Policy-based Management of Distributed PBX Systems

Size: px
Start display at page:

Download "Policy-based Management of Distributed PBX Systems"

Transcription

1 Policy-based Management of Distributed PBX Systems Category: Dangers of an Increasingly Networked World Rupert, Christian Year of Study: 2 nd year M.Sc. Information Systems Course Title: Research Project Securitas University: University of Applied Sciences Pforzheim Project Manager: Prof. Dr. Ing. Frank Niemann Positions: Program Director Information Technology, Head of Research Project Securitas

2 ABSTRACT The development of a policy-based management system, which is able to declare and enforce security-relevant policies for networks and systems, is part of a widespread research project by the University of Applied Sciences Pforzheim. By these measures, a security management can ensure an all-embracing protection of their security requirements. Especially nowadays, in heterogeneous IT landscapes, which become networked more and more, it is essential to provide a comprehensive management system, which covers up several management aspects. Here, the market offers a large number of proprietary solutions. The research laboratory developed a prototype on the basis of the open sourced Web- Based Enterprise Management (WBEM), specified by the Distributed Management Task Force (DMTF), which represents the managed system in a platform independent and object-orientated way. By using the Common Information Model (CIM), a represented system can be assigned with a security policy. The prototype determines the properties of an Asterisk PBX-System by using an implemented CIM-Provider, then compares the property values with the defined policies and executes countermeasures if necessary. The definition and enforcement of polices is done by several hierarchical levels. Present experiences showed the opportunities offered by WBEM but also a certain implementation effort.

3 TABLE OF CONTENTS 1 INTRODUCTION FUNDAMENTALS MANAGEMENT AND WBEM FUNDAMENTALS POLICY-BASED MANAGEMENT FUNDAMENTALS THE MANAGED NODE ASTERISK PBX Asterisk Fundamentals Asterisk Manager Interface ARCHITECTURE OF THE PROTOTYPE Asterisk in CIM Asterisk Provider POLICY BASED MANAGEMENT OF ASTERISK CONCLUSION... 10

4 LIST OF FIGURES Figure 1: Architektur WBEM... 2 Figure 2: Levels of Policy-based Management... 3 Figure 3: Policy Architecture... 3 Figure 4: CIM_Policy Information Model... 4 Figure 5: Asterisk Manager Interface - Telnet Connection... 5 Figure 6: Prototype Architecture... 6 Figure 7: Sample Asterisk Instance... 7 Figure 8: Flow chart Asterisk Provider... 8 Figure 9: Declaration of a simple policy... 9 Figure 10: Execution of a policy Figure 11: Sample Policy for Asterisk PBX... 10

5 1 INTRODUCTION The management of IP-based network elements is often realized using the de-facto standard SNMP (Simple Network Management Protocol) (IETF 1990). Since its publication in 1999, Web-based Enterprise Management (WBEM) (DMTF 1999) wasn t able to tie up to SNMP s popularity. However, WBEM offers some advantages in contrast to SNMP, which can be used for implementing a policy-based management. Hence, chapter 2 imparts a necessary basic knowledge concerning network and policy-based management. Furthermore, chapter 2 presents the Asterisk PBX- System, which needs to be monitored and controlled and can be seen as a proof of concept. Chapter 3 describes the prototype structure in the communication technology laboratory at the University Pforzheim, with the relevant elements for this paper. In addition, the designed information model is described, which represents the PBX-system and its information on an abstract level by means of properties and methods of a class. This information model is referred to as the Common Information Model (CIM) (DMTF 1999). The WBEM-server determines the actual configuration of the Asterisk PBX-System via a CIM-Provider, which addresses the manager interface of the Asterisk-PBX in defined intervals and thus updates the information model with the latest values. Parts of this information model are checked by policies regarding their correctness. Chapter 4 presents a conceptual solution for this idea. Finally, chapter 5 summarizes the achieved results and points out problems and limits of the prototype. 1

6 2 FUNDAMENTALS 2.1 MANAGEMENT AND WBEM FUNDAMENTALS The International Standard Organization s (ISO) FCAPS model addresses several management sub-areas. Security management is one of these sub-areas. Aim of all management approaches, regardless of a concrete use case, is a management application, which offers an access to a management platform. This platform establishes a connection to the managed resources. Both standards, SNMP and WBEM, make use of an information model in order to describe resources and their characteristics. The standards differ in their concrete representation of a managed element. SNMP represents elements in a hierarchical way, whereas WBEM by means of CIM uses an object-orientated approach. Therefore managed objects are represented by classes, with properties and methods. As usual in the object-orientated environment, the graphical representation is done by using the Unified Modeling Language (UML). Textual, CIM classes can be described with the so-called Managed Object Format (MOF). Furthermore, WBEM provides the opportunity to embed SNMP-managed devices in the model, whereby a smooth migration is possible. The basic architecture of management with WBEM is shown in the following figure. Figure 1: Architektur WBEM As shown in the figure 1, an operator machine is connecting with the management platform via different interfaces (Command Line-,Webserver-,SNMP-interface). The managed resource does not have to exist physically. Virtual resources, like processes of an operating system can also be managed. 2

7 2.2 POLICY-BASED MANAGEMENT FUNDAMENTALS Policy-based management follows the objective to link between policies on different hierarchical levels. Security-policies on highest level should be understandable for everyone and be defined technical independently. An example for a policy on highest level could be: Telephony has to be tap-proof For the highest level, the concrete technical implementation is irrelevant. Economical aspects are important. Process-orientated, this policy could be transferred to a more detailed and technical focused policy, which could be: VoIP-Telephony has to be encrypted with SRTP and TLS. Again, the technical aspect of encryption is mentioned, but without referring to a detailed implementation. With the highest level of details, a system policy defines how the policy is implemented on the managed device. Following definition would be possible: The installed version of the Asterisk PBX-System should be version 1.8 and encryption has to be enabled. This version is a requirement for native encryption of call-related data. The structuring of policies is shown in the following figure. Figure 2: Levels of Policy-based Management System policies can be enforced by an architecture, specified by the IETF and shown in figure 3. A Policy Management Tool offers the possibility to define policies, even for people without technical knowledge. A Repository represents the storage for defined policies. A Policy Decision Point evaluates the defined policies by checking if the managed resource is in a certain state. A Policy Enforcement Point enforces the defined policy and is the managed resource, which has access to its internal attributes. Figure 3: Policy Architecture 3

8 Within the CIM_Policy scheme, policies are represented as shown in figure 4. (DMTF Policy WG 2010) Figure 4: CIM_Policy Information Model The figure shows a ManagedElement class (e.g. an OS-process), which is linked up to a PolicySet class by an association. The PolicySet inherits its properties and methods from the Policy class. A Policy aggregates PolicyConditions and PolicyActions. Conditions represent the requirements, which have to be fulfilled in order to trigger a certain action. 2.3 THE MANAGED NODE ASTERISK PBX Asterisk Fundamentals Asterisk is an open source software PBX-system. In contrast to ordinary PBXsystems, which combine hard- and software in one device, Asterisk can be installed on every standard personal computer. It covers up almost every functionality of an ordinary PBX-system and offers features, which are only supported by expensive and proprietary systems. Asterisk can be used with VoIP softphones in combination with VoIP providers (e.g. sipgate), without using VoIP hardware (e.g. hardphones). In order to connect to the public switched telephone network (PSTN), analog as well as digital interface cards from several manufactures can be used. One of the biggest advantages of Asterisk is the broad spectrum of technologies, which can be used to establish a connection to a Asterisk server. In consequence, Asterisk is able to link up PSTN- and VoIP-devices, while the implementation and usage of different protocols is transparent to the user. 4

9 2.3.2 Asterisk Manager Interface The Asterisk Manager Interface (AMI) offers an opportunity to control a Asterisk PBX-system and requesting information about the system over a TCP/IP-Stream. Beside special manager actions, the AMI supports the execution of Asterisk Command Line Interface (CLI) commands. The example in figure 5 shows the execution of CLI commands over a telnet connection. Figure 5: Asterisk Manager Interface - Telnet Connection The example shows the login of a user on the Asterisk AMI, reachable over IP on port 5038, which is designated for AMI purposes. With the CLI command core show version the version of the current installation is shown. So after a successful login, several actions can follow e.g. restarting the system or requesting status for individual telephone channels. Thus the PBX-system gets controllable, which is a necessity for the CIM-Provider presented in Chapter ARCHITECTURE OF THE PROTOTYPE The following chapter explains the architecture of the prototype, in order to point out the interrelationship between individual components. Starting point is a user, who wants to determine certain properties of his Asterisk PBX. Avoiding the usage of the CLI to request information about the PBX, the CIM Navigator Yawn was installed on a web server. Yawn illustrates all managed resources and their current properties graphically. The WBEM Server distinguishes between so called intrinsic and extrinsic methods. Intrinsic methods simply refer to the internal representation of classes. Intrinsic methods are for example CreateClass, DeleteClass or EnumerateInstances. 5

10 EnumerateInstances lists up all instances of a class, in this case each Asterisk PBX- System managed by the WBEM server. Extrinsic methods on the contrary are implemented by the managed resource. These methods are for example Asterisk.ShowVersion() or Asterisk.Shutdown(). The following figure shows an overview of the prototype architecture. Figure 6: Prototype Architecture After receiving the operation (e.g. EnumerateInstances ) the CIM Object Manager (CIMON) requests a framework of the specific class. Now the class is known, but no concrete instance is available, yet. This is done by the Asterisk Provider. The Provider responsible for the Asterisk-Resource is implemented in C++. These provider sources are compiled to a dynamic library and added to the WBEM server (libasterisk.so). After receiving the request for enumerating the instances the provider sets all required properties by using the AMI with several Asterisk CLI commands (see Chapter 2.3.2). 6

11 3.1 Asterisk in CIM This chapter introduces the properties and methods of the information model, used by the Asterisk class. In order to assure a version independency, only some relevant basic parameters where modeled. Through these key attributes, several instances of the Asterisk class can be differentiated. The key attributes chosen are: IP, Port, User and Secret. The IP attribute distinguishes different Asterisk PBX-systems with help of their IP-address as a first step. This is done by the CIM provider, which checks if port 5038 is opened in a defined IP range. If the AMI uses another port than 5038, this can be controlled by the second key attribute, the Port. Figure 7: Sample Asterisk Instance If there s more than one user administering the PBXsystem, this can be checked by the key/value pair User/Secret. Figure 7 shows an example of an Asterisk Instance within the CIM Navigator Yawn. The instance respectively the PBX-system has the IP address and is located in the laboratory network. Furthermore, information like the installed version, supported codes and the uptime of the Asterisk PBX are shown. 7

12 3.2 Asterisk Provider The central task was to implement the necessary CIM provider, which requests the information of the Asterisk PBX-system for the WBEM server. For this purpose the framework CIMPLE was used, which simplified and accelerated the development of the provider. The following flow chart explains the functionality of the CIM provider. According to this, after calling the function Enum_Instances a certain IP range is scanned for Asterisk PBX-systems. After locating a certain set of AMI actions is sent to the specific PBX-system. The responses are used to set the class properties. Figure 8: Flow chart Asterisk Provider 8

13 4 POLICY BASED MANAGEMENT OF ASTERISK The DMTF published the Common Information Model Simplified Policy Language (CIM-SPL) standard in 2009 (DMTF 2009), which provides a language for definition of policies that are based on CIM profiles. Through CIM-SPL, policy can be declared in a if-condition-then-action scheme. Base of every policy is the Policy Rule, consisting of the mentioned parts: Condition, Action/Decision, as well as additional information (e.g. an import or declarations). Multiple Policy Rules can be aggregated to a PolicyGroup, which also can be nested. The condition of a rule can be described by several operators and data types. If a defined policy is evaluated as True, a decision/action is triggered. For example, there might be the policy: The installed version of the specific Asterisk PBX-system has to be version 1.8. This statement would be the condition of a policy. This example can be extended with a decision/action, for example: -otherwise the PBX-system has to be shut down. To implement this policy, access is needed to the properties of the specific Asterisk instance, for which this policy should apply to. Furthermore, an extrinsic method is needed within the Asterisk instance, which is able to shut down the PBX-system remotely. The principle of this action chain is explained on the following simple example. The adjoining figure shows the structure of a CIM-SPL Policy. The class testelement is imported in order to get access to its attributes and methods. The strategy defines how the policy should be evaluated. A policy rule is applicable if its condition is evaluated as True. Within the strategy Execute_All_Applicable all conditions are evaluated and according to this, the assigned actions are triggered, even if another condition was evaluated True before. Figure 9: Declaration of a simple policy So, the evaluation process does not stop, after a first positive evaluation. Another strategy would be the Execute_First_Applicable strategy, where the evaluation stops after the first positive evaluation. The condition in figure 9 always evaluates as True so the following action is always triggered. As a result all instances of the class testelement and their properties s32 will be set to the value 4 if the policy is executed. 9

14 In order to execute this defined policy, the CIM-SPL Client Imperius by Apache was used. The execution of this policy is shown in the following figure. Figure 10: Execution of a policy A policy to evaluate the condition, as mentioned before: The used Asterisk PBX-system has to be the version 1.8 otherwise a shutdown has to be forced is shown in figure 11. At this point work is in progress. Test classes and instances can be combined with policies. The Asterisk class is not checkable by policies, yet. Figure 11: Sample Policy for Asterisk PBX When importing a class to a policy rule, the CIM operation EnumerateInstances is called. This process needs approximately 20 seconds, in order to scan the defined IP-range for PBX-systems, as well as setting the properties with their specific values. This seems to cause a timeout on the policy engine s side, which leads to an error. 5 CONCLUSION Finding an approach for Policy-based management was challenging. Several proprietary solutions exist, but they are often restricted to specific levels of the hierarchy, only supporting certain devices or they are hardly to extend. Often Policy Management is restricted to Group Policies. However, the heterogeneous IT landscapes require a high flexible management platform, managing more than just a role based data access. The object-orientated approach with WBEM and its options of inheritance, association, etc. enable a high re-usage of several components. Every resource, which comes with an interface and is addressable over a CIM provider using C++ is manageable. Even SNMP managed devices can be managed with WBEM. This high flexibility needs willingness for implementation and configuration effort, which must not be underestimated. The research project showed a proof of concept, while a productive solution is still missing, which is resulting by a missing management application for administrators. At this point, the need for a best practice method becomes obvious. 10

15 REFERENCES Apache Imperius, <http://incubator.apache.org/imperius/>. Dinger, J & Hartenstein, H 2008, Netzwerk- und IT-Sicherheitsmanagement, Universitätsverlag Karlsruhe, Karlsruhe. DMTF 1999, Common Information Model (CIM), <http://www.dmtf.org/standards/cim>. DMTF 1999, Web-Based Enterprise Management (WBEM), <http://www.dmtf.org/standards/wbem>. DMTF 2009, CIM Simplified Policy Language (CIM-SPL), <http://www.dmtf.org/sites/default/files/standards/documents/dsp0231_1.0.0.pdf>. DMTF Policy WG 2010, CIM Schema: Version , <http://dmtf.org/sites/default/files/cim/cim_schema_v2260/visio-cim_policy.pdf>. Hobbs, C 2004, A Practical Approach to WBEM/CIM Management, CRC Press Inc 2004, Boca Raton. IETF 1990, A Simple Network Management Protocol (SNMP), <http://www.ietf.org/rfc/rfc1157.txt?number=1157>. SimpleWBEM using CIMPLE 2006, <http://www.simplewbem.org/using_cimple2.pdf>. YAWN - Yet Another WBEM Navigator, <http://sourceforge.net/apps/mediawiki/pywbem/index.php?title=yawn>.

Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5

Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware

More information

Introduction to VoIP Technology

Introduction to VoIP Technology Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of

More information

Hitachi HiCommand Storage Services Manager Software. Partner Beyond Technology

Hitachi HiCommand Storage Services Manager Software. Partner Beyond Technology Hitachi HiCommand Storage Services Manager Software Partner Beyond Technology By auto-discovering the storage environment and illuminating the path from each application through the SAN to the storage

More information

Lecture 19: Web Based Management

Lecture 19: Web Based Management Lecture 19: Web Based Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 19-1 Using the Web for Management Web browser UI connects with the management

More information

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach , CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach Manvi Mishra Dept. of Information Technology, SRMSCET Bareilly (U.P.), India S.S. Bedi Dept of

More information

WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS

WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS www.techknowpartners.com Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integration note, 4 th edition Introduction... 2 Utilizing HP WBEM Providers for Windows... 2 Security...

More information

Implementation and Evaluation of Network Management System to Reduce Management Cost Caused by Server Virtualization

Implementation and Evaluation of Network Management System to Reduce Management Cost Caused by Server Virtualization Implementation and Evaluation of Management System to Reduce Management Cost Caused by Server ization Masahiro Yoshizawa, Toshiaki Tarui and Hideki Okita Abstract The cost of managing data center networks

More information

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS?

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS? In: New Developments in Distributed Applications and Interoperable Systems: 3rd IFIP International Working Conference (DAIS 2001), Cracow, Poland Kluwer Academic Publishers, September 2001 SERVICE ORIENTED

More information

Mediatrix 3000 with Asterisk June 22, 2011

Mediatrix 3000 with Asterisk June 22, 2011 Mediatrix 3000 with Asterisk June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Network Topology... 3 Equipment Detail... 3 Configuration of the Fax Extension... 4 Configuration

More information

How To Select The Next Generation Telephone System ss

How To Select The Next Generation Telephone System ss How To Select The Next Generation Telephone System ss White Paper 360 Visibility Inc. & AltiGen Communications HOW TO CHOOSE A BEST OF BREED NEXT GENERATION PHONE SYSTEM A small to mid-sized company looking

More information

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future White Paper Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future What You Will Learn The future of the Department of Defense s (DoD) networks focuses on the

More information

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording 9-1-1 Magazine / published in December 2007 Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording by Andreas Potyka, Product Management, ASC telecom AG VoIP communications

More information

Heterogeneous Tools for Heterogeneous Network Management with WBEM

Heterogeneous Tools for Heterogeneous Network Management with WBEM Heterogeneous Tools for Heterogeneous Network Management with WBEM Kenneth Carey & Fergus O Reilly Adaptive Wireless Systems Group Department of Electronic Engineering Cork Institute of Technology, Cork,

More information

Management of VMware ESXi. on HP ProLiant Servers

Management of VMware ESXi. on HP ProLiant Servers Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................

More information

Genesys SIP Transforming Customer Service. Richard Barton Bill Mitchell Jim Kraeutler

Genesys SIP Transforming Customer Service. Richard Barton Bill Mitchell Jim Kraeutler Genesys SIP Transforming Customer Service Richard Barton Bill Mitchell Jim Kraeutler Genesys SIP as Single Platform Virtualize Operation Multi-site, Remote/Home Agent, Cloud Operation Flexibility Simplify

