No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?zid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog
 

BRKCOL-2265 - Business to Business Collaboration utilizing Expressway (2014 San Francisco) This session aims to educate our customers on where and how they can federate with other enterprises and agencies. This will utilize Cisco's Collaboration Edge Architecture using Expressway. Our focus will include voice, video, content-sharing, and discussion around instant messaging/presence. On premise and cloud based models will be discussed including federation with other manufactures.
4.0/5.0
BRKACI-2001 - Integration and Interoperation of existing Nexus networks into an ACI architecture (2014 San Francisco) Cisco's new Application Centric Infrastructure (ACI) facilitates dynamic provisioning of the network connectivity and automates the configuration of the virtual and physical networking and L4-7 services to radically simplify the operation and troubleshooting of the DC infrastructure. This session provides a technical deep dive into the use of existing Nexus based Data Center switches and networks in conjunction with an ACI based infrastructure. The interoperation of classical designs and the ACI fabric, the extension of applications between the two environments and the management of existing Nexus switches via the APIC controller will be examined. The integration of virtual switching and the extension of the ACI policy model will also be reviewed. This session is intended for network and cloud architects planning to migrate to an ACI based Data Center and assumes familiarity with standard Nexus designs.
5.0/5.0
BSAEWN-1744 - How Enterprises Can Take Advantage of IoE (2014 San Francisco) The Internet of Everything (IoE) is potentially the biggest business opportunity in the history of mankind. It will change the world with extraordinary and wide-ranging implications, affecting everyone on the planet. Research firm IDC predicts that this massive shift will generate nearly US$9 trillion in annual sales by 2020. Here are some of the major areas of opportunities of IoE: - Assets utilization, - Employee productivity - No waste supply chain, - Improving customer experience and - Reduce time to capabilities (market) through innovation The session will discuss topics around how do you start the preparation for the new economy, what are the major pillars and foundational capabilities and services, how do you build the IoE connectivity platform, what are the killer apps and use cases Cisco IT will be addressing in FY15.
4.5/5.0
BRKSEC-1011 - Written to Realized Security Policy (2014 San Francisco) Organizations today are faced with dynamic changes to Infrastructure, Devices and Policy. These changes challenge the status quo of network security and require IT organizations to introduce technology adaptable to enforce new policy. This session will show how written security policy can be enforced using Cisco Security architecture. Whether your organization is preparing for BYOD, Cloud based services or just trying to lock things down to meet your security or compliance requirements, understanding how to leverage the devices to meet new business needs is critical. Learn from real world example security policies and the implementation of controls to prepare your organization for the next big thing.
BRKRST-3047 - Troubleshooting LISP (2014 San Francisco) Starting with a very short refresher on LISP the speaker will show the typical LISP use cases and the basic configs. For each use case the presenter will discuss the troubleshooting strategy in case of problems with the setup. He will talk about the needed show and debug commands and how to start backwards with the troubleshooting. Tips and tricks will be shown to do the LISP troubleshooting effective and purposeful. Additional sources of information and mailing lists will be mentioned. The troubleshooting session will be technical and requires IOS and LISP configuration knowledge.
5.0/5.0
BRKCOL-2020 - Cisco Unified Communications and Microsoft Integrations (2014 Melbourne) This intermediate-level session provides attendees with a detailed understanding of the Cisco Unified Communications solution when integrating and interoperating with Microsoft. It includes a review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products, a detailed explanation of migration and deployment scenarios, and things to keep in mind before deployment. Related technologies are treated, including call control, presence, unified communications security, telepresence, and rich media applications. This session is for people involved with the planning and implementation of unified communications solutions and those involved in strategic decision making for selecting unified communications solutions. Attendees should have a good understanding of the Cisco Unified Communications high-level architecture and a basic understanding of the Microsoft product set. Content: Review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products. Detailed explanation of migration and deployment scenarios. Things to keep in mind before you deploy... Related technologies: call control, presence, unified communications security, telepresence, rich media applications Audience: People who are involved with the planning and implementation of unified communications solutions. Individuals involved in strategic decision making for selecting unified communications solutions. Pre-requisites: Good understanding of Cisco Unified Communications high level architecture. Basic understanding of Microsoft product set.
BRKVIR-2044 - Multi-Hypervisor Networking Compare and Contrast (2014 San Francisco) Evolution of virtualized x86 provides several options offering Enterprise-class capabilities. Three of the most common are VMware ESXi, Microsoft Hyper-V, Red Hat KVM. The network is a critical component of a complete IT stack within the virtual edge. None of these options addresses the network in the same manner. Thus a consistent Operational Model is nearly impossible. This session will provide in-depth information on the native networking of these Hypervisors. It will also introduce the Nexus1000V as a unifying entity to ease Operations Management of the Virtual Network edge. As customers embrace more than one hypervisor in their x86 compute space, keeping operational costs in-line requires a common interface. Attendees will leave this session with familiarization of the major hypervisors' native virtual networking. They will also gain knowledge of how to address operational challenges of this environment via use of the Nexus1000V.
