RSS

Tag Archives: ip telephony

CUCM based SIP URI Dialing and ILS Networking

So, here’s an article I wrote for CSC as part of Chalk Talk series. This article walks through the basics of SIP URI dialing and ILS networking as well as touches blended addressing in CUCM. The article is published as part of Cisco’s Technical Services Newsletter, July issue http://www.cisco.com/web/services/technical-services-newsletter/index.html

Here’s the excerpt from the article:


 

Cisco Collaboration solutions offer much more than just traditional ways to communicate within and outside of an enterprise network. Complementing the next generation communication solutions such as SIP gateways, SIP endpoints, Jabber, WebEx etc., Cisco Unified Communications Manager (CUCM) has evolved to a degree that it can work and integrate with multiple platforms and can serve multitude endpoints. This article highlights features and benefits of the recent inclusion – SIP Uniform Resource Identifier (URI) based dialing as well as support for Intercluster Lookup Service (ILS) Networking.

SIP URI Dialing

In context of Cisco Collaboration, SIP URI can be best compared to an email address such as abc@xyz.com. The URI format is usually general form: sip:user:password@host:port;uri-parameters?headers. This format has been used by SIP dominant networks for years and is now gaining universal popularity because of its globally routable (DNS-based) nature/capability. A SIP URI can be automatically imported from LDAP (provided the cluster is integrated with an LDAP server) such as a mail or the msRTCSIP-primaryuseraddress attribute.

Following are salient features of SIP URI:

  • In a SIP URI a user name is optional however, CUCM does not support URIs without a user name
  • URI parameters and headers are optional
  • The user name is case sensitive however host is case insensitive (RFC 3261). This parameter is configurable starting CUCM 9.1 (under Enterprise Parameters – URI lookup policy)

 

For full article please go to https://supportforums.cisco.com/document/12243806/chalk-talk-cucm-based-sip-uri-dialing-and-ils-networking

SIP URI and ILS Networking are important concepts from CCIE Collaboration exam perspective. For in depth information about these concepts and how to deploy them in a CUCM intra/inter cluster environment please read CCIE Collaboration Quick Reference

CCIE Collaboration Quick Reference helps you with all the information you need to pass your written exam and helps you prepare for the lab certification.. Get your copy now http://click.linksynergy.com/fs-bin/click?id=aV8WWcTd0Yc&offerid=145238.10000399&type=3&subid=0

Advertisements
 
1 Comment

Posted by on July 28, 2014 in CCIE Collaboration

 

Tags: , , , , , , , , , , , , , , ,

Interviewed by BookGoodies.com!

This is exciting for me and I guess it would be for any author to be interviewed and published. My interview was recently published on BookGoodies.com

http://bookgoodies.com/interview-with-author-akhil-behl-2/

Here’s the Interview excerpt,

What inspires you to write?

My passion for technology and the spark to share the bit of knowledge I have!
Moreover, I’m inspired by my family which motivates myself to excel and to think and do things differently.

Tell us about your writing process

When I started working on the title “Securing Cisco IP Telephony Networks”, it came through as a rather pleasant revelation was, how I had to be creative in thinking what audience would like to see, vivid in visualizing to ensure that pictures do mean a thousand words, and convinced to decide the best way to explain a concept in a clear and concise manner.
Being an author has changed the way I look at things and the perspective in which I represent my thoughts. In a nutshell, I try and be in a reader’s mood and profile to see what a reader would like to see in the book.
The tools of writing are pretty much simple and unsophisticated as I use Microsoft Word for writing, Excel for tables, Visio and Powerpoint for diagrams, and PrtScrn for capturing screens (for illustrations). When it comes to writing process, I clear my mind, sit down in a relaxed environment, and start working through my thoughts and write down the rough manuscript which I finalize once all done. Overall, a straight forward and simple process.

How did you decide how to publish your books?

For technology oriented books there’re a few publishers however, for Cisco specific books the list is even shorter. When it comes to choice of publisher, it wasn’t a difficult venture as I had my mind made up for Cisco Press. Again, they are a a great platform for technologists like myself and people who wish to invest time and effort into writing a technical literature. So, without a doubt I was going with them, at least for this title
In future I would like to explore more avenues like another publisher for the technical literature or may be even self publishing.

To read the full interview visit http://bookgoodies.com/interview-with-author-akhil-behl-2/

To explore the world of and understanding of VoIP / UC Security read Securing Cisco IP Telephony Networks

 
Leave a comment

Posted by on July 23, 2013 in UC Security Posts

 

Tags: , , , , , , , , ,

Best Practices for Deploying Secure Cisco IP Telephony Solutions

IP telephony is slowly but surely becoming part of the modern day organization’s day-to day-operations. In fact, some organizations depend on it to the extent of their core business or processes based on IP communications. Sadly though, the security aspect pertinent to IP based communications network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored) when enterprises and businesses think of deploying unified communications.

