A Cisco UCM-based solution uses URI-based calling for Cisco Jabber clients. The solution has several clusters in different locations. The solution being configured must have a secure method of exchanging addresses between the clusters. Which action ensures that a configuration complies with the requirements?
729edae
2 weeks, 5 days agoPiji
3 months, 2 weeks ago