5.0/5.0
ITMGEN-2638 - Securing Cisco’s Network – An Inside IT Perspective (2014 Melbourne) Simon Finn, Information Security Architect provides an overview of security inside Cisco – the new security issues facing enterprises today, how Cisco IT is structured and what strategies are employed to mitigate these threats.  He will detail some of the tools being used today, and focus on how ACI and ISE are adding new security capabilities to our current network infrastructure security solutions.
BRKVIR-2019 - Hypervisors networking: best practices for interconnecting with Cisco Switches (2014 San Francisco) **The video for this session is unavailable.** Originating virtual port-ID, source MAC hash, load-based teaming, IP hash, explicit failover order. Do these terms ring a bell? Do you know the best connectivity scheme for each of those? Come to this session and you'll learn Cisco's best practices in terms of Hypervisor to physical switch connectivity. We will dive into the networking details of three Hypervisors: VMware's ESXi, Microsoft's Hyper-V and Xen and present how to use their networking features with Cisco switches.
5.0/5.0
BRKPCS-2047 - Maximizing UCS Server Efficiency with Memory and SSDs (2014 San Francisco) With the Internet of Everything gaining momentum and the cloud exploding in importance, Samsung will examine how Green Memory and enterprise SSDs (solid state drives) will help your UCS-based infrastructure obtain the best TCO results. This presentation will take a close look at why advanced memory and SSDs are able to accelerate the speed of Cisco UCS servers, improve scalability, enhance the efficiency of cloud operations and reduce power consumption. Presenters will highlight the impact of Samsung’s DDR3/DDR4 memory and its SAS/SATA SSDs on UCS servers in cloud and virtualized environments with SAP and other database applications. Samsung will underscore the performance-enhancing and power-saving efficiency of the most advanced Green Memory. It will also help you to understand how best to capitalize on the use of new and next-generation (V-NAND) SSDs, within your B460 or other UCS server. In addition, presenters will suggest how data center and Internet managers can use SSDs to make the most of Cisco’s upcoming multi-tenant Intercloud infrastructure. A senior Cisco executive will co-present here, to emphasize the importance of memory and storage, together with UCS Manager and the Cisco Virtual Interface Card, in attaining the highest levels of UCS performance and quality.
BRKUCC-2008 - Designing Dial Plans for Enterprise Unified Communications (2014 Melbourne) This session explains the various fundamental dial plan elements of Cisco Unified Communications Manager with a focus on Enterprise dial plan design. Attendees learn how closest match routing works, how partitions and calling search spaces function, and the various constructs available to route calls. Other concepts such as class of service, URI dialing in single cluster enviroments and translation patterns are also covered. For attendees that are familiar with Unified CM, but new to Dial Plan components and design, this session should provide a comprehensive understanding of the elements involved in deploying an enterprise dial plan and is a prerequisite for the Advanced Dial-Plan session.
CP-1002 - The ABCs of Identity Management The ABC's of Identity Management covers the essentials of identity management for todays networks.  This session is designed to cover the elements of identity management as used for end users as well as administrative users. This session will cover: • Introduction • Overview of Identity Management       ⁃ AAA       ⁃ TACACS+       ⁃ RADIUS       ⁃ 802.1X • Identity Management for End Users       ⁃ 802.1X Elements       ⁃ The Role of Cisco ISE       ⁃ The Role of Cisco Switches       ⁃ The Role of Wireless LAN Controllers       ⁃ Simple Configuration of 802.1x with Cisco ISE • Identity Management for Administrative Access       ⁃ TACACS+       ⁃ Cisco Secure ACS       ⁃ The Role of Cisco IOS Routers & Switches       ⁃ Basics of Authentication       ⁃ Basics of Authorization       ⁃ Using Command Authorization
3.0/5.0
BRKUCC-2346 - UC on UCS Overview (2014 San Francisco) For baseline prior to BRKUCC-2225 (design) or BRKUCC-1903 (migration). This session covers the Cisco UC on UCS solution at business / technical / product levels. This would include overall Cisco Collaboration direction for virtualization, solution overview, Cisco UCS and virtualization benefits, product / platform / virtualization feature support, differences between Tested Reference Configuration and Specs-based support, how to purchase Cisco UCS and virtualization software and highlights of design and physical to virtual migration considerations.
BRKSEC-2664 - Cisco Sourcefire Advanced Malware Protection (AMP) (2014 Melbourne) Today, the weapon of choice for attackers is malware. Targeted and cunning, advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time and can obfuscate the exfiltration of data. The Cisco Sourcefire Advanced Malware Protection (AMP) solution spans extended networks and devices to focus on threats across the full attack continuum – before, during and after™ an attack.This session will provide the audience an overview of Cisco Sourcefire Advanced Malware Protection (AMP) solution - Advanced Malware Protection for Networks, and Advanced Malware Protection for Endpoints.
4.0/5.0
BRKPCS-2037 - Overcoming the Challenge of Application Visibility in Today’s Complex Data Center (2014 San Francisco) In today’s increasingly application-centric world, it’s time to revisit the Data Center. The landscape has changed: the network is now the conduit for “everything” and applications have become a primary way of interacting. Taken together, they define how business is conducted with customers, partners and suppliers; and how consumers connect, comment and spend. In this session you’ll hear why it’s imperative that network professionals become more “application savvy”, increasing their visibility into the applications running across the network and datacenter. Compuware APM (Application Performance Management) will share how its solutions offer end user and application-based visibility into network resources, regardless of end user device, application type and datacenter (or cloud-based) environment. Special guests from World Wide Technology, Inc., a Cisco Gold Partner; and Verizon Terremark, one of the world’s leading private cloud providers, will discuss how they are building application-aware insights into their solutions, alongside Cisco technologies. You’ll get both practical tips on measuring and testing applications in complex network environments, as well as hear why the IT investments you’re making today will require greater visibility into end user experience and application performance.
BRKUCC-2006 - SIP Trunk design and deployment in Enterprise UC networks (2014 San Francisco) The Session Initiation Protocol (SIP) has emerged as the dominant rich media communications protocol on IP networks and the Cisco Unified Communications product portfolio leverages SIP extensively for inter-connectivity. This deep dive session provides in depth coverage of the SIP protocol and how CUCM uses SIP to provide its SIP Trunk features. Updated for Unified Communications 10.0 release this session : Discusses SIP protocol functionality in depth and describes how voice and video calls are set up and negotiated over SIP trunks. Topics covered include : Basic SIP overview, SIP Headers in detail, SIP Identity Headers, SDP In detail for voice and video calls, SIP messages and call flows for CUCM feature invocation At the end of the session you will have a good understanding of SIP Messages and Responses, the Offer/ Answer model, Session Description Protocol attributes for voice and video calls, and feature operation over SIP Trunks. This session is intended to provide an in depth update to an audience with a working knowledge of CUCM and SIP Trunking.
4.5/5.0
BRKNMS-2700 - BYOD meets DHCP -- Learning To Love Devices You Didn't Have To Provide (2014 San Francisco) Bring your own devices (BYOD) also brings many new challenges for Enterprise device attachment. Creative use of DHCP can make integration of BYOD devices less chaotic and more secure. We will explore how to authenticate the users of BYOD devices using DHCP to restrict the provisioning of IP addresses only to authorized users of these devices. Finally, we will spend some time on how to structure your DHCP deployment so that it is both robust and scalable, with sufficient capacity to meet today's needs and respond easily to tomorrow's growth.
BRKUCC-2059 - Designing and Deploying Cisco Contact Centre Express (2014 Melbourne) This session covers the fundamentals of designing and deploying a Cisco Unified Contact Centre Express solution. The session will begin with an overview and refresher of the Unified Contact Centre Express product portfolio including features and functionality of the latest version. It then moves into design and deployment best practices and covers resources available to design & deployment Engineers. Topics include: Choosing a deployment model, planning for high availability, sizing systems, and estimating bandwidth for the Contact Centre. This is an intermediate to advanced level session intended for network planners, design engineers, administrators and technical staff.
5.0/5.0
BRKSEC-3013 - Advanced IPSec with FlexVPN (2014 Melbourne) FlexVPN is Cisco's unified Crypto VPN, the natural evolution of DMVPN and Easy VPN based on IKEv2. In this session, we will demonstrate how FlexVPN works for multiple scenarios such as  Site-to-Site, Remote Access,  Hub&Spoke, and Spoke-to-Spoke shortcut. This breakout covers design recommendations for scalable, redundant designs and all IPv6/IPv4 scenarios. This session is targeted towards Network Architects and Designers,  who need to deploy Crypto VPN in a variety of environments.
5.0/5.0
ITMGEN-4111 - IT Management Luncheon - Executive Lunch (2014 San Francisco) **The video for this session is unavailable.** Join your colleagues for a lunch just for IT Management delegates. You'll have the opportunity to talk to Cisco executives to get all your questions answered.
BRKMPL-2108 - Designing MPLS in Next Generation Data Center: A Case Study (2014 San Francisco) This session will share the details of a design and lessons learned from recent MPLS data center deployments. These designs supports a multi-tenant data center where security and network services are critical. Also with the ability to grow to a large scale that is spread among multiple data centers. The design leverages many of the recent innovations in the data center that is combined with MPLS to provide a scalable, efficient and highly available solution. Heavy focus on FabricPath, MPLS, firewall integration and a WAN core design with services. We will review the business and technical requirements, the working logic of the building blocks, the design, the functional logic and lessons learned. Recommended prerequisite includes a good understanding of MPLS, BGP and basic firewall operations.
5.0/5.0
ITMGEN-4121 - Solving Network Challenges Using SDN (2014 San Francisco) This session provides an overview of Cisco IT’s approach to SDN by presenting the opportunities and challenges faced in the integration of Cisco ONE technologies across our internal network. We present the use cases with detailed, in depth under the hood discussions on how they are implemented backed up by live demos.
4.5/5.0
BRKIPM-3017 - mVPN Deployment Models (2014 San Francisco) This breakout session explains the mVPN Deployment Models. We provide an overview of the mVPN architecture and the building blocks.There is an in-depth coverage of the different mVPN Deployment Models:GRE based, mLDP based, inband signaling, Partitioned MDT, Ingress Replication and Point-to-Multipoint MPLS Traffic Engineering. In addition, we explain BGP Auto Discovery and BGP Customer Signaling.This session explains the implementation, deployment considerations, and the advantages and disadvantages of the different mVPN Deployment Models and covers some configuration for IOS and IOS-XR.
5.0/5.0
BRKRST-3640 - Cisco Enterprise Silicon - Delivering Innovation with UADP and QFP (2014 Melbourne) Come to this session to learn about the latest advances in Cisco Enterprise silicon development ASIC (Application Specific Integrated Circuit) hardware which provides a key foundational element of the Cisco ONE Architecture for Enterprise Networks, and which support key industry trends such as SDN. Attendees at this session will gain a greater insight into how ASICs are created showcasing the advanced capabilities and functionality delivered by two of Cisco's latest switching and routing silicon innovations UADP (Unified Access Data Plane) and QFP (QuantumFlow Processor). By developing custom silicon, and leveraging this advanced hardware within our Enterprise portfolio, Cisco has always provided differentiating capabilities and compelling customer value across many platforms. In this session, we will explore the capabilities and advantages provided by custom Cisco silicon, provide greater insight into the functionality delivered by existing Cisco Enterprise ASICs, and explore the new capabilities and solutions enabled by Cisco's latest generation of Enterprise-focused programmable switching and routing chipsets UADP and QFP.
BRKRST-2619 - Troubleshooting Routing Protocols - BGP/OSPF/EIGRP (2014 Melbourne) Routing Protocols has been at the core of networks since their inception. Over time they have become more feature rich and robust. In todays high demanding networks, these additions have contributed to complexity and challenges, especially when there is a need to troubleshoot routing problems. This presentation will focus on the life cycle of how routing protocols work and go through methodical troubleshooting techniques for EIGRP, OSPF and BGP, covering common problems network engineers may encounter.
5.0/5.0
COCEWN-3428 - Inside Cisco IT: Deploying Unified Access Solution for BYOD, Mobility, and HD Video Over Wireless (2014 San Francisco) Is your organization allowing employees to access corporate information from their personal devices? Do your employees expect a consistent seamless experience and access to high definition content from various mobile devices? If so, this session is for you. Supporting BYOD, Mobility, and HD video over wireless requires a new distributed architecture of switching wireless traffic at the edge utilizing a converged wired and wireless infrastructure that will scale to handle the next generation wireless clients. In addition to a converged wired and wireless infrastructure deploying a global Identity Services Engine infrastructure for centralized policy management and a global Prime Infrastructure for device management will help simplify network operations and management. Join John Moe as he shares how Cisco IT is deploying the Unified Access Solution to address the increasing demands placed on the network infrastructure and gain insight into Cisco IT’s challenges and successes as John shares Cisco IT’s best practices and lessons learned during the deployment of the Unified Access Solution.
BRKSPG-2016 - Architectures for new services over Cable (2014 San Francisco) The session describes the key aspects of CCAP (Converged Cable Access Platform ) and will describe how Cable operators will migrate multiple silos of technology to a converged architecture whilst maintaining backward compatibility with current DOCSIS and Video deployments. The session will also describe the emerging standard for “Advance MAC /PHY” (AMP) in DOCSIS 3.1 and how this plays a pivotal technical development role in the future of an MSO's architecture. A focus on some of the service-driven architectures enabled by DOCSIS will also be covered in this session.
