![]() ![]() Because the traffic is traversing SME, we need to make sure that the SIP trunks between CUCM and SME clusters are secure. In this particular case, the client would like to implement end-to-end phone security (signalling and media encryption) on all endpoints that support it. I have intentionally simplified the topology to include just three CUCM clusters, with one of them being used as SME. In reality, the environment is a much larger one, consisting of 12 multi-node CUCM clusters scattered around the globe. We are dealing with two CUCM clusters that have SIP trunks to Cisco SME cluster. This is going to be a multi-part document, since the topic being covered is rather large and I want to be as detailed as possible. For those of you who are in charge of a large VoIP environment with multiple CUCM clusters, I dedicate this post. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |