View More
View Less
System Message
An unknown error has occurred and your request could not be completed. Please contact support.
Wait Listed
Personal Calendar
Conference Event
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Cisco Live Survey
In-person Events
Cisco Live Milan 2014
Event Details
Social Media
Cisco Live Melbourne 2014
Cisco Live San Francisco 2014
Event Details
Scheduler (Live Jan 13)
Social Media
Cisco Live Cancun
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog

ITMCOC-2577 - Inside Cisco IT: Pervasive Video Strategy (2012 London) You've decided to expand from five video endpoints to 500, but where to start? Planning for pervasive video is tougher than supporting voice or data, but it doesn�t have to be overwhelming. Learn from Cisco IT's four-year journey integrating thousands of endpoints and gain valuable insight for your own deployment. Just as vital as technology are the process and culture changes required for holistic video management. Not only will you learn about the deployment of video, but also how to align to your business values and increase user adoption. Beyond the technology itself, it�s important to understand the implementation processes involved and how to drive culture change throughout the organization.
ITMCOC-2570 - Inside Cisco IT: Making The Leap To IPv6 (2012 London) A session focused on the technical/business drivers, successes/challenges and lessons learned (so far) around Cisco IT's implementation of IPv6 on internal and customer-facing networks.
ITMCOC-2568 - Inside Cisco IT: Elastic Infrastructure Services (2012 London) The Private Cloud is one of the fastest growing solutions today and the significance of the secure multi-tenant data center on business goals is increasing. Cisco IT is building the infrastructure foundation for Cloud Computing, but true virtualization of the data center environment requires a holistic approach in managing and orchestrating network, server and storage resources within a data center and across multiple data centers. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed today to orchestrate virtual data center infrastructure to deliver business services. Attendees will learn how Cisco IT is architecting, designing and implementing these next-generation virtual data center orchestration solutions, and possible directions for cloud computing management. Cisco IT is migrating most of their traditional data center applications to a radically simplified virtual compute platform. This has significantly reduced the number of network and server devices and the cable overhead within the data center, while also speeding deployment time and overall application deployment agility. We have aggressively deployed Cisco Unified Computing System servers and Nexus physical and virtual switches to provide the infrastructure foundation for cloud computing inside Cisco. CITEIS Gen2 Program Delivering Multi-Tenant IaaS Cloud Solution. It�s an End-to-End, fully integrated CIAC based Cloud Solution. Attendees will learn about the difficulties involved in migrating a heterogeneous set of data center platforms and applications to a virtualized platform. Attendees will also hear Cisco IT�s initial results of this server platform migration in terms of cost savings and power reduction as well as enabling more reliable data center architectures at an acceptable cost. Additionally we can share our early experience in creating and expanding the cloud computing platform within the enterprise. Session highlights include: � Multi-tenant Data Center Design � Infrastructure as a Service (IaaS) � Reducing data center operating costs � Driving higher utilization of existing servers and storage devices � Business continuity � Organization Alignment � Application transformation
BRKUCC-2725 - Deploying Cisco Unity Connection Unified Messaging or Single Inbox Messaging with On-Premise or Cloud Applications (2012 Melbourne) Current trends in business have IT professionals demanding the flexibility to deploy different types of voice messaging capabilities, on-premise or in the cloud, to their segmented employee populations for various reasons, including compliance. For example, you need to deliver the messaging solution that best fits the way your employees work by deploying unified messaging to your mobile employees, integrated messaging to your general employee population, and voice mail only to a subset of your employees or executives. This intermediate session will describe Cisco Unity Connection's new architecture and technologies when deploying unified messaging or "single-inbox" access to voice mails, faxes, and emails, in addition to integrated messaging and voice mail only access. Cisco Unity Connection's new architecture of synchronising messages and directory information with the existing corporate email and directory infrastructure for both on-premise and cloud solutions will be covered. The session will focus on Microsoft Exchange for on-premise integrations and Microsoft Office 365 (formerly BPOS) for cloud integrations. Plans for integrations with Lotus Domino and Google Mail will be discussed. In addition, migrations from Cisco Unity to Cisco Unity Connection will also be discussed briefly.
BRKSPG-3611 - Troubleshooting IOS-XE (2012 Melbourne) This session provides an overview of both the hardware and software architectures specific to the ASR1000 Series Router and IOS-XE, and will include troubleshooting methods and techniques to monitor overall system health and platform-specific troubleshooting techniques. It will also cover guidelines for deploying ASR1000 Series Routers into your organisation. This presentation is intended for network engineers, network managers and network administrators who are responsible for configuring, troubleshooting and/or maintaining ASR1000 Series Routers in their network. It is assumed that attendees will have a general understanding and knowledge of Cisco IOS technologies and routers.
