You are previewing Cisco Unified Communications Manager 8: Expert Administration Cookbook.
O'Reilly logo
Cisco Unified Communications Manager 8: Expert Administration Cookbook

Book Description

Administering a call-processing system as sophisticated as Cisco Unified Communications Manager can be a demanding task, but this cookbook simplifies everything with a range of advanced real-world recipes for immediate use.

  • Full of illustrations, diagrams, and tips with clear step-by-step instructions and real time examples

  • Master call admission control and the technologies associated with it, which is an important aspect of any unified communications deployment to ensure call quality and resilience.

  • Focus on implementing Local Route Groups, Device Pools, Route Patterns and various other call routing technologies with a specific focus on building an E.164 compatible dial plan.

  • Master the necessary aspects of configuring media resources to support conferencing, transcoding, and Music on Hold.

  • In Detail

    Cisco Unified Communications Manager (CUCM) is a software-based call-processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges, transcoding resources, and voicemail boxes among others. This scalable, distributable, highly-available enterprise-class system delivers voice, video, mobility, and presence services. It connects up to 30,000 users of IP phones, media processing devices, VoIP gateways, mobile devices, and multimedia applications. With this cookbook you will learn all the important aspects of administering Cisco Unified Communications Manager.

    Cisco Unified Communications Manager 8: Expert Administration Cookbook is filled with many advanced recipes to effectively and efficiently configure and manage Cisco Unified Communications Manager. This book covers everything an administrator needs during and after Cisco Unified Communications Manager implementation.

    This practical cookbook contains detailed step-by-step instructions with clear and informative screenshots that cover all the important and advanced aspects of administering Cisco Unified Communications Manager.

    The book starts with introducing Call Routing and E.164. It then covers configuration and design information for the various call admission control technologies and Media Resources. The book also dives deep into troubleshooting, upgrades, disaster recovery, user management and much more.