On the same lines of thought, why should anyone for that matter think of securing an IP telephony network? The answer is simple however manifold:

  1. To protect the information flowing in IP communication channels from eavesdropping and reconnaissance attacks as well as from manipulation or injection attacks.
  2. To ensure that the investment in their on-premise or off-premise infrastructure pays off (ROI) and doesn’t end up in a rogue’s hands, utilizing it for malicious purposes.
  3. To lower Total Cost of Ownership (TCO) by leveraging IP communications to offset PSTN/Toll calls and reducing Moving, Addition, Configuration, and Deletion (MACD) and at the same time, keeping conversations safe.
  4. Attacks on the telephony network may result in monetary and reputation loss. Moreover, it can directly or indirectly impact the business continuity and clientage.

Today, many organizations depend on a number of IP telephony services like voice calls, instant messaging, conferencing, and video conferencing. A typical IP telephony network can face several threats like toll fraud, reconnaissance attacks, eavesdropping, Denial of Service (DoS) attack, and call hijack. While most organizations do consider that their network needs protection from internal or external threats, such a notion is missing (usually) when it comes to their IP telephony applications/devices.

Read the full article at http://www.ciscopress.com/articles/article.asp?p=1966660

For more insight to Cisco IP Telephony Security refer to Cisco Press book Securing Cisco IP Telephony Networks

 
Leave a comment

Posted by on April 8, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , , ,

Audio review and intro of ‘Securing Cisco IP Telephony Networks’

I’ve to admit, this is pretty cool!

There’s now an audio review and intro available for the book ‘Securing Cisco Telephony Networks’ thanks to ComputerBookMix.com

To listen to audio preview click here Audio Preview of Securing Cisco IP Telephony Networks

 
Leave a comment

Posted by on April 3, 2013 in UC Security Audio

 

Tags: , , , , , , , , , , , , , , , , , ,

Have you ever experienced a security breach in your VoIP network?

 
1 Comment

Posted by on April 3, 2013 in Polls

 

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Interested in UCSEC (Implementing Cisco Unified Communications Security)?

Interested in Cisco’s new course on securing Cisco UC networks, better known as – UCSEC or Implementing Cisco Unified Communications Security?

This course is conducted by various Cisco Learning Partners and focuses on security of Cisco UC network, from an end to end point of view. This course is comprehensive and covers almost all major aspects of Cisco UC security. I haven’t taken the course myself ( I should be teaching it 🙂 ) however, on first impression from table of contents, the course ware will help you understand the topics covered during the ILT course.

However, to gain more insight and build on real world security model – ground up you need a guide and a reference which you can take with you in those grilling sessions with customer and use during design, implementation, consulting, maintenance, or during discovery milestones of the project.

You guessed it right! You need – Securing Cisco IP Telephony Networks which will guide you through various stages of building, deploying, and maintaining a secure Cisco UC solution. This book is your true companion, guide, and reference to learning and implementing Cisco UC Security.

http://www.amazon.com/dp/1587142953

http://www.ciscopress.com/title/9781587142956

So, if you are planning to take UCSEC course, be sure to pick up your copy of Securing Cisco IP Telephony Networks and use it as a reference, as a text, as a guide, and as a companion.

 
16 Comments

Posted by on March 16, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CSC Tech-Talk Series – Understanding Cisco Unified Communications Security

Cisco Unified Communications Solution Security – Overview

The long waged war between TDM and IP Telephony is over and the winner is: VoIP! Long ago seen down upon IP based communications and UC adoption have changed and continue to change the communications paradigm. As more and more organizations adopt IP Telephony / Unified Communication (UC) solutions, they savor the potential of – power of connectivity, lower costs, and improved productivity. It can’t be denied that business agility is the mantra for success in an increasingly competitive and global environment and UC allows organizations supporting attainment of internal and external stakeholder satisfaction by enabling organizations to embed communications and collaboration into business processes. Collaboration with customers, employees, contractors, and strategic partners help accelerate time‐to-market, conscious decision making, and innovation hence, resulting in world class business agility.

However, with obvious benefits of UC there’re a number of threats that come to life when the essence of VoIP is based on data networks, which have been under attack ever since the conception of the Internet. There’s not one but many threats when it pertains to your UC solution, as simple as eavesdropping to as complex as a Denial of Service (DOS) attack. Within the context of UC solution, the whole ecosystem must be secured from business process driven communications to network infrastructure to UC applications to endpoints to management. And that too in a manner that – the security implied upholds protection of intellectual property and proprietary information, preserves corporate brands and reputations, and complies with all applicable laws and regulations.

This blog is dedicated to help you understand the need for UC security and to comprehend the various intricacies of securing a Cisco UC solution.

To read more and watch the video go to https://supportforums.cisco.com/community/netpro/collaboration-voice-video/ip-telephony/blog/2013/02/24/community-tech-talk-series–understanding-cisco-unified-communications-security

Video for tech talk available at https://supportforums.cisco.com/videos/5584

For more info on Unified Communications and Cisco IP Telephony, Network, Management security you can refer to Securing Cisco IP Telephony Networks

http://www.amazon.com/dp/1587142953

http://www.ciscopress.com/title/9781587142956

 

 
Leave a comment

Posted by on March 11, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , ,