Glossary

401 Unauthorized A 401 Unauthorized failure message can occur when the Cisco Expressway attempts to authenticate the credentials presented by the endpoint client. The reasons for this error may be due to the client supplying an unknown username or the wrong password. It could also be that the Intercluster Lookup Service (ILS) has not been set up on all of the CUCM clusters.

403 Forbidden This error message could occur for any service request. These Services may fail if the Cisco Expressway-C and Cisco Expressway-E are not synchronized to a reliable NTP server. They could also need to be added to the HTTP allow list.

404 When client HTTPS requests are dropped by the Cisco Expressway, this can be caused by the automated intrusion protection feature on the Cisco Expressway-E if it detects repeated invalid attempts, which are 404 errors, from a client IP address to access resources through the HTTP proxy.

407 Proxy Authentication Required Call failures can occur if the Traversal Zones on Cisco Expressway are configured with an Authentication Policy of Check credentials. Ensure that the Authentication Policy on the Traversal Zones used for Mobile and Remote Access is set to Do not check credentials. This could also be a 500 Internal Server Error.

502 A 502 message on the Cisco Expressway-E indicates that the next hop failed, which is typically to the Cisco Expressway-C. Use the following steps to identify what is causing this issue.

A-Record A DNS record that maps a domain or subdomain to an IP address.

A-Record This is a mapping record used by Domain Name Servers to map a URI address to an IP address. A-Records consist of a host name and domain name, which make up the URI, and an IP address.

ACME The Automatic Certificate Management Environment protocol is a communications protocol for automating interactions between certificate authorities and their users’ web servers, allowing the automated deployment of public key infrastructure at low cost. It was designed by the Internet Security Research Group (ISRG) for their Let’s Encrypt service.

Active Directory (AD) Active Directory is a Microsoft Corporate Directory product used for user and device management and LDAP integrations.

Active Directory Certificate Service (ADCS) Active Directory Certificate Service is a service that runs on a Microsoft Windows Server. This service can be used to sign private certificates for use within an enterprise.

AD Microsoft Active Directory is a Microsoft branded LDAP directory service that runs on a Microsoft Windows Server platform.

Address on Record (AOR) Address on Record is an identifier in a SIP registrar for the SIP URI and IP address.

Administrative XML Web Service (AXL) The Administrative XML Web Service (AXL) is an XML/SOAP based interface that provides a mechanism for inserting, retrieving, updating and removing data from the Unified Communication configuration database. Developers can use AXL and the provided WSDL to Create, Read, Update, and Delete objects such as gateways, users, devices, route-patterns and much more.

Admission Request (ARQ) Admission Request is the RAS messaging sent from an endpoint to a Gatekeeper to request permission to place a call. The Gatekeeper will respond with either an ACF, or Admission Confirm, or an ARJ, Admission Reject.

AES Also known by its original name Rijndael, Advanced Encryption Standard is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST).

API Application Programmer Interface is a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

Application Layer Gateway (ALG) Application Layer Gateway, also referred to as Fixup, Inspection, Application Awareness, Stateful Packet Inspection, Deep Packet Inspection and so forth. This means that the router/firewall is capable is able to identify SIP and H.323 traffic as it passes through. It will inspect, and in some cases modify the payload of the SIP and H.323 messages. The purpose of modifying the payload is to help the H.323 or SIP application from which the message originated to traverse NAT.

Application Programmer Interface (API) Application Programmer Interface is a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

Application Programmer Interface (API) Application Programmer Interface is a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

Application Programmer Interface (API) Application Programmer Interface is a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

Application Programmer Interface (API) Application Programmer Interface is a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

Assent Cisco Proprietary protocol used for firewall and NAT traversal of audio and video media and signaling over UDP ports for RTP and RTCP packets.

Assent Cisco proprietary protocol used for firewall traversal communication between the Expressway Core and Edge servers. Assent can support both SIP and H.323 communication protocols.

Asymmetric Cryptography Same process as symmetric cryptography, except the identity of the communicating parties can be authenticated using public-key cryptography.

Asymmetric Networks A network that contains multiple entry and exit points for traffic to take with each new transmission.

B2B Business-to-Business is a term used to describe communications between two businesses.

B2BUA Back-to-Back User Agent is a logical network element in SIP applications. It is a type of SIP UA that receives a SIP request, then reformulates the request, and sends it out as a new request.

Back-to-Back User Agent (B2BUA) Back-to-Back User Agent is a logical network element in SIP that reformulates incoming requests before sending them back out to the intended destination.

Bandwidth A term used to measure the rate by which data can be sent or received across a network.

Base64 encoded format This is an encoding method for certificates that converts binary to plain ASCII text

Border Gateway Protocol (BGP) Border Gateway Protocol is an interdomain routing protocol designed to provide loop-free routing between separate routing domains that contain independent routing policies (autonomous systems).

Business-to-Business (B2B) Business-to-Business is a term used to describe communications between two businesses.

Business-to-Customer (B2C) Business-to-Customer is a term used to describe communications between a business and their customers

CA Certificate Authority is the certificate server that issues and verifies the authenticity of certificates.

Call Admission Control (CAC) Call Admission Control is a mechanism on the CUCM or Cisco Expressway that is used to control if calls are allowed and how bandwidth is used across an enterprise network.

Call Policy Also known as Administrator Policy, or Admin Policy, it is a list of rules that are used to control call behavior through the Expressway.

Call Processing Language (CPL) Script Call Processing Language Script is an XML-based language for defining call handling designed to control Internet telephony services.

Call Processing Order a systematic process used to gauge incoming call requests against a series of criteria that can be fashioned by an administrator.

Call Setup Mode Call Setup Mode is an H.323 setting configured on an endpoint that can be set to either “Direct” or “Gatekeeper”. If Call Setup mode is set to Direct, the endpoint will never attempt to register to a Gatekeeper and will only be able to dial by IP address. When “Gatekeeper” mode is used, the endpoint is completely subservient to a Gatekeeper and will perform no function until it has registered.

Call Signaling Optimization This is the setting on the Cisco Expressway that enables optimal call routing. This setting can be configured as “On” or “Off”. The default value is “Off”.

Certificate Authority (CA) Certificate Authority is the certificate server that issues and verifies the authenticity of certificates.