    Table of Contents

    1. Cisco Unified Communications Manager 8: Expert Administration Cookbook
      1. Cisco Unified Communications Manager 8: Expert Administration Cookbook
      2. Credits
      3. About the Author
      4. About the Reviewers
      5. www.PacktPub.com
        1. Support files, eBooks, discount offers and more
          1. Why Subscribe?
          2. Free Access for Packt account holders
          3. Instant Updates on New Packt Books
      6. Preface
        1. What this book covers
        2. What you need for this book
        3. Who this book is for
        4. Conventions
        5. Reader feedback
        6. Customer support
          1. Errata
          2. Piracy
          3. Questions
      7. 1. Call Routing, Dial Plan, and E.164
        1. Introduction
        2. Implementing local route groups with device pools for E.164 call routing
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        3. Implementing E.164 route patterns and partitions
          1. How to do it...
          2. How it works...
          3. There's more...
            1. Dial plan considerations and partitions
              1. Common system partitions
              2. Partitioning at a national level
              3. Partitioning at a local level
            2. Dial plan considerations and route patterns
              1. Seven digit dialing
              2. Ten digit dialing
        4. Implementing E.164 called and calling party transformations
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Partitions and calling search spaces for called and calling transformation patterns
        5. Implementing least cost call routing using Tail End Hop Off
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        6. Implementing calling restrictions with line blocking partitions and calling search spaces
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Determining classes of restriction
            2. Patterns required for call restrictions
              1. Design considerations for preventing call restriction bypass
              2. Blocking in traditional environments
              3. Blocking in E.164 environments
              4. Partitions used in call restrictions
                1. National
                2. International
                3. Premium
              5. Mitigating fraud
        7. Implementing short dial numbers
          1. Getting ready
          2. How to do it...
          3. How it works...
        8. Implementing time-of-day call routing
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Considerations for advanced time-of-day routing
            2. Holidays
              1. Routing on holidays
        9. Implementing Forced Authorization Codes
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Design considerations for Forced Authorization Codes
              1. Partitions for Forced Authorization Codes
              2. Calling search spaces for Forced Authorization Codes
                1. Device calling search space
                2. Line calling search space
              3. Call routing considerations with Forced Authorization Codes
                1. Traditional call routing
                2. E.164 call routing
              4. Authorization levels with Forced Authorization Codes
        10. Implementing Client Matter Codes
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Design considerations for Client Matter Codes
              1. Partitions
              2. Route patterns
              3. Calling search spaces
          5. See also
      8. 2. Call Admission Control
        1. Introduction
        2. Implementing location-based call admission control
          1. Getting ready
          2. How to do it...
          3. How it works...
            1. How Unified Communications Manager calculates bandwidth requirements
            2. Single Cluster
            3. Centralized vs. Decentralized
          4. There's more...
          5. Importance of Quality of service
          6. Implementation strategies for location-based call admission control
            1. Using device pools
            2. Per device
          7. Not Enough Bandwidth—synchronization issues with location-based call admission control
        3. Implementing regions for call admission control
          1. How to do it...
          2. How it works...
          3. There's more...
        4. Implementing the Resource Reservation Protocol
          1. Getting ready
          2. How to do it...
          3. How it works...
            1. RSVP Settings
          4. There's more...
            1. Carrier support for RSVP
          5. See also
        5. Enabling Automated Alternate Routing
          1. How to do it...
          2. How it works...
        6. Implementing Automated Alternate Routing
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
              1. AAR Groups
              2. AAR Destination Mask
              3. Partitions
              4. Calling search spaces
              5. Route patterns
      9. 3. Media Resources and Music On Hold
        1. Introduction
        2. Configuring software conference bridges
          1. How to do it...
          2. How it works...
          3. There's more...
            1. Cisco IP Voice Media Streaming App Service parameters
            2. Design considerations for software conference bridges
        3. Configuring IOS conference bridges
          1. How to do it...
          2. How it works...
        4. Configuring transcoders
          1. How to do it...
          2. How it works...
        5. Configuring media termination points
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        6. Configuring media resource groups
          1. Getting ready
          2. How to do it...
          3. How it works...
        7. Configuring media resource group lists
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Applying media resource group lists to devices
        8. Implementing unicast Music On Hold
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Unicast and multicast in the same cluster
              1. Separate Music On Hold servers
              2. Single Music On Hold server
            2. Codec selection
        9. Configuring multicast Music On Hold
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        10. Adding custom media files for Music On Hold
          1. How to do it...
      10. 4. Tracing and Troubleshooting Tools
        1. Introduction
        2. Configuring user permissions for the Real-Time Monitoring Tool
          1. How to do it…
          2. How it works...
            1. Custom user group for the Real-Time Monitoring Tool
          3. There's more…
        3. Collecting traces using the Query Wizard
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. See also
        4. Configuring the e-mail server for the Real-Time Monitoring Tool
          1. How to do it…
          2. How it works…
        5. Creating custom alerts in the Real-Time Monitoring Tool
          1. Getting ready
          2. How to do it…
          3. How it works…
        6. Configuring custom alert actions
          1. Getting ready
          2. How to do it…
          3. How it works…
        7. Capturing packets
          1. How to do it...
          2. How it works...
          3. There's more...
        8. Analyzing the Dial Plan with the dialed number analyzer
          1. Getting ready...
          2. How to do it...
          3. How it works...
          4. There's more...
      11. 5. Device and Unified Mobility
        1. Introduction
        2. Configuring physical locations
          1. Getting ready
          2. How to do it...
          3. How it works...
        3. Configuring device mobility groups
          1. Getting ready
          2. How to do it...
          3. How it works...
        4. Configure device pools for device mobility
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Configuring device mobility info
          1. Getting ready
          2. How to do it...
          3. How it works...
        6. Enabling device mobility
          1. How to do it...
          2. How it works...
        7. Configuring mid-call feature access codes
          1. Getting ready
          2. How to do it...
          3. How it works...
        8. Configuring Session Handoff
          1. How to do it...
          2. How it works...
        9. Enabling Intelligent Session Control
          1. How to do it...
          2. How it works...
          3. There's more…
        10. Implementing mobility access lists
          1. Getting ready
          2. How to do it...
          3. How it works...
        11. Configuring remote destination profiles
          1. Getting ready
          2. How to do it...
          3. How it works...
        12. Configuring remote destinations
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        13. Implementing Mobile Voice Access
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        14. Enabling Enterprise Feature Access
          1. Getting ready
