Foreword |
|
xxx | |
Introduction |
|
xxxiii | |
Part I: Introduction |
|
|
Chapter 1 Laying the Groundwork |
|
|
1 | (54) |
|
|
3 | (15) |
|
Brief Introduction to and History of SIP |
|
|
3 | (1) |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (3) |
|
|
11 | (4) |
|
Analyzing a Basic SIP Call |
|
|
15 | (3) |
|
|
18 | (2) |
|
|
18 | (1) |
|
|
19 | (1) |
|
Introduction to SIP Trunking |
|
|
20 | (6) |
|
SIP Trunking Architectural Models |
|
|
23 | (3) |
|
|
26 | (16) |
|
The Offer/Answer Framework |
|
|
30 | (1) |
|
Operation of the Offer/Answer Framework |
|
|
31 | (1) |
|
Generating the SDP Offer and Answer |
|
|
31 | (6) |
|
|
37 | (2) |
|
|
39 | (2) |
|
|
41 | (1) |
|
Modifying the Address, Port, Transport or Media Format |
|
|
42 | (1) |
|
|
42 | (2) |
|
Session Border Controllers |
|
|
44 | (9) |
|
|
46 | (3) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
DoS and Overload Protection |
|
|
50 | (1) |
|
Fixing Capability Mismatches |
|
|
51 | (2) |
|
Cisco Unified Border Element |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Chapter 2 SBC Deployment Models |
|
|
55 | (56) |
|
|
56 | (5) |
|
|
57 | (1) |
|
Integrating for PSTN Access |
|
|
57 | (1) |
|
Integrations with Mergers and Acquisitions |
|
|
57 | (1) |
|
|
58 | (1) |
|
Integrating with Third-Party Appliances |
|
|
58 | (1) |
|
Contact Center Integration |
|
|
58 | (1) |
|
Call Recording Integration |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (7) |
|
|
62 | (1) |
|
Hardware Appliance versus Virtualization |
|
|
63 | (2) |
|
Platform Feature Comparison |
|
|
65 | (1) |
|
|
66 | (2) |
|
Planning for Media Resources |
|
|
68 | (1) |
|
Multi-VRF Support on CUBE |
|
|
68 | (4) |
|
|
70 | (2) |
|
|
72 | (36) |
|
Checkpointing for Stateful Failover |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Intra-Box Redundancy Options for ASR Platforms |
|
|
79 | (1) |
|
Configuration of RPR or SSO |
|
|
80 | (1) |
|
Troubleshooting Redundancy |
|
|
80 | (3) |
|
|
83 | (1) |
|
CUBE High Availability with HSRP |
|
|
83 | (13) |
|
CUBE High Availability with Redundancy Groups |
|
|
96 | (9) |
|
|
105 | (1) |
|
External Peer Resilience with CUBE with Multiple Trunks |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
109 | (2) |
Part II Architecture, Capabilities and Design |
|
|
|
111 | (114) |
|
Dialing and Routing a SIP Call |
|
|
112 | (16) |
|
SIP INVITE Request Forwarding |
|
|
114 | (1) |
|
SIP INVITE Response Routing |
|
|
115 | (6) |
|
SIP Record-Route and Route Header Fields |
|
|
121 | (7) |
|
|
128 | (4) |
|
Directory Number-Based Routing |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
Trunk Group-Based Routing |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (4) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
Next-Hop Availability Check |
|
|
136 | (5) |
|
|
138 | (3) |
|
|
141 | (8) |
|
|
143 | (1) |
|
|
143 | (6) |
|
CUBE Call Routing Mechanisms |
|
|
149 | (72) |
|
|
150 | (1) |
|
Inbound and Outbound Dial Peers |
|
|
150 | (8) |
|
Inbound Dial Peer Matching Rules |
|
|
158 | (4) |