Certificate Authority (CA) Certificate Authority is the certificate server that issues and verifies the authenticity of certificates.

Certificate Authority (CA) Certificate Authority is the certificate server that issues and verifies the authenticity of certificates.

Certificate Authority (CA) Certificate Authority is the certificate server that issues and verifies the authenticity of certificates.

Certificate Signing Request (CSR) Certificate Signing Request is a template used to submit information to a CA so that a certificate can be signed.

Cisco Directory Connector Synchronizes Microsoft Active Directory users into Webex Control Hub (creating, updating, deleting) so that user account information is always current in the cloud.

Cisco Discovery Protocol (CDP) Cisco Discovery Protocol is a proprietary protocol used at layer 2 of the network for device and information discovery across a network.

Cisco Jabber Cisco Jabber is a soft client tool that utilizes the on-premises or hosted CUCM and IM&P services.

Cisco Jabber Cisco Jabber is a soft client tool that utilizes the on-premises or hosted CUCM and IM&P services.

Cisco Meeting Server (CMS) Cisco Meeting Server is an on-premises conferencing server used for rich media multipoint conferencing between three or more participants.

Cisco Unified Communications Manager (CUCM) Cisco Unified Communications Manager is a Cisco Call control server that supports SIP devices and many different call features.

Cisco Unified Communications Manager (CUCM) Cisco Unified Communications Manager is a Cisco Call control server that supports SIP devices and many different call features.

Cisco Unified Communications Manager (CUCM) Cisco Unified Communications Manager is a Cisco Call control server that supports SIP devices and many different call features.

Cisco Unified Workspace Licensing (CUWL) Cisco Unified Workspace Licensing is a Cisco licensing type that was designed for medium to large organizations that offers both voice and video capabilities plus many other product solutions, such as voicemail systems and conferencing solutions.

Cisco Unity Connections (CUC) Cisco Unity Connections is a unified messaging and voicemail solution within Cisco’s collaboration suite of products

Cisco User Connect Licensing (CUCL) Cisco User Connect Licensing is a Cisco licensing type that was designed for smaller voice-only networks.

Cisco Webex Cloud A secure cloud team collaboration platform that works with devices and apps to enable better teamwork for every worker.

Cisco Webex Cloud A secure cloud team collaboration platform that works with devices and apps to enable better teamwork for every worker.

Cisco Webex Control Hub A web-based, intuitive, single-pane-of-glass management portal that enables you to provision, administer, and manage Cisco Webex services and Webex Hybrid Services, such as Hybrid Call Service, Hybrid Calendar Service, Hybrid Directory Service, and Video Mesh.

Cisco Webex Control Hub Cisco Webex Control Hub offers a holistic view of all your Cisco Webex services. Manage your services and users, provision devices, view detailed analytics and reporting, and configure security and compliance policies.

Cisco Webex Control Hub Cisco Webex Control Hub offers a holistic view of all your Cisco Webex services. Manage your services and users, provision devices, view detailed analytics and reporting, and configure security and compliance policies.

Cisco Webex A secure cloud team collaboration platform that works with devices and apps to enable better teamwork for every worker.

CLI Command Line Interface is a text-based command structure that allows an administrator to interact with a system. CLI can be used over an IP connection or through a console connection.

CollabEdge Validator Tool A part of the CSA tool set used to simulate a Jabber client sign-in process to validate an MRA deployment and provide feedback on the results.

Collaboration Endpoint (CE) Collaboration Endpoint software that comes preloaded onto DX, MX, SX and WebEx endpoints. This software is based on the legacy TC software.

Collaboration Solutions Analyzer (CSA) Collaboration Solutions Analyzer is a tool set that can be provided by TAC to help troubleshoot an MRA solution.

Comma-Separated Values (CSV) Comma-Separated Values is a simple file format used to store tabular data, such as a spreadsheet or database. Files in the CSV format can be imported to and exported from programs that store data in tables, such as Microsoft Excel or OpenOffice Calc.

Comma-Separated Values (CSV) Comma-Separated Values is a simple file format used to store tabular data, such as a spreadsheet or database. Files in the CSV format can be imported to and exported from programs that store data in tables, such as Microsoft Excel or OpenOffice Calc.

Comma-Separated Values (CSV) Comma-Separated Values is a simple file format used to store tabular data, such as a spreadsheet or database. Files in the CSV format can be imported to and exported from programs that store data in tables, such as Microsoft Excel or OpenOffice Calc.

CPL Call Processing Language is a machine generated programing language that is often used in telephony to create calling behavior within a PBX or Telco environment.

CPL Call Processing Language is used for implementing more complex policy decisions and is designed as a machine-generated language.

CRL Certificate Revocation List is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted.

CSR Certificate Signing Request is a template used to submit information to a CA so that a certificate can be signed.

CUCM Cisco Unified Communications Manager is a Cisco Call control server that supports SIP devices and many different call features.

CUCM Cisco Unified Communications Manager is a Cisco Call control server that supports SIP devices and many different call features.

Data Loss Prevention (DLP) Data Loss Prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data. Organizations use DLP to protect and secure their data and comply with regulations.

Default Call Bandwidth This bandwidth setting is not a limitation. Some endpoints allow the internal bandwidth setting to be auto negotiated. If one of those endpoints were to place a call and not specify the desired bandwidth, the Expressway will implement whatever limit has been established here. The default value is 384 kbps, but this setting can be changed to whatever limit is desired.

Default Subzone a logical group within the Local Zone where all endpoints register to by default.

Default Zone the default logical connection into and out of the Local Zone

Demilitarized Zone (DMZ) Demilitarized Zone is a parameter network that exits outside an organization’s main corporate network, which acts as a buffer for services that are public facing, such as the Expressway Edge.

Diffie-Hellman Key Exchange A method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols.

Digest Authentication mechanism built into the SIP protocol.

Directory Expressway The directory Expressway is a designation given to an Expressway in a Hierarchical Video Network with a Structured Dial Plan model. The directory Expressway essentially acts as a call distribution point between other expressways that each represent a different collection of registered endpoints within a single location.

Directory Number (DN) Directory Number is a numeric dialing pattern used on the CUCM. DNs are assigned to lines on phones and essentially become the phone number for that phone.

