[cisco-voip] Home user

Jerky lists at jerkys.org
Sun Oct 21 04:29:19 EDT 2007


Think this is what you are looking for:

http://www.cisco.com/en/US/products/ps7057/ 
products_data_sheet0900aecd80546906.html

jeff

On Oct 20, 2007, at 6:40 AM, Curt Shaffer wrote:

> I tried searching on this on cisco.com. Do you have a part number  
> or a more direct name that may help? Is this something that is  
> production ready or is it still beta quality?
>
>
>
> Thanks
>
>
>
> Curt
>
>
>
> From: cisco-voip-bounces at puck.nether.net [mailto:cisco-voip- 
> bounces at puck.nether.net] On Behalf Of Scott Voll
> Sent: Wednesday, October 17, 2007 2:05 PM
> To: Jerky
> Cc: Linsemier, Matthew; cisco-voip at puck.nether.net
> Subject: Re: [cisco-voip] Home user
>
>
>
> no Cisco CPE required.
>
>
>
> ip phone
>
>   |
>
> internet connection
>
>   |
>
>   --------------------------- phone proxy
>
>   |                               |
>
>   |                                |
>
> FW / router                  |
>
>   |                                |
>
> internal network ------ voice network
>
>
>
> basically you save the money of a cisco CPE by getting the phone  
> proxy.  let the end users VPN in with the client for data purposes  
> or use Citrix to get around VPN all together.
>
>
>
> the phone proxy has a north / South interface so the only thing  
> going through it is the authenticated voice traffic.
>
>
>
> hope that's understandable.
>
>
>
> scott
>
>
>
>
>
>
>
> On 10/17/07, Jerky <lists at jerkys.org> wrote:
>
> so it would be more like this:
>
>
>
>
> Cisco 871
>
>      |
>
> DSL CABLE
>
>      |
>
> Internet
>
>      |
>
> T1 Connection (Serial0/0/0)
>
>                     |
>
>    _____ 3800 _____
>
>   |                                  |
>
> ethernet 0/0          ethernet 0/1
>
> |                                    |
>
> PIX/ASA                    3800 (Cisco 871 VPN's terminate here)
>
> |                                    |
>
> LAN(computers)       LAN (Voice)
>
>
>
>
>
>
>
> Homefully my crude diagram makes sense. Do your home users have  
> access to any data on the computer network side. Or is the 87x VPNs  
> solely for getting to the voice network If users access things on  
> the "computer" side would you have a separate tunnel setup just for  
> that?
>
>
>
>
> Thanks for so much helping enlighten me. It's been very helpful.
>
>
>
>
> jeff
>
>
>
>
>
>
>
>
>
>
> On Oct 17, 2007, at 10:19 AM, Linsemier, Matthew wrote:
>
>
>
>
> In our environment we utilize PIX firewalls (still have to upgrade  
> to ASA's) to handle our firewall needs and then use the 3800 series  
> router just to terminate the DMVPN home users.  They are deployed  
> in parallel and sit behind a perimeter screening router (another  
> 3800 series router).  We shied away from using the PIX for the  
> simple fact that while it would preserve QoS markings, we couldn't  
> do any remarking or shaping in the device.  Maybe this has changed  
> in the ASA, but I don't think you have the control like you do in  
> IOS (such as qos pre-classify, shaping, policing,  etc.).   
> Depending on how many tunnels you plan on using, you could use a  
> router much smaller than a 3800 series to terminate the end nodes.
>
>
>
> On the home user end we have the Cisco 871/877 routers configured  
> to support wired and wireless connections using three VLANS.  We  
> have a VLAN configured for corporate connectivity, one VLAN  
> configured as a voice VLAN, and then a VLAN configured for  
> untrusted traffic.  One Ethernet port on the router provides  
> connectivity to the corporate and voice VLANS, while the remaining  
> three are configured as untrusted.  Similarly with Wireless, we  
> extend PEAP authentication from the headquarters and authenticate  
> users to the corporate VLAN, and use a WPA-PSK to secure the  
> untrusted connections.  This way the users plug in their phone,  
> then their laptop/docking station to port 0, and any other home  
> devices can be connected to port 1-3 or use the wireless WPA-PSK  
> network and be logically segregated (using ACL's) from any data on  
> the corporate network.  This way we can also control QoS and mark  
> down all traffic that enters the router from the untrusted  
> network.  So when said employees son or daughter starts downing a 2  
> gig torrent from a home PC, they don't kill the voice or impact the  
> corporate workflow.  Eventually we will be implementing 802.1x on  
> the corporate port for additional security, but have had mixed  
> results of getting it to work with Windows XP.
>
>
> Hope this helps.
>
>
>
> Matt
>
>
>
>
>
> From: Jerky [mailto:lists at jerkys.org]
> Sent: Tuesday, October 16, 2007 6:32 PM
