ASA of the CSQ finesse

I wonder to provide a way to display the live cam ASA (average response time; CSD calls average waiting time) data in sharpness for each CSQ.  I know there's a gadget for the display of the ASA for individual users, but we need to see the average for CSQ.  I built a dashboard widget to manage, but it does not work as well as I had hoped.  Has anyone else had luck adding this statistic to a gadget with Finesse?

It shouldn't take 60 minutes to refresh since the default refresh rate is 30 minutes for historical reports. Try in different browsers and see if this can help, restart of Tomcat Finesse can also be an option if it need 60 minutes

http://www.Cisco.com/c/en/us/TD/docs/voice_ip_comm/cust_contact/contact _...

If you need the refresh rate of 5 minutes or whatever it is less than 30 minutes for stock historical reports, then you need autonomous cuic with premium license installed on it. Living CUIC that comes with UCCX does not give the possibility to change the report definition, but you can do this very easily within standalone CUIC settinga refresh rate you want. Therefore, it is the only nothing available option in UCCX you can do to reduce it within 30 minutes.

Concerning

Deepak

Tags: Cisco Support

Similar Questions

  • Protect and control the license for ASA with the power of fire

    I had 1 ASA 5515 initially delivered with the software cx, then made room for the software of firepower and got the virtual firesight for 2 devices and license of TAMAS tha L-5515, but this license was told only the URLs and malware license, I thought that this license was for all that since he has no other licenses in the data sheet and it's Reference with more features.

    How can I get the license protect and control now so I can add the asa with the firepower to firesight and apply to all licenses

    Thank you

    Hello

    L ASA5515-TAMAS = SKU license plans to "MALWARE" and "URLFilter" and legally gives the user to updates of the signature "PROTECT + CONTROL". It does not license "PROTECT + CONTROL". You need to buy "ASA5515-CTRL-LIC =" to license "PROTECT + CONTROL".

    Please discuss a case with CISCO GLO, they can help provide a CTRL license

    -DD

  • Unable to answer the call of the CSQ

    Hello

    We have intermittent problems with some agents are unable to respond to a call for a CSQ. This seems to only happen when the call is transferred to one QSC to another.

    Scenario of
    The call comes on CSQ1 and Agent1 answers the call.
    Agent1 forwards the call to CSQ2.
    In CSQ2, Agent2 can see their status is set to 'Reserved' at the office of the Agent, but the appeal does not ring on their phone. The call is still active on the phone to Agent1.
    Agent1 can try to transfer again, but the same problem occurs. The call seems to be stuck on the phone to Agent1.

    The question is not subject to an Agent or a CSQ, happened on multiple Agents in multiples of the CSQ. The agent is not a resource in both in these situations of CSQ.

    We are running:
    UNIVERSITY COMPLUTENSE OF MADRID: 9.1.1.20000 - 5
    UCCX: 9.0.2.10000 - 71
    Devices: IP Phone 7945, SCCP Protocol

    Any thoughts or ideas are greatly appreciated.

    Thank you.

    You should try the region of the contact for this issue Center

  • Cisco ASA with the power of fire vs Cisco IPS Appliance

    Hello

    Question: is there the functional differences between an ASA with the feature of firepower enabled and power of fire IPS appliances 'pure' (e.g. 7000 and 8000 series IPS Modules)?

    Thank you very much!

    Kind regards

    David

    Hello team,

    The same features except hardware bypass and another should trhougputs. Of course the flow rate will be high for hardwrae devices and it also has the ability to bypass equipment. Apart from that URL and all other filtering the same characteristics.

    Rate of good will if this post helps you.

    Concerning
    Jetsy

  • Guest of the CSQ

    IPCC 4.0.4 I am trying to understand if step quickly create CSQ is related to the prompt setting on the CSQ CRS web page and when I should use this prompt. Thank you very much.

    Yes, it is, and in fact when you specify what CSQ you want to retrieve the guest to leave, specify you with a string that represents the ID. This specific CSQ

    How to get the ID of the CSQ is very easy, and there are several ways to do.

    I suggest the following: (example of UCCX 5.x)

    In AppAdmin under subsystems > RmCm > Contact Service queues, click the CSQ, you want to get the ID for, then look at the URL.

    The ID of the CSQ should be obvious at this point.

    Here is an example of URL: http:///appadmin/ICD?request_type=csd.configure&csdid=1

    The ID of the CSQ, resulting is 1, as in this example.

    If your field of Contact Service queue must be a string between the integer 1 (for example, '1').

    Screen attached.

    * This answer was simply because I hate forums to research and find my exact problem, with no resolution.

    Anthony

  • L2l VPN between ASA with the IP address public and CISCO2911 behind the ISP router with port forwarding

    Hi all

    My apologies if this is a trivial question, but I spent considerable time trying to search and had no luck.

