Slideshow

CCNP Voice - IP Telephony CIPT

E-mail

CCNP Voice/CVOICE Cisco IP Telephony CIPT (Exams 642-457 and 642-447) Official Certification

 Course Objective:

Cisco IP Telephony (CIPT) expands the student's knowledge of voice over IP (VoIP) and public switched telephone network (PSTN) components and technologies. This course teaches how to describe, install, configure, and support Cisco Unified CallManager 4.1 in a Cisco network including such features as security and video; how to configure gateways, gatekeepers, and switches; and how to build route plans to place intra- and intercluster Cisco IP phone calls. Review questions, detailed configuration examples, network diagrams, and thorough explanations will be given to help reinforce learning.

Whether the student is preparing for CCVP certification or simply want to gain a better understanding of IP telephony and Cisco Unified CallManager, he will benefit from the foundation information presented in this course.

Prerequisites

All CCNA routing and switching levels.

Course Contents:

<!--[if !supportLists]-->· <!--[endif]-->Cisco CallManager Fundamentals

<!--[if !supportLists]-->o <!--[endif]-->Introduction to Cisco Unified Communications and Cisco Unified CallManager

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Unified Communications

<!--[if !supportLists]-->§ <!--[endif]-->Understanding Cisco Unified CallManager

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Cisco Unified CallManager Clustering and Deployment Options

<!--[if !supportLists]-->§ <!--[endif]-->The Two Sides of the Cisco Unified CallManager Cluster

<!--[if !supportLists]-->§ <!--[endif]-->Cluster Redundancy Designs

<!--[if !supportLists]-->§ <!--[endif]-->Call-Processing Deployment Models

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Cisco Unified CallManager Installation and Upgrades

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Unified CallManager 4.x Clean Installation Process

<!--[if !supportLists]-->§ <!--[endif]-->Upgrading Prior Cisco Unified CallManager Versions

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->IPT Devices and Users

<!--[if !supportLists]-->o <!--[endif]-->Cisco IP Phones and Other User Devices

<!--[if !supportLists]-->§ <!--[endif]-->Cisco IP Phones

<!--[if !supportLists]-->§ <!--[endif]-->IP Phone Startup Process

<!--[if !supportLists]-->§ <!--[endif]-->Cisco IP Phone Codec Support

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco Unified CallManager to Support IP Phones

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Intracluster IP Phone Communication

<!--[if !supportLists]-->§ <!--[endif]-->IP Phone Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Case Study: Device Pool Design

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->o <!--[endif]-->Cisco IP Telephony Users

<!--[if !supportLists]-->§ <!--[endif]-->Cisco CallManager User Database

<!--[if !supportLists]-->§ <!--[endif]-->Cisco CallManager User Configuration

<!--[if !supportLists]-->§ <!--[endif]-->User Logon and Device Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Cisco Bulk Administration Tool

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Bulk Administration Tool

<!--[if !supportLists]-->§ <!--[endif]-->Using the Tool for Auto-Registered Phone Support

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->IPT Network Integration and Route Plan

<!--[if !supportLists]-->o <!--[endif]-->Cisco Catalyst Switches

<!--[if !supportLists]-->§ <!--[endif]-->Catalyst Switch Role in IP Telephony

<!--[if !supportLists]-->§ <!--[endif]-->Powering the Cisco IP Phone

<!--[if !supportLists]-->§ <!--[endif]-->Data and Voice VLANs

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Class of Service

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco Gateways and Trunks

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Gateway Concepts

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Access Gateways

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Trunk Concepts

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Intercluster Trunks

<!--[if !supportLists]-->§ <!--[endif]-->SIP and Cisco CallManager

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Cisco Unified CallManager Route Plan Basics

<!--[if !supportLists]-->§ <!--[endif]-->External Call Routing

<!--[if !supportLists]-->§ <!--[endif]-->Route Plan Configuration Process

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Cisco Unified CallManager Advanced Route Plans

<!--[if !supportLists]-->§ <!--[endif]-->Route Filters

<!--[if !supportLists]-->§ <!--[endif]-->Discard Digit Instructions

<!--[if !supportLists]-->§ <!--[endif]-->Transformation Masks

<!--[if !supportLists]-->§ <!--[endif]-->Translation Patterns

<!--[if !supportLists]-->§ <!--[endif]-->Route Plan Report

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Hunt Groups and Call Coverage

<!--[if !supportLists]-->§ <!--[endif]-->Call Distribution Components

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Line Groups, Hunt Lists, and Hunt Pilots

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Implementing Telephony Call Restrictions and Control

<!--[if !supportLists]-->§ <!--[endif]-->Class of Service Overview

<!--[if !supportLists]-->§ <!--[endif]-->Partitions and Calling Search Spaces Overview

<!--[if !supportLists]-->§ <!--[endif]-->Time-of-Day Routing Overview

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Time-of-Day Routing

<!--[if !supportLists]-->§ <!--[endif]-->Time-of-Day Routing Usage Scenario

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Implementing Multiple-Site Deployments

