Home LookingPoint Blog

Blog

Efficient network management is crucial for scaling and securing modern networks. Cisco Catalyst Center (formerly DNA Center) offers powerful tools for automating the deployment of device configurations using templates, composite templates, and Jinja2 scripting. In this guide, we will walk through creating and deploying templates, including interface configurations, NTP, SNMP, ACLs, and more, for...

Continue reading

Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.

Continue reading

OSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...

Continue reading
Jul 31

You know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.

Continue reading
Jun 19
Passwordless
Posted by Ryan Alibrando

Passwords, or In-The-Past Words?

Are passwords a thing of the past? Well to be honest, no not yet they aren’t, but there seems to be a widespread initiative to cram them into a time capsule, move into the future, and forget about them altogether. From post-it notes to password managers, to any of the other tools or tricks that people use to remember them, passwords are renowned for being a weak...

Continue reading

If you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...

Continue reading
Nov 1
Cisco RADkit
Posted by Ryan Alibrando

Say hello to Cisco’s RADkit

How would you like a tool that can save you time with TAC cases and gives you an avenue of automation and time savings for your entire Cisco environment? If that sounds good, you should give RADKit a look.

Continue reading

So, you’ve verified your firewall appliance is allowing your application traffic, you’ve ensured your routers are getting the traffic where it needs to go, and your access control lists on your switches are perfect. A packet cap on your switch shows the traffic getting to your Windows server. Why isn’t it working? I’ve run into the Windows server itself blocking traffic destined to its own...

Continue reading

Would you know if one of the 2 power supplies in one of your critical switches went out? What would alert you to an SSL certificate expiring on a web-based application you use every day? If you’re like most organizations, you have some kind of infrastructure monitoring in place. Could you take the approach of “If anything breaks, my users will let me know”? Sure you could! Would it work? Yep!...

Continue reading
Jul 25

Well.. we did it. We started a podcast! LookingPoint is here to introduce our podcast:

IT in the Bay Podcast

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets