Voice Over IP / LANCOM Product Range

Total Page:16

File Type:pdf, Size:1020Kb

Voice Over IP / LANCOM Product Range 03 / 2010 Voice over IP / LANCOM product range ... connecting your business Just what is Voice over IP? Voice over IP (VoIP) stands for the complete integration of telephony into the IP network. Voice data is transported in the form of IP packets, meaning that it can be transmitted via the com- puter network into the Internet and received by a caller. Specialized VoIP telephones convert your voice into data packets. This conversion can be also carried out for existing analog or solutions ISDN telephones by a VoIP router. Apart from that, it is also possible to combine your conven- tional PBX (private branch exchange) system with VoIP. This means that you can continue to use your old PBX system, and yet you can upgrade your telephone network with Voice over IP. As well as being operated internally, VoIP can transmit voice data to external telephone over IP Voice subscribers, for example by means of a DSL connection and a SIP provider ("Internet telephony"). Alternatively, VPN connections can be established between the company's own sites for secure data and telephone connections ("Voice over VPN") for VoIP services without requiring a SIP provider. If you operate an analog or ISDN exchange line and you wish to retain the associ- ated telephone numbers, you can use suitable VoIP routers to conduct calls to regular landline subscribers. FAX SIP- Internet Provider Analoges DECT Telefonnetz ISDN / LANCOM – Come with us into the new age of telephony ISDN SIP Analog- Telefone Teilnehmer The future is the unification of telephony and data networks. For years already LANCOM has been developing voice transmission in IP networks – with success. The persuasive quality of service has made LANCOM routers a component of the T-Octopus VoIP PBX systems from Deutsche Telekom Why integrate SIP into routers? for many years now. That's proof of the high quality of LANCOM solutions. The Session Initiation Protocol (abbreviated as SIP) is the standard protocol used in unified commu- nications. Apart from controlling VoIP telephone calls, it is also used for real-time connections such as audio and video transmissions, chat and presence information. Real-time connections such as for Voice over IP demand a large number of dynamically managed ports. This often causes problems when LANCOM – Quality Made in Germany setting up connections between internal networks with their private IP addresses and the Internet Our products are designed to meet the specific needs of the European markets and are engineered with its public IP addresses (a procedure called masking). To ensure that telephone calls between in Germany. The operating system LCOS (LANCOM Operating System) is developed in-house and IP networks remain reliable and secure, the router must be able to recognize real-time data. The undergoes constant improvement. This gives our customers the assurance that specialized require- firewall integrated into the LANCOM router only allows data to be transferred to approved connec- ments and upgrades can be integrated rapidly and reliably. Even customers with older devices con- tions. Data packets are received by the router's media proxy, they are validated, and their content tinue to benefit from regular free software updates – which demonstrates just how hard we work only is passed on. The destination subscriber is then sent a new data packet, so assuring that con- to protect our customers' investments, and how much we value the security of their networks. nection security is maximized. In addition to that, the router automatically adapts its bandwidth control and Quality of Service to meet the SIP connection requirements. In brief, the integration of SIP and the Media-Proxy into our routers forms the basis for functional unified communications. 2 3 Local VoIP networking in offices Secure IP telephony LANCOM business VoIP routers offer a maximum integration density Voice over IP with LANCOM is secure The best way to conduct secure IP telephone calls between company sites is via data VPNs – a model that LANCOM has implemented for years already. This gives you site connectivity and IP telephony from a single source and in one device. Our routers contain all of the functions that you need. Secure site connectivity through IPsec-based VPN LANCOM VoIP routers are VPN capable. That means that your telephone conversations are routed via a tunneled connection. You can rest assured that your confidential busi- ness conversations cannot be intercepted by outsiders. Security from the firewall and media proxy All LANCOM devices are equipped with an object-oriented firewall and an intrusion detection system. This means that unauthorized persons have no access to your network or to your IP telephony components. LANCOM business VoIP routers offer numerous possibilities for connection: PCs, SIP The media proxy also provides a high-security environment for local networks. Incom- phones, analog DECT telephones, fax, answering machines, printers and other ISDN ing and outgoing voice-data packets terminate at the proxy, which then allocates these equipment can be connected directly to the router. Among other things, this means that packets to their associated connections. Consequently, only media streams that belong you can dispense with obsolete PBXs at smaller offices or in home offices. Using a single, to authenticated SIP connections can pass through the router. The only termination point combined infrastructure for voice and data offers significant benefits and savings. that is visible from the outside is the LANCOM VoIP router. There are no direct connec- All LANCOM VoIP routers work tions to terminal devices in the local network, neither via SIP nor for the voice data in with IPsec, the standard that Better organization and more savings with infrastructure RTP. is acknowledged by banks and You save yourself the extra telephone cabling – from now on, one Ethernet connection public authorities. suffices for all applications. A business VoIP router unites the PBX functions, Internet Reliability from backup lines access – also via wireless LAN – and site connectivity via VPN into a single device. What's LANCOM business VoIP routers can be operated at your existing analog or ISDN ex- more it saves on costs for the procurement and maintenance of the infrastructure. change line. You remain available under the familiar telephone numbers, and emergency calls can break-out to the local public telephone network. And even if the IP connection More flexibility or the central IP PBX should fail, you remain connected via the standard exchange line Voice over IP allows you to integrate new telephony users with the greatest of ease. and can continue to telephone with other company sites, all without having to take any Simply connect a new SIP telephone to the switch, enter the registration data and the manual changes – simply dial the corresponding extension numbers. new subscriber is already integrated into the VoIP network. This expends with the incon- venience of cable laying and any upgrades to PBX hardware. ...and you can be sure of high voice quality Once device, all functions: The LANCOM 1823 VoIP Before placing a call, the LANCOM VoIP Call Manager checks that sufficient bandwidth More efficiency is available and, if necessary, will redirect the call over the conventional telephone net- There is no need to maintain a dedicated PBX system once you have fully migrated work. If enough bandwidth is available, the LANCOM VoIP Call Manager reserves this to VoIP. Instead, extending the PBX when your company grows is handled by your IT bandwidth in the firewall exclusively for the call. To guarantee the necessary bandwidth, department – at a fraction of the cost. That saves time and money. less critical applications such as Internet surfing can be slowed. This is important to ensure the continual high quality of your call, so saving you from hearing the caller with a time delay or even from losing the connection. 4 5 LANCOM VPN branch-office networking with VoIP function The LANCOM 9100 VPN for a company main office Home office Company A company's main office is the ideal location for operating headquarters an IP PBX. This may be a software program on a high-per- formance server. IP telephones at the main office are easy to integrate into the computer network. They are connected to the IP PBX via switches. The LANCOM 9100 VPN is the ideal IP PBX equipment for secure Internet access and site connectivity. This high-performance router is designed to handle the large The LANCOM 1823 VoIP for home offices volumes of data traffic common to large companies. It tun- Employees working in their home office often require access to nels data and voice through an IPsec-based VPN. This en- SERVER internal company data and need to telephone their colleagues at sures that your external communications remain completely various company sites. Be it a laptop with a WLAN module or a protected from unauthorized access. desktop PC – both can be securely and reliably integrated into the company network. Suitable telephones include modern SIP phones but also analog DECT or ISDN phones. The device best suited for Drucker this application is the LANCOM 1823 VoIP. Small subsidiary Foreign subsidiary ISDN-Telefon The LANCOM 1723 VoIP for smaller foreign subsidiaries Do you have foreign branch offices that do not have ISDN connec- tions? This scenario is ideal for deploying the LANCOM 1723 VoIP. It connects directly to an analog line, and it can connect analog The LANCOM 1722 VoIP for smaller branch offices terminal equipment or a PBX. Large As an alternative to the LANCOM 1724 VoIP, smaller subsidiary sites that have a compact PBX can be equipped with the LANCOM 1722 VoIP (2 x ISDN S0). This allows, for instance, FAX phone calls to the main office or other sites to be conducted The LANCOM 1724 VoIP for larger branch offices at very low cost and with the convenience of internal exten- You may have an ISDN PBX system at your branch office.
Recommended publications
  • Hotspot Feature for Wi-Fi Clients with RADIUS User Authentication on Digi Transport
    Application Note 56 Hotspot feature for Wi-Fi clients with RADIUS User Authentication on Digi TransPort. Digi Support November 2015 1 Contents 1 Introduction ......................................................................................................................................... 4 1.1 Outline ......................................................................................................................................... 4 1.2 Assumptions ................................................................................................................................ 4 1.3 Corrections .................................................................................................................................. 4 2 Version .................................................................................................................................................5 3 Configuration .......................................................................................................................................5 3.1 Mobile Interface Configuration .....................................................................................................5 3.2 Ethernet Interface Configuration ................................................................................................. 6 3.2.1 ETH 0 Configuration ................................................................................................................. 6 3.2.2 ETH 12 Logical Interface Configuration ....................................................................................
