Cisco Media Monitoring Feature - Remote Data Collection with Web Services Management Agent
|
|
|
- Jemima Cooper
- 9 years ago
- Views:
Transcription
1 Quick Configuration Guide Cisco Media Monitoring Feature - Remote Data Collection with Web Services Management Agent Last Updated: 2/3/2011 Introduction This quick configuration guide provides an overview and reference configuration of features necessary to enable remote data collection and management for the Cisco Media Monitoring feature. This guide is meant to provide a level of familiarity Web Services Management Agent (WSMA) feature and to provide a reference configuration which includes configuration of any desired security mechanisms for authenticating, authorizing and encrypting the transport and validating the commands to be executed by the router. Quick Start Summary Steps Configure WSMA 1. Enable a transport mechanism 2. Configure authentication and authorization methods 3. Create WSMA profiles 4. Enable WSMA agents R equirements The objective of this document is to provide familiarity with the WSMA facility, specifically how it may be used to configure Cisco Media Monitoring feature and to use WSMA for retrieval of data. In order to have hands-on experience with the feature the following is the minimum equipment requirements. Table 1: Basic Equipment Requirements Item Quantity Notes IOS router or switch with performancemonitor and Mediatrace software RTP/TCP traffic generator and sink 2 1 generator 1 sink The generator and sink are used to generate and receive traffic for both Mediatrace and performance-monitor to monitor. Examples of RTP generators: Cisco IP phones, Cisco Telepresence, Tandberg Video Conferencing equipment, Video LAN client[4], Cisco Video SLA Assessment Agent (VSAA), packeth [5], IOS IPSLA Video Operation (IPSLA-VO) Examples of RTP sinks: Cisco IP phones, Cisco Telepresence, Tandberg Video Conferencing equipment, Video LAN client, Cisco Video SLA Assessment Agent (VSAA), IPSLA VO Workstation 1 The workstation will represent a management platform that has capability to interact with a WSMA enable network device. In these exercises a Linux workstation with the Wget CLI application is used to send and retrieve SOAP requests. All contents are Copyright Cisco Systems, Inc. All rights reserved.
2 For support of the Cisco Mediatrace feature, IOS 15.1(3)T was used for the examples in this configuration guide. Cisco IOS Software, C1861 Software (C1861-ADVENTERPRISEK9-M), Version 15.1(3)T, RELEASE SOFTWARE (fc1) Technical Support: Copyright (c) by Cisco Systems, Inc. Compiled Mon 15-Nov-10 20:58 by prod_rel_team ROM: System Bootstrap, Version 12.4(11r)XW3, RELEASE SOFTWARE (fc1) 1861-AA0213 uptime is 2 days, 23 hours, 36 minutes System returned to ROM by reload at 11:51:51 EST Fri Jan System restarted at 11:52:53 EST Fri Jan System image file is "flash:c1861-adventerprisek9-mz t.bin Figure 2: Router code version utilized. Introduction to Web Services Several features combine together to provide a web services based access into a router or switch to the Command Line, Executive Filesystem, and Notification interfaces. A web service known as WSMA provides the first line of entry to the device. WSMA is a web service and also implements the Simple Object Access Protocol (SOAP), for encapsulating messages to and from the CLI, EXEC, Filesys and Notify interfaces. High Level Steps The high level steps that will be performed as an example configuration of WSMA and the Cisco Mediatrace feature are as follows: S tep 1. Enable a transport mechanism (Router) 2. Configure authentication and authorization methods for the transport and Exec interfaces Where Network device Network device 3. Create WSMA profiles that define parameters for the agent Network device 4. Enable WSMA agents that provide access to exec, CLI, filesys and response systems Apply WSMA profile to WSMA agents. Network device 1. Enable a transport mechanism (Router) It is necessary to configure a transport service on the router or switch that allows the Web Service Management Agent ( WSMA) to receive messages. The agent interoperates with four possible transports, so select one of the following transports for the agent to utilize: HTTP Secure HTTP (HTTPS) Secure Shell (SSH) TLS
3 For these exercises a Linux workstation with the Wget software package is being utilized to post requests and receive data from the network nodes that are enabled with WSMA. Wget is a non-interactive command line tool and can utilize the HTTP, HTTPS or FTP transports. 2. Configure authentication and authorization methods for the transport and Exec interfaces For the examples, the HTTPS transport will be utilized, and the sessions will be authenticated using AAA with Cisco ACS 5.1. Multiple different authentication mechanisms are possible but AAA is a common method utilized by many customers and provides a more interesting configuration to illustrate. With HTTPS, the data transported by HTTP will be encrypted between the Linux workstation and the network node. It is recommended to utilize a secure transport such as HTTPS or SSH as passwords may be transmitted. The HTTPS transport is enabled and AAA authentication is applied. Secure HTTP utilizes web certificates to exchange encryption keys between the session endpoints, and a web certificate configuration is a prerequisite for HTTPS on the router. The following commands were entered to enable HTTPS transport and set the authentication method to local, which utilizes locally configured usernames. Router1(config)# ip http secure-server ip http authentication local username HTTPtest password 0 cisco Figure 2: Configuration of the secure HTTPS transport and authentication method The web certificates may be created locally by the router, or managed by a central server. In this lab example, locally signed web certificates are used, and no explicit commands were entered. When HTTPS is enabled the configuration for local web certificates is automatically generated, and looks as follows. Router1(config)#ip http secure-server % Generating 1024 bit RSA keys, keys will be non-exportable... [OK] (elapsed time was 1 seconds) 3845-AA0216(config)# *Jan 10 14:49:22.573: %SSH-5-ENABLED: SSH 1.99 has been enabled *Jan 10 14:49:22.629: %PKI-4-NOAUTOSAVE: Configuration was modified. Issue "write memory" to save new certificate Figure 3: Automatic web certificate creation To validate whether a certificate is available utilize the crypto pki command set. Router1#sh crypto pki certificate Router Self-Signed Certificate Status: Available Certificate Serial Number (hex): 01 Certificate Usage: General Purpose Issuer: cn=ios-self-signed-certificate Subject: Name: IOS-Self-Signed-Certificate cn=ios-self-signed-certificate Validity Date:
4 start date: 14:49:22 EST Jan end date: 19:00:00 EST Dec Associated Trustpoints: TP-self-signed Figure 4: Validation of crypto certificate To validate the status of the HTTP server the following CLI commands may be used. Note that secure HTTP and HTTP are separate services and when utilizing HTTPS, the HTTP service should normally be disabled. Otherwise secure and non secure HTTP are both enabled and circumvents the value of enabling HTTPS. Router1#sh ip http server status HTTP server status: Disabled HTTP server port: 80 HTTP server active supplementary listener ports: HTTP server authentication method: local HTTP server digest algorithm: md5 HTTP server access class: 0 HTTP server base path: HTTP server help root: Maximum number of concurrent server connections allowed: 5 Server idle time-out: 180 seconds Server life time-out: 180 seconds Maximum number of requests allowed on a connection: 1 HTTP server active session modules: ALL HTTP secure server capability: Present HTTP secure server status: Enabled HTTP secure server port: 443 HTTP secure server ciphersuite: 3des-ede-cbc-sha des-cbc-sha rc4-128-md5 rc sha HTTP secure server client authentication: Disabled HTTP secure server trustpoint: HTTP secure server active session modules: ALL Figure 5: Validation of HTTP server status Before proceeding with further configuration of WSMA, validate that HTTPS and your chosen authentication method are correctly working. A simple way to do this is browsing with a web client to the router or switch and ensure you can successfully connect to the network device before proceeding. Below is an example of this. Note that since locally significant web certificates are used, the browser has prompted whether the certificate is trusted and then proceeds to request the authentication. Your results may vary depending on the browser utilized, but the idea is to ensure that a successful HTTPS connection can be made.