BRKGS-2012 - Passive Thermal Management in the Data Centre (2012 London) Partner Presentation Today's digital networking users continue to ask for better processing performance, improved access and lower latency, while dealing with increased cost pressure from shrinking IT budgets. Ortronics, a Group brand Legrand, will address these needs by presenting a new look at the ISO/OSI model - a seven layer reference model that standardizes communication networks. Ortronics will introduce the concept of Layer Zero -- the infrastructure layer(TM) -- as the new cornerstone of a network. In this session, participants will learn how Ortronics can help implement a well designed Layer Zero foundation of pathways and physical support to optimize the performance of network applications and reduce energy and cable management challenges.
BRKEVT-2802 - Cisco Telepresence: Deploying and Provisioning Video Endpoints (2012 London) Over the course of the last years we have observed that many of our enterprise customer video deployments are becoming more pervasive. The requirement for being able to more easily deploy, provision and manage a larger number of TelePresence endpoints is more important than ever. This 90 minute session is aimed at video architects and administrators who will learn more about deploying large number of video endpoints. During the session we will offer a technical overview of how TelePresence endpoints are deployed on an enterprise network. We will also provide you with the latest knowledge on how to provision and manage TelePresence endpoints on CUCM and on VCS/TMS. Different solution on how to manage your TelePresence endpoints are also covered in this session. This session is part of the �Cisco Telepresence� series of sessions. Please refer to BRKENV-2800, �Architectural overview for Cisco Telepresence deployments� for an overview of the reference architecture and high-level design choices.
BRKEVT-1300 - Introduction to Enterprise Video Technologies (2012 Melbourne) The use of video communications is increasing significantly within today's corporate networks but also between businesses. TelePresence and all forms of interactive video, including videoconferencing and video telephony, provide significant business value for modern enterprises, but deploying these technologies successfully requires careful network planning and architectural design. This session will provide a technical foundation for those that do not have an audio visual or video conferencing background. It will cover in depth topics such as video protocols and standards, video compression, network requirements and quality of service.
BRKGS-2019 - You can't manage what you don't measure. You can't measure what you can't see. (2012 London) Partner Presentation With the dramatic growth in the number of connected devices, the increasing breadth of applications and the explosive growth of the volume of traffic on the network, a new approach is required to ensure that management and monitoring systems have the right visibility to the appropriate network traffic. Although SPAN ports and network TAPs certainly provide some non-invasive visibility, they lack the intelligence that is essential to allow NOC and SOC teams to control and manage the flow of traffic to the management/monitoring systems. This session will explore a new approach " the Visibility Fabric " that addresses the limitations of the current approach and provides a real-world solution to this challenge.
GENSK-1295 - Data Center-Solutions Keynote (2013 Orlando) The Data Center is evolving towards the next major architectural transition since Client-Server and the Web:  the Cloud Era.  A converged approach with unified computing, unified management and unified fabric is needed for an open, resilient, secure, and scalable platform in a multi-cloud environment to meet your needs today and address your cloud deployments of tomorrow.
GENWIT-1000 - Cisco Empowered Women's Network Event (2013 Orlando) An inclusive tomorrow starts here—and it starts with connecting you to successful and motivated women who are Cisco customers, partners, and employees. Start your week at Cisco Live! by attending this exciting inaugural event and prepare to: •     Get energized with our executive panel of Cisco and customer/partner leaders •     Get inspired by “real and raw” role models •     Get educated in a career coaching session designed to help you elevate your executive presence and networking skills 
GENKEY-1 - Cisco Live Milan Opening Keynote (2014 Milan) Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco's partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices.   Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.
ATE-CL312 - Ask the Expert: Cisco Advanced Services – Anatomy of a Virtual Event (2012 San Diego) Come and learn how collaboration impacts every department in the Enterprise. From Corporate communications, sales and marketing to HR and career fairs. You will learn about the 'anatomy of a virtual event' and discover the components that are leading to huge gains in ROI, cost reductions and improve efficiences.
GENSK-4344 - Solutions Keynote: Security (2012 San Diego) Security threats are growing in number and impact, and becoming increasingly difficult to detect and mitigate. Companies are moving rapidly towards the cloud, and employees are demanding a “work anywhere” environment. Today’s CIO and network administrator are faced with the dilemma of whether to “lock it down” or “free it up”…whether to shackle the business with security policies and practices, or to enable the business to innovate and grow. Join Christopher Young, Senior Vice President of Cisco’s Security and Government Group, as he examines the need for a more transparent and efficient network that enables businesses to open the door to new innovation. The answer is intelligent networks that integrate security and context awareness allowing control over who, what, where, when, and how company data is accessed. With annual revenue of $44 billion and the bulk of transactions conducted over the Internet, Cisco is a prime target for security attack and exploitation. Christopher will reference Cisco to demonstrate how enterprises can increase overall network visibility and application control while delivering secure access for users, devices and applications.
ATE-CL302 - Ask the Expert: Cisco Data Center – Unified Fabric: Delivering Architectural Flexibility (2012 San Diego) The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments. What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed. Visit the Cisco Campus Switching Virtual Resource Center and Cisco Data Center Resource Center to view additional documents and links.
GENPS-1001 - Get Your Network Ready for the Cloud (2012 San Diego) Cloud computing is expected to enable dynamic, flexible, and resilient IT application delivery with operational excellence. By 2014, 50 percent of workloads will be processed in the cloud (Global Cloud Index, December 2011). Is your network ready to support the changing traffic patterns of cloud? Can your WAN support an optimal application experience? How will you secure your business in the cloud? Never before has the network been more relevant for enabling your business. If you are rethinking your network strategy as your business moves to cloud services, join this event and learn about new breakthrough innovations that help you: Gain greater visibility to the cloud traffic Increase the performance of your cloud applications Secure user access to the cloud Scale cloud deployments
BRKUCC-2006 - SIP Trunk design and deployment in Enterprise UC networks (2012 San Diego) The Session Initiation Protocol (SIP) has emerged as the dominant rich media communications protocol on IP networks and the Cisco Unified Communications product portfolio leverages SIP extensively for inter-connectivity. This session covers design considerations for SIP trunking within the Enterprise (i.e. between call agents) and at the Enterprise edge (i.e. for IP PSTN services). Updated for Unified Communications 8.5 release which adds significant new trunking functionality, this session covers the design aspects that need to be considered for a successful deployment of SIP Trunks with Unified CM. These considerations include redundancy, availability, load-balancing, security, addressing, interoperability etc. The session will also cover the usage of SIP for interconnecting Cisco Unified Communications Manager clusters (using Intercluster Trunks), connecting to Cisco Unified Border Element and Gateways. At the end of the session you will be able to evaluate the benefits and trade-offs of using SIP with respect to other protocols for Unified Communications. This session is intended to provide an in depth update to an audience with a working knowledge of CUCM and SIP Trunking.
GENSP-1292 - Service Provider Keynote (2013 Orlando) This session will share how Cisco is delivering value to Service Providers with the Next Generation Internet and supporting the Internet of Everything. Learn about Cisco's vision for Service Providers and how they can transform their infrastructures and business models using intelligence and innovative solutions to solve their most pressing challenges.
BRKSEC-2697 - Remote Access using Clientless VPN (2014 Milan) This session will provide Information and Details about Clientless VPN on the Cisco ASA Firewall. For certain use cases like Contractor Access or BYOD, customers want to have a more differentiated access than the well known Full Tunnel (AnyConnect). We will show and explain how an ASA can be used to provide Secure Remote Access with no need to install a VPN Client. As simple browser based access might not satisfy everybody's needs, we will go through advanced configurations like VDI access for iPAD as well. The target audience are security administrators that are familiar with ASA Firewalls and want to learn more about the Cisco Clientless VPN Solutions.
BRKSPV-1261 - Designing an Online Video Service (2014 Milan) Streaming Video has been around for many years but with the advent of tablets & high speed broadband it has come into its own. This workshop will focus on the new wave of video delivery technologies used in “Over-the-Top” environments & explore the best practice designs used when building such a streaming video service. The session will start by looking at what we are setting out to achieve, and methodically set out the system architecture and each of the various elements that will contribute to the solution, and conclude with a typical example use case.