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

A Policy Information Model for RFC2547-like IP VPNs

A Policy Information Model for RFC2547-like IP VPNs A Policy Information Model for RFC2547-like IP VPNs Arnaud GONGUET / Olivier POUPEL ALCATEL Route de Nozay - 91460 Marcoussis - France Arnaud.Gonguet@alcatel.fr / Olivier.Poupel@alcatel.fr Tel.: +33 (0)1

More information

How to choose the right IP gateway for your VoIP migration strategy. Deployment note

How to choose the right IP gateway for your VoIP migration strategy. Deployment note How to choose the right IP gateway for your VoIP migration strategy Deployment note Introduction The purpose of this document is to understand the role a TDM to IP gateway has in providing a migration

More information

Cisco Unified Intelligent Contact Management Enterprise 7.2

Cisco Unified Intelligent Contact Management Enterprise 7.2 Cisco Unified Intelligent Contact Management Enterprise 7.2 Cisco Unified Intelligent Contact Management Enterprise-an integral component of the Cisco Unified Communications system-delivers an integrated

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

A Scalability Model for Managing Distributed-organized Internet Services

A Scalability Model for Managing Distributed-organized Internet Services A Scalability Model for Managing Distributed-organized Internet Services TSUN-YU HSIAO, KO-HSU SU, SHYAN-MING YUAN Department of Computer Science, National Chiao-Tung University. No. 1001, Ta Hsueh Road,

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

VoIP Telephone system benefits:

VoIP Telephone system benefits: s Why IP PBX? The VoIP Phone system is evolving, which is why you will find SIP based, IP PBXs like pbxnsip, offering more value for money and features than a traditional proprietary phone system. Traditional

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide MegaPBX Version 2.1 Quick Installation Guide v2.1 www.allo.com 2 Table of Contents Initial Setup of MegaPBX... 4 Notification LEDs (On the Front Panel of the Gateway)... 5 Create

More information

A dual redundant SIP service. White paper

A dual redundant SIP service. White paper A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within

More information

Cisco UCS Central Software

Cisco UCS Central Software Data Sheet Cisco UCS Central Software Cisco UCS Manager provides a single point of management for an entire Cisco Unified Computing System (Cisco UCS) domain of up to 160 servers and associated infrastructure.

More information

Cloudvue Remote Desktop Client GUI User Guide

Cloudvue Remote Desktop Client GUI User Guide Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows

More information

Any to Any Connectivity Transparent Deployment Site Survivability

Any to Any Connectivity Transparent Deployment Site Survivability Any to Any Connectivity Transparent Deployment Site Survivability The Performance You Want. The Installation Simplicity You Expect. Quintumʼs innovative solutions are The Perfect Fit for Enterprise& Service

More information

Integrating Telrex CallRex Call Recording Solution with the Cisco Unified Communications 500 Series for Small Business

Integrating Telrex CallRex Call Recording Solution with the Cisco Unified Communications 500 Series for Small Business Integrating Telrex CallRex Call Recording Solution with the Cisco Unified Communications 500 Series for Small Business This application note provides guidelines and configuration instructions for the Cisco

More information

AND Recorder 5.4. Overview. Benefits. Datenblatt

AND Recorder 5.4. Overview. Benefits. Datenblatt Datenblatt AND Recorder 5.4 Using affordable call recording enables you to comply with legal and regulatory obligations. These requirements are easily achieved by deploying a secure call recording solution

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam

Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam We planning to install exchange@pam an empty database an appropriate database user must be created before running the setup.

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 2007 Report 070228 Product Category: SMB IP-PBX Vendor Tested: Cisco Systems Product Tested: Cisco Unified Communications 500 Series Key findings and conclusions: Complete

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Crystal Gears. Crystal Gears. Overview:

Crystal Gears. Crystal Gears. Overview: Crystal Gears Overview: Crystal Gears (CG in short) is a unique next generation desktop digital call recording system like no other before. By widely compatible with most popular telephony communication

More information

VoIP for Radio Networks

VoIP for Radio Networks White Paper VoIP for Radio Networks Revision 1.0 www.omnitronicsworld.com In the early eighties, a communications protocol was created that allowed the research community to send data anywhere in the world

More information

[Asterisk IP Telephony Solutions]

[Asterisk IP Telephony Solutions] 2016 [Asterisk IP Telephony Solutions] Azim U. Hoque President University IT Forum Bangladesh 1/30/2016 Workshop on Asterisk IP Telephony Solutions Over the existing Wi-Fi, LAN/MAN/WAN/ EPN/VPN, 3G and

More information

November 2013. The Business Value of SIP Trunking

November 2013. The Business Value of SIP Trunking November 2013 S P E C I A L R E P O R T The Business Value of SIP Trunking Table of Contents Introduction... 3 What Is SIP Trunking?... 3 What Is the Demand for SIP Trunking?... 5 How Does SIP Trunking

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Configuration Guide. Independent T1 Timing. 6AOSCG0025-29A February 2012

Configuration Guide. Independent T1 Timing. 6AOSCG0025-29A February 2012 6AOSCG0025-29A February 2012 Configuration Guide This configuration guide describes the feature available on certain NetVanta units. This guide explains the differences in configuration settings on all

More information

Chapter 9 Integrating Security Services into Communication Architectures

Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

RADIUS Authentication and Accounting

RADIUS Authentication and Accounting 5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules

More information

Genesys Compact Edition (GCE) SIP R1.0 Product Description. SIP Server Solution Restricted availability under PCS (Premium Customer Support) only.

Genesys Compact Edition (GCE) SIP R1.0 Product Description. SIP Server Solution Restricted availability under PCS (Premium Customer Support) only. Genesys Compact Edition (GCE) SIP R1.0 Product Description SIP Server Solution Restricted availability under PCS (Premium Customer Support) only. Direct Questions and Comments to Kentis Gopalla Table of

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010

Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010 Quick Setup Guide Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010 Aastra MX-ONE TM and Aastra 700 running Telephony Server software V.4.1 SP3 and later Aastra Telecom Sweden AB

More information

SITEL Voice Architecture

SITEL Voice Architecture SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,

More information

GR2000: a Gigabit Router for a Guaranteed Network

GR2000: a Gigabit Router for a Guaranteed Network Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Network Security. Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

EMC CENTERA VIRTUAL ARCHIVE

EMC CENTERA VIRTUAL ARCHIVE White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts

More information

Cisco Nexus 1000V Virtual Switch

Cisco Nexus 1000V Virtual Switch Cisco Nexus 1000V Virtual Switch Product Overview The Cisco Nexus 1000V virtual machine access switch is an intelligent software switch implementation for VMware ESX environments. Running inside of the

More information

SCUOLA SUPERIORE SANT ANNA 2007/2008

SCUOLA SUPERIORE SANT ANNA 2007/2008 Master degree report Implementation of System and Network Monitoring Solution Netx2.0 By Kanchanna RAMASAMY BALRAJ In fulfillment of INTERNATIONAL MASTER ON INFORMATION TECHNOLOGY SCUOLA SUPERIORE SANT

More information

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing). Introduction to IP Telephony In today s competitive marketplace, small businesses need a network infrastructure that will not only save their business money, but also enable them to be more efficient and

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Atrium Discovery for Storage. solution white paper

Atrium Discovery for Storage. solution white paper Atrium Discovery for Storage solution white paper EXECUTIVE SUMMARY As more IT systems are deployed that depend on storage infrastructure to provide business services, and with the adoption of technology

More information

Time is ticking for analog phone systems How to optimally prepare your business for Voice-over-IP

Time is ticking for analog phone systems How to optimally prepare your business for Voice-over-IP Time is ticking for analog phone systems How to optimally prepare your business for Voice-over-IP The migration from analog or ISDN to Voice-over-IP can lead to significant changes in business communications.

