Configuring Business-to-Business SIP URI Dialing with Cisco Expressway

Posted by Dishko Hristov on Jul 7, 2016 8:30:00 AM

 

If you already have Cisco Expressway MRA and SIP URI dialing activated in your Cisco Unified Communications environment, then you should seriously begin to think about activating another very key feature within Cisco Expressway: Business-to-Business dialing.

This feature will bring your collaboration with your partners and customers to whole new level; allowing you to have audio and video calls with them as seamlessly as you do with your coworkers.

A big part of the configuration process for B2B calls is deploying public DNS SRV records that will allow your partners and clients to call you using your corporate domain.

Assuming you have all necessary ports on the firewall already opened.  The following will take you through the steps required to effectively configure the B2B SIP URI dialing feature within Expressway.

Read More

Topics: Expressway, Weekly UC Tips, How to(s), URI

Activating SIP URI Dialling into a Cisco UC Environment: Step by Step

Posted by Dishko Hristov on Jun 2, 2016 11:30:00 AM

 

"The Future of Cisco UC: The URI Advantage" was a recent post that explained URI and the advantages of using it in your Unified Communications Environment. A directory URI is the abbreviation of Uniform Resource Identifier and its directory format is similar to an email address (username@host) where the host portion is an IPv4 address or a fully qualified domain name. One of the main advantages that was outlined  in the above article was that by adding SIP URI integration in your dial plan or at least a URI directory adds significant flexibility.  .

The following post, we take you through the step-by-step to setting up and activating URI dialing within a Cisco UC environment from mapping the Directory URI address to an email address to modifying display preferences.

Read More

Topics: Cisco Unified Communications Insights, How to(s)

Be Proactive: Protect your Business from Ransomware

Posted by Avi Mergui on May 26, 2016 11:30:00 AM

 

Ransomware, as its name suggests is a malware that infects a system and locks the user out of their data unless a ransom is paid. The victim of such an attack is left powerless to recover their data as only a unique key can unlock the infected system. The user has a pre-set deadline to pay the ransom or risk permanently losing access to their data. This type of attack has seen a rise in occurrence since its rise to prominence in 2005. The field of Crytomalaware is in constant evolution because of the extremely profitable nature of these activities, the largest threat currently is Cryptowall 3.0 /Cryptolocker which usually spreads through phishing emails. The user clicks on a link, a Trojan is installed on the system which then delivers its payload by encrypting user data and displaying a locked out message.

These attacks are now so prevalent that they account for $18 million in yearly revenue in the US alone and some estimates go up to $350 million worldwide according to a research done by The Cyber Threat Alliance (CTA). In the following sections, we will review some mitigation techniques about how to stay ahead of the curve to prevent this unfortunate scenario.
Read More

Topics: Security, How to(s), Network

Troubleshooting a Fax from Cisco UC to an Isolated Destination

Posted by Ben Petroff on Apr 14, 2016 3:05:56 PM

Your company is an avid Cisco Unified Communications user and you recently successfully integrated a fax server using H323. The fax server is configured and working fine, however, you see an issue when sending a fax to a specific destination. Why are other fax destinations working, but not this one? How can I identify the source of the problem? What can I do to fix the issue?

Often our first impression is to think that the issue resides with the destination. However, through investigation, when this issue came up with many of our customers, we often found that not to be the case; the issue actually resided at the origin and not the destination.  We will explore the most probably causes to the problem and outline steps to resolving them.

 

PROBLEM

Unable to fax to an isolated destination number;  the other fax answers, but the transmission does not complete.

 

Read More

Topics: Weekly UC Tips, How to(s)

Networking Segmentation for Security using VRF

Posted by John Marrett on Apr 7, 2016 9:08:56 AM

Many organisations today face a challenge in securing enterprise networks that were designed prior to internal segmentation and security becoming a primary concern. It is very difficult to retrofit security into a network design, especially when you want to avoid changing server configurations, minimize downtime and impact, maintain performance within existing network segments, and progressively phase in security rules. In this blog post, we'll discuss an approach we have developed and used for both new network deployments, as well as, retrofits. 

THE PROBLEM

Retrofitting security into a network design while avoiding server configuration changes, downtime and performance issues.

Read More

Topics: Security, Network & Security Insights, How to(s)

Don’t miss out. Expert advice straight to your inbox!

Insightful tips, troubleshooting and solutions for your everyday Unified Communications challenges from our team of experts. You can look forward to:

  • Weekly UC tips;
  • Cisco Unified Communications insights;
  • UCCX - Contact Center insights;
  • Network and Security insights;
  • Cisco Release notes and Product reviews.
Join us for free live demo