Gadgets on web  

    MAC OUI search  


Related links   

    cisco VoIP   


Start with CMS                    


What is new? Last 5 articles ...

17. Port security on access layer switchport

Port security is feature that enable permit or deny traffic for end user PCs connected to access layer switch. Port security enable specify a group of valid MAC address on port. If maximum secure MAC address  is reached then security violation modes lead to protect, restrict or shutdown of port.


There are 3 ways how to configure port security:

1) Static secure MAC addresses - manually configured with

   switchport port-security mac-address MAC_ADDRESS

16. Administrative Distance and route source preference

In environment with 2 or more enabled routing protocols must be present mechanism for selection of routing sources that are learned. What routing protocol obtained routes for remote network will be introduced to routers routing table? That is a big question.


Administrative Distance in short AD is considered parameter that will break the tie and say about trustworthiness of routing source.



15. PPP and Frame relay in small network

PPP and Frame relay are protocols operating at data link layer used in segment of private WAN connection. PPP enable establish communication through serial link between cisco and noncisco device where can not be used proprietary HDLC cisco encapsulation. Frame relay networks offer packet switched technology in providers network.  This article will focus on simple implementation of PPP serial link and Frame relay link in office environment.



UNIX and posix like OS administration

This section focus on Unix or posix like OS administration. Articles cover area of basic CLI commands with appropriate explanation, deployment of application layer services as FTP, SFTP, WWW, E-mail, NFS, SAMBA file server or LDAP, SSH access an certification key generation.

16. CUCM 8 - Call hunt configuration

As it was in CUCME call hunt enable one hunt pilot number to distribute calls to members of hunt list. For reference please read our article


CUCM configuration for call hunt is more flexible and robust. During creation of hunt environment we going through this steps:

4. Extended watch line scenario

New scenario will extend previews with new ephone. Now we have three ephones. Our lab consist of:

1 ) Ephone 1 - extension 2001 - name Ciljak - IP on hosting pc

2 ) Ephone 2 - extension 2002 - Name Office - IP hosted on win 7 virtual PC

3 ) Ephone 3 (new) - extension 2003 and two watch line monitoring activity on ephone 1 and 2 (can act as receptionist ephone) IP

3. Monitor and watch line button separator

Monitor (m) separator allows receptionist or assistant phone to monitor your ephone-dn and examine your currently calls. Receptionist can optionally take care about your call and take message for you.

Example of config is:

cme(config)#ephone-dn 1

cme(config-ephone-dn)#number 2001

cme(config-ephone-dn)#ephone-dn 2

cme(config-ephone-dn)#number 2002

2. Ephone button options

Button ephone-config commands are used to assign ephone-DNs to specific ephone.Button separator are used between line number (appropriate telephony line) and ephony-DN.

Example of config ephone 1 for normal beep:

router(config) # ephone-dn 1

router(config-ephone-dn) #number 2001


router(config) # ephone 1

1. Basic VoIP lab with two ephone for upcoming experiments

At first we must add second ephone (cheaper training solution is second cisco IP communicator) on VMware hosted client. As obvious install os on virtual PC. Next you need to configure network bridging with hosting pc. In our scenario hosting (physical PC) belong to network with default gateway and CME gateway was configured with, first ephone is on hosting pc with IP

Setup process for bridging hosted pc to hosting network adapter is described in next pictures:


Subscribe to RSS