Solved

Cisco Call Manager & SIP Proxy

Posted on 2014-03-05
2
814 Views
Last Modified: 2014-03-21
I was reading about SIP and in the phones setup process, they have to go through the SIP proxy server. Now if I look at the Cisco Call Manager, does the SIP proxy server part of the Cisco CM? Thanks
0
Comment
Question by:leblanc
2 Comments
 
LVL 1

Accepted Solution

by:
ttexpert earned 250 total points
ID: 39908600
SIP is a protocol. Lync sends call over a SIP connection to CISCO, next CISCO routes the call to its destination

SIP is a protocol that runs on top on TCP/IP
http://en.wikipedia.org/wiki/Session_Initiation_Protocol
0
 
LVL 20

Assisted Solution

by:José Méndez
José Méndez earned 250 total points
ID: 39909046
Callmanager is not a SIP Proxy. Proxy  is a different functionality within the SIP standard. Callmanager is a Back to back User Agent:

http://tools.ietf.org/html/draft-ietf-straw-b2bua-taxonomy-03

You could say Callmanager is a Proxy in the sense that, phones do not established connections to the final destination by themselves. They do not have a dial plan of their own (although you could provision a dialplan file on each phone, this is not really a dialplan per se as you don't get to choose different destinations for each call), so they are kind of dummy in these regards, they need Callmanager to proxy their request and process it somehow until it gets connected.

Callmanager can do many things with SIP calls, including handling of powerful features such as Single Number Reach, that is why a Back to back User Agent goes "beyond the the definition of a SIP Proxy"
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now