5 Figure 6: Validate HTTPS connectivity 3. Create WSMA profiles that define parameters for the agent WSMA profiles allow modular grouping of commands that can then be applied to a WSMA agent. Two types of profile exist, listeners and initiators. For these examples, a listener type profile is required. Listener profiles define instances of web services that service externally originated connections, and initiators are used when the local device will initiate a connection. In the example below, a profile with name test is created and configured with the secure HTTP transport. WSMA can provide authorization of commands that are sent within the SOAP message and this is enabled with the command wsse. When WSSE is enabled it is necessary to include a WSSE section in the SOAP message as will be seen shortly. There are no specific commands to configure the authorization method. The method specified by the transport section, in this example HTTPS, will also determine the method utilized for WSSE. Router1 (config)# wsma profile listener test transport https wsse Figure 7: Creating a WSMA profile This profile is now ready to be applied to a Web Service Management Agent.
6 4. Enable WSMA agents that provide access to exec, CLI, filesys and response systems. Apply WSMA profile to WSMA agents. Four different types of WSMA's exist. EXEC Agent Config Agent Filesys Agent Notify Agent To allow connection to the Exec interface which allows the use of Media Monitoring show commands, and to perform configuration of Media Monitoring features, the Exec and Config agent are the minimum agents required. Each agent is enabled with a separate command that specifies the WSMA profile that will be used for the specific agent. Router1 (config)# wsma agent exec profile test wsma agent config profile test wsma agent filesys profile test wsma agent notify profile test Figure 8: Enable WSMA agents and apply profiles In this example, all four agents have been enabled and each specifies the same WSMA listener profile. WSMA integration with Mediascope Mediascope is a standalone GUI based application that illustrates how WSMA may be utilized by a management application to build a network map that incorporates data from Mediatrace along a network path. It utilizes the WSMA capability on the network devices and utilizes both HTTP and SSH transports. Mediascope does not perform WSSE authentication of the requests. The following is a sample of a configuration for use with Mediascope. Note: When HTTP is used as a transport, the passwords for HTTP and WSSE authentication are sent in clear text across the network. Router1 (config)# wsma agent exec profile http wsma agent config profile http wsma agent filesys profile ssh wsma agent notify profile ssh wsma profile listener http no wsse authorization level 15 transport http wsma profile listener ssh no wsse authorization level 15 transport ssh Figure 20: WSMA configuration for Mediascope APPE NDIX II Complete router configuration The unabbreviated configuration below is from the Mediatrace initiator router, after the Mediatrace has been configured.
7 1861-AA0213#sh run Load for five secs: 1%/0%; one minute: 5%; five minutes: 7% Time source is NTP, 08:57: EST Tue Jan Building configuration... Current configuration : bytes Last configuration change at 08:54:15 EST Tue Jan by md NVRAM config last updated at 08:54:16 EST Tue Jan by md version 15.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption hostname 1861-AA0213 boot-start-marker boot system flash:c1861-adventerprisek9-mz t.bin boot-end-marker logging buffered 4096 logging console informational enable password lab aaa new-model aaa authentication login default group tacacs+ local aaa authorization exec default group tacacs+ local aaa session-id common clock timezone EST -5 0 clock summer-time EST recurring mmi polling-interval 60 no mmi auto-configure no mmi pvc mmi snmp-timeout 180 crypto pki token default removal timeout 0 crypto pki trustpoint TP-self-signed enrollment selfsigned subject-name cn=ios-self-signed-certificate revocation-check none crypto pki certificate chain TP-self-signed certificate self-signed B A D0609 2A F70D F30 2D F532D 53656C66 2D E65642D D E 170D A17 0D A F302D F532D53 656C662D E 65642D D F 300D0609 2A F70D D AFCD 0E2300B3 BF7E85D5 FBB FAD0C86 17F0D81A 1482E876 ED5201B3 BA82CA0F E93FB89D 0ADE347D 3412BD39 C D48CD908 82BD464B F942E127 AF08C3C3 55FF233D 1D29C2F9 4CAD F7EB8 CE66507E 032FFE4D 9DB6A326 8B4D7BA9 5F357A48 39A1A60B 585F5169 B540E C AD B27710F4 A A F D FF FF 301F D AA9F8 36CDDCBD C16FCE5A F8F23DD2 140C6E6C A5301D D0E AA9F836 CDDCBDC1 6FCE5AF8 F23DD214 0C6E6CA5 300D0609 2A F70D BDC5DBCD C48900F3 845DB265 B3931C78 3D99BFC9 243C6B78 64D12E15 6F819E7A ACBD42A7 633BF02D 2AD88BC7
