Blog

Home / Page 2

Message Transfer Part 2 – MTP2

Message Transfer Part 2 – MTP2 corresponds to OSI Layer 2 (the data link layer) and as such is the lowest protocol in the stack. Sitting on the physical layer, it provides a reliable means of transfer for signaling information between two directly connected signaling points (SPs), ensuring that the signaling information is delivered in sequence and error-free.

[…]

ACME SBC Functions & Features

ACME SBC Functions & Features

Security :

  • SBC DoS/DDoS protection
    • Protect SBC from DoS/DDoS attack and other malicious attacks
    • Protect SBC from non-malicious overloads
    • Allow trusted/authenticated users access while under DoS attack
    • Dynamically accept or reject traffic based on device behavior
  • Access control
    • Filter specific devices or whole networks on a per application basis
    • Permit access to known devices or networks
    • Permit access to from authorized/registered users; permit or deny access to mask users
    • Dynamically accept or reject traffic based on device behavior
    • Accept media only for authorized sessions
  • Topology hiding & privacy
    • Hide core topology to prevent directed attacks and preserve confidentiality
    • Mask user information for privacy and confidentality
    • Protect users and service provider infrastracture from eavesdroppers, identity thieves and fraud
    • Secure L2 and L3 VPN customers by maintaining security isolation between VPNs ; support inter-VPN sessions
    • Support for inter-VPN […]

Video over IP QoS (Network Monitoring of MPEG over a IP Transport)

This presentation on monitoring MPEG Transport Streams over IP networks describes test methodology used to ensure superior Quality of Service (QoS) in video. The webinar covers how to use cross layer correlation capabilities when monitoring, to easily detect key problems when they occur when delivering VoIP services. Also covered are the differences between IP video amd voice and data, and how to ensure a high-quality video viewing experience.

Speaker: Steve Holmes

Time: 60 minutes

How to block a Country using CSF Firewall

How to block a Country using CSF Firewall

 

If you don’t have a need for certain international visitors to your Linux server, its easy to block them out!  First, you’ll need to make sure that CSF is installed.  You can follow this guide on installing csf to get this accomplished.  Once that’s done, read on to block access from Russia, China, etc..

To block country from “CSF” firewall, for this you need to login shell, if you re not using WHM..etc.

Now that CSF is installed, open up your config file (/etc/csf/csf.conf) and search for the country codes section.  It starts on line 570 in the current (i am using the v8.16) version.

You’ll see the following:

SBC Quiz -1

SBC Quiz -1

 

Thiz quiz questions made by Genband;

 

 

Why is NEBS significant?
a) It divides the network into core, distribution, and access layers, and allows
each portion of the network to be optimized for specific functionality.
b) It defines a cut-through method to make a forwarding decision according
to the destination MAC address of the frame in its MAC address table.
c) It describes multimedia communication sessions for the purposes of
session announcement, session invitation, and parameter negotiation.
d) It sets equipment standards regarding temperature, humidity, resistance
to fire, vibration, acoustic noise, airborne contaminants, and earthquakes.

 

RTP Control Protocol (RTCP) is used to monitor transmission statistics and as well
as which of the following?
a) Time to Live (TTL).
b) Quality of Service (QoS).
c) Data Link Transmission (DLT).
d) Internet Engineering Task Force (IETF).

 

What is the small form-factor […]

Small Form-Factor Pluggable Transceiver – SFP

Small Form-Factor Pluggable Transceiver – SFP

A small Form-Factor Pluggable Transceiver – SFP transceiver is a compact, hot-swappable, input/output transceiver used in data communication and telecommunications networks. SFP interfaces between communication devices like switches, routers and fiber optic cables, and performs conversions between optical and electrical signals. SFP transceivers support communications standards including synchronous optical networking (SONET)/synchronous digital hierarchy (SDH), gigabit ethernet and fiber channel. They also allow the transport of fast Ethernet and gigabit Ethernet LAN packets over time-division-multiplexing-based WANs, as well as the transmission of E1/T1 streams over packet-switched networks.

 

Cisco Fast Ethernet SFP Modules

sfp-trcvr-mods1.gif

SFP is also called a mini gigabit interface converter (GBIC) because its function is similar to the GBIC transceiver but with much smaller dimensions.

 

Compact SFP Deployment with Cisco Catalyst 4500

Configuring a Cisco Router

Configuring a Cisco Router

In the following sections, I’ll introduce the commands used to do basic router configuration.
You’ll use these commands (or should use them) on every router while you re configuring a Cisco router.

Setting a Router Hostname

 

Router#config t
Router(config)#hostname Kaya
Kaya(config)#

 

Setting Passwords

Here’s an example of setting all your passwords and then encrypting them in the plain configuration file:

Kaya#config t
Kaya(config)#line aux ?
<0-0> First Line number
Kaya(config)#line aux 0
Kaya(config-line)#password aux
Kaya(config-line)#login
Kaya(config-line)#line con 0
Kaya(config-line)#password console
Kaya(config-line)#login
Kaya(config-line)#exit
Kaya(config)#line vty 0 ?
<1-1180> Last Line number
<cr>
Kaya(config)#line vty 0 1180

H323 Signalling Messages

H323 Signalling Messages 

H323-communication

— I will complete the whole signalling soon —

H225/Q931 CALL SETUP

SETUP   :  source&dest address,port

CALL PROCEEDING

ALERTING : ringback tone

The called telephone starts ringing and this is signalled to the other party with the Q.931/H.225.0 message Alerting.

H245 NEGOTIATION AND VOICE PATH SETUP

CONNECT  (Q931/H225) : create h245 channel

The called party picks up the handset and the endpoint can signal the call has been accepted. This is done by sending the Q.931/H.225.0 message Connect. At this point, the parties will need to negotiate parameters for audio (and optionally video) channels. The protocol H.245 is used for this negotiation. In the default case, H.245 will need another TCP channel, so the endpoint 122 will insert its H.245 address (the IP address and port where it listens for H.245 connections) into […]

CLI for Caller ID

The caller ID information is passed through from the ISDN-to-SIP by copying the number in the Calling Party Number information element (IE) in an ISDN Setup message into the Calling Number field of the SIP Remote-Party-ID and From headers.

However, for added privacy, the SIP: CLI for Caller ID When Privacy Exists feature introduces CLI to completely remove the Calling Number and Display Name from an outgoing message’s From header if presentation is prohibited. This prohibits sending the SIP Remote Party ID header, because the Cisco gateway does not send SIP Remote-Party ID headers without both a Display Name and Calling Number.

 

 

Presentation Indicator : Presentation Allowed

From: “User1” <sip:5550100@10.0.0.0>;tag=1

Remote-Party-ID: “User1”<sip:5550100@10.0.0.0>;party=calling;privacy=off

 

Presentation Indicator : Presentation Prohibited

From: “User1” <sip:5550100@10.0.0.0>;tag=1

Remote-Party-ID: “User1”<sip:5550100@10.0.0.0>;party=calling;privacy=full

 

Remote-Party-Id

This header was defined in a failed RFC : http://tools.ietf.org/html/draft-ietf-sip-privacy-00 . Although this header is supported by SIP devices and SIP PBXs, this was never accepted […]

Go to Top