5.0/5.0
BRKSEC-3051 - Troubleshooting GETVPN Deployments (2014 San Francisco) This session presents techniques and tools for troubleshooting Group Encrypted Transport (GETVPN). The session starts with an overview of the GETVPN technology including protocol fundamentals and solution architecture. It then walks through configuration verification, troubleshooting methodology, and common problems as seen in real GETVPN deployments. This presentation is for network engineers, network managers and network administrators who are responsible for configuring, troubleshooting and/or maintaining GETVPN solutions in their network.
5.0/5.0
BRKEWN-2010 - Design and Deployment of Enterprise WLANs (2014 San Francisco) This session focuses on design and deployment concepts for enterprise and branch office WLAN deployments, i.e. the core technologies that drive and enable mobility services. Topics covered include protocol details like CAPWAP, deep-dives into new controller features, mobility protocols and design recommendations, and the latest in design and deployment recommendations for new WLAN controllers, including centralized and distributed models. We will also look into use cases for IPv6 clients deployments for wireless networks using latest software releases 7.4, 7.5 and7.6.
BRKSEC-2695 - Building an Enterprise Access Control Architecture using ISE and TrustSec (2014 San Francisco) Tomorrow's requirement to network the Internet of Things requires an access control architecture that contextually regulates who and what is allowed onto the network. Identity Service Engines (ISE) plays a central role in providing network access control for Wired, Wireless and VPN networks. In addition, ISE is the policy control point for TrustSec, which controls access from the network edge to resources. This session will focus on:1. Emerging business requirements and ISE services such as: Guest, profiling, posture, BYOD and MDM.2. Secure policy based access control including 802.1X, MAB, Web Authentication, and certificates/PKI. The session will show you how to expand policy decisions to include contextual information gathered from profiling, posture assessment, location, and external data stores such as AD and LDAP.3. Enforcing network access policy through conventional means such as VLANs and ACLS and emerging technologies such as TrustSec. Cisco TrustSec technology is used to segment the campus and datacenter to increase security and drive down the operational expenses associated with managing complex ACL firewall rule tables and ACLs lists. This session is an introduction to the following advanced sessions: BRKSEC-3699; BRKSEC-3698; BRKSEC-3690; TECSEC-3691
4.5/5.0
BRKDCT-2214 - Ultra Low Latency Data Center Nexu Design - End-to-end design approach (2014 San Francisco) The purpose of this session is to provide the concepts and knowledge around Ultra Low Latency. The network concepts, best practices and design of low latency will be explained for applications demanding ultra low latency. This session focuses on Nexus, UCS, NICs and any other updated ULL topics.
5.0/5.0
BRKEWN-2664 - Secure Wireless LAN Design and Deployment (2014 Melbourne) Wireless Security.  Oxymoron or not?!? Wireless networks were once thought to be inherently insecure, but this is no longer the case.  Attend this session to understand the risks associated with the deployment of 802.11 wireless networks and the mitigation strategies that you can put in place to ensure that your network is kept secure.  We will take an end-to-end view of security all the way from the client device to the corporate network and examine threats and associated mitigations each step of the way.
5.0/5.0
BRKDCT-1121 - Fibre Channel Networking for the IP Network Engineer and SAN Core Edge Design Best Practices (2014 San Francisco) This session gives non-storage-networking professionals the fundamentals to understand and implement storage area networks (SANs). This curriculum is intended to prepare attendees for involvement in SAN projects and I/O Consolidation of Ethernet & Fibre Channel networking. You will be exposed to the introduction of Storage Networking terminology & designs. Specific topics covered include Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), FC services, FC addressing, fabric routing, zoning, and virtual SANs (VSANs). The session includes discussions on Designing Core-Edge Fibre Channel Networks and the best practice recommendations around this design. This is an introductory session and attendees are encouraged to follow up with other SAN breakout sessions and labs to learn more about specific advanced topics.
3.2/5.0
BRKCOM-3010 - UCS: 4+ Years of Lessons Learned by the TAC (2014 San Francisco) Learn valuable lessons gleaned by the TAC during the past 5+ years as we have provided support for real world customers. We will focus on interesting case studies, best practices, and how to best leverage your interactions with the TAC to solve your UCS issues. The session will cover both the UCS B-Series (primarily) and the C-Series Rack Servers
5.0/5.0
BRKCCT-2019 - Cisco Unified Contact Center Express Planning and Design (2014 San Francisco) **The video for this session is unavailable.** This session covers the fundamentals of planning and designing a Cisco Multimedia Unified Contact Center Express deployment. Topics include how to gather customer requirements, deployment model capacity planning, sizing voice/email/chat/reporting features, server virtualization, CAD to new Finesse Migration, New Remote Agent, 'Live Data' in CUIC, and estimating bandwidth for the contact center.