BRKSPG-3864 - Advanced - Cloud and NFV Services delivery with Cisco Virtual Packet Edge (2014 Milan) Service provider cloud based offerings gain more popularity with an ever increasing set of possible applications. The recent trend to Network Function Virtualization enriches the possible services portfolio to be delivered out of a  Service provider datacenter . A scalable and automated way of delivering such cloud services is paramount for service providers who want to be successful in such a service environment.  This session will focus on Cisco's new datacenter overlay solution (Virtual Packet Edge) and explain how Service Provider NFV and Virtual Private Cloud services can be easily and effortlessly managed by means of the VPE solution. It will detail the solution's control and data plane components and the service orchestration steps. We will dive into its use of SDN and RESTful APIs, and how virtualized services are spawned, managed throughout their lifecycle and automatically integrated with pre-existing network based VPN offerings (MPLS VPN).
BRKSPG-2501 - Troubleshooting Cisco CMTS Based Services (2013 Orlando) This session will provide detailed troubleshooting methods for various subscriber issues that can be encountered on Integrated and Modular Cisco Cable Modem Termination System (I-CMTS and M-CMTS) while deploying -High Speed Data services with DOCSIS 3.0, Channel Bonding -DOCSIS Load Balancing -Voice services and DOCSIS Set Top Gateway (DSG/ADSG) services. Attendees will take a deep dive into identifying and troubleshooting most common DOCSIS 3.0 Upstream and Downstream channel bonding issues that can impact high speed data services. Troubleshooting methodology for DSG services over DOCSIS and best practices for VoIP operation through CMTS will also be discussed. This session is aimed at Network administrators and System engineers who are responsible for maintaining Cisco CMTS.
BSAARC-1011 - Borderless Networks (2013 Orlando) This session reviews the Borderless Network Architecture in depth. With the explosion of devices, video, cloud, BYOD, and other market trends, the capabilities that Borderless Networks provides brings tremendous value to the enterprise. This session will review the main architecture pillars and the requisite services provided by the Borderless Network: Cloud Intelligent Network SecureX Unified Access Connected Industries
BRKCRT-9344 - IPv6 for Cert Nuts (2013 Orlando) There is a lot of fear regarding IPv6, particularly with regards to certifications at all levels. We will take the fear out of the protocol, and cover the information based on extrapolation from what is already known (e.g. you are half-way there, the differences are small!). Addressing formats, neighbor discovery, routing and security are the main sections to be highlighted. In this session, the basics will not only be covered, but demonstrated on live equipment. After a mere two hour session, students are guaranteed to no longer have anxiety about IPv6 on exams. Any aspirations for smoke cessation or weight loss will not be addressed.
BRKPCS-2028 - Unified, Flexible and Affordable Network Management (2013 Orlando) Network management technology should be designed to make managing IT environments and delivering services to users less complicated – without sacrificing adaptability or draining budgets. In this session, a solutions expert from Ipswitch (WhatsUp Gold)  will share proven best practices to help you simplify IT operations by unifying network management, log management, and application performance monitoring with a solution that makes both your tasks and your network easier to manage. Our experts will dig deep into systems, networks, services, applications – and those who rely upon them to do their jobs – to uncover common challenges and considerations when addressing a comprehensive approach to IT management. In tandem, you’ll hear from a peer (aka, one of our customers) who will share real-world experiences and tangible results that will help you further identify how our solutions can provide tangible benefits to your network environment.
BRKSEC-1050 - Are You Choosing The Right VPN Technology For Your Network? (2013 Orlando) Today there are numerous IPsec/VPN technologies available to customers for their network security implementations. Customers have many IPsec technologies available to choose from such as classic IPsec, GRE/IPsec, Easy VPN, DMVPN, VTI ,GetVPN, Flex VPN, etc. Since confusion may arise with the many different available design options, this session strives to educate customers by examining each technology and detailing which solution is most appropriate to deploy given design requirements and constraints. It will also delve into the benefits and risks each solution introduces and the value each solution provides. This session will assist customers in making the correct decisions in order to avoid frustration. This presentation is for network administrators, network designers and network engineers who are responsible for configuring, designing and/or maintaining IPsec VPN technologies in their network.
BRKRST-2336 - EIGRP Deployment in Modern Networks (2013 Orlando) EIGRP is widely used in very large scale enterprise networks. What are the methods network designers use to deploy EIGRP in these environments to produce a stable, elegant network design? This session covers various topics that help network engineers build flexible, robust fast converging networks using EIGRP, including load sharing, hierarchy, and aggregation. We will review routing design considerations for campus, data center, and WAN solutions. What techniques, or best practices, should you use when dealing with high speed links (*Wide Metrics), hub and spoke (DMVPN) networks, or MPLS PE/CE solutions (PE/CE, OTP) What resiliency and fast convergence techniques are available and how and when to use those techniques. We will also look at how to leverage your IPv4 design knowledge for IPv6, and the the unique deployments consideration. A solid understanding of routing, and a basic understanding of EIGRP is a pre-requisite for this session.
BRKCRS-3143 - Troubleshooting Cisco Catalyst 6500 Series Switches (2013 Orlando) This session covers platform specific troubleshooting methods and commands for the Cisco Catalyst 6500 Series Switches, with Sup2T engines running Native IOS. The session starts with an introduction to basic architecture of Sup2T/PFC4. This session details the commands and methods required in Sup2T to troubleshoot Layer 2/Layer 3 IPv4 unicast packet forwarding, high CPU utilization (including NetDR, Flexible NetFlow and Control-plane Policing) and Virtual Switching System (VSS) dual-active scenarios. Reference troubleshooting materials on Sup720 QOS and IPv4 Multicast forwarding are available in the appendices of the presentation, but will not be presented in the session. Target audience is engineers and technicians who work with the Cisco Catalyst 6500 Series or who would like to gain familiarity with advanced troubleshooting of the platform. First-hand experience with Catalyst 6500 platform is expected.
PSOCRS-2020 - Converged Access: Wired & Wireless innovations (2014 Milan) When I started my career you would either be a LAN or a WAN guy. If you knew switching, you didn't know routing. And the other way around. Nowadays a guy like that would be very hard to find. You just can't know the one without the other! Currently we're at the same point with wired and wireless. You can't see LAN without WLAN and you can't see a wireless network without switching. This session will update you on the latest and greatest in network convergence. We will tell you everything you need to know on Unified Access. On One Policy, One Management and One Network. We will show you the ins and outs of the 3650's and 3850's and we will make sure you will walk out of the session with 10 things you didn't know about Unified Access and Converged Access.  
BRKSEC-3698 - Advanced ISE and Secure Access Deployment (2014 Milan) 2012 and 2013 have been very busy years with the adoption of Cisco¹s Identity Services Engine, with a comprehensive systems-approach to Network Access Control and Policy enforcement. This session will discuss the recommended deployment of Identity Services Engine (ISE) based on best-practices and lessons learned in the Field. At the end of this session, the attendee should have a strong understanding of how to deploy ISE with 802.1X for wired and wireless networks. We will examine the correct use of profiling probes to meet the needs of the policy, tips and tricks for successful staged roll-outs, Guest Services, Load Balanced Deployment and High-Availability (HA), Distributed Deployment Guidelines, and Bring Your Own Device (BYOD) policy logic. Note: this session will not cover all possible options for deployment, only best-practices, tips and tricks with the current state of the solution (ISE 1.2). This is an advanced session that assumes prior knowledge of 802.1X and ISE design basics. This session is intended for a technical audience of Network or Security Administrators and Engineers. The audience will also benefit from following the session: TECSEC-3671 "Advanced ISE Deployment for Network Identity" and BRKSEC-2044  "Building an Enterprise Access Control Architecture with ISE"
COCEVT-3466 - Inside Cisco IT: Making Video the new Voice - a Cisco IT Cookbook (2014 Milan) In the next 5 years most enterprises are going to expect video capabilities to be broadly available to their employees as a standard collaboration capability. If you haven't started yet; It is time to get your infrastructure video ready! Join the Service Manager and lead Design Engineer for Cisco IT UC & Video Platforms to learn how Cisco IT has served up pervasive video to its multinational enterprise and is enabling video to be the default real-time communication tool. In this session you will learn about Cisco IT's video service journey; discover some of the key ingredients and overview some of technical recipes that have been used by Cisco IT to deliver its menu of video services.
BRKRST-3310 - Troubleshooting OSPF (2013 Orlando) Troubleshooting Open Shortest Path First (OSPF) can be sometimes complex, but with a few key techniques the troubleshooting life can be made simple. This session discusses those techniques in detail and provides some real examples along with troubleshooting steps. This session includes a review of the Link State Advertisement (LSA) types and troubleshooting commands. Common issues, such as failure to build adjacencies, adjacencies stuck in various states, and SPF running constantly, are also discussed.
