• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 795
  • Last Modified:

DID and Translation patters in cucm

I am trying to learn and understand DID numbers and translation patters in cucm 8. I have found some info on ciscos site but its hard to understand. Can anyone please recommend either a website or a video that can break this down to more user friendly terms that i may be able to more fully understand?   Thanks in advance for any info.
1 Solution
Ken BooneNetwork ConsultantCommented:
I'll try to explain.  A DID is simply a phone number that can be used to dial directly to someone's phone.  So for comparison, if you did not have DIDs, then everyone had a "private" extension on the phone system.  An outside caller would have to dial the main published number for a company and would then be asked to either enter an extension number to reach the person they were trying to reach or they would hit a receptionist and she would forward the call to the appropriate person.  So the idea of a DID is that each person has a number that be dialed from the outside and it will ring at their phone directly without going through a middle man.

In this scenario you might have a block of DID phone number from the phone company.  Lets say its 865-222-2000 through 865-222-2999.  So in this case you would assign the 2000 to 2999 as directory numbers on the folks phones.  This is their extension which is also their DID number.   So once youput 2156 on someone's phone as their extension, when a call is placed to 865-222-2156 it will ring their phone directly.

A translation pattern is different than a DID.  A translation pattern merely lets you alter a calls destination or other things about the call.  So let's say if someone calls 865-222-2333 because that is a number for a particular deptartment.  Well we can translate 2333 to 1000 which is a number for a queue for instance.  So we are simply matching something that was called and translating it to something else.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now