© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID.

Slides:



Advertisements
Similar presentations
Introduction to Macromedia Director 8.5 – Lingo
Advertisements

Unified Communications (UC) Quick Reference Guide USING YOUR UC CLIENT This guide is designed to provide you with a quick overview of the Unified Communications.
Access Control List (ACL)
Fox Scientific, Inc. ONLINE ORDERING 101. Welcome to our website On our main page you can find current promotions, the vendors we offer, technical references.
Voice Translation Rules Digit manipulation using translation rules and voice translation rules in Cisco IOS.
IPX-300 Series PBX with FXO GW Configuration Internet Telephony PBX System Copyright © PLANET Technology Corporation. All rights reserved.
Chapter 9: Access Control Lists
Basic IP Traffic Management with Access Lists
IPX-600 IP PBX with Gateway Configuration Internet Telephony PBX System Copyright © PLANET Technology Corporation. All rights reserved.
Hosted Voice Product Training
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—4-1 Enabling Single-Site On-Net Calling Implementing Cisco Unified Communications Manager Digit.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Introducing ACL Operation.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Voice Issues.
Guide To UNIX Using Linux Third Edition
Introduction to Unix (CA263) Introduction to Shell Script Programming By Tariq Ibn Aziz.
Call Manager - Quick Reference Guide Initiate a Call 1.Select a Phone List. Click Tab to expose list. 2.Select a phone number. Click phone number to populate.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
The Cisco ACL. 1.The Cisco ACL is simply a means to filter traffic that crosses your router. 2.It has two major syntax types numbered and named lists.
Dial Plans Chapter 2. Dial and Numbering Plans A numbering plan describes the endpoint addressing in a telephony network Same as IP addressing in an IP.
Describe the elements of a VoIP Dial Plan Design.
 CHAPTER 6  Understanding the CME Dial-Plan. Analog Voice Port Configuration: Foreign Exchange Station Ports (FXS): Used to connect analog devices such.
Implementing Voice Gateways
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Backup, Restore, and Server Replacement Josh Rose UCBU Software Engineer.
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
Packet Tracer: Novice Session
Packet Tracer 4.1: Novice Session
Features and Applications for Multisite Deployments
Introduction to Shell Script Programming
© 2002, Cisco Systems, Inc. All rights reserved..
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—4-1 Enabling Single-Site On-Net Calling Implementing MGCP Gateways in Cisco Unified Communications.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Learningcomputer.com SQL Server 2008 Configuration Manager.
Access Control Lists (ACLs)
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 The Routing Table: A Closer Look Routing Protocols and Concepts – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.
Access-Lists Securing Your Router and Protecting Your Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Routing Table: A Closer Look Routing Protocols and Concepts – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Small Business Webcast for Partners Technical Track CCA with SBCS.
RightFax and Cisco. 2 Cisco Unity Fax Solutions: Unity Fax Server F PSTN Remote Access E1/FXS Exchange Message Store Cisco Unity Messaging Server Cisco.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 New Call Sender Feature  There is now a second live reply option in.
Chapter 5 Working with Multiple Worksheets and Workbooks
Graphical Enablement In this presentation… –What is graphical enablement? –Introduction to newlook dialogs and tools used to graphical enable System i.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Internal and Confidential Cognos CoE COGNOS 8 – Event Studio.
Virtual Local Area Networks (VLANs) Part II
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Employing AS-Path Filters.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 UC 7.0 Install and Upgrade Changes TOI Josh Rose UCBU Software Engineer.
Cisco Networking Academy Semester 3 Basic 1900 Switch Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Creating Oracle Business Intelligence Interactive Dashboards
Managing IP Traffic with ACLs
Managing IP Traffic with ACLs
© 2002, Cisco Systems, Inc. All rights reserved.
Introducing ACL Operation
Briefing Session Guide
Call Manager - Quick Reference Guide
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Small Business Webinar for Partners - Technical Track Dial Plans for Small Business Translation Rules, Dial Peers, and COR Skyler Spence Support

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Dial Plan Configuration  New S Business Webinar Series for Partners  When making CLI configuration changes, always consult the CCA Out of Band configuration guide found at ant/version1_8/out_of_band_reference/cca_v18_oob_config_guidelines. pdf  This presentation may be found at  This presentation uses CCA version 1.8 and IOS version 12.4(11) XW9  This presentation will cover the configuration of dial plans on the UC500 platform.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 An Overview of Call Flow When a call comes into the UC500 it is first matched to an inbound Dial Peer. This match is made based on the called number, calling number, or voice port. After matching an inbound Dial Peer, translation rules or profiles configured on that Dial Peer are applied. Finally an outbound Dial Peer is matched based on the called number and COR list configurations.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Dial Peers  A Dial Peer is matched whenever a call comes into or is placed from the UC500. Therefore each call involves both an inbound and an outbound Dial Peer.  Dial Peers are matched based upon either the calling or called number or by port number when this information is not available.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Types of Dial Peers  There are two types of Dial Peers to configure on the UC500, POTS Dial Peers used to interact with traditional PBX systems, and VoIP Dial Peers used to send calls across the network.  The syntax for defining a Dial Peer is dial-peer voice number {pots | voip}  POTS Dial Peers match calls to voice ports while VoIP Dial Peers match calls to session targets which can be an IP address or DNS hostname.  For more information about Dial Peer configuration and uses, please refer to the document at uide/vd_dp_feat_cfg.html#wp uide/vd_dp_feat_cfg.html#wp

