SIP


Book Description

This cutting-edge book shows you how SIP provides a highly-scalable and cost-effective way to offer new and exciting telecommunication feature sets, helping you design your OC next generationOCO network and develop new applications and software stacks. Other key discussions include SIP as a key component in the Internet multimedia conferencing architecture, request and response messages, devices in a typical network, types of servers, SIP headers, comparisons with existing signaling protocols including H.323, related protocols SDP (Session Description Protocol) and RTP (Real-time Transport Protocol), and the future direction of SIP. Detailed call flow diagrams illustrate how this technology works with other protocols such as H.323 and ISUP. Moreover, this book covers SIP RFC 3261 and the complete set of SIP extension RFCs."




Cisco CallManager Best Practices


Book Description

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more Understand how to manage and monitor your system proactively for maximum uptime Use dial plan components to reduce your exposure to toll fraud Take advantage of call detail records for call tracing and accounting, as well as troubleshooting Utilize the many Cisco IP Telephony features to enable branch site deployments Discover the best ways to install, upgrade, patch, and back up CallManager Learn how backing up to remote media provides both configuration recovery and failure survivability IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony. Having access to proven best practices, developed in the field by Cisco� IP Telephony experts, helps you ensure a solid, successful deployment. Cisco CallManager Best Practices offers best practice solutions for CallManager and related IP telephony components such as IP phones, gateways, and applications. Written in short, to-the-point sections, this book lets you explore the tips, tricks, and lessons learned that will help you plan, install, configure, back up, restore, upgrade, patch, and secure Cisco CallManager, the core call processing component in a Cisco IP Telephony deployment. You'll also discover the best ways to use services and parameters, directory integration, call detail records, management and monitoring applications, and more. Customers inspired this book by asking the same questions time after time: How do I configure intercom? What's the best way to use partitions and calling search spaces? How do I deploy CallManager regionally on my WAN? What do all those services really do? How do I know how many calls are active? How do I integrate CallManager with Active Directory? Years of expert experiences condensed for you in this book enable you to run a top-notch system while enhancing the performance and functionality of your IP telephony deployment.




SIP Security


Book Description

This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted. Key Features: Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP security Discusses key aspects of SIP security including authentication, integrity, confidentiality, non-repudiation and signalling Assesses the real security issues facing users of SIP, and details the latest theoretical and practical solutions to SIP Security issues Covers secure SIP access, inter-provider secure communication, media security, security of the IMS infrastructures as well as VoIP services vulnerabilities and countermeasures against Denial-of-Service attacks and VoIP spam This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.




Understanding Session Border Controllers


Book Description

The complete guide to deploying and operating SBC solutions, Including Cisco Unified Border Element (CUBE) Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to enable this transition. Thousands of organizations have made the Cisco Unified Border Element (CUBE) their SBC technology of choice. Understanding Session Border Controllers gives network professionals and consultants a comprehensive guide to SBC theory, design, deployment, operation, security, troubleshooting, and more. Using CUBE-based examples, the authors offer insights that will be valuable to technical professionals using any SBC solution. The authors thoroughly cover native call control protocols, SBC behavior, and SBC’s benefits for topology abstraction, demarcation and security, media, and protocol interworking. They also present practical techniques and configurations for achieving interoperability with a wide variety of collaboration products and solutions. Evaluate key benefits of SBC solutions for security, management, and interoperability Master core concepts of SIP, H.323, DTMF, signaling interoperability, call routing, fax/modem over IP, security, media handling, and media/signal forking in the SBC context Compare SBC deployment scenarios, and optimize deployment for your environment Size and scale an SBC platform for your environment, prevent oversubscription of finite resources, and control cost through careful licensing Use SBCs as a back-to-back user agent (B2BUA) to interoperate between asymmetric VoIP networks Establish SIP trunking for PSTN access via SBCs Interoperate with call servers, proxies, fax servers, ITSPs, redirect servers, call recording servers, contact centers, and other devices Secure real-time communications over IP Mitigate security threats associated with complex SIP deployments Efficiently monitor and manage an SBC environment




Hacking VoIP


Book Description

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to: –Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing –Audit VoIP network security –Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage –Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX –Identify the many vulnerabilities in any VoIP network Whether you’re setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.




