Wednesday, December 16, 2015

How to Configure the Cisco 7940G IP Phone for Standalone SIP?



How to configure the Cisco 7940G IP Phone for Standalone SIP? It’s a common problem while using the Cisco ip phone 7900 series. Now here we will share an example and case that the user of Cisco 7940g phone has got…

And the discussion is likes this:
The Problem: “I have a Cisco 7940g IP telephone.
I do not have a PBX. This is simply an IP phone plugged into a my LAN.
I just signed up Digium cloud SIP service.
Is there a way to make this work?
P.S. I tried entering the credentials that Digium sent me into the "5.  SIP Configuration" menu under "SETTINGS" on the phone, but I still have an 'X' over my line on the home screen.”

Someone answered: “Digium is a very-well known company because of a VoIP product called Asterisk.
Will the phone work, of course?  You have a choice of running SIP or Cisco-proprietary SCCP.  
We'll need to do a top-to-bottom troubleshooting and configuration.  Firstly, what protocol are you planning to use (SIP or SCCP) and what configuration settings does Digium require you to do from your side?”

In fact the user wants to run SIP.  He does not have any PBX or other Cisco phone hardware outside of this 7940g phone sitting on desk.
He has factory-reset the phone, and entered the credentials Digium gave him.
Settings > 4. SIP Configuration > 1. Line 1 Settings:
1. Name = (the user’s assigned Digium phone number)
2. Shortname= (his name)
3. Authentication Name=56605ed547a8437d872f6b516df6a4bc
4. Authentication Password = (another random string of characters just like the previous field)
5. Display Name = UNPROVISIONED
6. Proxy Address = sip.digiumcloud.com
7. Proxy Port = 5060
And he have confirmed with our sysadmin that the network's router is set to (1) disable "SIP helper", and (2) allow communication on specific UDP port ranges, both per Digium's knowledgebase.

…Those configuration are not enough.  
Ask Digium if NAT & ALG are supported. 
What transport protocol does Digium support:  TCP or UDP

What codec is allowed?
The Cisco IP Phone 79X5 family of phones behave differently.  It's not like the IP Phone 79X0 where the configurations are simple.  You'll need to upload the complete set of configurations to the phone using DHCP Option 150 and a TFTP server.

…Any more suggestions? Share with us…

From https://supportforums.cisco.com/discussion/12721381/configuring-cisco-7940g-phone-stanalone-sip

More Related…

Sunday, December 6, 2015

Cisco 800M Series ISR, New 2015

The Cisco 800M Series Integrated Services Router, of course, is the member of the Cisco 800Series ISR product family. The Cisco 800M Series ISR is a modular platform that was intended for small to medium sites. It provides a flexible array of WAN connectivity options with easy migration among WAN interface types. It runs Cisco IOS Software and delivers built-in security in a single software image with no additional software licenses required. It also integrates application hosting capabilities right in the router.

The Cisco 800M ISR is best suited for the following uses:
● Secure WAN connectivity for branches
● Transmitting transactional data from ATM machines, point-of-sale terminals, and kiosks
● Cellular backup to primary wired links
● Quick, easy connectivity in countries where most WAN infrastructure is cellular: 3G connectivity can be used for primary connections, backup connections, or both
● Locations with WAN services requiring serial connectivity
● Deployments requiring real-time, local data collection and analysis from vending machines, Internet of Things (IoT) devices, and M2M sensors in other applications

There are two Cisco 800M Series ISR models: the part numbers are C841M-4X and C841M-8X. Both integrate a Gigabit Ethernet switch and redundant Gigabit Ethernet WAN uplinks.


The ISR 800M router with part number C841M-8X.









The Cisco 800M Series platform supports pluggable Cisco WAN Interface Modules (WIMs) for flexible connectivity.

The following Figure shows the rear of the ISR 800M (C841M-8X) with WIM-3G and WIM-1T modules inserted. Figure 3 shows the rear of the ISR 800M (C841M-4X), also with both modules inserted.

Cisco 800M ISR (C841M-8X) with WIM-3G and WIM-1T



Cisco 800M ISR (C841M-4X) with WIM-3G and WIM-1T

Features and Benefits
The Cisco 800M Series ISR integrates enterprise-class security and application services while delivering the best price/performance ratio in its class. The router supports highly available and redundant WAN connection options and lets you easily migrate to different WAN connections for investment protection.
The Cisco 800M ISR is the first in the industry to support multiple 3G technologies on the same pluggable WAN interface (the Cisco WIM-3G), providing you with the ability to choose the service provider. The platform is future-enabled, and it provides an open, extensible environment for developing and hosting applications at the network edge for local processing right in the router. The routers support single-pane-of-glass management and the 3G cellular Simple Network Management Protocol (SNMP) MIB.

Features and Benefits of Cisco 800M Routers
Requirement
Cisco 800M Supporting Feature(s)
Secure connectivity
●  VPNs: Integrated IPsec, Group Encrypted Transport, Cisco Dynamic Multipoint VPN (DMVPN), Cisco FlexVPN, Cisco EasyVPN
●  Integrated Cisco IOS Zone-Based Firewall with Next-Generation Network-Based Application Recognition (NBAR2)
●  Integrated domain/URL filtering
●  Cisco Cloud Web Security Connector for cloud-based web security
Ability to easily migrate to other WAN interfaces
●  Modular architecture that supports pluggable Cisco WAN Interface Modules (WIMs)
Flexible choices of wireless WAN services and providers
●  Supports HSPA+/HSPA and EV-DO on a single multimode 3G WIM with fallback to 2G cellular technologies
●  Dual Subscriber Identity Module (SIM) and Removable User Identity Module (R-UIM) support for easy swap-out as you change networks and providers
High network availability for business continuity
●  Supports two slots on a single 3G module that can hold a mix of SIM and/or R-UIM cards for cellular multihoming across HSPA+/HSPA and EV-DO WWANs
●  Dual Gigabit Ethernet WAN ports and support for two serial modules for primary/backup wired connections or a mix of wired and cellular links for redundancy
Convergence of required capabilities into a single box for lower CapEx and OpEx
●  Integrates Gigabit Ethernet switch, routing, multilayer security, full Cisco IOS Software suite, multiple WAN interface choices
Comprehensive and centralized network management
●  Integrated device management using Cisco Configuration Professional Express. Includes comprehensive Security Policy Management (covering identity, user, and user group domain filtering, VPNs, and cloud-based Cisco Web Security) with monitoring and reporting
●  Enterprise-class centralized provisioning and management using Cisco Prime Infrastructure
●  Remote management and network monitoring using SNMP (including 3G SNMP MIBs), Telnet, and HTTP, and locally through a console port

Licensing
The Cisco 800M Series ISR default license supports the Cisco IOS Software Advanced IP Services feature set with no additional technology package license requirement.
License for Cisco 800M Series ISR
Model
Image
Default Feature License
First Cisco IOS Software Release
Cisco 800M ISR
c800m-universalk9-mz
SL-800M-AIS
(Advanced IP Services)
15.5(1)T1
More info about Cisco 800M Series Integrated Services Router such as System Specs for Cisco 800M Routers, ordering information, warranty, technical service options, etc. you can refer to the data sheet of Cisco 800M Series Integrated Services Router:

More Cisco 800 Router Topics


Wednesday, November 11, 2015

What You Should Know about the Cisco Mobility Express Solution

Briefly, the Cisco Mobility Express wireless network solution provides a virtual wireless LAN controller functionality bundled into, currently, the Cisco Aironet 1850 and 1830 series access points. This functionality provides a simplified WiFi architecture with enterprise-level WLAN capability to small and medium deployments.

In the Cisco Mobility Express wireless network solution, one access point (AP), running the Cisco Mobility Express wireless controller, is designated as the master AP. Other access points, referred to as subordinate APs, associate to this master AP.

The master AP operates as a wireless LAN controller, to manage and control the subordinate APs, and also operates as an access point to serve clients. The subordinate APs behave as normal lightweight access points to serve clients.

For the list of supported access points, see Supported Cisco Aironet Access Points.
The Mobility Express solution provides most features of a wireless LAN controller and has the capability to interface with the following:
Cisco Identity Services Engine—for advanced policy enforcement.
Cisco Mobility Services Engine—for providing presence level data as well as advanced spectrum solution.

Supported Cisco Aironet Access Points
In this release of Mobility Express, the following APs are supported.
APs supported as masters (support integrated wireless controller capability)
APs supported as subordinates
Cisco Aironet 1850 Series
Cisco Aironet 1830 Series
In addition to the following, all APs that are supported as master APs are also supported as subordinate APs.
Cisco Aironet 700i Series
Cisco Aironet 700w Series
Cisco Aironet 1600 Series
Cisco Aironet 1700 Series
Cisco Aironet 2600 Series
Cisco Aironet 2700 Series
Cisco Aironet 3500 Series
Cisco Aironet 3600 Series
Cisco Aironet 3700 Series

Supported Software Images
AP models supported as masters can be ordered with either of the following as the default factory-shipped software:
A Mobility Express software image. These models have model numbers (or Product IDs) ending in C.
A lightweight AP software image, based on the CAPWAP (Control and Provisioning of Wireless Access Points) protocol, for joining a wireless controller. You can manually convert these models to have a Mobility Express software image, on site.
AP models which are supported only as subordinates will need to have CAPWAP-based lightweight AP software image.

The Mobility Express software for your AP model can be downloaded from the AP's Download Software page on Cisco.com. The common URL to the Download Software page is https:/​/​software.cisco.com/​download/​navigator.html.

On the Download Software page, browse to your AP model and then select 'Mobility Express Software' to view a list of currently available software, with the latest the top. The software releases are labeled as follows to help you determine which release to download:
Early Deployment (ED)—These software releases provide new features, new hardware platform support, and bug fixes.
Maintenance Deployment (MD)—These software releases provide bug fixes and ongoing software maintenance.
Deferred (DF)—These software releases have been deferred. We recommend that you migrate to an upgraded release.

Cisco Mobility Express software for Cisco Wireless Release 8.1.122.1, is as follows:
Software Type and Purpose
For AP 1850
For AP 1830
Mobility Express Network Software Bundle (for Mobility Express controller and network software update)
AIR-AP1850-K9-ME-8-1-122-0.zip
AIR-AP1830-K9-ME-8-1-122-0.zip
Mobility Express Controller-capable AP Software (for conversion from CAPWAP Lightweight AP type to Mobility Express)
AIR-AP1850-K9-8.1.122.0.tar
AIR-AP1830-K9-8.1.122.0.tar

From http://www.cisco.com/c/en/us/td/docs/wireless/access_point/mob_exp/1/user_guide/b_ME_User_Guide/about_mob_exp.html

More Related…

Thursday, October 22, 2015

How to Start a Cisco ASA 5500-X Series?

If you are new users of Cisco ASA 5500-X Series Next-Generation Firewalls, are you familiar with the ASA 5500-X Series configuration? There are different Cisco ASA CX models available in a wide range of sizes, for small offices, branch locations, and Internet-edge deployments. 

In this article, we will share the simple start guide of Cisco ASA 5500-X Series, including the model ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X.

First of all, let’s check the main package contents of ASA 5512-X, ASA 5515-X, or ASA 5525-X, ASA 5545-X and ASA 5555-X.

ASA 5512-X, ASA 5515-X, or ASA 5525-X



ASA 5545-X and ASA 5555-X

Note: The contents are subject to change, and your exact contents might contain additional or fewer items.


Power on the ASA
1. Attach the power cable to the ASA and connect it to an electrical outlet.

The power turns on automatically when you plug in the power cable; do not press the power button on the front panel. (For older models, the power does not turn on automatically; check the hardware installation guide for more information).

2. Check the Power LED on the front of the ASA; if it is solid green, the device is powered on.

3. Check the Status LED on the front of the ASA; after it is solid green, the system has passed power-on diagnostics.

Modify the Initial Configuration for the Software Module (Optional)
The ASA ships with a default configuration that enables Adaptive Security Device Manager (ASDM) connectivity to the Management 0/0 interface. When you use a software module such as the ASA FirePOWER module, we recommend that you do not use the default configuration, which can preclude the module from reaching the Internet for updates. This section describes how to apply a new configuration so the module can access the Internet. This configuration also enables a basic usable configuration for an inside and outside network.

The following figure shows the suggested network deployment for the ASA 5500-X with a software module:

Note: If you have an inside router instead of a switch, you can skip this section and instead configure the ASA to route between management and an inside network. In this case, configure the ASA and the module Management 0/0 IP addresses to be on the same network. Be sure to configure appropriate routes on the ASA and on the module so the management network can reach the inside network, and vice versa.

This procedure lets you connect to the ASA console port and paste in a new configuration that configures the following behavior:
  • inside --> outside traffic flow
  • outside IP address from DHCP
  • DHCP for clients on inside
  • Management 0/0 interface is Up, but otherwise unconfigured. The software module can then use this interface to access the ASA inside network and use the inside interface as the gateway to the Internet.
  • ASDM access on the inside interface

To achieve the above configuration, perform the following steps.
1. Connect your computer to the ASA console port with the supplied console cable. You might need to use a third party serial-to-USB cable to make the connection.

