Технические ссылки для Cisco Cisco Agent Desktop 9.0
Examples of Deployment Planning
November 26, 2013
49
The preferred capture method is desktop capture because it is the easiest to
configure and deploy. Since they don't have any mobile agents and their agents have
PCs daisy-chained with their IP phones, we should be able to use desktop monitoring
for all the agents.
configure and deploy. Since they don't have any mobile agents and their agents have
PCs daisy-chained with their IP phones, we should be able to use desktop monitoring
for all the agents.
An alternate approach is to use network recording (if ABC Company purchases a Cisco
recording solution as well as CAD). Configuration is more complex on the Unified CM,
but it works well, and is a better choice if there are any issues with NICs on agent
desktops not working correctly in promiscuous mode.
recording solution as well as CAD). Configuration is more complex on the Unified CM,
but it works well, and is a better choice if there are any issues with NICs on agent
desktops not working correctly in promiscuous mode.
In order to support the desktop capture method, we need to verify that the hardware
supports the method.
supports the method.
Since the IP phones and PCs are already daisy-chained, we know that the IP phones
have a second network port and can be configured in the Unified CM to send their
voice traffic down to the agent's PC for capture.
have a second network port and can be configured in the Unified CM to send their
voice traffic down to the agent's PC for capture.
The only other requirement we need to check is whether the NICs on the agents’ PCs
support promiscuous mode packet capturing. If the NIC is a known supported card
then we are finished. If the NIC is unknown to support promiscuous mode, we can run
tools to verify whether the NIC can capture in promiscuous mode. Assuming we find
that the NICs do support promiscuous mode packet capturing, we can deploy the
software using the desktop capture method for all agents.
support promiscuous mode packet capturing. If the NIC is a known supported card
then we are finished. If the NIC is unknown to support promiscuous mode, we can run
tools to verify whether the NIC can capture in promiscuous mode. Assuming we find
that the NICs do support promiscuous mode packet capturing, we can deploy the
software using the desktop capture method for all agents.
If we find that the agent phones do not support Unified CM monitoring and recording,
and the NICs do not support promiscuous mode packet capture, we have two choices:
and the NICs do not support promiscuous mode packet capture, we have two choices:
Figure 24.
ABC Company network diagram