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

A Model for Access Control Management in Distributed Networks

A Model for Access Control Management in Distributed Networks A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies

More information

HP Insight Management Agents architecture for Windows servers

HP Insight Management Agents architecture for Windows servers HP Insight Management Agents architecture for Windows servers Technology brief, 2 nd edition Introduction... 3 A first look at the Insight Management Agents architecture... 3 HP Insight Management agents...

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

AudioCodes Gateway in the Lync Environment

AudioCodes Gateway in the Lync Environment AudioCodes Gateway in the Lync Environment Course: Audience: Prerequisites: Products: Four days hands-on, technical instruction covering installation, configuration, maintenance, troubleshooting and administration

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

NexeTalk Telephone Interconnect

NexeTalk Telephone Interconnect NexeTalk Telephone Interconnect NexeTalk Telephone Interconnect User Guide August 01, 2014 1 Introduction NexeTalk Telephone Interconnect NexeTalk Telephone Interconnect is an integral part of NexeTalk

More information

TIPS TO HELP YOU NAVIGATE the COMPETITIVE VoIP LANDSCAPE

TIPS TO HELP YOU NAVIGATE the COMPETITIVE VoIP LANDSCAPE 5 TIPS TO HELP YOU NAVIGATE the COMPETITIVE VoIP LANDSCAPE & Save 60% on Your Phone Bill THE QUICK LIST NO VENDOR LOCK-IN ALL FEATURES INCLUDED FUTURE PROOF EASY TO USE MANY PRODUCTS IN ONE Digium s Switchvox

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

The Experimental Practices of VoIP Based on the Commercial Softswitch Device

The Experimental Practices of VoIP Based on the Commercial Softswitch Device , pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of

More information

Distributed Network Security

Distributed Network Security Distributed Network Security Dipl-Ing Oliver Welter, Dipl-Ing Andreas Pilz Technische Universitaet Muenchen welter@tumde Abstract IP-based networks form the base of todays communication infrastructure

More information

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how

More information

SOA REFERENCE ARCHITECTURE: SERVICE ORIENTED ARCHITECTURE

SOA REFERENCE ARCHITECTURE: SERVICE ORIENTED ARCHITECTURE SOA REFERENCE ARCHITECTURE: SERVICE ORIENTED ARCHITECTURE SOA Blueprint A structured blog by Yogish Pai Service Oriented Infrastructure (SOI) As the infrastructure to support SOA, service-oriented infrastructure

More information

ADTRAN SBC and Cisco Unified Call Manager SIP Trunk Interoperability

ADTRAN SBC and Cisco Unified Call Manager SIP Trunk Interoperability 6AOSSG0004-42A April 2013 Interoperability Guide ADTRAN SBC and Cisco Unified Call Manager SIP Trunk Interoperability This guide describes an example configuration used in testing the interoperability

More information

DESIGN OF A VIRTUAL COMPUTER SECURITY LAB

DESIGN OF A VIRTUAL COMPUTER SECURITY LAB DESIGN OF A VIRTUAL COMPUTER SECURITY LAB Jörg Keller and Ralf Naues LG Parallelität und VLSI FernUniversität in Hagen 58084 Hagen, Germany {joerg.keller,ralf.naues}@fernuni-hagen.de ABSTRACT We present

More information

TimePictra Release 10.0

TimePictra Release 10.0 DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

ENOVIA V6 Architecture Performance Capability Scalability

ENOVIA V6 Architecture Performance Capability Scalability ENOVIA V6 Technical Advantages Whitepaper ENOVIA V6 Architecture Performance Capability Scalability a Product Lifecycle Management Whitepaper Prepared by ENOVIA, a Dassault Systèmes Brand Executive Summary

More information

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 http://www.dinstar.com 1 / 9 Contents Chapter 1: Authors and changes logs... 3 Chapter

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Cisco Performance Visibility Manager 1.0.1

Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing

More information

Integration of Nagios monitoring tools with IBM's solutions

Integration of Nagios monitoring tools with IBM's solutions Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation wojciech.kocjan@pl.ibm.com 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open

More information