万本电子书0元读

万本电子书0元读

顶部广告

Cisco Unified Communications Manager 8: Expert Administration Cookbook电子书

售       价:¥

6人正在读 | 0人评论 9.8

作       者:Tanner Ezell

出  版  社:Packt Publishing

出版时间:2012-03-30

字       数:124.1万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is written in an easy-to-read style, with a strong emphasis on real-world, practical examples. Step-by-step explanations are provided for performing important administration tasks. If you are Cisco Unified Communications administrators or engineers looking forward for advanced recipes to perform important administration tasks, then this is the best guide for you. This book assumes familiarity with the basics of Cisco’s Unified Communications Manager architecture.
目录展开

Cisco Unified Communications Manager 8: Expert Administration Cookbook

Table of Contents

Cisco Unified Communications Manager 8: Expert Administration Cookbook

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Instant Updates on New Packt Books

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Call Routing, Dial Plan, and E.164

Introduction

Implementing local route groups with device pools for E.164 call routing

Getting ready

How to do it...

How it works...

There's more...

Implementing E.164 route patterns and partitions

How to do it...

How it works...

There's more...

Dial plan considerations and partitions

Common system partitions

Partitioning at a national level

Partitioning at a local level

Dial plan considerations and route patterns

Seven digit dialing

Ten digit dialing

Implementing E.164 called and calling party transformations

Getting ready

How to do it...

How it works...

There's more...

Partitions and calling search spaces for called and calling transformation patterns

Implementing least cost call routing using Tail End Hop Off

Getting ready

How to do it...

How it works...

There's more...

Implementing calling restrictions with line blocking partitions and calling search spaces

Getting ready

How to do it...

How it works...

There's more...

Determining classes of restriction

Patterns required for call restrictions

Design considerations for preventing call restriction bypass

Blocking in traditional environments

Blocking in E.164 environments

Partitions used in call restrictions

National

International

Premium

Mitigating fraud

Implementing short dial numbers

Getting ready

How to do it...

How it works...

Implementing time-of-day call routing

Getting ready

How to do it...

How it works...

There's more...

Considerations for advanced time-of-day routing

Holidays

Routing on holidays

Implementing Forced Authorization Codes

Getting ready

How to do it...

How it works...

There's more...

Design considerations for Forced Authorization Codes

Partitions for Forced Authorization Codes

Calling search spaces for Forced Authorization Codes

Device calling search space

Line calling search space

Call routing considerations with Forced Authorization Codes

Traditional call routing

E.164 call routing

Authorization levels with Forced Authorization Codes

Implementing Client Matter Codes

Getting ready

How to do it...

How it works...

There's more...

Design considerations for Client Matter Codes

Partitions

Route patterns

Calling search spaces

See also

2. Call Admission Control

Introduction

Implementing location-based call admission control

Getting ready

How to do it...

How it works...

How Unified Communications Manager calculates bandwidth requirements

Single Cluster

Centralized vs. Decentralized

There's more...

Importance of Quality of service

Implementation strategies for location-based call admission control

Using device pools

Per device

Not Enough Bandwidth – synchronization issues with location-based call admission control

Implementing regions for call admission control

How to do it...

How it works...

There's more...

Implementing the Resource Reservation Protocol

Getting ready

How to do it...

How it works...

RSVP Settings

There's more...

Carrier support for RSVP

See also

Enabling Automated Alternate Routing

How to do it...

How it works...

Implementing Automated Alternate Routing

Getting ready

How to do it...

How it works...

There's more...

AAR Groups

AAR Destination Mask

Partitions

Calling search spaces

Route patterns

3. Media Resources and Music On Hold

Introduction

Configuring software conference bridges

How to do it...

How it works...

There's more...

Cisco IP Voice Media Streaming App Service parameters

Design considerations for software conference bridges

Configuring IOS conference bridges

How to do it...

How it works...

Configuring transcoders

How to do it...

How it works...

Configuring media termination points

Getting ready

How to do it...

How it works...

There's more...

Configuring media resource groups

Getting ready

How to do it...

How it works...

Configuring media resource group lists

Getting ready

How to do it...

How it works...

There's more...

Applying media resource group lists to devices

Implementing unicast Music On Hold

Getting ready

How to do it...

How it works...

There's more...

Unicast and multicast in the same cluster

Separate Music On Hold servers

Single Music On Hold server

Codec selection

Configuring multicast Music On Hold

Getting ready

How to do it...

How it works...

See also

Adding custom media files for Music On Hold

How to do it...

4. Tracing and Troubleshooting Tools

Introduction

Configuring user permissions for the Real-Time Monitoring Tool

How to do it…

How it works...

Custom user group for the Real-Time Monitoring Tool

There's more…

Collecting traces using the Query Wizard

Getting ready

How to do it…

How it works…

See also

Configuring the e-mail server for the Real-Time Monitoring Tool

How to do it…

How it works…

Creating custom alerts in the Real-Time Monitoring Tool

Getting ready

How to do it…

How it works…

Configuring custom alert actions

Getting ready

How to do it…

How it works…

Capturing packets

How to do it...

How it works...

There's more...

Analyzing the Dial Plan with the dialed number analyzer

Getting ready...

How to do it...

How it works...

There's more...

5. Device and Unified Mobility

Introduction

Configuring physical locations

Getting ready

How to do it...

How it works...

Configuring device mobility groups

Getting ready

How to do it...

How it works...

Configure device pools for device mobility

Getting ready

How to do it...

How it works...

Configuring device mobility info

Getting ready

How to do it...

How it works...

Enabling device mobility

How to do it...

How it works...

Configuring mid-call feature access codes

Getting ready

How to do it...

How it works...

Configuring Session Handoff

How to do it...

How it works...

Enabling Intelligent Session Control

How to do it...

How it works...

There's more…

Implementing mobility access lists

Getting ready

How to do it...

How it works...

Configuring remote destination profiles

Getting ready

How to do it...

How it works...

Configuring remote destinations

Getting ready

How to do it...

How it works...

There's more...

Implementing Mobile Voice Access

Getting ready

How to do it...

How it works...

See also

Enabling Enterprise Feature Access

Getting ready

How to do it...

How it works...

Adding the Mobility softkey

How to do it...

How it works...

6. User Management

Introduction

Enabling LDAP synchronization

How to do it...

How it works...

Configuring an LDAP Directory

Getting ready

How to do it...

How it works...

Enabling LDAP authentication

Getting ready

How to do it...

How it works...

Configuring custom LDAP filters

How to do it...

How it works...

There's more...

Configuring credential policies

How to do it...

How it works...

Configuring default credential policies

Getting ready

How to do it...

How it works...

Assigning credential policies

Getting ready

How to do it...

How it works...

Configuring user roles

How to do it...

How it works...

Configuring user groups

How to do it...

How it works...

Assigning user groups to end users

Getting ready

How to do it...

How it works...

7. User Features

Introduction

Implementing direct transfer to voice mail

Getting ready

How to do it...

How it works...

Implementing Meet-Me conferencing

How to do it...

How it works...

Implementing call park

Getting ready

How to do it...

How it works...

Implementing directed call park

Getting ready

How to do it...

How it works...

Configuring the Intercom feature

Getting ready

How to do it...

How it works...

Configuring Malicious Call Identification

How to do it...

How it works...

Adding a custom ringtone

Getting ready

How to do it...

How it works...

Adding a custom background image

Getting ready

How to do it...

Configuring dual mode for iPhone

Getting ready

How to do it...

How it works...

8. Advanced Features

Introduction

Enabling the Extension Mobility service

How to do it...

How it works...

Configuring the Extension Mobility phone service

Getting ready

How to do it...

How it works...

