The Dallas / Fort Worth Cisco Users Group


The DFWCUG is an organization in Dallas TX that works with and helps organize new Cisco Users Groups in the US.

The Dallas / Fort Worth Cisco Users Group


The Cisco meeting presentations in our downloads section are mostly from our monthly Cisco User Group meetings. The most recent are listed first. Please contact the presenter listed in the presentation for copyright and distribution information. 



  The DFW Cisco Users Group Meeting Presentations Archive and Downloads

10/3/2018 MRA Basic Configuration and Troubleshooting

This session will introduce one of the integral, money-saving features of the Cisco Collaborations Solution, Mobile and Remote Access(MRA). MRA extends office connectivity to on-the-go and remote employees, providing a seamless experience to customers when they are outside the enterprise network. This feature allows external Cisco Jabber mobile users and Cisco Telepresence endpoints to securely access video, voice, contents, voicemails, instant messaging(IM), and presence without the need to connect through a VPN. During the session, the basics of how MRA works, various deployment scenarios, Expressway basic configuration elements, DNS, and certificate requirements will be discussed. There will also be a deep dive to understand what configuration is required on CUCM, IM&P, firewalls, and endpoints(Jabber, TC/CE Endpoints, IP Phones). After this session, you will be able to configure and troubleshoot the MRA solution with ease and time to spare.

Victoria West


Swagata Bose  

soon 9/5/2018 - Getting started with Network Automation using Python

Continuing the topic of Network Automation/NetDevOps, let's look a bit more on the practical side of using all this "new technology". Now that you've got Python up-n-running (thanks Beau Williamson-March2018), have some ideas of how to access devices to gather info and/or push config parameters using Netmiko (thanks Kirk Byers-April2018), and have some practical Python programming skills (thanks Matt Denapoli-August2018), let's delve deeper in the real-world details of pull and push aspects of Network Automation. We'll work with a mix of vendor gear, a mix of network operating systems that do and don't support REST API's, and some of the differences of what you can do with or without API's. There will be examples of running scripts from Windows/PyCharm/Python and Linux/Python.

This is a mini hand-on lab session so bring your laptop loaded with your Python tools and WLAN connect to an isolated lab system (no Internet access, totally isolated for this hands-on lab system). Not only will you write your own scripts (follow Jeff), you will also have the opportunity to access real equipment to validate your newly created scripts do work!

If you don't have a laptop with Python already installed, goto the DFW_CUG YouTube channel and watch Beau Williamson's presentation on March 7, 2018, to get you up-n-ready.


Jeff Carrell
8/1/2018 - Python Language Fundamentals Workshop

Network Programmability is changing the way the network is managed and monitored. To take advantage of the benefits of this industry shift, network engineers need to “level-up” and learn the basics of software development; in particular the Python Programming Language. Don’t know Python? We’ve got you covered.

This workshop will cover all the essentials of the Python Language that you need to get started. This includes the Python Interpreter, Python Language Syntax, Collections, Loops and Script Structure and Execution. It will also work through using Libraries to perform common tasks (such as parsing JSON and other data formats) and will even provide an Introduction to Git. With all of this under your belt, you’ll be coding in Python in no time. Finally, you’ll also learn concepts and terminology for REST APIs, how to get started with REST APIs, how to use POSTMAN to test APIs, and how to create scripts that can access a REST API.

Attendees will need to bring their Laptops with the Python Interpreter and PyCharm already loaded and ready to use. Loading those tools was covered in the March DFWCUG “Getting Started with Python (For Network Engineers)” presentation by Beau Williamson. Please refer to that presentation for instructions for downloading and installing the Python Interpreter, PyCharm. We will also send out these instructions as well as any programming examples to be used by the presenter in the next DFWCUG Newsletter.


Matt DeNapoli
6/6/2018 - Modern Data Center Starts with VXLAN

All modern datacenters have common major requirements such as scalability, flexibility, and programmability. Packaged datacenter solutions like NSX, ACI, OpenStack and even cloud providers use VXLAN as a data plane because it addresses these requirements. During this session we are going to look at VXLAN from its simplest form of layer2 extension to complex EVPN implementations using MP-BGP. Understanding EVPN deployment and how it replaces a traditional layer2 and layer3 functions in your data center will also help you understand the mechanics of all VXLAN related technologies.


Tim Strakh
soon 5/2/2018 - MPLS & L3VPNs made so easy that my grandma can understand it

This presentation will cover the concepts of using Multi-Protocol Label Switching (MPLS) and other network technologies and concepts to implement Layer-3 Virtual Private Networks (L3VPNs). It will not only cover topics such as Label Distribution Protocol (LDP), Virtual Routing and Forwarding (VRF’s), Route Descriptors (RD) and Route Targets (RT) but it will do so in a way that makes L3VPNs easy to understand. (So easy you will be able to explain it to your Grandmother.)


Narbik Kocharians
4/4/2018 - Using Python + Netmiko to Enable Network Automation

Netmiko is a multi-vendor Python library that simplifies network automation. This talk will discuss how to use Netmiko to enable network automation. Various Netmiko use cases will be discussed including connecting to devices, retrieving information, making configuration changes, and troubleshooting. The talk will also discuss using Netmiko-tools, a set of command-line tools based upon Netmiko.


Kirk Byers
3/7/2018 - Getting Started with Python (For Network Engineers)

This session is a Hands-On Workshop for Network Engineers that have little or no experience with the Python Scripting/Programming Language. The goal of this Workshop is not to actually teach the fundamentals of the Language. (Although we will provide numerous links to excellent resources to learn Python.) Instead, the Workshop will walk the attendees through the process of setting up many of the key tools on their laptop to make the development of Python scripts/programs easy to write and debug. This includes installing the latest Python compilers (both 2.7 and 3.6) on their Windows PC’s, installing the PyCharm Integrated Development Environment (IDE) that helps you write Python programs, installing the git utility to quickly and easily download Python Code Repositories and many other tips and techniques.

By the end of this Workshop, the attendee will have all the key tools loaded onto their laptop and have a basic understanding as to how to make use of them. They will also have a quick exposure to the Python Language via some simple examples ("Hello World" and other examples) and will have access to additional resources to learn the Python programming language.


Beau Williamson
soon 2/7/2018 - Mobile Threat Detection using On-Device Machine Learning Engine

Mobile Threat Detection Platforms can assist users in the detection and prevention of cyber attacks across the Mobile Cyber Attack / Kill Chain. When attackers target an organization they will generally execute a multi-phased attack: Reconnaissance, Exploitation, Infection and then Manipulation. Traditional solutions require cloud connectivity & signature updates. Many times, zero-day exploits run wild from 1-3 years before being discovered and characterized. Then a signature hash can be leveraged for traditional Anti-Virus scanning engines. I will demonstrate on live equipment a proven Machine Learning solution that runs on the smartphone (iOS & Android), where no cloud connection nor signature updates are required to provide immediate Detection.


Mark Szewczul

12/6/2017 - How to become a Penetration tester - An attempt to guide the next generation of hackers through my mistakes

Penetration Testers (aka.Ethical hackers) come from different backgrounds: developers, database, system, or network administrators, etc.. In this talk we will discuss how the decisions you are making today may influence your area of expertise. We will also cover the different paths, certifications that matter, jobs that will help you towards the area you wish to specialize in and what skills you should be concentrating in while in school. Finally, we will go over expectations of becoming a penetration tester, we will touch on women within penetration testing and give you an idea of what to expect in the real world. I have stumbled through security with no guidance for most of life. Let me stop you from making my mistakes and wasting money in certifications that wont take you very far.


Perla Caston

11/1/2017 - Intent-Based Networking: Telling the Network What You Want Rather Than What to Do

Cisco was caught a bit flat-footed in the early days of SDN, first denying that it would ever amount to anything. Only later, after a flood of startups and open initiatives proved its importance, did Cisco take the SDN plunge. It certainly isn’t making that mistake with Intent-Based Networking (IBN). While a few startups such as Apstra and Veriflow have recently come out of stealth mode, Cisco turned heads this past June with its announcement of its own IBN initiative.

IBN is, simply, an application of machine learning and analytics to the orchestration of networks. Rather than configuring individual network nodes to support a diversity of applications, or even configuring the network through a “single pane of glass” orchestration layer, IBN lets you express your intent rather than traffic handling instructions. It’s an important step down the road toward autonomous, programmable, application-defined networks.

This presentation examines the history behind IBN, the essential components of an IBN system, takes a look at where IBN is leading the industry and what it means for your career.


Jeff Doyle

10/4/2017 - Itential Pronghorn + Cisco NSO: Enhancing Orchestration with Operational Automation

Itential Pronghorn extends the operationalization of Cisco’s NSO (formerly Tail-F) configuration automation solution to manage Network Services and streamline service deployment timelines via a flexible User Interface that enable groups within your organization to define and evolve their own operational processes.  It offers use case specific solutions for MOP/Runbook Automation, Service Order Management, and Configuration Management, allowing organizations to provision network services, automate common maintenance window activities, manage device configurations, and optimize firewall policies. Finally, the Pronghorn Application Platform utilizes interaction with other support systems to allow for a single pane of glass that exposes the capabilities of multiple southbound systems in a common operational view.

During this presentation one of Itential’s Lead Engineers, John Polansky, will start with a quick review of the Cisco NSO solution and then dive into an Itential Pronghorn solution overview. He will share several customer deployment examples, and walk through a demonstration of how Itential Pronghorn can complement Cisco’s NSO solution while providing a framework for the deployment of automation into Service Provider and Enterprise networks.


John Polansky

9/6/2017 - Cisco Meraki: Fast, Simple, and Powerful Network Deployments

IT teams are being asked to do more with less: to support corporate devices and any other device a user prefers. To transition to a wireless office and support remote working. To enable massive device expansion and constant digital collaboration. To provide zero downtime and constant change. And we’re supposed to accomplish this with shrinking budgets and in many cases, fewer or even a single IT employee!


Humphrey Cheung

8/2/2017 - IoT Security Landscape & Analysis

Technology allows society to accelerate exponentially. People are connecting Things to the Internet but the benefits aren’t realized without tradeoffs. Companies are embracing IoT to enhance their business plans. Due to many difficult challenges, some IoT Security Alliances have begun to form. At the federal government level, FTC, FCC, DHS and NIST have become involved. Finally, security companies are now proposing IoT security architectures to complement Enterprise solutions. We will review and discuss all these topics.


Mark Szewczul
  7/5/2017 - No meeting... summer break



6/7/2017 Leveraging Analytics for Next Generation Service Assurance

As we enter into the era of software-defined everything, where mobile and fixed infrastructures undergo rapid and dynamic change, is time to invest in and modernize existing service assurance Analytics platforms. Technologies such as Big Data and Analytics are becoming essential to be able to ensure end-2-end new technology services based on SDN and NFV are delivered within SLAs to end users. The next generation service assurance should be able to understand and co-relate the events from the entire stack cutting across physical and virtual resources.


Renato Fichmann

5/3/2017 Network Service Orchestration / Automation using NSO

Cisco Network Services Orchestrator (NSO) is an industry-leading software platform that helps deliver high-quality services faster and more easily to your customers through network automation. It is capable of delivering services across your multivendor network. NSO services provide full life-cycle (CRUD) with transactions, and the development time and cost is a fraction of what it takes to do the same using HPSA / custom code / scripts. NSO uses plugins to abstract out each vendor’s configuration details and these can be installed and upgraded on the fly. NSO is used in many service provider networks today to automate services across traditional and virtualized networks.Santiago is a Distinguished Engineer at Cisco Systems focused on network routing and programmability.

Ashok Sadasivan is a Solutions Architect (NSO pre-sales) in the Tail-f BU of Cisco.


Ashok Sadasivan

4/5/2017 SDN/OpenFlow Analysis

What is SDN? What is OpenFlow? Basically SDN is about programming network devices like switches and routers from a central point known as the SDN Controller. The controller uses a common protocol - OpenFlow when communicating to the devices.

We'll start by looking at OpenFlow traffic, the initial stages of communications between OpenFlow enabled switches and the SDN controller, see examples of OpenFlow comms using applications on the SDN controller for configuring the switch for flows, and demonstrations showing how a switch processes traffic based on OpenFlow programming and standard switch operations - this is known as "Hybrid SDN".

Everyone is encouraged to bring their laptop with Wireshark installed (min v2.0.0), download the provided trace file, and follow Jeff viewing OpenFlow packets. You will use built-in Wireshark OpenFlow display filters and create color definitions to assist in recognizing OpenFlow traffic quicker.


Jeff Carrell

3/5/2017 Simplifying network automation using Python model-driven APIs

This session describes how to significantly simplify network programmability using APIs generated from YANG data models. Model-driven APIs allow the network programmer to focus on the underlying structure of the device configuration and operational data. They abstract protocols, transports and encodings, plus they free the programmer from having to master the specifics of YANG. This session will show you how to get started with Python model-driven APIs using the YANG development kit (YDK). The session will end with a demonstration of the simple Python script using model-driven APIs to configure router using an OpenConfig data model.

Santiago is a Distinguished Engineer at Cisco Systems focused on network routing and programmability.


Santiago Alvarez
2/1/2017 - An Introduction to OpenDaylight and YANG

OpenDaylight is the dominant open-source SDN controller platform available today. In this presentation Cisco Principal Engineer Giles Heron will give an introduction to OpenDaylight, with a focus on how it uses the YANG data-modeling language to enable the new paradigm of “Model Defined Networking”.

Giles Heron is a Principal Engineer at Cisco, working in the CTAO group.


Giles Heron


Same as  12/7/2016
1/4/2017 - IPv6 in Wireshark: a 2-part series: IPv6 in Wireshark - 101 (part 2/2)

Whether you know it or not, IPv6 is running on your network, but is it working as you need or expect it to? Do you know what the Router Advertisement is configured as? Do you have "rogue" IPv6 routers on your network? Are the IPv6 enabled clients complaining of "slowness"?

Many technologists use Wireshark for validation of network and troubleshooting. This session will briefly review IPv6 basics and then dive into configuring Wireshark to assist in viewing IPv6 more effectively.

Wireshark configuration profiles, display filters, and color rules can provide specific focus when troubleshooting reported IPv6 problems, and how to effectively and expeditiously determine what could be the root cause.

Note: This is a 2-Part series (December and January meetings) and everyone is encouraged to bring their laptop with Wireshark installed (min v2.0.0) as this will be a hands-on/follow Jeff session with provided trace files.

Jeff Carrell, Network Instructor for HPE Education Services


Jeff Carrell
12/7/2016 - IPv6 in Wireshark: a 2-part series: IPv6 in Wireshark - 101 (part 1/2)

IPv6 is the new Internet Protocol. Many technologists use Wireshark for network validation and troubleshooting. This session will cover IPv6 basics and then dive into configuring Wireshark to assist in viewing IPv6 more effectively.
Configuration profiles, display filters, and color rules will be discussed and demonstrated to aid the understanding of what you will be seeing.

Note: This is a 2-Part series (December and January meetings) and everyone is encouraged to bring their laptop with Wireshark installed (min v2.0.0) as this will be a hands-on/follow Jeff session with provided trace files.

Jeff Carrell, Network Instructor for HPE Education Services


Jeff Carrell
soon 11/2/2016 - Cisco Certifications for Fun and Profit!

From CCENT to CCIE can be achieved in an exciting and rewarding manner. No really! It is possible! Once the Certifications are achieved, career advancement and enrichment are also real possibilities.

Join Anthony and Keith in this action-packed session on the top tips for crushing Certification exams in the Cisco portfolio. Get your notepads ready as detailed, time-proven techniques are revealed for mastering both written and performance-based Cisco Certification exams.

And be sure to bring your questions as well! Keith and Anthony have been training Cisco since 1997 and cannot wait to field queries in the areas of Certification and beyond.

Anthony Sequeira, Senior Technical Instructor for CBT Nuggets
Keith Barker, Senior Technical Instructor for CBT Nuggets


Anthony Sequeira

Keith Barker

10/5/2016 - IPv6 Security

Many international organizations already have IPv6 networks, some organizations are working on their transitions to IPv6 and others are contemplating what IPv6 means to them. However, many organizations already have IPv6 running on their networks and they don’t even realize it. Many computer OS's now default to running both IPv4 and IPv6 which could lead to security vulnerabilities if one is not prepared. IPv6 security vulnerabilities currently exist “in the wild” and as the popularity of the IPv6 protocol increases so will the number of threats. This session will cover the overview of IPv6 security threats and protection measures.

This session will cover recently released IPv6 attack tools that target the Neighbor Discovery Protocol (NDP) and how Ethernet switch manufacturers have created protection measures.

Scott Hogg, CTO for Global Technology Resources, Inc. (GTRI)


Scott Hogg



9/7/2016 - QoS - From Best-Effort to Priority: Everything you wanted to know plus some things you didn’t.

In a networking world that’s demanding 100% availability and minimized latency, there’s no topic more dreaded and more necessary than QoS.

We’ll breakdown “What is QoS?” into easy-to-understand ideas and examples, as well as dive into best practices, design, and even the physics behind what’s happening underneath the covers. We’ll even go through “Talking intelligently to your Telco” so you can get that better understanding of what’s going on from the other side of the fence and better negotiate or design your QoS policies.

Chris Williamson, Network Consulting Engineer at Cisco


Chris Williamson
8/3/2016 - Introduction to Software Networking - SDN / NFV 101

Software virtualization and the cloud are causing the most disruption and fastest change the networking industry has ever seen. Purpose built appliances such as routers and gateways, are evolving to software based “virtual network functions” and giving way to a plethora of new acronyms… VNF’s run on NFV’s – sometimes with SDN… Put the word “open” in front of every network term you’ve ever heard – Open vSwitch, OpenFlow, OpenStack, Open NFV, Open Daylight… Completely new skills will be required to run these new software centric networks as the industry continues to evolve.

Come join us for as we explore many of the new concepts in this new software networking evolution. We will cover some of the current trends in networking related to open source software and do a basic introduction of many new concepts in this space. We will also explore many of the new skill sets that will be required to run networks in the years to come.

Bryn Pounds (CCIE #8830)  - Cisco Systems


Bryn Pounds
  7/3/2016 - No meeting... summer break


6/1/2016 - Cisco Unified Intelligent Contact Management Enterprise Outbound Solution

Cisco Unified Intelligent Contact Management Enterprise and Cisco Unified Contact Center Enterprise help companies distribute inbound calls to a variety of termination points, including automatic call distributors (ACDs), interactive voice response (IVR) systems, home agents, and network terminations. The Cisco Outbound Option application, with its combination of outbound dialing modes, enables call centers to manage outbound calls. The ability for agents to handle both inbound and outbound contacts offers a way to optimize contact center resources.

The Cisco Outbound Option application provides outbound dialing functionality along with the existing inbound capabilities of Cisco Unified Contact Center Enterprise. This application enables the contact center to dial customer contacts and direct contacted customers to agents or IVRs.

With Outbound Option, you can configure a contact center for automated outbound activities.

Ricardo Mancera (UCCE/CVP) - Cisco Systems


Ricardo Mancera
5/4/2016 - Cross-Training CVP, Voice GW, UCCE and CUCM

This training covers general architecture, topology, call flows description and troubleshooting of the three technologies: MS, CUCM, and UCCE.

We will show the architecture, topology and how to configure gateway, CUCM, CVP and ICM for a call to work in the three technologies - basically Comprehensive call flow.

We will also show how to enable traces in the components and how to read them. For ICM, we will cover only few of the components.

Luis Ramirez (Multi-Service) - Cisco Systems
Maneet Jodhka (CUCM) - Cisco Systems
Ricardo Mancera (UCCE/CVP) - Cisco Systems


Maneet Jodhka

Ricardo Mancera
4/6/2016 - IP Multicast Survival Guide Part 2 of 2 - Second Edition

IP Multicast is an “upside down” world where almost everything you’ve learned about IP packet forward is all wrong. However, in the words of Douglas Adams’ Geek Bible, (otherwise known as “The Hitchhiker’s Guide to the Galaxy”), DON’T PANIC.

You too can learn the keys to IP Multicast by attending this two lecture session and then amaze your friends and coworkers with your new ability to do all sorts of “magic tricks” with this technology. (As Arthur C. Clark once said, “Any sufficiently advanced technology is indistinguishable from magic.” IP Multicast is a sufficiently advanced technology in the mind of most people. Ergo, once you master this technology you will be able to perform “magic” in your network.)

In this “IP Multicast Survival Guide – Part 2” we take a deep dive into mechanisms of the PIM Multicast routing protocol and develop an understanding of how it works from the router's point of view. At the end of the session you will have a good understanding of the details as to how IP Multicast truly works and will be better positioned to survive alone and unafraid in the Multicast Wilderness with nothing but your wits and your new found knowledge of PIM.

Download the Multicast Lab2 GNS3 lab zip here. Then extract it to your GNS projects dir, ie, C:\Users\cooper\GNS3\Projects

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, T-Mobile


Beau Williamson
3/2/2016 - IP Multicast Survival Guide Part 1 of 2 - Second Edition

IP Multicast is an “upside down” world where almost everything you’ve learned about IP packet forward is all wrong. However, in the words of Douglas Adams’ Geek Bible, (otherwise known as “The Hitchhiker’s Guide to the Galaxy”), DON’T PANIC.

You too can learn the keys to IP Multicast by attending this two lecture session and then amaze your friends and coworkers with your new ability to do all sorts of “magic tricks” with this technology. (As Arthur C. Clark once said, “Any sufficiently advanced technology is indistinguishable from magic.” IP Multicast is a sufficiently advanced technology in the mind of most people. Ergo, once you master this technology you will be able to perform “magic” in your network.)

In this 2nd Edition of “IP Multicast Survival Guide – Part 1” we take a completely different approach to learning IP Multicast and bust the Myth that “IP Multicast is Hard!” Therefore, even if you attended this DFWCUG Presentation the first time, you will probably find something new that can help you survive in the IP Multicast Wilderness.

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, T-Mobile


Beau Williamson
na 2/3/2016 - No meeting


1/6/2016 - Advanced Application and Network Troubleshooting

Designed for higher-level users well-versed in packet analysis and troubleshooting with Wireshark, this session teaches attendees to resolve more challenging application issues by digging into the packets and focusing on application transactions.

Learn to:

• Analyze applications using real world transactions
• Leverage advanced analytics to streamline troubleshooting
• Assess available tools for faster resolution

After the Education presentation is complete, Rick Kingsley and Bill Naylor of Viavi Solutions will give a very short portfolio overview followed by a best practices training session in using their Observer Expert Packet Analyzer solution. This then qualifies each organization in attendance to receive their own complimentary copy valued at $3K.

* We had technical issues at the meeting so we are pointing the download link to Viavi Solutions. They have some great videos on this subject.

Mike Canney, Principal Strategic Consultant at Viavi Solutions


Mike Canney

12/2/2015 - Cisco Virtual Internet Routing Lab (VIRL)

How would you like to have your very own personal network lab equipped with thousands of dollars' worth of routers, switches, firewalls, servers, traffic generators and more for your own personal certification training and experimentation purposes and yet only spend $80 - $200!! That's pretty much the sort of environment you get when you purchase and setup Cisco's Virtual Internet Routing Lab (aka VIRL) on your own laptop or PC.

This presentation will take you through what VIRL is, how to obtain it, how to install it, how to use it and the many features of this fantastic virtual network simulation tool. We will also show you how you can find a wealth of training videos on VIRL as well as how to participate in Cisco's VIRL User Forum.
If you are looking for a way to have some "hands-on" experience with IOS, IOS-XR, NX-OS, and ASA Cisco switches, routers and firewalls without laying out a ton of money, VIRL is what you are looking for! If that is the case, this is one presentation that you surely won't want to miss.

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, T-Mobile


Beau Williamson


11/4/2015 - SDN for the Network Engineer

Networks are central to IT transformation. Network Engineers need to learn how to stay relevant in today’s market by leveraging their networks for better application performance, better security via micro- and nano-segmentation, risk-free self-service provisioning of “cloud networks on demand”, data center interconnection solutions and non-stop network underlays. This presentation is about Software Defined Networking in the Data Center with a focus on Cisco's Application Centric Infrastructure and the open standards the make it tick. You will also learn more about Cisco’s ACI fit into current brown field environments, competitive SDN environments and how ACI integrates with the widest array of 3rd party devices and management systems. We will also demo the new simplified GUI & CLI to illustrate how easy ACI operations are for day-to-day design/deploy/monitor activities.

Dana Burch, Systems Engineer, Cisco Systems, CCIE#2215


Dana Burch

10/7/2015 - Linux KVM traffic monitoring

With virtualization driving the reduction of physical servers and pushing more and more data inside the virtual bubble it is important to understand how that data moves when virtualized.

This talk will discuss Linux KVM installations of virtual networks, we will discuss virtual bridging, and open vswitch installations. We will discuss local (non-distributed) switching as well as distributed virtual switching, comparing the monitoring challenges of each. We'll briefly touch on orchestration layers and their purpose and advantage.

We will then talk about a couple of strategies on how to gain visibility to east-west traffic using underlying native Linux interfaces. The goal is a primer for deeper understanding of how data moves in these environments and how to troubleshoot them.

Scott Harvey, Director of Engineering at Apcon, Inc.


Scott Harvey


9/2/2015 - Splunk Rapid Boot Camp: From Clueless to Dangerous in less than 2 hours!

Splunk allows the rapid aggregation, synchronization and exploitation of plain-text data sources by providing a shell-like set of pipe-able search and statistics commands to drive any conceivable analytic all the way through to NOC-level visualizations.  Bring your computer so you can play along with your own free cloud instance! The download link to the left is not the CUG presentation but is nearly identical.

Gregg Woodcock, President of Splunxter, Inc.


Gregg Woodcock


8/5/2015 - Cisco TAC: Putting Cisco to Work for You

The Cisco Technical Assistance Center (Cisco TAC) provides around-the-clock, award-winning technical support services for Cisco products and technologies. A Technical Services Overview will familiarize the DFWCUG with the Cisco TAC organization, Requesting Support and Services Requests and Life Lines.

Daniel Baum, Enterprise Systems Engineer, Cisco Systems


Daniel Baum


7/1/2015 - Mitigating Advanced Threats

This presentation will provide a detailed review of today’s dynamic threat landscape and outline a threat-centric and operational security model that spans a range of attack vectors to address the full attack continuum – before, during, and after an attack.

Don Fisher - Consultant System Engineer for Security, Cisco Systems


Don Fisher


na 6/3/2015 - Catalyst Switching Update

This presentation will cover new and upcoming features for Catalyst Switches, covering everything from the 2K - 6K.

Jay Killion, CCIE #17873, Cisco Systems


Jay Killion

5/6/2015 - Zero to CCNA in 120 Days... and Preparing for other Advanced Certifications

Obtaining Cisco certifications is key to getting your foot in the door to your next job and/or to land that promotion and a raise. Whether you are obtaining your initial CCNA certification or your CCIE certification (or higher), the process to acquiring the certification tends to follow similar steps in the written test preparation process.

This presentation will explore the test preparation process and while its focus is primarily on the CCNA certification it will also cover preparing for higher level Cisco certifications such as the CCNP and CCIE. We will explore in detail what is covered on the CCNA exam(s). Additionally, we will talk about how to “get your head straight” when it comes to allocating your precious time and money resources towards your goal of obtaining your CCNA or other certification. The process presented will help provide you with key resources, strategies and philosophies that, if followed, should allow you to start with a very limited networking background and progress to where you are ready to successfully pass your CCNA test(s). Included in the discussion on resources is a quick introduction to the new and exciting Cisco personal, Virtual Internet Routing Lab (VIRL) software that you will really want to include in your suite of study materials. VIRL addresses many of the limitations of the older GNS3 lab software and allows you to configure routers and switches of various types including IOS, IOS-XR, IOS-XE and NX-OS. Finally, if you are planning on going for a Cisco CCNA certification or higher Cisco certification in the near future, you don’t want to miss this presentation.

Beau Williamson, CCIE Emeritus #1346, metroPCS/T-Mobile


Beau Williamson


na 4/1/2015 - Cisco's hottest new Security product: “Sourcefire with FirePower!”

Todd Lammle will discuss what Sourcefire is and demonstrate with hands-on labs it’s incredible capabilities. We’ll also discuss how the Sourefire works with FirePOWER on the next-gen ASA’s!

Cisco ASA with the Sourcefire sensor brings the most trusted network security IPS together with the most trusted network firewall. It provides multiple layers of protection across the entire attack continuum. Its advanced malware capabilities safeguard against both known and unknown threats. But what really sets it apart from the competition is that it offers unprecedented network visibility through FireSIGHT, so you can capture and see far more information in your network environment. And its full automation reduces capital expenses and provides a simplified approach.

Todd Lammle - World-renowned author, speaker, trainer, consultant,


Todd Lammle


na 3/4/2015 - Cancelled due to icy weather


2/4/2015 - Overlay Networks in the Datacenter

This session will be an introduction to overlay networking in the data center, with a view to other areas in the enterprise and service provider spaces. The fundamental reasoning and principles behind network overlays will be discussed, and we will compare and contrast the different available technologies (Fabricpath, OTV, VXLAN, NVGRE, LISP, etc) in order to understand the pros and cons of each approach as well as the applicability of each to the next generation datacenter. This technologies in this session are mostly vendor agnostic, with an insight into how these are applied via the Nexus 9000 series of switches.

Craig Johnson, Triple-CCIE, Cisco Systems


Craig Johnson

1/7/2015 - Over the Top Routing (OTP)

OTP enables you to quickly and easily deploy remote offices and data centers in multi-carrier IPv4 or IPv6 WAN designs. With OTP, you no longer need to peer and exchange internal routes with Service Providers, create filters and redistribute routes in to and out of their Internet Gateway Protocol (IGP).

OTP simplifies multi-site deployments by utilizing a "route reflector" architecture where all participating WAN routers exchange their internal routes and the data path operates independently from the underlying WAN network thereby facilitating seamless introduction of new branch sites into the customer's WAN network. This greatly reduces operational costs and simplifies WAN deployments.

