Wednesday, January 7, 2009

Troubleshooting Cisco IP Telephony or SSL and TLS

Troubleshooting Cisco IP Telephony

Author: Paul Giralt

Reveals the methodology you need to resolve complex problems in an IP telephony network

  • Master troubleshooting techniques and methodologies for all parts of a Cisco IP Telephony solution-Cisco CallManager, IP phones, gateways, applications, and more
  • Learn how to investigate and resolve voice quality problems, including delayed audio, choppy or garbled audio, static and noise, one-way or no-way audio, and echo
  • Read about the variety of trouble-shooting tools at your disposal and how and when to use them based on the problem type
  • Discover the potential causes of common problems and how to efficiently troubleshoot them to resolution
  • Learn how to identify and resolve gateway problems by breaking the components into logical groups and following a methodical troubleshooting approach
  • Use best practices recommendations to build a stronger IP telephony deployment and avoid common mistakes

IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony. The ability to troubleshoot an IP telephony environment and the underlying network infrastructure is vitally important, just as it is in any complex system.

Troubleshooting Cisco IP Telephony teaches the troubleshooting skills necessary to identify and resolve problems in an IP telephony solution. This book provides comprehensive coverage of all parts of a Cisco IP Telephony (CIPT) solution, including CallManager, IP phones, gateways, analog devices, database and directory replication, call routing, voice mail,applications, network infrastructure, and more. You'll learn how to read trace files, determine when to turn on tracing and Cisco IOS(r) Software voice debugging, and how to troubleshoot voice quality issues.

Troubleshooting Cisco IP Telephony shows you how to break down problems to find the root cause. Descriptions of each part of the CIPT solution help you understand the functionality of each part of the solution and how each part interacts with other parts of the solution. You'll then learn what steps to take and tools to use to identify and resolve the cause of the problem.



Table of Contents:
Foreword
Introduction
Ch. 1Troubleshooting Methodology and Approach3
Ch. 2IP Telephony Architecture Overview23
Ch. 3Understanding the Troubleshooting Tools37
Ch. 4Skinny Client Registration113
Ch. 5IP Phones139
Ch. 6Voice Gateways169
Ch. 7Voice Quality383
Ch. 8Fax Machines and Modems433
Ch. 9Call Routing459
Ch. 10Call Preservation551
Ch. 11Conference Bridges, Transcoders, and Media Termination Points565
Ch. 12Music on Hold601
Ch. 13Call Admission Control623
Ch. 14Voice Mail655
Ch. 15Survivable Remote Site Telephony (SRST)707
Ch. 16Applications735
Ch. 17SQL Database Replication793
Ch. 18LDAP Integration and Replication819
App. ACisco IP Telephony Protocol and Codec Information and References849
App. BNANP Call Routing Information857
App. CDecimal to Hexadecimal and Binary Conversion Table881
App. DPerformance Objects and Counters891
Glossary927
Index947

Read also Desperation Entertaining or Pig Perfect

SSL and TLS: Designing and Building Secure Systems

Author: Eric Rescorla

"This is the best book on SSL/TLS. Rescorla knows SSL/TLS as well as anyone and presents it both clearly and completely.... At times, I felt like he's been looking over my shoulder when I designed SSL v3. If network security matters to you, buy this book."
Paul Kocher, Cryptography Research, Inc.
Co-Designer of SSL v3

"Having the right crypto is necessary but not sufficient to having secure communications. If you're using SSL/TLS, you should have SSL and TLS sitting on your shelf right next to Applied Cryptography."
Bruce Schneier, Counterpane Internet Security, Inc.
Author of Applied Cryptography

"Everything you wanted to know about SSL/TLS in one place. It covers the protocols down to the level of packet traces. It covers how to write software that uses SSL/TLS. And it contrasts SSL with other approaches. All this while being technically sound and readable!"
Radia Perlman, Sun Microsystems, Inc.
Author of Interconnections

Secure Sockets Layer (SSL) and its IETF successor, Transport Layer Security (TLS), are the leading Internet security protocols, providing security for e-commerce, web services, and many other network functions. Using SSL/TLS effectively requires a firm grasp of its role in network communications, its security properties, and its performance characteristics. SSL and TLS provides total coverage of the protocols from the bits on the wire up to application programming.

This comprehensive book not only describes how SSL/TLS is supposed to behave but also uses the author's free ssldump diagnostic tool to show the protocols in action. The author covers each protocol feature,first explaining how it works and then illustrating it in a live implementation. This unique presentation bridges the difficult gap between specification and implementation that is a common source of confusion and incompatibility.

In addition to describing the protocols, SSL and TLS delivers the essential details required by security architects, application designers, and software engineers. Use the practical design rules in this book to quickly design fast and secure systems using SSL/TLS. These design rules are illustrated with chapters covering the new IETF standards for HTTP and SMTP over TLS.

Written by an experienced SSL implementor, SSL and TLS contains detailed information on programming SSL applications. The author discusses the common problems faced by implementors and provides complete sample programs illustrating the solutions in both C and Java. The sample programs use the free OpenSSL and PureTLS toolkits so the reader can immediately run the examples.

Electronic Review of Computer Books - Danny Yee

Covering, as it does, pretty much everything about the Secure Sockets Layer in some depth, Eric Rescorla's SSL and TLS: Designing and Building Secure Systems is not for those who only want to get a secure web site up and running quickly. However, the layout makes it easy to browse just those portions that interest you, and to skip unwanted detail, so it can profitably be used by those who are simply curious, as well as by protocol designers, application programmers, and SSL/TLS implementors. (It was nice that Rescorla recognized the "just curious" in the preface.) A basic understanding of TCP/IP is all that's absolutely necessary to get something from SSL and TLS, but following the details requires a solid understanding.

Rescorla begins with a rapid introduction to security and cryptography and a brief history of SSL protocols (TLS or Transport Layer Security is the IETF-endorsed version). Two chapters then describe SSL itself, the first covering server authentication using RSA (the original motivation for SSL and still by far its most common use) and the second covering other algorithms (Kerberos, FORTEZZA) and modes such as client authentication and session resumption.

The remaining chapters cover specialized topics. A chapter on security looks at protecting keys, random-number generation, certificate chain verification, and some of the known attacks on SSL, such as timing cryptanalysis and the "million message attack." A chapter on performance explains the basic problem (cryptography is expensive), then goes into the details of variations with algorithm and mode (and language, with C recommended over Java) and the use of hardware acceleration. There is also a chapter on designing with SSL and one on coding (and Appendix A has 40-odd pages of sample code).

Two chapters consider special issues with running HTTP over SSL (HTTPS) and SMTP over TLS. Issues with HTTP include reference integrity (ensuring the client is talking to server it thinks it's talking to), virtual hosts, proxies, and downgrade attacks. With SMTP, relaying introduces major complications. A final chapter looks at some alternative approaches, most importantly IPsec, Secure HTTP, and S/MIME. This material provides some interesting examples of interaction between complex protocols.

Booknews

A specialist in Internet security, Rescorla explains secure sockets layer and its IETF successor, transport layer security, which are leading Internet security protocols. He discusses their role in network communications, their security properties, and their performance characteristics. He warns that they cannot be treated as a black box to plug systems into, but must be understood quite thoroughly to be used effectively. The bibliography is lightly annotated. Annotation c. Book News, Inc., Portland, OR (booknews.com)



No comments:

Post a Comment