Configuring phone devices for Extension Mobility

Getting ready

How to do it...

How it works...

Configuring device profiles for Extension Mobility

Getting ready

How to do it...

How it works...

Configuring Extension Mobility service parameters

How to do it...

How it works...

Enabling the Cross Cluster Extension Mobility services

How to do it...

How it works...

Configuring the Cross Cluster Extension Mobility phone service

Getting ready

How to do it...

How it works...

Configure users for Cross Cluster Extension Mobility

Getting Ready

How to do it...

How it works...

Preparing certificates for Cross Cluster Extension Mobility

Getting ready

How to do it...

How it works...

Creating a template for Cross Cluster Extension Mobility devices

How to do it...

How it works...

Configuring Cross Cluster Extension Mobility parameters

How to do it...

How it works...

Configuring intercluster trunks for Cross Cluster Extension Mobility

How to do it...

How it works...

Configuring the intercluster service profile for Cross Cluster Extension Mobility

Getting ready

How to do it...

How it works...

Configuring monitoring and recording

Getting ready

How to do it...

How it works...

There's more...

Configuring geolocations and filters

Getting ready

How to do it...

How it works...

Implementing logical partitioning

Getting ready

How to do it...

How it works...

Configuring hotline service parameters

How to do it...

How it works...

Configuring a hotline device

Getting ready

How to do it...

How it works...

Configuring barge for devices and users

How to do it...

How it works...

There's more...

Conference barge

Configuring barge tones

Configuring privacy for devices and users

Getting ready

How to do it...

How it works...

There's more...

9. Securing Unified Communications

Introduction

Configuring phone security profiles

How to do it...

How it works...

Configuring devices for secure tone

Getting ready

How to do it...

How it works...

There's more...

Configuring Certificate Authority Proxy Function

Getting ready

How to do it...

How it works...

Configuring digest authentication

Getting ready

How to do it...

How it works...

Implementing endpoint hardening

Getting ready

How to do it...

How it works...

Implementing a secure conference bridge

How to do it...

How it works...

Implementing secure Meet-Me conferences

How to do it...

How it works...

Configuring VPN for Cisco IP phones

How to do it...

How it works...

Configuring application users for secure communication

Getting ready

How to do it...

How it works...

10. Serviceability, Upgrades, and Disaster Recovery

Introduction

Configuring alarms

How to do it...

How it works...

See also

Configuring traces

How to do it...

How it works...

See also

Configuring SNMP versions 1 and 2

Getting ready

How to do it...

How it works...

See also

Configuring SNMP Version 3

Getting ready

How to do it...

How it works...

See also

Applying patches and upgrades

Getting ready

How to do it...

How it works...

Configuring a backup device

Getting ready

How to do it...

How it works...

Configuring a backup schedule

Getting ready

How to do it...

How it works...

Performing a manual backup

Getting ready

How to do it...

How it works...

Restoring from backup

How to do it...

How it works...

11. Bulk Administration Tool

Introduction

Introducing the Bulk Administration Tool

Getting ready

How to do it...

How it works...

Enabling the Bulk Provisioning Service

How to do it...

How it works...

Creating and using a custom file

How to do it...

How it works...

There's more...

Bulk provisioning phones

How to do it...

How it works...

Bulk provisioning users

How to do it...

How it works...

Bulk provisioning user device profiles

How to do it...

How it works...

Bulk provisioning gateways

How to do it...

How it works...

Bulk provisioning Forced Authorization Codes

How to do it...

How it works...

Bulk provisioning Client Matter Codes

How to do it...

How it works...

Bulk provisioning call pickup groups

How to do it...

How it works...

Bulk provisioning access lists

How to do it...

How it works...

Bulk provisioning remote destination profiles

How to do it...

How it works...

Bulk provisioning remote destinations

How to do it...

How it works...

Bulk provisioning mobility profiles

How to do it...

How it works...

Exporting data

How to do it...

How it works...

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部