The session will expose you to various deployment scenarios including point-to-point site connections, route reflectors, dual home, dual providers and encryption for public networks. A solid understanding of routing and EIGRP will be beneficial for attending this session.

Joe Harris, CCIE # 6200, CSE at Cisco Systems


Joe Harris


12/3/2014 - Introduction to Cisco ASA

This session will provide an introduction to the Cisco Adaptive Security Appliance (ASA) family of products. The discussion will start with an overview of the ASA product portfolio, hardware architecture, and software nomenclature. Basic ASA configuration and policy elements will be covered with specific command examples. A walkthrough of the packet forwarding path and the associated features will be presented as well.

This session will also include an overview of Access Control List (ACL) and Network Address Translation (NAT) capabilities. Common deployment scenarios and high availability and scalability basics will be covered as well. The session will conclude with a discussion of ASA troubleshooting tools, including a simple case study.

Andrew Ossipov, CCIE #18483 and CISSP #344324, Cisco Systems


Andrew Ossipov

na 11/5/2014 - No meeting this month due to logistics issue.


na 10/1/2014 - IPv6 in Wireshark - a Hands-on Workshop

IPv6 is the new Internet Protocol. Many technologists use Wireshark for network validation and troubleshooting. This session will cover IPv6 basics and then dive into configuring Wireshark to assist in viewing IPv6 more effectively.

Configuration profiles, display filters, and color rules will be discussed and demonstrated to aid the understanding of what you will be seeing.

Jeff Carrell - Network Security Consultant at Network Conversions


Jeff Carroll
Jeff Carrell

na 9/3/2014 - The Five Steps to Building a Zero Trust Network

Are you worried about the frequency of successful cyber attacks against today’s enterprises?

The current security model is broken ---based on an outdated assumption of trust, and reliance on solutions that don’t provide adequate protection.

Zero Trust promotes an alternative model of “never trust, always verify” as its guiding principle. By establishing Zero Trust principles in critical segments of your network, you can protect intellectual property from unauthorized applications or users, reduce the exposure of vulnerable systems, and prevent the lateral movement of malware throughout your network.

Join John Kindervag, VP and Principal Analyst from Forrester Research as he discusses:

Why traditional network security approaches are failing
Zero Trust – what it is and what it means to you
Progressive approach to creating a Zero Trust architecture

John Kindervag is a Vice President and Principal Analyst with Forrester Research, Inc.


John Kindervag

na 8/6/2014 - Intra-DC Network Design

Explore workload traffic requirements and trends driving classic tiered and/or Clos spine-leaf network models. Including discussion points around Cisco recommended platforms, N7K/N5K/N2K, N3K, N9K (including ACI), etc.

Matthew Wittrock, CCIE 4253, Systems Engineer - Enterprise, Cisco Systems


Matthew Wittrock


7/2/2014 - Cisco ISR 4451-X and Cisco Catalyst 3850 Unified Access Switch

The Cisco ISR-AX offers a powerful suite of services that simplify and secure application delivery from anywhere with network-wide visibility, granular control, enterprise-class optimization, and industry leading security services at up to 30-percent lower prices than competitor standalone options.

With the optional addition of the Cisco Unified Computing System™ (Cisco UCS®) E-Series and Cisco Cloud Connectors, you can now build a complete virtualized application platform in one single box.

Cisco introduces the next generation access layer switch building upon 20 years of IOS richness now capable of supporting both wired and wireless infrastructures from a single platform.

Bobby Acker, CCIE #19310 (R&S/Security), Cisco Systems


Bobby Acker
na 6/4/2014 - Network Inventory and Lifecycle Management with Cisco Active Advisor

Abstract: Cisco Active Advisor is a free cloud-based network discovery, alerting, and reporting service for Cisco devices. Available by itself, or as a component of other Cisco network management applications, it helps reduce network overall risk by keeping users up-to-date on the status of their Cisco products.

More information on Active Advisor can be found at

Aarthi Ramamurthy and Chris Bearman, Cisco Systems


Aarthi Ramamurthy

Chris Bearman


5/7/2014 - BYOD using Cisco identity services engine in a wireless solution

Cisco TrustSec simplifies the provisioning and management of secure access to network services and applications. Compared to access control mechanisms that are based on network topology - Cisco TrustSec defines policies using logical policy groupings.

Jacob Ideji - Technical Lead with Cisco Security team in Richardson


Jacob Ideji
4/2/2014 - Introduction to IOS XR

Developed in the 1990s, the IOS operating system provided solutions for the problems of the internet of the times using the resources available at the time. In the year 2014, we no longer face many of the original problems that IOS solved, and we’re faced with many newer and different obstacles: more users using more bandwidth and demanding 24/7 access. Cisco’s solution? IOS XR.

IOS XR was released to provide a more stable, higher performance, and more user friendly version of the IOS code that many network professionals had known over the past decade. In this introduction to Cisco's best kept secret, we will examine the improvements that IOS XR made over IOS, beginning from the way that processes are handled by the CPU, all the way to the CLI interactions that each user has with the platform. We will also briefly discuss some of the newer more advanced features that are now available because of the new software architecture, complete with a demonstration of configuration and feature enhancements.

Chris Williamson, Cisco Systems


Chris Williamson

3/5/2014 - IPv6 - Build Your Own Lab (with only IPv4 Internet access)

IPv6 is the "new" Internet protocol, although it is 20 years old. However the "when to deploy it" question still looms, but appears to be creeping up fast. IPv6 it is not your dad's Internet Protocol (IPv4) like you know today. It has similarities, it has some differences, and you need to learn about it now, before you have to implement it. However, IPv6 is not a technology you can simply read about and then go turn-it-on, you really need to get in it and become hands-on familiar.

This presentation will include limited lecture about IPv6 basics and cover one specific process of building an IPv6 lab system that provides full IPv6 presence on the Internet via IPv4 only access from an ISP. The system includes multiple routed network segments and multiple client OS's in the demonstration, on IPv4 and IPv6.

There are multiple options for IPv6-over-IPv4 connectivity, some of these will also be discussed and demonstrated.

Jeff Carrell - Network Security Consultant at Network Conversions


Jeff Carrell

2/5/2014 - Cisco Nexus and How it Differs from Catalyst 6500 Series

In this presentation we will show the similarities and differences between the Catalyst 6500 series and the Nexus product line.

Specific attention will be given to technologies supported in Nexus but not in Catalyst. These technologies include VDC, Fabric Path, Fiber Channel, FCoE, and FEX with special attention to OTV and vPC. Overlay Virtulalization Transport (OTV) was specifically designed as a Layer 2 bridging technology over an IPv4 link to support Virtual Machine Workload Mobility applications like VMWare vMotion.

Jack Ross, CCIE


Jack Ross

1/8/2014 - Ushering in a New Era for Data Centers

Application Centric Infrastructure (ACI) . Ushering in a New Era for Data Centers, Cisco transforms next-generation data center and cloud deployments with a solution that radically simplifies, optimizes and accelerates the entire application deployment lifecycle. The ACI and its transformational model will meet the new application demands brought on by a shift to virtualization, mobility and the cloud.

As you will discover in this presentation, this new infrastructure will address the new challenges with an application-centric fabric including hardware and software components. These include ACI-ready Nexus 9000 switches, an application policy controller, application virtual switching and ACI-ready security appliances. An architectural overview of the components as well as a discussion of the benefits will be discussed.

Allen McClure - Cisco Systems Engineer
Temi Ajasa - Cisco Systems Engineer


Allen McClure

Temi Ajasa

12/4/2013 - Cisco Jabber

This presentation is about Jabber - Cisco's state of the art Collaboration tool for today's BYOD workplace. It introduces the different avatars of Jabber and then focuses on two kinds of Jabber - the Telepresence / Video Jabber and the Windows / Desktop Jabber. There will be live demos that showcase Jabber. The session also sheds light on some server/client side best practices to support successful Jabber deployments.

Nasser Khwaja, Collaboration Solutions Architect, General Datatech


11/6/2013 - Troubleshooting Next-Gen Wireless and Data Center Networks

• Packets Don’t Lie
• Is it the Network or the Application?
• Working in Virtual environments including the Nexus 1000V
• Working in Wireless environments doing multiple channel captures and leveraging a Cisco wireless controller
• The Value of Distributed and Forensic Analysis

Speaker: Joe Habib - Director, Global Services, WildPackets



10/2/2013 - IP SLA and Policy Based Routing

Your network up and running. You converged your voice and data environment. You have diversified your connections to the internet. Everything is good to go... or is it? How can you be sure that your network will make the right decisions when it counts the most? What is IP SLA, and how can you use it in your network? How do you take IP SLA information and have it work to your advantage using Policy Based Routing? Let us explore how you can take advantage of IP SLA and Policy Based Routing in your Cisco networking environment.

Speaker: Dan P. Aguilera, Principal at Fidelis Networks, LLC, Internetwork Academy, GlobalNet Training - CCNP R&S CCNP Security, CCNP Voice, CCDP, Cisco DataCenter Specialist, CCSI, CISSP



9/4/2013 - The new CCENT/CCNA R/S: It’s not your Father’s certification!

Todd Lammle will go step-by-step through the new, grueling CCENT and CCNA R/S Certification objectives.

You will learn how these new certifications are nothing like the existing and expiring exams, and if you’re studying for your CCENT/CCNA R/S, then this webinar is for you!

Todd will be handing out dozens of copies of his new, very large CCENT book, pre-release copies of his new ICND2 book, as well as copies of his CCNA Data Center book.

If you’ve been studying for the CCNA (now renamed CCNA R/S), then this seminar is for you.

Speaker: Todd Lammelle – Author, CCSI, CCNA/CCNA Wireless/CCNP/CCSP/CCVP, MCSE, CEH/CHFI, FCC RF Licensed, or


na 8/6/0213 - Building HCS in the Data Center - Ground to Clouds

We will discuss what my task was September 2011 - which was to build the HCS Test / Dev lab from Order to Production environment.

What would we do differently? What did we do right? What are the 5 things we need a much deeper knowledge of?

This should be a really great session... if you know Darrell from past meetings - he's quite a dynamic and knowledgeable speaker.

Speaker: Darrell Rogers, Data Center/Network Engineer Cisco Systems - HCS
Speaker: Tom Murray, Engineer III at Cisco Systems


na No meeting due to the July 4th holiday

6/5/2013 - The ROI of Performance Management

Networks are increasingly complex, visibility is decreasing, and IT staff are spending more time trying to isolate the source of the problems before they can even resolve them. Time is in short supply, while end-user demands are high! Enterprises cannot achieve their numbers or serve their customers with impaired network performance.

Why does it seem to be so hard to convince management of the need to invest in tools that provide the needed proactive visibility, eliminate substantial amounts of time spent resolving problems amidst the network blame game, while restoring end-user productivity, and empowering the business to deliver revenue generating results? In this presentation, learn best practice performance management approaches and the justification tools that you need in this important exercise.

Rick Kingsley, South Central Region Sales Mgr, Network Instruments, LLC.


5/1/2013 - Cisco Unified Computing System Nuts & Bolts

This will be a discussion on the virtualization technologies under the hood of the Cisco UCS platform.

- How is a fabric interconnect different from a traditional switch?
- What is the difference between NPV and NPIV and what is the relationship between the two?
- How does FCoE reduce cabling requirements?
- What is a FEX?
- How do we use SR-IOV to "fake out" an operating system?

We will answer all these questions and more as we explore the concepts that are making UCS a game changer in the data center.

Speaker: Sean Hicks – Managing Principal at General DataTech, L.P.


na 4/3/2013 - A Carrier Evolution - Meeting the Requirements of Moving Applications to Cloud Computing

Tw telecom presents the change of access between applications and end-users as services migrate from customer owned facilities to third-party data centers and cloud computing services. Over the past decade there has been a growing shift in the telecommunications industry from legacy TDM services to more robust and dynamic metropolitan Ethernet infrastructure. Tw will give an overview of the Metropolitan Ethernet Forum and its global industry alliance of over 200 organizations including telecommunications service providers, and network equipment/software manufacturers. Carrier Ethernet solutions have grown to meet the needs of scalable application environments with an ultimate goal of achieving intelligent network solutions with bandwidth on demand requirements between the end-users offices and the data center at the application level.

Speaker: John Schackmann - Network Application Engineer II at tw telecom.
Speaker: Alan Leavell - Senior Network Application Engineer at tw telecom.
Speaker: Bart Rogers - Regional Manager at tw telecom.


na 3/6/2013 - Network Design Clinic

This month we will have our yearly open forum design clinic.

The Network Design Clinic allows for audience participation and the meeting is structured around your questions, network problems, stories and design challenges. Our panel embodies decades of network experience spanning the gambit of network sizes and types – everything from the small-time operator up to networks that have millions of nodes. Bring your network designs or network problems and we will “whiteboard” a solution. We will have drawings for books from our sponsors at Cisco Press.

Speaker: Tom Young, MetroPCS, Cisco R&S, Security and Service Provider CCIE, CCDE
Speaker: Eric Severson, Network Specialties, Cisco CCNP/CCDP and Microsoft MCSE


2/6/2013 - A Todd Lammle Special Appearance

Todd will speak on his experience with the latest information he has on UCS Data Center, Nexus and Data Center CCNA and CCNP. You don’t want to miss this February user group on UCS and the future of networking.

Speaker: Todd Lammelle – Author, CCSI, CCNA/CCNA Wireless/CCNP/CCSP/CCVP, MCSE, CEH/CHFI, FCC RF Licensed, or


1/2/2013- IPv6 is on my Network... but what just happened?

During your IPv6 deployment, various unexplained addressing and access issues have started to occur, some of the issues could be:

Clients received addresses, then lost them, then received them again, now clients can't communicate. Traffic was being monitored on a specific address and all of a sudden it stopped, now it's on a different address. Clients have an address, can access services on the local network, but cannot communicate to the Internet.

This presentation provides a series of mini-studies about IPv6 Neighbor Discovery Protocol to understand where auto-configuration functions may be present in the network, why they may or may not be desired, and what could be configured in the network infrastructure accordingly.

An understanding of what is "running on the network", what is configured in the network infrastructure (routers and/or DHCPv6 services), what are the desired operational parameters, and what are the defined functions of the IPv6 standards, are all required to have a successful IPv6 deployment.

The presentation will feature a live IPv6 demonstration network, where all of these configuration (and misconfiguration) options will be demonstrated on routers, servers, and clients.

Speaker: Jeff Carrell - Network Security Consultant at Network Conversions


Network Administrator’s Toolbox - Leveraging SNMP in IOS Environments

The primary topic is using SNMP as a tool for the network administrator. Tools are simply defined as anything that helps you perform your job. Specifically, we’ll discuss SNMP and how it can be used by a Network professional to address:

  • Daily operations
  • Device discovery and management
  • Backups
  • Configuration

Additionally we’ll discuss how SNMP coupled with scripting languages provides a powerful tool a Network professional can wield.

Bryan Lynn - Network Manager at MetroPCS - 12/5/2012


Cisco Unified Wireless Network Overview

We will discuss the WLC functions, Mobility, and Deployment. This presentation covers a lot of items that network engineers often have questions about. It is around 80 slides.

Steve Acker - CCIE #14097, CWSP, CISSP, Network Consulting Engineer, Advanced Services - WW Wireless Practice, Cisco Systems  - 11/7/2013


IP Multicast Survival Guide - Part II of II

IP Multicast is an “upside down” world where almost everything you’ve learned about IP packet forward is all wrong. However, in the words of Douglas Adams’ Geek Bible, (otherwise known as “The Hitchhiker’s Guide to the Galaxy” ), DON’T PANIC! You too can learn the keys to IP Multicast by attending this two lecture session and then amaze your friends and coworkers with your new ability to do all sorts of “magic tricks” with this technology. (As Arthur C. Clark once said, “Any sufficiently advanced technology is indistinguishable from magic.” IP Multicast is a sufficiently advanced technology in the mind of most people. Ergo, once you master this technology you will be able to perform “magic” in your network.)

* You will also need the WebEx Player to watch the ARF recording of the meeting - download here.

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, MetroPCS - 10/3/2012


IP Multicast Survival Guide - Part I of II

IP Multicast is an “upside down” world where almost everything you’ve learned about IP packet forward is all wrong. However, in the words of Douglas Adams’ Geek Bible, (otherwise known as “The Hitchhiker’s Guide to the Galaxy” ), DON’T PANIC! You too can learn the keys to IP Multicast by attending this two lecture session and then amaze your friends and coworkers with your new ability to do all sorts of “magic tricks” with this technology. (As Arthur C. Clark once said, “Any sufficiently advanced technology is indistinguishable from magic.” IP Multicast is a sufficiently advanced technology in the mind of most people. Ergo, once you master this technology you will be able to perform “magic” in your network.)

Be sure to bring your laptops preconfigured with the GNS3 network simulator as (time and resources permitting) we will try to put together some example networks where we will be able to actually see the magic of PIM in action.

Pick up your GNS3 topology and router configurations here. You will want to load up the final configuration prior to the meeting.

* You will also need the WebEx Player to watch the ARF recording of the meeting - download here.

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, MetroPCS - 9/5/2012


Automating and Securing Connectivity for the Cloud

The cloud is more than just server hardware. It is also the automation that allows customers to easily create virtual environments in a consistent and secure fashion.

Creation of a virtual machine itself is a small part of the cloud process. Equally important is the automation of the management, network and security environments. In order to provide customers with this capability, a set of automation tools is available for the Unified Computing System. Chris will discuss the automation of the cloud environment with an emphasis on the network and security tools. He will perform a live demo illustrating the automation tools.

Christopher Ronderos CCNP/CCDP, Cisco Systems - 8/1/2012


na No meeting due to the July 4th holiday


na Visual Network Troubleshooting and Change Verification - by NetBrain

NetBrain’s dynamic diagram technology provides on-demand visibility into any part of a large network. NetBrain automates network documentation, eliminates manual troubleshooting steps and QA network migrations.

Discover a large network quickly and accurately using a neighbor-walking algorithm
Automate network documentation for network assessment, troubleshooting and design
Automatically create and update Visio diagrams, create assets reports, and design word reports
Troubleshoot network problems visually
Compare configurations, path, routing tables before and after changes

Elton He, Principal Consulting Engineer, NetBrain - 6/6/2012
Boris Perlin, Director of Business Development NetBrain - 6/6/2012



What happened to Cisco, the little router that could?

Cisco has always been a software company - in so much so they could run their proprietary hardware, but really, what are they now? All you hear is server, cloud, storage, virtualization, video, etc….what happened to the little company that became hugely famous for selling awesome routers? Let’s take a look at the “new” Cisco and what they have in store for you in the future.

Todd Lammelle – Author, CCSI, CCNA/CCNA Wireless/CCNP/CCSP/CCVP, MCSE, CEH/CHFI, FCC RF Licensed, or - 5/2/2012


The Virtualized Data Center

The presentation will cover data center design options that help in this age of virtualization. Why are data center designs changing? How can you design a network that is flexible and stable? Topics will include spanning tree and designing around it using features like VSS on the 6500 and VPC with Nexus switches. It will also introduce the audience to Fabric Path.

Tom Trese, CCIE #1865, Systems Engineer, Cisco Systems - 4/4/2012


Zero to CCNA in 90 Days

Obtaining Cisco certifications is key to getting your foot in the door to your next job and/or to land that promotion and raise. Whether you are obtaining your initial CCNA certification or your CCIE certification (or higher), the process to acquiring the certification tends to follow similar steps in the written test preparation process.

This presentation will explore the test preparation process and while its focus is primarily on the CCNA certification it is applicable to almost all Cisco certifications. We will explore what is covered on the CCNA exam(s) and how to “get your head straight” when it comes to allocating your precious time and money resources towards your goal of obtaining your CCNA certification. The process presented will help provide you with key resources, strategies and philosophies that, if followed, should allow you to start with a very limited networking background and progress to where you are ready to successfully pass your CCNA test(s). If you are planning on going for a Cisco CCNA certification (or any other Cisco certification) in the near future, you don’t want to miss this presentation.

Beau Williamson, CCIE Emeritus #1346, Senior Network Engineer, MetroPCS - 3/7/2012


Fun with OSPF and MPLS (part two of two)

Brandon will continue his interactive tour of OSPF routing and MPLS. Through this journey you will learn the basics of OSPF configuration and the link-state advertisement types, reinforced by a detailed examination of the OSPF database. On top of that, MPLS will be enabled and different options configured, which also will be reinforced with before and after “show” commands. Audience participation is encouraged! Bring your laptop with GNS3 and you will get hands-on experience with OSPF and MPLS.

Brandon Smithson, CCIE 19826, MetroPCS - 2/1/2012


Fun With OSPF and MPLS (part one of two)

Abstract: Brandon will lead us on an interactive tour of OSPF routing and MPLS. Through this journey you will learn the basics of OSPF configuration and the link-state advertisement types, reinforced by a detailed examination of the OSPF database. On top of that, MPLS will be enabled and different options configured , which also will be reinforced with before and after “show” commands. Audience participation is encouraged! Bring your laptop with GNS3 and you will get hands-on experience with OSPF and MPLS. Please note that you should have your PC ready-to-go with the GNS3 configurations as there will not be time to do any GNS3 setup or tuning.

In the presentations download, are the OSPF intro and tasks, the OSPF answer key, the OSPF references, the initial router configs, and the router configs for after OSPF tasks are completed (but before MPLS). The “router-configs-after-ospf” will be useful if someone wants to just paste them into their topology right before the MPLS class.

Brandon Smithson, CCIE 19826, MetroPCS - 1/4/2012



Network Design Clinic

This month we will have our yearly open forum design clinic. The Network Design Clinic allows for audience participation and the meeting is structured around your questions, network problems, stories and design challenges. Our panel embodies decades of network experience spanning the gambit of network sizes and types – everything from the small-time operator up to networks that have millions of nodes. Bring your network designs or network problems and we will “whiteboard” a solution. We will have drawings for books from our sponsors at Cisco Press and from Todd Lammelle.

Tom Young, MetroPCS, Cisco R&S, Security and Service Provider CCIE - 12/7/2011
Eric Severson, Network Specialties, Cisco CCNP/CCDP and Microsoft MCSE  - 12/7/2011
Brendon Smithson, CCIE, CCWLP, MCSE. Sr. Member of Technical Staff at MetroPCS - 12/7/2011



TRILL / Fabricpath an Overview:

This presentation will include an explanation of layer 2 multipathing and its benefits over spanning tree, the function of a RBridges (including IS-IS flooding, Hello packets, the SPF algorithm and the use of the link state database), information tracked by the RBridge (unicast and multicast MAC addresses), address learning in TRILL, TRILL encapsulation, and the Fabricpath/TRILL relationship.

Bob Cunningham, CCNP, CCNA, CCSI, COS1, CISSP - Global Knowledge - 11/2/2011



vASA - A New Cisco Product

With security concerns being the most frequently cited obstacle to large scale virtualization projects and adopting cloud computing models, Cisco will be greatly enhancing its industry-leading virtual security infrastructure with this product. The new virtual ASA introduces a wide range of security services that have not been available from Cisco before in a virtual form factor. The virtual ASA will enable more sophisticated security policies that better align with business and compliance needs in the virtual data center.

Some of the key aspects of this new virtual ASA product:

- The ASA family is one of the most deployed and trusted security products in the industry, with over 15 years of security experience and more than 1 million appliances installed, and now is available in a virtual form factor for greater flexibility in the data center.
- Virtual ASA runs the ASA feature set, so important capabilities such as VPN , NAT, and much more will be available in addition to firewall capabilities.
- The Virtual ASA will run on top of the Nexus 1000V virtual switch, fully leveraging the VM and traffic visibility provided by the Cisco virtual fabric, as well as optimal traffic steering to the security node from the VM and virtual switch.

Rather than replacing our VSG virtual firewall, the virtual ASA will be a strong complement for the current VSG capabilities. The virtual ASA includes security functionality most often deployed at the edge of an organization and the edge of the data center. As such, it is better suited for North-South traffic into the data center and virtual applications. VSG, with its greater visibility to VM-specific and application attributes, enforces security policies between applications and virtual machines, and is more East-West traffic oriented.

Joe Harris, CCIE# 6200 (R/S, Security, Service Provider) - Cisco Systems - 10/5/2011



Network Management Best Practices and Solutions from SolarWinds

Managing today’s network infrastructure can be a daunting task. Many organizations lack the tools and experience necessary to develop and implement a competent network management system and strategy. As a result, many companies are lacking the tools and processes that could be used to make their lives easier and help improve the services that they provide to their users.

During this presentation we’ll dissect the art of managing networks and discuss best practices for each of the main components. Additionally, we’ll use SolarWinds network management software to demonstrate the concepts discussed. Some of what we’ll discuss will include: Establishing baselines, Managing SLAs, Analyzing network traffic and Understanding the users’ perspective.

Nikki Jennings, Director of Sales Engineering and Josh Stephens is Vice President of Technology - 9/7/2011



The Future of IT and the Direction of Certification

Since beginning his writing career with Microsoft technology, Mr. Lammle has authored over 25 books on Cisco certification subjects. Widely regarded as a best selling author, even surpassing the sales of Cisco Press, Mr. Lammle continues to instruct approximately twice per month.

He is available for half-hour to full day sessions covering a multitude of certification and training topics related to the Cisco networking technologies. To schedule a private class with Mr. Lammle, contact our office at 877-743-2145 to discuss your specific requirements.

Special guest speaker: Todd Lammle, GlobalNet Training and Consulting, Inc. - 8/3/2011


na No meeting for 7/6/2011


Introduction to 802.1x Authentication and Control

802.1x defines port-based authentication as a client-server based access control and authentication protocol which restricts unauthorized clients from connecting to the network. In the presentation the basic components of an 802.1x authentication control scheme will be described. The configuration, operation and troubleshooting of 802.1x will be discussed as well as how 802.1x fits into the broader Cisco security framework.

Tim Rowley, CCIE #25960(Security), CCSI #33858, CISSP; Technical Instructor / Consultant for CCBOOTCAMP - 6/1/2011


Enhancing visibility in the branch office

Today’s networking environment presents an ever-changing landscape where the branch site is becoming more complex, while shrinking the physical footprint. Virtualization of resources, cloud computing, and WAN technologies like MPLS, make it difficult to maintain the same view into the branch office as was once available with a centralized computing model. We will present a way to regain that visibility in a green way while leveraging; and perhaps expanding, your existing knowledge of the Cisco ISR platform.

Austin Smith, Senior Sales Engineer at NetScout Systems, Inc. - 5/4/2011


Get Your Visitors Connected - An Introduction to Cisco NAC Guest Server

Does your business have a need to provide internet access for visitors, contractors, or partners? This presentation will give you an understanding on how the NAC Guest Server can simplify providing guest access in your environment. It will also include various recommended design options to show how NAC Guest Server can be implemented into your environment, as well as a brief demonstration.

Tim Wellborn, CCIE #15397 (Voice) & Sangeeta Kodukula, both are Systems Engineers at Cisco Systems - 4/6/2011


The Evolution of Spanning Tree Strategy

The CCNP and CCNA certification programs are currently espousing two different strategies for Spanning Tree. Since the CCNP curricula was more recently revised it reflects a newer philosophy with regards to handling Spanning Tree issues. We'll review these two strategies, and their impact on VLANs, VTP and Switch Topology.

John Pherson, Technical Architect and Instructor at Global Knowledge - 3/2/2011


BGP Routing: Controlling Path Determination with Local Preference and MED attributes

The intent is to use GNS3 to implement a multi-router BGP network. The scenario involves a company that has two connections (a fixed T1 and a metered T1) to a single ISP. Due to cost considerations, exclusive use of the fixed T1 is desired. The metered T1 should be only in the event of a failure of the fixed T1 link.

John L. Morgan, Sr. Professor, A+, Linux+, MCSE, CCNA, CCNP, CCNA Security - DeVry University - 2/2/2011



Introduction to 802.11n and Cisco CleanAir Technology

Troubleshooting performance on wireless networks is challenging without the right tools. As more and more Wi-Fi enabled devices enter the marketplace and wireless networks become more mission critical, it is important that IT teams prepare to more effectively manage network resources in order to maintain a robust, high-performance wireless network. If you are tired of chasing down "phantom" interference problems and want to optimize the performance of your wireless network, let us show you how the latest developments from Cisco can dramatically simplify and even automate these tasks.

Discover how the revolutionary new Cisco CleanAir system can:

• Detect RF interference that other systems can't see
• Identify the interference source and locate it on a floor plan
• Provide automatic adjustments to optimize wireless coverage around interference
• Enable faster troubleshooting for less downtime
• Simplify wireless policy enforcement

Natalie Lai – Wireless Systems Engineer at Cisco Systems - 1/5/2011



Business Video Architecture

Video will be over 90% of the Internet traffic in just a few years and many business organizations are increasing the use of video in order to increase productivity and reduce cost.

This presentation explores business video use cases, business video components (Medianet, Media Service Interface, and 3 types of video solutions), and architectural blueprint of business video.

JJ Kim, CCIE #5292 – Technical Solutions Architect at Cisco Systems - 12/1/2010


Managing Your Network for Availability

This presentation will touch on a number of topics. The basic premise will be that if you want to minimize downtime and get the most from your IT assets, a network must be managed to achieve or exceed the design parameters . A brief discussion of network design, design for availability and how it relates to management strategy will ensue. The basics of network management will be discussed and how various techniques and tools can be used to effectively manage your network. The speaker will provide guidance on how you can get started in network management or improve on the existing management strategy that you have in place.

Eric Severson - MCSE, MCSA, CCNP, CCDP; President, Network Specialties, Inc. - 11/3/2010



Cisco’s new Mobility in Motion – Changing the way we network forever!

For more than 33 years we’ve using the OSI model as our definitive reference for building and troubleshooting our networks, heck, it even helped us create CompUSA because of the standardization we were able to derive, hold that CompUSA thought - yes, I meant to write that.