<!--[if !supportLists]-->§ <!--[endif]-->Call Admission Control

<!--[if !supportLists]-->§ <!--[endif]-->Survivable Remote Site Telephony

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->VoIP Features

<!--[if !supportLists]-->o <!--[endif]-->Media Resources

<!--[if !supportLists]-->§ <!--[endif]-->Introduction to Media Resources

<!--[if !supportLists]-->§ <!--[endif]-->Conference Bridge Resources

<!--[if !supportLists]-->§ <!--[endif]-->Media Termination Point Resources

<!--[if !supportLists]-->§ <!--[endif]-->Annunciator Resources

<!--[if !supportLists]-->§ <!--[endif]-->Transcoder Resources

<!--[if !supportLists]-->§ <!--[endif]-->Music on Hold Resources

<!--[if !supportLists]-->§ <!--[endif]-->Media Resource Management

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring User Features, Part 1

<!--[if !supportLists]-->§ <!--[endif]-->Basic IP Phone Features

<!--[if !supportLists]-->§ <!--[endif]-->Softkey Templates

<!--[if !supportLists]-->§ <!--[endif]-->Enhanced IP Phone Features

<!--[if !supportLists]-->§ <!--[endif]-->Barge and Privacy

<!--[if !supportLists]-->§ <!--[endif]-->IP Phone Services

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring User Features, Part 2

<!--[if !supportLists]-->§ <!--[endif]-->Cisco CallManager Extension Mobility

<!--[if !supportLists]-->§ <!--[endif]-->Client Matter Codes and Forced Authentication Codes

<!--[if !supportLists]-->§ <!--[endif]-->Call Display Restrictions

<!--[if !supportLists]-->§ <!--[endif]-->Malicious Call Identification

<!--[if !supportLists]-->§ <!--[endif]-->Multilevel Precedence and Preemption

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco Unified CallManager Attendant Console

<!--[if !supportLists]-->§ <!--[endif]-->Introduction to Cisco CallManager Attendant Console

<!--[if !supportLists]-->§ <!--[endif]-->Call Routing and Call Queuing

<!--[if !supportLists]-->§ <!--[endif]-->Server and Administration Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Attendant Console Features

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco IP Manager Assistant

<!--[if !supportLists]-->§ <!--[endif]-->Cisco IP Manager Assistant Overview

<!--[if !supportLists]-->§ <!--[endif]-->Cisco IP Manager Assistant Architecture

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Cisco IPMA for Shared-Line Support

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->IPT Security

<!--[if !supportLists]-->o <!--[endif]-->Securing the Windows Operating System

<!--[if !supportLists]-->§ <!--[endif]-->Threats Targeting the Operating System

<!--[if !supportLists]-->§ <!--[endif]-->Security and Hot Fix Policy

<!--[if !supportLists]-->§ <!--[endif]-->Operating System Hardening

<!--[if !supportLists]-->§ <!--[endif]-->Antivirus Protection

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Security Agent

<!--[if !supportLists]-->§ <!--[endif]-->Administrator Password Policy

<!--[if !supportLists]-->§ <!--[endif]-->Common Windows Exploits

<!--[if !supportLists]-->§ <!--[endif]-->Security Taboos

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Securing Cisco Unified CallManager Administration

<!--[if !supportLists]-->§ <!--[endif]-->Threats Targeting Remote Administration

<!--[if !supportLists]-->§ <!--[endif]-->Securing CallManager Communications Using HTTPS

<!--[if !supportLists]-->§ <!--[endif]-->Multilevel Administration

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Preventing Toll Fraud

<!--[if !supportLists]-->§ <!--[endif]-->Toll Fraud Exploits

<!--[if !supportLists]-->§ <!--[endif]-->Preventing Call Forward and Voice-Mail Toll Fraud Using Calling Search Spaces

<!--[if !supportLists]-->§ <!--[endif]-->Blocking Commonly Exploited Area Codes

<!--[if !supportLists]-->§ <!--[endif]-->Using Time-of-Day Routing

<!--[if !supportLists]-->§ <!--[endif]-->Using FAC and CMC

<!--[if !supportLists]-->§ <!--[endif]-->Restricting External Transfers

<!--[if !supportLists]-->§ <!--[endif]-->Dropping Conference Calls

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Hardening the IP Phone

<!--[if !supportLists]-->§ <!--[endif]-->Threats Targeting Endpoints

<!--[if !supportLists]-->§ <!--[endif]-->Blocking Endpoint Attacks

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Understanding Cryptographic Fundamentals

<!--[if !supportLists]-->§ <!--[endif]-->What Is Cryptography?

