No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?zid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog
 

BRKVIR-2931 - End-to-End Data Centre Virtualisation (2013 Melbourne) Virtualisation has been an integral part of IT planning for effective resource optimisation, management simplification and isolation on Data Centres. Because virtualisation touches multiple layers in the Data Centre, understanding the full scope of virtualisation technologies is required for effective planning, design and deployments. The effects are applicable to Classical Ethernet, Data Centre Bridging, Unified IO, Unified Computing, servers of multiple types, hypervisors, virtual machines, virtual switches, virtualised adapters, virtual service nodes, storage, fibre-channel, services and transport environments which taken collectively require in-depth understanding for an end-to-end strategy. This session approaches this by inviting you to a "journey" inside an end-to-end virtualised Data Centre infrastructure. This journey will take "a day in the life" approach starting from the Data Centre Core layer towards the storage on the back-end, being all the infrastructure in between fully virtualised. This session will discuss topics such as VDC, vPC+, VN-Link, virtual services, distributed and virtual switching, virtual adapters, vpath, VM-FEX, NPV, VSANs and many other "V" technologies associated with the packet flows on an end-to-end virtualised Data Centre. Considerations on how to achieve that and how these technologies interact are on the scope of this session as well. Please "Fasten your seat belts" and welcome to the End-to-End Data Centre Virtualisation journey.
ITMGEN-1310 - Crafting a Mobility Strategy (2013 Melbourne) Mobility is one of the key trends reshaping IT. While “IT Consumerisation”, “BYOD”, “Cloud Computing" and “VDI” are all major topics in their own right, when viewed together as part of a Mobility Strategy, their relevance and value to the business is compelling. We will explore these topics from a business perspective, while also considering how continued advances in technology will drive new services and capabilities. Wireless technologies continue to develop with 4G/LTE and 802.11ac, while the Wi-Fi Alliance’s PassPoint works to bridge the two. The additional bandwidth is already driving significant growth in business video anytime, anywhere and on any device, but what are the implications that creates for IT? What do these different networks and devices mean for our applications? And where and how does security fit in to all this? In this session we will consider the desires of the users, the requirements of the business, and the realities of the technology with the ultimate goal of helping you to craft a Mobility Strategy specific to your environment.
BRKAPP-2031 - Deploying OpenStack for IaaS with the Cisco Edition (2013 London) At the OpenStack Grizzly summit in October 2012, Cisco announced it's Cisco Edition of the OpenStack environment, leveraging the OpenStack core software stack on Canonical Ubuntu Linux and deployed with PuppetLabs puppet DevOps tools. This edition is a lightweight distribution and reference architecture intended to accelerate time to deployment of an OpenStack based IaaS service, or the basis for a SaaS toolset running on a virtualized infrastructure. In addition, Cisco is one of the key proponents of the Quantum service in OpenStack, enabling flexible network deployments making point and click network deployment possible. This session will cover the use of Cisco Edition, and will show case the deployment of OpenStack to build an IaaS with the Cisco Edition. In addition, a review of extending the base middleware platform with a catalog and advanced user manage portal will be show leveraging Cisco Intelligent Automation for Cloud tools. The session will also cover the day 0 initial bootstrapping of the IaaS service including best practices for network, server, and storage models. Lastly, a review of control plane and IaaS availability will covered. If you are interested in deploying OpenStack, or just want a better understanding of Infrastructure as a Service tools, you should not miss this session!
BRKSPG-3684 - Mobile Transport Evolution with Unified MPLS (2013 London) Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based NodeBs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE-A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
4.7/5.0
BRKUCC-3661 - Troubleshooting Jabber Desktop Clients (2013 Melbourne) This session will arm you with the tips, techniques and tools available to you to troubleshoot the potential issues you may experience when deploying and administering the Jabber for Windows desktop clients. It will also highlight some of the more common issues encountered. A general knowledge of Cisco UC and the Jabber clients would be of benefit in attending this session.
COCDCT-3463. - Inside Cisco IT: Mission Critical Application Migration and Architecture Transformation: A Cisco Case Study (2013 London) In March, 2011, Cisco IT successfully migrated the Quote to Cash (QTC) platform which supports 100% of Cisco’s revenue including order processing, pricing and product configurations from the HP Superdome in the San Jose Data Center to the Cisco UCS B440 System in the Richardson Data Center. How did we migrate QTC and more than 1000 Cisco business applications? That is what this session addresses. We will describe the migration approach, virtualization architecture, and system configuration, as well as key data center and performance benefits.
BRKUCC-2666 - Federating Unified Communications (2013 Melbourne) Over the last few years, Unified Communications has been embraced by many organisations worldwide to foster better collaboration between colleagues. Now, the focus from organisations that have successfully deployed Unified Communications internally is shifting towards bringing that collaboration capability to people outside of the organisation. This breakout session will examine how an organisation can federate their Unified Communications capability to other organisations in a B2B (business-to-business) manner. We'll also look at ways to bring about collaboration capability to consumers in a B2C (business-to-consumers) fashion. By federating Unified Communications, we empower people to come together and collaborate seamlessly using Instant Message/Presence, as well as escalating to Voice, Video or Web conferences. Attendees should have a basic working knowledge of Cisco Collaboration portfolio, including CUCM, IM/Presence service, and TelePresence/video.
