Home LookingPoint Blog

Blog

Data backup is a must in any organization big or small. Having backups in multiple remote locations means peace of mind to an admin, because he or she can rest assured their data is stored in a safe place should something catastrophic happen. Today we will be looking at how to configure remote backups for FMC, assuming you already have your remote storage location setup. Cisco best practice is to...

Continue reading

I am currently finishing a project where I am designing a custom Quality of Service policy for a customer's suite of business critical applications. The customer uses MPLS as their WAN and the bandwidth for the MPLS is different depending on the site; Datacenters have more bandwidth, branches have decent bandwidth, and small kiosks only have a few megabits of bandwidth. The customer noticed that...

Continue reading

If you have an Expressway Deployment in your network, whether its for Mobile & Remote Access or Business to Business calling, chances are you’re receiving hundreds of spam calls per week. To find out if you’re receiving spam calls, a simple check on your call history should reveal that.

Continue reading

Sometimes it is faster to just re-image the firepower module than to go through the step-by-step upgrade process where you must upgrade to the next release and then apply the all the updates. If the module is several releases behind than this process must be repeated several times. Luckily, in certain scenarios this can be avoided by just re-imaging to the latest Cisco recommended release. This...

Continue reading

Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

I recently set up SSO on our Rubrik backup device and had a hard time finding a thorough walkthrough, so I put this together in hopes that it will help someone else out. My suggestion would be to read it over once paying attention to the notes I threw in there before starting. Ready? Ok, let’s do it!

We’ll start with configuring an Identity Provider (IDP) in Rubrik, then we’ll jump back and forth...

Continue reading

Video conferencing was becoming the new norm even pre-covid. However, the pandemic did accelerate many businesses’ adoption of this technology. In this section, I will go over a deployment that will enable your on-prem Cisco video endpoints to dial other video endpoints registered to remote companies and dial into a Cisco Webex Meeting Room.

Continue reading

It’s been a while, but we’re finally back to close this blog series on Cisco TrustSec (CTS). If you haven’t yet, go check out the other entries in this series.

Learn what Cisco TrustSec is and why we care here.

Dip your toes into the components involved here.

Begin your Cisco TrustSec classification journey here.

Propagate yourself over here to learn about Cisco TrustSec propagation.

Now that...

Continue reading

Hello world! Today I bring you a short, but informative nugget on how to successfully implement SNMP on your Cisco Firepower Management Center (FMC). SNMP, at a very high level, is a UDP based protocol, using port 161, that is used to monitor communication between Network devices. This protocol is extremely helpful for Network Admins, as it not only gives you visibility of the traffic going...

Continue reading

How secure are your logins to your bank, credit cards, email, online stores, social media, password safe, or accounts you use for work? Do you use authentication apps like Duo, Google Auth, or Authy? How many different factors do you use today to get access to your devices and services? Once you’ve thought about your answers to these questions, let’s see if I can introduce any new ideas to you.

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets