Progress Report. Phase 5 Implementation 4
|
|
- Edward Mathews
- 8 years ago
- Views:
Transcription
1 Progress Report Phase 5 Implementation 4 Reviewed: Status: approved Approved by: Jere Molander Author: Jere Molander, Anders Stenback Revision: 5.0 CVS Date: 2001/03/20 12:42:16 CVS Revision: 1.15
2 Changelog Phase Added list of contact persons Updated to reflect work done during Phase 5 Progress Report 2
3 Index 1 Project status 2 Next phase 3 Accomplished tasks 3.1 Software 3.2 Hardware 3.3 Infrastructure 4 Contact persons 4.1 First phase 4.2 Second phase 4.3 Third phase 4.4 Fourth phase Progress Report 3
4 1 Project status The fifth implementation phase involved getting the production environment set up and tested. The major difficulties were getting the Nokia WAP Server license and getting the permission to connect the Cisco Access server to the HUT Telephone exchange. The production environment was launched to the general public trough notices in the two campus newspapers (TKK Nyt and TKY Nyytiset) on Monday March 19. Already some people have given comments on the three launched services; a static version of WAPTopi, the Otaniemi campus area MenuService and the Otaniemi EventCalendar. The previous phase involved extending the existing applications to a larger production server and further develop the existing services. Negotiating the necessary resources has been the most difficult part, also in this phase. The number of people involved in the project has also expanded to include over 30 people, making it hard to manage. See list below. 2 Next phase During the next phase we will collect and analyze the access logs and feedback from users using the Tripoli WAP services. This feedback will be used to improve the services according to the killer-app process. During the next phase the WebTOPI developers should also get their code ported to Enhydra 3.1 so that we can develop the WAPTOPI service. For this we need to integrate Enhydra with the Trimedia Service development platform and build WML cards of the TOPI service. Getting the Oracle database installed and the TOPI Oracle SQL data into the Oracle database is also part of this phase. 3 Accomplished tasks 3.1 Software WAP Gateway WAP gateway has been updated to run on Windows 2000 Server to enable remote administration of the server using Windows Terminal Client once the server is confined to the locked server room. At the same time the Nokia WAP server software has been upgraded from version to 2.0. Studied WAP gateway's API Progress Report 4
5 3.1.2 Trimedia service The Trimedia service development platform is up and running on the machine dev.tky.hut.fi. Developed services so far are WAP eventcalendar and WAP restarant menu list. WAP TOPI course information tool is waiting for the original WebTOPI developers to port their code to the new Enhydra Hardware Cisco 3620 IOS system software configured, Radius authentication added New powerful Windows 2000 server machine aquired, installed and configured in room A218. Moved to TKO lab server room once fully configured. 3.3 Infrastructure Linux system installed for use as Webtopi Oracle databases. Oracle has been installed. 4 Contact persons One of the central problems in the killer-app process has been to manage the large amount of people involved in the project. The mere coordination of the project takes a lot of time and energy. 4.1 First phase Getting the necessary funding and permission to start project. TKY: Jarno Pelkonen, project manager, Trimedia e-service development HUT T-dept: Hannu H. Kari, prof., specialist in mobile telecommunication systems, responsible for Calypso research project HUT T-dept: Kimmo Laaksonen, lab. assist., initial WAP information 4.2 Second phase Setting up the test environment with 2 ISDN lines HUT T-dept: Kimmo Laaksonen, lab. assist., ISDN card, NT server HUT T-dept: Pekka Mård, lab. assist., LAN connection Elisa Comm.: Jani Wallenius, telephone installer, ISDN line HUT telephone exchange: Seija Sohlman, necessary bureacracy HUT T-dept: Mikko Fallenius, lab. assist., administrator of Calypso WAP server, ISDN card 4.3 Third phase Progress Report 5
6 Setting up test environment with 15 ISDN lines HUT T-dept: Pekka Mård, lab. assist., approves investments Cisco Finland: Hannu Sainio, Cisco pre-sales support Mikromafia: Mikko Mora, Cisco salesperson Elisa: Kari Lampi, In charge of HUT account at Elisa Elisa: Jani Wallenius, telephone installer, ISDN PRI line Elisa: Jari Ovaskainen, telephone expert, Siemens telephone exchange configuration HUT Security: Raija Valtiala, permission for connecting Cisco to HUT telephone exchange HUT telephone exchange: Seija Sohlman, telephone numbers, other bureacracy Nokia Active server license: Timo K. Miettinen, Vice president, Internet Software HUT IT-dept, administration: Juhani Markula, routing, WAP HUT IT-dept, administration: Kristel Sarling, administration HUT IT-dept, administration: Markku Niemi, administration, TOPI access and databases HUT IT-dept, technical: Kimmo Laaksonen, routing and Cisco expert HUT IT-dept, technical: Sami Kesäniemi, routing and Cisco expert HUT IT-dept, technical: Ari Heiskanen, LAN and Cisco expert HUT T-dept: Jaakko Kotimäki, router configuration HUT T-dept: Teddy Grenman, IP addresses, IP routing 4.4 Fourth phase Service creation WAPTopi, IT Moon Oy: Jukka Rahkonen, partner, WebTOPI source code WAPTopi, IT Moon Oy: Marko Lyly, partner, WebTOPI source code Busservice, YTV: Anne Herneoja, in charge of busservice negotiations Busservice, YTV: Irene Muotka, administrative tasks Busservice, YTV: Seppo Hanste, technical assistant Menuservice, HUT: Leila Terasalmi, HUT Head of Information and PR, decides on publication of menues in in printed and internet media. EventCalendar, TKY: Tero Makinen, Head of Informaiton and PR, decides on publication of information in printed and internet media. EventCalendar, TKY: Anna Rantanen, PR assistant. Progress Report 6
Implementation Guidelines. Dyna Pass. Wireless Secure Access
Implementation Guidelines Dyna Pass Wireless Secure Access Implementation Guidelines Implementation Guidelines Abstract This document describes implementations. Examples are based on different technologies
More informationWhite Paper. Telenor VPN
White Paper Telenor VPN Versjon 2.2 September 2006 Side 1 av 5 Table of contents 1 Short introduction... 3 2 Product information... 3 2.1 Mobile Data Access... 3 2.2 SMS Acess and SMS Bedrift... 4 2.3
More informationMIT s Current SIP Infrastructure. Mark Silis MIT Information Services and Technology February 2, 2006
MIT s Current SIP Infrastructure Mark Silis MIT Information Services and Technology February 2, 2006 Current SIP Implementation Utilizes the IETF standards based SIP protocol Comprised of several different
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationQuick Installation Guide
Quick Installation Guide PRI Gateway Version 2.4 Table of Contents Hardware Setup... 1 Accessing the WEB GUI... 2 Notification LEDs (On the Front Panel of the Gateway)... 3 Creating SIP Trunks... 4 Creating
More informationSoft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/
4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using
More informationL2F Case Study Overview
LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)
More informationGE Measurement & Control. Remote Comms System. Installation and User Reference Guide
GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...
More informationChapter 6 Virtual Private Networking
Chapter 6 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVX538 VPN firewall. VPN tunnels provide secure, encrypted communications between
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationUsing VDOMs to host two FortiOS instances on a single FortiGate unit
Using VDOMs to host two FortiOS instances on a single FortiGate unit Virtual Domains (VDOMs) can be used to divide a single FortiGate unit into two or more virtual instances of FortiOS that function as
More informationAcellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved.
Acellus Lab Cart User s Manual Version 4B Acellus Corporation www.acellus.com 1 Table of Contents Using Acellus... 3 Acellus Lab Cart and Server... 3 Acellus Laptops... 3 Acellus Updates... 4 Accessing
More informationInternet Telephony Terminology
Internet Telephony Terminology Understanding the business phone system world can be a daunting task to a lay person who just wants a system that serves his or her business needs. The purpose of this paper
More information1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
More informationVoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299
VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationTable of Contents. Cisco How to Download a Software Image to a Cisco 2600 through TFTP Using the tftpdnld ROMmon Command
mand Table of Contents How to Download a Software Image to a Cisco 2600 through TFTP Using the tftpdnld ROMmon Command...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1
More informationInformation and Communication Technology
Information and Communication Technology 205 IT/PC Network Support Kuva: Skills Finland / Tiina Salminen Coordinators Joel Puodinketo 1 / 12 Koulutuskeskus Salpaus joel.puodinketo(at)salpaus.fi puh. 044
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationUnderstanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationREMOTE ACCESS DDNS CONFIGURATION MANUAL
REMOTE ACCESS DDNS CONFIGURATION MANUAL Analog DVR Series 1 www.mezory.com INTRODUCTION TO REMOTE ACCESS As the World sinks into one global village, reliable connectivity is one of the most demanding facilities
More informationUsing IPsec VPN to provide communication between offices
Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this
More informationSecurity Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
More informationRouting Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
More informationExperiment # 6 Remote Access Services
Experiment # 6 Remote Access Services 7-1 : Introduction Businesses today want access to their information anywhere, at any time. Whether on the road with customers or working from home, employees need
More informationLab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
More informationSpecialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN
More informationSURF Feed Connection Guide
SURF Feed Connection Guide Tullett Prebon Information Ltd A wholly owned subsidiary of Tullett Prebon Version 6.0 3 rd August 2005 Contents 1. Introduction...3 1.1 General...3 2. Connectivity via the Internet...4
More informationCisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
More informationRemote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
More informationCompiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
More informationSyslog Server Configuration on Wireless LAN Controllers (WLCs)
Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers
More informationCisco Network Switches Juniper Firewall Clusters
Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches
More informationLab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
More informationConfiguring a VPN for Dynamic IP Address Connections
Configuring a VPN for Dynamic IP Address Connections Summary A Virtual Private Network (VPN) is a virtual private network that interconnects remote (and often geographically separate) networks through
More informationCPEi 800/825 Series. User Manual. * Please see the Introduction Section
CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the
More informationTi m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology
The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu
More informationIn the following installation procedures, do not disconnect the Mediatrix 3000 Series while the LEDs are flashing.
