Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingHome LookingPoint Blog
Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingIn today’s digital landscape, ensuring the security of your network is more critical than ever. With cyber threats evolving rapidly, organizations must adopt robust security measures to protect their sensitive data and systems. One powerful tool in the cybersecurity arsenal is Nessus, a widely used vulnerability scanner. In this blog, we'll explore what Nessus is, how to effectively use it, and...
Continue readingIn today’s interconnected world, the need for robust cybersecurity measures in industrial environments has never been more critical. With the rise of Industry 4.0 and the integration of IoT devices into manufacturing processes, the Purdue Model provides a structured approach to securing operational technology (OT). In this blog, we’ll explore the Purdue Model, its significance, and how...
Continue readingOSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...
Continue readingYou know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue readingToday we’ll be going over how to add a Cisco switch to ISE 3.0 for TACACS administration. For this configuration you’ll need an ISE PSN (Policy Service Node) node with Device Admin Services enabled and either a Cisco switch or router running IOS.
Continue readingToday we are talking about 802.1X, like authenticating a device coming into a conference room.What is 802.1X ? In simple terms, it is an authentication mechanism that we leverage.
Continue readingWhat is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...
Continue readingLooking Point Inc. 2019