I am from the business side of an organization, so please bear with me on this question. Are there any commercially available solutions for authenticating Cisco equipment when it arrives from a reseller? We would ideally like to verify a) all internal chips are authentic, b) all chip-level software is authentic and c) no unauthorized components have been inserted into the products between assembly line and delivery to our front door. Thank you.
Thank you. Given our particular security needs, we cannot assume the standard designations of authenticity to be sufficient, even when procuring equipment from Tier 1 resellers (which we do). You affirmed my research: out-of-the-box solutions do not seem to be available.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...