FILE TRANSFER TO VCENTER 7 or 8 VCSA WITH WINSCP (Or How to address the “Host is not communicating for more than 15 seconds” error)
Continue readingHome LookingPoint Blog
FILE TRANSFER TO VCENTER 7 or 8 VCSA WITH WINSCP (Or How to address the “Host is not communicating for more than 15 seconds” error)
Continue readingIn three decades we went from shared 10 Mb hubs and beige pizza-box routers to leaf-spine fabrics pushing 400 GbE (and beyond), software-defined overlays, and AI-optimized data centers with liquid cooling and smart NICs. The big shifts: switches replaced hubs, virtualization and cloud changed traffic patterns, leaf-spine killed big L2 domains, EVPN-VXLAN became the standard overlay, copper gave...
Continue readingAh, OAuth 2.0. The protocol that promised to end password reuse and save us from the deep, dark, insecure corners of the web. The one we thought would be the antidote to phishing. But guess what?
Continue readingCisco Secure Access is a cloud-delivered Security Service Edge (SSE) solution built to secure your workforce, no matter where they’re working. Leveraging zero trust principles, it provides seamless and secure access to applications and data across any network. Designed for modern businesses, it streamlines security management while keeping threats...
Last year I wrote a blog about going passwordless (you can check it out here: https://www.lookingpoint.com/blog/passwordless). Now I’m doubling down and telling you that passwords are outdated. They’re reused, guessed, phished, and stolen. Despite password managers and multi-factor authentication (MFA), the underlying security model of passwords is inherently weak.
Continue readingHey there! The Cisco Catalyst 9800 Series Wireless LAN Controllers (WLCs) are pretty awesome, and one cool trick up their sleeve is the Always-On Tracing feature. It’s a total lifesaver for figuring out what’s going wrong in your wireless network. Let’s break it down quick—what it is, how it works, and why you’ll love it!
Continue readingEfficient network management is crucial for scaling and securing modern networks. Cisco Catalyst Center (formerly DNA Center) offers powerful tools for automating the deployment of device configurations using templates, composite templates, and Jinja2 scripting. In this guide, we will walk through creating and deploying templates, including interface configurations, NTP, SNMP, ACLs, and more, for...
Continue readingSometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingOSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...
Continue readingYou know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue reading
Looking Point Inc. 2019