2. Launch a terminal emulator and connect to the ASA.

3. Press the Enter key to see the following prompt:
ciscoasa>

4. Access privileged EXEC mode:
enable
The following prompt appears:
Password:

5. Press Enter. By default, the password is blank.

6. Access global configuration mode:
configure terminal

7. Clear the configuration:
clear configure all

8. Copy and paste the following configuration at the prompt:
interface gigabitethernet0/0
nameif outside
ip address dhcp setroute
no shutdown
interface gigabitethernet0/1
nameif inside
ip address 192.168.1.1 255.255.255.0
security-level 100
no shutdown
interface management0/0
no shutdown
object network obj_any
subnet 0 0
nat (any,outside) dynamic interface
http server enable
http 192.168.1.0 255.255.255.0 inside
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd auto_config outside
dhcpd enable inside
logging asdm informational

9. Save the new configuration:
write memory

10. Cable the inside GigabitEthernet 0/1 interface, Management 0/0 interface, and your computer to a Layer 2 Ethernet switch.

11. Connect the outside GigabitEthernet 0/0 interface to your upstream router or WAN device.

12. For software module configuration, see the ASA FirePOWER quick start guideASA CX quick start guide, or IPS quick start guide. Use the following network settings for the module:
–Management interface: 192.168.1.2
–Management subnet mask: 255.255.255.0
–Gateway IP: 192.168.1.1

4. Launch ASDM
Using ASDM, you can use wizards to configure basic and advanced features. ASDM is a graphical user interface that allows you to manage the ASA using a web browser. See the ASDM release notes on Cisco.com for the requirements to run ASDM.

How to…

1. On the computer connected to the ASA, launch a web browser. If you are using the default configuration and did not use 3. Modify the Initial Configuration for the Software Module (Optional), you need to connect the computer to the Management 0/0 interface.

2. In the Address field, enter the following URL: https://192.168.1.1/admin. The Cisco ASDM web page appears.

3. Click one of the available options: Install ASDM LauncherRun ASDM, or Run Startup Wizard.

4. Follow the onscreen instructions to launch ASDM according to the option you chose. The Cisco 
ASDM-IDM Launcher appears.

5. Leave the username and password fields empty, and click OK. The main ASDM window appears.
The Full Cisco ASA 5500-X Series Start Guide you can read the http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/5500X/5500x_quick_start.html


More Related

Wednesday, April 1, 2015

802.11ac Wave 2, Ready for It?



802.11AC Wave 2, the next phase of Wi-Fi, brings wireless speeds of up to almost 7 Gigs. Wave 2 also brings multi-user MIMO to Wi-Fi, enabling dedicated bandwidth to be allocated to users. 802.11AC Wave 2 will allow businesses to create new ways of working, such as being able to do medical imaging over tablets or streaming videos to mobile devices in school systems.








802.11ac Wave 1 vs. 802.11ac Wave 2

Having wireless speeds that are that fast, though, does have some big implications on the wired network. If the air speed is anything greater than a Gig and the backhaul connection from the AP to the access switch is a Gig, then there’s an obvious problem, as the wired network becomes a choke point. Also, the Wave 2 solutions will require PoE+ (30W), and many businesses only have PoE (15W) in the access edge now. Also, with today’s switches, Cat5E has a limit of 1 Gig for speed.

Cisco founded the NBASE-T Alliance in October 2014 to promote solutions for more speed over installed Category 5e and 6 cables. Now we are introducing innovations that include NBASE-T technology and more across the entire breadth of our Cisco Catalyst portfolio–from compact switches to the backbone. These new innovations directly address the challenges we learned from customers.

Cisco Catalyst Multigigabit Technology can prepare your access switches for future innovations by delivering speeds beyond 1 Gigabit on existing Category 5e cables. This technology also supports Power over Ethernet (PoE), PoE+, and Cisco Universal PoE (UPOE) so you don’t need to install new electrical circuits to power your access points.
And, Cisco Catalyst Multigigabit Technology can protect your investments in existing Cisco Catalyst switches. For example, new Cisco Catalyst 3850 Mutigigabit models can be stacked with existing 1-Gb copper and fiber models. Cisco Catalyst Mutigigabit Technology is available on Cisco Catalyst 4500E, 3850, and 3560-CX switches. Use our new innovations to take advantage of 802.11ac Wave 2 capacity increases and start delivering even better user experiences.

New Cisco Catalyst 3560-CX and 2960-CX Compact Switches can help you increase speeds and agility, and lower costs. These switches offer Catalyst Instant Access mode, which means no more individual switch configuration. And they are flexible to support numerous networking environments and industries, including hospitality, transportation, retail, and others.

Two Times More 10-Gb Density for a Faster Backbone
Extend your existing backbone investments into the future. New, 32-port 10-Gb line cards on Cisco Catalyst 6800 and 6500-E Series Switches help you make the transition from 1 Gigabit to 10 Gigabits, and allow for twice the 10-Gb density. They also provide rich network services that you have come to expect from these platforms. And flexibility is built in so you can convert to 40-Gigabit speeds in future.


More Related Cisco Wireless Topics