2014年2月28日星期五

B-ACD with Non CME 2900 series H232 Gateway

I got a request to block non-notice (calls with blank calling numbers) calls with voice prompt. The calls are comming from BRI configured in a Cisco 2921 price  H323 gateway.

For this I am thinking of putting BACD application with a welcome prompt for the caller and drop through after that to a random number to end the call. This is only the requirtement and not planing to use the ACD feature of the script.

Can I do this with a h232 gateway 2921 that is not CME (only CME-SRST)? is there any other better way to do this. In normal mode calls are going to CUCM 6.1 using voip dialpeers. Callmanager related configurations are not shown here.

Configuration:

------------------------------------------------------------------------------------------------------------ Identifying blank calls

voice translation-rule 1
rule 1  / /  /100/

voice translation-profile PSTN_Calls
translate calling 1

dial-peer voice 1 pots
translation-profile incoming PSTN_Calls
incoming called-number .
direct-inward-dial
port 0/1/1

-------------------------------------------------------------------------------------------------------------------- Call application Configuration

dial-peer voice 2 voip
service aa
session target ipv4: <srst-cme ip>
incoming called-number 100$
dtmf-relay h245-alphanumeric
codec g711ulaw

application
service queue flash:app-b-acd-2.1.0.0.tcl
param aa-hunt 200

service aa flash:app-b-acd-a-2.1.0.0.tcl
  paramspace english index 1
  paramspace english language en
  paramspace english location flash:
  param service-name queue
  param handoff-string aa
  param aa-pilot 100
  param welcome-prompt custome_welcome.au
  param drop-through-prompt custome_welcome.au

--------------------------------------------------------------------------------------------------- To block call to 200 afer the prompt

voice translation-rule 2
rule 1  reject /200/

voice translation- profile UNKNOWN_BLOCK
translate called 2

dial-peer voice 2 voip
translation- profile outgoing BLOCK
session target ipv4: <srst-cme ip>
incoming called-number 200$
-------------------------------------------------------------------------------------------------- Telephony service for SRST and Transcoding in CME mode

telephoney service
srst mode auto-provision all
ip source address <loopback>
max-dn 2
max-ephone 2

Though you could do it with BACD & a drop through, I wouldn't do it like that.  A cleaner solution is to throw the call to your AA (Unity, CUE, IPCC).

voice translation-rule 1
rule 1 /.*/ /8675309/

voice translation-profile block
translate called 1

dial-peer voice 1 pots
answer-address ^$
translation-profile incoming block
direct-inward-dial
port 0/0/0:23

dial-peer voice 2 voip
destination-pattern 8675309
Add other h323 peer stuff here....

What this does is match peer 1 inbound for any inbound POTS call that doesn't contain an ANI.  It then takes that call and translates the DNIS to a special pattern, and sends it to CUCM.  Then configure CUCM/Unity/whatever to router 8675309 to an AA that say 'Hey your call is being blocked because you aren't presenting CLID'
Cisco 2951 price 
 and hang up.  

2014年2月20日星期四

cisco 3750 - stacking and vlans

I have two WS-C3750X-12S-S    switches stacked.

I created a vlan giving

 vlan 10

name test

 then i gave the vlan 10 an interface ip address.

 "interface vlan 10

ip add 10.20.4.1 255.255.255.0"

 BUT the problem is I cant ping this inteface even being inside the switch.

There is an ip for the vlan 1 and i can ping that ip.

 "sh vlan brif" - shows vlan 10 is active

I tried "no shutdown" in the vlan interface. No result

 ip routing is also enabled.

 I have been doing intervlan routing with 3750. but this is the first time with 2 switches stacked. Is stacking to do anyting with vlans.

Check the output of show interface vlan 10.

 I am sure it won't be UP and UP.

 The reason might be because there is no switch port elonging to VLAN 10 as pointed in the above post.

Connect a PC on an interface. Configure that interface for VLAN 10. Wait untill the physical interface comes up and then again check the output of show interface vlan 10. Now it should be up and up  and you should be able to ping it from the swithc and other devices as well as long as they have IP connectivity.


Conclusion - there should be an interface assigned to that VLAN and that particular physical interface should be up. Only then the WS-C3750V2-48PS-S    VLAN interface would come up.

2014年2月17日星期一

Catalyst 3750 Smartport Roles

I have 4 stacks of Catalyst WS-C3750X-48T-L   switches for my LAN infrastructure, and they're all configured with multiple VLANs, QoS, etc. in conjunction with a Unified Communications system. On most of my client ports, I've applied the IP Phone+Desktop smartport roles, and likewise AP/Switch/Router roles for those devices.

My question is this-- is it appropriate to apply a smartport role on the switch ports connected to ASA devices (ie. can an ASA be treated as a switch or router)? If not, in addition to trunking, what other parameters should applied to those ports to optimally configure them?

muranskycotech wrote:

I have 4 stacks of Catalyst 3750 switches for my LAN infrastructure, and they're all configured with multiple VLANs, QoS, etc. in conjunction with a Unified Communications system. On most of my client ports, I've applied the IP Phone+Desktop smartport roles, and likewise AP/Switch/Router roles for those devices.

My question is this-- is it appropriate to apply a smartport role on the switch ports connected to ASA devices (ie. can an ASA be treated as a switch or router)? If not, in addition to trunking, what other parameters should applied to those ports to optimally configure them?

You can treat the ASA as a router to all intents and purposes. Although you talk about trunking, are you trunking yout switch to the firewall ?

Okay, personally i would just configure it manually because it makes sense to only allow the vlans you need on the trunk link ie.

int gi0/1  <-- this connects to ASA

switchport mode trunk

switchport trunk encapsulation dot1q


switchport trunk allowed vlan WS-C3750X-24T-S   <vlans that are going to ASA>