3.0/5.0
BRKSEC-8638 - Troubleshooting Secure Sockets Layer (SSL) VPN on Cisco 5500 Series Adaptive Security Appliance (ASA) This session provides an overview of the techniques for configuring and troubleshooting SSL VPN on the Cisco 5500 Series Adaptive Security Appliance (ASA) and Cisco AnyConnect Secure Mobility Client with Cisco expert Jazib Frahim. The Cisco AnyConnect Secure Mobility Client is the next-generation VPN client, providing remote users with secure IPsec (IKEv2) or SSL VPN connections to the Cisco ASA. AnyConnect provides end users with a connectivity experience that is intelligent, transparent, and always on, with secure mobility across today's proliferating managed and unmanaged mobile devices. In this session, you will learn numerous tips and best practices for troubleshooting problems related to SSL VPN and secure mobility. This session is designed for networking and security professionals who have deployed or are planning to deploy remote access SSL VPN solutions. Speaker Bio: Jazib Frahim is a technical leader in the Security Services practice of Cisco's Advanced Services. He is responsible for guiding customers in the design and implementation of their networks with a focus in network security. He was previously a technical leader for Cisco's TAC Security team, leading engineers in resolving complicated security and VPN technologies. He has presented at many industry events, including the Cisco Support Community and Cisco Live on multiple occasions. He has also written numerous technical documents and books, including Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (1st and 2nd editions); Cisco Network Admission Control, Volume II; and Cisco SSL VPN Solutions. Frahim holds CCIE (number 5459) certifications in routing and switching and security, a bachelor’s degree in computer engineering from the Illinois Institute of Technology, and a master of business administration (MBA) degree from North Carolina State University.
4.2/5.0
CIN-WS141 - Enabling the New Mobility Experience Users are demanding seamless access no matter which device they are using or from where they are connecting. IT is being challenged to bring together more solutions elements than ever before while meeting performance expectations both on and off the corporate network and to be able to quickly troubleshoot problems and proactively manage user experience end to end. Join us and our customer – Bowdoin College to learn more about the industry’s first 4x43 access point delivering up to 30% faster performance with the most reliable connection for mobile devices including tablets and smartphones. The Aironet 3600 Series Access Points is a key component of the total Cisco solution to address the end-to-end mobility challenge posed by the explosion of mobile devices. Only Cisco has all the pieces needed to enable customers turn the explosion of mobile devices from chaos into business opportunity and deliver a new mobility experience.
4.0/5.0
BRKAPP-8627 - Troubleshooting Cisco Wide Area Application Services During the live event, Cisco subject matter expert Bhavin Yadav will be presenting on how to troubleshoot Wide Area Application Services (WAAS) application optimization (AO) effectively. He will focus more on individual AO troubleshooting, and he will explain about the different ways to work around AO issues with minimum effects on the traffic. Bhavin Yadav is a technical support engineer in the San Jose campus focusing on Technical Assistance Center (TAC) cases raised by customers for the Cisco WAAS solution and Web Cache Communication Protocol (WCCP) deployments. Yadav has five years of experience with WAN optimization products, which include Cisco WAAS as well as solutions from Riverbed and Blue Coat. He holds a bachelor's degree in computer science and CCNA certification. To view additional related content such as the Q&A from the session, as well as the Ask the Expert Forum Event that followed the webcast, visit the Cisco Support Community Webcasts
BRKCRS-2663 - Hot Topics and Capabilities for the Campus in 2014 and Beyond (2014 Melbourne) This session discusses the Next Generation Campus Architectures as described by Cisco in published Solution Reference Network Designs (SRND). It focuses on the technologies involved in building such an enterprise campus network, including design and implementation guidance on protocol alternatives like VSS, HSRP, GLBP, Spanning Tree (PVSTP+), and Rapid Spanning Tree (Rapid PVST+). Software features and design principles for each layer of the hierarchical core/distribution/access network model are covered. Detailed examples are presented of failure analysis scenarios and LAN and Interior Gateway Protocol (IGP) tuning related to enterprise networks to minimise network outage times. Finally the session treats common pitfalls such as asymmetrical routing, unicast flooding, and routing black holes and provides best practices for optimising an enterprise campus network to support today's business applications. This session is for attendees responsible for the design, deployment, operations, and management of enterprise campus networks. Introductory knowledge of Spanning Tree, routing protocols, and LAN switching is recommended.
4.0/5.0
BRKCRS-2000 - Next Generation Branch Networks: Services, Design and Implementation (2014 Melbourne) Enterprise networks continue to evolve under the pressures of emerging trends: Cloud, Centralisation, Virtualisation, Optimisation. The requirements are for organisations to continue delivering more value from enterprise networks whilst reducing operational expenses, cutting power consumption, and allowing maximum flexibility for the future. Branch users require increasingly more access to rich media collaboration and video technologies, whilst easier access to bandwidth and new technologies such as 4G/LTE are allowing services to reach places never before thought possible. This session will look at how certain technologies are evolving to meet growing demands, how to build some future-proofing into your branch environments, and some of the key implementation strategies being used by organisations across the region. The session introduces the Cisco Intelligent WAN (IWAN) solution for providing highly available Enterprise WAN connectivity using internet circuits and the Cisco ISR features such as Performance Routing (PfR), Dynamic Multipoint VPN (DMVPN) and Application Visibility and Control (AVC) which enable the iWAN capability.  In addition the session will also cover ISR services such as WAAS and the new Akamai capability, UCS-E, Security and One PK as they relate to the changing demands of the branch environment.
5.0/5.0
BRKCRS-3001 - Zeroconf Service Discovery with IOS (2014 San Francisco) Have you ever experienced problems with service discovery on Apple devices when they reside on other subnets? Not seeing your Apple TV or printer? Fear not! Service Discovery Gateway is here to the rescue! With the proliferation of mobile devices, tablets and smartphones (also BYOD) in enterprise networks users might fail to discover services like printers, displays, and media servers among others. This is a major problem faced by many enterprise networks today and is especially acute in education and healthcare networks. Cisco introduced a new solution in IOS and IOS XE for converged wireless and wired access that allows users to discover services overcoming those existing boundaries to unleash the true potential of BYOD. This session will introduce Cisco's new solution for enterprise-wide service discovery enhancing the Zeroconf protocol family that is widely used especially in Apple products.
5.0/5.0
BRKCOM-3002 - UCS Performance Troubleshooting (2014 Melbourne) Identifying performance problems and tuning your UCS environment to operate peak capability is a common challenge for UCS administrators. This session will help you understand the methodology behind UCS performance to help identify, and correct performance related issues within your UCS deployment. Concepts to be covered include resolving network and storage performance related issues throughout various levels of the system and components. The most effective inbox tools and free 3rd party utilities will be showcased in their role to help the UCS administrator quickly and efficiently resolve performance bottlenecks. This session will also cover many of the CLI based commands and outputs commonly leveraged by TAC as part of their troubleshooting toolkit. Being an advanced sessions, attendees will be expected to have a firm understanding of UCS concepts and operation as well as intermediate knowledge of both LAN and SAN concepts and technologies.
5.0/5.0
BRKAPP-9001 - Policy Driven Data Centre Design (2014 Melbourne) This session is an intermediate session that provides detailed information on the need for, and methodology of, driving data centre infrastructure design and configuration through policy. The rapid evolution of data centre architecture, driven by increasing application demands, has exposed a gap between the way applications are designed and the way they are deployed. Application connectivity and the performance, security, auditing policies they require must be translated from application development teams to infrastructure architects/engineers without a common language. Moving current methodologies to a policy driven approach provides a natural abstraction between app design, and infrastructure configuration allowing enhanced coordination, fluid deployment, and design reusability.
ITMPCS-1073 - VMware Develops an IT as a Service Strategy for a Leading Australian Bank (2014 Melbourne) The Australian market is highly virtualised with over 60% of workloads running on VMware virtual infrastructure. While virtualisation has driven significant benefits in terms of consolidation and cost reduction, this technology has not yet been fully leveraged to change the way IT is structured and how it provides services to the business. This case study will show how VMware partnered with an Australian financial institution to assist in creating an actionable IT as a Service (ITaaS) strategy to move from a highly virtualised current state (>90%) to an ITaaS target state, fundamentally transforming IT into a service brokerage organisation.
