cisco router isdn configuration

14
You're logged in as: tamrat andarge Edit your profile Logout RSS Part of the TechTarget network SearchEnterpriseWAN.com News Latest Headlines Web content optimization: A new approach to SharePoint optimization Ensuring Quality of Experience: Monitor networks or applications? Should you redesign WAN architecture for cloud and UC? View All News Enterprise WAN Topics Topics Telecom Services Selecting telecommunications services and providers, Managed services, Cloud computing and SaaS VPNs/Security VPN design, VPN setup and configuration, Remote access, Internet and application security WAN Design Bandwidth and capacity planning, Branch office network design, Network disaster recovery , WWANs, VPN Design Infrastructure IP networks, Network Infrastructure, WAN protocols Optimization/Application Performance Application performance on the WAN, WAN network monitoring, WAN optimization and application acceleration Hot Topics Optimization/Application Performance VPNs/Security Infrastructure Tutorials Guides Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi... 1 of 14 5/24/2012 7:07 PM

Upload: kebe-nana

Post on 27-Oct-2014

37 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Cisco Router ISDN Configuration

You're logged in as: tamrat andargeEdit your profileLogoutRSSPart of the TechTarget network

SearchEnterpriseWAN.com

News

Latest Headlines

Web contentoptimization: Anew approach toSharePointoptimizationEnsuring Qualityof Experience:Monitor networksor applications?Should youredesign WANarchitecture forcloud and UC?View All News

Enterprise WANTopics

Topics

Telecom Services

Selecting telecommunications services and providers, Managed services, Cloud computing and SaaS

VPNs/Security

VPN design, VPN setup and configuration, Remote access, Internet and application security

WAN Design

Bandwidth and capacity planning, Branch office network design, Network disaster recovery, WWANs, VPNDesign

Infrastructure

IP networks, Network Infrastructure, WAN protocols

Optimization/Application Performance

Application performance on the WAN, WAN network monitoring, WAN optimization and applicationacceleration

Hot Topics

Optimization/Application PerformanceVPNs/SecurityInfrastructure

Tutorials

Guides

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

1 of 14 5/24/2012 7:07 PM

Page 2: Cisco Router ISDN Configuration

Advanced WorkshopsMPLS VPN fundamentalsVoIP over WAN tutorial

Technology Dictionary

Find definitions and links to technical resourcesPowered by WhatIs.com

ExpertAdvice

Tips

Selecting WAN application visibility solutionsAchieving application visibility through wide area network visibilityUnderstanding application performance monitoring and managementView All Tips

Answers

How can I allow and restrict user access on my VPN client?How do remote access VPNs compare with other types of VPNs?How can I make sure my VPN is encrypted and working properly?View All Answers

Ask a Question

Pose a question to the SearchEnterpriseWAN.com ExpertsGet help from our technical communityPowered by ITKnowledgeExchange.com

WhitePapers

Research Library

White PapersBusiness WebcastsDownloadsPowered by Bitpipe.com

Product Demos

Try out software demosPowered by 2020Software.com

Blogs

Blogs

Window onWANSUnifiedCommunicationsNationPowered byITKnowledgeExchange.com

Search this site

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

2 of 14 5/24/2012 7:07 PM

Page 3: Cisco Router ISDN Configuration

HomeTopicsTelecommunications Carrier ServicesSelecting telecommunications services and providersCisco router ISDN configuration

Cisco router ISDN configurationChris Partsenidis

E-mailPrintAAAAAALinkedInFacebookTwitterShare ThisRSSReprints

Integrated Services Digital Network (ISDN) provides for digital transmission over ordinary telephone copper wire as well asover other media uses. Chris Partsenidis teaches you how to configure your Cisco router to work with ISDN, in this continuationof his tip series on ISDN implementation.