The OSI was created with various layer functions, where changes in one layer would not affect any other layers responsibility. Basically each layer became its own autonomous system that did not understand, nor care, what the other layers were doing - each layer was and is only concerned with its own primary duties. For example, the Network layer receives a Segment from the Transport layer, which in turn creates a Packet and hands it to the Data Link layer (LAN driver), which Frames it for transmission onto the local LAN…. (add big yawn here….), but wait, one more thing….to provide more foundation, if we are using routers and a routing protocol, the routing tables are only updated by other routers (in concept, and assuming dynamic routing - okay, try not to start snoring here)…..but wait, wake up and read on, because I have something exciting to tell you about!

Cisco has decided to bring some huge changes to the networking world by shaking up the OSI model as we know it - making the OSI model as old school as CompUSA (the idea of CompUSA didn’t go away, it just evolved into Best Buy, and the same with the OSI - it’s evolving big time!), and Cisco is going to do it with Mobility in Motion, and create new mobile wireless standards at the same time!

Come to this informative and all-so-very new talk on Cisco’s plans for taking networking to a level we’ve never conceived by using cross-layer feedback to create the “smart grid” of your wireless mobile networks.

In addition to a fresh perspective on the mobility of the future, I will discuss the current Cisco Wireless certification and have a drawing for my new CCNA Wireless study guide!

Todd Lammle, CCSI, CCNA/CCNA Wireless/CCNP/CCSP/CCVP, MCSE, CEH/CHFI, FCC RF Licensed - - 10/6/2010



An overview of the Cisco SSL VPN architecture will be presented. Client-based remote access using the Anyconnect client and client-less access using WebVPN portals will be discussed. New features for SSL VPN clients in the ASA 8.0/ASDM 6.0 software will be shown. The features of Cisco’s Secure Desktop and how it works with the VPN architecture will be also explained by Bobby.

Bobby Acker, Systems Engineer, CCIE #19310 - Cisco Systems - 9/1/2010


na IPv6

This session is an introduction to IPv6, the next version of IP. Basic addressing concepts, address resolution, basic routing, and some deployment options (dual-stack, tunneling, translation techniques) are covered along with configuration examples. Topics include the need for IPv6, IPv6 technology and addressing structure, ICMPv6 and neighbor discovery (ND) protocol, IPv6 configuration, overview of IPv6 routing protocols (RIPng, OSPFv3, ISIS for IPv6 and MBGP). This session is designed for network engineers interested in deploying or learning about IPv6. Attendees should have a solid understanding of IPv4 and basic routing concepts.

Tom Young - (CCIE #13484, R/S, Sec, SP) - MetroPCS Wireless, Inc. - 8/4/2010


GNS3 Graphic Network Simulator

The GNS simulator rocks! For those of you that have tried Dynamips, this is the new kid on the block. Dynamips and Dynagen have been greatly enhanced by the addition of a graphical front-end. With this product you can create network simulations using drag-and-drop. As with Dynamips, the routers that you create in your simulations actually run IOS so you are not limited in what commands the simulator will run. GNS supports several different router models as well as PIX and ASA.

This presentation will provide an overview on the GNS product and cover installation, configuration and specific recommendations to make GNS3 work well for you. GNS3 will be running on Windows 7 and will be used to provide live demonstrations. The presenter would welcome a lively audience participation and would encourage those with GNS/Dynamips experience to contribute their own ideas and recommendations.

Eric Severson - CCNP/CCDP/MCSE - Network Specialties, Inc - 7/7/2010



Service Advertisement Framework

A New Approach to Call Routing and Dial Plan distribution. The Cisco Service Advertisement Framework (SAF) enables networking applications to advertise and discover information about networked services within an IP network. SAF provides a mechanism that allows applications to discover the existence, location, and configuration of networked resources within networks. The Cisco Unified Communications call control discovery feature leverages the SAF network service to facilitate dynamic provisioning of inter-call agent information and to learn about other call agents in the network. Come and learn this new feature in Unified Communications 8.0 on a new approach to call routing.

Temi Ajasa, Systems Engineer - Cisco Systems - 6/2/2010



Cisco Nexus 7000 Hardware Architecture.

We will provide a thorough understanding of the Cisco Nexus™ 7000 switching architecture, supervisor, fabric, and I/O module design, packet flows, and key forwarding engine functions

Kevin Downes, CCIE# 1987 - Principal Consultant at General Datatech - 5/5/2010


Cisco Nexus/UCS Layer 4-7 Performance Monitoring

With datacenter consolidation rapidly taking place involving the Cisco Nexus and UCS architectures, proactive performance visibility of these virtualized applications, combined with data access methodologies, becomes a critical, oft overlooked challenge. Lets meet this challenge head-on as network engineers who must continually fend off the blame for the performance problems and present ways to access and then proactively monitor performance deep into layer 7.

Rick Kingsley, Cisco Certified Engineer with General Datatech - 4/7/2010


The Cisco Unified Computing System (UCS)

The Cisco Unified Computing System solves data center challenges by combining network, computing and virtualization resources. We will explore what this means to the Data Center and discover how starting with a blank sheet of paper led to a next-generation solution for computing.

An introduction video can be found on YouTube.

Frank Jimenez, CCIE #5738 - Systems Engineer, Cisco Systems - 3/3/2010


Networking in Virtual Environments

An introduction to the components that make virtualization work and the common ways virtual environments are managed. Covering specifics about networking in virtual environments that all network administrators will need to understand within the next 5 years. Followed with A brief description of public and private cloud computing and what each is useful for and what pitfalls to avoid.

Karen Lynn Rhodes, Enterprise Sales Engineer with Layered Tech - 2/3/2020


na Cisco Integrated Services Routers and Cisco Architecture Initiatives

The Cisco new ISR G2 portfolio offers as much as five times the performance of its predecessor, the Cisco ISR, the industry’s most widely deployed router.  An overview of the new ISR G2 router line will be presented by Cisco in this presentation along with a brief discussion of Cisco's new architecture initiatives.

Due to an internal use only restriction, the presentation slides will not be available.

Chris Ronderos - Systems Engineer at Cisco Systems
Brendon Smith - Systems Engineering Manager at Cisco Systems - 1/6/2010


Cisco Wireless: A second look

Robert will present an overview of the lightweight wireless system and how it compares to the autonomous systems. He will cover cover the newer features of the controllers and WCS focusing and some of the newer security features including auto containment on a per SSID basis and port interface tracking to shutdown rogue devices.

Robert Davis, wireless engineer, Flair Data Systems - Flair Data Systems - 12/2/2009


na The Nexus 5000 Series

The Cisco Nexus 5000 Series is designed for data centers transitioning to 10 Gigabit Ethernet as well as those ready to deploy a unified fabric that can handle their LAN, SAN, and server clusters. The switch family, using cut-through architecture, supports line-rate 10 Gigabit Ethernet on all ports while maintaining consistently low latency independent of packet size and services enabled. It supports a set of network technologies known collectively as IEEE Data Center Bridging (DCB) that increases the reliability, efficiency, and scalability of Ethernet networks. These features allow the switches to support multiple traffic classes over a lossless Ethernet fabric, thus enabling consolidation of LAN, SAN, and cluster environments. Its ability to connect FCoE to native Fibre Channel protects existing storage system investments while dramatically simplifying in-rack cabling.

Kevin Downes CCIE# 1987 - Principal Consultant, General Datatech - 11/4/2009


QoS Best Practices

This presentation will focus on design best practices for implementing QoS in your network. The best practices are taken from the Cisco Enterprise QoS SRND document, used as the primary QoS document for IP Telephony installations. The presentation will include brief overviews of the technology, Campus QoS Design, WAN and Branch QoS Design, and Network Management.

Tom Young - (CCIE #13484, R/S, Sec, SP) - MetroPCS Wireless, Inc. - 10/7/2009


Introduction to MPLS

Multiprotocol Label Switching (MPLS) is a key technology for delivery of IP services. It is the preferred method of WAN connectivity offered by service providers. It has been added to the R&S CCIE written and lab exams which will take effect in October. More and more enterprises are using it for virtualization and other services. If you would like to dig into the technical details of MPLS, this presentation is for you.

We have permission to use an excellent Cisco Live 2009 presentation on MPLS. This session highlights the applications and benefits that MPLS solutions can offer to service providers and subscribers, communicating the depth and breadth of Cisco MPLS solutions. In-depth technical discussions take place around MPLS architecture and applications such as Layer 2 and Layer 3 VPNs, traffic engineering, QoS, and management and security aspects of each solution. Basic configuration commands for each component are also summarized.

This presentation download also includes the Dynamips / GNS3 and router.cfg files that were used in the presentation.

Tom Young, CCIE #13484 (R/S, Security & Service Provider) - MetroPCS Wireless, Inc. - 9/2/2009


MPLS – A User Perspective

This presentation will focus on the experiences of MPLS network design and implementation from the user perspective. Our featured speakers have many years of experience in traditional network technologies as well as being involved with recent MPLS implementations for their customers. This promises to be a practical and informative session as well as an excellent tutorial for those seeking to broaden their understanding of how to adopt MPLS technologies in their networks.

Roger Mueller, Manager of Global Infrastructure  - Terex Corporation - 8/5/2009
Eric Severson CCNP/CCDP/MCSE - President of Network Specialties, Inc. - 8/5/2009


na Network Design Clinic

Here's your chance to have all of your network questions answered. Bring your design questions and our panel of experts will provide answers. This month's session will be an open forum for discussion of your network designs. In past design clinics this has provided lively, informative discussions and valuable network design assistance. Be sure to join us for this event!

Tom Young, CCIE #13484 (R/S, Security & Service Provider) - MetroPCS Wireless, Inc. - 7/1/2009
Mark Egan, CCIE #8775, Network Consulting Engineer - Cisco Systems - 7/1/2009
Eric Severson CCNP/CCDP/MCSE - President of Network Specialties, Inc. - 7/1/2009


Enterprise IP Multicast Design and Troubleshooting

IP Multicast is fundamentally changing the way we live, work, play, and learn by providing innovative solutions that are simple, highly available, virtualized, open, and safe. As organizations look for cost-effective, bandwidth-conserving technologies for media-rich and simultaneous-user applications, IP Multicast has gained serious attention. Understanding IP multicast design and how to troubleshoot the control-plane permits network engineers to effectively plan and support multicast applications in concert with the rest of their business-critical infrastructure.

Maurice Flint, CCIE #9003, Network Consulting Engineer - Cisco Systems - 6/3/2009


na Dense Wavelength Division Multiplexing - multiple 10G circuits over fiber

This presentation will cover the state of the art in Cisco's DWDM product is 80 10G systems over a single pair of fibers. 40 gigabits is also available and evolving. We will cover the principles of DWDM, it's application in IT backup systems, and how data may be directly connected to DWDM systems in the ONS 15454 MSTP product line.

Brent Bergen - Cisco Systems - 5/6/2009


Using TCL / Expect to Administer Networks - Part I
Using TCL / Expect to Administer Networks - Part II

Many administrators are resistant to learning programming or scripting techniques, deeming them "out of scope" for their particular responsibilities. What many fail to realize, is that by learning some basic programming concepts they can make their jobs easier and exponentially increase their productivity. TCL and Expect illustrate this by giving the network administrator flexible tools to automate interactive (console) sessions with network devices. It can also act as a powerful framework which ties several applications together within a single logic model. TCL and its popular extension Expect - truly let you do more with less...

Dave Mitchell, NCE - Cisco Systems - 3/4/2009
Dave Mitchell, NCE - Cisco Systems - 4/1/2009


A Visual Path to Become CCIE, or CCNP

NetBrain workstation is the industry-first map-based network troubleshooting, discovery and documentation solution. The founder and CEO of NetBrain will give a presentation of how NetBrain may be used to learn hard CCIE skills using knowledge map as the carrier with a group of peer CCIE-seeker. He will also demo the software for advanced network troubleshooting, discovery and network documentation. Key customers include BT, Thomson-Reuters and Fidelity. NetBrain Technologies, will offer all attendees free software to enable a group of network professionals to earn their CCIE differently – using visual map. NetBrain workstation, a software solution featured with data-driven map will be handed out after the seminar. DFW Cisco User Group members may download NetBrain Workstation here, then send an e-mail to to get the CCIE lab.

Lingping Gao, CCIE #6625 is the founder and CEO at NetBrain Technologies, Inc. - 2/4/2009


Bridging the Gap between Telecom and Data Circuits - Understanding how Cisco equipment works with telecom circuits.

This is an overview of how the many telecom circuits work with Cisco Equipment. If you are a data engineer or a voice engineer, you will find value in this presentation. There are many challenges when working with the phone company. This information will prepare you to plan for the “unexpected”, allowing you to be proactive when turning up new services, or changing existing services.

Thomas Dillingham - Source Inc - 1/7/2009



Unified Communications 7.0 – An Overview

With the launch of the Cisco Unified Communications 7.0 Product Suite, a number of new capabilities are available. This includes both user-facing features and appliance-based performance and configuration features. This presentation will serve to cover many of the more significant features on both fronts.

Brian Morgan, CCIE 4865 is a Unified Communications CSE at Cisco Systems - 12/3/2008


Router Security Strategies: Securing IP Network Traffic Planes

Once again the DFW CUG has permission to use a Cisco Live 2008 presentation! This presentation covers many security mechanisms, with an emphasis on Control Plane Policing (CoPP). CoPP protects the router/switch processor from traffic overload. This presentation focuses on identifying traffic, applying policy to mark traffic and adjusting rate limits on the policy. We will focus on captures to and from the RP. We will also send various attacks to the RP and watch how CoPP mitigates these attacks.

Will Brown, CCIE Security #18542, CISSP, GIAC, CEH - MetroPCS Wireless, Inc - 11/5/2008


Cisco Nexus 5000

The Cisco Nexus 5000 Series, part of the Cisco Nexus family of data center-class switches, delivers an innovative architecture to simplify data center transformation by enabling a high-performance standards-based Ethernet unified fabric. The platform consolidates separate Local Area Network, Storage Area Network, and server cluster network environments into a single unified fabric. This presentation will focus on the new technologies, data center benefits, platform details, and network architecture which makes the Nexus 5000 the perfect solution for next generation, virtualized server, data center environments.

Dana Burch, CCIE #2215, CISSP, Systems Engineer - Cisco Systems - 10/1/2008


Advanced Enterprise Campus Design Alternatives: Routed Access and Virtual Switching System (VSS)

This session features two emerging options for campus network design. It focuses on best practices applicable to deploying highly available campus architecture to new design options similar to the traditional spanning tree based L2 access design. New design options covered are Routed Access Design and Virtual Switch Design. In Routed Access Design options, leveraging Cisco hierarchical campus model, deployment of EIGRP and OSPF routing protocols throughout the campus with particular emphasis at the access layer are discussed in detail in the context of fast convergence. The second approach will examine the newest and groundbreaking concept of virtual switch in Cisco's hierarchical campus model. The Virtual Switch design fundamentally changes how network is designed with the innovation of eliminating loops in L2 networks whilst enhancing resiliency and providing fast convergence. This session was given at Cisco Live 2008.

Tom Young, CCIE# 13484 - MetroPCS Wireless, Inc - 9/3/2008


The Internet Threat Horizon

The Internet has continued to evolve; it now encompasses a wide variety of platforms and applications. In this ever-changing environment, security threats have begun to emerge from some of the most unexpected places. This is not a presentation on the latest security widget from Cisco; instead come take a peek at the future, learn about the next generation of security threats, and explore what the changing landscape of the Internet means to security.

