© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 EDCS- Call Accounting and Call Detail Record Collection for UC500 Marcos.

Slides:



Advertisements
Similar presentations
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Radius based ssh authentication Location of Radius server – radius-server host auth-port 1812 acct-port 1813 key WinRadius – The same config.
Dexter Team IPv6 in Connection 8.5.
Technical Overview July, 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 RIP version 1 Routing Protocols and Concepts – Chapter 5.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
802.1x Port Authentication via RADIUS By Oswaldo Perdomo cs580 Network Security.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 5 City College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Unity Connection 2.0 Phone View Troubleshooting Mike Maas, Unified.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Cisco Router Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University BlackHat Briefings, USA, 2002.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
File Transfer Protocol (FTP) FTP host stores files Client logs into host Client program sends command to get a file FTP host downloads the file with error.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing & Switching.
RADIUS What it is Remote Authentication Dial-In User Service
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Multicast Overview Webcast Joshua Ferguson Cisco Systems, Inc. Advanced.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Configuring and Deploying Web Applications Lesson 7.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Dynamic Host Configuration Protocol v6.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
CCNA Routing and Switching Routing and Switching Essentials v6.0
ACCESSING YOUR E-FAX SYSTEM
Information Security Professionals
AAA Introduction Chalk Talk
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Marcos Hernandez, SMB Technical Marketing Engineer
NAT , Device Discovery Chapter 9 , chapter 10.
Cisco Real Exam Dumps IT-Dumps
File Transfer Protocol
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
– Chapter 3 – Device Security (B)
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 EDCS- Call Accounting and Call Detail Record Collection for UC500 Marcos Hernandez, SMB Technical Marketing Engineer December 2008

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Call Accounting Options for SBCS  Call Detail Records sent to a Syslog Server  Call Detail Records sent to a Radius Server  Call Detail Records sent to an FTP Server

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 CDRs sent to a Syslog Server PSTN/VoIP Syslog Server Pros: Easy to Configure Low Cost Quick Deployment Easy to interpret (CSV format) Cons: Syslog works over UDP LAN deployment only No CDR backup Important: Make sure that clock settings are accurate, for proper time stamping. NTP is recommended. UC500 Configuration service timestamps log datetime msec localtime ! aaa new-model aaa authentication login default none aaa accounting connection h323 start-stop radius gw-accounting syslog ! logging

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 CDRs sent to a Radius Server Internet Syslog Server Pros: More reliable accounting Vendor Specific Attributes (VSA) Customized records Specific captures can be stored in flash (templates) Multiple servers Cons: More configuration/customization Requires RADIUS infrastructure (typically deployed on the WAN) Important: Make sure that clock settings are accurate, for proper time stamping. NTP is recommended. UC500 Configuration service timestamps log datetime msec localtime ! aaa new-model aaa accounting connection h323 start-stop broadcast group radius aaa session-id common ! radius-server host radius-server vsa send accounting radius-server vsa send authentication RADIUS Server PSTN

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 CDRs sent to a FTP Server PSTN/VoIP FTP Server Pros: Easy to Configure Low Cost Quick Deployment Easy to interpret (CSV format) Reliable transport (LAN/WAN) CDR’s can be backed up to flash (make sure you have enough space) Cons: CPU intensive on busy systems (timers need to be tweaked) Important: Make sure that clock settings are accurate, for proper time stamping. NTP is recommended. UC500 Configuration service timestamps log datetime msec localtime ! gw-accounting aaa ! gw-accounting file primary ftp username password secondary ifs flash:cdr maximum buffer-size 15 maximum retry-count 3 maximum fileclose-timer 300 maximum cdrflush-timer 245

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Additional Information and Troubleshooting CDR Logging Configuration with Syslog Servers and Cisco IOS Gateways Configuring RADIUS Accounting Configuring File Accounting For questions: Sentinel

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7