Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingHome LookingPoint Blog
Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingOSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...
Continue readingYou know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue readingAre passwords a thing of the past? Well to be honest, no not yet they aren’t, but there seems to be a widespread initiative to cram them into a time capsule, move into the future, and forget about them altogether. From post-it notes to password managers, to any of the other tools or tricks that people use to remember them, passwords are renowned for being a weak...
Continue readingIf you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...
Continue readingHow would you like a tool that can save you time with TAC cases and gives you an avenue of automation and time savings for your entire Cisco environment? If that sounds good, you should give RADKit a look.
Continue readingSo, you’ve verified your firewall appliance is allowing your application traffic, you’ve ensured your routers are getting the traffic where it needs to go, and your access control lists on your switches are perfect. A packet cap on your switch shows the traffic getting to your Windows server. Why isn’t it working? I’ve run into the Windows server itself blocking traffic destined to its own...
Continue readingIf you are like many of our customers, you have asked the question “Why would I hire an MSP?” or you have considered hiring a managed service provider but not sure if it makes sense. Before we get into does it make sense or not, you need to know where you are at. To do that we recommend you ask yourself a few questions. Based on the answers to these questions you will have a better sense if you...
Continue readingBusinesses are always looking for ways to save time and money while advancing their goals. A common way to do that is to outsource business tasks that are not at the core of the business. Making use of a network infrastructure managed service provider (MSP) is an excellent example of hiring out tasks that are not central to a business. There are five primary...
Continue readingSanta’s done with his list, now it's time for IT’s! We are reminded throughout the year to check our technology hardware and our different policies. Our software systems remind us to update our passwords and even force us to if we go too long without it. Software licenses renew and if any of our technology is outdated our technology partners help us to update our environment. But, what about the...
Continue readingLooking Point Inc. 2019