Configuring VoIP Call Setup Monitoring

 Download tutorial about configuring VoIP call and setup monitoring, it's a free training document material in 14 pages by Scisco designated to intermediate level users.

Table of contents

  • Prerequisites for VoIP Call Setup Monitoring
  • Information About VoIP Call Setup Monitoring
  • IP SLAs VoIP Call Setup Monitoring Using H.323 or SIP
  • Configuring the Source Gateway
  • Configuring a VoIP Call Setup Montioring Operation
  • Scheduling IP SLAs Operations
  • configure terminal
  • show ip sla group schedule
  • show ip sla configuration
  • configure terminal
  • dial-peer voice tag voip
  • incoming called-number tag
  • application application-name
  • Session protocol sipv2
  • Example VoIP Call Setup Configuration on the Source Gateway
  • Feature Information for VoIP Call Setup Monitoring

Excerpt from tutorial

The Cisco IOS IP SLAs VoIP Call Setup Monitoring feature provides the ability to measure your network’s response time for setting up a VoIP call. Prior to configuring an IP SLAs VoIP call setup operation, you must enable the IP SLAs VoIP test-call application on the originating gateway (source). With the IP SLAs VoIP test-call application enabled, H.323 or Session Initiation Protocol (SIP) call messages can be sent to and received by the originating (source) and terminating (destination) gateways.

The configuration for the IPSLAs VoIP call setup operation is essentially the same for both protocols.

The IP SLAs VoIP call setup operation can measure the total time from when an source gateway sends a call message, containing a call number, to when the sourcegateway receives a response from the destination gateway indicating that either the called number rang or the called party answered the call.

As with all Cisco IOS IP SLAs operations, you can configure the VoIP call setup operation to repeat at specified time intervals, for a specified number of repetitions, and over a specified duration of time.


Size : 1,388.48 Kb
File type : pdf
Downloads: 728
Created: 2016-12-26

Others VoIP Tutorials

VoIP Tutorial in PDF

How to configure Voice over IP

Voice over IP overview in pdf

How VoIP works, pdf tutorial

Others related eBooks about Configuring VoIP Call Setup Monitoring

Virtual Private Networks free tutorial

Download free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....

Computer Networks: A Systems Approach

This book explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best selling and classic textbook explains various protocols and networking technologies. The systems oriented appro...

Cisco ACE to Nginx

Download free course Cisco ACE to Nginx, pdf file on 51 pages by Faisal Memon....

Social Theory after the Internet

Download free course Social Theory after the Internet, pdf file on 210 pages by Ralph Schroeder....

Natural Language Processing Succinctly

Download free course Natural Language Processing Succinctly, pdf file on 93 pages by Joseph D. Booth....

Linux Network Administrators Guide

This tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...

Why Should I Care? Mobile Security for The Rest of Us

Download free course Why Should I Care? Mobile Security for The Rest of Us, pdf file on 46 pages by Veracode....

Representation Learning for Natural Language Processing

Download free course Representation Learning for Natural Language Processing, pdf file on 349 pages by Zhiyuan Liu, Yankai Lin, Maosong Sun....

Network Protocols and Vulnerabilities

This tutorial is about the network security and how they are not perfect ,it decribe some of attacks and how to protect against them....