BRKCDN-1117 - Virtualized Router & Virtualization Inside A Branch Router (2013 London) Virtualization is prevalent everywhere, in Data centers, in Cloud environments regardless it’s a public, private or hybrid and none the least in branch offices. Cisco is innovating in all fronts from bringing virtualization to the branch offices by building a blade server that can be hosted inside Integrated Services Router Generation 2 (ISR G2) and taking it’s industry leading routing foot print in Cloud. How does both these technologies help customers? In Branch offices by collapsing a blade server (Unified Computing System E-Series) inside a router we optimize network / compute foot print, drastically reduce total cost of ownership, simplify manageability and enable the platform to run not only Cisco appliances as virtual machines but simultaneously enable 3rd party application coexistence. In Cloud environments, customer today lack control over routing, have a primitive and fixed security framework being offered which is un-orchestrated and unmanaged by their enterprise tools and have no way of using enhanced services. Cisco’s Cloud Services Router CSR1000V removes all the limitations and restrictions and enables enterprise customers to move to Cloud seamlessly. Customers can now run a virtualized router in various cloud provider environments along with their applications. Come and learn how these technologies are creating a new deployment model within enterprise branch offices as well as in public / private clouds.
4.0/5.0
BRKUCC-2060 - Cisco Collaboration Enterprise Mobility Solutions (2013 London) This session describes how Cisco's collaboration enterprise mobility solutions provide fixed mobile convergence (FMC) and fixed mobile substitution (FMS) features and functionality to enable mobile workers both inside and outside of the enterprise. This session covers the following Cisco collaboration mobility solutions: 1. FMC with the Cisco Unified Communications Manager Cisco Unified Mobility feature set 2. FMS with Cisco mobile clients and solutions for smartphones and tablets including Cisco Jabber These solutions provide a comprehensive set of mobility features and functions for enterprise mobile workers. Individually or in tandem these FMC and FMS solutions not only provide enterprise connectivity and persistent reachability to mobile users, but they also provide productivity improvements both for the mobile user as well as users inside the enterprise that the mobile user may communicate with. Further these solutions provide a good return on investment by allowing enterprises to reduce the use of cellular minutes for business calls. While the intermediate session will begin with a brief overview of the above solutions, to maximize the material learned, attendees should have some familiarity with these enterprise Cisco mobility applications. Further all attendees should have a basic understanding of IP telephony and should be familiar with Cisco Unified Communications Manager's features and functions.
4.0/5.0
BRKCRS-2042 - Highly Available Wide Area Network Design (2013 London) This session will include a detailed discussion of a full range of WAN design options incorporating multiple paths. The primary goal is to provide design guidance and share best practices around building reliable WAN networks. The discussion will focus primarily on network survivability and effective utilisation of all available paths. The session will review IOS routing concepts relevant to route selection and load sharing options as well as proper selection and use of various routing protocols. Various WAN topologies will be analysed to understand potential failure scenarios. These topologies will include combinations of traditional hub and spoke based networks, Ethernet WAN, Internet VPN options, as well as multiple carrier managed MPLS. The specific technologies discussed include bidirectional forwarding detection (BFD), first hop redundancy protocols (including HSRP & GLBP) as deployed at the WAN edge, IP SLA with object tracking, and path optimisation techniques supported through Performance Routing (PfR). Case studies will be analysed to compare traditional IP routing to PfR for end to end convergence. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wide Area Networks
5.0/5.0
BRKCCT-2773 - Getting The Most Out Of Contact Center Express Version 9.0 (2013 London) Key enhancements in Contact Center Express version 9 include native support for enhanced multi-channel customer contact using web-chat and use of Cisco Unified Intelligence Center for historical reporting. This session will take an in depth look at both of these areas and explain how to make effective use of them. Other version 9 feature enhancements and topics such as platform changes and the Mobile Skill Manager will also be examined. This session is targeted at those contact center solution architects, designers and administrators already familiar with previous versions that wish to get an understanding of what's new in 9.0.
BRKARC-2003 - Cisco ASR 9000 Architecture (2013 London) The ASR 9000 is the Cisco next generation Service Provider edge and large enterprise WAN router. There are lots of new hardware, software and innovations in the past half an year. This session will help our customers to understand Cisco ASR 9000 new hardware and architecture, including HW architecture overview, fabric design, packet forwarding, system QoS, multicast architecture, and the architecture innovation - cisco nV technology
5.0/5.0
BRKEWN-2013 - Deploying Wireless Guest Access (2013 London) This session focuses on design requirements and deployment considerations for wireless Guest access solution. It discusses the main components of an end-to-end guest access solution including how to provide network access to visitors and route guest traffic across the network that is safe and secure. Attendees will be introduced to a detailed discussion on various guest access services directly on the wireless LAN controllers (WLC), management of Guest services using Cisco Prime Network Control System (NCS), and integration with the Identity Services Engine (ISE) for various external web authentication services such as sponsored and self-service options. We will also discuss FlexConnect, Guest Anchor, and enhanced guest security with WLC and ISE. This session is especially useful for those attendees responsible for the Design Deployment Operations and Management of Enterprise Campus Wireless Networks. It is assumed that all those attending this session have a working knowledge of LAN switching and routing, fundamentals in 802.1X and Network Admission Control. Knowledge of 802.11 WLAN fundamentals and WLAN security is required.
