In our last blog, we covered how to set up the environment for running AXL API commands for CUCM and implemented a Python program for removing directory numbers. Now, we’ll create another Python program that enables bulk logout of extension mobility profiles from phone devices. You’ll simply need to provide a list of MAC addresses
In this blog, we are going to demonstrate how we can remove or delete multiple directory numbers from CUCM using CUCM AXL API using Python. We will be using SOAP UI and Postman to demonstrate the same and then will use Python to implement it. Setting Up AXL API User for CUCM Open CUCM administration
Welcome to our comprehensive Cisco UCCX Administration and Scripting series, we will delve into the intricacies of Cisco UCCX (Contact Center) scripting. Whether you’re a beginner or looking to expand your knowledge, this blog will cover various topics such as UCCX call flow, UCCX Integration with UCCM, menu scripting, if statements, counter usage, handling holiday
VLAN configuration plays a crucial role in network management and DTP helps the switch dynamically configure its switchport depending on the directly connected neighbour switch port configuration. By testing different scenarios, we can determine the impact of different VLAN configurations and understand how the network behaves when DTP is disabled/enabled.
In this blog, we’ll learn how to understand the default behavior of two interconnected IOS switches. The task requires us to connect two switches, A and B, and two PCs, H1 and H2, to see if they can communicate with each other. Let’s dive into the steps needed to complete this task. Lab Task Step
Guest Wi-Fi is network connections provided by firms to their guests to gain access to the Internet without compromising the security of the host enterprise by using the guest Wi-Fi traffic tunneling technique. Wi-Fi guest access these days is expected to be available for guests in almost every location, be it in a hospital, at
This video article explains the TLS/SSL web server traffic analysis using the Wireshark packet capture tool. Any web server especially that requires login will be using TLS/SSL encryption to enable security. It is crucial to have a basic understanding of the TLS handshake and to familiarise the packets transaction. TLS/SSL uses the asymmetric public key
We all connect to web servers several times a day yet we are not completely aware of what exactly is happening in the back end when trying to connect a Web server. In this video, we are going to cover HTTP Web Server Traffic analysis using Wireshark. For this, I have used the CentOS machine
Network Ping Command explained with packet tracer Ping is the software utility to test the reachability of a host in a network, it is crucial for a network engineer to know how ping works in a real network. Here I’m explaining the Network ping command flow in a simple network which I have tested and
This post is intended for network engineers who wish to use python for network automation for the first time. Moreover, you could have a scenario where devices need to be configured or to collect data from multiple network devices, this would be a boring task of logging into each device and doing it manually. Therefore,