While Ping is one of the best known tools for network monitoring and troubleshooting, the IOS version has a set of options that make it even more useful than the Ping you might know from your desktop. For instance, IOS … Continue reading
peter
Sometimes it becomes necessary to build static backup routes, where a dynamically learned route is preferred, and the static route is only used if the dynamic route is lost. Common applications of this would be a WAN with a VPN … Continue reading
Sometimes administrators have to block calls harassing, scam, or other undesirable calls. In newer versions of CUCM, this can be done in CUCM, or it can be done on an h.323 or SIP gateway. Which should you use? There are … Continue reading
Cisco devices can store passwords using either a reversible (Type 7) or non-reversible (Type 4 or 5, enabled by the “secret” keyword) encryption. Reversible encryption has the ability to decrypt the stored password, which can then be compared to the … Continue reading
Have you ever wanted to do any of the following from a Contact Center application? Read a schedule from a local document, rather than having to use script editor to edit schedules Be able to load a schedule from a web … Continue reading
I recently had the opportunity to pick up a couple of 8861s for my lab/home phones, and thought I would do a writeup on my initial impressions. The 8800 series phones offer an updated look, and a number of new features. … Continue reading
Time of Day routing allows for calls to be treated differently based on the time of day and day of week. This allows for things like automatically rerouting calls to a different destination when the company is closed, not allowing … Continue reading
In this post we will take a look at the initial configuration that should be performed on a new device before the actual network configuration is performed. Most Cisco IOS devices come from the factory with a very basic default … Continue reading
In with the new. Remnants of a system I just replaced with Cisco IP phones. … Continue reading
In the previous post, we took a look at the basics of the OSI and TCP/IP model layers. In this post we are going to take a closer look at end to end routing of a packet, and the interaction … Continue reading