Troubleshooting Cisco IP Telephony
Author: Paul Giralt
Reveals the methodology you need to resolve complex problems in an IP telephony network
- Master troubleshooting techniques and methodologies for all parts of a Cisco IP Telephony solution-Cisco CallManager, IP phones, gateways, applications, and more
- Learn how to investigate and resolve voice quality problems, including delayed audio, choppy or garbled audio, static and noise, one-way or no-way audio, and echo
- Read about the variety of trouble-shooting tools at your disposal and how and when to use them based on the problem type
- Discover the potential causes of common problems and how to efficiently troubleshoot them to resolution
- Learn how to identify and resolve gateway problems by breaking the components into logical groups and following a methodical troubleshooting approach
- Use best practices recommendations to build a stronger IP telephony deployment and avoid common mistakes
IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony. The ability to troubleshoot an IP telephony environment and the underlying network infrastructure is vitally important, just as it is in any complex system.
Troubleshooting Cisco IP Telephony teaches the troubleshooting skills necessary to identify and resolve problems in an IP telephony solution. This book provides comprehensive coverage of all parts of a Cisco IP Telephony (CIPT) solution, including CallManager, IP phones, gateways, analog devices, database and directory replication, call routing, voice mail,applications, network infrastructure, and more. You'll learn how to read trace files, determine when to turn on tracing and Cisco IOS(r) Software voice debugging, and how to troubleshoot voice quality issues.
Troubleshooting Cisco IP Telephony shows you how to break down problems to find the root cause. Descriptions of each part of the CIPT solution help you understand the functionality of each part of the solution and how each part interacts with other parts of the solution. You'll then learn what steps to take and tools to use to identify and resolve the cause of the problem.
Table of Contents:
Foreword | ||
Introduction | ||
Ch. 1 | Troubleshooting Methodology and Approach | 3 |
Ch. 2 | IP Telephony Architecture Overview | 23 |
Ch. 3 | Understanding the Troubleshooting Tools | 37 |
Ch. 4 | Skinny Client Registration | 113 |
Ch. 5 | IP Phones | 139 |
Ch. 6 | Voice Gateways | 169 |
Ch. 7 | Voice Quality | 383 |
Ch. 8 | Fax Machines and Modems | 433 |
Ch. 9 | Call Routing | 459 |
Ch. 10 | Call Preservation | 551 |
Ch. 11 | Conference Bridges, Transcoders, and Media Termination Points | 565 |
Ch. 12 | Music on Hold | 601 |
Ch. 13 | Call Admission Control | 623 |
Ch. 14 | Voice Mail | 655 |
Ch. 15 | Survivable Remote Site Telephony (SRST) | 707 |
Ch. 16 | Applications | 735 |
Ch. 17 | SQL Database Replication | 793 |
Ch. 18 | LDAP Integration and Replication | 819 |
App. A | Cisco IP Telephony Protocol and Codec Information and References | 849 |
App. B | NANP Call Routing Information | 857 |
App. C | Decimal to Hexadecimal and Binary Conversion Table | 881 |
App. D | Performance Objects and Counters | 891 |
Glossary | 927 | |
Index | 947 |
Read also Desperation Entertaining or Pig Perfect
SSL and TLS: Designing and Building Secure Systems
Author: Eric Rescorla
"This is the best book on SSL/TLS. Rescorla knows SSL/TLS as well as anyone and presents it both clearly and completely.... At times, I felt like he's been looking over my shoulder when I designed SSL v3. If network security matters to you, buy this book."
Paul Kocher, Cryptography Research, Inc.
Co-Designer of SSL v3
"Having the right crypto is necessary but not sufficient to having secure communications. If you're using SSL/TLS, you should have SSL and TLS sitting on your shelf right next to Applied Cryptography."
Bruce Schneier, Counterpane Internet Security, Inc.
Author of Applied Cryptography
"Everything you wanted to know about SSL/TLS in one place. It covers the protocols down to the level of packet traces. It covers how to write software that uses SSL/TLS. And it contrasts SSL with other approaches. All this while being technically sound and readable!"
Radia Perlman, Sun Microsystems, Inc.
Author of Interconnections
Secure Sockets Layer (SSL) and its IETF successor, Transport Layer Security (TLS), are the leading Internet security protocols, providing security for e-commerce, web services, and many other network functions. Using SSL/TLS effectively requires a firm grasp of its role in network communications, its security properties, and its performance characteristics. SSL and TLS provides total coverage of the protocols from the bits on the wire up to application programming.
This comprehensive book not only describes how SSL/TLS is supposed to behave but also uses the author's free ssldump diagnostic tool to show the protocols in action. The author covers each protocol feature,first explaining how it works and then illustrating it in a live implementation. This unique presentation bridges the difficult gap between specification and implementation that is a common source of confusion and incompatibility.
In addition to describing the protocols, SSL and TLS delivers the essential details required by security architects, application designers, and software engineers. Use the practical design rules in this book to quickly design fast and secure systems using SSL/TLS. These design rules are illustrated with chapters covering the new IETF standards for HTTP and SMTP over TLS.
Written by an experienced SSL implementor, SSL and TLS contains detailed information on programming SSL applications. The author discusses the common problems faced by implementors and provides complete sample programs illustrating the solutions in both C and Java. The sample programs use the free OpenSSL and PureTLS toolkits so the reader can immediately run the examples.
Electronic Review of Computer Books - Danny Yee
Covering, as it does, pretty much everything about the Secure Sockets Layer in some depth, Eric Rescorla's SSL and TLS: Designing and Building Secure Systems is not for those who only want to get a secure web site up and running quickly. However, the layout makes it easy to browse just those portions that interest you, and to skip unwanted detail, so it can profitably be used by those who are simply curious, as well as by protocol designers, application programmers, and SSL/TLS implementors. (It was nice that Rescorla recognized the "just curious" in the preface.) A basic understanding of TCP/IP is all that's absolutely necessary to get something from SSL and TLS, but following the details requires a solid understanding.
Rescorla begins with a rapid introduction to security and cryptography and a brief history of SSL protocols (TLS or Transport Layer Security is the IETF-endorsed version). Two chapters then describe SSL itself, the first covering server authentication using RSA (the original motivation for SSL and still by far its most common use) and the second covering other algorithms (Kerberos, FORTEZZA) and modes such as client authentication and session resumption.
The remaining chapters cover specialized topics. A chapter on security looks at protecting keys, random-number generation, certificate chain verification, and some of the known attacks on SSL, such as timing cryptanalysis and the "million message attack." A chapter on performance explains the basic problem (cryptography is expensive), then goes into the details of variations with algorithm and mode (and language, with C recommended over Java) and the use of hardware acceleration. There is also a chapter on designing with SSL and one on coding (and Appendix A has 40-odd pages of sample code).
Two chapters consider special issues with running HTTP over SSL (HTTPS) and SMTP over TLS. Issues with HTTP include reference integrity (ensuring the client is talking to server it thinks it's talking to), virtual hosts, proxies, and downgrade attacks. With SMTP, relaying introduces major complications. A final chapter looks at some alternative approaches, most importantly IPsec, Secure HTTP, and S/MIME. This material provides some interesting examples of interaction between complex protocols.
Booknews
A specialist in Internet security, Rescorla explains secure sockets layer and its IETF successor, transport layer security, which are leading Internet security protocols. He discusses their role in network communications, their security properties, and their performance characteristics. He warns that they cannot be treated as a black box to plug systems into, but must be understood quite thoroughly to be used effectively. The bibliography is lightly annotated. Annotation c. Book News, Inc., Portland, OR (booknews.com)
No comments:
Post a Comment