    [Show full text]
  • Multiple Internet Connections by Balancing Traffic and Managing Failover with Zeroshell
    Multiple Internet Connections by Balancing Traffic and Managing Failover With Zeroshell The purpose of this document is to describe the creation of a router to access a network that uses multiple Internet connections in order to balance the outgoing LAN demand and to obtain network access redundancy, managing fault situations for one or multiple lines. To reach our objective, we shall use the Net Balancer module by Zeroshell. Lastly, we shall examine the possibility of aggregation (Bonding) of VPN aimed at increasing the bandwidth for point-to-point connection between remote locations via the Internet. Is it really possible to increase the Internet connection bandwidth? The answer to this question is not, "yes, absolutely." It depends on what you mean by increasing the Internet connection bandwidth. In essence, the Net Balancer distributes requests originating from the LAN by round-robin (weighed) policy over multiple Internet gateways. In other words, if at a given point in time there is only one LAN user making only one TCP connection (e.g. he executes only one download from the web), his traffic will flow from a single gateway, thus it would not benefit from balanced connections. Instead, if the LAN is crowded with users, each executing multiple requests at the same time, as a whole, their connections will have access to a higher bandwidth, equal to the sum of the single-access bandwidths. We then conclude that a single connection may never have more bandwidth than what offered by a single link, while multiple simultaneous connections will, on average, altogether have access to a greater bandwidth, which will stretch to the sum of the bandwidths of all the Internet links being balanced.
    [Show full text]
  • Linksys E800 Router User Guide
    User Guide Linksys E800 Linksys E800 Contents Contents Product overview How to find your network on the Internet 14 How to clone a MAC address 15 Package contents 1 How to connect to your corporate office using a VPN 15 Features 1 Back view 2 How to optimize your router for gaming and voice 16 Bottom view 2 How to remotely change your router settings 17 How to enable Voice over IP on your network 18 Setting Up: Basics How to configure UPnP 19 How to create a home network 3 How to use a router as an access point 19 What is a network? 3 How to put your new router behind an existing router 21 How to set up a home network 3 To add your router to an existing router or gateway 21 Where to find more help 3 To share an Internet connection 21 To extend your network 23 How to set up your router 3 How to start Cisco Connect 4 How to expose a device to the Internet 23 How to improve your wireless connection speed 5 How to test your Internet connection speed 5 Improving Security How to connect devices to your network 6 How do I know if my network is secure? 25 How to connect a computer to your network 6 How to connect a printer 8 Network security following a manual setup 25 How to connect other devices 8 How to set up wireless security using Wi-Fi Protected Setup 26 How to change your router’s name and password 10 Wi-Fi Protected Setup activity light 26 Connecting a device using the Wi-Fi Protected Setup button 26 How to connect a device using its Wi-Fi Protected Setup PIN 27 How to connect a device using the router’s Wi-Fi Protected Setup PIN 27
    [Show full text]
  • Internet Protocol Suite
    InternetInternet ProtocolProtocol SuiteSuite Srinidhi Varadarajan InternetInternet ProtocolProtocol Suite:Suite: TransportTransport • TCP: Transmission Control Protocol • Byte stream transfer • Reliable, connection-oriented service • Point-to-point (one-to-one) service only • UDP: User Datagram Protocol • Unreliable (“best effort”) datagram service • Point-to-point, multicast (one-to-many), and • broadcast (one-to-all) InternetInternet ProtocolProtocol Suite:Suite: NetworkNetwork z IP: Internet Protocol – Unreliable service – Performs routing – Supported by routing protocols, • e.g. RIP, IS-IS, • OSPF, IGP, and BGP z ICMP: Internet Control Message Protocol – Used by IP (primarily) to exchange error and control messages with other nodes z IGMP: Internet Group Management Protocol – Used for controlling multicast (one-to-many transmission) for UDP datagrams InternetInternet ProtocolProtocol Suite:Suite: DataData LinkLink z ARP: Address Resolution Protocol – Translates from an IP (network) address to a network interface (hardware) address, e.g. IP address-to-Ethernet address or IP address-to- FDDI address z RARP: Reverse Address Resolution Protocol – Translates from a network interface (hardware) address to an IP (network) address AddressAddress ResolutionResolution ProtocolProtocol (ARP)(ARP) ARP Query What is the Ethernet Address of 130.245.20.2 Ethernet ARP Response IP Source 0A:03:23:65:09:FB IP Destination IP: 130.245.20.1 IP: 130.245.20.2 Ethernet: 0A:03:21:60:09:FA Ethernet: 0A:03:23:65:09:FB z Maps IP addresses to Ethernet Addresses