4.0/5.0
BRKVIR-3013 - Deploying and Troubleshooting the Nexus 1000v virtual switch (2013 London) Have you or are you in the process of virtualizing your server infrastructure? Beware of the impact that will have on your network. The Nexus 1000v virtual switch extends your physical network deployment to the edge where you connect virtual machines. This session covers how to deploy and troubleshoot Cisco Nexus 1000V Installation, Virtual Supervisor Module and Virtual Ethernet Module connectivity issues, port-profiles, port-channels, VSM HA scenarios, and known issues. This session is complemented by the sessions: BRKVIR-2011: Deploying services in a virtualized environment BRKVIR-2012: Inside the Nexus 1000V Virtual Switch
5.0/5.0
PNLCRS-2303. - Experiences with Deploying IPv6 (2013 London) Last June, the World IPv6 Launch sent a clear message to the world that IPv6 is ready for large scale deployment on the Internet. Leading ISPs, content providers, and enterprises around the world have now either brought their deployments into mainstream operations, or are making concrete plans to do so in various phases. Learn how enterprises are approaching deployment of the World's New Internet Protocol and how Cisco and others are monitoring its deployment across various regions and countries. This discussion is aimed at helping IT leaders make better business decisions about their deployment process, and engineers to understand real-world challenges by meeting those who have been through the deployment process or are in the midst of it now. Join us in this lively exchange of experts as they share their experiences in IPv6 deployment, lesson learned, and predictions for the future.
5.0/5.0
PCS-2002 - NetApp: FlexPod Case Study about Sauber F1 Team by UP-GREAT and NetCloud (2013 London) Agility and speed are hallmarks of Formula 1 racing. The Sauber F1 Team pushes technology and real-time data analysis to the limits in a sport where .001 seconds can be the difference between winning and losing. Formula 1 race cars are known for their cutting edge, technology-driven designs. During the racing season, the Sauber F1 Team travels with a FlexPod Data Center Platform to 19 countries around the world. Like all the teams in F1 racing, the Sauber F1 Team heavily relies upon data (from races, wind tunnel testing and software simulations) to constantly innovate its cars and racing strategies. Efficiency is key to success for the Sauber F1 Team. During this session, you will learn how an innovative and reliable infrastructure plays an important role to staying competitive. You will also understand why real time access to data analysis and mission critical applications can be key for better lap times, and how NetApp MetroCluster at the Sauber F1 Team headquarters in in Hinwil, Switzerland provides high availability and seamless access to data anywhere around the world
BRKUCC-3000 - Advanced Dial Plan Design for Unified Communications Networks (2013 London) This advanced session provides detailed dial-plan design guidelines for each of the Cisco IP telephony deployment models based on Cisco Unified Communications Manager, with recommended best practices to help ensure successful, scalable deployments. This session covers the various dial-plan tools available in Cisco Unified Communications Manager, such as route patterns, translation patterns for digit manipulation, calling party transformations for localisation and globalisation of calling party information, dial-plan interaction with PSTN gateways and URI dialing. This session also covers how to best use these tools to deal with real-world deployments. The main focus of the session is on system design, with some implementation aspects. This session is aimed at network planners and designers and telephony analysts and assumes a working knowledge of the Dial Plan functionality in Cisco Unified Communications Manager.
2.0/5.0
ITMGEN-2337 - Leading with Architecture: Integrating Technology, Process and Culture (2013 London) Cisco, as a company, has embraced the concept of being “Architecturally led.” This has been a multi-year journey initially led by IT, but now being executed as a joint initiative with the business. Robbert Kuppens, IT Leader and CIO for Cisco EMEAR will share how an architectural approach has changed the way Cisco thinks, plans, and executes. Robbert will share not only our vision, but the frameworks, tools, and governance that have been implemented to support this initiative. Being Architecturally led is a natural evolution from our IT as a Service Organisation (ITaaSO) journey and has driven both operational excellence and service agility. Robbert will also share the processes and tools utilized to deliver consistent portfolio management supported by architectural roadmaps in combination with global and local/regional interlocks for global programs and local quick wins. Finally, he will share how architecture has become part of Cisco's DNA and how Cisco IT is now using its own practices in collaboration with key customers and Cisco Services.
4.5/5.0
BRKDCT-1661 - Expanding your Enterprise Application Ecosystem with Big Data (2013 Melbourne) Few technologies in IT today have as much promise and garner as much hype as big data. This session will help Data Centre operations teams move beyond the hype to understand what big data architectures can do, what they look like and why, how they work, their origins and current state of the art, and ultimately how to integrate them into the modern Data Centre infrastructure in a supportable, professional operational environment. After an introduction into the origins of technologies like Hadoop and the business problems they can solve, the session will detail cluster design principles and best practices from a network, compute, and application perspective, including compute node hardware selection (disk memory, CPU, etc.); network characteristics such as buffer, latency, bandwidth and oversubscription, etc., and their affects on the application; and a detailed view of how Hadoop in particular works with the hardware to provide resiliency and scalability. The session will cover various Cisco-based big data architectures including UCS C-series servers and Nexus 5000 Data Centre switches. The goal of the session is to demystify big data and associated technologies to help customers transition them "across the chasm" from rough-around-the-edges early adopter status to mainstream Data Centre operations.
