Configuring H.323 Gatekeepers and Proxies

H.323 Gatekeeper Configuration Task List

 

Command

Purpose

 

 

 

Step 20 Router(config)# access-listaccess-list-number

Creates an access list.

 

{permit deny} source source-mask [destination

The keywords and arguments are as follows:

 

destination-mask] {eq neq} [[source-object]

 

[destination-object] [identification] any]

access-list-number—Specifies the integer that

 

 

 

 

 

 

 

 

you choose. The number should be between 300

 

 

 

 

and 399, and it uniquely identifies the access list.

 

 

 

 

permit—Permits access when there is an address

 

 

 

 

match.

 

 

 

 

deny—Denies access when there is an address

 

 

 

 

match.

 

 

 

 

source—Specifies the source address. DECnet

 

 

 

 

addresses are written in the form area.node. For

 

 

 

 

example, 50.4 is node 4 in area 50. All addresses

 

 

 

 

are in decimal.

 

 

 

 

source-mask—Specifies the mask to be applied

 

 

 

 

to the address of the source node. All masks are

 

 

 

 

in decimal.

 

 

 

 

destination—(Optional) Specifies the DECnet

 

 

 

 

address of the destination node in decimal

 

 

 

 

format. DECnet addresses are written in the form

 

 

 

 

area.node. For example, 50.4 is node 4 in area 50.

 

 

 

 

All addresses are in decimal.

 

 

 

 

destination-mask—(Optional) Specifies the

 

 

 

 

destination mask. DECnet addresses are written

 

 

 

 

in the form area.node. For example, 50.4 is node

 

 

 

 

4 in area 50. All masks are in decimal.

 

 

 

 

eq—Specifies that the item matches the packet if

 

 

 

 

all the specified parts of the source object,

 

 

 

 

destination object, and identification match the

 

 

 

 

data in the packet.

 

 

 

 

neq—Specifies that the item matches the packet

 

 

 

 

if any of the specified parts do not match the

 

 

 

 

corresponding entry in the packet.

 

 

 

 

source-object—(Optional) Contains the

 

 

 

 

mandatory keyword src and one of the following

 

 

 

 

optional keywords:

 

 

 

 

eq neq lt gt—Specifies equal to, not

 

 

 

 

equal to, less than, or greater than. These

 

 

 

 

keywords must be followed by the argument

 

 

 

 

object-number, a numeric DECnet object

 

 

 

 

number.

 

 

 

 

exp—Stands for expression; followed by a

 

 

 

 

regular-expression that matches a string. See

 

 

 

 

the “Regular Expressions” appendix in the

 

 

 

 

Cisco IOS Dial Technologies Command

 

 

 

 

Reference for a description of regular

 

 

 

 

expressions.

 

 

 

 

 

 

 

 

Cisco IOS Voice, Video, and Fax Configuration Guide

 

 

 

 

 

 

 

 

 

 

VC-340

Page 52
Image 52
Cisco Systems VC-289 manual Cisco IOS Dial Technologies Command, VC-340

VC-289 specifications

Cisco Systems has long been a leader in networking technology, and among its diverse range of products is the VC-289. Designed specifically for enhanced performance in high-demand environments, the VC-289 serves a critical role in supporting the modern networking infrastructure.

One of the standout features of the VC-289 is its scalability. The device is engineered to easily accommodate expanded workloads, ensuring that organizations can grow without the need for frequent upgrades. This scalability is complemented by Cisco's commitment to backward compatibility, allowing businesses to integrate new systems with existing setups seamlessly.

In terms of performance, the VC-289 boasts impressive processing power. With advanced multi-core architecture, it is capable of handling multiple data streams simultaneously, making it ideal for environments that require consistent data flow, such as cloud computing and IoT applications. The device’s high throughput ensures that users experience minimal latency, facilitating quick data transfers even during peak usage times.

Security is another key characteristic of the VC-289. Cisco has integrated robust security protocols that protect against various cyber threats. Through features such as advanced encryption standards and intrusion prevention systems, organizations can ensure that sensitive data remains secure and is not compromised during transmission.

Another notable technology within the VC-289 is its support for software-defined networking (SDN) capabilities. This allows for more flexible network management, enabling IT teams to adapt the network according to evolving business needs. The ability to programmatically control the network also means that businesses can implement changes more rapidly, reducing downtime and improving overall productivity.

The VC-289 is designed with energy efficiency in mind, featuring power-saving modes that help reduce operational costs. This focus on sustainability not only benefits the environment but also appeals to organizations striving to meet corporate social responsibility objectives.

In conclusion, the Cisco Systems VC-289 stands as an exemplary solution for modern networking challenges. With its scalability, performance capabilities, enhanced security features, SDN support, and energy efficiency, it meets the demands of today's fast-paced and ever-evolving technological landscape. Organizations looking to invest in a robust networking solution would do well to consider the VC-289 as a cornerstone of their infrastructure.