing, upcoming holidays and pumpkin spice everything. October is National Cyber Security Awareness Month and here at LookingPoint we love cybersecurity.
Cloud networking deployments are meant to be simple, scalable, and effective. In this Fireside Chat LookingPoint CEO, Sean Barr, sits down with Network Engineer, Trevor Butler, to discuss cloud networking deployments, specifically our experience deploying Cisco Meraki into the network.
Hello, my loyal blog post readers, in this my third installment of our SD-WAN series I am going to walk you through how our vEdge router locates, communicates and authenticates itself onto our SD-WAN fabric. Along the way we will take a look at a few packets captures and command line output to see what is going on under the hood.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.