Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
1042 Results Found
Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...
One aspect of Unified Communications is this concept of trunk groups. I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...
There are some common misconceptions on the part of some of my students as to how VPN sessions are established from either a remote location or remote user to the ASA firewall. In particular, a “gray area” seems to be when the attributes from the tunnel group are app...
ASA and PIX software version 7.0 introduced the configuration command nat-control which didn’t exist in previous versions of code. Although training course material for both the SNAF (Securing Networks with ASA Fundamentals) and SNAA (Securing Networks with ASA Advan...
Cisco IP phones support a variety of different audio codecs. In this post, I will explain some of the differences and explain which versions of CUCM and the Cisco IP phones support the various audio codecs. Audio codecs are responsible for sampling human speech (a s...
In the previous discussion on QoS, the uses of Per-Hop Behaviors DiffServ to mark packets were identified and discussed in detail. Today’s post will identify the mechanisms to implement QoS. The five main categories of tools used to implement QoS are as follows. Cl...
No matter what book or manual you use to study for the CCNA examination, you will see various protocols and processes referencing an RFC. And, although frequently referenced, the RFCs are seldom actually included in the documentation. So, the logical question becomes...
Cisco Unified Communications Manager (CUCM) includes a feature called "call throttling" that denies new call attempts when the system is in a state that may lead to delayed dial tone. The Real Time Monitoring Tool (RTMT) will generate a code yellow alert when call t...
When sending data end-to-end through a network, routers are used in internetworking to create a virtual network from one device to another, either locally or globally. Routers are configured to operate with most common network protocols. That means they know the form...
Find out which OSI layer is concerned with reliable end-to-end delivery of data - and more. Get answers to your OSI reference model and network layer questions here.