5.0/5.0
BRKIPM-2264. - Multicast Troubleshooting (2013 London) You built it. Now how do you maintain it? Multicast networks present unique challenges to network managers. This session presents a look at basic multicast troubleshooting and troubleshooting methodologies. This session will also present many examples of common, and not so common, multicast networks problems and show what commands to use and how to solve them.
4.8/5.0
BRKARC-3471 - Cisco NX-OS Software Architecture (2013 Melbourne) This session will explore the software architecture, core infrastructure, features, capabilities, and benefits of Cisco's NX-OS Data Centre operating system. Some of the key areas covered will include NX-OS's High-Availability design, device virtualisation, command line interface, advanced features, development lifecycle, and multi-platform strategy. An high level understanding of switching platform infrastructure and networking technology is necessary to take full advantage of this session.
4.0/5.0
BRKSEC-2020 - Firewall Deployment (2013 Melbourne) This session addresses the Cisco ASA firewall and how it can be used to enforce security policy in the network. Common deployment scenarios are covered for both the ASA firewall appliance and the Cisco ASA Services Module, including routed (Layer 3), transparent (Layer 2) mode and High Availability. Pros and cons of each design are discussed in depth as well as case studies to highlight common deployments. This session will also cover in detail features in the latest firewall releases and how they fit into the network fabric, including Identity FW and Context. Participants should have a working knowledge of TCP/IP and understand general networking and packet flow. This session focuses on the Cisco ASA Adaptive Security Appliance and Cisco ASA Services Module operating as a firewall and does not cover any Cisco IOS based firewall or VPN solutions. This session provides requisite information complimentary to the BRKSEC-2021 Firewall Architectures session.
4.8/5.0
BRKEVT-3661 - Troubleshooting Video - TMS Provisioning Extension (2013 Melbourne) Currently with need for video conference on the move there is a significant focus on personal TelePresence. This session covers best practice to install/migrate TMS PE, In addition to covering off the configuration steps required to provision soft client and personal systems like ex/sx/mx series, this session will also cover troubleshooting of provisioning issues and few issues observed in field. It is assumed that attendees should have a good understanding of installing, administering, and operating of TMS & VCS should have basic understanding of SQL database, Microsoft windows and SIP protocol.
5.0/5.0
BRKDCT-2615 - Active-Active Data Centre Strategies (2013 Melbourne) The demand for "Active/Active" Data Centres and related services is a reality these days. The associated implementation models trend towards real time, on-demand infrastructure as a service (IAAS) model and impose a requirement for near zero down time design, automation, and migration strategy for the network, compute and application components of these Data Centres. In this session we will detail the major considerations on the network, servers, storage, applications, services and facilities infrastructure technologies that allow to delivery an "Active/Active" Data Centres implementation through a near zero down time architecture. The session will cover infrastructure design considerations such as active-active network-server front-end technologies; loop-free topologies via Fabric-Path and OTV; backend storage extension & replication and Data Centre interconnect (DCI) technologies. Disaster recovery and business continuity solutions / planning will also be touched during the session. This session will also cover server virtualisation considerations, global server load balancing, geo-clustering, some application specific clusters and HA implementations that allow the evolution towards zero down time architectures with support for infrastructure transparency and mobility of computing resources.
5.0/5.0
BRKSPG-2402 - Best Practices to Deploy High-Availability in Service Provider Edge and Aggregation Architectures (2013 London) As Service Providers (SPs) are deploying value-added triple-play or quadruple play services to maintain or generate a higher average revenue per user, overall Service Availability becomes increasingly important. High Availability (HA) techniques such as Fast Convergence (FC) or Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Fast Reroute (FRR) have focused on raising the availability of the network core in the past. Recently, these techniques are being increasingly deployed in Ethernet Aggregation networks, for example by introducing MPLS TE FRR in the aggregation. Also, additional high-availability mechanisms are being developed to enhance the resilience of the IP Edge against failures. Examples of new developments include Internet Protocol (IP) Fast-Reroute (IP FRR), Border Gateway Protocol (BGP) Prefix Independent Convergence (PIC) for both the Core and Edge, or even stateful application inter-chassis redundancy mechanisms to even overcome single system outages. This Session aims to provide the audience with best current practices to increase service availability by deploying Cisco High-Availability mechanisms in both the Aggregation and the IP Edge. Traditional HA techniques such as Nonstop Forwarding (NSF)/Stateful Switchover (SSO), Bidirectional Forwarding Detection (BFD), fast convergence and Non-Stop Routing (NSR) are reviewed and the details of new technologies such as IP FRR, BGP PIC are discussed in depth. Furthermore, advanced topics such as achieving HA for Layer 4-7 services or stateful interchassis redundancy solutions are introduced. The Session also provides the best current practices of deploying the tools offered by the Cisco HA toolset, in particular the deployment of MPLS TE FRR in the aggregation. Furthermore, possible stateful and stateless clustering approaches are introduced, which SPs may use to increase the availability of their IP Edge architecture.
