CUCM SQL Query – 2

In the Last blog we learned about select method and some basic SQl queries on CUCM. Today will learn Join and Where Clause. JOIN JOIN is a query clause that can be used with the SELECT, UPDATE, and DELETEdata query statements to simultaneously affect rows from multiple tables. Thereare several distinct types of JOIN statements…

Cisco CLI Analyzer

Support Your customer with internal TAC tools and knowledge integrated. The Cisco CLI Analyzer (formerly ASA CLI Analyzer) is a smart SSH client. It is designed to help troubleshoot and check the overall health of your Cisco supported software. In addition to ASA. CLI support IOS, IOS-XE, IOS-XR and NX-OS! Supported platform. It can be…

Basic CUCM SQL Queries-1

Lets learn some basics of SQl Queries and try it on CUCM. What SQL? SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve…

How do I Size UC servers

Sizing is a part of UC engineers JOB role. it may be for a deployment, or a presales presentations, or may be for preparing a LLD document etc.. Sizing UC servers is easy with Cisco’s Sizgin tool. Many of us might have used Collaboration Sizing Tool (CST). This tool has been decommissioned and Quote Collab…

Cisco Collaboration Virtualization

How to make sure that I am on the recommended Vmware version when installing/upgrading UC applications. Cisco Collaborations Virtulization portal is the Place where you get tested vmware version for all UC applications. Cisco Collaboration virtualization Click to access Cisco Collaboration Virtualization. Select your applications and it takes you to the specific product hardware requirements…

CSR Compatibility Matrix

When upgrading/Installing UC applications we need to make sure all applications are on compatible versions. CSR Compatibility Matrix provide you the recommended version and minimum version details . We must follow this matrix when installing /upgrading UC applications.Todays blog is all about the CSR compatibility matrix and how to use it. Compatibility Matrix Link Access…

Move to Type 9 password

Its highly recommended to replace your type 5 and 7 passwords with type 9 passwords. Many of us are aware that type 5 and type 7 passwords can be decrypted using online tools but many still not. Todays blog is all about configuring type 9 password. You can try decrypting type 5 and 7 password…

Remove RSA host key using ssh-keygen

nithineluvathingal@EluS-MacBookPRO ~ % ssh administrator@198.18.133.3 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the RSA key…

Verify MD5 from Router CLI

During a voice gateway IOS upgrade task to validate the file, customer requested to verify if the copied file and the file in the flash are of same size. Its not the right way. We need to compare the MD5 value. Today’s blog is about how to verify the MD5 using router CLI. Command to…