Tuesday, 30 April 2013

Showing Enterprise Data in Cisco Agent Desktop

Few days back i got a requirement from one of our customer.They want to deploy CCX in there setup and the requirement is when someone call a trigger point from PSTN and when the call reaches the the CAD, The CAD should display the name of the Customer for whom the trigger point has been configured .

So to acheive this we need to do few configuration in the Desktop administrator and the CCX script editior.
so first in the cisco desktop administrator.
Go to Service Configuration> Enterprise data > Field
Modify the Call Variable change the call variable name to anything meaningful (I changed it to Customer Name)






Next step is to define a layout i created and named it " Custom" and added i want to incorporate in the layout this layout will be displayed in the CAD window.


 Before that we need to get the called number that has been dialed,This you can get from "Get Call Contact Info" and assign it to a  string variable "strCallingNumber"


After that you can either use the caller number info to configure the customer name by using either the Switch or If statement
 Next step will be in the CCX script editor and add a " set enterprise variable ' step.

Remember before defining the "set enterprise variable" step you need to define the ECC varible from setting > Expanded call varible



Name this variable as "user.layout"

Now add a "Set Enterprise variable"












Sunday, 28 April 2013

UCCX Script for Checking Holiday

I am going to share a vey common scenario that many UCCX customer demands in there scripts.This is how incorporating a holiday check in there scripts as a subfow.

As this scripts are commonly used by all the scripts so better to create it as a separate individual scripts and to return a Value (either true or fasle).True in case it found a holiday and flase if it doesn't find a holiday.

To acheive this the best option is to use the XML document  for holiday the sample document that i used is as below  and name it as per your own ( I named it Holiday.xml)

<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- m/d/yyyy NO LEADING ZEROES IN DATE NUMBERS !!!! -->
<Holidays>
       <Holiday1>2/2/2013</Holiday1>
       <Holiday2>4/26/2013</Holiday2>
       <Holiday3>4/27/2013</Holiday3>
 </Holidays>


Remember  not to put any leading "0" in mentioning the date.

Now lets get a date form the system to get a date from the system create a date (Lets say todaysdate) variable and using the create java object step get the current date from the system,The constructor  for this is java.utils.Date().

It will look like as below


Now next step is to use the execute java method to get the date,month and year in a separate variable ( an integer type variable) .





Do the Same with separate variable for Month and day.

Once you get the variable in integer format  change then to string format using the execute java method as shown below:



 Now once you get all the value in string format arrange them in the daye format ( i used mm/dd/yyyy)
so to scheive this use the set step,




Now using the get XML data get the list of holiday from the XML document created previously and assign it to a variable (type string)


Now using if statement comapre the two value  (one you received from the system an done you rceived from the XML document and put a logic or set a boolean variable to true if condition matches and use it for the Main script.





Monday, 22 April 2013

What is a E1/T1 PRI and how to configure NFAS PRI

Many time during our engineering graduation and at the time of networking career came across E1/T1 link.
I was thinking of writing or discussing this in the blog keeping very basic  fundamental of these and a few initial configuration that we do to make it work.

E1 and T1 are the carrier and ISDN PRI work over it. The ISDN are of two type BRI and PRI The PRI has two options.

T1 - In this the ISDN contain 23 B channel and 1 D channel (Control channel for ISDN)
E1- In this the ISDN contain 30 B + 1 D channel

I am going to discuss NFAS in this post ..

NFAS: Nfas is a function of Pri where 1 D channel control multiple pri , To a Max 1 D channel in NFAS can control 478 B Channel , In NFAS for sake of redundancy you can also define a secondary D channel apart from the primary one

Configuration command for NFAS:
pri-group timeslots 1-24 nfas_d function nfas_interface int_number nfas_group group_number

 function - The function to be performed by timeslot 24, either primary, backup, or none. Every NFAS group must have one primary. The router does not require a backup, however most NFAS implementations
 do have a backup D channel. Contact your telco to determine whether you should configure a backup D channel for your NFAS group. The rest of the controllers can be configured with none, which designates the 24th timeslot as a B channel.  

 int_number - A value assigned by the service provider and used to uniquely identify the PRI. The values possible range from 0 to the highest t1 available on the router, minus one. For example, if the router has 10 T1s the NFAS interface number can range betweeen 0 and 9. The 0 interface must be assigned to the primary D channel and the 1 interface to the backup D channel.

 group_number - Group identifier unique on the router. Multiple NFAS groups can exist on the router. Each group must be configured with a primary and secondary controller. 

Never user Interface id number as 1 if you are planning to implement backup D Channel

Sample Config:

isdn switch-type primary-ni

controller T1 0
 framing esf
 clock source line primary
 linecode b8zs
 pri-group timeslots 1-24 nfas_d primary nfas_int 0 nfas_group 0
!
controller T1 1
 framing esf
 clock source line secondary 1
 linecode b8zs
 pri-group timeslots 1-24 nfas_d backup nfas_int 1 nfas_group 0
!
controller T1 2
 framing esf
 clock source line secondary 2
 linecode b8zs
 pri-group timeslots 1-24 nfas_d none nfas_int 2 nfas_group


Here Controller T1 has the primary D channel and all has been binded to group 0 with command parameter "nfas_group 0"..