8 BEE8C057 A1746AF9 6ED6510F 1CF255A2 32E B F69FA80 811C1A2D 3BA5E808 2B0A0871 4E D2D45A 92F1FEF7 CF98CA26 EA4F502F 0330F5D8 190C450E E871EAD5 E5B2D3D9 2EED15 quit dot11 syslog flow record discovery match ipv4 dscp match ipv4 protocol match ipv4 source address match ipv4 destination address match transport source-port match transport destination-port match interface input collect ipv4 source mask collect ipv4 destination mask collect transport tcp flags collect interface output collect counter bytes collect counter packets collect timestamp sys-uptime first collect timestamp sys-uptime last collect application name flow record type performance-monitor media-rate match ipv4 protocol match ipv4 source address match ipv4 destination address match transport source-port match transport destination-port collect routing forwarding-status collect ipv4 dscp collect ipv4 ttl collect interface input collect interface output collect counter bytes collect counter packets collect counter bytes rate collect counter packets dropped collect timestamp interval collect application media packets rate variation collect application media event collect monitor event flow destination source Vlan10 transport udp 2055 template data timeout 10 option interface-table option application-table flow exporter test1 template data timeout 1 flow monitor discovery record discovery cache timeout active 60 no ip source-route ip cef ip dhcp pool site-1000-vlan-1000
9 network ip dhcp pool s1000-cts1k-1 host hardware-address 001d.a238.a680 ip dhcp pool s cts1k-1 host client-identifier a4 ip dhcp pool ipc-zz0140 host client-identifier de5.ea78.08 ip dhcp pool s zz host client-identifier e.18ee.3c ip dhcp pool medianet-tme-aakhter-2 host client-identifier ce94.f3 ip dhcp pool s zz host client-identifier aa.87 ip dhcp pool s zz host client-identifier d45.2d54.e8 class class-default ip dhcp pool medianet-tme-aakhter-3 host client-identifier c.c9eb.48
10 ip dhcp pool s zz0 client-identifier d45.2d54.e8 ip dhcp class class-default no ip domain lookup ip domain name cisco.com ip multicast-routing no ipv6 cef multilink bundle-name authenticated voice-card 0 license udi pid C1861-SRST-C-F/K9 sn FHK115028GK archive log config hidekeys username lab password 0 lab username msi privilege 15 password 0 bettervideo username admin privilege 15 password 0 cisco ip ftp username anonymous ip ftp password [email protected] ip ssh time-out 60 ip ssh authentication-retries 2 ip ssh version 2 class-map match-all iptv-mpeg-ts match access-group name iptv class-map match-all IPVS-traffic-rtp match access-group name fromipvscamera match access-group name udp class-map match-all telepresence-cs4 match dscp cs4 class-map match-all DSCP-CS5 match dscp cs5 class-map match-all IPTV match access-group name iptv class-map match-all voip-dpi match protocol rtp audio class-map match-all telepresence-dpi match protocol telepresence-media class-map match-all voice-ef match dscp ef class-map match-all IPVS-traffic match access-group name fromipvscamera class-map match-all IPVS-traffic-http match access-group name fromipvscamera match access-group name tcp class-map match-all video-conf-af41 match dscp af41 class-map match-all SAP-HTTP