Cisco routers' basic ISDN configuration

Here we will go through the basic steps of configuring a Cisco router to work with ISDN. Below is a table of ISDN switchtypes. Before you attempt to configure ISDN, you need to ensure that you know which type of ISDN switch you are connectingto at the telco.

ISDN SWITCH TYPES

Telco switch type Cisco keywordAT&T basic rate switch basic-5essNortel DMS-100 basic rate switch basic-dms100National ISDN-1 switch basic-ni1PINX (PBS) switches with QSIG signalling per Q.931 basic-qsigNET3 switch type for U.K., Europe, Asia & Australia basic-net3AT&T 4ESS (ISDN PRI only) primary-4essAT&T 5ESS (ISDN PRI only) primary-5essNortel DMS-100 (ISDN PRI only) primary-dms100National ISDN switch type primary-niNTT ISDN PRI switches (Japan) primary-nttEuropean and Australian ISDN PRI switches primary-net5QSIG signalling per Q.931 primary-qsigNo switch type none

For a very basic BRI ISDN configuration on a Cisco router, you need to perform the following steps, providing you are not using

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

3 of 14 5/24/2012 7:07 PM

Page 4: Cisco Router ISDN Configuration

More tips on ISDNimplementation

Understanding the ISDNstandard

ISDN protocols, componentsand router options

Cisco router ISDNconfiguration

Demand Dial Routing (DDR):

Configure the Switch Type (using switch-type).1.Configure the ISDN Dialer Map; this basically maps the IP address of the end router's IP address with its telephonenumber (using dialer-map).

2.

Configure your ISDN interface IP address (using interface and IP address).3.Configure a routing rule (using IP route).4.

For example:

Router(config)#isdn switch-type basic-5essRouter(config)#isdn dialer map ip 10.10.10.2 name main_office 66552Router(config)#ip route 192.168.0.0 255.255.255.0 10.10.10.2Router(config)#interface BRI 0Router(config-if)#ip address 10.10.10.1 255.255.255.0

N.B. If using the DMS-100 and National-1 switch types (as well as AT&T 5ESS), you will need to obtain from your telco theService Profile Identifiers (SPIDs), of which you require one per each Bearer Channel. For these switch types, these need to beconfigured using the isdn spid1 & isdn spid2 commands. The SPIDs are used to authenticate call requests at the telco's switch.The format for using the SPIDs is isdn spid1 spid-number ldn and isdn spid2 spid-number ldn.

Demand dial routing

Since ISDN is a circuit-switched technology, you usually pay for the amount of time that the line is active. For this reason, yougenerally do not want to raise the ISDN line for just any type of traffic. In order to accommodate this, you can configure what'scalled Demand Dial Routing (DDR). The idea behind DDR is that you specify the "interesting" traffic that will be able to raisethe ISDN line. For example, you can set as "interesting" traffic all packets destined toward a specific remote network youconnect to. If none of the routed traffic that is heading for that network (on the other side of the ISDN line), the line doesn't getraised. This saves on unnecessary costs caused by nonessential traffic raising the line.

You specify "interesting" traffic with the use of Access Control Lists (ACLs). If the trafficdestined for the remote network doesn't match this interesting traffic, then the line stays down.Otherwise, the line is raised and traffic is allowed to travel to the remote network. It's worthmentioning here that although you have defined this "Interesting" traffic, it doesn't mean thatother traffic will not be allowed to travel along the ISDN link. If the link is active, any traffic(unless blocked by Access Lists) is allowed to travel the link, so keep in mind that the"Interesting" traffic is used only to bring the line up. You can then create a second set of ACLswhich define the traffic that can traverse the ISDN line. Also, the DDR works using a counter,like a time-out counter. Once the counter reaches a preset configurable threshold, the line willdrop again. This threshold is reduced each time "Interesting" traffic is sent over the ISDN Link,so it's also only the "Interesting" traffic that is used to maintain the link.

