Home LookingPoint Blog

Blog

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In today’s digital landscape, ensuring the security of your network is more critical than ever. With cyber threats evolving rapidly, organizations must adopt robust security measures to protect their sensitive data and systems. One powerful tool in the cybersecurity arsenal is Nessus, a widely used vulnerability scanner. In this blog, we'll explore what Nessus is, how to effectively use it, and...

Continue reading

In today’s interconnected world, the need for robust cybersecurity measures in industrial environments has never been more critical. With the rise of Industry 4.0 and the integration of IoT devices into manufacturing processes, the Purdue Model provides a structured approach to securing operational technology (OT). In this blog, we’ll explore the Purdue Model, its significance, and how...

Continue reading

Cisco Meraki recently introduced the MG series Cellular Gateways to be a reliable solution as a backup internet uplink. In the event that the primary internet uplink goes down, the MG gateway will provide high availability for internet connectivity via wireless WAN connectivity using a cellular network. The MG Series also simplifies configuration and management using Meraki’s dashboard.

Continue reading

Sometimes it is faster to just re-image the firepower module than to go through the step-by-step upgrade process where you must upgrade to the next release and then apply the all the updates. If the module is several releases behind than this process must be repeated several times. Luckily, in certain scenarios this can be avoided by just re-imaging to the latest Cisco recommended release. This...

Continue reading

Today we’ll be going over how to add a Cisco switch to ISE 3.0 for TACACS administration. For this configuration you’ll need an ISE PSN (Policy Service Node) node with Device Admin Services enabled and either a Cisco switch or router running IOS.

Continue reading

The topic of backing up is not always linear. Backing up a system can sometimes be confusing topic among System and Network Engineers. There are always multiple ways to back up and restore, but is it the recommended for the system? For example, experience has shown me that enabling virtual machine snapshots to systems like ISE can present itself with larger operational issues like sporadic...

Continue reading

Today we are talking about 802.1X, like authenticating a device coming into a conference room.What is 802.1X ? In simple terms, it is an authentication mechanism that we leverage.

Continue reading

February 24th is coming up fast and those of us working on our certifications are scrambling to complete them before the change. But for those who may not get it done before the deadline, you may need to start studying for the new exams. But what is on the new exams, what topics are covered, and most importantly what training material is out there. Today I will be comparing the certification...

Continue reading

Introduction

Recently, I have been working to upgrade Cisco network devices, mainly routers and switches, for a client. A recent network audit identified fragmentation in the IOSes and also security advisories. As a result, all the routers and switches required upgrades and it was a good opportunity for the client to standardize the IOSes for the different type of network devices in the...

Continue reading
1 2 3 4 5 ... 6
  • There are no suggestions because the search field is empty.

Latest Tweets