> To: Linsemier, Matthew
> Cc: Curt Shaffer; cisco-voip at puck.nether.net
> Subject: Re: [cisco-voip] Home user
>
>
>
> This has been kicked around for a while since we moved to  
> CallManager but not much thought has been given to it. I'm trying  
> to understand how your hardware is setup. How would it look,  
> similar to one of these?
>
>
>
> 87x router <---DSL or Cable---> INTERNET <--T1 connection---> 3845  
> <--Ethernet--> LAN
>
>
>
> or
>
>
>
> 87x router <---DSL or Cable---> INTERNET <--T1 connection---> 3845  
> <---> ASA or PIX Firewall <--Ethernet--> LAN
>
>
>
> Is the 3800 used for all your firewalling needs in lieu of  
> something like an ASA or PIX? Sonicwall's are currently in place  
> and haven't worked very well for the remote users it was tested  
> with. The Sonicwalls we have don't have anything similar to what  
> the 871's seem to have in regards to vlans and packet tagging. We  
> would probably kick the Sonicwalls out if something else would work  
> better.
>
>
>
> jeff
>
>
>
> On Oct 16, 2007, at 8:16 AM, Linsemier, Matthew wrote:
>
>
>
> We currently have about 40 production remote home teleworkers that  
> have been deployed using Cisco 871/877 wireless routers and a 7960  
> phones.  We are using a Cisco 3845 series router at the head-end so  
> that we can control QoS tagging on the egress / ingress points of  
> both sides of the VPN tunnel.  We are using a phase 2 DMVPN  
> solution dual-homed to two sites to provide secure redundant  
> connectivity.
>
>
>
> It took me a bit to tweak my router configurations (I started on  
> Cisco 831/837 routers) to get the results that we wanted, but all  
> and all our users are happy.  There is the occasional jitter and  
> packet loss (it is the Internet mind you) but g.729 is working  
> quite well coupled with business cable and DSL services.
>
>
>
> If you have any other questions, feel free to ask.
>
>
>
> Matt
>
>
>
> From: cisco-voip-bounces at puck.nether.net [mailto:cisco-voip- 
> bounces at puck.nether.net ] On Behalf Of Curt Shaffer
> Sent: Monday, October 15, 2007 6:37 PM
> To: cisco-voip at puck.nether.net
> Subject: [cisco-voip] Home user
>
>
>
> I was wondering want everyone out there is using for the situation  
> where you have someone on your CCM or CCME that has 1 phone at a  
> home office. Something tells me an ASA is overkill and I haven't  
> found solid information that any of the 87x routers support tagging  
> QoS of packets going through the VPN tunnel. We would obviously  
> like to have QoS in place even though it's not respected at their  
> ISP just to make sure the VPN/Voice packets are leaving their  
> routers first as a best effort to get some quality.
>
>
>
> Thanks
>
>
>
>
>
> CONFIDENTIALITY STATEMENT
> This communication and any attachments are CONFIDENTIAL and may be  
> protected by one or more legal privileges. It is intended solely  
> for the use of the addressee identified above. If you are not the  
> intended recipient, any use, disclosure, copying or distribution of  
> this communication is UNAUTHORIZED. Neither this information block,  
> the typed name of the sender, nor anything else in this message is  
> intended to constitute an electronic signature unless a specific  
> statement to the contrary is included in this message. If you have  
> received this communication in error, please immediately contact me  
> and delete this communication from your computer. Thank you.
>
> _______________________________________________
>
> cisco-voip mailing list
>
> cisco-voip at puck.nether.net
>
> https://puck.nether.net/mailman/listinfo/cisco-voip
>
>
>
> CONFIDENTIALITY STATEMENT
> This communication and any attachments are CONFIDENTIAL and may be  
> protected by one or more legal privileges. It is intended solely  
> for the use of the addressee identified above. If you are not the  
> intended recipient, any use, disclosure, copying or distribution of  
> this communication is UNAUTHORIZED. Neither this information block,  
> the typed name of the sender, nor anything else in this message is  
> intended to constitute an electronic signature unless a specific  
> statement to the contrary is included in this message. If you have  
> received this communication in error, please immediately contact me  
> and delete this communication from your computer. Thank you.
>
>
>
>
>
>
>
> _______________________________________________
> cisco-voip mailing list
> cisco-voip at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-voip
>
>
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://puck.nether.net/pipermail/cisco-voip/attachments/20071021/1375d7c2/attachment-0001.html 


More information about the cisco-voip mailing list