Frank Jimenez, CCIE #5738, Systems Engineer with Cisco Systems - 8/6/2008


ASR 1000 Technical Deep Dive and Integration with Unified WAN Service

The Cisco ASR 1000 Series Routers are an innovative new line of Cisco routers designed to address the emerging needs of the Unified WAN Services edge. While combining the best attributes of existing Cisco routers, the Cisco ASR 1000 Series Routers deliver a resilient and secure next-generation WAN infrastructure, with powerful performance and scalability for embedded services. This discussion will go through the technical attributes of the ASR 1000 series, discuss Cisco's placement in the network architecture and explore solutions where the ASR is the optimal fit.

Corey Kaiser, CCIE R&S, BSEET Degree - Cisco Systems - 7/2/2008


na The Cisco Nexus 7000 Series

Come and explore the Cisco Nexus 7000 Series: the latest innovation platform for Data Center infrastructure. It is designed to meet the requirements of the most mission-critical data centers; it delivers continuous system operation and virtualized, pervasive services. Its innovative design is purpose-built to support end-to-end data center connectivity. We will discuss the technology introduced with this platform and how it positions the Data Center for future growth.

Frank Jimenez, CCIE #5738 - Cisco Systems - 6/4/2008


Design Clinic: Voice Architectures for the Corporate Branch Office

Many customers are searching for ways to provide better voice service to branch/remote offices, increase feature transparency, provide company-wide voicemail and of course reduce costs. During this session we will explore the primary architectures to achieve these goals. We will look at solutions that fit most any size company with more than one location and include 1-2 person sites through large branch offices.

Tim Wellborn, CCIE Voice #15397 - Cisco Systems - 5/7/2008


Introduction to Embedded Event Manager

Embedded Event Manager is a programmable subsystem that runs on IOS. It allows Network Administrators the ability to automate Reponses to specific events that occur on the switch. It is flexible and customizable and used to enhance High Availability, Serviceability, and Security. We also briefly cover TCL scripting.

Joe Horgan, CCIE #16542 - Cisco Systems - 4/2/2008


Leveraging Cisco IOS for Performance Management

A discussion on how Cisco IOS Technologies can be leveraged to gain a better understanding of network, voice, and application performance. Included in the presentation will be brief demonstrations of products that can utilize Cisco IOS NetFlow, IP SLAs, and Performance Routing (PfR) to provide unique views into what's really happening on the network.

Ward Cobleigh - Fluke Networks - 3/5/2008


Design and Deployment of 802.11 Wireless LANs with Centralized Controllers

Modern Wireless LAN (WLAN) networks require centralized intelligence and control to support advanced security, mobility, location-based services, and VoWLAN. Modern wireless LAN (WLAN) networks require centralized intelligence and control to support advanced security, mobility, location-based services, and voice over WLAN (VoWLAN). These architectures use a system device called a WLAN controller to create and enforce policies across many different access points. By centralizing intelligence within these devices, security, mobility, QoS, dynamic RF management, and other essential WLAN functions can be efficiently managed across a wireless enterprise. Furthermore, this centralized intelligence simplifies management, improves performance, and increases security of large wireless networks. This session treats Cisco centralized WLAN controller systems in detail, covering the architecture and theory of operations down to the packet trace level. Special attention is given to the innovative IETF draft protocol called Light Weight Access Point Protocol (LWAPP).

Tom Young, CCIE# 13484 - MetroPCS Wireless, Inc - 2/6/2008



Network Design Clinic

Our panel of experts will answer your network design question and show you some of the pit-falls of a poor design. Collectively, these guys have over 30 years of experience designing, running and troubleshooting Cisco networks. Emphasis will be placed on security, IP telephony and of course - routing & switching.

Tom Young, CCIE - MetroPCS Wireless, Inc
Mark Egan, CCIE - Cisco Systems
Eric Severson, CCNP/CCDP - Network Specialties - 1/2/2008


Multilayer Campus Architectures and Design Principles

The CUG has received permission to use presentations from Networkers 2007! This session features best practices for deploying an enterprise campus network with an emphasis on high availability. The session contains design and implementation guidance on technology and protocol alternatives like NSF/SSO, HSRP, GLBP, Spanning Tree (PVSTP+), and Rapid Spanning Tree (Rapid PVST+). Software features and design principles for each layer of the hierarchical network model are covered. Detailed examples are presented of failure analysis scenarios and LAN and Interior Gateway Protocol (IGP) tuning related to enterprise networks. Finally the session treats common pitfalls such as asymmetrical routing, unicast flooding, and routing black holes and provides best practices needed to optimize an enterprise campus network to support today’s business applications. This presentation was originally developed and presented by given by Mark Montanez at Networkers in 2007.

The following Cisco design guides can be found at
Camps Network Multilayer Architecture and Design Guidelines, Deploying a Fully Routed Enterprise Campus Network, Designing a Campus Network for High Availability

Tom Young, CCIE# 13484 - MetroPCS Wireless, Inc - 12/5/2007

The New Whitney Release

Whitney release – 12.2(33)SXH release for the 6500 platform by Mark Egan. We will discuss the new train of Native IOS for the 6500 platform and its new features. This presentation should give everyone the information they need to decide if this new train of software would benefit them.

Mark Egan, CCIE #8775 - Cisco Systems - 11/7/2007

ASA / PIX Version 7.2.3 / 8.0 Update

The long-anticipated version 8.0 for PIX will be discussed. New features incorporated in routing, high-availability, domain and LDAP authentication, certificates, secure desktop, access policies, SSL VPN enhancements, application inspection enhancements,

Joe Harris, CCIE# 6200 (R/S & Security) - Cisco Systems - 10/3/2007

Securing IOS in the Enterprise

Cisco Internet Operating System (IOS) provides unique glue that allows deployment of end-to-end security measures on a network of any size. Securing each router is imperative to having an highly available network. Doing so in a fashion whereby security of control plane, management plane and data plane are addressed adequately allows to address infrastructure security in a methodical and manageable fashion. This session allows to explore Cisco IOS old favorites and newest security tricks applicable to match today's demand generated by the security threats.

Security considerations on any network must be carried out in two-fold fashion; security as a feature and security as a (managed) service. Learning how to achieve both whilst addressing stringent network requirements for today's competitive businesses will provide a checklist of security measures already available in Cisco IOS.

Kunjal Trivedi CCIE #3460 - Cisco Systems - 9/5/2007

Route-Flow Fusion: Integrated Routing and Traffic Analysis

IP Networks are not by nature predictable in the way they deliver traffic, with routing automatically changing the paths of application traffic as network elements change state over time. The variability of application or service traffic delivery in large, complex IP networks can undermine engineering assumptions, resulting in mis-configurations, slowed or blocked troubleshooting, and suboptimal design and planning.

This session will introduce route analytics and a new technology that Internet researcher Van Jacobson has coined “Route-Flow Fusion”—a combination of NetFlow and real-time route analytics data that provides visibility, analysis and modeling of the volume, composition and dynamic movement of traffic across an entire network, with very light NetFlow export overhead.

The session will include an overview of route analytics, explain how flow data exported from a few key routers can be mapped network-wide over their actual routes to provide an always-accurate routing and traffic map, and then some example use cases such as “rewinding” the state of routing and traffic to a past point in time for accurate troubleshooting, simulating what will happen to network traffic when moving servers between data centers, and a demo of actual customer routing and traffic network event streams as recorded by route analytics and route-flow fusion technology.

Greg Hooten - Packet Design Inc. - 8/1/2007

Wireshark Ethereal

Measuring Throughput and Performance with Wireshark Ethereal. We will focus on Wireshark-Ethereal protocol analyzer, throughput, bandwidth and packet latency. We will examine network latency. Answering key questions such as: How do we measure latency? How does latency affect your data through put? How do we measure throughput? What are the key components of throughput? What really hurts response time?

We will use a case study “Fast Network, Slow Server” and review a sniffer trace file exploring the components of throughput. In reviewing the sniffer trace file we will show how to measure performance, looking for the bottle necks of throughput. Then we will graph the results, and do all of this using Wireshark-Ethereal protocol analyzer.

Ray Tompkins - Analysis Solutions - 7/11/2007


GET (Group Encrypted Transport) VPN, is a tunnel-less any-to-any-VPN, ideal for use over MPLS networks. We will discuss what it is, how it works, and what sort of network redesign requirements it is intended to solve. I will provide actual configuration examples and will have a live demo running on Dynamips/Dynagen.

Mark Egan, CCIE #8775 - Cisco Systems - 6/6/2007

Cisco State of the Union

The Latest Unified Communications Offerings for SMB. In this presentation we explore the recently announced and much anticipated UC500 for small business and Call Manager business edition. Topic 1.

Cisco on Cisco - How Cisco Secures Its Network. Based on personal experience in Cisco IT, this presentation includes what Cisco is protecting and how. Some of the most effective security solutions used by Cisco IT are highlighted in the presentation. Topic 2.

Faryar Zabihi and JJ Kim - Cisco Systems - 5/2/2007

Network Performance and Traffic Analysis for Cisco Networks.

Come learn about the industry's leading mid-market network management solutions, Orion Network Performance Monitor and Orion NetFlow Traffic Analyzer. These SolarWinds solutions address the needs of network engineers from performance management to fault monitoring to NetFlow Traffic Analysis

Josh Stephens, Director of Technology - Solarwinds


WiMAX and Mobile WiMAX - What is it?

Introduction to WiMAX Communications and IEEE 802.16e. The presentation will begin with a very brief discussion of RF communications fundamentals, including the difference between CDMA and TDMA communication. The presentation will then cover several of the current competing technologies/solutions in the market place. The final section of the presentation will cover what the current state of the WiMAX standard is and illustrating operational changes in RF signaling and network design. Concluding with a typical application difference between WiMAX and WiFi and a Q&A session, time permitting.

Frank Woodyard - Field Service Engineer - Navini Networks - 3/7/2007

na Dynamips/Dynagen

Dynamips is a free software that emulates Cisco routers on your Windows PC. You can emulate multiple routers with Ethernet, Frame Relay, and ATM connections. The routers actually boot Cisco IOS. This meeting will be more of a demonstration than a presentation. The goals of the emulator are mainly: 1) To be used as a training platform, with software used in real world. It would allow people to become more familiar with Cisco devices, Cisco being the world leader in networking technologies. 2) Test and experiment the numerous and powerful features of Cisco IOS. 3) Quickly check configurations to be deployed later on real routers.

Dynamips Cisco router emulator - The Cisco 7200 Simulator
Dynagen - The Dynamips Configuration Generator. Download the Win XP Setup file - it include Dynamips.

Joe Harris, CCIE# 6200 (R/S & Security) - Cisco Systems - 2/7/2007

Fluke Networks Monitoring and Troubleshooting Solutions

Fluke Networks will be discussing current monitoring and troubleshooting solutions that will give IT Staff visibility from the core of the network, out to the user segment. We will be covering the following technologies: 10gig Ethernet - Having a scalable monitoring/troubleshooting solution to integrate into your network support policy. VoIP – On-going support efforts and best practices for device troubleshooting. Cable Certification Vs. Verification – Cabling systems are often over looked when diagnosing end-user complaints. Wireless - Conduct security audits and locate rogue devices, Measure access point signal strength, RF noise levels, and identify capacity problems.

Matt Marchbanks, Mike Rabjohns, Chris Labac - Enterprise Systems - Fluke Networks - 1/3/2007

Turning Back the Hands of Network Time

Network Instruments will show you effective network forensics techniques for root-cause isolation of application, network, and VoIP Call Quality performance issues as well as visibility into User access and intrusion violations at critical points in your network. We will demonstrate advanced packet-level analysis techniques combined with time-based event correlation across massive captures. Now, when the user calls to complain about a problem that happened in the past, there is a way to go back in time and view the problem as they experienced it.

Rick Kingsley & Charles Thompson - Network Instruments - 12/6/2006

na Websense Security Product Suite

The Websense security product suite helps organizations achieve that balance by managing employee internet access and enforcing internet use policies. The result is improved employee productivity, decreased risk of legal liability from employee internet activity, and optimal use of IT resources.

Lawrence Hsieh - Strategic Alliance Manager for Websense - 11/1/2006

below Cisco Systems - State of the Union

Cisco will be doing a presentation with three systems engineers presenting. Each brief 20 minute presentation followed by a open forum roundtable for Q&A on any topic.
- ASA 5505, ASA 7.2 Code and Intellishield Alert Manager
- Meetingplace Video components in version 5.4, DMS and the DME appliance
- WAFS/WAAS review and ISR update

Routing and Switching Security

Joe Harris, CCIE# 6200 - Cisco Systems - 10/4/2006

Meetingplace Video

Faryar Zabihi - Cisco Systems - 10/4/2006


Frank Jimenez, CCIE #5738 - Cisco Systems - 10/4/2006

How the NetQoS Performance Center manages the network for application performance.

NetQoS Performance Center enables integrated end-to-end application performance monitoring, network traffic analysis, and device performance monitoring through a single management console.

Utilizing data sources such as Cisco IOS NetFlow and IP SLA (SAA), you gain insight into all the data needed to resolve performance issues, troubleshoot infrastructure problems, perform capacity planning, and track Service Level Agreements (SLAs), without switching between multiple products. The NetQoS Performance Center integrates data from all areas of your business infrastructure, expedites problem resolution by providing a centralized console for troubleshooting, and empowers all levels of the organization by providing the information needed at the appropriate level.

Rick Witmer, Sales Engineer and & Matt Sherrod, Director of Sales, Southern Region, NetQoS, Inc. - 9/6/2006

Cisco Security Manager

CSM is the new security configuration and provisioning network management system that manages most of Cisco's security solutions. There will be a short CSM Multimedia Demo and Technical Overview consisting of: Differentiating Concepts and High-Power Operational Tools - Firewall Administration - VPN Administration - IPS Administration - Platform Settings Administration.

Mickey Stewart, Cisco Systems - 8/2/2006

Network Quality of Service

All about Classification, Policing, Marking, Queuing, Congestion Control, and Scheduling – An in-depth discussion on different technologies within each area of network QoS.

Brad Bonin, CCIE #4454, Cisco Systems - 7/5/2006

Cisco Adaptive Security Appliance for Perimeter, Intrusion and Anti-X protection

Description, Overview of the Cisco Adaptive Security Appliance and it's advanced security capabilities.  New features versus the older PIX appliances and detail technical information related to performance, security features, and deployment scenarios.  Brief demo of using the Cisco ASDM and configuring the device with firewall policy rules, application inspection rules, and IPS rules.

Fatima Razvi, Systems Engineer, Cisco Systems and
Mickey Stewart, CCIE# 3129, CISSP, CCDP, Systems Engineer,
Cisco Systems - 6/7/2006

Dynamic Multipoint VPN (DMVPN)

With the rapid growth and decreasing cost of broadband, many organizations are migrating from traditional wide area network protocols such as Frame Relay or ATM to VPN solutions. VPNs typically require a lot of manual configuration and have not scaled very well, with enormous configurations on the “hub” VPN device. DMVPN simplifies the VPN configuration, dramatically reduces the hub configuration, allows for dynamically addressed spokes, automatically encrypts the data without requiring manual access-lists, allows dynamic creation of spoke-to-spoke tunnels, supports multicast traffic, and allows zero-touch provisioning of new spokes.