11 match access-group name web-app policy-map type performance-monitor all-apps class telepresence-cs4 flow monitor inline record default-rtp monitor metric rtp clock-rate clock-rate class IPVS-traffic-rtp flow monitor inline record default-rtp monitor metric rtp clock-rate class voice-ef flow monitor inline record default-rtp class IPVS-traffic-http flow monitor inline record default-tcp class video-conf-af41 flow monitor inline record default-rtp class SAP-HTTP flow monitor inline record default-tcp class IPTV flow monitor inline record media-rate interface Loopback0 ip address ip ospf 1 area 0 interface FastEthernet0/0 description 3845-AA0216 Fa0/0/1 via NETEM (BB1105) ip address ip nbar protocol-discovery ip flow monitor discovery input ip pim sparse-dense-mode ip ospf 1 area 0 load-interval 30 speed 100 full-duplex service-policy type performance-monitor input all-apps service-policy type performance-monitor output all-apps interface Integrated-Service-Engine0/0 no ip address shutdown interface FastEthernet0/1/0 description MANSW-AA0299::Fas 0/16 switchport access vlan 10
12 interface FastEthernet0/1/1 description DATSW-AA0498::Gig 1/28 switchport access vlan 1000 shutdown spanning-tree portfast interface FastEthernet0/1/2 interface FastEthernet0/1/3 description to TC 1/9 switchport access vlan 1000 spanning-tree portfast interface FastEthernet0/1/4 interface FastEthernet0/1/5 interface FastEthernet0/1/6 interface FastEthernet0/1/7 description to DATSW-AA0298 Gig 1/3 switchport access vlan 1000 spanning-tree portfast interface FastEthernet0/1/8 interface Vlan1 no ip address interface Vlan10 ip address ip flow monitor discovery input ntp broadcast client interface Vlan100 no ip address interface Vlan1000 description Site-1000 ip address ip nbar protocol-discovery ip flow monitor discovery input ip pim sparse-dense-mode ip igmp version 3 ip ospf 1 area 0 interface Vlan2000 no ip address router ospf 1 ip forward-protocol nd no ip http server ip http authentication aaa ip http secure-server ip flow-cache timeout active 1 ip flow-export version 9 ip flow-export destination ip flow-top-talkers top 200 sort-by bytes ip pim ssm default ip route ip access-list extended fromipvscamera permit ip host any permit ip any host ip access-list extended iptv permit udp host
13 ip access-list extended tcp permit tcp any any ip access-list extended udp permit udp any any ip access-list extended web-app permit tcp any host eq www permit tcp host eq www any logging esm config logging logging access-list 1 permit any snmp-server community public RO snmp-server community private RW snmp-server ifindex persist snmp-server enable traps flowmon tacacs-server host key none control-plane voice-port 0/0/0 voice-port 0/0/1 voice-port 0/0/2 voice-port 0/0/3 voice-port 0/1/0 voice-port 0/1/1 voice-port 0/1/2 voice-port 0/1/3 voice-port 0/4/0 auto-cut-through signal immediate input gain auto-control description Music On Hold Port mediatrace initiator source-ip mediatrace profile system intf1 mediatrace path-specifier ps1 destination ip port source ip port mediatrace session-params sp1 response-timeout 10 frequency 30 inactivity-timeout 300 history data-sets-kept 10 route-change reaction-time 10 mediatrace 2 path-specifier ps1 session-params sp1 profile system intf1 mediatrace schedule 2 start-time now mgcp fax t38 ecm mgcp profile default
14 privilege configure level 15 mediatrace banner exec ^C^[]0;1861-AA0213^C line con 0 exec-timeout 0 0 password lab no modem enable line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh line vty 0 4 exec-timeout 0 0 password lab logging synchronous exec prompt timestamp transport preferred none transport input ssh transport output all line vty 5 10 exec-timeout 0 0 password lab logging synchronous exec prompt timestamp transport preferred none transport input all exception data-corruption buffer truncate wsma agent exec profile test wsma agent config profile test wsma agent filesys profile test wsma agent notify profile test wsma profile listener test transport https end Figure 22: Complete router configuration of mediatrace initiator REFE R ENCES [1] Configuring Web Service Management Agent [2] Cisco IOS Network Management Command Reference [3] W3C SOAP Reference FOR MORE INFORMATION For more information about Medianet and Enterprise Medianet please visit: or contact your local account representative. Printed in USA C /06
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0
Background For this lab, we will be analyzing some Wireshark capture files that were captured using the ARP Poisoning technique on Cisco VIOP (Voice Over IP) phones As this lab took special equipment (i.e.
