Sometimes you want to use Wireshark to capture packets On Cisco Meeting
Server to troubleshoot and investigate video call issues, quality
issues, or may be Expressway integration, WebRTC Connections, or why
not, understand how the communication and the ca...
When we talk about Stun Protocol used for NAT traversal in voip
environment, the common term used when talking about the Type of NAT
that is compatible with Stun is “Full Cone NAT”, then when we explain
why Turn Protocol is developped to replace Stun Prot...
From X8.11 of Cisco Expressway, a new concept of load balacing based on
priority and weight instead of the round robin for better load balancing
and probe is added to prevent the Cisco Expressway-C to sollicit a
webbridge when it is down.Assume all the Ci...
Local Zone: This is a collection of all devices that are registered with
Cisco Expressway. The local zone is divided to subzones. These subzones
include the automatically crated default subzone and up to 1000 manually
configured subzones. In addition, the...
Datacenter virtualization is the process of employing virtual hardware
for designing, developing, and implementing the datacenters. It is often
used as an umbrella term that entails different categories like
application virtualization, server virtualizati...
Hiện nay trên thế giới có rất nhiều hãng sản xuất máy lọc nước ion kiềm
đến từ Hàn Quốc, Nhật Bản, Đài Loan, Hoa Kỳ. Các thương hiệu với nhiều
chủng loại với nhiều tính năng cũng như giá cả khác nhau không khỏi
khiến người tiêu dùng đắn đo lựa chọn. Bài v...
When talking about Dial Plan and Digit Manipulation Cisco Unified
Communication Manager, three components play an important roles to
perform the transformation of the calling and called parties. The
Translation Pattern, Transformation Pattern and Route Pa...
ICE, STUN, and TURN are used to establish a MEDIA connection between two
devices on different networks separated by firewalls and NAT servers.
They do not apply to signaling between devices which means that if you
cannot establish a signaling connection b...
Learn about the All New Webex Events. Listen:
https://smarturl.it/CCRS8E29 Follow us:
https://twitter.com/ciscochampion The new Webex Events transforms your
company meetings and corporate events with real-time online webinars and
webcasts, expanding your ...
I noticed that this part of Cisco Meeting Server Implementation
Certificate Requirement is not enough detailed in many documentations
and videos. Understanding this part of Certificate Requirement is
mandatory to set up the Cisco Meeting Server and config...
Firewall Traversal With Cisco Expressway Packet Flow. Firewall ASA-C,
add an entry from Inside to DMZ , the source IP is 10.1.5.20 (Cisco
Expressway-C) and the source port is 25006. The destination IP is
172.16.1.21 (Cisco Expressway-E) and the destinatio...
A long article about the dial plan and call routing logic on Cisco
Meeting Server to demystify the three mains tables using SIP Trace and
Wireshark: -Incoming Calls -Forwarding Calls -Outgoing Calls
I share with Cisco Community a long article I wrote about Stun Turn and
ICE for NAT Traversal demystified with chart flow for MRA and WebRTC
with Cisco Meeting Server.
Learn more about the new Cisco Webex Wireless Phone!Listen:
https://smarturl.it/CCRS8E27 Follow us:
https://twitter.com/ciscochampion Introducing the recently-launched WiFi
enabled, ruggedized smartphones: The Cisco Webex Wireless Phones 840 and
Cisco TelePresence CE Software Release Notes (CE8) What’s the difference
between a multiway conference and an ad hoc conference? It’s the call
control device. With a multiway conference, we’re using VCS. With an ad
hoc conference, it’s Cisco Unified Commu...
We are low on extensions and licenses so if some one has not used their 7925g or 8821 in 90 days we will take that extension. Is there a better way to find out how many days an endpoint is inactive for than entering in the MAC one by one in ISE and then f...
For CUCM the document below has a list of "Recommended Ciphers" that can be set up From Cisco Unified OS Administration, choose Security > Cipher Management.https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/12_5_1SU3/cucm_b_security_gui...
We are hoping to get users off of FIPPA, due to it's inherent security vulnerability (they insist upon using one-button login) in addition to it being an overall buggy solution. We prefer to get them onto Finesse, but we need a good argument. Just looking...
Hi I Have 3 phones registered in SRST mode ( wan is down )What will occur if the phones got power cycle ?Did the phones should get registered again ? from what I see the phones not registered and didnot get IP address from the ...