Hey there LookingPoint faithful’s! I hope you are all doing well and continuing to stay safe. Today I wanted to drop a quick how to on how to Whitelist IP addresses in Cisco’s FMC. So, without further of do, lets get to work!
Continue readingHome LookingPoint Blog
Hey there LookingPoint faithful’s! I hope you are all doing well and continuing to stay safe. Today I wanted to drop a quick how to on how to Whitelist IP addresses in Cisco’s FMC. So, without further of do, lets get to work!
Continue readingI couldn’t find a guide online for a particular WebEx Calling scenario; we wanted to use a local gateway to bridge our on-prem CUCM with WebEx calling without the need for PSTN. The local gateway would just route calls from on-prem to the cloud and vice versa. Each service would offer its own PSTN for the endpoints registered to it. Here’s how we accomplished it!
Continue readingWebEx Calling is Cisco’s Enterprise Cloud based calling solution. It allows companies to have their phones registered to Cisco’s cloud and it provides a rich set of features including an interface to the PSTN.
Continue readingThe Meraki dashboard is phenomenal in my opinion. With next to no effort on your part, you have a LOT of data at your fingertips. What if you want that data available for easy export, or if you want to access data older than 30 days old? I ran into just that scenario and found that on top of the GUI, Meraki provides a pretty fantastic API with access to even MORE data. Let me show you how to...
Continue readingHow to create a Certificate Signing Request with OpenSSL for your Cisco Firepower Threat Defense Firewall managed by FirePower Management Center.
Continue readingData backup is a must in any organization big or small. Having backups in multiple remote locations means peace of mind to an admin, because he or she can rest assured their data is stored in a safe place should something catastrophic happen. Today we will be looking at how to configure remote backups for FMC, assuming you already have your remote storage location setup. Cisco best practice is to...
Continue readingI am currently finishing a project where I am designing a custom Quality of Service policy for a customer's suite of business critical applications.
Continue readingIf you have an Expressway Deployment in your network, whether its for Mobile & Remote Access or Business to Business calling, chances are you’re receiving hundreds of spam calls per week. To find out if you’re receiving spam calls, a simple check on your call history should reveal that.
Continue readingSometimes it is faster to just re-image the firepower module than to go through the step-by-step upgrade process where you must upgrade to the next release and then apply the all the updates. If the module is several releases behind than this process must be repeated several times. Luckily, in certain scenarios this can be avoided by just re-imaging to the latest Cisco recommended release. This...
Continue readingProject Manager: “We need to give them access to our network.”
IT Security: “No.”
Project Manager: “We really need to give them access to our network.”
IT Security: “Still no.”
Project Manager: “C’mon, pleeease??”
IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”
Continue readingLooking Point Inc. 2019