Cisco Voice Gateways And Gatekeepers

Download Cisco Voice Gateways And Gatekeepers PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Cisco Voice Gateways And Gatekeepers book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Cisco Voice Gateways and Gatekeepers

Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and protocols and acting as the interface between an IP telephony network and the PSTN or PBX. Gatekeepers and IP-to-IP gateways help these networks scale. Gatekeepers provide call admission control, call routing, address resolution, and bandwidth management between H.323 endpoints including Cisco IOS® voice gateways and Cisco® Unified CallManager clusters. IP-to-IP gateways allow VoIP calls to traverse disparate IP networks. Cisco Voice Gateways and Gatekeepers provides detailed solutions to real-world problems encountered when implementing a VoIP network. This practical guide helps you understand Cisco gateways and gatekeepers and configure them properly. Gateway selection, design issues, feature configuration, and security and high-availability issues are all covered in depth. The abundant examples, screen shots, configuration snips, and case studies make this a truly practical and useful guide for anyone interested in the proper implementation of gateways and gatekeepers in a VoIP network. Emphasis is placed on the accepted best practices and common issues encountered in real-world deployments. Cisco Voice Gateways and Gatekeepers is divided into four parts. Part I provides an overview of an IP voice network. Part II is dedicated to voice gateways, including discussions of Media Gateway Control Protocol (MGCP); H.323; Session Initiation Protocol (SIP); voice circuit options; connecting to the PSTN, PBX, and IP WAN; dial plans; digit manipulation; route selection; class of restriction; Survivable Remote Site Telephony (SRST) and MGCP fallback; digital signal processor (DSP) resources; and Tool Command Languaue (Tcl) scripts and Voice XML (VXML). Part III addresses voice gatekeepers, including detailed deployment and configuration. Part IV is dedicated to IP-to-IP gateways.
Cisco Voice Gateways and Gatekeepers (642-452/642-453).

Cisco Voice Gateways and Gatekeepers Understanding and configuring GW/GK in complex VoIP networks Denise Donohue, CCIE® No. 9566 David Mallory, CCIE No. 1933 Ken Salhoff, CCIE No. 4915 Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and protocols and acting as the interface between an IP telephony network and the PSTN or PBX. Gatekeepers and IP-to-IP gateways help these networks scale. Gatekeepers provide call admission control.
Securing Cisco IP Telephony Networks

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable. Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter. This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants. Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.