Distinguished Encoding Rules (DER) encoded format Distinguished Encoding Rules encoded format is a binary format used with certificates.

DMZ Demilitarized Zone is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet.

DNS Domain Name Server is a type of service that allows URL addresses to be used in place of IP addresses. DNS will resolve the URLs to their IP address mapping.

DNS Domain Name Server is a type of service that allows URL addresses to be used in place of IP addresses. DNS will resolve the URLs to their IP address mapping.

Domain Name Server (DNS) Zone Trunk used for communication between the Expressway and a Domain Name Server (DNS).

Domain Name Server (DNS) Domain Name Server is a type of service that allows URL addresses to be used in place of IP addresses. DNS will resolve the URLs to their IP address mapping.

Domain Name Server (DNS) Domain Name Server is a type of service that allows URL addresses to be used in place of IP addresses. DNS will resolve the URLs to their IP address mapping.

Domain Name System (DNS) Domain Name System is a distributed database linking domain names to IP addresses.

Domain Validation (DV) Certificates Domain Validation Certificates are where the CA only checks the right of the applicant to use a specific domain name. No company identity information is vetted and no information is displayed other than encryption information within the Secure Site Seal.

Downspeed Mode A setting that is used to down speed calls on the Expressway. The two settings for Downspeed Mode are Downspeed per call mode and Downspeed total mode.

Downspeed Per Call The per call mode pertains to bandwidth down speeding for each individual call attempt, and can be set to On or Off.

Downspeed Total The Total mode pertains to bandwidth down speeding for all call attempts, and can be set to On or Off.

DTMF Dual-tone Multi-Frequency signaling is an in-band communications system that has been used for many years by telephone companies, which allows the end-user to communicate by pressing keys on their phone.

Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol is an open-source protocol used by network devices to automatically discover network addressing information so that communication across the network is possible. The DHCP process is a four-step process that involves Discovery, Offer, Request and Acknowledgement.

E.164 Alias A 1-15 digit numeric number commonly used with the H.320 and H.323 standards.

E.164 alias Numeric only values containing 1-15 digits that are assigned to an endpoint. They work in the same manner as any phone number would in a typical telephony environment.

E.164 Numeric only values containing 1-15 digits that are assigned to an endpoint. They work in the same manner as any phone number would in a typical telephony environment.

Endpoint An audio only, or audio and video capable device used for communication.

ENUM E.164 Number Mapping is a way of using DNS NAPTR (Name Authority PoinTeR) records to convert E.164 numbers into routable URIs. ENUM is defined in RFC3761.

Enumerated Dialing (ENUM) Zone ENUM stands for Enumerated Dialing. This trunk type can be used for routing calls between E.164 aliases and URIs. An ENUM Server can be built in any DNS Server or can be configured as a separate entity.

Enumerated Dialing (ENUM) Stands for Enumerated Dialing, which is an E.164 alias number mapping system used on DNS servers.

Extended Validation (EV) Certificates Extended Validation Certificates are where the Certificate Authority (CA) checks the right of the applicant to use a specific domain name and in addition it conducts a thorough vetting of the organization.

Extensible Messaging and Presence Protocol (XMPP) Extensible Messaging and Presence Protocol, a set of open technologies for instant messaging, presence, multi-party chat, voice and video calls, collaboration, lightweight middleware, content syndication, and generalized routing of XML data.

FindMe ID Alias assigned to a user account in the Expressway that initiates the FindMe search within the Cisco Expressway. The FindMe ID must be a unique alias that is not assigned to another endpoint.

FindMe Trademarked term that describes a call forwarding feature within the Cisco Expressways.

Firewall Firewalls can be a software or hardware device designed to block unsolicited incoming requests from outside a private networked environment

Firewall The purpose of a firewall is to control IP traffic entering your network. Firewalls generally block unsolicited incoming requests, meaning that any communication originating from outside your network will be prevented. However, firewalls can be configured to allow outgoing requests to certain trusted destinations, and to allow responses from those destinations. Allowing traffic in both directions prevents the firewall from doing its job. Therefore, a firewall exists to protect the inside of a corporate network from outside attack.

Firewall The purpose of a firewall is to control IP traffic entering your network. Firewalls generally block unsolicited incoming requests, meaning that any communication originating from outside your network will be prevented. However, firewalls can be configured to allow outgoing requests to certain trusted destinations, and to allow responses from those destinations. Allowing traffic in both directions prevents the firewall from doing its job. Therefore, a firewall exists to protect the inside of a corporate network from outside attack.

Flex The Cisco Collaboration Flex Plan entitles people to use Cisco’s industry-leading collaboration tools with one simple subscription-based offer. It helps with transitions to the cloud, and investment protection, by including cloud, premises, hosted and hybrid deployments, with the flexibility to use them all.

FQDN Fully Qualified Domain Name is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone.

Fully Qualified Domain Name (FQDN) Fully Qualified Domain Name is a URL that is registered to some database and therefore can be qualified as a valid domain. Public domain are registered to a public database, and SIP Servers contain a qualifying database for private domains.

Gatekeeper ReQuest (GRQ) Gatekeeper ReQuest is a RAS broadcast message initiated by an endpoint and used to locate a gatekeeper within the broadcast domain. The gatekeeper to respond will send a GCF, or Gatekeeper Confirm.

Gatekeeper Call control device used with H.323. Gatekeepers pervade registration, security and call control into an otherwise unsecure and uncontrolled environment.

Gatekeeper Call control device used with H.323. Gatekeepers pervade registration, security and call control into an otherwise unsecure and uncontrolled environment.

Google Calendar Time-management and scheduling calendar service developed by Google

H.225 H.225 is the ITU sub-standard for call setup under the H.323 umbrella standard. H.225 consists of RAS and Q.931 messaging.

H.225 H.225 is the ITU sub-standard for call setup under the H.323 umbrella standard. H.225 consists of RAS and Q.931 messaging.

H.235 Authentication mechanism build into the H.323 standard.

H.245 Process used in H.323 for Capability Set Exchange, Master/Slave Negotiation and Opening Logical Channels, or ports. H.245 is also responsible for Closing Logical Channels at the end of the call.

H.245 Process used in H.323 for Capability Set Exchange, Master/Slave Negotiation and Opening Logical Channels, or ports. H.245 is also responsible for Closing Logical Channels at the end of the call.

H.320 ITU umbrella standard for circuit-switched communication

H.320 ITU umbrella standard for circuit-switched communication

H.323 ID Because of this ability, an H.323 ID can be in the form of a URI. However, an H.323 ID is not a URI, because it is not dependent on the domain being a Fully Qualified Domain Name (FQDN).

H.323 ID Can use any combination of numbers, letters and/or special characters, but spaces are not allowed. Because of this ability, an H.323 ID can be in the form of a URI. However, an H.323 ID is not a URI, because it is not dependent on the domain being a Fully Qualified Domain Name (FQDN).

H.323 ITU umbrella standard for packet-switched communication

H.323 ITU umbrella standard for packet-switched communication

H.350 Communications standard used for LDAP messaging between a client and an LDAP server.

H.460.18 and H.460.19 ITU-T standard used for firewall traversal communication between a traversal client and traversal server. H.460.18/19 can only support the H.323 communication standard.

H.460.18/19 ITU-T standards for used for firewall and NAT traversal of audio and video media and signaling over UDP ports for RTP and RTCP packets.

Hair Pinning Also known as Toll Fraud, is a fraudulent action where someone will enter your network via IP and then hijack your PSTN to make toll calls at your company’s expense.

Hosted Collaboration Solution (HCS) Hosted Collaboration Solution is a cloud offering for Cisco collaboration through service providers.

Hosted Collaboration Solution (HCS) Hosted Collaboration Solution is a cloud offering for Cisco collaboration through service providers.

HTTP Hypertext Transfer Protocol is an application layer protocol for distributed, collaborative, hypermedia information systems and is the foundation of data communication for the Internet.

HTTP HyperText Transfer Protocol is an application layer protocol for distributed, collaborative, hypermedia information systems and is the foundation of data communication for the Internet.

HTTPS Reverse Proxy The Cisco MRA Reverse Proxy settings provide a mechanism to support visual voicemail access, contact photo retrieval, Cisco Jabber custom tabs and other data applications.

HTTPS Hypertext Transfer Protocol Secure is used for secure communication over computer networks and is widely used on the Internet. The communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL)

HTTPS HyperText Transfer Protocol Secure is used for secure communication over computer networks and is widely used on the Internet. The communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL)

Hybrid Calendar Service Easy to schedule and join meetings from any device, no matter where you are. Cisco Webex Hybrid Calendar Service supports Microsoft Exchange, Office 365, and Google Calendar.

Hybrid Message Service This service is ideal for organizations that have users on Cisco Webex who need to exchange messages with users on Cisco Unified Communications Manager IM and Presence (UCM IM&P) Service.

Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol is an application layer protocol for distributed, collaborative, hypermedia information systems and is the foundation of data communication for the Internet.

Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure is used for secure communication over computer networks and is widely used on the Internet. The communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL)

Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure is used for secure communication over computer networks and is widely used on the Internet. The communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL)

IM and Presence (IM&P) IM and Presence refers to the Cisco Unified Communications Manager IM and Presence Service that provides native standards-based, dual-protocol, enterprise instant messaging (IM) and network-based presence as part of Cisco Unified Communications.

IM and Presence (IM&P) IM and Presence refers to the Cisco Unified Communications Manager IM and Presence Service that provides native standards-based, dual-protocol, enterprise instant messaging (IM) and network-based presence as part of Cisco Unified Communications.

IM and Presence (IM&P) IM and Presence refers to the Cisco Unified Communications Manager IM and Presence Service that provides native standards-based, dual-protocol, enterprise instant messaging (IM) and network-based presence as part of Cisco Unified Communications.

IMP IM and Presence refers to the Cisco Unified Communications Manager IM and Presence Service that provides native standards-based, dual-protocol, enterprise instant messaging (IM) and network-based presence as part of Cisco Unified Communications.

Instant Messaging (IM) Instant Messaging is a text-based communications tool that allows real-time text messages to be sent over the internet.

Interactive Connectivity Establishment (ICE) Interactive Connectivity Establishment is not a NAT traversal protocol in and of itself. Rather, ICE is a framework capable of assessing the networked environment a request comes from, and can then act as either a STUN or TURN server on behalf of the client’s needs.

Internet Engineering Task force (IETF) Internet Engineering Task Force is an open standards organization that develops internet standards.

Internet Protocol version 4 (IPv4) Internet Protocol version 4 is an addressing system used to send communication packets across a packet-switched network. IPv4 addresses use a 32-bit binary numbering system divided into four octets made up of 8 bits, or 1 byte each.

Internet Protocol version 6 (IPv6) Internet Protocol version 6 is an addressing system originally designed to replace the IPv4 addressing system. IPv6 addresses use a 128-bit hexadecimal numbering system with 340 undecillion addresses.

Interworking A gateway function of the Expressway used to bridge communication when two dissimilar protocols are trying to communicate.

Interworking A gateway function of the Expressway used to bridge communication when two dissimilar protocols are trying to communicate.

ISDN Integrated Services Digital Network is similar to POTS, however the original analog signal is converted to digital format before its sent across a wire. That digital signal must be converted back to analog at the receiving phone.

ITU International Telecommunications Union is a specialized agency of the United Nations that is responsible for standardizing communication technologies.

Jabber Cisco Jabber is a feature rich soft client collaboration tool.

LDAP Lightweight Directory Access Protocol is a search protocol used most commonly for extracting user information from a corporate directory.

LDAP Lightweight Directory Access Protocol is a search protocol used most commonly for extracting user information from a corporate directory.

Lightweight Directory Access Protocol (LDAP) Lightweight Directory Access Protocol is a search protocol used most commonly for extracting user information from a corporate directory.

Links a logical connection between two Subzones or between a Subzone and a Zone.

Local Area Network (LAN) Local Area Network is a network within a single confined area.

Local Zone This is a logical representation of the Cisco Expressway itself, and all other logical components are defined by how they relate back to the Local Zone.

Locate Tool on the Cisco Expressway that operates just like the Search History log, except it only simulates a call.

Location Confirm (LCF) Location Confirm is the response sent in reply to the LRQ message confirming the location of the requested node.

