<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://www.wellingtonpaez.com/wp-content/themes/getnoticed/inc/feeds/style.xsl" type="text/xsl" media="screen"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Wellington PaezPosts &#8211; Wellington Paez</title>
	<atom:link href="https://www.wellingtonpaez.com/photos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wellingtonpaez.com</link>
	<description>Encouraging Avaya enthusiasts enhance their skills</description>
	<lastBuildDate>Mon, 22 May 2023 02:05:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">106680005</site>		<item>
		<title>How To Secure Your Avaya VoIP Environment?</title>
		<link>https://www.wellingtonpaez.com/how-to-secure-your-avaya-voip-environment/</link>
		<comments>https://www.wellingtonpaez.com/how-to-secure-your-avaya-voip-environment/#respond</comments>
		<pubDate>Mon, 23 Jan 2023 20:08:53 +0000</pubDate>
		<dc:creator>Wellington Paez</dc:creator>
				<category><![CDATA[Avaya Aura]]></category>
		<category><![CDATA[Linux Security]]></category>
		<guid isPermaLink="false">https://www.wellingtonpaez.com/?p=3282</guid>

				<description><![CDATA[<p>How to secure your Avaya VoIP Environment? Understand ASM, Thread Modeling and other elements to keep your systems secured. In this post “How to secure your Avaya VoIP Environment?”, see the different Attack models the attackers use, ways to strengthen your Avaya VoIP Environment, different type of attacks, threat modeling, Kernel Architecture, and how to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/how-to-secure-your-avaya-voip-environment/">How To Secure Your Avaya VoIP Environment?</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></description>
			<content:encoded><![CDATA[<p>How to secure your Avaya VoIP Environment? Understand ASM, Thread Modeling and other elements to keep your systems secured. In this post “How to secure your Avaya VoIP Environment?”, see the different Attack models the attackers use, ways to strengthen your Avaya VoIP Environment, different type of attacks, threat modeling, Kernel Architecture, and how to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/how-to-secure-your-avaya-voip-environment/">How To Secure Your Avaya VoIP Environment?</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></content:encoded>
	

		<wfw:commentRss>https://www.wellingtonpaez.com/how-to-secure-your-avaya-voip-environment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">3282</post-id>	</item>
		<item>
		<title>Avaya Alternate Gatekeeper List</title>
		<link>https://www.wellingtonpaez.com/avaya-agl-alternate-gatekeeper-list/</link>
		<comments>https://www.wellingtonpaez.com/avaya-agl-alternate-gatekeeper-list/#respond</comments>
		<pubDate>Fri, 06 Jan 2023 06:00:35 +0000</pubDate>
		<dc:creator>Wellington Paez</dc:creator>
				<category><![CDATA[Avaya Aura]]></category>
		<category><![CDATA[AGL]]></category>
		<category><![CDATA[Alternate Gatekeeper List]]></category>
		<category><![CDATA[Avaya AGL]]></category>
		<guid isPermaLink="false">https://www.wellingtonpaez.com/?p=3189</guid>

				<description><![CDATA[<p>Avaya AGL &#8220;Alternate Gatekeeper List&#8221; Learn how Avaya AGL helps H.323 Endpoints obtain its registration. In this post Avaya AGL &#8220;Alternate Gatekeeper List&#8221; see how Communication Manager uses its algorithm to push the Alternate Gatekeeper List or AGL to those H.323 endpoints requesting registration. Learn best practices when configuring them and gotchas to look for [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-agl-alternate-gatekeeper-list/">Avaya Alternate Gatekeeper List</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></description>
			<content:encoded><![CDATA[<p>Avaya AGL &#8220;Alternate Gatekeeper List&#8221; Learn how Avaya AGL helps H.323 Endpoints obtain its registration. In this post Avaya AGL &#8220;Alternate Gatekeeper List&#8221; see how Communication Manager uses its algorithm to push the Alternate Gatekeeper List or AGL to those H.323 endpoints requesting registration. Learn best practices when configuring them and gotchas to look for [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-agl-alternate-gatekeeper-list/">Avaya Alternate Gatekeeper List</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></content:encoded>
	

		<wfw:commentRss>https://www.wellingtonpaez.com/avaya-agl-alternate-gatekeeper-list/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">3189</post-id>	</item>
		<item>
		<title>Avaya SBCE Vulnerability Best Practices</title>
		<link>https://www.wellingtonpaez.com/avaya-sbce-vulnerability-best-practices/</link>
		<comments>https://www.wellingtonpaez.com/avaya-sbce-vulnerability-best-practices/#respond</comments>
		<pubDate>Fri, 30 Dec 2022 06:00:45 +0000</pubDate>
		<dc:creator>Wellington Paez</dc:creator>
				<category><![CDATA[Avaya Aura]]></category>
		<category><![CDATA[Avaya SBCE]]></category>
		<category><![CDATA[SBCE]]></category>
		<guid isPermaLink="false">https://www.wellingtonpaez.com/?p=3241</guid>

				<description><![CDATA[<p>Avaya SBCE Vulnerability Best Practices The 3 characteristics to combat malicious attacks The deployment of remote workers has increased the exposure of the Avaya SBCE as a target to break into the customer’s network. In this post “Avaya SBCE Vulnerability Best Practices” I walk you through some of the things to watch for and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-sbce-vulnerability-best-practices/">Avaya SBCE Vulnerability Best Practices</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></description>
			<content:encoded><![CDATA[<p>Avaya SBCE Vulnerability Best Practices The 3 characteristics to combat malicious attacks The deployment of remote workers has increased the exposure of the Avaya SBCE as a target to break into the customer’s network. In this post “Avaya SBCE Vulnerability Best Practices” I walk you through some of the things to watch for and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-sbce-vulnerability-best-practices/">Avaya SBCE Vulnerability Best Practices</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></content:encoded>
	

		<wfw:commentRss>https://www.wellingtonpaez.com/avaya-sbce-vulnerability-best-practices/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">3241</post-id>	</item>
		<item>
		<title>Avaya Failover Timers for IP Endpoints and H.248 Gateways</title>
		<link>https://www.wellingtonpaez.com/avaya-failover-timers-for-ip-endpoints-and-h-248-gateways/</link>
		<comments>https://www.wellingtonpaez.com/avaya-failover-timers-for-ip-endpoints-and-h-248-gateways/#respond</comments>
		<pubDate>Tue, 13 Dec 2022 05:00:40 +0000</pubDate>
		<dc:creator>Wellington Paez</dc:creator>
				<category><![CDATA[Avaya Aura]]></category>
		<category><![CDATA[Avaya Converged Solutions]]></category>
		<category><![CDATA[VCM Resources]]></category>
		<category><![CDATA[VoIP]]></category>
		<category><![CDATA[VoIP Resources]]></category>
		<category><![CDATA[VoIP Troubleshooting]]></category>
		<guid isPermaLink="false">https://www.wellingtonpaez.com/?p=3137</guid>

				<description><![CDATA[<p>Avaya Failover Timers for IP-Endpoints and H.248 Gateways 4 Steps to help you understand what can cause issues with registrations and resource utilization. In this post “Avaya Failover Timers for IP-Endpoints and H.248 Gateways” learn how the system uses its algorithm in conjunction with the configured timers that allow H.248 Gateways and IP-Endpoint registrations to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-failover-timers-for-ip-endpoints-and-h-248-gateways/">Avaya Failover Timers for IP Endpoints and H.248 Gateways</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></description>
			<content:encoded><![CDATA[<p>Avaya Failover Timers for IP-Endpoints and H.248 Gateways 4 Steps to help you understand what can cause issues with registrations and resource utilization. In this post “Avaya Failover Timers for IP-Endpoints and H.248 Gateways” learn how the system uses its algorithm in conjunction with the configured timers that allow H.248 Gateways and IP-Endpoint registrations to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-failover-timers-for-ip-endpoints-and-h-248-gateways/">Avaya Failover Timers for IP Endpoints and H.248 Gateways</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></content:encoded>
	

		<wfw:commentRss>https://www.wellingtonpaez.com/avaya-failover-timers-for-ip-endpoints-and-h-248-gateways/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">3137</post-id>	</item>
		<item>
		<title>Avaya Message Sequence Trace (MST) Demystified</title>
		<link>https://www.wellingtonpaez.com/avaya-message-sequence-trace-mst-demystified/</link>
		<comments>https://www.wellingtonpaez.com/avaya-message-sequence-trace-mst-demystified/#respond</comments>
		<pubDate>Tue, 06 Dec 2022 05:00:19 +0000</pubDate>
		<dc:creator>Wellington Paez</dc:creator>
				<category><![CDATA[Avaya Aura]]></category>
		<category><![CDATA[Avaya Converged Solutions]]></category>
		<guid isPermaLink="false">https://www.wellingtonpaez.com/?p=3072</guid>

				<description><![CDATA[<p>Avaya Message Sequence Trace (MST) Demystified 4 characteristics to use the Message Sequence Trace Utility. In this post Avaya MST Demystified you learn 4 different characteristics to utilize the Message Sequence Trace Utility or MST. To help you debug and understand the reasoning to why some events might happened to way they do, and present [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-message-sequence-trace-mst-demystified/">Avaya Message Sequence Trace (MST) Demystified</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></description>
			<content:encoded><![CDATA[<p>Avaya Message Sequence Trace (MST) Demystified 4 characteristics to use the Message Sequence Trace Utility. In this post Avaya MST Demystified you learn 4 different characteristics to utilize the Message Sequence Trace Utility or MST. To help you debug and understand the reasoning to why some events might happened to way they do, and present [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.wellingtonpaez.com/avaya-message-sequence-trace-mst-demystified/">Avaya Message Sequence Trace (MST) Demystified</a> appeared first on <a rel="nofollow" href="https://www.wellingtonpaez.com">Wellington Paez</a>.</p>
]]></content:encoded>
	

		<wfw:commentRss>https://www.wellingtonpaez.com/avaya-message-sequence-trace-mst-demystified/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">3072</post-id>	</item>
	</channel>
</rss>