I don’t know about you, but I always appreciate a good tool. In fact, I’ve had many ex-girlfriends call me a total tool, and I always took that as a really great compliment! I mean, the use of tools is what separates us from the apes, right? (well, that and chromosome #2)
One guy who is a very evolved homo-sapien with a well-functioning prefrontal cortex is Mr. Burns.
Ok, ok, no – not THAT Mr. Burns. I’m talking about the IT Superhero who runs BBBBlog. I had the pleasure of working with him a few years ago when I was very new to Cisco UC. He’s one of those brilliant engineers that inspires you to learn more just to try to catch up to him, even though you probably never will. Now I stalk him on the interweb from time to time to learn new tricks.
One new trick I learned today is a splendid tool for doing core maps / UC VM placement. I thought I was doing a great job of this with a borrowed Excel spreadsheet that was nicely formatted for the purpose. Now, I know, that is the punk ass bitch way of doing it. Check out this TOOL
Ok, fine, I know – Google’s mantra is “don’t be evil”, and they would never do anything like selling all of your most personal thoughts, hopes, dreams and fears to marketers for financial gain. They became a company with a 379.45 Billion market cap (thanks, google finance) off of pure fucking sunshine, rainbows, and unicorns.
I’m not going to delve into a black hole discussion of ethics in the information age here, cause some things are pretty black and white. Like if you call into a call center and tell them there’s a bomb in the building – that’s just fucked up, and I hope your ass gets caught and spends some time in a cell with a well-endowed man named “Bubba”.
In fact, I’ll be happy to help make that shit a reality by putting a button on an agent’s phone to flag this type of call. Let’s take a look at the config and operation of the “Malicious Call ID” feature.
First, create a new softkey template under Device > Device Settings > Softkey Template:
If this is your first time creating a new Softkey Template, you’re gonna be all like, “WTF? Where do I actually configure the softkeys?”
Don’t worry, be happy, and look up to your right under related links:
Then, choose the connected state and stick that MCID where peeps can see it:
Depending on the phones you’re trying to deploy this to – you may be almost done. A softkey template can be updated directly on lots of 78XX and 79XX phones. A little BAT magic, and you’re there.
Although, more commonly, you’d really want to apply this softkey template to a common device configuration. And if you’re using those fancy new 89XX and 99XX phones, you need to update the feature control policy and common phone profile to make this magic happen:
They call it “Report Caller” on the 89/99XX phones, which is probably a more apt description than “MCID” for an end user. When you actually press the button, it gives you a message stating “Malicious call ID Successful”, so it’s not really a consistent and preferred nomenclature, dude.
I would be remiss if I failed to mention a couple more things here. Once you have this button on your phones, you need some way to know when people press it. There’s a couple options here:
1 – Make sure you have RTMT alerting set up with an appropriate Alert Action for this bad boy!
If you do, you’ll be notified of the call details immediately (if not sooner) via electronic mail with something like this:
CalledPartyNumber : 1000
CalledDeviceName : SEP6CFA8902DE4F
CalledDisplayName : Peter Gozinya x1000
CallingPartyNumber : +14042834957
CallingDeviceName : SME_CLUSTER
CallingDisplayName : WIRELESS CALLER
AppID : Cisco CallManager
ClusterID : LeafCluster1
NodeID : cucmsub01.backdoorburglar.com
TimeStamp : Sat Mar 28 17:29:19 EDT 2015.
The alarm is generated on Sat Mar 28 17:29:19 EDT 2015.
2 – Would it kill you to run the “Malicious Calls” report every once in a fucking while? No, no it wouldn’t. They put a special report right there under the CDR menu in CAR, which is accessible from Unified Servicability, or just by tacking /car/ to the end of your Pub’s URL. So, if you’re going to use the feature, run this.
I having been getting pressure to blog something, so here it is. I received an email from a project manager for some technical help on one of his current projects. I had a project over a year ago where I installed some 7925 wireless phones and integrated with a nurse call system.
When I first read the email, it was like he was speaking a foreign language. The nurse call vendor was asking the engineer on the project for a dial back string. They were asking me if I knew what that was. I was like no, who can remember that shit? So I went to sleep that night and said to myself, “self look at my emails and notes and see if you can’t un-fuck his shit.”
In the morning with a little clearer mind, I started digging through my notes and email. I found something in the first few emails. I started to write up a response but then I realized it was the wrong answer. I finally remembered what I had to do to get it to work. The engineer had configured the FXS ports as MGCP since that was what the sow stated. I said woa, un-fuck that shit, it has to be H.323 since you need dial-peers to insert a pause in the dial string coming from the wireless phone.
You see the nurse call system was interfaced through FXS ports which then went out to the speaker on the hospital bed. The FXS ports were just the method of connecting over to the nurse call system. Once the call rang on the FXS port the nurse call system would answer the call and expect DTMF tones to tell it the room or bed number. So from the wireless phone the nurse would press a button after receiving a text message as an alert from the bed. That would trigger a phone call from the wireless phone to a number string, 1995000303#, for example. In CUCM I created a route pattern of 1995000!# and routed it to the H.323 gateway, stripping the “#”. The gateway then had a dial-peer which would strip 1995000 and “prefix ,,”. See below for example.
dial-peer voice 1995000 pots
progress_ind setup enable 3
incoming called-number .
So after explaining how digits are stripped by default from destination-patterns unless a no digit strip command is used, I told him to un-fuck his config and make everything h.323 so that he can insert a pause in the middle of a dial string to only forward the room or bed number to the nurse call system.
Sometimes it is good to dust off the old neurons and have to remember shit you don’t use everyday.
I was gonna do a whole giant write up on travel tips…but I don’t really fucking feel like it right now. So I have decided I will do a weekly travel tip.
So I typically travel at least 2 weeks per month….more like 4 weeks per month on this project. I thought I would share my tips and tricks for traveling.
1. Pick a company and stick with that shit. I see a lot of engineers using different hotel chains, airlines, and rental cars every week…this is pure fucking madness. My wife and I are flying to Cancun and staying in a 5 star resort in a couple months (at no cost to me) all because I stay with the same hotel chain and airline for all my trips. The reward points add up very quickly and you need to stop being a fucking tard and take advantage of this. I get upgraded to the nicest room available when I check into my hotel, I always get upgraded to a very nice rental car, and once I hit the next level on my Sky miles status, I will be upgraded to First Class while flying. If you are going to be away from your family and living on the road…you might as well live like a BOSS.
You might have a good project manager if she is on the phone with her mortgage company discussing mortgage insurance and can bring that man to tears in under 5 minutes for not doing his job.
We recently deployed a shit ton of Cisco 7841 phones. We ran 95% of the ATP successfully and then got to the best part. We get to knock down the WAN and send the phones into SRST mode. For the first 10 minutes everything looked peachy, then all of a sudden the SIP registrations on the gateway decided to be punk ass bitches. We were holding steady at around 200 registrations when we had close to 600 SIP endpoints. Three of us stared at Secure CRT with the same anticipation as a 6 year old on Christmas morning. Unfortunately we suffered the same disappointment as most kids who ask for a bike for Christmas and then received a box full of beaver droppings. The registrations stopped and then at one point started losing registrations. This was some bull shit. It was late and we wanted to go drinking. Well of course after an hour of troubleshooting this stupid shit, I made the brilliant assessment that I should probably call the “experts” at Cisco TAC. So after 5 hours on the call with backbone support and then getting developers involved, we came to the conclusion that the firmware load we are using has issues with SRST.
SO FYI this load “sip78xx.10-1-1SR2-1” can lick my sack.
We added this beauty “sip78xx.10-1-1ES7” and guess what….those little bitches registered. However, we didn’t want to introduce a new load cluster wide without doing a major bug scrub. So we rolled back and decided that if the system goes into SRST mode…some of those people are just fucked.