Location Request (LRQ) Location Request is an H.323-based communication protocol used to request the location information of a node that is registered to a different server. Although LRQs are based on the H.323 standard, they are used by SIP communication as well.

Log Analysis Tool A part of the CSA tool set used to analyze logs that were collected on a Cisco Expressway to help identify issues with an MRA setup.

Loop Back This is a call routing error that can occur when a call request that has been sent out is somehow sent back to the requesting server.

Loop Detection A setting on the Cisco Expressway that prevents search loops occurring. Each search has a serial number and tag. The serial number is unique to the search but the tag information is passed with a location request. The Expressway uses the tag to identify a call that has already been received and hence ignored, preventing loop back errors.

MD5 Message Digest Algorithm 5, which is a messaging system that uses a time stamp from a time server as part of its encryption key.

Membership Rules Rules created on the Expressway that determine to what Subzone an endpoint will register based on either the Subnet Mask or an alias pattern match.

Microsoft Active Directory Lightweight Directory Services (AD LDS) Microsoft Active Directory Lightweight Directory Services is an independent mode of Active Directory that provides dedicated directory services for applications.

Microsoft Exchange Software installed on Microsoft Exchange Server that provides the back end to an integrated system for email, calendaring, messaging, and tasks.

Mobile and Remote Access (MRA) Mobile and Remote Access is a Cisco feature that uses the Expressway series devices to proxy registrations to the CUCM from endpoints outside the corporate network without the use of a VPN.

Mobile and Remote Access (MRA) Mobile and Remote Access is a Cisco feature that uses the Expressway series devices to proxy registrations to the CUCM from endpoints outside the corporate network without the use of a VPN.

Mobile and Remote Access (MRA) Mobile and Remote Access is a Cisco feature that uses the Expressway series devices to proxy registrations to the CUCM from endpoints outside the corporate network without the use of a VPN.

Mobile and Remote Access (MRA) Mobile and Remote Access is a VPN-less solution that allows endpoints and soft client located outside a corporate network to register to a call control devices, such as the CUCM, located inside the network without a VPN. It also provides call capabilities into and out from the internal network though the firewall traversal components.

MRA Mobile and Remote Access is a Cisco feature that uses the Expressway series devices to proxy registrations to the CUCM from endpoints outside the corporate network without the use of a VPN

Multiprotocol Label Switching (MPLS) Multiprotocol Label Switching is a transport protocol that uses “Labels” to route traffic rather than network addresses. Packets are forwarded based on the content of the label, so deciphering between voice, video and data is simple. It is protocol agnostic, so it will function in circuit-switched or packet-switched networks.

Name Authority Pointer (NAPTR) Name Authority Pointer is a record in a DNS server that can be used to convert E.164 aliases into routable URIs.

Name Authority Pointer record (NAPTR) Name Authority Pointer record is a DNS record that rewrites a domain name (into a URI or other domain name for example)

NAT Network Address Translation is a process of masquerading private IP addresses with public IP addresses

Neighbor Zone A trunk on the Cisco Expressway that is used to communicate with other communication servers within the same LAN or WAN.

Network Address Translation (NAT) Network Address Translation is a process of masquerading private IP addresses with public IP addresses

Network Address Translation (NAT) Network Address Translation is an IETF protocol designed to masquerade private IP addresses with public IP addresses so that communications can be sent across the public internet space from a private network.

Network Interface Card (NIC) Network Interface Card is computer card on a computing device that allows that device to access a network over ethernet.

NT LAN Manager (NTLM) NT LAN Manager is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager, an older Microsoft product.

NTP Network Time Protocol is a protocol for synchronizing computer system clocks over IP networks. NTP has a hierarchical organization that is based on clock strata. Stratum 0 is an extremely precise clock source, such as an atomic clock or radio clock. A stratum 1 server is directly connected to a stratum 0 clock and can provide time information to other (stratum 2) devices, which in turn serves stratum 3 devices.

NTP Network Time Protocol is a set of standards used to provide timestamp information to electronic equipment so that a universal time synchronization can be established.

OCSP Online Certificate Status Protocol is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is as an alternative to certificate revocation lists (CRL), specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI).

Office 365 Line of subscription services offered by Microsoft as part of the Microsoft Office product line

One Button to Push (OBTP) One Button to Push is a Cisco videoconferencing feature to easily enable the joining of a video session.

One Button to Push (OBTP) One Button to Push is a feature to enable the “big green Join button”. Can be utilized with Hybrid Calendar Service or Cisco TMS.

OpenLDAP Open-source LDAP platform that was originally created by Oracle, who made the source code publicly available for businesses to use freely.

Optimal Call Routing Optimal Call Routing is a function on Cisco Expressways that limits the number of hops that occur for passing call setup signaling. This in turn also reduces the number of call licenses needed to host calls within an Expressway environment.

Organization Validation (OV) Certificates Organization Validation Certificates are where the CA checks the right of the applicant to use a specific domain name and conducts some vetting of the organization. Additional vetted company information is displayed to customers when clicking on the Secure Site Seal, giving enhanced visibility in who is behind the site and associated enhanced trust.

PAK Product Authorization Key is not a license key, rather it is product key that allows a customer to register a product they purchased to Cisco, so that they can generate the license keys for their product.

Pipe A Pipe is a bandwidth limitation between two Subzones or between a Subzone and a Zone that is applied to Links.

Port Address Translation (PAT) Port Address Translation works similar too NAT but uses ports to map communication between a private IP address and a public IP address.

POSIX The Portable Operating System Interface is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems.

Private Branch Exchange (PBX) Private Branch Exchange operates in a similar fashion to the Automatic Telephone Exchange, only the purpose of a PBX is to route calls within a business exclusively. PBXs can also connect to the outside world over the public telephone network, but it operates on the same circuit switched network using POTS or ISDN.

Private Branch Exchange (PBX) Private Branch Exchange operates in a similar fashion to the Automatic Telephone Exchange, only the purpose of a PBX is to route calls within a business exclusively. PBXs can also connect to the outside world over the public telephone network, but it operates on the same circuit switched network using POTS or ISDN.

Product Authorization Key (PAK) Product Authorization Key is not a license key, rather it is product key that allows a customer to register a product they purchased to Cisco, so that they can generate the license keys for their product.

Public Key Infrastructure (PKI) Public Key Infrastructure is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Public Key Infrastructure (PKI) Public Key Infrastructure is an encryption solution that works by using two different cryptographic keys: a public key and a private key. Whether these keys are public or private, they encrypt and decrypt secure data to allow for secure communication between two devices.

Public Switched Telephone Network (PSTN) Public Switched Telephone Network is a circuit-switched telephony network that encompasses the globe.

Public Switched Telephone Network (PSTN) Public Switched Telephone Network is a circuit-switched telephony network that encompasses the globe.

public switched telephone network (PSTN) The public switched telephone network (PSTN) provides infrastructure and services for public telecommunication.

Q.931 Contains the source and destination IP address, in hexadecimal format, and any crypto-hash token if the call is to be encrypted. Q.931 is also responsible for the Alerting and Connect messages sent from the destination endpoint.

QoS Quality of Service refers to any technology that manages data traffic to reduce packet loss, latency, and jitter on a network. QoS controls and manages network resources by setting priorities for specific types of data on the network.

Quality of Service (QoS) Quality of Service refers to any technology that manages data traffic to reduce packet loss, latency, and jitter on a network. QoS controls and manages network resources by setting priorities for specific types of data on the network.

RAS Registration, Admission, Status, is an ITU created communication protocol that identifies all messaging schemes between any device and a Gatekeeper using H.323.

RCF Registration Confirm is an H.323 message sent from a Gatekeeper to a device confirming the registration was successful.

Real-time Transport Control Protocol (RTCP) Real-time Transport Control Protocol is a protocol used over UDP to carry real-time signaling traffic.

Real-time Transport Protocol (RTP) Real-time Transport Protocol is a protocol used over UDP to carry real-time media traffic.

Regex A regular expression is a sequence of characters that define a search pattern.

Registration Authentication This is an authentication service used on the Expressway to control endpoint registration based on registration credentials presented by an endpoint and challenged against an authoritative database.

Registration Conflict Policy Security policy automatically enabled on the Cisco Expressway the prevents duplicate H.323 aliases from registering at the same time. Conflict Policy can be configured as Reject, which is the default value, or Overwrite.

Registration Request (RRQ) Registration Request is a RAS initiated by an endpoint to attempt to register to a Gatekeeper. The gatekeeper will respond with either a RCF, Registration Confirm, or an RRJ, Registration Reject.

Registration Restriction Policy Security Policy that can be used on the Expressway to control both H.323 and SIP endpoint registrations using either an Allow List or a Deny List

Registration, Admission, Status (RAS) Registration, Admission, Status, is an ITU created communication protocol that identifies all messaging schemes between any device and a Gatekeeper using H.323.

Regular Expression (Regex) Abbreviation for Regular Expression, which is a codified term used to describe a set of characters that can represent a larger string of numbers letters or special character so that they can be manipulated or changed. Regex are often used in Telephony to create different call routing and call behavior.

Regular expressions Also called regex, a regular expression is a sequence of characters that define a search pattern. Usually, such patterns are used by string-searching algorithms for “find” or “find and replace” operations on strings, or for input validation.

Request for Comments (RFC) Request for Comments is a type of publication from the technology community that describes methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

Request In Progress (RIP) Request In Progress is a RAS message sent by a Gatekeeper that informs the H.323 endpoint that a request is being processed.

RFC Request for Comments is a type of publication from the technology community that describes methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

Rich Media Session (RMS) Rich Media Session Licenses are a type of licenses that can be installed on the Expressway Core and Expressway Edge servers. These licenses allow for B2B calling and SIP to Microsoft interworking capabilities.

RIP Request in Progress is an H.323 message sent from a Gatekeeper to a device trying to register used to inform the device that the request was received and is being processed.

Rivest-Shamir-Adleman (RSA) Rivest-Shamir-Adleman is a public-key cryptographic system used for secure data transmission.

RMS Rich Media Session Licenses are a type of licenses that can be installed on the Expressway Core and Expressway Edge servers. These licenses allow for B2B calling and SIP to Microsoft interworking capabilities.

Root CA Certificate The Root CA certificate establishes a trusted chain the begins at the Root CA, through the Root CA certificate and ending at the certificate that was signed.

Root CA The Root CA is the certificate server that generates, signs and authenticates certificates used for authentication. This is the authority for all certificates signed by it.

Routing Prefix This type of prefix is configured on a gateway or bridge and registers to an H.323 Gatekeeper. It is used to route all calls to that server regardless of the following digits.

RRJ Registration Reject is an H.323 message sent from a Gatekeeper to a device denying registration.

RRQ Registration Confirm is an H.323 message sent from a device to a Gatekeeper requesting registration.

RTCP Real-time Transport Control Protocol is a protocol used over UDP to carry real-time signaling traffic.

RTCP Real-time Transport Control Protocol is a protocol used over UDP to carry real-time signaling traffic.

RTCP Real-time Transport Control Protocol is a protocol used over UDP to carry real-time signaling traffic.

RTP Real-time Transport Protocol is a protocol used over UDP to carry real-time media traffic.

RTP Real-time Transport Protocol is a protocol used over UDP to carry real-time media traffic.

RTP Real-time Transport Protocol is a protocol used over UDP to carry real-time media traffic.

Search History Log on the Cisco Expressway that allows administrators to view and troubleshoot call attempts by examining how the Expressway invoked the Call Processing Order.

Search Rule A dialing rule created on the Cisco VCS and Cisco Expressway servers that determines what Zones can be search during a call setup and the order Zones are searched. Search Rules match destination aliases based on pattern matches, and can also be configured to transform a destination alias for one specific search.

Secure Hypertext Transfer Protocol (HTTPS) Secure Hypertext Transfer Protocol is used for secure communication over computer networks and is widely used on the Internet. The communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL)

Secure Socket Layer (SSL) Secure Socket Layer is a legacy cryptographic protocols that provides communications security over a computer network for TCP and UDP traffic. SSL has been replaced by the more secure TLS.

Service Record (SRV) Service Record is another type of DNS record that is used to search specific services on designated ports and using specific protocols.

Service record (SRV) The DNS Service record is a location service within DNS that can be used to identify protocols, port numbers and hostnames of servers for particular services.