Steps in configuring DDR (assumes some of the basic steps above have already beenconfigured)

Define Interesting Traffic (using dialer-list and access-list).1.Assign Interesting Traffic to an Interface (using dialer-group).2.Define the destination IP address, hostname and telephone number to dial (using dialer map).3.Define any additional options (using dialer idle-timeout, dialer fast-idle, dialer load-threshold).4.

THE ADDITIONAL OPTIONS:

Command Descriptiondialer idle-timeoutseconds Specifies the amount of idle time in seconds before the link is dropped.

dialer fast-idle seconds Specifies the time that a line showing contention can remain idle before it is dropped in order toallow the other call to be placed.

dialer load-threshold load[outbound | inbound|either]

Specifies the amount of load on the ISDN before the dialer initiates another call to the samedestination (i.e., brings up the second channel, making the link 128 Kbps). The load is a numberfrom 1 to 255, with 255 equalling 100% load. The final parameters specify which direction of

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

4 of 14 5/24/2012 7:07 PM

Page 5: Cisco Router ISDN Configuration

traffic to calculate the load from.

For example:

Router(config)#isdn dialer map ip 10.10.10.2 name main_office 66552Router(config)#access-list 101 permit tcp any any eq httpRouter(config)#dialer-list 1 protocol ip list 101Router(config)#interface BRI 0Router(config-if)#dialer-group 1

What this example does is allow all Web traffic (http) from anywhere to anywhere. As you can see, the dialer-list is specifyingthe 101 access list to dialer-list 1. The dialer-group is then specifying the 1, which links to the dialer-list 1. Dialer profiles

Cisco's website states: "Dialer Profiles implementation of DDR is based on a separation between the logical and physicalinterface configurations. Dialer profiles also allow the logical and physical configurations to be bound together dynamically on aper-call basis."

There are several advantages of Dialer Profiles over Legacy DDR; it is much more scalable than Legacy DDR because LegacyDDR is based on a static binding between the per-destination call and the physical interface configuration. Dialer profiles arepoint-to-point interfaces, which means we no longer need the Layer 3 to Layer 2 mapping (Layer 2 meaning the telephonenumber) since the profile can only dial a single location (hence point-to-point). Because the logical and physical configurationsare dynamic, physical interfaces can take on different characteristics based on the logical call requirements that are utilizing thephysical interface. The final advantage that we will include here is that it enables you to have a backup interface that isn't tyingup one of the physical interfaces. Providing a spare interface is available, the backup can be used when it's required.

Dialer profiles are made up of a dialer interface, dialer pool and physical interface. Optionally, you can also have a map class.These are highlighted in the table below:

DIALER PROFILES:

DialerInterface

This is the logical call requirements to the Point-to-Point connection. The following parameters can beconfigured; the IP address of the destination network (IP address address mask); Layer 2 encapsulation type -- forexample, ppp (encapsulation ppp); PPP authentication (ppp authentication chap & pap); the remote router'sauthentication name (dialer remote-name username); the remote destination to call (dialer string dial-string);dialer pool mapping to use for calls to this destination (dialer pool number); assign dialer interface to a dialergroup (dialer group number). There are other optional parameters such as PPP Multilink, idle timeout and more.

Dialer Pool Used for a dialer interface to reference and be associated to a physical interface

PhysicalInterface

Here we assign a physical interface into a dialer pool (dialer pool-member number) and assign any additionalphysical features, such as Layer 2 encapsulation (encapsulation ppp), ppp authentication (authentication chap),etc.

Map Class(Optional) Used to create a mapping between the remote IP address and phone number to dial in order to reach it.

Steps in creating a Dialer Profile (assumes some of the basic steps above have already been configured, such as ISDN type):

Define a Dialer Interface.1.Configure a Dialer String.2.Assign Physical Interface to a Dialer Pool, plus any additional Physical attributes.3.Other steps from the previous sections may need to be performed; for example, if you wanted to active the link usinginteresting traffic, DDR needs to be configured.

4.

For example:

Define Dialer Interface

Router(config)#interface dialer1Router(config-if)#ip address 10.10.10.1 255.255.255.0Router(config-if)#encapsulation pppRouter(config-if)#ppp authentication chapRouter(config-if)#dialer remote-name remote-officeRouter(config-if)#dialer string 999666

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

5 of 14 5/24/2012 7:07 PM

Page 6: Cisco Router ISDN Configuration

Router(config-if)#dialer pool 1Router(config-if)#dialer-group 1Router(config-if)#exit

Configure Physical Interface

Router(config)#interface bri0Router(config-if)#encapsulation pppRouter(config-if)#dialer pool-member 1Router(config-if)#ppp authentication chapRouter(config-if)#exit

Configure DDR to specify "Interesting" traffic (http) used to bring the line up

Router(config)#access-list 101 permit tcp any any eq httpRouter(config)#dialer-list 1 protocol ip list 101

A simple example

The following example includes a variety of different items discussed in this document to help you see how they are applied in areal-case scenario. As always, depending on the security policies and network complexity, the configuration can change quite abit. For simplicity, we've kept the complexity to a minimum.

Our scenario is based upon two routers that occasionally need to connect their networks via an ISDN dial line, in order totransfer data between them.

Router 1 – Remote Office

Router1(config)#isdn switch-type basic-5essAssign the switch type that we are connecting through to on the physical layer, AT&T Basic Rate Switch telcoswitchRouter1(config)#interface dialerCreate a dialer interface called dialer1 ready for configuring itRouter1(config)#description Outgoing To HQSet a description for this interface.Router1(config-if)#ip address 10.10.10.1 255.255.255.252Assign an IP address to the virtual dialer interfaceRouter1(config-if)#encapsulation pppConfigure the encapsulation used when we are connecting through this virtual interfaceRouter1(config-if)#ppp authentication chap pap callinSet our ppp authentication to use chap, pap. The 'Callin' parameter ensures our router authenticates the remote router(HQ) on an incoming call. Since we are always the calling party, it does not expect the remote (HQ) router toauthenticate, making this authentication process a one-way direction. Remote Office authenticates to the HQ router.Router1(config-if)#ppp chap hostname remote-officeSet the username for chap authentication protocolRouter1(config-if)#ppp chap password ciscoSet the password for the chap authentication protocolRouter1(config-if)#ppp pap sent-username remote-office password ciscoSet the username and password for the pap authentication protocol.Router1(config-if)#dialer string 999666Configure the telephone number to call when connecting through this virtual interfaceRouter1(config-if)#dialer pool 1Assign this virtual interface to use any physical interface that's assigned to pool number 1Router1(config-if)#dialer-group 1

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

6 of 14 5/24/2012 7:07 PM

Page 7: Cisco Router ISDN Configuration

This is to define the interesting traffic that can be used to raise this virtual interfaceRouter1(config-if)#dialer idle-timeout 300Disconnect this call after 300 seconds of inactivityRouter1(config-if)#ppp multilinkMake this link 'ppp multilink' capable, allowing the aggregation of the two available 64K ISDN lines to a total of128 Kbps.Router1(config-if)#dialer load-threshold 125 eitherWhen either the incoming or outgoing traffic reaches half of the available bandwidth (125), then bring up the 2ndISDN channel.Router1(config-if)#exitExits out of the interface sub commandRouter1(config)#interface bri0Enters into the interface sub command on the physical interface bri0/0, ready for configuring the physicalcharacteristicsRouter1(config-if)#encapsulation pppConfigure the encapsulation for this physical interface (optional command since we've already included it in theDialer Interface)Router1(config-if)#dialer pool-member 1Assign this physical interface to a pool. This allows this physical interface to be used by any virtual interface in thissame pool. In this case, Dialer 1Router1(config-if)#ppp authentication chapSet our ppp authentication to use chap (optional command since we've already included it in the Dialer Interface)Router1(config-if)#exitExits out of the interface sub commandRouter1(config)#access-list 101 permit tcp any any eq httpAccess list used in defining interesting traffic. This line specifies that tcp port 80 traffic from anywhere to anywhereis interestingRouter1(config)#dialer-list 1 protocol ip list 101Maps the access-list with the dialer-group. As you can see, number 1 is used in the dialer-list and dialer-groupstatementsRouter1(config)#ip route 192.168.0.0 255.255.255.0 10.10.10.2Creates a route to the 192.168.0.0/24 subnet to go through 10.10.10.2 (will use Dialer1 to get there since it's on the10.10.10.0 subnet)

Router 2 – Headquarters

HQ(config)#username remote-office password ciscoAssign the username and password the remote office router will use while authenticating to this routerHQ(config)#isdn switch-type basic-5essAssign the switch type that we are connecting through to on the physical layer, AT&T Basic Rate Switch telcoswitchHQ(config)#interface dialer1Create a dialer interface called dialer1 ready for configuring itHQ(config)#description Incoming From Remote-OfficeSet a description for this interface.HQ(config-if)#ip address 10.10.10.2 255.255.255.252Assign an IP address to the virtual dialer interfaceHQ(config-if)#encapsulation pppConfigure the encapsulation used when we are connecting through this virtual interfaceHQ(config-if)#ppp authentication chap pap callinSet our ppp authentication to use chap, pap. The 'Callin' parameter ensures our router authenticates the remote router(Remote Office) on an incoming call. Since we are always the called party, it will expect the remote router toauthenticate. Remote Office authenticates to the HQ router. Username and password will be checked against thecredentials we provided in the first line of this router's configuration.HQ(config-if)#dialer pool 1Assign this virtual interface to use any physical interface that's assigned to pool number 1HQ(config-if)#ppp multilinkMake this link 'ppp multilink' capable, allowing the aggregation of the two available 64K ISDN lines to a total of128 Kbps.HQ(config-if)#exit

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

7 of 14 5/24/2012 7:07 PM

Page 8: Cisco Router ISDN Configuration

Exits out of the interface sub commandHQ(config)#interface bri0Enters into the interface sub command on the physical interface bri0/0, ready for configuring the physicalcharacteristicsHQ(config-if)#encapsulation pppConfigure the encapsulation for this physical interface (optional command since we've already included it in theDialer Interface)HQ(config-if)#dialer pool-member 1Assign this physical interface to a pool. This allows this physical interface to be used by any virtual interface in thissame pool. In this case, Dialer 1HQ(config-if)#exitExits out of the interface sub commandHQ(config)#ip route 192.168.5.0 255.255.255.0 10.10.10.1Creates a route to the 192.168.5.0/24 subnet to go through 10.10.10.1.

About the author:

Chris Partsenidis has more than eight years of experience as a senior network engineer, network administrator and networksecurity consultant for companies in Australia, New Zealand and Greece. Chris has a bachelor's degree in electrical technologyand holds the following certifications: CNA for Netware 3, 4, 5, CCNA, MCP, DCE (D-link Certified Engineer), LCP (LinuxCertified Professional), Network+ and A+. In addition, Chris is the founder and senior editor of Firewall.cx -- a Web siterecommended by Cisco Systems in their CCNA Academy program. His site now offers free access to Cisco lab equipment,allowing users to put in practice the theory covered in the ISDN article.

For more information on networking, VPN security and firewalls, visit Firewall.cx, one of the few websites recommended byCisco Systems in its world class Cisco Academy program.

Dig Deeper

Articles

ISDN implementation: Part 3 -- Cisco router ISDN configurationCan a Cisco 801 be configured on a dedicated 128KB ISDN line?I want my four remote locations to be able to dial any one main office and after doing data transferConfiguring an ISDN for the InternetHow do I configure an ISDN connection on my Cisco router for Internet connection?

