Home LookingPoint Blog

Blog

In today’s modern network security landscape, protecting your organization’s resources requires more than just securing IP addresses. The key to a robust and adaptive security strategy is integrating user identity (User-ID) with your firewall. Palo Alto Networks offers a powerful and flexible User-ID feature, allowing you to associate network traffic with user identities, rather than relying...

Continue reading

When it comes to securing a network, firewalls play an indispensable role. Among the leading firewall vendors, Palo Alto Networks stands out for its advanced, feature-rich solutions that go beyond traditional security to offer next-generation firewall capabilities. From small businesses to large enterprises, Palo Alto firewalls provide an effective defense mechanism to safeguard sensitive data...

Continue reading

When upgrading or transitioning from a Palo Alto Networks PA-820 to a PA-1410, it's important to ensure that your configuration settings are seamlessly transferred. The PA-1410 offers higher performance and more features than the PA-820, but transferring configurations can sometimes be tricky. This blog post will guide you through the necessary steps to copy configurations from a PA-820 to a...

Continue reading

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In modern network environments, providing seamless communication and service discovery for Apple devices is essential. Bonjour, Apple’s zero-configuration networking protocol, is widely used for device discovery, resource sharing, and communication in local area networks (LAN). It allows devices such as printers, cameras, speakers, and computers to automatically detect and connect to each other...

Continue reading

As you saw in a previous post, DHCP Hacking Made Easy, poorly configured networks can serve as an attack vector for “The Attacker”. In this entry, we continue this exploration with another dead simple attack on the network, ARP spoofing. ARP is the protocol responsible for informing hosts within a given LAN, which IP addresses belong to which MAC addresses. What happens when we provide bad...

Continue reading

Poorly configured networks are vulnerable to many attacks. Easy attacks. In this blog we will demonstrate how easy it is to perform a DoS attack on a DHCP scope. Afterwards, we will remediate our poorly configured network devices with a security feature that you should include on every deployment to protect against this type of attack.

Continue reading

Today we are talking about 802.1X, like authenticating a device coming into a conference room.What is 802.1X ? In simple terms, it is an authentication mechanism that we leverage.

Continue reading

Cisco HyperFlex Solution

Continue reading
Jun 12

Today kicked off day one of Cisco Live 2018 in Orlando, FL! The day was filled with a keynote, breakout sessions, Innovation Showcases, and of course the World of Solutions. Here are our top takeaways from Cisco Live Day 1.

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets