• Category

  • Format

IP Phone Security Features

This video lists the various security features found on IP phones including signed firmware images, secure boot, encrypted config files, and more. This video is

Read More »

Multi-Layered Security

This video outlines the three layers of security: Secure Servers, Secure Endpoints, and Secure Network. This video is a small portion of the Collaboration Security

Read More »

Phone Security Modes

This short video outlines the three phone security modes (non-secure, authenticated, and encrypted) and explains how they work. This video is a small portion of

Read More »

CUCM Secure Protocols

This short video discusses secure protocols used with Cisco Unified Communications Manager (CUCM) including SIP trunks, MGCP, H.323, and others. This video is a small

Read More »

TLS v1.2 Overview

This brief video provides an overview of TLS v1.2 comparing it to previous versions and outlining supported products. This video is a small portion of

Read More »

Debugging Dial Peers

This video outlines how to enable debugging on SIP calls and PRI calls and what the debugging process looks like. This video is a small

Read More »

Verifying Dial Peers

This short video explains how to determine which dial peer is being used through a series of commands. This video is a small portion of

Read More »

Dial Peer Variables

This short video outlines the dial peer digits and variables that can be assigned to the dial peer. This video is a small portion of

Read More »

SIP Delayed Offer

This brief video introduces SIP Delayed Offer in which the called party sends the SDP offer information in the 200 OK message. This video is

Read More »

SIP Early Offer

This short video introduces SIP Early Offer in which the originator sends the SDP offer information in the first message. This video is a small

Read More »

SIP Call Flow

This brief video takes a closer look at the packets being sent in the SIP call flow. This video is a small portion of the

Read More »

Versions of SNMP

This video walks you through the three versions of SNMP: SNMP v1, SNMP v2, and SNMP v3, and outlines the differences between them. This video

Read More »

The Pyramid of Planes

This brief video outlines The Pyramid of Planes consisting of (top to bottom) the Data Plane, the Control Plane, the Management Plane, and Physical Security.

Read More »

Secure Syslog Architecture

This video breaks down the Secure Syslog architecture into its’ runtime components, functions, and format. This video is a small portion of the Secure Network

Read More »

NTP Architecture

This short video breaks down the components, commands, ports and protocols that make up Network Time Protocol (NTP). This video is a small portion of

Read More »

Configuring NTP Demo

This demo walks you through how to configure Network Time Protocol (NTP). This video is a small portion of the Secure Network Management: Logs and

Read More »

Configuring SNMP Demo

This demo walks you through how to configure SNMP v3. This video is a small portion of the Secure Network Management: Logs and Time Tech

Read More »

YANG Container

This short video explains what a YANG Container is and how it is used within a module. This video is a small portion of the

Read More »

YANG Grouping

This short video explains what a YANG Grouping is and how it is used within a module. This video is a small portion of the

Read More »

YANG Data Types

This short video outlines two common data types used in YANG: Built-in and Common (IETF YANG and IETF Inet). This video is a small portion

Read More »

YANG Leaf-List

This short video explains what a YANG Leaf-List is and how it is used within a module. This video is a small portion of the

Read More »

YANG Leaf

This short video explains what a YANG Leaf is and how it is used within a module. This video is a small portion of the

Read More »

YANG List

This short video explains what a YANG List is and how it is used within a module. This video is a small portion of the

Read More »

YANG Leafref

This short video explains what a YANG Leafref is and how it is used within a module. This video is a small portion of the

Read More »

YANG Syntax

This brief video breaks down the four main types of data nodes used in YANG modeling: Leaf, Leaf-List, List, and Container. This video is a

Read More »

YANG Overview

This video provides an overview of what YANG (Yet Another Next Generation) is how it is used. This video is a small portion of the The Basics

Read More »

YANG Structure

This short video breaks down the structure of a YANG file including elements such as Header Information, Revision Information, and Reusable Nodes Declaration. This video

Read More »

The Basics of YANG

Not sure what YANG is all about? Come join Edwin Owen for this 1-hour Tech Session to learn the basics of YANG. We’ll start with

Read More »

CER Groups

This video explains what a CER Group is the maximum capacity of a Group in terms of IP phones, analog phones, LAN switches, and IP

Read More »

CER Clusters

This brief video explains how CER Groups can be grouped together to form CER Clusters when there is a substantial amount of phones on a

Read More »

CER Architecture

This short video reviews the CER Architecture including the CUCM Cluster, CER Group, Voice Gateway, CAMA Trunk, and PSAP. This video is a small portion

Read More »

Adding New CER Users

This brief video shows you how to add users in CER. This video is a small portion of the Introduction to Cisco Emergency Responder Tech

Read More »