Command that is helpful in troubleshooting idsn issue is 

Debug isdn q931..

 

  

Sunday, 21 April 2013

Unity Connection Trace troubleshooting

The Traces for the unity connection is divide into two one is micro traces and other is macro traces.

Micro traces deal with problem related to specific service component
Macro traces deal with problem related to some general problem

Here is the list from cisco guide which will give you when to use which trace.

Macro Traces:







Micro Traces:





 To enable trace you need to enable relevant traces from the cisco unity connection servicability page ..




 

Saturday, 20 April 2013

Configuration UCS 210 for initial setup

I am writing this blog to share my experience of implementing UCS  210 M2 blade with esxi for one of the customer.
You can look for good document in cisco.com and those are enough but i looked to capture some important point and capture these in form of screenshots so that it will be easy for one to understand the process and go with the initial configuration .

Here are the basic information about the server hardware :


1)     Rack Size required for UCS- 2U
2)     Attach a power cord to each power supply in your server, and then attach the power cord to a grounded AC power outlet.(Max Input Current-115 to 230 VAC nominal
Power Supply Specifications
Description
Specification
AC-input voltage
115 to 230 VAC nominal
(Range: 90 to 264 VAC)
AC-input frequency
50 to 60 Hz nominal
(Range: 47 to 63 Hz)
Maximum AC-input current
10 Amps
Maximum output power for each power supply
650 W (up to two power supplies can be installed)
Power supply output voltage
Main power: 12 VDC
Standby power: 5 VDC
3)     Use the supplied KVM cable to connect a keyboard and VGA monitor to the console connector on the front panel
4)     Set NIC mode, NIC redundancy, and choose whether to enable DHCP or set static network settings:
       a)     Press the Power button to boot the server. Watch for the prompt to press F8. 

       b)    During bootup, press F8 when prompted to open the BIOS CIMC Configuration Utility. 

       c)     Set the NIC mode to your choice for which ports you want to use to access the CIMC for server management 
  
 Dedicated—The two 10/100 management ports are used to access the CIMC. You have to select a NIC redundancy and IP setting.
 
Shared LOM (default)—The two 1Gb Ethernet ports are used to access the CIMC. This is the factory default setting, along with Active-active NIC redundancy and DHCP enabled.

d)  Cisco Card—The ports on an installed Cisco network adapter card are used to access the CIMC. You have to select a NIC redundancy and IP setting.

  Use this utility to change the NIC redundancy to your preference. This server has three possible NIC redundancy settings:
  None—The Ethernet ports operate independently and do not fail over if there is a problem.
> Active-standby—If an active Ethernet port fails, traffic fails over to a standby port.
> Active-active—All Ethernet ports are utilized simultaneously.

e)     Choose whether to enable DHCP for dynamic network settings, or enter static network settings  
  
f)     Press F10 to save your settings and reboot the server

5)     Connect to the CIMC for server management. Connect Ethernet cables from your LAN to the server by using the ports that you selected by your NIC Mode setting in Step 3. The Active-active and Active-passive NIC redundancy settings require you to connect to two ports.


6)     Use a browser and the IP address of the CIMC to connect to the CIMC Setup Utility. The IP address is based upon the settings that you made in Step 3 (either a static address or the address assigned by your DHCP server).
The default user name for the server is admin. The default password is password.

7)     After giving IP to CIMC in UCS reboot the server and set the Raid setting depends upon the requirement

8)     Procedure – Mapping of EXSI on UCS C- Series
a)     Step 1  Use a browser to connect to CIMC Manager using the CIMC IP address.
b)    Step 2  Log in to CIMC Manager using your administrator user ID and password.
The default user ID is admin; the default password is password.


 
c)     Step 3  Enable the Virtual Media feature, which enables the server to mount virtual drives:
>  On the CIMC Manager Server tab, click Remote Presence.
>  On the Remote Presence pane, click the Virtual Media tab and check the check box to enable Virtual Media.
>  Click Save Changes






>  Step 4 On the Remote Presence panes, click the Virtual KVM tab and then click Launch KVM Console.



Installation of Esxi.. Coming Next...

Referral Spam in Blogger

By vitrue of  techedIN

Unknown or strange URLs in Blogger Stats

You are a blogger of sorts and your favourite pastime is to endlessly stare at your Blogger Stats hoping that hits will keep on coming if you just sit there and look at it, like me! And as you are looking at your "countless" number of less than 100 clicks and hits and unique views on your blog, you come across strange URLs that claim to refer your blog to people. Not bad, you think and click on the referrer link to see which is this benevolent site that sends you a lot of traffic! Ya, referrer spammers win!

Referrer Spam, which is also known as Log Spam or Referrer Bombing, is the act of "using a fake referrer url that points to the site the spammer wishes to advertise." This practice started as Blogging became popular. Bloggers, in their endless quest for 'link love', started publishing the sites that send them referrals. Some of them automated the process and linked the referrer list to the Analytics they used. Now, that encouraged spammers to send referrer spam so that the link of the site they wanted to advertise gets listed in a Blogger's Referrer List.

Bloggers with a lot of visits to their Blogs may not see these Referrer Spam often, as Referrer Spammers or Log Spammers send less than 20 to 25 automated hits to a Blog so that they will not get caught by Spam Fighting Teams of different Tech Companies. But those of us who drive less than hundred people a day to our Blogs will notice them immediately and click  on whatever godforsaken links they are referring us to.

How can we prevent unknown or strange URLs or referrer spammers from attacking our Blogger Stats or Analytics Logs? Here are a few things you can do to keep referrer spammers at bay:

    Hide your statistics  and list of top referrers so that referrer spammers look elsewhere for their link baits. This way you can save people who visit your blog from clicking on links they are not supposed to.
    Use Web Analytics Sites you trust. Some of these Analytic Sites keep their stats open and help spammers analyze your web traffic to target you. They target you if you are a blogger who gets less than 100 visits a day
    If you are using Wordpress as your Blog Platform, you can use a plug-in called Referrer Bouncer. You can go to the Referrer Bouncer from here.
    Those of you are using Blogger as you Blog Platform need to patiently wait and hope that Google will trace the Spammer one day and block him/her because he/she is sending too many automated requests to its servers. Until then, make sure that you do not publish your Blogger Stat and you do not click on any of those unfamiliar or suspicious URLs that claim to send you a lot of traffic.

Friday, 19 April 2013

Android Phone Codes



MOH for Cisco Call Manager User vs Network MOH

If you ever done MOH config ( and i think that every voice engineer has done this )You might have came across these two config options:

1. Network hold moh audio source
2. User hold moh audio source


Network MOH is used when the  network put the user on hold ,Now the question arises when Network put the caller on hold
so when a user try to take someone in conference or transfer a call at that time what the other party listen is the network on hold

And when the User press the Hold button at that time what the other party listen is the User initiated music on hold.


Below is the sequence how the system prioritize the file to play for the MOH

  • Directory or line setting (Devices with no line definition,     such as gateways, do not have this level.)
  •  Device setting
  • Common Device Configuration setting
  • Cluster-wide default setting 

Monday, 15 April 2013

How to Create Menu in Blogger

I was just trying to create a menu based blog and after doing some research found out some solution for doing this .I am going to share this in this blog so that someone has to do a less search than what i have done.

So in case of blogger there are many option available to create menus , one option is to use the element.

Step 1. Create a  new page in your blog by navigating to Pages>New Page




Step 2.  Edit the Menu and provide the url with proper Label.


Step 3. Go to the Page element from Layout>Add Gadget and add the page element gadget



and map the pages you created

Step 4. Create a post and label the post as per the Label you created in step 2, in this case it is "FoodCuisine"

Done.. Now you can see menu in your blog

Sunday, 14 April 2013

How to create a blog

I am starting this blog for the newbie who wants to write a blog in the internet, There are many website available in internet which provide blogger services .Blog should be like it ecourage vistor to visit the blog again and again so it should have good content and also should look good with some html design.

to wrigte a blog you should concentrate on the below things:

1. Good writing style
2. Keep updating with new post
3. Allow readers to comment

Write with your natural flow as it give the blog a good shape of you and remember peoples like originality.:-)

Keep upodating your post ,put whatever you think in the blog , Updating will make you blog to appear in top

Alos take feedback from reader in form of comment, this will improve your blog writing capability

Once you decided a topic to blog on, choose a blogger website

some example are

www.blogspot.com 
www.wordpress.com and many more 


Saturday, 13 April 2013

Cisco IP Phone -Firmware upgrade procesure

Many times we require to upgrade the firmware of cisco IP Phone and we  look for the procedure to do it in internet .I did the same and decided to write this blog to summarize by search with the practical experience i have.
There are two procedure to upgrade the firmware of the phone one from CUCM and other by creaing a separte tftp server and pointing the Phone to take firmware from a stanalone tftp server which will host all the required  tftp files.

I will discuss the second approach from CUCM here...

First download the firmware from www.cisco.com  then follow the below procedure to upload the image in CUCM

  • Using your web browser, login to the Cisco IPT Platform Administration web page
  • Under the Software Upgrades menu, select Install/Upgrade.
  • Fill in the appropriate values in the Software Location section for the file you downloaded above, and click Next.
  • In the Available Software drop-down box, select the file you downloaded above, and click Next.
  • Enusre that the downloaded file has the same MD5 hash value as listed in Table 2.
  • Click Next.
  • In the Warning box, verify you have selected the correct firmware, then click Install.
  • Ensure that you received a Success message   
Now go to the CUCM admin page and change thedefault load by navigation to Device setting > Default Device Load

Remember in the OS adminpage you can find one more field called TFTP file management ,this ooption is used to upload ring file and other device pack so don't get confused with this option and "install and upgrade" option which is used to upload cop file for patch upgrade