Tom Young, CCIE #13484 R&S, Security, CISSP, Flair Data Systems - 5/3/2006

Cisco Optical Networking
The presentation describes Cisco's SONET and DWDM products. SONET: 15454 MSPP, 15327, 15600, 15310; DWDM: 15454 MSTP, 15216.

Brent Bergin, Cisco Systems - 4/5/2006

Cisco Datacenter Solutions
How is Cisco addressing the growing trends of Server Networking and Virtualization? What is a server switch? What are the tools needed to build cost-effective industry-standard server clusters and provide a foundation for server provisioning and on-demand computing?

Frank Jimenez, CCIE #5738, Cisco Systems - 3/1/2006

Intro to CS-MARS
Cisco Security Monitoring, Analysis and Response System And using CS-MARS to set thresholds for Cisco 5.1 IPS. Learn how to customize the threat threshold to their customers' network to prevent false positives and using CS-MARS to provide a picture of the current network.

Gale Yocom, Security Engineer, Covetrix IT Security Group - 2/1/2006

IP Telephony 1-2-3
An overview of Cisco IP Telephony will be presented with an introduction to Call Manager basics, server set up, switch configuration for voice, IP phone registration. A live demo of IP phone services will be presented.

Marquis Harper, CCIE #14435 - Test Engineer, Cisco Systems - 1/4/2006

Advanced Tactics for Network Analysis

There’s far more to network analysis than merely capturing and decoding packets to discover and identify network issues. During this presentation, the speaker will discuss and present analysis techniques ranging from optimal packet filtering to utilizing the proper packet summary columns to response time analysis to behind the scenes of an expert system.

The lecture will begin with a brief discussion of the pros-and-cons of packet capture using SPAN vs. taps and the optimal placement of your analysis tools. Then, several tips and techniques will be illustrated while presenting two case studies using “live” protocol analysis (No PowerPoint).

J. Scott Haugdahl, CTO WildPackets, Inc - 12/7/2005

Wireless Security Myth-Busting

This presentation focuses on 5 of the most commonly held myths regarding wireless security and why they are ineffective in real-world wireless security deployments. Several wireless security tools will be demonstrated in order to bust these myths. Live demos will include MAC Spoofing, WEP Cracking, LEAP Cracking and WPA Cracking. This should be a good meeting - because you know how we all love cracking on the wireless.

John Kindervag - CISSP, CCNA, Cisco Wireless LAN Support  Specialist and an ISS Certified Engineer - Senior Security Architect - Vigilar -  11/2/2005

na Cisco Clean Access - The NAC Appliance

Cisco offers both appliance - and architecture-based framework approaches to NAC that meet the functional and operational needs of any organization, whether they have a simple security policy requirement or require support for a complex security implementation involving a number of security vendors, combined with a corporate desktop management solution. The NAC Appliance, available as Cisco Clean Access, provides rapid deployment with self-contained endpoint assessment, policy management, and remediation services. This discussion will focus on the NAC Appliance capabilities as well as deployment considerations as well as a real time demo of the software and the management interface.

Ryan Makinson - Cisco Systems - 10/5/2005

Configuring Cisco IP Phone Features and Services

This presentation will review the various features and services supported by the phones. We will discuss the operation and use of the built-in features. We will also cover the various methods for configuring additional Cisco Phone features and services such as conferencing, multiple calls per line, directories, etc. Included will be the use of the Bulk Administration Tool, installation of XML-based services, creation of custom button and soft button templates, and setting up user-configurable features.

John Pherson, Certified Cisco Systems Instructor (CCSI #20124) -  Global Knowledge - 9/7/2005

na Cisco Security Strategy & Vision: Self-Defending Networks

Eddie Kemp - CCIE #8374, Channels SE - Cisco Systems - 8/3/2005

na VoyenceControl!

In this session, Voyence will demonstrate centralized configuration and change management of network devices and integration of VoyenceControl! with CiscoWorks RME. The integration provides the ability to pull device configurations and detailed hardware information through RME and store the data in a centralized repository as well as push configuration changes through RME to Cisco devices. Compliance Auditing is simplified with a complete repository of device data and change history as well as compliance reporting.

Aaron Dixon - CCIE # 6460 - Voyence - 7/6/2005

Cisco's Wireless LAN Strategy

This session covers the Airespace acquisition and what it means to the future of Cisco's wireless products.

Todd Reagan - Cisco Systems - 6/1/2005

How do I know if my Voice T1 port is really working?

When your Data T1 didn't work you had to prove that the equipment wasn't the problem. Guess what? Same thing with Voice T1s. And because it is on an IP system - Cisco at that - your credibility diminishes with the folks at the CO. I recently had to prove to myself as well as the carrier the equipment was functional. This session will focus on the steps, and hardware, necessary to perform this quick check

Tim Wellborn - CCVP, CCDP, CCNP, CQS-IPTDS, CQS-IPTSS, CQS-IPTOS - Cisco Systems - 5/5/2005

Route Analytics

This month’s presentation will be on a new technology called route analytics, invented by Judy Estrin (former CTO of Cisco) and Van Jacobson (former chief scientist of Cisco and distinguished Internet researcher). Route analytics is a new, Layer 3 network management technology that allows network managers to see, analyze and troubleshoot an entire network’s routing. The session will briefly cover the concepts behind the technology, and will focus on examining routing phenomena using databases of routing recorded in production networks to show visualizations, routing topology and analysis of actual routing issues encountered in production networks.

Scott Ivan – CCIE #5839 – Systems Engineer for Packet Design - 4/6/2005

Wireless, Now and Then

This presentation will discuss wireless communication from the standards to real world application, from 802.11a/b/g to 802.16/802.20, the road to global coverage for Wimax. With advances in technology, complex number algorithms used to secure wireless communications are becoming more and more common place. We'll look at the devices, the technology, and the application pitfalls. We'll discuss some design considerations, and useful resources in implementation.

Lee Bradshaw - Senior Network Consultant - Networks Now - 3/2/2005

Cisco Wide Area File Services (WAFS)

Cisco Wide Area File Services (WAFS) is an emerging technology solution designed to overcome performance issues associated with using standard file access protocols and provides IT administrators the means to simplify management and increase protection of their file-based data located at remote branch offices. We'll discuss what the technology is and what it isn't, and where it fits in the overall design of your network.

Frank Jimenez - CCIE 5738 - Cisco Systems - 2/2/2005

IP Communication for small offices

IP Telephony, now often called “IP Communications”, is making serious inroads into enterprises and service providers, but how can small offices take advantage of some of the technological advantages in a cost effective way? This month we’ll discuss two products from Cisco that allow us to do just that: Call Manager Express (CME) and Cisco Unity Express (CUE). We’ll cover how and where to position these products (and where NOT to) and also provide some design recommendations.

Anil N. Pudhiya Vettle – CCIE 7189, CCSP, IP Telephony Design Specialist - InterNetwork Experts - 1/5/2005

Introduction to Cisco Integrated Services Routers (ISR)

Cisco recently redefined best-in-class routing with the industry’s first portfolio of routers engineered for secure, wire-speed delivery of concurrent data, voice, and video services. We will explore the architecture, features and functionality delivered in the new 1800, 2800 and 3800 series routers.

Tim Wellborn – CCNP, CCDP, CQS-IPTSS, CQS-IPTDS – Cisco Systems, Inc. - 12/1/2004

Securing Cisco Routers

Can a Cisco router be hacked? You bet! This session will cover some cool utilities from Cisco to easily secure your routers. They work well, but what exactly do they do? We'll take a look under the hood and explain the function of many specific commands.

Tom Young - CCIE, CISSP, CCSE, and Sniffer Certified Expert - Pier 1 Imports - 11/3/2004

The Self Defending Network Initiative

During this session we will discuss various networking security challenges and how to mitigate them in the network. Topics will be 802.1x, Network Admission Control, and some IOS/CatOS security features that will help you protect your network.

Raymond Jett, CCIE, CISSP, and CCSP - Cisco Systems - 10/6/2004

na Network Design White-board Clinic

Our panel of experts will answer your network design question and show you some of the pit-falls of a poor design. Collectively, these guys have over 30 years of experience designing, running and troubleshooting Cisco networks. Emphasis will be placed on security, IP telephony and of course - routing & switching.

Troy Workman - CCIE, CCSP, CISSP, MCSE, 12 yrs - InterNetwork Experts.
Matt Seppeler - CCNP, CCDP, MCSE, 7 yrs - InterNetwork Experts.
Mark Egan - CCIE, 14 yrs - Intuit - 9/1/04

Cisco’s SWAN wireless architecture and the Wireless LAN Solution Engine

This session covers Cisco’s Structured Wireless Aware Network and the Wireless LAN Solution Engine. Topics include rouge access point detection, self-healing wireless networks, and assisted site-survey functionality. In addition, Cisco’s Wireless Domain Services and Cisco’s product roadmap for wireless will also be covered.

Loyd Thompson, MS, WLDS, WLSS – Cisco Systems - 8/4/2004

Responding to Security Incidents

Has your network been attacked by worms or by hackers? This presentation covers incidents, nature of attacks - including symptoms and artifacts, phases of incident response, tools and techniques, and a case study. The goal of this presentation is to give you knowledge of various procedures, tools, and techniques you can use to respond to security incidents.

Raymond Jett, CCIE, CCSP, CISSP - Cisco Systems, Inc - 7/7/2004

Decru's Datafort technology

Enterprise and government organizations are increasingly concerned about the security of their vital data assets. The Decru DataFort storage security appliance incorporates wire-speed encryption, access controls, authentication, and logging to deliver unprecedented data security. Bruce will present on how existing security vulnerabilities within a SAN infrastructure can be addressed with Cisco switches and Decru's Datafort technology.

Bruce Hawkins - TRIVAD Inc.'s Storage Security Practice - 6/2/2004

Wireless Mobility

We'll be some of the first people to see the new mobile router 3200 in action! Todd will present how the new mobile router from Cisco can keep you connected to the Internet world-wide. Mobility goes way beyond the 802.11 spectrums and Todd will show you how the new Cisco products will keep you connected to your home network at all times, regardless of connection and location in the world. Come to this seminar on the new Cisco mobility products and learn how Mobile IP will change your future! Todd will be bringing one of the only production 3200 models routers, as well as some routers and wireless bridges so you can see first hand how to configure the mobility of the future!

Todd Lammle - President of GlobalNet Training and CEO of RouterSim - 5/5/2004

na Security Strategy & Vision

This presentation will address the Cisco Self Defending Network Initiative (SDNI). What it is, why you should care and how you take advantage of the offerings. Network Admission Control is the first phase of SDNI.

Scott Dunkerly - Cisco Systems - 4/7/2004

Cisco IOS Firewall Feature Set

Security is becoming more important on a daily basis. "I have these routers already. Is there anything I can do to secure my network without having to purchase more equipment?" The answer is yes! You can implement the Cisco IOS Firewall feature set. During this session we will look at utilizing the different features of the firewall feature set, such as CBAC, TCP Intercept, and IDS to name a few. When you leave this session you have an understanding of what each of the features contained in the IOS firewall feature set and a basic understanding of how to configure them.

Carl Timm, CCIE #7149 - Protegga - 3/3/2004

na IP Telephony, Wireless, & Security Troubleshooting: The Big Picture

The Cisco Jeopardy Game - There is, or maybe there should be, a great new approach to training IT professionals to troubleshoot complex network designs. "What if we teach them to think?... Wow, what a concept!" This presentation takes several concepts and commands from some of the more advanced topics and organizes them for troubleshooting using the "dusted off" OSI Model.

Raliegh Jones, CCNP, CCSI - ExcellenTek Network Training - 2/4/2004

Do You Want Fries With That?

Here are three real design situations, where the customer's idea of what they wanted didn't quite match reality. The scenarios have altered somewhat, of course, but only in the details. The core problems remain, and are a valuable lesson.

Annlee Hines  - S2 Networking, Inc. - 1/7/2004

Wireless Mobile IP and Layer 3 Roaming

During this session we will discuss the differences in Layer 2 wireless roaming and layer 3 wireless roaming, Cisco's Structured Wireless Aware Network, Management, Rogue AP Detection, the Wireless LAN Solution Engine, and a discussion of the mechanisms used for layer three roaming.

Steve Acker - CCIE, CCNP, CCDP, MCSE - Vivato - 12/3/2003

The Modern Security Landscape

"I keep hearing all this doom-and-gloom hype about security. So what's the big deal anyway?" Understanding the issues behind the hype is key to making informed decisions about what is important (and vulnerable) within your organization. It then becomes possible to address the issues in a manner that makes solid business sense. In this session, instead of discussing specific products or technologies, we’ll explore the underlying situation and what you can (and should / should not) do about it.

Troy Workman, MCSE, CCIE #4854 - InterNetwork Experts - 11/5/2003


During this session we will learn about the different QoS models available; DifServ, IntServ, and Best Effort. Each of these models are made up of different QoS mechanisms such as Classification and Marking, Congestion Avoidance, and Congestion management to name a few. We will take the time to drill down into these mechanisms so you have a better understanding of what tools are available to you and what they do. By the end of this session you will have a much better understanding of what QoS is and how it functions.

Carl Timm, CCIE #7149 - Protegga - 10/13/2003

Cisco Storage Networking

For this session we will discuss Cisco's End-to-End Storage Networking technologies. We will focus on enterprise SAN switching, Virtual SAN (VSAN) deployment, data replication and business continuity strategies, and block-level IP-based storage architectures.

Michael Dominguez - Cisco Systems - 9/3/2003

Cisco's SAFE Model

The SAFE model is showing up in all kinds of Cisco places, not just the security-centered ones. There are even pieces of it in the new CCDA exam. What is it? And (if you're not preparing for a certification in the near future), why should you care what it contains? The point of the talk will be how SAFE is not displacing the Access/Distribution/Core approach, which looks at the network from a transport functionality approach. Instead, it looks at the same network from a security functionality approach, and it's one we all need to pay attention to, whether or not we're security specialists.

Annlee Hines - S2 Networking, Inc. - 8/6/2003

Cisco HIPS

During this session we will discuss Cisco's Host-based Intrusion Prevention System (HIPS). This session is intended to provide a basic overview of Cisco's new end-point intrusion prevention system (EIPS) and how this system prevents, versus detects, intrusions.

Teddy Bosey, Jr., CCIE - InterNetwork Experts - 7/2/2003

PIX - The Next Generation

PIX, Cisco’s flagship firewall product is the topic of this month’s presentation. The particular focus will be on the evolution of the PIX and its sophisticated PDM (PIX Device Manager) graphical user interface. Changes in the last few years to the PIX operating environment has made the PIX product line not only a high performance firewall choice but also technology more accessible to end users.