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

8 of 14 5/24/2012 7:07 PM

Page 9: Cisco Router ISDN Configuration

Related tags

briciscoconfigurationconfiguredialerexampleisdnisdn configurationprirouter

Show me more

This was first published in September 2007

Announcing SearchNetworking.co.UK; the Web's dedicated resource for IT pros inUK and Europe

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn fromother enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, wecannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services andyour reliance on any questions, answers, information or other materials received through this Web site is at your own risk.

Back to topThis Content Component encountered an error

Get e-mail updates

Submit your e-mail below to receive EnterpriseWAN-related news, tech tips and more, delivered to your inbox.

Selecting Telecommunications Services and Providers1.

Not a member? We'll activate your FREE membership with your subscription.

Ads by Google

Manage Microsoft WindowsStreamline Windows Administrationand Management. Free 30-day Trialwww.systemtools.comfiber connectionsUE Tee connector ManufacturerHigh Quality fiber Fittingswww.chblqd.com

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

9 of 14 5/24/2012 7:07 PM

Page 10: Cisco Router ISDN Configuration

loading Arms from Chinamanufacture & design loading Armscomplete sorts & info. Low price!www.dmco.com.cnVSAT Satellite InternetSatellite Internet for AfricaVSAT, Ku-Band, C-Bandwww.telstream.co.za

News

Latest Headlines

Web contentoptimization: Anew approach toSharePointoptimizationEnsuring Qualityof Experience:Monitor networksor applications?Should youredesign WANarchitecture forcloud and UC?View All News

Enterprise WANTopics

Topics

Telecom Services

Selecting telecommunications services and providers, Managed services, Cloud computing and SaaS

VPNs/Security

VPN design, VPN setup and configuration, Remote access, Internet and application security

WAN Design

Bandwidth and capacity planning, Branch office network design, Network disaster recovery, WWANs, VPNDesign

Infrastructure

IP networks, Network Infrastructure, WAN protocols

Optimization/Application Performance

Application performance on the WAN, WAN network monitoring, WAN optimization and applicationacceleration

Hot Topics

Optimization/Application PerformanceVPNs/SecurityInfrastructure

Tutorials

Guides

Advanced WorkshopsMPLS VPN fundamentals

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

10 of 14 5/24/2012 7:07 PM

Page 11: Cisco Router ISDN Configuration

VoIP over WAN tutorial

Technology Dictionary

Find definitions and links to technical resourcesPowered by WhatIs.com

ExpertAdvice

Tips

Selecting WAN application visibility solutionsAchieving application visibility through wide area network visibilityUnderstanding application performance monitoring and managementView All Tips

Answers

How can I allow and restrict user access on my VPN client?How do remote access VPNs compare with other types of VPNs?How can I make sure my VPN is encrypted and working properly?View All Answers

Ask a Question

Pose a question to the SearchEnterpriseWAN.com ExpertsGet help from our technical communityPowered by ITKnowledgeExchange.com

WhitePapers

Research Library

White PapersBusiness WebcastsDownloadsPowered by Bitpipe.com

Product Demos

Try out software demosPowered by 2020Software.com

Blogs

Blogs

Window onWANSUnifiedCommunicationsNationPowered byITKnowledgeExchange.com

Search this site

More from Related TechTarget Sites

NetworkingMobile ComputingTelecom

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

11 of 14 5/24/2012 7:07 PM

Page 12: Cisco Router ISDN Configuration

Unified CommunicationsNetworking ChannelNetworking UKData Backup

Networking

Will the DevOps movement simplify network automation?

Until now the DevOps movement has been lead by systems administrators, but now network engineers may find italso eases network automation and cloud orchestration.

BYOD policy: More than on-boarding and security

Experts say a BYOD policy will require network managers to reach across IT silos.

Combining NetFlow and packet analysis boosts network visibility

Packet analysis may provide a deeper look into the network, but NetFlow analysis can offer a broader view. Toachieve even better network visibility the two work best together.

Mobile Computing

Bringing BYOD to your enterprise

Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies andmanagement tools are needed.

Meeting technical requirements for mobile health care deployments

IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settingsdoesn't violate federal laws or compromise security.

Making the call: Distributed antenna systems and in-building wireless

Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coveragewithin an enterprise facility.

Telecom

Smartphone adoption spurs advanced services demand in Latin America

Latin American smartphone adoption is more robust than North America's, and the consumers are more mobile-friendly than their peers in developed economies.

Need for wireless network upgrade is key AT&T/T-Mobile driver

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

12 of 14 5/24/2012 7:07 PM

Page 13: Cisco Router ISDN Configuration

Rising demand for high-quality network service delivery will require operators to undertake a massive wirelessnetwork upgrade, driving deals like the AT&T/T-Mobile acquisition.

Video: ACG Research dissects telecom routing and switching market

In this ACG Research HotSeat video, Managing Partner Ray Mota gives viewers a quarterly update on the telecomservice provider routing and switching market.

Unified Communications

Integrating mobile device management with UC systems and features

Businesses need a plan to integrate their existing UC systems with their mobile device management and BYODpolicy; building a matrix can give the project a logical start.

Enterprises turning to session management for UC interoperability

The use of session management middleware is being floated as a way to use SIP to improve UC interoperability forcollaboration and UC apps.

Interop 2012: UC apps vendors must strive for interoperability

Vendors are aware of and gradually responding to issues around multi-vendor UC strategies and UC interoperability,according to a discussion panel at Interop 2012.

Networking Channel

Partners learn to sell telemedicine solutions

Selling telemedicine solutions can be an opportunity for partner growth, but it comes with its share of technologyand skill set challenges to overcome.

Think you can't make digital signage sales?

When video wall technology was expensive it was hard to sell. But selling digital signage has dropped in cost andmany companies are now eager to replace static signs.

Cisco Partner Summit 2012: Support services, cloud and mobility reign

At Cisco Partner Summit 2012, Cisco continues its attempt to improve business by refocusing its channel partnerstrategy with support services, mobility and cloud announcements.

Networking UK

Cisco Live London: 40 and 100 GbE, souped up WLAN

At Cisco Live London, Cisco launched 40 and 100 GbE switching, a souped-up 4-antenna WLAN access point, anda host of network virtualisation technologies.

UK Networkers should gear up for mobility implementations in 2012

Companies are rethinking legacy tools to take advantage of what users get from having access to data andapplications across all kinds of devices, according to TechTarget’s 2012 IT Priorities Survey.

Cloud gets vote of confidence from UK buyers in 2012 IT priorities

The cloud is set to be a key investment area for UK buyers in 2012 with 30.5% of IT buyers pledging to spend onthe technology, according to TechTarget’s 2012 IT Priorities Survey.

searchDataBackup

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

13 of 14 5/24/2012 7:07 PM

Page 14: Cisco Router ISDN Configuration

SAN backup and recovery

Moving data can complicate your backup efforts. In this tip, you’ll learn backup goals for SAN environments andbackup methods to achieve those goals.

Execs talk Backup Exec 2012, integrated appliances at Symantec Vision

Our senior news director Dave Raffo attended Symantec Vision last week, and we have compiled his reporting foryour convenience.

Run virtual machines from backup without first restoring them

Find out how common it is to run virtual machines from backup without first restoring them in this Expert Responsefrom Brien Posey.

All Rights Reserved, Copyright 2009 - 2012, TechTarget

About usContact usSite indexPrivacy policyAdvertisersBusiness partnersEventsMedia kitTechTarget corporate siteReprintsSite map

Cisco router ISDN configuration http://searchenterprisewan.techtarget.com/tip/Cisco-router-ISDN-confi...

14 of 14 5/24/2012 7:07 PM