5.0/5.0
BRKSEC-2690 - Deploying Security Group Tags (2013 London) This session explains how the combination of Security Group Tags extend context aware role based access control from the edge into the network. This session covers the protocols and functions  that create a trusted network.  We will see how this tagging ability can be deployed in the access layer, branch and the data center in support of business requirements like regulatory compliance and BYOD. ISE drives the policy that defines how and when SGTs should be applied. The target audience for this Session are network and security architects and administrators that want to know more about the TrustSec solution. The audience will benefit from also following the releated TrustSec sessions: BRKSEC-2022 "Demystifying TrustSec, Identity, NAC and ISE" and BRKSEC-3698 "Advanced TrustSec deployment with ISE and BRKSEC-2691 "Session Aware Networking: IEEE 802.1X and Beyond"
3.0/5.0
BRKSEC-3040 - Advanced ISE and Secure Access Deployment (2013 Melbourne) 2011 and 2012 have been very busy years with the adoption of Cisco¹s Identity Services Engine, with a comprehensive systems-approach to Network Access Control and Policy enforcement. This session will discuss the recommended deployment of Identity Services Engine (ISE) based on best-practices and lessons learned in the Field. At the end of this session, the attendee should have a strong understanding of how to deploy ISE with 802.1X for wired and wireless networks. We will examine the correct use of profiling probes to meet the needs of the policy, tips and tricks for successful staged roll-outs, Guest Services, Load Balanced Deployment and High-Availability (HA), Distributed Deployment Guidelines, and Bring Your Own Device (BYOD) policy logic. Note: this session will not cover all possible options for deployment, only best-practices, tips and tricks with the current state of the solution (ISE 1.2). This is an advanced session that assumes prior knowledge of 802.1X and ISE design basics. This session is intended for a technical audience of Network or Security Administrators and Engineers.
5.0/5.0
BRKSPG-3683 - Software Defined Networks (SDN) for Service Providers. A Practical Approach. (2013 London) Abstract: Content providers, mobile device vendors, application developers, consumers, and enterprise business are collectively driving operators to continually reinvent themselves. Consumer and business users are increasingly more mobile, and distributed as are the cloud-based services, applications, and content they wish to consume. Operators need to support a diverse customer base, distribute content and applications across multiple geographies, while offering secure, reliable, and consistent experiences to their users on any device at any location. Software Defined Networks (SDN) has emerged as a potential solution to this broad new set of customer and user challenges. This session will provide a discussion of the key technologies and involved to employ SDN to enhance the operator network infrastructure and application environment to enable agile new business models.
5.0/5.0
BRKSEC-3698 - Advanced ISE and Secure Access Deployment (2013 London) 2011 and 2012 have been very busy years with the adoption of Cisco¹s Identity Services Engine, with a comprehensive systems-approach to Network Access Control and Policy enforcement. This session will discuss the recommended deployment of Identity Services Engine (ISE) based on best-practices and lessons learned in the Field. At the end of this session, the attendee should have a strong understanding of how to deploy ISE with 802.1X for wired and wireless networks. We will examine the correct use of profiling probes to meet the needs of the policy, tips and tricks for successful staged roll-outs, Guest Services, Load Balanced Deployment and High-Availability (HA), Distributed Deployment Guidelines, and Bring Your Own Device (BYOD) policy logic. Note: this session will not cover all possible options for deployment, only best-practices, tips and tricks with the current state of the solution (ISE 1.2). This is an advanced session that assumes prior knowledge of 802.1X and ISE design basics. This session is intended for a technical audience of Network or Security Administrators and Engineers. The audience will also benefit from following the sessions: BRKSEC-2022 "Demystifying TrustSec, Identity, NAC and ISE", BRKSEC-2691 "Session Aware Networking: IEEE 802.1X and Beyond", BRKSEC-2690 "Deploying Security Group Tags", TECSEC-3671 "Advanced ISE Deployment for Network Identity"
4.8/5.0
BRKCDN-1001 - Programming with the Finesse API - 1 (2012 San Diego) This session will provide an overview of how to get started programming with the Finesse API. This session will discuss the various layers in the Finesse stack including the REST API, javaskript, and OpenSocial Gadgets. This session will include a walkthrough of sample applications to give developers an understanding of how the Finesse API functions. Attendees will see step-by-step how to create an OpenSocial Gadget and add it to the Finesse Container.
