Home LookingPoint Blog

Blog

If you have an Expressway Deployment in your network, whether its for Mobile & Remote Access or Business to Business calling, chances are you’re receiving hundreds of spam calls per week. To find out if you’re receiving spam calls, a simple check on your call history should reveal that.

Continue reading

Sometimes it is faster to just re-image the firepower module than to go through the step-by-step upgrade process where you must upgrade to the next release and then apply the all the updates. If the module is several releases behind than this process must be repeated several times. Luckily, in certain scenarios this can be avoided by just re-imaging to the latest Cisco recommended release. This...

Continue reading

Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

I recently set up SSO on our Rubrik backup device and had a hard time finding a thorough walkthrough, so I put this together in hopes that it will help someone else out. My suggestion would be to read it over once paying attention to the notes I threw in there before starting. Ready? Ok, let’s do it!

We’ll start with configuring an Identity Provider (IDP) in Rubrik, then we’ll jump back and forth...

Continue reading

Video conferencing was becoming the new norm even pre-covid. However, the pandemic did accelerate many businesses’ adoption of this technology. In this section, I will go over a deployment that will enable your on-prem Cisco video endpoints to dial other video endpoints registered to remote companies and dial into a Cisco Webex Meeting Room.

Continue reading

It’s been a while, but we’re finally back to close this blog series on Cisco TrustSec (CTS). If you haven’t yet, go check out the other entries in this series.

Learn what Cisco TrustSec is and why we care here.

Dip your toes into the components involved here.

Begin your Cisco TrustSec classification journey here.

Propagate yourself over here to learn about Cisco TrustSec propagation.

Now that...

Continue reading

Hello world! Today I bring you a short, but informative nugget on how to successfully implement SNMP on your Cisco Firepower Management Center (FMC). SNMP, at a very high level, is a UDP based protocol, using port 161, that is used to monitor communication between Network devices. This protocol is extremely helpful for Network Admins, as it not only gives you visibility of the traffic going...

Continue reading

How secure are your logins to your bank, credit cards, email, online stores, social media, password safe, or accounts you use for work? Do you use authentication apps like Duo, Google Auth, or Authy? How many different factors do you use today to get access to your devices and services? Once you’ve thought about your answers to these questions, let’s see if I can introduce any new ideas to you.

Continue reading

Hello World,

I was able to work on a feature that was introduced in version 6.1. This feature is High Availability for FMC. The version of FirePower Management Center that this work was done on was 6.7. Also, a few caveats or things we need to know for this integration to be successful. Directly from Cisco.

Continue reading

Welcome back! In this blog we’re going to continue where we left off in the last entry where we looked at using Microsoft Intune to provision the native wired 802.1x supplicant on Windows 10. This time, we shift our focus to the wireless 802.1x supplicant. If you missed that one, be sure to check it out! OK! Let’s go!

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets