Archive | VOIP Hardware

USB devices in Cisco Catalyst

some Time ago
I found there was a Problem in the Cisco operating system (IOS).
I had to update the Operating System I want to try the new method through the USB.
After the throes of a long time with the routers (C880) discovered a problem in the operating system was the only solution is to update.

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware0 Comments

Errdisable-recovery with Cisco

 

Explain the property Errdisable-recovery at Cisco

In CCNA Level we Konw how the Switch sometimes close the Port if the case has been exceeded the police on the port

such as this Police Port Security, UDLD, Storm Control, which the Switch stops the port directly in case any one exceed this police.

but to we Talk today the way you to activate this port automatic without the intervention of the system administrator.

We all know that the Port Security is a important properties and necessary in any existing network. it prevents the implementation of one of the simplest and most attacks that need to control the network Like attack of the Mac Flooding, and we know also that the Port will allocated for the Port Security is a work of Shutdown the port in if exceeded the number allocated to the mac address, also known as Err-disable Port,
the solution that we have learned previously is to activate the port again by to make shutdown and no shutdown
In the Level of CCIE will find another way called Errdisable recovery, which The more automatic activation port number of a period of time determined by your own
this property is not only for port Security, but also for many of the properties in which you convert the port to errdisable which I talked about previously, such as Storm Control and the UDLD and the BPDU Guard
example:

SW1(config)#errdisable recovery cause ?
all Enable timer to recover from all error causes
arp-inspection Enable timer to recover from arp inspection
bpduguard Enable timer to recover from BPDU Guard error
channel-misconfig Enable timer to recover from channel misconfig error
dhcp-rate-limit Enable timer to recover from dhcp-rate-limit error
dtp-flap Enable timer to recover from dtp-flap error
gbic-invalid Enable timer to recover from invalid GBIC error
inline-power Enable timer to recover from inline-power error
l2ptguard Enable timer to recover from l2protocol-tunnel error
link-flap Enable timer to recover from link-flap error
loopback Enable timer to recover from loopback error
mac-limit Enable timer to recover from mac limit disable state
pagp-flap Enable timer to recover from pagp-flap error
port-mode-failure Enable timer to recover from port mode change failure
psecure-violation Enable timer to recover from psecure violation error
security-violation Enable timer to recover from 802.1x violation error
sfp-config-mismatch Enable timer to recover from SFP config mismatch error
small-frame Enable timer to recover from small frame error
storm-control Enable timer to recover from storm-control error
udld Enable timer to recover from udld error
vmps Enable timer to recover from vmps shutdown error


As you see a long list you can choose any property you activate in the Switch to make the Switch Active the port after a period of time
on our example, how to activate the Errdisable recovery which is found under the name psecure-violation

The commands will be as follows:

SW1(config)#errdisable recovery cause psecure-violation
SW1(config)#errdisable recovery interval ؟
timer-interval (sec
SW1(config)#errdisable recovery interval 60

first chose is The reason – psecure-violation -and then chose The allotted time to wait of 60 seconds, in other words,in case any one has been exceeded the police the Switch will wait 60 seconds and then will activate the port again,
Show errdisable recovery will find the results, as shown now:

SW1# show errdisable recovery
ErrDisable Reason Timer Status
—————– ————–

arp-inspection Disabled
bpduguard Disabled
channel-misconfig Disabled
dhcp-rate-limit Disabled
dtp-flap Disabled
gbic-invalid Disabled
inline-power Disabled
l2ptguard Disabled
link-flap Disabled
mac-limit Disabled
link-monitor-failure Disabled
loopback Disabled
oam-remote-failure Disabled
pagp-flap Disabled
port-mode-failure Disabled
psecure-violation Enabled
security-violation Disabled
sfp-config-mismatch Disabled
storm-control Disabled
udld Disabled
unicast-flood Disabled
vmps Disabled
Timer interval: 60 seconds
Interfaces that will be enabled at the next timeout:

Thank you all

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware1 Comment

Integration Cisco CUCM and VCS H.323 Voice Gateways

To configuring Cisco IOS H.323 VoIP dial peers to facility call path (and DTMF relay) between PSTN parties and the Cisco Video Communications Server (VCS). Specifically, when the call is tandem routed by the Cisco Unified Communications Manager (CUCM).

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware2 Comments

H323 vs SIP vs MGCP

I am a regular face on the Cisco Support Community (CSC) forums and I recently saw a question that is constantly resurfacing on the forum. The question? “Should I use MGCP or H.323 for gateway protocol?” I suppose SIP can be thrown in there as well. I have a canned response to this question and I figured that my response was used so often that I might as well blog about it.

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware0 Comments

verify DB Replication Status in CUCM

Using the Cisco Unified Reporting Tool in CUCM 7.x and 8.xx to verify Replication Status:

The Cisco Unified Reporting tool is a web application that can be accessed at the CUCM console and is a quick and convenient way to gather data about a CUCM cluster as well as information that may be helpful in troubleshooting.

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware3 Comments

Add SIP Endpoints to CUCM

let’s talk about how to add CounterPath’s X-Lite SIP softphone to Cisco Unified Communications Manager (CUCM).

First, I just wanted to add some 3rd party SIP phones to CUCM to start testing feature behaviors.  X-Lite seemed like a reasonable choice as it was free and apparently pretty popular.  Second,  the resources I have found on-line, including CouterPath’s own write up (which is a bit dated) and an article on Cisco’s “community” collaboration site, were just too light on details.  The examples would have things like this

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware13 Comments

SIP Gateway

Configure a Gateway to use SIP and SIP Trunk between Gateway and CUCM

1- Configure the switchtype and clocking on Gateway

isdn switchtype primary-ni
network-clock-participate wic 0

2- Configure the T1 PRI Card

controller t1 0/0/0
framing esf
linecode b8zs
pri-group timeslots 1-24

 

3- Enable IE delivery for the T1

interface serial 0/0/0:23
isdn outgoing display-ie

 

4- Bind signaling and media to the most reliable interface, here we’re using loopback interface of our gateway

voice service voip
sip
bind all source-interface loopback 0

 

 

SIP Gateway works like H323 Gateway so need to configure dial-peer’s to handle incoming and outgoing calls.

 

5- Configure the incoming dial-peer

dial-peer voice 1 pots
incoming called-number .
direct-inward-dial

 

6-Configure two dial-peers. One to the SUB and one to the PUB and add the session protocol statement (needed for SIP Gateway)

dial-peer voice 2 voip
destination-pattern 202301….$
session target ipv4:192.168.10.20
session protocol sipv2

dial-peer voice 3 voip
destination-pattern 202301….$
session target ipv4:192.168.10.10
session protocol sipv2

 

7- Now Configure the outgoing dial-peers

dial-peer voice 4 pots
destination-pattern 911
port 0/0/0:23
forward-digits all

dial-peer voice 5 pots
destination-pattern 9911
port 0/0/0:23
forward-digits 3

dial-peer voice 6 pots
destination-pattern 9[2-9]……$
port 0/0/0:23

dial-peer voice 7 pots
destination-pattern 91[2-9]..[2-9]……$
port 0/0/0:23
prefix 1

dial-peer voice 8 pots
destination-pattern 9011T
port 0/0/0:23
prefix 011

 

our gateway configuration is done  , now let’s configure CUCM so we can start receiving calls and yes , can make also.

 

- Login to CUCM

- Device > Trunk > Add New>Trunk Type = SIP Trunk
- Device Protocol = SIP

- Specify correct Device Pool

- Set the Significant Digits filed to 4. Enable Inbound/Outbound Header delivery.

- Set the destination address to the loopback IP of our Gateway.

- Specify ‘Presence Group’, ‘SIP Trunk Security Profile’, ‘SIP Profile’.

- Save and Reset the trunk.

Try making a call from PSTN to your IP Phone and see if call is coming or not. Hurry!!! mine is working fine, let’s test yours and let me know if any issues.

 

Confirm if SIP Service is running/active on our gateway or not?

SIPGW# show sip service

if need to see SIP Messages on Gateway can enable:

SIPGW# debug ccsip messages

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware2 Comments

How to Compare Between Cisco Command Line

Yesterday I saw on Cisco Support Page a wonderful command  can we use to compare the changes that have taken place between the settings for the
Startup-configuration and the Run-configuration
Today we talk about this Command because of their great utility to discovery some errors of Engineers, which sometimes work on the hardware.

Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware4 Comments

Restart a Cisco Unified Communications Manager(CUCM)

The proper way to reboot or shutdown a Cisco Unified Communications Manager (Callmanager) server is to issue the “UTILS SYSTEM RESTART” command from the console. Alternatively you can SSH to the server and issue the restart command remotely. You can SSH to your server using any SSH client you wish. Putty is a free, commonly used SSH client. I personally use SecureCRT, however, you must purchase a license. (There is a trial version available as well.)
Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware2 Comments

step by step follow the changes in the Routing table

During the TSHOOT course of my studies.
I got to know one of features that the Cisco added to the operating system 12.0 after it was one of the things hidden in the command prompt in version 11.0

this command is
Continue Reading

Posted in Cisco, Juniper, Microsoft, Net Security, VOIP, VOIP Hardware2 Comments

Page 1 of 3123
Loading

Keep in Touch

  • Subscribe our Newsletter




  • Follow me on Twitter
    Facebook Google Yahoo XML
  • Seo Packages
    What is seo - seo tips