    [Show full text]
  • Using the Cisco IOS Web Browser User Interface
    Using the Cisco IOS Web Browser User Interface The Cisco IOS software includes a Web browser user interface (UI) from which you can issue Cisco IOS commands. The Cisco IOS Web browser UI is accessed from the router home page, and can be customized for your business environment. For example, you can view pages in different languages and save them in Flash memory for easy retrieval. For a complete description of the Cisco Web browser UI configuration commands in this chapter, refer to the “Cisco IOS Web Browser User Interface Commands”chapter of the Configuration Fundamentals Command Reference. To locate documentation of other commands that appear in this chapter, use the Cisco IOS Command Reference Master Index or search online. • Finding Feature Information, on page 1 • Prerequisites for Cisco IOS Web Browser User Interface, on page 1 • Restrictions for Cisco IOS Web Browser User Interface, on page 2 • Information About Cisco IOS Web Browser User Interface, on page 2 • How to Configure and Use the Cisco IOS Web Browser User Interface, on page 7 • Configuration Examples for the Cisco IOS Web Browser User Interface, on page 12 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
    [Show full text]
  • Voice Over IP Digital Phone Concerns with Security and Fire Alarm Communications Systems
    Voice Over IP Digital Phone Concerns with Security and Fire Alarm Communications Systems OMNI Fire and Security Systems LP, 9811 North Freeway #A101, Houston, TX, 77037, (281) 591-1944 Disclaimer: The term “digital phone” as used within this document refers to the generic VOIP phone infrastructure and layout. The term does NOT refer to the Digital Phone service offered by Time Warner Cable or Time Warner. The Digital Phone service is a trademark of Time Warner Communications and for more information on their service, please visit http://www.twcdigitalphone.com. This article outlines the new weaknesses concerned with Voice Over IP (VOIP) Digital Phone Service and how it can affect security and fire alarm system communication. VOIP service is much different than classic POTS telephone lines in that it routes all phone traffic through a digital converter, then over the internet. When compared with a POTS line, new concerns are introduced that could affect the stability and dependability of burglar or fire alarm system communication. Plain old telephone service, or POTS, is the service available from analogue telephones prior to the introduction of electronic telephone exchanges into the public switched telephone network. These services had been available almost since the introduction of the telephone system in the late 19th century. VOIP is a very new technology and this list will help reduce the possibilities of failure wherever possible by educating the end user and presenting possible solutions. 1 Power Supply Problem The VOIP modem can come as a stand-alone network device, or a combination broadband modem/router/and VOIP converter.
    [Show full text]
  • Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004724-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • Function of Tcp Ip Protocol Suite
    Function Of Tcp Ip Protocol Suite politically?Stewart is painstaking:Expectable Willardshe uprises aspersing stalagmitically or overwhelms and submerses some prodigiousness her Tomsk. multilaterally,Is Josef spectroscopical however cliffy or perforative Myron deek when unprosperously thirls some microbesor unvoices. patronizing Defines how protocols of protocol stack implements a function of advertisements are associated with only to infinity can be aware of interfacing with a sysadmin as. The unsuspecting hapless user may cause his application to crash or otherwise fail. But obscure protocol suite and ip makes sure that. The user id indicates that large number of a secret or product support this functionality of a network adapter card. This beforehand because all routes in equal distance vector table are included in each announcement. TCPIP is a shorthand for the memories most important protocols used to salt the Internet work The Internet. Therefore, MBGP can create routes for both unicast and multicast traffic. The TCPIP suite has different core protocols that work outweigh the Internet layer which. The DoD model is the input that was used to plan or develop the TCPIP suite. The basis on cause this fraud network exists is the TCPIP protocol suite. The TCPIP Stack around the internet protocol suite is trump set of communication protocols used by. Ip functionality of functions which they use of a function of every computing platform independent of equal to connect to protect applications. When tcp protocol suite and function at each level. Connections are made to the first host in the anycast address group to respond. What is OSI Model 7 Layers Explained Imperva.
