Home LookingPoint Blog

Blog

Starting with Firepower 7.2, Cisco announced the ability to manage these firewalls using a Cisco hosted Cloud-Delivered Firewall Management Center (cdFMC). I recently had a project setting up cdFMC for the first time so I figure I would go over what I learned and show how to access cdFMC, how to import policies, and join your first Firepower firewall.

Continue reading

What is it? Panorama is a centralized management system from Palo Alto Networks. Which of course manages Palo Alto Firewalls. It uses templates to push configuration to each or multiple firewalls. Which you probably already know if you got one. But the question is how it is being used.

Continue reading

In the first entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). In the second entry of this series, we narrowly focused on getting the ISE posture module provisioned. In the third entry, we took stock of all the available posture...

Continue reading

In the first entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). In the second entry of this series, we narrowly focused on getting the ISE posture module provisioned. If you haven’t check those out yet, please do, links below!

Continue reading

In the last entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). If you haven’t read that one yet, you can find it here!

In this entry, we will be narrowly focused on provisioning the ISE posture module. Enjoy!

Continue reading

Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

Today we are getting a little SASE 😊 We are talking about the Secure Access Service Edge. Before I talk about the components of SASE, let's talk a little bit about what it is. It moves these secure access services to the edge, which I know sounds pretty obvious right, but what's the edge? You may have remote users working out of their homes, maybe they are not near an office location. SASE moves...

Continue reading

It’s officially spring and for a lot of us that means spring cleaning – the attic, garage, basement, or just all those papers off the desk in the office. While you’re cleaning and reorganizing your personal life it’s also a good idea to take a look at your network and make sure that is cleaned up too. Below is a list of our top 8 best practices for cleaning up your network and devices.

Continue reading
Jan 17

Cisco Meraki provides cloud managed networking solutions, including wireless, switching, network security, communications, enterprise mobility management, and security cameras. Meraki products are designed as simple, scalable, out-of-the-box solutions with single-pane-of-glass network management, allowing users to easily manage their complex networks all over the world from one central location.

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets