Tag Archives: voip

Cisco Live Session on CUCM based SIP URI and ILS

Join me for an informative presentation hosted by Cisco Live on 16 Sep 2014 at 10:00 a.m. PDT / 1:00 p.m. EDT / 19:00 CEST; on one of the topics from CCIE Collaboration exam. This session is based on CCIE Collaboration written and lab exam topic: CUCM based SIP URI and ILS. For an in-depth insight of this topic and many other topics please read CCIE Collaboration Quick Reference by Cisco Press

Here’s the session snippet as seen on Cisco Live website:

The session aims at CUCM based SIP Uniform Resource Identifier (URI) dialing and its blend with Intercluster Lookup Service (ILS) alongside blended addressing. The session will help audience relate to the benefits of using URI and ILS in a converged network. Being an important topic for CCIE Collaboration aspirants, this session will provide an insight to planning and configuring URI scheme and implement ILS networking in a CUCM cluster.

To register for the session please click here:

Happy learning!



Leave a comment

Posted by on August 31, 2014 in CCIE Collaboration


Tags: , , , , , , , , , , , , , , ,

Cisco Press eBook Deal of the Week – CCIE Collaboration Quick Reference

Good news for all CCIE Collaboration aspirants out there!

Your wish to get your hands on the only source of authentic information on CCIE Collaboration exam preparation is just a click away as the ebook CCIE Collaboration Quick Reference is now available at 50% discount! Yes, that’s true and the offer is for this week only so go ahead and grab your copy now!

Get you copy here!

Happy reading and learning!

Leave a comment

Posted by on July 15, 2014 in CCIE Collaboration


Tags: , , , , , , , , , , , , , , ,

Cisco Technical Services Newsletter – Chalk Talk on Secure Manageability of Cisco Collaboration Environments

So, here’s a Chalk Talk on Secure Manageability of Cisco Collaboration Environments for those who are interesting in or wanted to get started with secure management.

Here’s an excerpt from the article


Now that your Cisco world class Collaboration Network is set up and functional, it is time to leverage the benefits of the Unified IP environment. With reduction in Total Cost of Ownership (TCO), leveraging converged network for transporting both voice and data and increased Return on Investment (ROI), what can possibly go wrong? Well, if you didn’t think in a holistic way while setting up the management aspect of your Collaboration network, a lot can go wrong. With things on the move, you should concentrate on making sure they keep going as planned. That is, ensure that you have a plan to securely manage the vital assets of your organization’s communications channels.

More often than not, the topic of “secure management” does not come up as early as it should in most network management discussions. Reasons can vary, such as – lack of support from higher management (monetary or manpower) or lack of insight or experience about what goes into secure management of a Collaboration network. With that said, a Secure Collaboration Network can be achievable only if network management is secured. All in all, if a true collaboration experience is to be achieved, it can be only by way of well-rounded security strategy, and secure network management is an indispensable part of any security strategy.

A Collaboration network’s secure management can be looked upon as a task to move away from unsecure management protocols to standards-driven secure management protocols. The following sections discuss the importance of switching from relatively unsecure or weak security posture management protocols to comparatively secure management protocols.

Something’s Just Not Right!

Until now many organizations still stick with clear text, and in turn, vulnerable protocols for managing their Collaboration networks. The burning question is – why use an insecure protocol at all? The answer is pretty straight forward –a default clear text protocol doesn’t require any special software at Network Management Station (NMS) nor any special configuration at the device being managed. While this may sound great at first, it’s not a leading practice or a recommendation for managing an organization’s Collaboration network.


For full article you can view Cisco Technical Services newsletter of Nov 2013 @ or article on Cisco Support Community

And if you’re interested in further details on how you can achieve a secure network construct for your Cisco Collaboration network, you can always refer to Securing Cisco IP Telephony Networks

Leave a comment

Posted by on November 21, 2013 in UC Security Posts


Tags: , , , , , , , ,

Webcast recordings for: Essentials of Endpoint Security and Compliance Series

Last week I wrote about the ongoing webcast series for “Essentials of Endpoint Security and Compliance” which is being hosted by Stephen Welsh (CTO UnifiedFx) and myself. In case you were not able to attend the live session(s) you can view the recording for each session.

The Essentials of Endpoint Security & Compliance

• Session 1: The Impact of Security by Default – Recording is available at:

• Session 2: Understanding and Managing ITL & CTL Files – Recording is available at following URL

• Session 3: Leading Practices for Endpoint Security & Compliance – Recording is available at following URL

I hope you enjoy the sessions and can put the knowledge gained to good use in your organization or for a customer project.

You can download the presentation used for the session from the following link.

The Essentials of Endpoint Security Compliance Presentation

If you wish to demystify the intricacies of Cisco’s Collaboration Network Security Securing Cisco IP Telephony Networks is your single resource for all Cisco UC Security, Network Security and Security Strategy queries.

Leave a comment

Posted by on September 12, 2013 in UC Security Posts


Tags: , , , , , , , , ,

Interviewed by!

This is exciting for me and I guess it would be for any author to be interviewed and published. My interview was recently published on

Here’s the Interview excerpt,

What inspires you to write?