<!--[if !supportLists]-->§ <!--[endif]-->Symmetric Encryption

<!--[if !supportLists]-->§ <!--[endif]-->Asymmetric Encryption

<!--[if !supportLists]-->§ <!--[endif]-->Hash Functions

<!--[if !supportLists]-->§ <!--[endif]-->Digital Signatures

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Understanding the Public Key Infrastructure

<!--[if !supportLists]-->§ <!--[endif]-->The Need for a PKI

<!--[if !supportLists]-->§ <!--[endif]-->PKI as a Trusted Third-Party Protocol

<!--[if !supportLists]-->§ <!--[endif]-->PKI Entities

<!--[if !supportLists]-->§ <!--[endif]-->PKI Enrollment

<!--[if !supportLists]-->§ <!--[endif]-->PKI Revocation and Key Storage

<!--[if !supportLists]-->§ <!--[endif]-->PKI Example

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

<!--[if !supportLists]-->§ <!--[endif]-->Threats Targeting the IP Telephony System

<!--[if !supportLists]-->§ <!--[endif]-->How CallManager Protects Against Threats

<!--[if !supportLists]-->§ <!--[endif]-->PKI Topologies in Cisco IP Telephony

<!--[if !supportLists]-->§ <!--[endif]-->PKI Enrollment in Cisco IP Telephony

<!--[if !supportLists]-->§ <!--[endif]-->Keys and Certificate Storage in Cisco IP Telephony

<!--[if !supportLists]-->§ <!--[endif]-->Authentication and Integrity

<!--[if !supportLists]-->§ <!--[endif]-->Encryption

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco IP Telephony Authentication and Encryption

<!--[if !supportLists]-->§ <!--[endif]-->Authentication and Encryption Configuration Overview

<!--[if !supportLists]-->§ <!--[endif]-->Enabling Services Required for Security

<!--[if !supportLists]-->§ <!--[endif]-->Using the CTL Client

<!--[if !supportLists]-->§ <!--[endif]-->Working with Locally Significant Certificates

<!--[if !supportLists]-->§ <!--[endif]-->Configuring the Device Security Mode

<!--[if !supportLists]-->§ <!--[endif]-->Negotiating Device Security Mode

<!--[if !supportLists]-->§ <!--[endif]-->Generating a CAPF Report

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->IP Video

<!--[if !supportLists]-->o <!--[endif]-->Introducing IP Video Telephony

<!--[if !supportLists]-->§ <!--[endif]-->IP Video Telephony Solution Components

<!--[if !supportLists]-->§ <!--[endif]-->Video Call Concepts

<!--[if !supportLists]-->§ <!--[endif]-->Video Protocols Supported in Cisco CallManager

<!--[if !supportLists]-->§ <!--[endif]-->Bandwidth Management

<!--[if !supportLists]-->§ <!--[endif]-->Call Admission Control Within a Cluster

<!--[if !supportLists]-->§ <!--[endif]-->Call Admission Control Between Clusters

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Cisco VT Advantage

<!--[if !supportLists]-->§ <!--[endif]-->Cisco VT Advantage Overview

<!--[if !supportLists]-->§ <!--[endif]-->How Calls Work with Cisco VT Advantage

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Cisco CallManager for Video

<!--[if !supportLists]-->§ <!--[endif]-->Configuring Cisco IP Phones for Cisco VT Advantage

<!--[if !supportLists]-->§ <!--[endif]-->Installing Cisco VT Advantage on a Client

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

<!--[if !supportLists]-->· <!--[endif]-->IPT Management

<!--[if !supportLists]-->o <!--[endif]-->Introducing Database Tools and Cisco Unified CallManager Serviceability

<!--[if !supportLists]-->§ <!--[endif]-->Database Management Tools

<!--[if !supportLists]-->§ <!--[endif]-->Cisco CallManager Serviceability Overview

<!--[if !supportLists]-->§ <!--[endif]-->Tools Overview

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Monitoring Performance

<!--[if !supportLists]-->§ <!--[endif]-->Performance Counters

<!--[if !supportLists]-->§ <!--[endif]-->Microsoft Event Viewer

<!--[if !supportLists]-->§ <!--[endif]-->Microsoft Performance Monitor

<!--[if !supportLists]-->§ <!--[endif]-->Real-Time Monitoring Tool Overview

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring Alarms and Traces

<!--[if !supportLists]-->§ <!--[endif]-->Alarm Overview

<!--[if !supportLists]-->§ <!--[endif]-->Alarm Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Trace Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Trace Analysis

<!--[if !supportLists]-->§ <!--[endif]-->Trace Collection

<!--[if !supportLists]-->§ <!--[endif]-->Bulk Trace Analysis

<!--[if !supportLists]-->§ <!--[endif]-->Additional Trace Tools

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Configuring CAR

<!--[if !supportLists]-->§ <!--[endif]-->CAR Overview

<!--[if !supportLists]-->§ <!--[endif]-->CAR Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Report Scheduling

<!--[if !supportLists]-->§ <!--[endif]-->System Database Configuration

<!--[if !supportLists]-->§ <!--[endif]-->User Report Configuration

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

<!--[if !supportLists]-->o <!--[endif]-->Using Additional Management and Monitoring Tools

<!--[if !supportLists]-->§ <!--[endif]-->Remote Management Tools

<!--[if !supportLists]-->§ <!--[endif]-->Dependency Records

<!--[if !supportLists]-->§ <!--[endif]-->Password Changer Tool

<!--[if !supportLists]-->§ <!--[endif]-->Cisco Dialed Number Analyzer

<!--[if !supportLists]-->§ <!--[endif]-->Quality Report Tool

<!--[if !supportLists]-->§ <!--[endif]-->Summary

<!--[if !supportLists]-->§ <!--[endif]-->Review Questions

 

Share this page!