We have a customer that requires a VTC bridge. Currently, they have 1 C40 located at the headquarters and 5 MXPs located at different locations. All of these end points are using ISDN and can make unclass and classified connections (secure) using KIV7m. We are planning to install and configure the equipment listed below.
1. ISDN Gateway 3241
2. MCU 4501
1. Do we need a VCS for this set-up?
2. Can the equipment listed above can handle the secure connection using KIV7?
3. The endpoints can register to the MCU?
4. Any input and other suggestions regarding this will be much appreciated.
Hi Allan. Having VCS would be nice to have. MCU on board gk is ok but not as robust as VCS. Curious to how you plan on using this. MXPs register to MCU and use ISDN as backup? Not quite sure if thats what your trying to do or not. If you need the 3241 to be secure, this wont work. You may want to look at Serial GW if secure is required. Ill have to see if KIV7M is supported or not though.
Hi Patrick, thanks for the response. All the MXPs are located @ different locations and they are only using ISDN line for inbound and outbound calls. The customer requires a secure ISDN bridge that can be used for the multipoint call between the headquarters and the remote locations. All endpoints are using the KIV7m for the encryption.
I'd also check the JITC APL guide as well. I know some DoD entities require it be listed on JITC APL, so I'd look there to make sure. Look for the below on there webpage. You should be able to get to it. Also, it will list the SW versions that have been approved as well.
You have reached the Cisco Logistics Support Center.. To Check Status of
your RMA, visit Product Returns & Replacements (RMA). Need help? Contact
us by Phone or Email. North Americas Phone: 1800 553 2447 Option 4
Email: firstname.lastname@example.org Europe Phone: +3...
The short answer is that you don't.... That isn't entirely true while at
the same time it kind of is, but for the most part you don't configure
the softkeys. You enable or disable them via TCL. Here is the long
answer. Be sure to read the whole thing or e...
Topology: IP Phone > Switches > Microsoft NPS setup to forward 802.1x
proxy to > ISE 2.1 patch 3 Authentication: EAP-TLS using Cisco MIC SANs
Phone Models 802.1X support? 802.1x flavor Addtl Comment EAP-MD5 EAP-TLS
Cisco 3905 Y Y N Cisco 6911 Y Y N Cisco ...