BRKEVT-2802 - Deploying TelePresence and Video Endpoints on Unified Communications Manager (2013 Orlando) This 90 minute session is aimed at video architects and administrators who are considering, or planning to deploy TelePresence and Video endpoints on Unified Communications Manager The first section reviews the deployment models, provisioning methods and features available today on Video Communications Server (VCS), TelePresence Management Suite (TMS) and Unified Communications Manager (UC Manager); and provides best practice recommendations on which models and methods to use for various endpoint models and network connectivity scenarios The second section is for customers who plan to deploy their endpoints on UC Manager and want to understand in more detail how the TelePresence endpoints work on UC Manager, which features they support, and best practices for deploying them
BRKEWN-3021 - Troubleshooting Converged Access Wireless Deployments (2013 Orlando) This session discusses troubleshooting techniques and best practices for the Cisco Converged Access Mobility Architecture. We will cover how to troubleshoot mobility issues under the various deployment models, including Mobility Agents (MA), Mobility Controllers (MC), and Mobility Oracles (MO). We will cover common information, tools, and debugs used by TAC to resolve issues. We will also review key issues to watch out for.
COCEWN-3427 - Inside Cisco IT: BYOD...Coping with the Explosion of Mobile Devices in the Enterprise (2013 Orlando) When your CEO implements drastic changes on new devices you need to support, can your architecture and policy structure handle it? How do you control your data when it?s accessible almost anywhere by a demanding workforce? What security measures are scalable to prepare for the future? How can you plan for the next big device?
ITMGEN-3250 - The Innovation of Everything (2013 Orlando) As the industry begins enabling the Internet of Things, the way we work and do business will change at lightning speed. How do you use innovation to drive creativity? How can you optimize technology to free up other resources? Hear from Carlos Dominguez, a leader in innovation, as he shares his eye-opening ideas about how to prepare for the future.
BRKSEC-3007 - Advanced Cisco IOS Security Features (2013 Orlando) This session mainly covers design and deployment for the Zone-based Policy Firewall (from the foundations to advanced policy construction) and Identity-based features ( Downloadable ACLs, User-based Zone Firewall and the brand new SGT Firewall). Throughout the session, typical troubleshooting tools are largely employed to provide insight about feature operations and interactions, thus establishing the linkages between theory and practice. The session also discusses IOS advanced filtering resources such as specialized ACLs and Flexible Packet Matching and brings information about IPv6 Security features already available on IOS. This Session is targeted at network security specialists who want to learn about important security features in the Cisco IOS Router platform and Network engineers who need a better understanding of the Firewall and Identity functionalities available on IOS Routers. It is important to emphasize that this breakout does not cover VPN, L2 Security, IOS IPS or even IOS hardening techniques. This breakout is a natural follow-on to BRKSEC-2017.
BRKSEC-3020 - Troubleshooting Firewalls (2013 Orlando) This presentation focuses on preemptive measures and reactive techniques that can be used to troubleshoot, secure, and maintain the Cisco Adaptive Security Appliance Products and the Cisco Firewall Services Module (FWSM). Providing an in-depth understanding of the packet flow through the firewall device, as well as how to effectively utilize the available commands and on-board tools to troubleshoot connectivity problems are the main goals of this presentation. Knowledge is assumed of security fundamentals and firewall technology at the level presented in the Cisco Networkers Online Introduction to Firewalls and Deploying Firewalls.
BRKSEC-2900 - Cloud Managed Security with Meraki MX (2013 Orlando) Meraki's cloud managed networking portfolio includes out-of-the-box capabilities to help administrators secure their network environments. This session will provide an introduction to the Meraki architecture and a deep-dive into the Meraki MX security appliance product line. Presenter will feature a live demo of key features such as Auto VPN, client fingerprinting, identity-based policies, intrusion detection, and more.
BRKRST-2327 - ISIS Fundamentals and Troubleshooting (2013 Orlando) Designed for both experienced network engineers along with those new to ISIS, this session combines ISIS fundamentals with common troubleshooting scenarios. We will show you the tools available in IOS for troubleshooting an ISIS network, while covering the necessary details along the way . We will discuss NSAP addressing, areas, how the topology is built through link and node connections and touch on optimal ISIS design. All concepts will be compared to OSPF to keep the material relatable.
BRKOPT-2102 - Software and Control Plane Evolution for IP+Optical Architectures (2013 Orlando) IP+Optical is a emerging architecture for Service Providers and large corporations that require transport of massive amounts of data at very high speeds. In this session, we'll look at the software components that enable this architecture, from agile DWDM networks to novel advanced restoration technologies, multi-layer control plane and path computation and network optimization solutions. These software innovations will be reviewed in the context of Software Defined Networks (SDN) and how they can bring a new level of efficiency to the network. The session will also explore the role of these software innovations in the future of Service Provider networks.