Discover the Power of Mediatrix 000 Series Installation Warning: In the following installation procedures, do not disconnect the Mediatrix 000 Series while the LEDs are flashing. Thank you for choosing
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
More informationChapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
More informationVantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
More informationConfiguration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
More informationHow To Create A Virtual Private Cloud On Amazon.Com
Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment
More informationAllo PRI Gateway and Elastix Server
Allo PRI Gateway and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single Allo PRI Gateway configuration. We re going to configure a SIP Trunk
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationCCProxy. Server Installation
CCProxy Proxy Server for Win98/NT/2000/XP/2003/Vista/2008 www.youngzsoft.net Server Installation 2009.02 1 Content 1 Content...1 2 LAN networks configuration...2 3 Internet connection configuration...4
More informationCLASSIC -- Overall Match Results XXV TCC-Cup Printed elokuu 18, 2013 at 19:17
CLASSIC -- Overall Match Results 1 100,00 885,8104 32 Hölli, Eero FIN SSG 2 96,30 853,0104 175 Harju, Jani A FIN NOS 3 96,01 850,5044 82 Majuri, Jari M FIN NOS 4 72,09 638,5563 101 Pantzar, Sami I FIN
More informationUsing Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
More informationReconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationHow To Install Linux Titan
Linux Titan Distribution Presented By: Adham Helal Amgad Madkour Ayman El Sayed Emad Zakaria What Is a Linux Distribution? What is a Linux Distribution? The distribution contains groups of packages and
More informationPort forwarding and viewing your IP camera from the internet
Spy On A Bird TM Port forwarding and viewing your IP camera from the internet IP206W IP207W 12201 N NC Hwy 150 Suite 22 PMB 244 Winston Salem, NC 27127 Phone: 800-606-6428 www.spyonabird.com E-mail: info@spyonabird.com
More informationChapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationewon-configuration for Internet Access using the Wizard How to
ewon Application User Guide Content You Select, We Connect AUG 019 / Rev 1.1 ewon-configuration for Internet Access using the Wizard How to This guide will explain you how to configure your ewon to access
More informationCisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
More informationApplication Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress
Application Note Configuring the UGate 3000 for use with Introduction This Application Note guides the ClipMail user through the UGate gateway configuration process by using a simple dial up connection
More informationecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
More informationBrief Company Profile
Brief Company Profile Who we are TALINDA EAST AFRICA is a highly innovative, technology driven and customer focused organization; Our solutions focus on enabling businesses save cost, increase their operational
More informationVIRTUAL NETWORKING WITH "ORACLE VM VIRTUALBOX" FROM A "LINUX" PERSPECTIVE
VIRTUAL NETWORKING WITH "ORACLE VM VIRTUALBOX" FROM A "LINUX" PERSPECTIVE Summary: "Oracle VM VirtualBox" provides five virtual networking configurations for the virtual machines of a "Linux" host computer:
More informationCisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
More informationEnterprise Security Interests Require SSL with telnet server from outside the LAN
Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client
More informationScenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
More informationCourse Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
More informationICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
More informationPT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
More informationReconfiguration of VMware vcenter Update Manager
Reconfiguration of VMware vcenter Update Manager Update 1 vcenter Update Manager 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is
More informationSyAM Software Management Utilities. Creating Templates
SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.
More informationEvaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
More informationACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client
ACCREDITED SOLUTION EXPLORER Cisco Systems VPN Client Document Name: EXPLORER Cisco Systems VPN Client Revision: PA2 Introduction: Typical Applications: Product Description: This document describes the
More informationInstalling NetSupport School for use with the NetSupport School Student extension for Google Chrome
Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome NetSupport School delivers the tools you need to help maximise the effectiveness of computer led teaching
More informationCLEEN - The vehicle for SGEM
CLEEN - The vehicle for SGEM Centre for Strategic Science, Technology and Innovation (CSTI) Co-operative and Industry Driven R&D&I company for Energy and Environment founded in 2008. Unique in it s way
More informationUX5000 with CommPartners SIP Trunks
UX5000 with CommPartners SIP Trunks SECTION 1 NEC S UX5000 AND CommPartners SETUP GUIDE This guide provides example entries for the required fields. The actual data will be e- mailed to you in the following
More informationVIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationGSM GATEWAY PRI / E1 RACK 3U
PRIma GATE GSM GATEWAY From 8 to 32 channels Integrated LCR / Router Voice Call Back SMS Server RACK 3U PRESENTATION Specially designed for big companies, call-centres and companies whom GSM traffic is
More informationExternal Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationAdvanced LCR (Least Cost Router) With SIP Proxy Server
With SIP Proxy Server It s all about Reducing Cost!!! WHY ADVANCED LCR (Least Cost Routing) Advanced LCR is a product by Advanced Communications; the same parent company of AdvancedVoIP.com, a widely used
More informationInternet Telephony PBX System
Internet Telephony PBX System GSM Gateway PSTN call busy forward to GSM Configuration Copyright PLANET Technology Corporation. All rights reserved. Case 32: PSTN call busy forward to GSM Configuration
More informationLutron Home Control Remote Access FAQ
Lutron Home Control Remote Access FAQ What software versions of RadioRA 2 / HomeWorks QS / Lutron Home Control App does remote access work with? RadioRA 2 version 6.1.0 and up HomeWorks QS version 5.0.3
More informationConfigure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
More informationRAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationHow To Implement A Cisco Vip From Scratch
Overview of Cisco VoIP Infrastructure Solution for SIP The Cisco VoIP Infrastructure Solution for SIP implements a voice-over-packet network design using SIP to provide telephony services. It lays the
More informationAvaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
More informationAvaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
More informationPRImaGate Switch RACK 3U
From 8 to 32 channels Integrated LCR / Router Voice Call Back SMS Server VOIP RACK 3U SMS PRESENTATION Specially designed for big companies, call-centres and companies whom GSM traffic is high, PRImaGate
More information1.Cisco Network Architect
1.Cisco Network Architect Analyze business requirements to develop technical network solutions and their framework. Design, test, and inspect data communications systems. Perform network modeling, analysis,
More informationPREPARED FOR ABC CORPORATION
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
More informationFROM A "WINDOWS" PERSPECTIVE
VIRTUAL NETWORKING WITH "Oracle VM VirtualBox" FROM A "WINDOWS" PERSPECTIVE Summary: "VMware Player" provides five virtual networking configurations for the virtual machines of a Windows host computer:
More informationService Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
More informationNetwork Infrastructure
Høgskolen i Telemark Telemark University College Faculty of Technology, Department of Electrical Engineering, Information Technology and Cybernetics Network Infrastructure Keywords: Data Communication,
More informationCox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]
Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted
More informationPeer-to-Peer SIP Mode with FXS and FXO Gateways
Peer-to-Peer SIP Mode with FXS and FXO Gateways New Rock s SIP based VoIP gateways with FXS and FXO ports support peer-to-peer mode which has many applications in deploying enterprise multi-site telephone
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationFor extra services running behind your router. What to do after IP change
For extra services running behind your router. What to do after IP change This guide is for customers who meet the following conditions: - Customers who have moved from a TPG Layer 3 plan to a TPG Layer
More informationGSatTrack. Fleet Broadband Tracker. User Manual April 2011 GSE. Global Satellite Engineering. sales@gsat.us : gsat.us
GSatTrack Fleet Broadband Tracker User Manual April 2011 GSatTrack GSE 3 4 5 6 7 11 12 15 Table of Contents Chapter 1: Getting Started Important Notice to User LEDs Chapter 2: Installation SatLink Connecting
More informationSIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX
June 26th, 2014 SIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX Page 1 of 30 Table of Contents 1 Overview... 3 2 Prerequisites... 3 3 Network Topology... 4 4 Description
More information