    I encountered a problem trying to set up a temporary L2L VPN from a Subscriber with CISCO2911 sitting behind the router of the ISP of an ASA. ISP has informed that I can't ignore their device and complete the circuit Internet on the Cisco for a reason, so I'm stuck with it. The Setup is:

    company 10.1.17.1 - y.y.y.y - router Internet - z.z.z.z - ISP - LAN - 10.x.x.2 - XXX1 - ASA - 10.1.17.2 - CISCO2911 - 10.1.15.1 LAN

    where 10.x.x.x is a corporate LAN Beach private network, y.y.y.y is a public ip address assigned to the external interface of the ASA and the z.z.z.z is the public IP address of the ISP router.

    I have forwarded ports 500, 4500 and ESP on the ISP router for 10.1.17.2. The 2911 config attached below, what I can't understand is what peer IP address to configure on the SAA, because if I use z.z.z.z it will be a cause of incompatibility of identity 2911 identifies himself as 10.1.17.2...

    ! ^ ^ ^ ISAKMP (Phase 1) ^ ^ ^!
    crypto ISAKMP policy 5
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    lifetime 28800
    isakmp encryption key * address no.-xauth y.y.y.y

    ! ^ ^ ^ IPSEC (Phase 2) ^ ^ ^!
    crymap extended IP access list
    IP 10.1.15.0 allow 0.0.0.255 10.0.0.0 0.255.255.255
    Crypto ipsec transform-set ESP-3DES-SHA 3rd-esp esp-sha-hmac
    card crypto 1 TUNNEL VPN ipsec-isakmp
    defined peer y.y.y.y
    game of transformation-ESP-3DES-SHA
    match the address crymap

    Gi0/2 interface
    card crypto VPN TUNNEL

    Hello

    debug output, it seems he's going on IPSEC States at the tunnel of final bud QM_IDLE's.

    What I noticed in your configuration of ASA box, it's that you're usig PFS but not on 2911 router.

    So I suggest:

    no card crypto OUTSIDE_map 4 don't set pfs <-- this="" will="" disable="" pfs="" on="" asa="">

    Then try tunnel initiate.

    Kind regards

    Jan

  • ASA disconnects the customer due to the XAUTH failure even if XAUTH disabled

    Dear friends,

    I am creating an IPsec tunnel between a ZyXEL ZyWALL P1 hardware firewall and an ASA 5510, OS version 8.0 (2). The two parties should authenticate using X.509 PKI certificates without no XAUTH authentication only.

    The current configuration of the ASA software Cisco VPN Clients to connect without any problems. However, when I try to connect the ZyWALL, ASA complains about the "peer is not authenticated by xauth - drop connection" and he abandoned the connection. This intrigues me, that both the ZyWALL hardware and software clients are managed by the same group of tunnel in which the XAUTH is disabled with the command ""isakmp ikev1-user authentication no"." My goal, obviously, is to configure the ASA in such a way that it will be possible to create a tunnel between the ASA and the ZyWALL IPsec authenticated using certificates only, without the XAUTH.

    The ZyWALL does not seem compatible with the configuration MODE. I don't know if it is a remarkable fact, but I'm there to completeness.

    I am attaching the relevant extracts from the configuration and the output of the command debug crypto isakmp 127 . A short explanation of the different addresses in the debug output:

    • 158.193.139.0/24 is the public sector in the laboratory where the ZyWALL device is tested
    • 192.168.167.0/24 is the segment private behind the ZyWALL (its 'LAN' interface) device
    • 172.27.137.0/24 is the segment private behind the ASA to customers access via IPsec

    I am very grateful for any advice you can give me!

    Best regards

    Peter

    Peter,

    Well, I needed to read a large part of your email address.

    I understand you want to basically your firewall, zyxel to act as a clinet ezvpn (note that it doesn't send beacon of unity in MM1) and not a l2l tunnel.

    Group = TG-RAIS, Username = Peter Paluch VPN, IP = 158.193.139.173, processing hash payload

    Anywhere this username configured on the firewall, zyxel?

    Marcin

  • Connected to the ASA via the "VPN Client" software, but cannot ping devices.

    I have a network that looks like this:

    I successfully connected inside the ASA via a software "Client VPN" tunnel network and got an IP address of 10.45.99.100/16.

    I am trying to ping the 10.45.99.100 outside 10.45.7.2, but the ping fails (request timed out).

    On the SAA, including the "logging console notifications" value, I notice the following message is displayed:

    "% 305013-5-ASA: rules asymmetrical NAT matched for flows forward and backward; "Connection for icmp src, dst outside: 10.45.99.100 inside: 10.45.7.2 (type 8, code 0) rejected due to the failure of reverse path of NAT.

    I have a vague feeling that I'm missing a NAT rule of course, but not all. What did I miss?

    Here is my configuration of ASA: http://pastebin.com/raw.php?i=ad6p1Zac

    Hello

    You seem to have a configured ACL NAT0 but is not actually in use with a command "nat"

    You would probably need

    NAT (inside) 0-list of access inside_nat0_outside

    He must manage the NAT0

    Personally, I would avoid using large subnets/networks. You probably won't ever have host behind ASA who would fill / 16 subnet mask.

    I would also keep the pool VPN as a separate network from LANs behind ASA. The LAN 10.45.0.0/16 and 10.45.99.100 - 200 are on the same network.

    -Jouni

  • Cannot ping ASA inside the interface via VPN

    Hello

    I have a scenario with tunel VPN between a router and ASA and can ping subnet behind ASA subnet behind the router (and), but I cannot ping the ASA inside the interface on the VPN tunnel. I need to access the remote location ASDM. How can it be done?

    Thanks for your suggestions.

    Remi

    Hello

    You must have the 'inside access management' command configured on the SAA.

    If you run a 8.3 software or newer on the SAA, should also look at the configuration 'nat' IF the above command solves your problem

    -Jouni

  • a way vpn with asa to the 800 router

    people

    I have a site to site vpn set up between a asa 5540 and a 800 router

    I want only the vpn to be initiated from the asa with the 800 remote listen incoming connections

    I know that I can define the type of connection on the asa as only come but I can find an equivalent command to answer only for the 800 remote

    can anyone point me in the right direction or is it enough to simply configure the asa as are created only for this encryption card

    Thanks to anyone who takes the time to answer

    Hello

    I recommend you configure the tunnel as a dynamic to static tunnel VPN, the ASA will be the static counterpart, so it will be the initiator and the router will never be able to establish the connection.

    The ASA will be a common L2L configuration, but the router will use a dynamic encryption card.

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a008051a69a.shtml

    The PIX in the example is old, then you can simply adjust the controls to your current version, the important thing is to understand the concept.

    Please let me know if that answers your question,

    Thank you.

  • In After Effects when I use the Color Finesse 3, a grid appears in the display. How to disable that?

    When I click the button, and then synthesis, then ITS Color Finesse 3 creative cloud, a grid appears on the video in the display window, and I don't know a how to take that off?

    Color THE 3 Finesse provided with After Effects and is automatically installed during the After Effects is installed. The only reason to upgrade to the paid version if you want to use Color Finesse in Premiere Pro, as well as in After Effects.

    Because this is a college computer, you have the option to install/uninstall software? Many universities to lock down computers in order to limit this access. You will need full access including an admin password, to use the following steps. If you are not allowed access, you can pass the following to whoever does the computer management.

    To remove the trial version, delete the entire folder "Synthetic aperture" found in:

    / Library/Application Support/Adobe/Common/Plug-ins/7.0/MediaCore

    (Note that it is the library folder at the base of your boot drive, not that of your home folder).

    Then, re-enable the embedded Color Finesse version by going to the following folder:

    / Applications/Adobe/Adobe After Effects CC/Support Files/Plug-ins/effects/Synthetic Aperture

    Now, in this "Synthetic aperture" folder, you will find a plug-in with parentheses around the name:

    (Color Finesse 3 AE64)

    Remove the parentheses by the name of file for AE go to him. Not NOT remove parentheses from the folder "(Support CF3)" or AE will launch very, very slowly, and Color Finesse is not working properly. "

    "Finally, in the"(Support CF3) folder ", find it" (Color Finesse 3 IU) "application and remove the brackets.

    Launch of EI, apply Color Finesse to a layer, enter a name, and you should be good to go without grid lines.

    Bob Currier

    Synthesis

  • Need help - Cisco ASA with the power of fire

    Hello

    Currently, we use asa 5510 without function of firepower. Our goal is to publish web servers and microsoft lync with reverse proxy method. control internet traffic, apply extensions individual file not to download, management of bandwidth etc.

    Is it possible if we add firepower on asa 5510... Please guide me... Thank you

    Power of fire must be installed on the new series X of the SAA.  5512 x, x 5515, 5525 x, etc.

    If you have a 5510, you probably want a 5512 x with an SSD.  Cisco has beams of firepower include the ASAx with SSD and the license of firepower.

    Adds that you must also Firesight management software, and there is a license bundle of 2 camera for under $ 500 that you can install on VMWare.

    Firepower is not reverse proxy, it's transparent online packages, analysis and filtering by URL / Application / and threat mitigation.

    If you want a reverse proxy, you should look into Microsoft ISA server or a Proxy Server reverse dedicated Web.  Cisco gave its product Web Director, who has done this function.