    [Show full text]
  • Rebooting a Router
    Rebooting a Router This chapter describes the basic procedure a router follows when it reboots, how to alter the procedure, and how to use the ROM Monitor. For a complete description of the booting commands mentioned in this chapter, refer to the “Booting Commands” chapter in the Cisco IOS Configuration Fundamentals Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online. Rebooting a Router Task List You can perform the tasks related to rebooting discussed in the following sections: • Displaying Booting Information • Rebooting Procedures • Modifying the Configuration Register Boot Field • Setting Environment Variables • Scheduling a Reload of the System Image • Entering ROM Monitor Mode • Manually Loading a System Image from ROM Monitor • Configuring High System Availability on the Cisco 7500 Series Cisco IOS Configuration Fundamentals Configuration Guide FC-207 Rebooting a Router Displaying Booting Information Displaying Booting Information Use the following commands in EXEC mode to display information about system software, system image files, and configuration files: Command Purpose show bootvar Lists the contents of the BOOT environment variable, the name of the configuration file pointed to by the CONFIG_FILE environment variable, and the contents of the BOOTLDR environment variable. more nvram:startup-config Lists the startup configuration information. On all platforms except the Class A Flash file systems, the startup configuration is usually in NVRAM. On Class A Flash file systems, the CONFIG_FILE environment variable points to the startup configuration, defaulting to NVRAM. show version Lists the system software release version, system image name, configuration register setting, and other information.
    [Show full text]
  • M0n0wall and IPSEC March 20, 2004 Version 1.1 Francisco Artes [email protected]
    M0n0wall and IPSEC March 20, 2004 Version 1.1 Francisco Artes [email protected] Preface: ............................................................................................................................... 2 Audience: ............................................................................................................................ 2 Assumptions:....................................................................................................................... 2 Subnetting and VLAN routing:........................................................................................... 3 VPN tunnels between two IPSEC VPN concentrators: ...................................................... 4 Required Firewall Rules for all VPN tunnels: .................................................................... 9 What if your m0n0wall isn’t the main Internet Firewall?................................................. 11 Glossary: ........................................................................................................................... 12 AH................................................................................................................................. 12 ESP................................................................................................................................ 12 FreeS/WAN................................................................................................................... 12 IPsec.............................................................................................................................
    [Show full text]
  • TCP/IP Protocol Suite
    TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. I said, oh, man, it's obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPANET." – New York Times Interview: December 20, 1999 Overview • Terminology • History • Technical Details: – TCP – IP – Related Protocols • Physical Media • Social Implications • Economic Impact 3 Terminology • Protocol – A set of rules outlining the format to be used for communication between systems • Domain Name System (DNS) – Converts an Internet domain into an IP address • Router – A computer or software package used in packet switched networks to look at the source and destination addresses, and decide where to send the packets • Uniform Resource Indicators – Uniform Resource Location (URL) • How to find the resource: HTTP, FTP, Telnet – Uniform Resource Names (URN) • What the resource is: Not as common as URL 4 History: Pre-TCP/IP • Networks existed and information could be transferred within • Because of differences in network implementation communication between networks different for each application • Need for unification in protocols connecting networks 5 History: TCP/IP Development • 1968: Plans develop for using Interface Message Processors (IMPs) • Dec.
    [Show full text]
  • Zeroshell HOWTO
    Zeroshell HOWTO The multifunctional OS created by [email protected] www.zeroshell.net How to secure my private network ( Author: [email protected] ) How to secure my private Network : This short guide will let us configure a network firewall for our network in less than one hour. Zeroshell will secure our private network from external attacks. Our private network is connected to internet through a xDSL router. Here the steps to follow : First start and login Preparing a partition disk where to store our configurations Storing our configuration Network adapters configuration Internet surfing Captive Portal activation DNS Service DHCP Service Static routes to remote networks Virtual Servers Security: check default policies In Zeroshell we can find many other important features for more complex networks; this is a great scalable solution for our network. First start and login: After booting from CD, the system is reachable with a browser at the http secure: https://192.168.0.75 Accepting the secure connection we are asked user and password to login: Use these: User: admin Password: zeroshell Now we can use web interface to setup our firewall. Preparing a partition disk where to store our configurations: It’s so important to save our changes that Zeroshell lets us save them in a configuration file. It can be stored in a partition on a hard disk. It’s not necessary to farmat any existing partitions, we can save our configuration files in existing partition such as: ext3, reiserfs, ext2 o fat32. For my own preference I prefer to create a new partition ext3.
    [Show full text]