August 2012
Intermediate to advanced
696 pages
17h 26m
English
It’s a usual day at work so far. However, a critical task of a cutover of your organization XYZ’s existing PBX to Cisco Unified Communications Manager Express router at the end of day awaits you. You log in to the router to double-check the configuration. The router seems to be a little sluggish and is acting odd. Moreover, certain things just weren’t making sense. You see multiple changes to the configuration. You type in the who command. Holy Moly! Someone was logged in with a public IP! You clear the line, put an access-list on line VTY to allow only your management subnet and start to restore the configuration.
Before you rush to restore the configuration, ...