INDEX. call forwarding
|
|
- Grant Nelson
- 5 years ago
- Views:
Transcription
1 INDEX A access control general concepts 1-17 GUI configuration 2-4 manual configuration B-19 access control lists (ACLs) 1-16 access log 1-11, 1-12 accounting services basic concepts 1-11, 1-12 GUI configuration 2-4 manual configuration B-15 address translation basic concepts 1-11, 1-13 manual configuration B-25 Apache directives B-3 to B-5 applications 5-12 authentication services access control lists 1-16 basic concepts 1-11, 1-16 deprecation of basic 5-9, A-8, B-17 manual configuration B-17 authorization services basic concepts 1-11, 1-16 manual configuration B-17 B backup, system 3-8 bulk data, importing and exporting 2-16 C call forwarding manual configuration B-23 troubleshooting problems with 5-9 call teardown 5-12 CIAgent tool 3-1, 4-1 compliance with SIP standards A-1 configuration, system GUI 2-1 manual B-1 conventions, document i-xi core directives 2-9, B-8 D data, importing and exporting 2-16 databases MySQL. See MySQL database registry 1-7, C-12 regroute databases tool B-26, B-31, B-32, C-12 routing 1-7, C-12 debug logs 3-3 directives Apache B-3 to B-5 core B-8 general concepts B-3 host-specific B-5 server-global 2-8, B-4 standard B-13 DNS (Domain Name System) basic concepts 1-11, 1-17, D-1 IN-1
2 configuration 2-19, D-1 document conventions i-xi domains, multiple basic concepts 1-18 GUI configuration 2-9 manual configuration B-28 dynamic routes 2-14 E ENUM translation manual configuration B-25 error log 1-11, 1-12 event MIB subagent 4-10 expansion, number GUI configuration 2-6 manual configuration B-24 exporting bulk data 2-16 F farm, proxy-server 1-11, 1-18, 2-5 features, configurable access and error logging 1-11 accounting 1-11 address translation, next-hop routing, and IP resolution 1-11 authentication and authorization 1-11 DNS support 1-11 IP security 1-11 proxy-server farms 1-11 registrar 1-11 registries and route configurations 1-11 spiralled and looped request detection 1-11, 1-21 subscribers 1-11 TLS support 1-11 forgotten password 2-12, 5-8, 5-10, C-11, C-17, C-18 G GKTMP (GateKeeper Transaction Message Protocol) GUI configuration 2-6 manual configuration B-14 GUI-based provisioning system 1-7, 2-1, 3-1 H H.323 RAS Protocol basic concepts 1-14 GUI configuration 2-7, 2-14 manual configuration B-29 hardware prerequisites 1-2 host-specific directives B-5 I IDs, user basic concepts 1-11 GUI configuration 2-17 importing bulk data 2-16 IP resolution, basic concepts 1-11, 1-13 IPSec (IP Security) basic concepts 1-11, 1-18 manual configuration B-33 L licenses basic concepts 1-7 configuration 3-7, B-2 location service 1-5 log files basic concepts 1-12, 3-3, B-3 IN-2
3 GUI configuration 3-3 manual configuration B-6 removal from hard disk 3-5 rotation B-3, B-6 size 1-3, 3-4 looped request detection 1-11, 1-21 lost password, Linux root 5-3 M maintenance, system GUI maintenance 3-1 manual maintenance C-1 managing log files 3-3 manual operation and maintenance C-1 manual system configuration B-1 memory size 2-9 messages, SIP request A-1, E-1 response A-1, E-1 MIB subagent 4-10 modes, server 1-10 modules, translation 1-13 monitoring system status 4-1 multiple domains basic concepts 1-18 GUI configuration 2-9 manual configuration B-28 MySQL database basic concepts 1-7, 2-6 configuring B-13 MySQL database tool C-15 operating 3-3 restoring 3-10 N next-hop routing basic concepts 1-11 to 1-13 GUI configuration 2-14 manual configuration B-26, B-29 RAS 2-7, 2-14 NIS (Network Information System) 1-3 NTP (Network Time Protocol) B-28, B-31 number expansion GUI configuration 2-6 manual configuration B-24 O operating systems, supported 1-2, 1-3, 2-2, 5-2 operation, system GUI operation 3-1 manual operation C-1 P passwords default 1-11 forgotten 2-12, 5-8, 5-10, C-11, C-17, C-18 Linux root 5-3 permissions, system 1-3 preauthentication query, manual configuration B-22 prepaid service applications 5-12 prerequisites, hardware and software 1-2 privacy GUI configuration 2-7 manual configuration B-19, B-21 provisioning agent (spa) 1-7 provisioning server (pserver) 1-7 proxy host, virtual B-28 proxy server (sipd) general concepts 1-5, 1-7, 1-10 GUI configuration 2-3 proxy-server farm 1-11, 1-18, 2-5 IN-3
4 proxy-server settings 2-3 pserver (provisioning server) 1-7 R RAS Protocol basic concepts 1-14 GUI configuration 2-7, 2-14 manual configuration B-29 redirect server 1-5, 1-10 registrar server 1-5, 1-11, 1-18 Registration, Admission, and Status Protocol See RAS Protocol registry database general concepts 1-7, 1-11, 1-20 GUI configuration 2-8, 2-12 managing C-12 manual configuration B-27 regroute databases tool B-26, B-31, B-32, C-12 request messages, SIP A-1, E-1 response messages, SIP A-1, E-1 restoration, system 3-8 restrictions on system operation 1-2, 1-3, 2-2, 5-2 RFC compliance A-1 rotating log files 3-3 routes, dynamic and static 2-14 routing, next-hop GUI configuration 2-7, 2-8, 2-14 manual configuration B-29 routing database general concepts 1-7, 1-20 managing C-12 RPMS B-22 RPMS (Cisco Resource Policy Management System) 2-8 S server-core directives 2-9 server-global directives 2-8, B-4 servers provisioning (pserver) 1-7 proxy (sipd) 1-5, 1-7, 1-10, 2-3 redirect 1-5, 1-10 registrar 1-5, 1-11, 1-18 server modes 1-10 shared memory size 2-9 SIP (Session Initiation Protocol) basic concepts 1-3 compliance A-1 directives See directives B-3 general information 1-1 requests A-1, E-1 responses A-1, E-1 sipd (proxy server) general concepts 1-5, 1-7, 1-10 GUI configuration 2-3 size, log file 1-3, 3-4 SNMP (Simple Network Management Protocol) 4-1 software Cisco SPS version 1-3 prerequisites 1-2 spa (provisioning agent) 1-7 spiralled request detection 1-11, 1-21 standard directives B-13 static routes 2-14 status, system, monitoring 4-1 subagents 4-1, 4-10 subscribers basic concepts 1-11, 1-21 GUI configuration 2-11 manual configuration B-13 troubleshooting problems with C-17 synchronization, time 1-3, B-28, B-31 system configuration GUI 2-1 manual B-1 IN-4
5 system operation and maintenance GUI 3-1 manual C-1 system troubleshooting 5-1 virtual proxy host basic concepts 1-18 GUI configuration 2-9 manual configuration B-28, B-29 T time synchronization 1-3, B-28, B-31 TLS basic concepts 1-11, 1-22 GUI configuration 2-18 manual configuration B-12 tools CIAgent 3-1, 4-1 MySQL database tool C-15 regroute databases tool B-26, B-31, B-32, C-12 transaction-stateful and transaction-stateless server modes 1-10 translation, address manual configuration B-25 translation modules 1-13 Transport Layer Security See TLS traps 4-1, 4-13 troubleshooting 5-1 trust lists, manual configuration B-19 W wildcards 1-19, 2-13, B-25 U user-agent client 1-4 user-agent server 1-4 user IDs basic concepts 1-11 GUI configuration 2-17 V vendor-specific attribute (VSA) 1-12, B-17 IN-5
6 IN-6
Managing Databases. Prerequisites. Information About the Database Administration Tools CHAPTER
CHAPTER 4 This chapter describes two Cisco SIP proxy server (Cisco SPS) database administration tools: The registry and routing (regroute) databases tool The MySQL database tool It contains the following
More informationConfiguring Cisco SPS
CHAPTER 2 Configuring Cisco SIP proxy server (Cisco SPS) involves tasks such as creating a proxy-server farm, setting up individual proxy servers to handle tasks, and adding subscribers, registries, and
More informationTroubleshooting. Contents CHAPTER
CHAPTER 5 This chapter contains a list of trouble symptoms and error messages that might arise as you configure and use Cisco SIP proxy server (Cisco SPS), with possible causes and recommended actions.
More informationCisco SIP Proxy Server Administrator Guide
Cisco SIP Proxy Server Administrator Guide Version 2.0 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More informationOperating and Maintaining Cisco SPS
CHAPTER 3 This chapter provides information on how to operate and maintain the Cisco SIP proxy server (Cisco SPS). Operation and maintenance involves starting and stopping the system and database, working
More informationCisco SPS Overview. Prerequisites. Hardware and Software CHAPTER
CHAPTER 1 The Cisco SIP proxy server (Cisco SPS) is a call-control software package that enables service providers and others to build scalable, reliable packet voice networks and provides the capabilities
More informationOperating and Maintaining Cisco SPS
CHAPTER 3 Operating and maintaining Cisco SIP proxy server (Cisco SPS) involves starting and stopping the system and database, working with system logs, and backing up and restoring the system. This chapter
More informationUnderstanding Feature and Network Services in Cisco Unified Serviceability
CHAPTER 10 Understanding Feature and Network Services in Cisco Unified Serviceability May 19, 2009 Cisco Unified Serviceability service management includes working with feature and network services and
More informationHT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE
HT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE Once HT801/HT802 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT801/HT802 is upgraded
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationPort Usage Information for the IM and Presence Service
Port Usage Information for the Service Port usage overview, page 1 Information collated in table, page 1 service port list, page 2 Port usage overview This document provides a list of the and ports that
More informationHT812/HT814 Firmware Release Note IMPORTANT UPGRADING NOTE
HT812/HT814 Firmware Release Note IMPORTANT UPGRADING NOTE Once HT812/HT814 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT812/HT814 is upgraded
More informationPort Usage Information for the IM and Presence Service
Port Usage Information for the Service Service Port Usage Overview, on page 1 Information Collated in Table, on page 1 Service Port List, on page 2 Service Port Usage Overview This document provides a
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationMonitoring System Status
CHAPTER 5 This chapter provides information on how to use the SNMP-based CIAgent tool to monitor Cisco SIP proxy server (Cisco SPS) system status. It contains the following sections: Prerequisites, page
More informationCisco TelePresence Video Communication Server
Cisco TelePresence Video Communication Server Administrator Guide D14049.09 December 2010 Software version: X6 Contents Contents Contents 2 About the Cisco TelePresence Video Communication Server (Cisco
More informationMonitoring System Status
CHAPTER 4 This chapter describes how to use the SNMP-based CIAgent tool to monitor Cisco SIP proxy server (Cisco SPS) system status. Contents Prerequisites, page 4-1 Information About CIAgent, Subagents,
More informationDistribute Call Studio applications to Unified CVP VXML Servers.
is one of the Cisco Unified Customer Voice Portal (CVP) components and a web-based interface using which you can configure other Unified CVP components and devices in the Unified CVP solution. Use to perform
More informationNortel Communication Server 1000 Network Routing Service Fundamentals. Release: 6.0 Document Revision:
Network Routing Service Fundamentals Release: 6.0 Document Revision: 01.04 www.nortel.com NN43001-130. Release: 6.0 Publication: NN43001-130 Document release date: All Rights Reserved. While the information
More informationHT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE
HT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE Once HT801/HT802 is upgraded to 1.0.5.7 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT801/HT802 is upgraded
More informationHT801/HT802 Firmware Release Notes IMPORTANT UPGRADING NOTE
HT801/HT802 Firmware Release Notes IMPORTANT UPGRADING NOTE Once HT801/HT802 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT801/HT802 is upgraded
More informationConfiguring LCS and MPS J3 for SIP
Configuring LCS and MPS J3 for SIP TANDBERG D50429, Rev 1.0 This document is not to be reproduced in whole or in part without the permission in writing from: TANDBERG Table of Contents 1. SIP...3 2. CONFIGURING
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationRelease Notes for the Cisco SIP Proxy Server (SPS) Version
Release Notes for the Cisco SIP Proxy Server (SPS) Version 2.2.1.10 November 9, 2004 OL-5875-01 Rev. A1 This document lists the known problems in the Cisco SIP Proxy Server (SPS) Version 2.2.1.10 and contains
More informationInstallation & Configuration Guide Version 4.0
TekSIP Installation & Configuration Guide Version 4.0 Document Revision 6.8 https://www.kaplansoft.com/ TekSIP is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates, which can be
More informationViewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418
This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help
More informationCCNA & CCNP Collaboration. IP Telephony IP Telephony
CCNA & CCNP Collaboration CCNA & CCNP Collaboration IP Telephony IP Telephony CUCM CME IP Telephony Gateway Call Handler Voice Mail CUC IP Telephony IM CUPS IP Telephony Video Course Outline Exam Number:
More informationCisco TelePresence Video Communication Server
Cisco TelePresence Video Communication Server Administrator Guide D14049.11 August 2011 Software version: X7.0 Contents Introduction 18 About the Cisco TelePresence Video Communication Server (VCS) 19
More informationConfigure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.
This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4
More informationCisco TelePresence Basic Cisco VCS configuration
Cisco TelePresence Basic Cisco VCS configuration Deployment Guide D14651.02 September 2011 Cisco VCS Control with Cisco VCS Expressway X7.0 Contents Document revision history 5 Introduction 6 Out of scope
More informationRelease Notes for the Cisco SIP Proxy Server (SPS) Version
Release Notes for the Cisco SIP Proxy Server (SPS) Version 2.2.1.11 February 24, 2005 OL-5875-01 Rev. A2 This document lists the known problems in the Cisco SIP Proxy Server (SPS) Version 2.2.1.11 and
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 3 Cisco ISE Policy Service Node Ports, page 4 Cisco ISE pxgrid Service Ports, page 8 OCSP
More informationIntercluster Peer Configuration
Prerequisites for Intercluster Deployment, page 1, page 2 Prerequisites for Intercluster Deployment You configure an intercluster peer between the IM and Presence database publisher nodes in standalone
More informationGeneric Transparency Descriptor for GKTMP Using SS7 Interconnect for Voice Gateways Version 2.0
Generic Transparency Descriptor for GKTMP Using SS7 Interconnect for Voice Gateways Version 20 Feature History Release 122(2)XU Modification This feature was introduced This document describes the Generic
More informationConfiguring VoIP Call Setup Monitoring
The Cisco IOS IP Service Level Agreements (SLAs) VoIP Call Setup (Post-Dial Delay) Monitoring feature provides the ability to measure your network s response time for setting up a Voice over IP (VoIP)
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco
More informationHT812/HT814 Firmware Release Notes IMPORTANT UPGRADING NOTE
HT812/HT814 Firmware Release Notes IMPORTANT UPGRADING NOTE Once HT812/HT814 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT812/HT814 is upgraded
More informationLinux Administration
Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals
More informationSharePoint 2016 Administrator's Survival Camp
SharePoint 2016 Administrator's Survival Camp Installing and Managing SharePoint 2016 in an On -premises Environment Course Code Audience Format Length Course Description Student Prerequisites SSC2016
More informationNetwork Admission Control Agentless Host Support
Network Admission Control Agentless Host Support Last Updated: October 10, 2012 The Network Admission Control: Agentless Host Support feature allows for an exhaustive examination of agentless hosts (hosts
More informationIEEE 802.1X Multiple Authentication
The feature provides a means of authenticating multiple hosts on a single port. With both 802.1X and non-802.1x devices, multiple hosts can be authenticated using different methods. Each host is individually
More informationSNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics
Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,
More informationCall Control Discovery
CHAPTER 3 The call control discovery feature leverages the Service Advertisement Framework (SAF) network service, a proprietary Cisco service, to facilitate dynamic provisioning of inter-call agent information.
More informationCisco Expressway Cluster Creation and Maintenance
Cisco Expressway Cluster Creation and Maintenance Deployment Guide Cisco Expressway X8.6 July 2015 Contents Introduction 4 Prerequisites 5 Upgrading an X8.n cluster to X8.6 6 Prerequisites 6 Upgrade Expressway
More informationAvaya - Avaya Aura Session and System Manager Implementation, Administration, Maintenance, and Troubleshooting (R6.x) (5U00097)
Avaya - Avaya Aura Session and System Manager Implementation, Administration, Maintenance, and Troubleshooting (R6.x) (5U00097) Code: 0630 Length: URL: 10 days View Online In this course, you will learn
More informationPartitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2
Partitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, First Published: 2017-01-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationORACLE ENTERPRISE COMMUNICATIONS BROKER
ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP
More informationUser and System Administration
CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Cisco CUCM Configuration Guide REVISION: DATE: MARCH 7 TH, 2018
DMP 128 Plus C V DMP 128 Plus C V AT Cisco CUCM Configuration Guide REVISION: 1.2.1 DATE: MARCH 7 TH, 2018 Revision Log Date Version Notes Aug. 4 th 2017 1.0 First Release: Applies to Firmware Version
More informationUser and System Administration
CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays
More informationCluster creation and maintenance
Cluster creation and maintenance Cisco TelePresence Deployment Guide Cisco VCS X6.1 Cisco TMS 12.6 or later D14367.08 May 2011 Contents Contents Document revision history... 5 Introduction... 6 Prerequisites...
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More informationTrace Field Descriptions
APPENDIXC Trace Field s May 19, 2009 For some services, you can activate trace for specific components, instead of enabling all trace for the service. The following list includes the services for which
More informationDNS SRV Usage. All Mediatrix Units
All Mediatrix Units Revision 663July 23, 2015 Table of Contents Table of Contents 3 DNS SRV ( RFC 2782) 4 Type A Query 5 Type A Query to a SRV Record 7 Type SRV Query 9 The Effects of Priority and Weight
More informationCisco TelePresence Video Communication Server
Cisco TelePresence Video Communication Server Administrator Guide Software version: X7.1 D14049.12 March 2012 Contents Introduction 12 About the Cisco TelePresence Video Communication Server (VCS) 13 VCS
More informationCisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)
Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X7.2 D14524.03 August 2012 Contents Introduction 3 Example network deployment 3 Internal
More informationCisco TelePresence VCS Cluster Creation and Maintenance
Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster
More informationCisco TelePresence Conductor with Cisco Unified Communications Manager
Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide TelePresence Conductor XC4.0 Unified CM 10.5(2) January 2016 Contents Introduction 6 About this document 6 Related
More informationUse NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454
Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454 Document ID: 65122 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Topology
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationF-Secure Policy Manager Administrator's Guide
F-Secure Policy Manager Administrator's Guide 17-10-25 TOC F-Secure Policy Manager Contents Chapter 1: Introduction...7 1.1 What's new...8 1.2 System requirements...8 1.2.1 Policy Manager Server...8 1.2.2
More informationNCP Secure Enterprise Management for Windows Release Notes
Service Release: 4.05 r35843 Date: June 2017 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows Server 2016 64 Bit Windows Server
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10
More informationCisco Unified CM Disaster Recovery System
Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,
More informationPer-User ACL Support for 802.1X/MAB/Webauth Users
Per-User ACL Support for 802.1X/MAB/Webauth Users This feature allows per-user ACLs to be downloaded from the Cisco Access Control Server (ACS) as policy enforcement after authentication using IEEE 802.1X,
More informationThe MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to
The feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to utilize Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2) authentication for PPP connections between
More informationWWPass External Authentication Solution for IBM Security Access Manager 8.0
WWPass External Authentication Solution for IBM Security Access Manager 8.0 Setup guide Enhance your IBM Security Access Manager for Web with the WWPass hardware authentication IBM Security Access Manager
More informationCisco TelePresence Conductor with Unified CM
Cisco TelePresence Conductor with Unified CM Deployment Guide TelePresence Conductor XC3.0 Unified CM 10.x Revised February 2015 Contents Introduction 5 About this document 5 Related documentation 5 About
More informationSystem Requirements. System Requirements for Cisco DCNM, Release 10, page 1 Deployment Best Practices for Cisco DCNM, Release 10.
This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in
More informationIEEE 802.1X with ACL Assignments
The feature allows you to download access control lists (ACLs), and to redirect URLs from a RADIUS server to the switch, during 802.1X authentication or MAC authentication bypass of the host. It also allows
More informationIEEE 802.1X RADIUS Accounting
The feature is used to relay important events to the RADIUS server (such as the supplicant's connection session). The information in these events is used for security and billing purposes. Finding Feature
More informationNetwork Deployments in Cisco ISE
Cisco ISE Network Architecture, page 1 Cisco ISE Deployment Terminology, page 2 Node Types and Personas in Distributed Deployments, page 2 Standalone and Distributed ISE Deployments, page 4 Distributed
More informationCisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.6 July 2015 Contents Introduction 4 Example network deployment 5 Network elements
More informationInternet Protocol Version 6 (IPv6)
This chapter provides information about Internet Protocol version 6 (IPv6), which is the latest version of the Internet Protocol (IP). Packets are used to exchange data, voice, and video traffic over dual-stack
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Avaya IP Office Configuration Guide REVISION: 1.2 DATE: JANUARY 9 TH 2018
DMP 128 Plus C V DMP 128 Plus C V AT Avaya IP Office Configuration Guide REVISION: 1.2 DATE: JANUARY 9 TH 2018 Revision Log Date Version Notes August 6 th 2017 1.0 First Release: Applies to Firmware 1.01.0004.002
More informationSYSLOG Enhancements for Cisco IOS EasyVPN Server
SYSLOG Enhancements for Cisco IOS EasyVPN Server In some situations the complexity or cost of the authentication, authorization, and accounting (AAA) server prohibits its use, but one of its key function
More informationWindows 2000 System Administration Handbook, 1/e
Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5
More informationCisco TelePresence Device Authentication on Cisco VCS
Cisco TelePresence Device Authentication on Cisco VCS Deployment Guide Cisco VCS X8.5 December 2014 Contents About device authentication 4 Authentication policy 6 Configuring VCS authentication policy
More informationCisco TelePresence Conductor with Cisco VCS (Policy Service)
Cisco TelePresence Conductor with Cisco VCS (Policy Service) Deployment Guide TelePresence Conductor XC3.0 Cisco VCS X8.x Revised January 2015 Contents Introduction 5 About the Cisco TelePresence Conductor
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Cisco CUCM Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017
DMP 128 Plus C V DMP 128 Plus C V AT Cisco CUCM Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017 Revision Log Date Version Notes August 4 th 2017 1.0 First Release: Applies to Firmware Version
More informationSymbols INDEX > 12-14
INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting
More informationCisco Expressway Cluster Creation and Maintenance
Cisco Expressway Cluster Creation and Maintenance Deployment Guide First Published: December 2009 Last Updated: April 2017 Cisco Expressway X8.9.2 Cisco Systems, Inc. www.cisco.com Contents Preface 3 Change
More informationHT802 Firmware Release Note IMPORTANT UPGRADING NOTE
HT802 Firmware Release Note Once HT802 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT802 is upgraded to 1.0.2.7, downgrading to 1.0.1.x firmware
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationACS 5.x: LDAP Server Configuration Example
ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using
More informationAuthenticating Devices
Authenticating Devices Cisco TelePresence Deployment Guide Cisco VCS X6.1 D14819.01 May 2011 Contents Contents Document revision history... 4 Introduction... 5 Local database... 6 Configuration... 6 H.350
More information1 SIP Carriers. 1.1 SpeakUP Warnings Vendor Contact Versions Verified Interaction Center 4.0 SU
1 SIP Carriers 1.1 SpeakUP 1.1.1 Warnings Check the SIP Carrier Matrix of the Interactive Intelligence Testlab website for certification status and supported features: http://testlab.inin.com 1.1.2 Vendor
More informationCisco H.323 Signaling Interface
CHAPTER 1 Introduction This chapter provides an overview of the (HSI) system and subsystems and contains the following sections: Cisco HSI Overview, page 1-1 Cisco HSI System Description, page 1-2 Operational
More informationRestrictions for DMVPN Dynamic Tunnels Between Spokes. Behind a NAT Device. Finding Feature Information
DMVPN Dynamic Tunnels Between Spokes Behind a NAT Device The DMVPN: Dynamic Tunnels Between Spokes Behind a NAT Device feature allows Next Hop Resolution Protocol (NHRP) spoke-to-spoke tunnels to be built
More informationWindows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course 50331D; 5 days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills needed to isolate,
More informationCisco TelePresence Conductor with Cisco Unified Communications Manager
Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide XC2.2 Unified CM 8.6.2 and 9.x D14998.09 Revised March 2014 Contents Introduction 4 About this document 4 Further
More informationCisco VCS Expressway and VCS Control - Basic Configuration
Cisco VCS Expressway and VCS Control - Basic Configuration Deployment Guide First Published: November 2010 Last Updated: July 2016 Cisco VCS X8.8 Cisco Systems, Inc. www.cisco.com 2 Preface Preface Change
More informationNetwork Admission Control
Network Admission Control Last Updated: October 24, 2011 The Network Admission Control feature addresses the increased threat and impact of worms and viruses have on business networks. This feature is
More informationTurn Up a Node. Before You Begin CHAPTER
CHAPTER 4 Turn Up a Node This chapter explains how to provision a single Cisco ONS 15600 node and turn it up for service, including node name, date and time, timing references, network attributes such
More informationIPv6 Access Services: DHCPv6 Prefix Delegation
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) prefix delegation feature can be used to manage link, subnet, and site addressing changes. Finding Feature Information, page 1 Information About,
More information