My passion for technology and the spark to share the bit of knowledge I have!
Moreover, I’m inspired by my family which motivates myself to excel and to think and do things differently.

Tell us about your writing process

When I started working on the title “Securing Cisco IP Telephony Networks”, it came through as a rather pleasant revelation was, how I had to be creative in thinking what audience would like to see, vivid in visualizing to ensure that pictures do mean a thousand words, and convinced to decide the best way to explain a concept in a clear and concise manner.
Being an author has changed the way I look at things and the perspective in which I represent my thoughts. In a nutshell, I try and be in a reader’s mood and profile to see what a reader would like to see in the book.
The tools of writing are pretty much simple and unsophisticated as I use Microsoft Word for writing, Excel for tables, Visio and Powerpoint for diagrams, and PrtScrn for capturing screens (for illustrations). When it comes to writing process, I clear my mind, sit down in a relaxed environment, and start working through my thoughts and write down the rough manuscript which I finalize once all done. Overall, a straight forward and simple process.

How did you decide how to publish your books?

For technology oriented books there’re a few publishers however, for Cisco specific books the list is even shorter. When it comes to choice of publisher, it wasn’t a difficult venture as I had my mind made up for Cisco Press. Again, they are a a great platform for technologists like myself and people who wish to invest time and effort into writing a technical literature. So, without a doubt I was going with them, at least for this title
In future I would like to explore more avenues like another publisher for the technical literature or may be even self publishing.

To read the full interview visit

To explore the world of and understanding of VoIP / UC Security read Securing Cisco IP Telephony Networks

Leave a comment

Posted by on July 23, 2013 in UC Security Posts


Tags: , , , , , , , , ,

CSC Webcast – Cisco Adaptive Security Appliance (ASA) Firewalls: Lifeline of Today’s Data Centers

I invite you to join me for live webcast on ‘Cisco Adaptive Security Appliance (ASA) Firewalls: Lifeline of Today’s Data Centers’ on 30 Jul 2013 at 11.30 am IST (GMT +5.30). I’ll be your host during this session.

Please register for this event at following URL

An overview of the webcast –

Firewalls have been an integral component of data networks ever since the inception of network attacks. Cisco ASA redefines firewalling technology by providing state-of-the-art firewall capabilities, VPN termination, inline modules for antivirus, spam prevention, and intrusion prevention and, most importantly, by enabling organizations to filter and control traffic as per their security policy.

During this live event, Cisco subject matter expert Akhil Behl will focus on various new features of the Cisco ASA firewall as a next-generation data center firewall in terms of its capability, scalability, and performance. The emphasis will be on Cisco ASA as a next-generation data center firewall, providing clustering and intelligent threat defense using Cisco ScanSafe technology and access control based on Cisco TrustSec. The essence of the session will revolve around how Cisco ASA 5500 series firewalls can deliver high-class performance with utmost reliability and stakeholder satisfaction in today’s competitive environment.

During the live webcast, you will learn about:

• An introduction to Cisco ASA 5500 and 5500-x series firewalls
• Cisco ASA next-generation firewall technology for borderless networks
• Insight into Cisco ASA clustering
• Overview of Cisco ASA web security (ScanSafe)
• Overview of Cisco ASA TrustSec

1 Comment

Posted by on July 16, 2013 in UC Security Posts


Tags: , , , , , , ,

Best Practices for Deploying Secure Cisco IP Telephony Solutions

IP telephony is slowly but surely becoming part of the modern day organization’s day-to day-operations. In fact, some organizations depend on it to the extent of their core business or processes based on IP communications. Sadly though, the security aspect pertinent to IP based communications network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored) when enterprises and businesses think of deploying unified communications.

On the same lines of thought, why should anyone for that matter think of securing an IP telephony network? The answer is simple however manifold:

  1. To protect the information flowing in IP communication channels from eavesdropping and reconnaissance attacks as well as from manipulation or injection attacks.
  2. To ensure that the investment in their on-premise or off-premise infrastructure pays off (ROI) and doesn’t end up in a rogue’s hands, utilizing it for malicious purposes.
  3. To lower Total Cost of Ownership (TCO) by leveraging IP communications to offset PSTN/Toll calls and reducing Moving, Addition, Configuration, and Deletion (MACD) and at the same time, keeping conversations safe.
  4. Attacks on the telephony network may result in monetary and reputation loss. Moreover, it can directly or indirectly impact the business continuity and clientage.

Today, many organizations depend on a number of IP telephony services like voice calls, instant messaging, conferencing, and video conferencing. A typical IP telephony network can face several threats like toll fraud, reconnaissance attacks, eavesdropping, Denial of Service (DoS) attack, and call hijack. While most organizations do consider that their network needs protection from internal or external threats, such a notion is missing (usually) when it comes to their IP telephony applications/devices.

Read the full article at

For more insight to Cisco IP Telephony Security refer to Cisco Press book Securing Cisco IP Telephony Networks

Leave a comment

Posted by on April 8, 2013 in UC Security Posts


Tags: , , , , , , , , , , , , , , , , , , , ,