BRKUCC-2021 - Understanding, Integrating, and Troubleshooting Fax Communications in Today's Enterprise Networks (2013 Orlando) Comprehensive VoIP solutions must address the transport of fax communications in addition to traditional voice communications. However, unlike traditional voice communications, fax transmissions have unique characteristics that require alternative integration and implementation methods. This session examines the various real-time fax transport methods, including passthrough, T.38 fax relay, and Cisco fax relay and helps one determine the correct fax transport method based on network capabilities and other design considerations. Additional focus will be given to T.38 fax relay as this is the de facto standard that is widely deployed for fax communications today and is a Cisco recommended best practice. Best practices dealing with product and protocol interoperability, Quality of Service (QoS) considerations, and SIP trunking will be provided for integrating fax communications with Cisco voice gateways, CUCM, and T.38 fax servers. T.38 fax servers are becoming increasingly prevalent in Unified Communications solutions and this session addresses the common fax server deployment models. Key troubleshooting tips will also be highlighted throughout this session. Pertinent configurations, common mistakes, and the important troubleshooting commands, debugs, and traces will be provided to ensure that any fax issue that arises can be quickly resolved.
CCSUCC-2375 - How to manage the transition and evolution of your contact center - the customer point of view:McKesson (2013 Orlando) How to manage the transition and evolution of your contact center - the customer point of view: Is your company ahead of what your customers are saying about you in social media? Are you thinking of how your customer contact can differentiate you in the marketplace? Are you simply in need of a technology refresh? With the right investment, your contact center can be on the forefront of the strategic differentiation for your company. Learn first hand from McKesson how they are managing through their technology transition and managing for business success and differentiation. From architecture, to training, to process, to partnership, learn the key points directly from the end user.
BRKCOL-2060 - Ignite Your Business! Smart Services for Business Collaboration (2013 Orlando) Collaboration has emerged as an important tool that empowers people to work together in new ways to transform business, accelerate innovation, and do more with less. It's the next-generation of business interaction, where everyone � everywhere -- can be more productive through closer working relationships. But getting there can be painful for organizations that aren�t prepared. Collaboration questions you need to ask include: 1. Is my network ready? 2. Do I have in-house expertise to plan, design ,implement, optimize and maintain a complex solution? 3. Can we monitor and manage collaboration applications and devices? Learn the answers in this introductory session. You�ll have a unique opportunity to learn about Cisco lifecycle collaboration services and tools, and how they enable you to successfully plan, build, and run your network as a powerful business collaboration platform. The session will discuss in detail the Cisco options customers have for Readiness Assessment, PDI, Optimization and Ongoing Management.
BRKCOL-2315 - Hosted Collaboration Solution - Demystifying the UC Cloud / Desmitificando UC en la Nube -- Hosted Collaboration (2013 Cancun) Cisco's Hosted Collaboration Service (HCS) enables Service Providers (SP) and Enterprises to consider new deployment models for Collaboration (UC+C) services. In this session, attendees will learn how to offer their customers UC+C services using dedicated, virtual UC applications hosted in their data centers. Attendees will learn about new Cloud-based consumption models for UC+C including Public, Private, and Hybrid Cloud deployments. This session includes an update on Cisco Contact Center Integration with Cisco's Hosted Collaboration Services. Cisco Hosted Collaboration Service (HCS) permite a los proveedores de servicios (SP) y a las empresas desplegar servicios de colaboración (UC + C) basados en la nube (privada, pública o híbrida).Esta sesión será útil para administradores de infraestrucutras de UC+C y también a quienes generan nuevos negocios para proveedores de servicio . Se mostrará la arquitectura para ofrecer los servicios de UC+C de Cisco virtualizando la infraestructura multicliente en centros de datos. Se ecxplicarán los beneficios, las capacidades y algunos de los principales criterios de diseño
BRKSEC-2073 - Threat Defense using NetFlow and ISE (2013 Orlando) Trends such as BYOD and the rise of the Advanced Persistent Threat (APT) are leading to the erosion of the security perimeter and increasingly attackers are gaining operational footprints on the network interior. Participants of this session will learn how to leverage NetFlow and the Lancope StealthWatch System in concert with the Cisco ISE and ASA to gain contextual awareness of network activity in order to identify insidious threats and accelerate incident response. This session will cover how to leverage these technologies to gain visibility throughout the kill chain to accomplish tasks such as identifying command and control channels, detecting network reconnaissance, tracking malware propagation and detecting data loss. The target audience for this session are security administrators and analysts interested in learning how to best leverage NetFlow and other telemetry sources as part of their security toolkit.
