Home LookingPoint Blog

Blog

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In modern network environments, providing seamless communication and service discovery for Apple devices is essential. Bonjour, Apple’s zero-configuration networking protocol, is widely used for device discovery, resource sharing, and communication in local area networks (LAN). It allows devices such as printers, cameras, speakers, and computers to automatically detect and connect to each other...

Continue reading

In this post I am going to focus on the Queuing and Policing aspects of QoS.  To reiterate the scenario I started with in the first part, we will focus on a very common deployment of QoS; support of end to end voice and video deployments.  Additionally, I will focus on Cisco's newer MQC way of deploying QoS rather than the older MLS QoS.

Continue reading

As you saw in a previous post, DHCP Hacking Made Easy, poorly configured networks can serve as an attack vector for “The Attacker”. In this entry, we continue this exploration with another dead simple attack on the network, ARP spoofing. ARP is the protocol responsible for informing hosts within a given LAN, which IP addresses belong to which MAC addresses. What happens when we provide bad...

Continue reading
Apr 10

Using DNA Center (Catalyst Center) LAN Automation to make your life easier.

I am currently deploying an SD-Access fabric using Cisco's DNA Center, now rebranded as Catalyst Center. As part of this project we used the LAN automation process to build the network to all of the access switches. We had about 15 different switches in 15 different IDFs so using this process made quick work of...

Continue reading

Poorly configured networks are vulnerable to many attacks. Easy attacks. In this blog we will demonstrate how easy it is to perform a DoS attack on a DHCP scope. Afterwards, we will remediate our poorly configured network devices with a security feature that you should include on every deployment to protect against this type of attack.

Continue reading

Today we are talking about 802.1X, like authenticating a device coming into a conference room.What is 802.1X ? In simple terms, it is an authentication mechanism that we leverage.

Continue reading

Hello all! Today we will be talking about Mobility Anchoring with Cisco Wireless LAN Controller (WLC). While this concept has been around for a while, and is commonly used for guest networks, I have used it for several other reasons. But first let’s go over the premise of mobility anchoring.

Continue reading

This blog follows on from my last post and continues the discussion on how to integrate a single/pair of SD-WAN routers into our existing branch site topology. If you missed that last blog, then you can check it out here. Don’t worry I’ll be right here waiting for you.

Continue reading

In this edition of our SD-WAN series I’m going to take a step away from our lab environment and attempt to address a question I get a lot from our customers. “How do we integrate a SD-WAN router or pair of SD-WAN routers into our current environment?” Well the answer I’m afraid is the networking consultants classic line of “It depends”. And it really does, Cisco’s SD-WAN solution was created by...

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets