Home LookingPoint Blog

Blog

Today we're talking about some of Cisco’s Webex fundamentals, like what happens once you've joined a meeting and some key functionality that you need to know in order to make you more effective in your Webex Meetings.

Continue reading

Hello all! Today we will be talking about Mobility Anchoring with Cisco Wireless LAN Controller (WLC). While this concept has been around for a while, and is commonly used for guest networks, I have used it for several other reasons. But first let’s go over the premise of mobility anchoring.

Continue reading

We're talking about the Cisco WebEx share, the Cisco WebEx share enables you to share content to any display that has an HDMI port. In order to use the HDMI port you will need the WebEx teams application.

Continue reading

<Insert Creative/Witty/Charming Intro Here>.

How to Setup Anyconnect Remote Access VPN w/ Cisco FMC and FTD Firewalls, utilizing ISE & Duo 2FA for authentication and authorization, that’s a mouthful, isn’t it? For those who aren’t sure what I’m talking about, the goal of this blog is to pass along what I learned getting Anyconnect remote access VPN working with ISE and Duo 2FA for...

Continue reading
Oct 2

Today we're talking about Cisco's Webex. We are going to show you how you can save time and improve your overall experience. Essentially, making Webex your best friend!

Continue reading

We have all been there; sitting down to dinner on a Sunday night, when you get an alert that one of your branches has gone offline. You politely excuse yourself from the table, open your laptop and start troubleshooting. The problem, you can’t access any of the gear to troubleshoot the issue, and the gear you can access isn’t providing any answers to why the site went down. Now you are faced with...

Continue reading
Feb 19

Now in talking about all these video systems, they're controlled by a single device, and that device is the Touch 10 (seen below).  

Continue reading

Notepad++ for the Modern Network Engineer

Continue reading
Aug 2

 

Platform requirements

The migration tool requires the following to run:

Continue reading

Welcome back!  In our previous entry on Cisco TrustSec (CTS) we answered the question of why CTS is needed in the first place.  Now that we understand why we need it; we need to understand how to do it!  So how do you do it?  In short, first you classify, then you propagate, and finally enforce.  In this entry to our ISE blog series we are going to cover some baseline context on all three of...

Continue reading