BRKCRS-2030 - Wired LAN Deployment Using the Cisco Validated Design for Campus (2014 Milan) This session discusses LAN design and deployment best practices covered in the Campus Wired LAN Technology Design Guide - a Cisco Validated Design (CVD). LAN deployments from single switch remote sites to large multi-building campuses are detailed. Cisco Validated Design offers a framework for design guidance based on common use cases, along with technology design guides focusing on deployment details, including products and best practices, accelerating the adoption of technology. The session discusses the consistent enablement of capabilities such as high availability, quality of service, multicast, and security across a range of Cisco LAN platforms. Also included are the decision criteria that can help an organization choose between platforms. The cornerstones of the approach and techniques discussed in this session are real-world use cases, prescriptive design guidance, and modular architectural components. Although not required to register for this session, attendees for this session will benefit from an understanding of LAN switching and routing fundamentals equivalent to a CCNA level.
BRKVIR-2002 - Deploying Virtual Desktop Infrastructure (VDI) and Cisco Virtual Workspace (VXI) (2013 Orlando) Many companies are pursuing virtual desktops to enhance data protection, improve disaster recovery, increase agility, enable mobility, support bring your own, migrate to Windows 7, and more. Shortly, hosted virtual desktops are expected to exceed 10% of the current 500 million enterprise desktops. What will companies gain? What will they give up? To start off, we'll cover the application trends and VDI drivers behind the growth and the commonly used solutions and technologies with a review of Cisco Virtual Workspace (VXI). For enterprise Collaboration, we�ll review the implications of deploying hosted virtual applications and desktops on interactive voice/video and corporate communications/streaming. For the enterprise workspace, we'll address thin, hybrid, and thick client strategies for various types of users addressing their general benefits and/or limitations. For Borderless Network, we�ll look at the implications of deploying hosted virtual desktop on existing network services like call control, bridging, Quality of Service (QoS), Content Delivery Networks (CDN) streaming, multicast streaming, WAN acceleration, campus switching, printing, etc. We'll cover how to deliver the virtual desktops over the WAN using acceleration with details on the network bandwidth and latency requirements and expectations. For Data Center, we'll review how to plan design data center compute, storage, network, load balancing, and security for large scale hosted applications and desktops. Lastly, we�ll put it all together with architectures for large scale highly available hosted virtual desktop deployments. The primary takeaways for attendees will be how to: 1. Scale the data center 2. Secure hosted virtual desktop 3. Preserve the user experience while centralizing client/server applications. 4. Reduce the Total Cost of Ownership (TCO).
BRKCOL-2455 - Fixing SIP Problems with Cisco Unified Communications Manager's SIP Normalization Tools (2013 Orlando) Increasingly, systems and applications use SIP to communicate with each other; unfortunately, not all SIP implementations use compatible message headers or bodies. These SIP compatibility issues can bring projects to a halt while waiting for code fixes, new software versions, or expensive service calls. When faced with these issues, the SIP Transparency & Normalization Feature of Cisco Unified Communications Manager provides a tool for the administrator to deal with incompatibilities in the SIP messages exchanged between systems. This session will review SIP basics and terminology before introducing the SIP Normalization Feature in Unified CM. We'll look at how to configure Unified CM to leverage SIP Normalization, how some simple scripting makes this feature so powerful, discuss the kinds of information you'll need before writing a script, and cover scripting basics. Finally, we'll show real-world examples of SIP Normalization Scripts used to solve interoperability issues.
BRKSEC-4054 - Advanced Concepts of DMVPN (2013 Orlando) This session covers advanced concepts of the Dynamic Multipoint VPN (DMVPN) solution. It starts with an overview of DMVPN functionality; DMVPN hub-and-spoke and dynamic spoke-spoke (Phase 2 and Phase 3) networks. This includes DMVPN network design concepts, choosing a routing protocol and scaling with respect to routing, encryption and redundancy. The talk then continues with an SDN style use case, where the DMVPN Smart-Spoke feature is used to modify the standard DMVPN behavior. This session is for designers and managers of extended corporate DMVPNs and for service providers that are deploying these services for their customers.
Get More Results