    You can host Web sites behind a firewall of ASA without proxy reverse.  And the ASA has an inspection of the request for HTTP traffic, responsible for watching HTTP requests.  The firepower to the ASA system also has specific signatures that monitor traffic to the web servers and prevent specific vulnerabilities that are known on those servers, so if that is what you want the Reverse Proxy for, then the power of fire module would probably cover your needs.

    Don't forget that until the next quarter firepower system has no decryption on the box, and you might want to wait that the feature is released and put in place, so that you know what size firewall you need protect your network with the SSL decryption.  I believe that the ASA5512x is testing at 75 Mbps stream decrypted via the fire power module, which is about half of what was before CX, then you could use the sizing numbers CX and extrapolate until Cisco releases official decryption numbers.

  • ASA at the ASA L2L VPN Firewall

    Hi experts,

    I currently have problems establishing a VPN site-to-site easy. It's my first time at this meeting and I am pulling my hair out for this issue.

    Currently, the installation program below is a typical topology (using ASDM):

    An ASA IP (1.1.1.2) of the site <-->(ISP) <-->Site B (ASA IP 2.2.2.2)

    All ASA IPs are the external interface connecting directly to their respective suppliers. Site has existing VPN tunnels to other networks, but Site B is a new network configuration (one can imagine Site A as a hub and the rest are rays). Site B outside interface opened ports IP 50 ESP, UDP 500 and UDP 4500 on the interface of all sources to connect to the external interface (besides us has allowed all the IP protocol for the external interface for troubleshooting). However, we have issues that phase 1 upward. We have carefully matched and double checked IKEv1 all the settings are correct and the same for the two parties, including the PSK. However Site A can ping IP of the Site B and Site B is not able to ping to the Site A IP.

    We also checked with our Internet service providers and they confirmed that they do not block 3 ports we need for the VPN. Is there more ideas or points that we missed?

    Oh, activation of debugging are not returned all the papers, but will help generate some 'interesting' traffic such as internal ping subnet of Site A of the Site B?

    Hello

    Instead of launching the plotter of the interface IP packets use all other inside IP, I see a failure of ifc interface.

    Also is it possible for you to take the UDP 500 captures on the external interfaces on the SAA?

    This would answer a lot of questions.

    Kind regards

    Aditya

    Please evaluate the useful messages and mark the correct answers.

  • Access ASDM ASA on the external Interface

    We have three ASA5510s, each configured for ssh and http access to the Cel outside.  One of them has aaa users/passwords defined for both ssh and http.  I can access the ASA configured for aaa of the designated host allowed in the external interface normally using credentials of the aaa.  When I try to access one of the other two, they will refuse the enable login password.  The configured aaa ASA is version 8.2 with ASDM 6.21.  The other two are the two ASA version 7.0 with ASDM 5.07.  The ASA requires aaa is configured for https access?  How can I make these other two accept the ASDM login?  Thank you!

    If you do not have aaa then configured for ASSISTANT Deputy Ministers, you must use empty username and password enable.

    Also, you can use the "aaa authenticate http LOCAL console" and use a user/pwd to a private 15 user name to connect to the ASDM.

    To resolve what is a failure you can activate "debug http" and "debug aaa" on the SAA to see the reasons for which the user is rejected.

    I hope it helps.

    PK

  • recharge an ASA - SSM the firewall itself effect?

    We lost the connection information for the IPS - SSM on our ASA 5520. It seems we should re image module with a version more recent software. It is currently not in use i.e. no rules for it on the firewall. This process will take the firewall offline at all?

    Sh command output:

    See the module of Firewall03 # 1

    Model serial number of map mod

    --- -------------------------------------------- ------------------ -----------

    1 ASA 5500 Series Security Services Module-20 ASA-SSM-20 xxxxxxx

    MAC mod Fw Sw Version Version Version Hw address range

    --- --------------------------------- ------------ ------------ ---------------

    1 001b.0ce2.xxxx to 001b.0ce2.xxxx 1.0 1.0 (11) 2 5,0000 E1

    The Application name of the SSM status Version of the Application of SSM mod

    --- ------------------------------ ---------------- --------------------------

    1 FPS up to 5.1 (5) E1

    Data on the State of mod aircraft compatibility status

    --- ------------------ --------------------- -------------

    1 up Up

    Firewall03 # display module 1 recover

    Module 1 retrieve parameters...

    Start the recovery Image: No.

    Image URL:ftp://0.0.0.0/ t

    Port IP address: 0.0.0.0

    IP gateway address: 0.0.0.0

    VLAN ID: 0

    No, it should not affect the operation of the firewall at all. He would suffer only if you use it inline with firm failure mode is activated.

Maybe you are looking for