          2. How to do it...
          3. How it works...
        15. Adding the Mobility softkey
          1. How to do it...
          2. How it works...
      12. 6. User Management
        1. Introduction
        2. Enabling LDAP synchronization
          1. How to do it...
          2. How it works...
        3. Configuring an LDAP Directory
          1. Getting ready
          2. How to do it...
          3. How it works...
        4. Enabling LDAP authentication
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Configuring custom LDAP filters
          1. How to do it...
          2. How it works...
          3. There's more...
        6. Configuring credential policies
          1. How to do it...
          2. How it works...
        7. Configuring default credential policies
          1. Getting ready
          2. How to do it...
          3. How it works...
        8. Assigning credential policies
          1. Getting ready
          2. How to do it...
          3. How it works...
        9. Configuring user roles
          1. How to do it...
          2. How it works...
        10. Configuring user groups
          1. How to do it...
          2. How it works...
        11. Assigning user groups to end users
          1. Getting ready
          2. How to do it...
          3. How it works...
      13. 7. User Features
        1. Introduction
        2. Implementing direct transfer to voice mail
          1. Getting ready
          2. How to do it...
          3. How it works...
        3. Implementing Meet-Me conferencing
          1. How to do it...
          2. How it works...
        4. Implementing call park
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Implementing directed call park
          1. Getting ready
          2. How to do it...
          3. How it works...
        6. Configuring the Intercom feature
          1. Getting ready
          2. How to do it...
          3. How it works...
        7. Configuring Malicious Call Identification
          1. How to do it...
          2. How it works...
        8. Adding a custom ringtone
          1. Getting ready
          2. How to do it...
          3. How it works...
        9. Adding a custom background image
          1. Getting ready
          2. How to do it...
        10. Configuring dual mode for iPhone
          1. Getting ready
          2. How to do it...
          3. How it works...
      14. 8. Advanced Features
        1. Introduction
        2. Enabling the Extension Mobility service
          1. How to do it...
          2. How it works...
        3. Configuring the Extension Mobility phone service
          1. Getting ready
          2. How to do it...
          3. How it works...
        4. Configuring phone devices for Extension Mobility
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Configuring device profiles for Extension Mobility
          1. Getting ready
          2. How to do it...
          3. How it works...
        6. Configuring Extension Mobility service parameters
          1. How to do it...
          2. How it works...
        7. Enabling the Cross Cluster Extension Mobility services
          1. How to do it...
          2. How it works...
        8. Configuring the Cross Cluster Extension Mobility phone service
          1. Getting ready
          2. How to do it...
          3. How it works...
        9. Configure users for Cross Cluster Extension Mobility
          1. Getting Ready
          2. How to do it...
          3. How it works...
        10. Preparing certificates for Cross Cluster Extension Mobility
          1. Getting ready
          2. How to do it...
          3. How it works...
        11. Creating a template for Cross Cluster Extension Mobility devices
          1. How to do it...
          2. How it works...
        12. Configuring Cross Cluster Extension Mobility parameters
          1. How to do it...
          2. How it works...
        13. Configuring intercluster trunks for Cross Cluster Extension Mobility
          1. How to do it...
          2. How it works...
        14. Configuring the intercluster service profile for Cross Cluster Extension Mobility
          1. Getting ready
          2. How to do it...
          3. How it works...
        15. Configuring monitoring and recording
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        16. Configuring geolocations and filters
          1. Getting ready
          2. How to do it...
          3. How it works...
        17. Implementing logical partitioning
          1. Getting ready
          2. How to do it...
          3. How it works...
        18. Configuring hotline service parameters
          1. How to do it...
          2. How it works...
        19. Configuring a hotline device
          1. Getting ready
          2. How to do it...
          3. How it works...
        20. Configuring barge for devices and users
          1. How to do it...
          2. How it works...
          3. There's more...
            1. Conference barge
            2. Configuring barge tones
        21. Configuring privacy for devices and users
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
      15. 9. Securing Unified Communications
        1. Introduction
        2. Configuring phone security profiles
          1. How to do it...
          2. How it works...
        3. Configuring devices for secure tone
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        4. Configuring Certificate Authority Proxy Function
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Configuring digest authentication
          1. Getting ready
          2. How to do it...
          3. How it works...
        6. Implementing endpoint hardening
          1. Getting ready
          2. How to do it...
          3. How it works...
        7. Implementing a secure conference bridge
          1. How to do it...
          2. How it works...
        8. Implementing secure Meet-Me conferences
          1. How to do it...
          2. How it works...
        9. Configuring VPN for Cisco IP phones
          1. How to do it...
          2. How it works...
        10. Configuring application users for secure communication
          1. Getting ready
          2. How to do it...
          3. How it works...
      16. 10. Serviceability, Upgrades, and Disaster Recovery
        1. Introduction
        2. Configuring alarms
          1. How to do it...
          2. How it works...
          3. See also
        3. Configuring traces
          1. How to do it...
          2. How it works...
          3. See also
        4. Configuring SNMP versions 1 and 2
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        5. Configuring SNMP Version 3
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        6. Applying patches and upgrades
          1. Getting ready
          2. How to do it...
          3. How it works...
        7. Configuring a backup device
          1. Getting ready
          2. How to do it...
          3. How it works...
        8. Configuring a backup schedule
          1. Getting ready
          2. How to do it...
          3. How it works...
        9. Performing a manual backup
          1. Getting ready
          2. How to do it...
          3. How it works...
        10. Restoring from backup
          1. How to do it...
          2. How it works...
      17. 11. Bulk Administration Tool
        1. Introduction
        2. Introducing the Bulk Administration Tool
          1. Getting ready
          2. How to do it...
          3. How it works...
        3. Enabling the Bulk Provisioning Service
          1. How to do it...
          2. How it works...
        4. Creating and using a custom file
          1. How to do it...
          2. How it works...
          3. There's more...
        5. Bulk provisioning phones
          1. How to do it...
          2. How it works...
        6. Bulk provisioning users
          1. How to do it...
          2. How it works...
        7. Bulk provisioning user device profiles
          1. How to do it...
          2. How it works...
        8. Bulk provisioning gateways
          1. How to do it...
          2. How it works...
        9. Bulk provisioning Forced Authorization Codes
          1. How to do it...
          2. How it works...
        10. Bulk provisioning Client Matter Codes
          1. How to do it...
          2. How it works...
        11. Bulk provisioning call pickup groups
          1. How to do it...
          2. How it works...
        12. Bulk provisioning access lists
          1. How to do it...
          2. How it works...
        13. Bulk provisioning remote destination profiles
          1. How to do it...
          2. How it works...
        14. Bulk provisioning remote destinations
          1. How to do it...
          2. How it works...
        15. Bulk provisioning mobility profiles
          1. How to do it...
          2. How it works...
        16. Exporting data
          1. How to do it...
          2. How it works...