Session Description Protocol (SDP) Session Description Protocol is used during SIP call setup to exchange capabilities and identify UDP ports to be used.

Session Initiation Protocol (SIP) Session Initiation Protocol is an IETF signaling protocol used for real-time sessions, such as voice, video and instant messaging.

Session Traversal Utilities for NAT (STUN) Session Traversal Utilities for NAT is an IETF NAT traversal solution designed for an A-symmetric network. STUN servers are used to assign a port to a client but are not involved with the sending and receiving of packets.

SIP Proxy Function of the SIP Server used to connect devices in voice or video calls.

SIP Registrar Function of the SIP Server used to map SIP URI addresses to IP addresses for SIP endpoints when they register.

SIP Registrar Function of the SIP Server used to map SIP URI addresses to IP addresses for SIP endpoints when they register.

SIP Server The call control device for SIP voice and video systems.

SIP Session Initiation Protocol is an IETF signaling protocol used for real-time sessions, such as voice, video and instant messaging.

SIP Registrar Function of the SIP Server used to map SIP URI addresses to IP addresses for SIP endpoints when they register

SIP Session Initiation Protocol is an IETF signaling protocol used for real-time sessions, such as voice, video and instant messaging.

SIP Session Initiation Protocol is an IETF signaling protocol used for real-time sessions, such as voice, video, and instant messaging.

SNI Server Name Indication is an extension to the Transport Layer Security (TLS) computer networking protocol by which a client indicates which hostname it is attempting to connect to at the start of the handshaking process.

SRTP Secure Real-time Transport Protocol is a secure protocol over TLS used over UDP to carry real-time media traffic.

SRV The DNS Service record is a location service within DNS that can be used to identify protocols, port numbers and hostnames of servers for particular services.

Subnet Mask A networking parameter that defines a range of IP addresses.

Subzone Logical groupings of registered devices, such as endpoints, conference bridges, gateway and so on, for the purposes of bandwidth management and access control.

Symmetric Cryptography Process of negotiating between a server and client the details as to which encryption algorithm and cryptographic keys to use before the first byte of data is transmitted. Identification is usually in the form of digital “certificates” that contains the server name, the trusted certificate authority (CA), and the server’s public encryption key.

Symmetric Networks Restricted networks with a single entry or exit point. All traffic must use this single point of access to enter or leave the network with every transmission.

TCP Transmission Communication Protocol is a routing protocol that ensures communication by use of acknowledgements. If an acknowledgement is not received, the packet will be re-transmitted.

TCP Transmission Communication Protocol is a routing protocol that ensures communication by use of acknowledgements. If an acknowledgement is not received, the packet will be re-transmitted.

Telepresence Management Suite – Provisioning Extension (TMS-PE) Telepresence Management Suite – Provisioning Extension is an applet that can be added onto the TMS software. This applet will allow TMS to perform many provisioning functions, such as provisioning FindMe for users.

Telepresence Management Suite (TMS) Telepresence Management Suite is a management software solution for Telepresence endpoints and infrastructure. It can only be installed in a Microsoft Windows Server, and can be used to schedule conference calls, create and manage phonebooks, and perform many other duties.

Telepresence Management Suite (TMS) Telepresence Management Suite is a management solution for Cisco Collaboration that runs on a Microsoft Windows Server.

Telepresence Management Suite (TMS) Telepresence Management Suite is a management solution for Cisco Collaboration that runs on a Microsoft Windows Server.

Time to Live Setting within the Cisco Expressway that determines how long an H.323 registration will remain in the database before the device will need to renew the registration. The default value is 1800 seconds.

TLS Verify Also known as Mutual TLS, this is a form of TLS that requires certificate authentication from both the client and the server before communication can be established.

TLS Transport Layer Security is a cryptographic protocol that provides communication security over a computer network for TCP and UDP traffic.

TLS Transport Layer Security is a cryptographic protocol that provides communication security over a computer network for TCP and UDP traffic.

TLS Transport Layer Security is a cryptographic protocol that provides communication security over a computer network for TCP and UDP traffic.

TMS Telepresence Management Suite is a management solution for Cisco Collaboration that runs on a Microsoft Windows Server.

Transform a rule that, when applied, will change an alias based on the criteria it has been configured to change. Transforms can be applied pre-search or during a Search Rule.

Transmission Communication Protocol (TCP) Transmission Communication Protocol is a routing protocol that ensures communication by use of acknowledgements. If an acknowledgement is not received, the packet will be re-transmitted.

Transmission Communication Protocol (TCP) Transmission Communication Protocol is a routing protocol that ensures communication by use of acknowledgements. If an acknowledgement is not received, the packet will be re-transmitted.

Transport Layer Security (TLS) Transport Layer Security is a cryptographic protocol that provides communication security over a computer network for TCP and UDP traffic.

Transport Layer Security (TLS) Transport Layer Security is a cryptographic protocol that provides communication security over a computer network for TCP and UDP traffic.

Transport Layer Security (TLS) Transport Layer Security is a secure layer of the TCP protocol that uses encryption to scramble data being shared between nodes.

Traversal Chaining This is a more secure means of traversing firewalls when one Expressway is placed within a DMZ. As well as acting as a traversal server, an Expressway-E can act as a traversal client to another Expressway-E. If you chain two Expressway-Es the first Expressway-E is a traversal server for the Expressway-C. That first Expressway-E is also a traversal client of the second Expressway-E. The second Expressway-E is a traversal server for the first Expressway-E.

Traversal Client Zone The zone created on the Traversal Client, which is the Expressway Core in a typical Cisco collaboration environment, used to establish communication with the Traversal Server. Some Cisco endpoints can also be a Traversal Client, as well as the Expressway Edge. Also, the legacy Cisco VCS Control and VCS Expressway can support the role of Traversal Client.

Traversal Client Zone Type of traversal zone used to initiate a traversal communication with the traversal server zone.

Traversal Client Zone Zone type created on the Expressway Core that is used to initiate a traversal communication for media traversal through the firewall during voice and video calls. Traversal Client Zones can sometimes be created on the Expressway Edge Server.

Traversal Server Zone The zone created on the Traversal Server, which is the Expressway Edge in a typical Cisco collaboration environment, used to proxy communication messages to the internal network through the Traversal Client. The legacy Cisco VCS Expressway can also support the role of Traversal Server.