5.0/5.0
BRKSPG-1640 - The Internet of Things: Routing and Related Protocols (2014 Melbourne) Intelligent machines and everyday smart objects such as sensors, light bulbs, power meters, road signs and even garden sprinklers will grow the Internet device population by tens of billions in the next 10 years creating the Internet of Things. These devices will usually operate in a highly constrained environment in terms of physical size, available memory, CPU power and battery life over wireless and wired networks of potentially varying quality. This type of operational environment throws up quite a number of networking challenges in protocol design at various layers.   This presentation starts by explaining the subtle differences between IoT/IoE and M2M and how they are inter-related. It then highlights the various protocols from the link layer up to the messaging layer such as RF Mesh, Power Line Comms and CoAP.   The second half of the presentation concentrates on the development of an emerging IPv6 routing protocol called RPL which has been specifically designed to support IoT networks. IoT networks typically support thousands to millions of sensor nodes (commonly referred to as motes) over connections that are intrinsically are lossy in nature such low power wireless and power line communications. The presentation covers the technologies and innovations that were necessary to allow huge numbers of Smart Objects/IoT devices to route information over IPv6 in the Internet of Things in a scalable manner.
5.0/5.0
BRKRST-2042 - Highly Available Wide Area Network Design (2014 Melbourne) This session will include a detailed discussion of a full range of WAN design options incorporating multiple paths. The primary goal is to provide design guidance and share best practices around building reliable WAN networks. The discussion will focus primarily on network survivability and effective utilisation of all available paths. The session will review IOS routing concepts relevant to route selection and load sharing options as well as proper selection and use of various routing protocols. Various WAN topologies will be analyzed to understand potential failure scenarios. These topologies will include combinations of traditional hub and spoke based networks, Ethernet WAN, Internet VPN options, as well as multiple carrier managed MPLS. The specific technologies discussed include bidirectional forwarding detection (BFD), first hop redundancy protocols (including HSRP & GLBP) as deployed at the WAN edge, IP SLA with object tracking, and path optimization techniques supported through Performance Routing (PfR). Case studies will be analyzed to compare traditional IP routing to PfR for end to end convergence. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wide Area Networks.
5.0/5.0
BRKEWN-2016 - Branch Office Wireless LAN Design (2014 Melbourne) This session focuses on the architecture concepts of the branch office WLAN deployments, emphasising the core technologies that drive and enable mobility in retail, banking, education, enterprise or managed WLAN services. Topics covered include in-depth protocol description of H-Reap/Flex Connect, all deployment options in practice, and are based on customer case studies for their application into the branch environment.
BRKDCT-3060 - Deployment Challenges with Interconnecting Data Centres (2014 Melbourne) This advanced session discusses the challenges and recommended solutions of extending LAN connectivity between geographically dispersed data centres. Innovations in middleware like 'Virtual-Machines' and 'Servers-clustering are revolutionising Virtualisation of Data Centre, while other key IT processes like 'Disaster Recovery Plan' and 'massive servers migration require optimisation and facilitation. Data-centre is now more and more spreading across multiple sites, and one very difficult point to solve is the extension of VLAN in a large scale with respect to Spanning-Tree stability requirement. The different requirements for providing a robust LAN extension solution will be discussed during this session, including end-to-end loop prevention, multi-homing considerations and optimal bandwidth utilisation. Detailed design guidance will be provided around the deployment of Ethernet based technologies, leveraging Multi Chassis EtherChannel functionalities like VSS and vPC, as well as MPLS based technologies (EoMPLS and VPLS) and an innovative IP based technology called Overlay Transport Virtualisation (OTV). Locator Identity Separation Protocol (LISP) will then be introduced as an emerging technology capable of providing both IP Mobility and Path Optimisation functionalities. This advanced session is intended for network design and operation engineers from Enterprises, Service Providers or Enterprise Hosting Service Providers that are willing to solve this difficult and controversial problem of Data-Centre Interconnect. Relevant sessions are: BRKDCT-2011 - Design and Deployment of Data Centre Interconnects using Advanced-VPLS (A-VPLS), BRKDCT-2049 - Overlay Transport Virtualisation and BRKDCT-2131 Mobility and Virtualisation in the Data Centre with LISP and OTV.
4.8/5.0
BRKVIR-2012 - Inside the Nexus 1000v (2014 Melbourne) The recent trend of virtualising servers has a huge impact on the underlying network. Computers are no longer physical, immovable objects that plug nicely into your network switches and remain for a while; they are transient creations that can come and go in the blink of an eye. And it's not stopping there... With a virtual distributed switch we restore network visibility to the boundary of the virtual machine, not just to the boundary of the physical host that runs the hypervisor. Bringing the complete feature set of networking to a massively virtualised Data Centre requires some new design concepts. This session describes the Nexus 1000v from a development point of view. It describes the design challenges and why we made certain implementation decisions. At the end of the session you will have a good understanding of what the Nexus 1000v virtual switch adds to your network and how it is designed. This deep understanding will help you to make the right deployment decisions when you implement the technology in your own environment.
5.0/5.0
Get More Results