In our last blog, we covered how to set up the environment for running AXL API commands for CUCM and implemented a Python program for removing directory numbers. Now, we’ll create another Python program that enables bulk logout of extension mobility profiles from phone devices. You’ll simply need to provide a list of MAC addresses
In this blog, we are going to demonstrate how we can remove or delete multiple directory numbers from CUCM using CUCM AXL API using Python. We will be using SOAP UI and Postman to demonstrate the same and then will use Python to implement it. Setting Up AXL API User for CUCM Open CUCM administration
Cisco Secure workload (Tetration) and VMware NSX Distributed Firewalling (DFW) are famously known for their micro-segmentation use cases. The table below compares some of the key use cases and capabilities. Note: This post is from years of personal working experience on these products and available references. This post should not use against the vendor’s services
The Cisco Umbrella, formerly known as OpenDNS was founded in 2006 by David Ulevitch. It fills traditional gaps in network security by blocking the outbound requests made to malicious domains Key Use Cases DNS protection Visibility into types of activities the internet-connected users and devices are requesting and the cloud services that exist in your
AlgoSec NSPM solution (Network Security Policy Management) offers organizations streamline various aspects of managing security policies that govern devices such as firewalls, SIEMs, ADCs, etc. Founded in 2004 by Yuval and Avishai Wool, it serves 2000 global customers including Fortune 50. Key Use Cases Use Case Modules Description Centralized security policy management and visibility across
Typical OT and IoT inherently lack visibility and are often done using manual work, hence having a large, exposed attack surface. OT systems were initially designed with little to no consideration of security, and as a result — attacks on OT Systems have risen exponentially over the past 10 years. The average cost of a cyber-attack
Welcome to our comprehensive Cisco UCCX Administration and Scripting series, we will delve into the intricacies of Cisco UCCX (Contact Center) scripting. Whether you’re a beginner or looking to expand your knowledge, this blog will cover various topics such as UCCX call flow, UCCX Integration with UCCM, menu scripting, if statements, counter usage, handling holiday
The number of wireless devices connected to the network increases yearly (roughly 11.930 billion mobile devices globally). This includes data and voice connectivity for the employees, wireless internet access for guests, and connectivity for IoT devices. In this blog, we will explore wireless standards and terminologies and Cisco’s latest wireless solutions Wireless Standards Standard Frequencies
VLAN configuration plays a crucial role in network management and DTP helps the switch dynamically configure its switchport depending on the directly connected neighbour switch port configuration. By testing different scenarios, we can determine the impact of different VLAN configurations and understand how the network behaves when DTP is disabled/enabled.
In this blog, we’ll learn how to understand the default behavior of two interconnected IOS switches. The task requires us to connect two switches, A and B, and two PCs, H1 and H2, to see if they can communicate with each other. Let’s dive into the steps needed to complete this task. Lab Task Step