John Kindervag, Security Consultant - Flair Data - 6/4/2003

Hacking 101

During this session we will discuss General Security Trends, Reconnaissance, Vulnerabilities, Initial Access, Privileged Access, Secondary Access, Post Access, and Countermeasures in network security. This session is intended to show a network admin what challenges he or she faces in trying to maintain security on a network.

Raymond Jett, CCIE #10036 - Cisco Systems - 5/7/2003


The rapid growth of the Internet along with the emergence of "Next Generation" wireless applications are two of the main reasons for the recent resurgence of IP version 6 (IPv6). This presentation will cover the basics behind IPv6, standards that exists today, current network deployments, and Cisco's position regarding support of IPv6.

Brad Bonin, CCIE #4454, Cisco Systems - 4/2/2003

EIGRP Under the Covers (updated)

Troy Workman, MCSE, CCIE #4854 - InterNetwork Experts - 3/5/2003
na Wireless Security

You know you need it... but what does it really take? This will be an in-depth technical presentation.

John Lowe & Dart West, CCIE #10205 - Cisco Systems SEs - 2/5/2003

na No meeting due to holiday conflict.


Cisco IP Telephony

IP Telephony is becoming more of an accepted infrastructure choice. This presentation will touch on the following aspects of Cisco IP Telephony:
- IP Telephony used as a toll-bypass solution
- IP Telephony used as a local voice solution
- Prerequisites of IP Telephony
- Basic components of IP Telephony
- End-to-end Voice over IP Infrastructure

Matthew Hamm, CCNP - Cisco Systems SE - 12/4/2002

The Cisco Network Academy Program

This presentation will cover the major benefits of the program, give you in-depth information about the curriculum (CCNA, CCNP, Sponsored Curriculum), lab requirements and highlight the qualifications of students in the program. You will find out what makes the academy model so successful (9,904 academies in 147 countries) and how it is expected to meet the increasing need of qualified networking engineers. We will show you how you can get involved in this endeavor by providing internships, job placement, participating in college career fairs, becoming a guest speaker or how to pursue an Academy Instructor Certification.

Dr. Stan Fulton and Christa Jones - Mountain View College - 11/6/2002

An Introduction to Content Smart Switching

In this session, we will introduce the concepts of Content Smart Switching (Server Load Balancing) and take a look at the Cisco CSS product line. In addition we will explore the WebNS operating system and explore some typical configurations for this platform.

Jackie Gunn, CCIE #2468 - Cisco Systems SE - 10/2/2002

High Availability Networking Design

Quite often, network managers or corporate executives will demand "high availability" or "99.999% uptime" from their networks or information systems but have no concept of how to achieve or measure it. In this month's presentation, we'll discuss the underlying concepts and procedures involved in designing or assessing the availability of any network-based information system. Instead of focusing on Cisco technologies specifically, we'll address the more global concerns involved and mention where Cisco technologies can be brought to bear on specific issues.

Troy Workman, MCSE, CCIE #4854 - InterNetwork Experts - 9/4/2002

Implementing IPSec on Cisco Routers

Security is on everyone's minds--especially management's. When called upon to implement IPSec, do you understand the difference between the AH and ESP protocols? Between tunnel and transport modes? When should you use which? How does IKE create a secret key without sending it? And what really is a hash, anyway? All of these will be covered, along with a basic introduction to cryptography, so the use of secret keys will make sense.

Annlee Hines - consultant and author - 8/7/2002

na No meeting due to holiday conflict.


Implementing Cisco QoS in AVVID Networks

In this presentation, we will examine the tools for implementing appropriate QoS policies specifically in environments where voice, video and data share LAN/WAN links across the enterprise. Topics will include Classification and Marking, Congestion Management, Link/Bandwidth Efficiency, Congestion Avoidance, Traffic Shaping and Policing, and Call Admission Control. We will briefly review the characteristics of a robust QoS solution, and the principles and parameters that govern an end-to-end QoS policy enforcement.

Tony Skinner - CCIE #5008 - InterNetwork Experts - 6/5/2002

Remote Access for Large Enterprises

The presentation will focus on Remote Access solutions as they relate to large companies with requirements that are national. Cisco's Remote Access Servers and small branch offices products will be discussed. Real-world examples, deployments and configurations are also included.

Dwayne George CCIE #3615 - SBC - 5/1/2002

Cisco's Metro-Optical Technologies

In this presentation, we'll focus on Cisco's optical solutions for the metro market and briefly introduce the long haul products available from Cisco. Topics covered will include a brief history of Cisco's entry into the optical world, a brief overview of Cisco's optical product line, and a brief look at SONET and DWDM (Dense Wave Division Multiplexing). We'll then take a look at a few network models and see how the technologies, Cisco products, and customers requirements are all tied together in a metro-optical network.

Mike Mitchell, CCNP, CCDP - Cisco Systems - 4/3/2002

Multi-Protocol Label Switching, MPLS

It seems like the latest buzz these days is MPLS technology and the services it provides. In this discussion, we will talk about how MPLS evolved, problems it solved, MPLS applications deployed by Service Providers today, and future MPLS concepts.

The Life's Story! - Brad Bonin, CCIE #4454 - Cisco Systems - 3/6/2002

Real-World Examples of Network Design

In this session, we will explore some actual network designs in use by a very large enterprise to support sites ranging from a few users to a few thousand users. Examples will include 3-tier hierarchy, collapsed core/distribution, and a few odd obstacles that required unique solutions to overcome.

Wade Loveland, CCIE# 3284 - InterNetwork Experts - 2/6/2002

Methodologies of Information Systems Security

In this month's presentation, we'll discuss the underlying concepts, thought processes, and procedures involved when designing or assessing the security of any network-based information system. Instead of focusing on Cisco technologies specifically, we'll address the more global concerns involved, and mention where Cisco technologies can be brought to bear on specific issues.

Troy Workman, MCSE, CCIE #4854 - InterNetwork Experts - 1/2/2002

na T1 Back To Basics

Everyone knows what a T1 is, right? But, do you really know what it is? T1 architecture provides the foundation for many WAN technologies in use today for both voice and data. T1 framing and line coding is something most of us have configured on CSU/DSU's for years, however, most people don't have a firm understanding as to why they need to be configured. It's time to answer all the 'Why' questions.

Brian Morgan, CCIE and CCSI - Allegiance Telecom, Inc. - 12/5/2001

LAN Switching Technologies & Design

Learn basic and advanced switching technologies. Topics will include VLANs, spanning-tree, trunking, layer-3 switching, and design.

Mike Schultz, CCIE - InterNetwork Experts - 11/7/2001

Using Integrated IS-IS for IP Routing

Learn what IS-IS is, why this protocol is popular with large Service Provider backbones, and the differences between IS-IS and OSPF.

Rob Spruell, CCIE - Chiaro Networks - 10/3/2001

na IP Quality of Service

Enterprises and Service Providers deploying IP networks with multiple types of applications face a variety of management challenges, from traffic engineering and capacity planning, to service assurance, service level management, and provisioning. This discussion will take a look of some of the more serious challenges and how they can be addressed.

Dave Gagnon - Concord Communications - 9/5/2001

na Private I

Rick Kurtz is the original developer of Private I from Open Systems, and is currently a Senior Systems Engineer. His background includes all facets of network communications, starting at architecture and ending with analysis. He covers many technical areas for including on-going device integration development, and pre/post sales support and Private I implementation. The same widespread connectivity that has facilitated the dramatic growth of e-business also produces distinct challenges for the network security administrator. Communications and transactions with employees, customers, suppliers, and partners necessitates that a security program encompass multiple network devices, such as routers, switches, firewalls, VPNs and Intrusion Detection Systems. Have you ever asked: "What is happening to my network once I put these security devices in place?" In this month's presentation, we'll look at ways to answer that question.

Rick Kurtz - Open Systems - 8/1/2001

na No meeting due to holiday.


na Understanding OSPF Part 2

Continuing where we left off last month, we'll examine more about OSPF. Although the information gained in Part 1 of the presentation is valuable, it is not a necessity for understanding the concepts covered in Part 2, so everyone is encouraged to attend.

Greg Cernocek, CCIE - InterNetwork Experts - 6/6/2001

na Understanding OSPF Part I

Greg Cernocek, CCIE - InterNetwork Experts - 5/2/2001
SIP Tutorial

Introduction to the SIP protocol and its features.
Using SIP for IP Communications.

Henry Sinnreich - WorldCom - 4/4/2001

na DMTF/xmlCIM Standards and CiscoWorks 2000

This presentation will be an overview of the DMTF's WBEM/CIM initiative, which aims to lead the development of management standards for distributed desktop, network and enterprise environments, and its relationship to CiscoWorks2000. The Web Based Enterprise Management (WBEM ), is a set of management and Internet standard technologies developed to unify the management of enterprise computing environments. WBEM is currently working on moving an industry initiative to standardization through the Common Information Model (CIM) and xmlCIM. CIM (a data model, not an implementation) defines the Schemas used to represent the real-world objects being managed and uses an object-oriented paradigm, where manageable objects are modeled using the concepts of classes and instances. CIM is an implementation neutral schema for describing overall management information and facilitates the common understanding of management data across different management systems. CIM facilitates the integration of management information from different sources and provides models for both instrumentation and management. Currently, Cisco is using the CIM standard in CiscoWorks2000 as part of the move to standardize network data.

Kiran Dambala - Tek-Tools, Inc. - 3/7/2001

na Content Delivery Networks

Cisco's Content Delivery Network (CDN) product line is the industry's only complete content delivery solution, incorporating the five key components for a successful content-delivery solution: content distribution and management, global content routing, local content switching, content cache delivery, and content networking software that is integrated with IOS. It also includes IP/TV for streaming or live video over the web.

Don Bolton, SE - Cisco Systems - 2/7/2001

na VPNs & IPSec - Wade Nixon

- VPN Product Set Overview
- IPSec Explained
- VPN Design Issues

Wade Nixon - CCIE - Cisco Systems - 1/3/2001

EIGRP Under the Covers

Troy Workman, CCIE - InterNetwork Experts - 12/6/2000

BGP Part 2 of 2

How does BGP contribute to your network design? What elements need to be configured for Cisco equipment to utilize BGP?

Frank Jimenez, CCIE - Cisco Systems - 11/1/2000

na No meeting due to facilities problems.


BGP Part 1 of 2

How does BGP contribute to your network design? What elements need to be configured for Cisco equipment to utilize BGP?
See the 11/1/2000 presentation (same download)

Frank Jimenez, CCIE SE - Cisco Systems - 9/6/2000

na No meeting due to facilities problems.


na Network Design White-board Clinic

Tom O'Keefe and Ken Cooper with The Network Guys - Independent Consultants - 7/5/2000
na Aironet demo

Loyd Thompson - Cisco Systems - 6/7/2000
na VPNs & Altiga

Tom Adovasio - 5/3/2000
Cisco Network Services for Active Directory (CNS/AD)

Increasingly, service providers, application developers, and enterprise customers are seeking to leverage network resources in more intelligent ways. To do this, the network must become aware of the needs and characteristics of users and applications, and applications must become network-aware in order to utilize network services more appropriately. Directory technology plays a fundamental role in creating active associations between users, applications, and the network. Cisco has therefore undertaken a directory-based strategy to provide value-added network services on a per-user or per-application basis. Cisco Network Services for Active Directory (CNS/AD) is the first implementation of that strategy.

Troy Workman, MCSE, CCIE # 4854 - InterNetwork Experts - 4/5/2000

na BCRAN Building Cisco Remote Access Networks

Craig Dennis - Global Knowledge - 3/1/2000
na Cisco AVVID: Architecture for Voice, Video and Integrated Data

Cisco AVVID is a standards-based, open systems architecture for converged networking. Cisco AVVID is the culmination of a five phase plan for multiservice networking, successfully delivering the framework for an open multiservice architecture. This breakthrough architecture is designed to deploy applications and scale voice via IP in the enterprise.

Curtis Palmer - SE - Cisco Systems - 2/2/2000

na Cisco Content Networking

Kristi Wade - SE - Cisco Systems - 1/5/2000
na VPN Technologies

Kevin Downes - Enterprise Networking Systems, Inc. - Author - 12/1/1999
WAN Switching Intro

WAN Switching Concepts - A. What is WAN switching? B. What is the benefit? C. Design considerations
Cisco WAN products - A. BPX B. IGX C. MGX
Basic configuration w/ lab tour - A. User Interface B. Configuring trunks C. Creating PVCs/SVCs

Drew Spesard CCIE & Roland Gonzalez CCIE - InterNetwork Experts - 11/3/1999


Matt Dilbert - Cisco Systems - 10/7/1999
na White-board Network Design Clinic

Tom O'Keefe - Independent Consultant - 9/1/1999
na vLab Integrated Demo

Necessity really is the mother of invention! The demand from students for more hands-on time in Cisco classes was the driving force behind what has become vLab, a new web based training software that enables students to remotely access and configure real Cisco equipment.

Arnaud Klineberg - Product Manager - MentorLabs - 8/4/1999

na Video Solutions

1) IP Video Communications Market Update. 2) Streaming Solutions - IPTV Overview - Multicast Vs Unicast - Encoding for Quality 3) Conference Solutions - Gatekeeper (MCM) - Gateway - MCU - Terminals/Endpoints 4) IPTV Demo.

Philip Carter - SE IP/TV - Cisco Systems - 7/7/1999

Ciscoworks 2000

CiscoWorks2000 is a new family of Web-based management products for Cisco switches and routers, enterprise networks, and devices. Current CiscoWorks2000 products include Resource Manager Essentials and CWSI Campus.

Kristi Wade - SE - Cisco Systems - 6/2/1999

na CiscoAssure Policy Networking

We will discuss CiscoAssure Policy networking and how it provides the basis for centralized policy control and enables deployment and enforcement of enterprise-wide policies for QoS and Security. We will also show how CiscoAssure Policy Services will set new standards to ensure that network managers have the tools to break through the QoS complexity barrier, and provide ever higher levels of service on the network.

Matt Dilbert - Cisco Systems - 5/5/1999

na LAN Telephony

Bill Davenport - Cisco Systems - 4/7/1999
na No meeting due to weather.


na Dialup Solutions

Jedd Williams SE - Cisco Systems - 2/3/1999
na Ciscoworks 4

Jim Monkman - INS - 12/2/1998

na PIX Firewall

Drew Spesard - Internetwork Experts - 11/4/1998

Cisco Certifications Program

Kris Kumar & Brandon Walker - 10/8/1998

na Fundamentals of IP Multicasting

Beau Williamson -  Cisco Systems - 2/4/1998

na Cisco Local Director

Louis E. Rael - GTE Directories Corp. - 12/3/1997

Cisco Enterprise Security Initiative

Cisco PIX Firewall Version 4.0
Cisco Secure ACS
Sentri Firewall 4.0

unknown presenter - 9/3/1997

Cat 5 VLANs

Bart Saylors - INS - 7/3/1997

LAN Switching Architectures

Gary Crothers - Cisco Systems - 3/5/1997
Creating a Multi-Homed ISP

Tom Grisham - EDS - 11/6/1996

IP Multicasting

Dino Frinacci - Cisco Systems - 9/4/1996


Harold Ratcliff - Cisco Systems - 8/7/1996


Beau Williamson - Cisco Systems - 7/10/1996