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Inbound Dial Peers Matching AttributeDescriptionCall Element incoming called- number dial_string This dial peer command uses the called number to match the incoming call leg to an inbound dial peer Called # answer-address dial_string This dial peer command uses the calling number to match the incoming call leg to an inbound dial peer Calling # destination- pattern dial_string When inbound call legs are matched, this command uses the calling number to match the incoming call leg to an inbound dial peer. This is not the recommended method. Calling # port This dial peer command defines the POTS voice port through which calls to this dial peer are placed. (POTS Dial Peers only) Voice Port

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Direct Inward Dialing  When configuring inbound Dial Peers on a system using PRI/BRI services, it is important to configure the direct-inward-dial command. This command, available only on POTS Dial Peers, makes sure that the called number presented in the call setup information is used to match an outbound Dial Peer.  If DID is not enabled on the matching inbound Dial Peer, a dial-tone will be presented to the caller enabling them to input a new dial string to call where they wish.  For more information, please refer to 86a f8.shtml 86a f8.shtml

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 Outbound Dial Peers Matching  In order to match outbound dial peers, the UC500 uses the dial peer destination-pattern called_number command  On POTS dial peers, the port command is then used to forward the call  On VoIP dial peers, the session target command is then used to forward the call  The following figure shows the relationship between destination- pattern and session target

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Destination Pattern SymbolDescription.Indicates a single-digit placeholder. [ ]Indicates a range of digits. A consecutive range is indicated with a hyphen (-) a nonconsecutive range is indicated with a comma (,). Hyphens and commas can be used in combination; for example, [5-7,9] %Indicates that the preceding digit occurred zero or more times. This functions the same as the "*" used in regular expression. TIndicates the interdigit timeout. Should be used carefully, most often for international dialing plans. When the router attempts to match an outbound Dial Peer, it compares the called number to the destination-pattern configured. This is in contrast to matching inbound dial peers when the calling number is compared to the destination-pattern. The destination-pattern can be either a complete telephone number or a partial telephone number with wildcard digits. In addition to the characters 0-9, #, and * the following symbols are defined for destination patterns* *Wildcards may also be used to match inbound dial peers.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Notes on POTS Destination Patterns  VoIP dial peers transmit all digits in the called number by default; however, POTS dial peers remove, or strip, any outbound digits that explicitly match the destination-pattern.  To disable this behavior, you can use the no digit-strip dial peer configuration command.  The prefix digit command adds a string of digits and pauses (represented by ‘,’) to the beginning of the string transmitted by a POTS dial peer.  The forward-digits command can be used to forward a fixed number of dialed digits, or all dialed digits, regardless of the number of digits that explicitly match the destination pattern. The forward-digits 4 command tells the router to forward the last four digits in the dialed string. The forward-digits all command instructs the router to forward the full dialed string.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Translation Rules &Translation Profiles  Translation Rules provide a simple and powerful method for adding, subtracting, and splicing numbers  The basic format is: voice translation-rule rule /match pattern/ /replacement pattern/ Note: / -- / delimits the whole number  This example replaces the first occurrence of the number "123" with "456“. voice translation-rule 1 rule 1 /123/ /456/  There are multiple special characters that allow patterns to match a wide range of dial strings.  Translation Rules can be tested using the command test voice translation-rule name-tag input-number

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12 Translation Rules & Translation Profiles  This table defines wildcard and wildcard combinations WildcardDefinition.Any single digit 0 to 9,*,#Any specific character (enter ‘\*’ to match this char.) [0-9]Any range or sequence of characters *Modifier-match none or more occurrences +Modifier-match one or more occurrences ?Modifier-match none or one occurrence (Ctrl+V+?).*Any digit followed by none or more ocurrences. This is effectively anything, including null..+Any digit followed by one or more ocurrences. This is effectively anything, except null. ^$Begins with and Ends at. Together indicates null.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 13 Translation Rules & Translation Profiles  Once a Translation Rule is made, it can be put into a Translation Profile where it is applied to the called, calling, or redirect number or the redirect target.  The syntax for a Translation Profile is: voice translation-profile translate  The Translation Profile is then applied to a Dial Peer.  More information on Translation Rules can be found at te09186a e8e.shtml and ation_example09186a shtml te09186a e8e.shtml

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 14 Class of Restrictions (COR) Lists  COR Lists are used to control which Dial Peers an individual user may access. To control who can dial certain patterns, international numbers for example, you can apply a COR list to the Dial Peer that matches that destination-pattern.  To create and apply COR lists, follow these steps  Note that any ephone-dn without a COR list applied is given full privileges. 1. Configure dial-peer cor custom and assign a meaningful name that specifies the way CORs apply to dial-peers. 2. Create the actual lists of the restrictions that apply to the dial-peer. 3. Create dial-peers and specify the COR list to be used. 4. Apply the COR list to the individual Ephone-dns.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 15 For a copy of this Webinar and others, as well as application notes and the chance to discuss all this, please visit the new Partner Community: <Alternatively, start on Partner Central: highlight the sales category and click on Small and Medium Business: Then, on this page there's a link to it in the top Announcement box: "SMB Webinar Schedule for January" (this will be updated each month)SMB Webinar Schedule for January Or to find the page when it's not in the Announcement box, under Achieve Your Goals, the drop down "What do you want to do today" has "Attend an SMB Webinar" (this is a permanent link). Or in the Navigation Click on Tools and Resources, and a subpage is called "Online Events for SMB Partners" which is our page>

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 16