Home LookingPoint Blog

Blog

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.

Continue reading

Thanks to Cisco’s push to deploy more Thousand Eyes agents, the Catalyst team has given us an easy button for deploying agents to the Catalyst 9300 and 9400 switches using Catalyst Center, formally DNA Center. The agent is deployed as a docker container using the App-hosing framework built natively into the 9300 and 9400 series platforms. Catalyst Center streamlines the deployment of the...

Continue reading

Once logged into the wireless controller, creating a WLAN is very simple. Configuring the WLAN’s setting is where it can become difficult. Creating the WLAN is as easy as entering one command in configuration mode. That command is the wlan command. In this blog I will be covering some basic commands for you to create and configure some general properties of a Wireless network.

Continue reading
Check out our comprehensive guide on simplifying your network configuration with Switch Templates! Continue reading

Access lists and SVIs have been around forever, and while applying access lists to physical interfaces seems to logically sink it quite easily, access lists on SVIs interfaces seem to trip people up. This blog will cover that scenario as well as some other access list basics, hopefully by the end you’ll find the concepts cemented.

Continue reading

We have all been there; sitting down to dinner on a Sunday night, when you get an alert that one of your branches has gone offline. You politely excuse yourself from the table, open your laptop and start troubleshooting. The problem, you can’t access any of the gear to troubleshoot the issue, and the gear you can access isn’t providing any answers to why the site went down. Now you are faced with...

Continue reading

Notepad++ for the Modern Network Engineer

Continue reading

What is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...

Continue reading
Nov 6

That title is not true, but I just could not come up with a better one. I like rhyming phrases I guess.

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets