What’s the Difference Between Speed Dial, Abbreviated Dial, Fast Dial, and BLF?
By: Kevin Koeper Cisco has provided end users multiple ways to quickly dial numbers. This can be very useful if administrators know how to configure
Analyzing Quality of Service Issues in Voice Networks
These slides were used to present the Analyzing Quality of Service Issues in Voice Networks Tech Session. (Click below to view/download these slides)
In-Office. At Home. On Guard with Meraki.
In this 45 minute session, Edwin Owen explores how Meraki solutions can empower collaboration and foster connection across distributed employees. You’ll learn: About Meraki and
IP Phone Security Features
This video lists the various security features found on IP phones including signed firmware images, secure boot, encrypted config files, and more. This video is
Multi-Layered Security
This video outlines the three layers of security: Secure Servers, Secure Endpoints, and Secure Network. This video is a small portion of the Collaboration Security
Phone Security Modes
This short video outlines the three phone security modes (non-secure, authenticated, and encrypted) and explains how they work. This video is a small portion of
Secure Physical Access
This brief video talks about the first line of defense, physical access, and actions that can be taken to prevent a breach. This video is
Signaling Secure to Non-Secure Interworking
This short video explains how to handle connection between one phone that is setup for encryption and a second phone that is non-secured. This video
TLS Session Establishment
This brief video outlines the process of TLS establishing a secure session between client and server. This video is a small portion of the Collaboration
TLS v1.2 Overview
This brief video provides an overview of TLS v1.2 comparing it to previous versions and outlining supported products. This video is a small portion of
Collaboration Security Concepts
These slides were used to present the Collaboration Security Concepts Tech Session. (Click below to view/download these slides)
Versions of SNMP
This video walks you through the three versions of SNMP: SNMP v1, SNMP v2, and SNMP v3, and outlines the differences between them. This video
The Three Planes – Review
This short video reviews the three planes: Management, Control, and Data, and provides examples of each. This video is a small portion of the Secure
The Pyramid of Planes
This brief video outlines The Pyramid of Planes consisting of (top to bottom) the Data Plane, the Control Plane, the Management Plane, and Physical Security.
Secure Syslog Architecture
This video breaks down the Secure Syslog architecture into its’ runtime components, functions, and format. This video is a small portion of the Secure Network