Security in Distributed and Networking Systems


Book Description

Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, security architectures and protocols, security theory and tools, secrecy and integrity, and trust models. This volume provides an excellent reference for students, faculty, researchers and people in the industry related to these fields.




Fax, Modem, and Text for IP Telephony


Book Description

IP Telephony has revolutionized many aspects of telecommunications and it continues to be deployed at a rapid pace. The benefits of transporting voice over an IP infrastructure include increased flexibility, better scalability, and a significant cost savings over traditional telephony networks. However, during the deployment of these VoIP solutions, other types of traditional telephony communications that can also realize these same benefits are often overlooked or ignored. Fax, Modem, and Text for IP Telephony is a comprehensive resource that confronts the need for information on transporting alternative, non-voice communications over the IP protocol. Beginning with the basic theory and operation of fax, modem, and text telephony, this book then educates you on all of the current transport options that are available. An extensive design guide then provides the pertinent advice and best practices for making the correct planning decisions and choosing the best transport option for your network. Fax, Modem, and Text for IP Telephony also includes meticulous configuration and troubleshooting guides. The configuration guides in this book include a number of sample configurations and tips to manage any fax, modem, or text deployment. The troubleshooting guides present the essential methodologies, debugs, and analysis tools for quickly resolving both the common and complex issues that may be encountered. This book is the perfect companion to other VoIP resources, and it is the only book that empowers you to successfully handle any fax, modem, or text implementation. David Hanes, CCIE® No. 3491, is currently a senior engineer specializing in training, network design assistance, and troubleshooting of fax technologies for the Customer Assurance Engineering (CAE) group at Cisco®. Since joining Cisco in 1997, David has worked as a TAC engineer for the WAN, WAN Switching, and Multiservice Voice teams, a team lead for the Multiservice Voice team, and an escalation engineer covering a variety of voice and fax technologies. David has troubleshot escalated issues in Cisco customer networks worldwide and remains a technical resource for other Cisco employees and customers. Gonzalo Salgueiro CCIE No. 4541, is a senior escalation engineer supporting voice, fax, and modem technologies for the Cisco TAC. Gonzalo has spent more than 11 years troubleshooting complex issues in large-scale VoIP networks as well as providing technical leadership for some of the most critical worldwide voice and fax deployments. Prior to joining the Escalation Team in 1999 Gonzalo had roles as a TAC engineer for both the Access/Dial and Multiservice Voice teams as well as a team lead for the Access/Dial team. Learn basic and advanced operational theory and practical implementation of fax, modem, and text communications Understand how to implement fax, modem, and text communications using protocols such as H.323, SIP, MGCP, and SCCP. Explore the functionality and advantages of T.38 fax relay, passthrough, modem relay, T.37 Store-and-Forward Fax, and text relay for IP network deployments Employ expert-recommended best practices and design solutions for deploying fax, modem, and text in an IP telephony environment Optimize your network with comprehensive fax, modem, and text configuration and design tips for use with IOS and non-IOS gateways Master the latest fax, modem, and text troubleshooting tools and techniques employed by Cisco engineers Category: Cisco Press--IP Communication Covers: Fax, Modem, and Text Telephony Technologies for Integrated IP Networks




Handbook of SDP for Multimedia Session Negotiations


Book Description

This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single “super-SDP RFC” with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.




Securing Cisco IP Telephony Networks


Book Description

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable. Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter. This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants. Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.




Cost-Benefit Analysis and the Environment Further Developments and Policy Use


Book Description

This book explores recent developments in environmental cost-benefit analysis (CBA). This is defined as the application of CBA to projects or policies that have the deliberate aim of environmental improvement or are actions that affect, in some way, the natural environment as an indirect consequence