Brest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Lab 3.3 Configuring QoS with SDM
Lab 3.3 Configuring QoS with SDM Learning Objectives Configure Quality of Service tools with the SDM QoS wizard Monitor traffic patterns using the SDM QoS interface Topology Diagram Scenario Cisco Security
Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration
Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration Summary This setup covers the of the TEAM VoWLAN solution with a Cisco Communications Manager Express 4.1 +. This integration
Simple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats
Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats Guidelines for Deploying Cisco IOS SSH with X.509v3 PIV and CAC Smartcards Contents page Introduction 3 Requirements 3 Resolved
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Network Diagram Scalability Testbed and Configuration Files
APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Schools Configuration Files Guide
This document, contains the network diagram, and a list of all the platforms and software releases which were validated for the Schools Service Ready Architecture (SRA). The last section includes the configurations
Lab 6.1 Configuring a Cisco IOS Firewall Using SDM
Lab 6.1 Configuring a Cisco IOS Firewall Using SDM Learning Objectives Use SDM to configure a router as a firewall Understand basic firewall operation Configure basic routing through a firewall Verify
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
and 2, implemented With Cisco Unified Border Control Element (CUBE)
www.xo.com XO SIP Service Customer Configuration Guide for Cisco Unified Communications Manager (CUCM) 8.0.3 XO SIP Packages 1 and 2, implemented With Cisco Unified Border Control Element (CUBE) 1 PRODUCT
Configuring Fax Pass-Through
Configuring Fax Pass-Through This chapter describes the configuration of fax pass-through. With fax pass-through, modulated fax information from the PSTN is passed in-band over a voice speech path in an
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
SIP Trunking Configuration Guide for Cisco Unified Communications Manager (CUCM) Version 9.0.1.11005-1 with Cisco Unified Border Element (CUBE)
SIP Trunking Configuration Guide for Cisco Unified Communications Manager (CUCM) Version 9.0.1.11005-1 with Cisco Unified Border Element (CUBE) Table of Contents Introduction... 3 Executive Summary..3
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
IDT / Net2phone SIP Trunking Configuration Guide for Cisco Business Edition 3000 (BE3000) Release 8.6.4 with Cisco Unified Border Element Release 8.8.
Application Notes IDT / Net2phone SIP Trunking Configuration Guide for Cisco Business Edition 3000 (BE3000) Release 8.6.4 with Cisco Unified Border Element Release 8.8. May 31, 2013 Eric Cimino IDT Corporation
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Configuring Voice and Data Support on VWIC3s
First Published: July 21, 2010, OL-22847-01 This module describes how to configure voice and data support on the next generation of voice/wan Interface Cards (VWICs) also known as VWIC3s. The following
Juniper Networks WX Series Large. Integration on Cisco
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
Basic Router Configuration Using Cisco Configuration Professional
Basic Router Configuration Using Cisco Configuration Professional Document ID: 111999 Contents Introduction Prerequisites Components Used Install Cisco Configuration Professional Router Configuration to
Configuring Clocking and Timing
CHAPTER 16 Clock synchronization is important for a variety of applications, including synchronization of radio cell towers. While legacy TDM protocols incorporate timing features, packet-switched networks
Configuring the MNLB Forwarding Agent
CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services
Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router
Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router Descargue este capítulo Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router Descargue el libro completo
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Network Security Knowledge is Everything! Network Operations
Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer [email protected] Agenda What is Network Security General Configuration Security Logging and
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Skills Assessment Student Training (Answer Key)
CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment
- QoS Classification and Marking -
1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked
One-Step Lockdown with Cisco SDM
One-Step Lockdown with Cisco SDM Router Hardening Automagically The process of turning off unnecessary services is called hardening a router to prevent attacks or exploits. The basic steps of router hardening
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
How To Configure A Cisco Vpn On A Cell Phone With A Pkv On A Safd On A Pv On An Asda On A Network With A Network On A Pc Or Ipv On The Ipv (Svv
CHAPTER 17 The Cisco VPN Client for Cisco Unified IP Phones adds another option for customers attempting to solve the remote telecommuter problem by complementing other Cisco remote telecommuting offerings.
Easy Performance Monitor
The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information, page 1 Information About, page 1 How to Configure, page 3 Configuration Examples
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
Virtual Private Network Setup
This chapter provides information about virtual private network setup. Virtual Private Network, page 1 Devices Supporting VPN, page 2 Set Up VPN Feature, page 2 Complete Cisco IOS Prerequisites, page 3
WhatsUpGold. v14.4. Flow Monitor User Guide
WhatsUpGold v14.4 Flow Monitor User Guide Contents ingress egress egress ingress enable configure terminal ip flow-export version ip flow-export destination interface
Configuring Modem Transport Support for VoIP
Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,
Easy Performance Monitor
The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information, page 1 Information About, page 2 How to Configure, page 4 Verifying Configuration,
Lab 8: Confi guring QoS
Lab 8: Objective Implement QoS, mark traffi c, and display and interpret QoS output. Lab Topology For this lab, your network design will include two pods of devices. You will be responsible for confi guring
Configurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
Easy Performance Monitor
First Published: July 30, 2013 The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information Your software release may not support all the features
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Cisco Performance Monitor Commands
1 action (policy react and policy inline react) Cisco Performance Monitor Commands action (policy react and policy inline react) To configure which applications which will receive an alarm or notification,
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls
Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A S1 FA0/5
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
Network Diagram and Configuration Files
CHAPTER 7 This chapter contains a topology diagram and the associated router, firewall, and switch configuration files for the devices in this sample implementation. See Figure 1. Figure 1 Network Diagram
Configurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Enabling Management Protocols: NTP, SNMP, and Syslog
SECTION 7 Enabling Management Protocols: NTP, SNMP, and Syslog In this Section This section describes how to enable basic management protocols on a Cisco AS5800 and Cisco AS5300 as part of a dial access
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Objective Scenario Topology Estimated Time: 35 minutes Number of Team Members: Two teams with four students per team In this lab exercise,
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
!! Last configuration change at 15:00:48 gmt Thu Oct 11 2012 by admin! NVRAM config last updated at 03:07:42 gmt Wed Nov 14 2012 by admin!
Last configuration change at 15:00:48 gmt Thu Oct 11 2012 by admin NVRAM config last updated at 03:07:42 gmt Wed Nov 14 2012 by admin version 12.2 no service pad service timestamps debug datetime msec
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
Leased Line PPP Connections Between IOS and HP Routers
Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
Configuring Server Load Balancing
CHAPTER 6 This chapter describes how to configure server load balancing (SLB) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About Server
ICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
SolarWinds Technical Reference
SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco Catalyst 3560/3750... 4 Cisco Catalyst 4500... 7 Cisco Catalyst 6500... 9 Cisco Nexus 7000/7010...
NetFlow The De Facto Standard for Traffic Analytics
NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine
SolarWinds Technical Reference
SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco Catalyst 3560/3750... 4 Cisco Catalyst 4500... 7 Cisco Catalyst 6500... 9 Cisco Nexus 7000/7010...
Deployment Guidelines for QoS Configuration in DSL Environment
White Paper Deployment Guidelines for QoS Configuration in DSL Environment Overview In the late 1980s, DSL technology was developed to provide higher-speed digital data transmission over local telephone
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
Network Scenarios Pagina 1 di 35
Network Scenarios Pagina 1 di 35 Table of Contents Network Scenarios Cisco 827 s Network Connections Internet Access Scenarios Before You Configure Your Internet Access Network Replacing a Bridge or Modem
Cisco Routers and Switches
Cisco Routers and Switches Phoenix Cisco User Group (PCUG) Tools, tips, and tricks you never knew Hello! Jeremy D. Cioara - CCIE, MCSE, CNE AdTEC Networks - Chief Information Officer Cisco IP Telephony
Remote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Flow Monitor for WhatsUp Gold v16.2 User Guide
Flow Monitor for WhatsUp Gold v16.2 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
Paetec SIP Configuration Guide The missing manual
Paetec SIP Configuration Guide The missing manual By: Alex Hannah CCIE Voice #25853 6/9/2010 Abstract: This document will go over the IOS Gateway configuration and CUCM configuration to connect a Cisco
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory
Flow Monitor for WhatsUp Gold v16.1 User Guide
Flow Monitor for WhatsUp Gold v16.1 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System
Managing and Monitoring Network Management Features
Managing and Monitoring Network Management Features This feature module describes how to monitor, manage and deploy a variety of network management features, including Cisco Active Network Abstraction
How-To Configure NetFlow v5 & v9 on Cisco Routers
How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,