Traversal Server Zone Type of traversal zone used to securely send traversal media into a corporate network from outside a firewall.

Traversal Server Zone Zone type created on the Expressway Ede that is used to receive a traversal communication for media traversal through the firewall during voice and video calls. Traversal Client Zones can only be configured on the Expressway Edge.

Traversal Subzone This Subzone is different from all other Subzones, because it is only used to manage and throttle bandwidth for any Traversal calls through the Expressway. Devices registering to the Expressway will never register to the Traversal Subzone.

Traversal Using Relays around NAT (TURN) Traversal Using Relays around NAT is an IETF NAT traversal solution designed for a symmetric network. TURN servers are used to assign a port to a client and handle the relay of all packets sent and received.

Traversal Zone Traversal Zones are used for communication through a Firewall. An Expressway Core and an Expressway Edge are required to set up a traversal communication through a Firewall. The Expressway Core needs to be located inside the firewall while the Expressway Edge needs to be located outside firewall or in a DMZ.

Traversal Zone Traversal Zones are used for communication through a Firewall. Two Expressways are required to set up a traversal communication. The Expressway Core needs to be located inside the firewall, while the Expressway Edge needs to be located outside firewall.

Traversal Term use to describe movement from one side to another. Firewall traversal describes moving data from one side of a firewall to another. NAT traversal describes moving data from one side of a NAT server to another.

Traversals Using Relays around NAT (TURN) Traversals Using Relays around NAT connects clients behind a NAT to a single peer. Its purpose is to provide the same protection as that created by symmetric NATs and firewalls. Symmetric NATs use dynamic ports that often change. Therefore, the TURN server acts as a relay so that any data received is forwarded on to the client, and port allocation can be updated on the fly. The client on the inside can also be on the receiving end, rather than the sending end, of a connection that is requested by a client on the outside.

UDP User Datagram Protocol is a fast routing protocol that does not use acknowledgements to confirm packet delivery.

UDP User Datagram Protocol is a fast routing protocol that does not use acknowledgements to confirm packet delivery.

Unified Communications (UC) Unified Communications is a set of products that provides a consistent unified user interface and experience across multiple devices and media types.

Unified Communications Manager (UCM) Cisco Unified Communications Manager is a call control server that supports SIP devices and many different call features.

Unified Communications Traversal Zone This is a special type of traversal zone on Expressway servers that are used for MRA deployments. This type of traversal zone requires TLS Verify be used for the highest security in communications.

Unified Communications Traversal Zone This type of Traversal Zone is only used on the Expressway Core and Expressway Edge in conjunction with a Mobile Remote Access deployments.

Uniform Resource Indicator (URI) Uniform Resource Indicator is a string of characters that identifies a particular resource. URIs typically take the form of User@FQDN.

Uniform Resource Locator (URL) Uniform Resource Locator is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. URLs typically take the form of User.FQDN

URI Uniform Resource Indicator is a string of characters that identifies a particular resource. URIs typically take the form of User@FQDN.

URI Uniform Resource Indicator is a string of characters that identifies a particular resource. URIs typically take the form of User@FQDN.

User Data Services (UDS) The User Data Services API is a REST-based set of operations that provide authenticated access to user resources and entities such as user’s devices, subscribed services, speed dials, and much more from the Unified Communication configuration database.

User Datagram Protocol (UDP) User Datagram Protocol is a fast routing protocol that does not use acknowledgements to confirm packet delivery.

User Datagram Protocol (UDP) User Datagram Protocol is a fast routing protocol that does not use acknowledgements to confirm packet delivery.

User Policy Also known as FindMe, this call forward tool is similar to Single Number Reach. When one alias is dialed, the call will be sent out to other aliases based on how each user account is configured.

VCS Video Communications Sever is a Cisco call control server that was acquired with Tandberg, and supports firewall and NAT traversal.

Video Communications Server (VCS) Video Communications Server is a call control server originally created by a company called Tandberg, who was acquired by Cisco. This product is the model from which the Expressway Core and Edge servers were built.

Video Communications Server (VCS) Video Communications Server is a Cisco call control server that was acquired with Tandberg, and supports firewall and NAT traversal. Its successor is the Cisco Expressway series.

Video Communications Sever (VCS) Video Communications Sever is a Cisco call control server that was acquired with Tandberg, and supports firewall and NAT traversal.

Virtual Local Area Network (VLAN) Virtual Local Area Network are virtual partitions at Layer 2 of the network used to decouple traffic, and logically group data packets being sent across the network. VLANs can be used for QoS.

Virtual Private Network (VPN) Virtual Private Network is a protocol used to connect two autonomous networks across a WAN.

Voice over IP (VoIP) Voice over IP is an Audio technology that allows voice communication to be broken down into packets and sent across an IP network.

VoIP Voice over IP is an Audio technology that allows voice communication to be broken down into packets and sent across an IP network.

VPN Virtual Private Network is a protocol used to connect two autonomous networks across a WAN.

Webex Zone Introduced in version X8.11.4, the Webex Zone not only automates and simplifies Hybrid Call Service configuration, but it is also a single zone entry that ensures that all calling and meetings solutions under the Webex banner precisely route to the correct cloud microservices and are handled accordingly.

Webex Cisco Webex is a secure cloud collaboration platform that works with devices and apps to deliver video conferencing, calling, and team collaboration.

WebSocket WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection. The WebSocket protocol was standardized by the IETF as RFC 6455 in 2011, and the WebSocket API in Web IDL is being standardized by the W3C.

Wide Area Network (WAN) Wide Area Network is a network topology that covers a wider geographical area than a LAN. WANs are typically regionally located, but are not restricted to this parameter.

Wide Area Network (WAN) Wide Area Network is a private network that spans a campus or multiple locations. Each location in a WAN is linked through some type of tunneling protocol, such as a VPN.

XCP “Universal Measurement and Calibration Protocol” is a network protocol originating from ASAM for connecting calibration systems to electronic control units, ECUs. It enables read and write access to variables and memory contents of microcontroller systems at runtime.

XMPP Extensible Messaging and Presence Protocol, a set of open technologies for instant messaging, presence, multi-party chat, voice and video calls, collaboration, lightweight middleware, content syndication, and generalized routing of XML data.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.161.222