Welcome to our comprehensive Cisco UCCX Administration and Scripting series, we will delve into the intricacies of Cisco UCCX (Contact Center) scripting. Whether you’re a beginner or looking to expand your knowledge, this blog will cover various topics such as UCCX call flow, UCCX Integration with UCCM, menu scripting, if statements, counter usage, handling holiday
The number of wireless devices connected to the network increases yearly (roughly 11.930 billion mobile devices globally). This includes data and voice connectivity for the employees, wireless internet access for guests, and connectivity for IoT devices. In this blog, we will explore wireless standards and terminologies and Cisco’s latest wireless solutions Wireless Standards Standard Frequencies
VLAN configuration plays a crucial role in network management and DTP helps the switch dynamically configure its switchport depending on the directly connected neighbour switch port configuration. By testing different scenarios, we can determine the impact of different VLAN configurations and understand how the network behaves when DTP is disabled/enabled.
In this blog, we’ll learn how to understand the default behavior of two interconnected IOS switches. The task requires us to connect two switches, A and B, and two PCs, H1 and H2, to see if they can communicate with each other. Let’s dive into the steps needed to complete this task. Lab Task Step
Guest Wi-Fi is network connections provided by firms to their guests to gain access to the Internet without compromising the security of the host enterprise by using the guest Wi-Fi traffic tunneling technique. Wi-Fi guest access these days is expected to be available for guests in almost every location, be it in a hospital, at
This video article explains the TLS/SSL web server traffic analysis using the Wireshark packet capture tool. Any web server especially that requires login will be using TLS/SSL encryption to enable security. It is crucial to have a basic understanding of the TLS handshake and to familiarise the packets transaction. TLS/SSL uses the asymmetric public key
We all connect to web servers several times a day yet we are not completely aware of what exactly is happening in the back end when trying to connect a Web server. In this video, we are going to cover HTTP Web Server Traffic analysis using Wireshark. For this, I have used the CentOS machine
Network Ping Command explained with packet tracer Ping is the software utility to test the reachability of a host in a network, it is crucial for a network engineer to know how ping works in a real network. Here I’m explaining the Network ping command flow in a simple network which I have tested and