5.0/5.0
BRKVIR-2931 - End-to-End Data Center Virtualization (2012 San Diego) Virtualization has been an integral part of IT planning for effective resource optimization, management simplification and isolation on Data Centers. Because virtualization touches multiple layers in the Data Center, understanding the full scope of virtualization technologies is required for effective planning, design and deployments. The effects are applicable to Classical Ethernet, Data Center Bridging, Unified IO, Unified Computing, servers of multiple types, hypervisors, virtual machines, virtual switches, virtualized adapters, virtual service nodes, storage, fibre-channel, services and transport environments which taken collectively require in-depth understanding for an end-to-end strategy. This session approaches this by inviting you to a "journey" inside an end-to-end virtualized Data Center infrastructure. This journey will take "a day in the life" approach starting from the Data Center Core layer towards the storage on the back-end, being all the infrastructure in between fully virtualized. This session will discuss topics such as VDC, vPC+, VN-Link, virtual services, distributed and virtual switching, virtual adapters, vpath, VM-FEX, NPV, VSANs and many other "V" technologies associated with the packet flows on an end-to-end virtualized Data Center. Considerations on how to achieve that and how these technologies interact are on the scope of this session as well. Please "Fasten your seat belts" and welcome to the End-to-End Data Center Virtualization journey.
5.0/5.0
BRKARC-3980 - Introduction to IOS-XR- Cisco's Next Generation Operating System (2012 San Diego) **The video for this session is unavailable.** Cisco IOS XR is a highly available and modular OS designed for always-on operation of high-end routers e.g. CRS-1/3, ASR 9k and Cisco12k. This session provides an overview of IOS XR architecture, s/w installation, configuration of routing protocols (IGP and BGP), MPLS and Multicast Technologies along with comparison to IOS. This session is for engineers both in SP and Enterprise segments interested in learning and deploying IOS XR based networks.
3.5/5.0
BRKCCT-2020 - Planning and Designing a Cisco Unified Customer Voice Portal Deployment (2012 San Diego) This session covers the fundamentals of planning and designing a Cisco Unified Customer Voice Portal (CVP)deployment. This session will start off with an overview and refresher of CVP solution. Then it will go into the details of various functional deployment models with their call flows. This session will also cover topics such as Branch office design, sizing and virtualization. Desiging High Availability for a Unified CVP solution will be discussed pertaining to the CVP call servers, SIP, edge queuing and survivability. The session will close with a planning and design migration case study. The main focus of the session is on system design, with some implementation aspects and hence it will not go into the details of CVP configuration and troubleshooting aspects but will touch upon these topics where necessary. This is an intermediate to advanced level session intended for network planners, design engineers, administrators and technical staff already familiar a little bit with Cisco Contact Center Enterprise portfolio and interested in learning more about the design and deployment of CVP.
2.5/5.0
COCSEC-3429 - Inside Cisco IT: Top Ten Risks with Cloud that will keep you Awake at Night (2012 San Diego) Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing. Security is the top concern for cloud adoption and expectations from the security staff are all time high to apply a defense-in-depth strategy to protect enterprises, thus giving them sleepless nights. In this presentation, Cisco infosec professionals will share the security challenges faced with cloud adoption at Cisco and other large enterprises. Authors have evaluated multiple cloud vendors for security and privacy risks. Authors also lead the OWASP Cloud -10 initiative that maintains the top ten list of security risks faced with Cloud computing and XaaS models.
COCEVT-3432 - Inside Cisco IT: Do’s, Don’ts and Lessons Learned during 5 Years of Video Deployment (2012 San Diego) Cisco is in a unique position with over 5 years of experience in deploying pervasive video across the enterprise. This session will provide insight into Cisco’s video strategy, including do’s, don’ts and lessons learned. An overview of where Cisco IT is in the Video Enablement Lifecycle will be provided along with the steps taken to get there. In addition, you will learn Cisco IT’s best practices and what has worked well for video enablement such as architecture planning, employee governance policies around video entitlement, operational support and successful “Pay for Play” funding model. Other lessons learned will be uncovered to drive high user adoption rates for pervasive video and provide an optimum user experience.
ITMGEN-4640 - The Present and Future of Cloud and Data Center Technologies: Panel (2012 San Diego) Join John Manville, VP, IT, Global Infrastructure Services, and a panel of distinguished guests for an interactive discussion about what’s here now, and what will change in the future, around Cloud and Data Center technologies. In this session we will address the following compelling questions: • Do private clouds aid in improving productivity? – in lowering costs? • What technologies are companies using to build their clouds? • How real is multi-tenancy? - elasticity? • Should companies move up into the PaaS layer for automation? If so, how mature is the technology for this? • How mature is technology relating to hybrid clouds? • When should companies use public IaaS clouds? What are some examples? • What are the staffing and operations skillset implications of cloud and new technologies?
BRKEWN-2016 - Branch Office Wireless LAN Design (2012 San Diego) This session focuses on the architectural concepts of the Wireless branch office, emphasizing on the core technologies that drive and enable mobility in retail, banking, education, enterprise or managed WLAN services. Topics covered include in-depth protocol description of FlexConnect (formerly H-REAP), integrated WAN resiliency, all deployment options in practice, and are based on customer case studies for their application into the branch environment. Finally, we will explore the FlexConnect architectural enhancements & best practices that will support large scale distributed deployments of the Bring Your Own Device phenomenon.
3.3/5.0
ITMGEN-4634 - Running IT as a Business (2012 San Diego) Participate in an interactive discussion about transforming your IT organization into a business function. Cisco executives will share the challenges and opportunities that face Cisco IT as they implement an IT as a Service business model. Learn how to lead with an architecture strategy and adopt an operating model that provides the framework for change. Hear Sean put this all into context by providing examples of Cisco successes that demonstrate the relevance of IT in business today.
5.0/5.0
BRKUCC-2004 - Emergency Calling and Cisco Unified Communications (2012 San Diego) A successful voice communication system must support emergency calling. This session examines the current PSTN mechanism for emergency calling, which is necessary as a basis for understanding how this important feature affects VoIP. The session shows ways to provide compatible services on the enterprise campus, including phone location tracking and reporting using Cisco Emergency Responder. In the broader scope of voice over the Internet, the session discusses mechanisms for support of emergency calling using the Internet, such as those being deployed with residential VoIP. Developments involving current standards are also discussed.
4.0/5.0
SIPSP-1147 - Monetizing the Cloud - Service Acceleration & Go-to-Market: Making it Work (2012 San Diego) This session opens with a review of Cisco go-to-market resources designed to accelerate adoption for cloud services including sales enablement, lead & demand generation and sales incentives. Go-to-market lessons learned and practices will be shared by Cisco and cloud service providers focused on ways of using Cisco resources to your advantage. Please note that this is an all day program. Be sure to register for the other SIP sessions to attend the entire day.
PSONMS-1038 - Cisco Prime for Enterprise – Innovative Network Management (2012 San Diego) This 60 minute presentation will provide an update on Cisco Network Management Strategy – Cisco Prime and the Cisco Prime product portfolio. Cisco Prime is built upon a network services centric foundation and set of common attributes to deliver an innovative product portfolio to simplify the management and deployment of Cisco services, technologies and platforms. The Cisco Prime portfolio consists of three key categories; Prime Infrastructure – a solution providing end-to-end lifecycle management of wireless and wired infrastructure management, Prime Collaboration – delivers a complete solution for managing voice and video services and Prime Assurance – complete end-to-end visibility for troubleshooting and diagnosing end-to-end performance and improving application and end-user experience.
4.3/5.0
BRKSEC-2020 - Firewall Deployment (2012 San Diego) Updated for 2012 to include the new features of the 8.4/5 releases of ASA code on ASA5500/ASA 5585X, ASA-SM, including Identity and Context. This session addresses the Cisco ASA firewall and how it can be used to enforce security policy in the network. Common deployment scenarios are covered for both the ASA firewall appliance and the Cisco ASA Services Module, including routed (Layer 3), transparent (Layer 2) mode and High Availability. Pros and cons of each design are discussed in depth as well as case studies to highlight common deployments. This session will also cover in detail features in the latest firewall releases and how they fit into the network fabric, including Identity FW and Context. Participants should have a working knowledge of TCP/IP and understand general networking and packet flow. This session focuses on the Cisco ASA Adaptive Security Appliance and Cisco ASA Services Module operating as a firewall and does not cover any Cisco IOS based firewall or VPN solutions. This session provides requisite information complimentary to the BRKSEC-2021 Firewall Architectures session
4.7/5.0
BRKSEC-3040 - TrustSec and ISE Deployment Best Practices (2012 San Diego) 2011 and 2012 have been very busy years with the adoption of Cisco’s TrustSec System, a comprehensive systems-approach to Network Access Control and Policy enforcement. This session will discuss the recommended deployment of TrustSec and Identity Services Engine (ISE) based on best-practices and lessons learned in the Field. At the end of this session, the attendee should have a strong understanding of how to deploy ISE with 802.1X for wired and wireless networks. We will examine the correct use of profiling probes to meet the needs of the policy, tips and tricks for successful staged roll-outs, Guest Services, and even Bring Your Own Device (BYOD) policy logic. Note: this session will not cover all possible options for deployment, only best-practices, tips and tricks with the current state of the solution. This is an advanced session that assumes prior knowledge of 802.1X and ISE design basics. This session is intended for a technical audience of Network or Security Administrators and Engineers.
5.0/5.0
ITMCCS-2997 - Deploying virtual desktops in Public Cloud: T-HT Cloud (2012 London) There is a lot of buzz about different Cloud solutions available on the market. But when one tries those solutions in practice, it becomes obvious that components or knowledge is largely still missing. Together with Combis, T-HT has deployed Public Cloud solution, namely virtual desktops. This real life experience gives us good insight what are crucial technical and marketing parameters for success. Solution itself is based on Cisco UCS infrastructure, NetApp storage and Citrix virtualization.
5.0/5.0
BRKSEC-3030 - Advanced Intrusion Prevention Systems (2012 San Diego) This session focuses on advanced deployment options and troubleshooting Cisco Intrusion Prevention System (IPS) software 7.x on standalone 4200, 4300, and 4500 series sensors, as well as modules for Cisco Adaptive Security Appliances (ASA) 5500 Series appliances. The session uses command-line and Web-based configuration tools for IPS appliances, like IPS Device Manager (IDM), IPS Manager Express (IME), Adaptive Security Device Manager (ASDM), and Cisco Security Manager 4.x. This session is for attendees who configure, maintain, and troubleshoot intrusion protection systems.
5.0/5.0
BRKPCS-4385 - Network Management for Today’s Networks by Ipswitch (2012 San Diego) Network management has evolved over the years and today’s networks are very complex. Ipswitch Senior Product Manager Brian Jacobs will explain the underlying concepts of network monitoring and give a detailed explanation of network management technologies at the system, network, service/application, and user levels. The session will cover the information needed to right-size your network management solution and choose a solution that best meets your organization’s needs without breaking your IT budget. The session will also discuss common challenges and important considerations when designing a holistic network management solution. A chief engineer from LodgeNet, the largest worldwide deployment of WhatsUp Gold monitoring over 25,000 devices across 2.8 million hotel rooms across North America, will be a featured speaker at this session. LodgeNet will provide real-world context to the technology discussions and explain how a properly sized and configured management solution can reduce costs, increase customer satisfaction, and decrease the overall stress on network administrators.
4.0/5.0
BRKOPT-2109 - Dynamic DWDM Control Plane (2012 San Diego) This session is intended for Service Providers, Public Sector and Large Enterprise Network Engineers looking to deploy a Dense Wave Division Multiplexing (DWDM) Control Plane solutions in their network. The session will discuss the history of Optical Control Planes and will introduce the upcoming IETF (Wavelength Switched Optical Networks WSON) concept. Also, the session will introduce some of the WSON components and architectural building blocks including Routing and Wavelength Assignment (RWA), linear and non linear effects estimation, distributed and centralized Optical Control Plane (OCP) as well as the benefits of a potential converged IP and DWDM Control Planes. Moreover, the session will shed some light on existing Optical Control Plane solutions such as Automatic Swicthed Optical Network (ASON) and the benefits WSON will bring to industry. The discussion will also be illustrated with examples and scenarios. At the end of the session, the audience will be able to understand the differences between existing and upcoming optical control planes. Also the audience will get updated information on how WSON standard is evolving in the IETF.
4.0/5.0
BRKNMS-1036 - Simplify Network Management and Reduce Operational Costs with Cisco Prime (2012 San Diego) In this session you will learn about Cisco network management strategy; Cisco Prime for Enterprise. Cisco Prime for Enterprise is built upon a network services management foundation and a set of common attributes. The network services management foundation provides a “top-down” approach to efficiently plan, deploy, and manage the network from a business and end-user perspective. The common attributes provide a consistent operational experience across the product portfolio including an intuitive workflow-oriented interface. Cisco Prime simplifies network operations integrating Cisco best practices and automating lifecycle processes to improve operations efficiency, reduce errors, and make the delivery of services more predictable. Cisco Prime supports integrated lifecycle management of networks, services, and endpoints for Cisco Borderless Network, Data Center, and Collaboration architectures with end-to-end assurance. It helps IT departments achieve: • Improved operational efficiencies: Reduce network errors, speed troubleshooting, and improve the delivery of services while making the network more predictable. • Reduced operating expenses: Speed deployments, minimize IT staffing, and reduce training requirements with easy-to-use tools, workflows, and automated best practices that simplify network management. • Lower capital expenditures: Make the most of network investments through converged management and cross-integration with existing operations, systems, and northbound processes. • Enhanced levels of service: Provides end-to-end visibility for service aware networking and assurance for simplified troubleshooting and predictable service delivery. The session will also include use cases that will demonstrate the value of Cisco Prime and how it will help improve the productivity of your IT staff and reduce network downtime.
3.5/5.0
BRKIPM-2011 - Multicast MPLS (2012 San Diego) This breakout session covers technologies for integrating multicast within an MPLS environment. People will learn what Label Switched Multicast stands for and how to deploy it. We'll briefly discuss the difference between the two integration technologies: Point-to-Multipoint MPLS Traffic Engineering and mLDP. This sessions covers an overview, the architecture, the protocols involved. We will discuss tree building, tree types and how multicast flows are assigned to it, followed by a discussion of aggregation and applications of LSM.
4.0/5.0
BRKSEC-2050 - Secure Mobility (2012 San Diego) People are now accessing corporate resources from a host of different locations using multiple devices and they expect on-demand and seamless access to company data to conduct their business. A well-designed remote access solution improves productivity, decreases downtime, cuts support costs and ensures employee satisfaction. However, the ubiquitous access creates huge security risks for the organization. It is very easy to lose confidential data and it is very difficult to ensure the right level of authorization and access control. The IT administrator has to strike a balance to ensure security without affecting the user experience. The industry leading Cisco ASA Remote Access solution is designed to solve these challenges. In this session, we will lead with the various connectivity options including the Cisco AnyConnect Client and the browser based Clientless SSL VPN. We will discuss the multiple advancements introduced to ensure seamless connectivity for the mobile users. Using a real-world example, we will cover the authentication and authorization options to enforce customized granular access controls. We will then focus on desktop and mobile platforms and discuss the security policy including device posture, network access controls and threat mitigation. We will also cover the deployments to protect mobile users from web-based threats using Cisco Web Security Appliance and Cisco ScanSafe Cloud based solutions. At the end of the session, attendees will gain an understanding of various security technologies available on the Cisco ASA platform to enable secure access to the mobile users. Technical topics covered: Cisco ASA Remote Access VPN, Cisco AnyConnect, Clientless SSL VPN, Posture Assessment, Mobile Device access, Cisco Web Security.
4.0/5.0
Get More Results