Avaya Aura

Avaya S8300 Replacement procedures_pst

Avaya S8300 Replacement procedures

Avaya S8300 Replacement procedures 6 steps to help you, and prevent future outages. When you finish reading this post you’re going to have a good idea of which steps and procedures to take when replacing a defective Avaya S8300 blade media server, as well as learning what to do before starting the replacement process, what to expect when everything goes wrong, and more. About two years ago, I got the […]

Avaya S8300 Replacement procedures Read More »

ssh protocol or tool_Wellington Paez

SSH a protocol or tool

SSH a protocol or tool Understand ssh and its capabilities In this post you will understand the Secure Shell protocol, and how this protocol suite helps you establish communication to a BSD, Linux, and OS-X device through the SSH Console or a Windows 3rd party program, such as PuTTy, encrypting the data transmission, adding another layer of protection to important data such as passwords, IP Addresses, and other user information.

SSH a protocol or tool Read More »

Avaya VPN Phones

Avaya VPN Phones

Avaya VPN Phones 5 components for a successful implementation. Avaya VPN Phones – By the end of this post you will be able to implement and maintain the Avaya VPN Phones, as well as understand which components you must understand to help you succeed in the implementation process. Network Assessment, Gatekeepers, among other listed below. As a telecom technician you will be ask to implement or service remote offices virtual

Avaya VPN Phones Read More »

Avaya MBT

Avaya MBT HA Server best practices

Avaya MBT HA Server best practices. By the end of this post ‘Avaya MBT Server best practices, 4 key points for a successful HA implementation’, you will understand how to deploy the MBT (Mid-Market Business Template) with High Availability (HA) Solution. The server capacities, software implementation, and patching are some of the core elements that I cover in this post. I have created these 4 key points to help you

Avaya MBT HA Server best practices Read More »

Scroll to Top