|
Outbound Dial Peer Matching Rules |
|
|
162 | (4) |
|
|
166 | (1) |
|
Called Number Transformation |
|
|
167 | (3) |
|
Calling Number Transformation |
|
|
170 | (2) |
|
Redirect Number Transformation |
|
|
172 | (3) |
|
|
175 | (1) |
|
|
176 | (2) |
|
|
178 | (2) |
|
|
180 | (4) |
|
|
184 | (3) |
|
Call Routing in Multitenant Environments |
|
|
187 | (6) |
|
|
193 | (5) |
|
Dial Peer Provisioning Policies |
|
|
198 | (4) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (5) |
|
Troubleshooting Call Setup Failures |
|
|
208 | (6) |
|
|
214 | (6) |
|
Common Call Setup Failure Reasons |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (3) |
|
Chapter 4 Signaling and Interworking |
|
|
225 | (102) |
|
|
226 | (55) |
|
Early Offer and Delayed Offer Interworking |
|
|
226 | (2) |
|
Reliable Handling and Interworking of Provisional Responses |
|
|
228 | (5) |
|
Ringback and Provisional Response Interworking |
|
|
233 | (6) |
|
|
239 | (5) |
|
|
244 | (1) |
|
|
244 | (8) |
|
|
252 | (2) |
|
|
254 | (13) |
|
|
267 | (4) |
|
|
271 | (7) |
|
Managing Mid-call Signaling |
|
|
278 | (3) |
|
|
281 | (2) |
|
|
283 | (16) |
|
SIP Profile Configuration |
|
|
284 | (3) |
|
|
287 | (4) |
|
|
291 | (2) |
|
|
293 | (2) |
|
|
295 | (3) |
|
Troubleshooting SIP Profiles |
|
|
298 | (1) |
|
Transport and Protocol Interworking |
|
|
299 | (13) |
|
Layer 4 Transport Interworking |
|
|
300 | (6) |
|
|
306 | (6) |
|
Interworking Protocol Extensions |
|
|
312 | (1) |
|
|
312 | (7) |
|
|
313 | (1) |
|
Message Waiting Indicator (MWI) |
|
|
314 | (3) |
|
|
317 | (2) |
|
|
319 | (4) |
|
Troubleshooting SIP-H.323 Interworking |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (4) |
|
Chapter 5 Media Processing |
|
|
327 | (88) |
|
Real-Time Transport Protocol |
|
|
328 | (6) |
|
|
329 | (5) |
|
|
334 | (1) |
|
Real-Time Transport Control Protocol |
|
|
334 | (7) |
|
|
335 | (1) |
|
|
336 | (1) |
|
RTCP Receiver Report (RR) |
|
|
337 | (2) |
|
RTCP Source Description (SDES) Packet |
|
|
339 | (1) |
|
RTCP Goodbye Packet (BYE) |
|
|
340 | (1) |
|
|
341 | (1) |
|
SBC Handling of RTP and RTCP |
|
|
341 | (13) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Configuration for Media Handling |
|
|
348 | (5) |
|
Generic RTP and RTCP Handling by SBCs |
|
|
353 | (1) |
|
|
353 | (1) |
|
Configuration of Assisted RTCP |
|
|
354 | (1) |
|
Symmetric and Asymmetric RTP/RTCP |
|
|
354 | (2) |
|
DSP-Based RTP Handling on SBCs |
|
|
356 | (18) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Skinny Client Control Protocol (SCCP) Transcoder |
|
|
358 | (8) |
|
Local Transcoding Interface (LTI) Transcoder |
|
|
366 | (2) |
|
|
368 | (4) |
|
|
372 | (2) |
|
|
374 | (4) |
|
Alternative Network Address Types |
|
|
378 | (2) |
|
Solving NAT Traversal Challenges |
|
|
380 | (24) |
|
|
380 | (3) |
|
Problems with Real-Time Collaboration over NAT |
|
|
383 | (1) |
|
|
383 | (2) |
|
Limitations of ALG for NAT Fixup |
|
|
385 | (1) |
|
|
385 | (3) |
|
|
388 | (1) |
|
|
388 | (5) |
|
|
393 | (1) |
|
|
393 | (8) |
|
|
401 | (3) |
|
|
404 | (9) |
|
|
413 | (1) |
|
|
413 | (2) |
|
Chapter 6 Secure Signaling and Media |
|
|
415 | (94) |
|
Understanding Secure Technologies |
|
|
415 | (34) |
|
Encryption and Decryption |
|
|
417 | (1) |
|
Symmetric and Asymmetric Keys |
|
|
418 | (1) |
|
|
419 | (1) |
|
Data Integrity Verification |
|
|
419 | (3) |
|
|
422 | (1) |
|
|
423 | (2) |
|
|
425 | (1) |
|
|
426 | (7) |
|
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) |
|
|
433 | (10) |
|
Datagram Transport Layer Security (DTLS) |
|
|
443 | (2) |
|
Secure/Multipurpose Internet Mail Extensions (S/MIME) |
|
|
445 | (4) |
|
Establishing Secure Sessions |
|
|
449 | (25) |
|
|
450 | (2) |
|
|
452 | (7) |
|
Secure Media Key Management Protocols |
|
|
459 | (1) |
|
|
460 | (4) |
|
|
464 | (5) |
|
|
469 | (5) |
|
SBC Signaling and Media Security |
|
|
474 | (30) |
|
SBC Signaling Plane Security |
|
|
475 | (12) |
|
|
487 | (3) |
|
Best-Effort SRTP and SRTP Fallback |
|
|
490 | (2) |
|
|
492 | (4) |
|
Troubleshooting Signaling and Media Security |
|
|
496 | (8) |
|
Alternative Security Methods |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (4) |
|
Chapter 7 DTMF Interworking |
|
|
509 | (62) |
|
Introduction to DTMF Relay |
|
|
510 | (2) |
|
|
512 | (18) |
|
|
512 | (1) |
|
|
513 | (3) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
518 | (2) |
|
|
520 | (7) |
|
|
527 | (3) |
|
H.245 Alphanumeric and Signal |
|
|
530 | (1) |
|
|
530 | (16) |
|
In-Band DTMF Relay on SBCs |
|
|
531 | (1) |
|
Named Telephony Events on SBCs |
|
|
531 | (11) |
|
|
542 | (1) |
|
Out-of-Band DTMF Relay on SBCs |
|
|
543 | (3) |
|
Configuring and Troubleshooting DTMF Relay |
|
|
546 | (22) |
|
Configuring and Troubleshooting Named Telephony Events |
|
|
548 | (1) |
|
Configuring Named Telephony Events |
|
|
548 | (1) |
|
Troubleshooting Named Telephony Events |
|
|
549 | (9) |
|
Configuring and Troubleshooting Raw In-Band DTMF |
|
|
558 | (1) |
|
Configuring Raw In-Band DTMF |
|
|
558 | (2) |
|
Troubleshooting Raw In-Band DTMF |
|
|
560 | (5) |
|
Configuring and Troubleshooting SIP KPML, SIP NOTIFY, and SIP INFO |
|
|
565 | (1) |
|
Configuring SIP KPML, SIP NOTIFY, and SIP INFO |
|
|
565 | (1) |
|
Troubleshooting SIP KPML, SIP NOTIFY, and SIP INFO |
|
|
565 | (1) |
|
Configuring and Troubleshooting H.245 Alphanumeric and H.245 Signal |
|
|
566 | (1) |
|
Configuring H.245 Alphanumeric/Signal |
|
|
566 | (1) |
|
Troubleshooting H.245 Alphanumeric and H.245 Signal |
|
|
566 | (2) |
|
|
568 | (1) |
|
|
568 | (3) |
|
Chapter 8 Scalability Considerations |
|
|
571 | (56) |
|
|
572 | (26) |
|
General Scalability Concepts |
|
|
572 | (1) |
|
Calls per Second and Messages per Second |
|
|
572 | (5) |
|
|
577 | (1) |
|
|
578 | (2) |
|
Case Study: Sizing a Generic SBC |
|
|
580 | (2) |
|
|
582 | (1) |
|
General CUBE Platform Sizing |
|
|
582 | (1) |
|
Media Resource Sizing for CUBE |
|
|
582 | (4) |
|
Troubleshooting Scalability Issues |
|
|
586 | (1) |
|
CPU Utilization and System Load |
|
|
586 | (5) |
|
|
591 | (3) |
|
|
594 | (4) |
|
|
598 | (12) |
|
General Licensing Considerations |
|
|
599 | (2) |
|
|
601 | (1) |
|
|
602 | (5) |
|
|
607 | (3) |
|
Overload Prevention Techniques |
|
|
610 | (15) |
|
SIP Overload Specifications |
|
|
611 | (1) |
|
RFC 7339: Overload Control Communication Scheme |
|
|
612 | (2) |
|
Overload Security Considerations |
|
|
614 | (1) |
|
Additional Overload Challenges |
|
|
614 | (1) |
|
|
615 | (1) |
|
|
616 | (9) |
|
|
625 | (1) |
|
|
626 | (1) |
Part III Integrations and Interoperability |
|
|
Chapter 9 SIP Trunking for PSTN Access Through SBCs |
|
|
627 | (52) |
|
Best Practices for ITSP Access with SBCs |
|
|
628 | (7) |
|
|
628 | (1) |
|
|
629 | (1) |
|
Secure Signaling and Media |
|
|
630 | (1) |
|
|
630 | (1) |
|
|
630 | (1) |
|
|
630 | (2) |
|
Plurality of Entry and Exit Trunks |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
635 | (7) |
|
Overview of RFC 3261 for SIP REGISTER |
|
|
635 | (1) |
|
Discovering a Registrar Server and Constructing a Request |
|
|
636 | (1) |
|
|
637 | (1) |
|
Service Provider Peering and Registration |
|
|
638 | (1) |
|
|
638 | (3) |
|
|
641 | (1) |
|
|
642 | (6) |
|
Digest Authentication in SIP |
|
|
643 | (1) |
|
User Agent Authentication |
|
|
644 | (3) |
|
|
647 | (1) |
|
Digest Authentication Considerations |
|
|
648 | (1) |
|
|
648 | (23) |
|
|
649 | (2) |
|
|
651 | (6) |
|
|
657 | (3) |
|
|
660 | (4) |
|
|
664 | (1) |
|
|
665 | (1) |
|
|
666 | (1) |
|
Overload Protection and Registration Rate Limiting |
|
|
667 | (2) |
|
Configuring Line-Side Registration |
|
|
669 | (2) |
|
|
671 | (6) |
|
SIP Trunk Not Registering with Service Provider |
|
|
671 | (6) |
|
|
677 | (1) |
|
|
677 | (2) |
|
Chapter 10 Fax over IP (FoIP) on SBCs |
|
|
679 | (72) |
|
|
680 | (3) |
|
|
680 | (1) |
|
|
681 | (2) |
|
Analyzing a Basic Fax Call |
|
|
683 | (16) |
|
|
686 | (1) |
|
|
686 | (2) |
|
|
688 | (1) |
|
|
689 | (1) |
|
EOP, MCF, MPS, RTP, RTN, and DCN |
|
|
690 | (1) |
|
|
691 | (5) |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
699 | (22) |
|
Switchover of Voice Calls to Fax |
|
|
700 | (1) |
|
|
701 | (2) |
|
Fax Passthrough over H.323 |
|
|
703 | (1) |
|
|
704 | (3) |
|
|
707 | (7) |
|
|
714 | (1) |
|
|
715 | (6) |
|
|
721 | (2) |
|
|
721 | (1) |
|
|
722 | (1) |
|
Protocol Mismatch Handling |
|
|
723 | (1) |
|
|
723 | (27) |
|
|
724 | (1) |
|
Fax Passthrough over H.323 |
|
|
724 | (2) |
|
|
726 | (2) |
|
Configuration of Fax Passthrough |
|
|
728 | (2) |
|
Troubleshooting Fax Passthrough on CUBE |
|
|
730 | (5) |
|
SG3 Faxing and Protocol Interworking |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
736 | (1) |
|
|
737 | (5) |
|
Fax Relay Fallback to Passthrough |
|
|
742 | (1) |
|
SG3 over Relay and Protocol Interoperability |
|
|
743 | (1) |
|
Configuration of Fax Relay on CUBE |
|
|
744 | (1) |
|
Troubleshooting Fax Relay on CUBE |
|
|
745 | (4) |
|
ECM, NSF, and SG3 Considerations |
|
|
749 | (1) |
|
|
750 | (1) |
|
|
750 | (1) |
|
Chapter 11 Network-Based Call Recording |
|
|
751 | (88) |
|
The Business Need for Call Recording |
|
|
752 | (1) |
|
Service Delivery Improvement |
|
|
752 | (1) |
|
|
753 | (1) |
|
IETF SIP Recording Architecture (SIPREC) |
|
|
753 | (10) |
|
|
753 | (1) |
|
|
754 | (1) |
|
|
754 | (1) |
|
|
754 | (1) |
|
|
754 | (1) |
|
|
755 | (1) |
|
|
755 | (5) |
|
Recording Session Establishment |
|
|
760 | (3) |
|
|
763 | (12) |
|
Inbound, Outbound, and Recording Dial Peers |
|
|
763 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
764 | (3) |
|
|
767 | (3) |
|
|
770 | (5) |
|
|
775 | (14) |
|
Recording Initiation Failures |
|
|
786 | (2) |
|
Missing Recording Metadata |
|
|
788 | (1) |
|
|
788 | (1) |
|
Cisco UC Gateway Services Architecture |
|
|
789 | (3) |
|
Extended Call Control Provider |
|
|
791 | (1) |
|
Extended Media Forking Provider |
|
|
791 | (1) |
|
Extended Call Detail Record Provider |
|
|
792 | (1) |
|
Extended Serviceability Provider |
|
|
792 | (1) |
|
The XCC and XMF Data Model |
|
|
792 | (5) |
|
The XCC Call Control Model |
|
|
792 | (1) |
|
XCC Call Connection States |
|
|
793 | (1) |
|
|
794 | (2) |
|
|
796 | (1) |
|
|
797 | (14) |
|
|
798 | (4) |
|
|
802 | (1) |
|
The Media Forking Process |
|
|
803 | (8) |
|
API-Based Recording Configuration |
|
|
811 | (12) |
|
HTTP Server and Client Parameters |
|
|
811 | (1) |
|
UC Web Services API Parameters |
|
|
812 | (1) |
|
CUCM Network-Based Recording |
|
|
812 | (1) |
|
|
813 | (1) |
|
|
814 | (5) |
|
|
819 | (1) |
|
Verifying the Configuration |
|
|
820 | (3) |
|
API-Based Recording Troubleshooting |
|
|
823 | (13) |
|
XMF Application Registration Issues |
|
|
832 | (3) |
|
Recording Not Being Initiated |
|
|
835 | (1) |
|
|
836 | (1) |
|
|
836 | (3) |
|
Chapter 12 Contact Center Integration |
|
|
839 | (116) |
|
|
840 | (7) |
|
|
840 | (1) |
|
Cisco Unified Border Element (CUBE) |
|
|
841 | (1) |
|
Cisco Unified SIP Proxy (CUSP) |
|
|
842 | (1) |
|
|
842 | (1) |
|
Cisco Unified Customer Voice Portal (CVP) |
|
|
843 | (1) |
|
Cisco Unified Contact Center Enterprise (UCCE) |
|
|
844 | (1) |
|
Cisco Unified Communication Manager (CUCM) |
|
|
845 | (1) |
|
Cisco Agent Desktop (CAD) |
|
|
846 | (1) |
|
Cisco Finesse Agent Desktop |
|
|
847 | (1) |
|
|
847 | (38) |
|
|
848 | (1) |
|
Solution-level Configuration |
|
|
849 | (1) |
|
|
849 | (5) |
|
|
854 | (2) |
|
|
856 | (3) |
|
Cisco IOS VXML Gateway Configuration |
|
|
859 | (5) |
|
|
864 | (1) |
|
|
865 | (1) |
|
|
865 | (1) |
|
|
866 | (8) |
|
Caller Hears Ringback Tone |
|
|
874 | (4) |
|
Caller Connected to Agent |
|
|
878 | (7) |
|
|
885 | (17) |
|
SIP INVITE-Based Call Transfer |
|
|
886 | (8) |
|
SIP REFER-Based Call Transfer |
|
|
894 | (8) |
|
|
902 | (12) |
|
Deployment and Configuration |
|
|
902 | (1) |
|
|
903 | (11) |
|
Call Progress Analysis (CPA) |
|
|
914 | (17) |
|
Deployment and Configuration |
|
|
916 | (4) |
|
Outbound Dialer Call Flow |
|
|
920 | (9) |
|
Troubleshooting: Answering Machine Not Detected |
|
|
929 | (2) |
|
Troubleshooting Scenarios |
|
|
931 | (22) |
|
Troubleshooting Intermittent Call Disconnects |
|
|
933 | (16) |
|
Survivability: Why Did It Happen? |
|
|
949 | (4) |
|
|
953 | (1) |
|
|
953 | (2) |
Part IV Security and Operations |
|
|
Chapter 13 Security Threat Mitigation |
|
|
955 | (66) |
|
An Overview of Security Threats to Collaboration Solutions |
|
|
956 | (3) |
|
What Is the Target of an Attack? |
|
|
957 | (1) |
|
Where Do Attacks Originate? |
|
|
958 | (1) |
|
What Are the Targets of Attacks? |
|
|
959 | (1) |
|
Types of Security Threats |
|
|
959 | (39) |
|
Social Engineering and Impersonation |
|
|
959 | (1) |
|
Mitigating Social Engineering and Impersonation |
|
|
960 | (1) |
|
|
961 | (3) |
|
Mitigating Caller ID Impersonation |
|
|
964 | (8) |
|
Man-in-the-Middle Attacks |
|
|
972 | (1) |
|
|
973 | (7) |
|
|
980 | (4) |
|
|
984 | (2) |
|
Mitigating Toll-Fraud Attacks |
|
|
986 | (3) |
|
|
989 | (1) |
|
Mitigating Telephony DoS Attacks |
|
|
990 | (4) |
|
|
994 | (2) |
|
Mitigating Protocol Fuzzing |
|
|
996 | (1) |
|
|
997 | (1) |
|
Mitigating Brute-Force Attacks |
|
|
997 | (1) |
|
Other SBC Security Features |
|
|
998 | (11) |
|
|
998 | (3) |
|
Address Hiding (Topology Abstraction) |
|
|
1001 | (1) |
|
|
1002 | (4) |
|
Modifying and Disabling TCP/UDP Port Behavior |
|
|
1006 | (1) |
|
Media Source Port Validation |
|
|
1007 | (1) |
|
Cisco LOS and LOS XE Hardening |
|
|
1008 | (1) |
|
|
1009 | (1) |
|
Designing Collaboration Networks for Security |
|
|
1009 | (9) |
|
Vulnerability and Risk Management |
|
|
1010 | (1) |
|
|
1011 | (1) |
|
|
1011 | (1) |
|
|
1012 | (1) |
|
Considerations for Integration Design |
|
|
1012 | (1) |
|
Local Peering Within the Trusted Network |
|
|
1013 | (1) |
|
|
1013 | (2) |
|
Encrypted Peering over Public Circuits |
|
|
1015 | (1) |
|
Peering over Public Circuits |
|
|
1016 | (1) |
|
Network Security Mitigations External to the SBC |
|
|
1017 | (1) |
|
|
1018 | (1) |
|
|
1018 | (3) |
|
Chapter 14 Monitoring and Management |
|
|
1021 | (52) |
|
|
1021 | (29) |
|
|
1023 | (1) |
|
|
1023 | (1) |
|
|
1024 | (1) |
|
Choosing a Monitoring Protocol |
|
|
1024 | (6) |
|
Event Management Concepts |
|
|
1030 | (1) |
|
Purposes and Types of Events |
|
|
1030 | (1) |
|
|
1031 | (1) |
|
|
1032 | (1) |
|
|
1032 | (1) |
|
General Platform Assurance |
|
|
1032 | (2) |
|
|
1034 | (1) |
|
|
1035 | (1) |
|
|
1035 | (1) |
|
Call Detail Record (CDR) Analysis |
|
|
1036 | (2) |
|
|
1038 | (1) |
|
|
1039 | (1) |
|
IOS and CUBE Device Monitoring |
|
|
1040 | (1) |
|
General Cisco IOS and IOS XE Monitoring |
|
|
1040 | (2) |
|
|
1042 | (2) |
|
|
1044 | (4) |
|
Prime Collaboration Assurance |
|
|
1048 | (2) |
|
|
1050 | (19) |
|
|
1050 | (1) |
|
General Access Policies and Procedures |
|
|
1051 | (2) |
|
Cisco Access Policies and Procedures for CUBE |
|
|
1053 | (4) |
|
Call Detail Records (CDRs) for CUBE |
|
|
1057 | (5) |
|
|
1062 | (1) |
|
General Configuration Management |
|
|
1062 | (1) |
|
CUBE Configuration Management |
|
|
1063 | (3) |
|
|
1066 | (1) |
|
Diagnostic Signature Configuration |
|
|
1067 | (2) |
|
|
1069 | (1) |
|
|
1070 | (3) |
Appendix A: Q.850 Release Cause Values |
|
1073 | (10) |
Index |
|
1083 | |