
509
Programming Operations Guide
Chapter 19
Configuring private networks
This section describes the basic requirements for private networking Business Communications
Managers. As well, four simple private networks are described.
Private networking using the MCDN protocol is described in
“Configuring private networks with
SL-1 MCDN” on page 523
and
“Configuring ETSI QSIG and DPNSS network services” on page
547
.
Different systems support different trunk types, depending on the market profile installed on the
system. The examples in this chapter are based on the trunks available for North American-based
profiles. Refer to
“Media bay module availability by region” on page 837
for more information
about which trunks are support in which profile.
This section includes information about:
•
“Private network programming parameters” on page 509
•
“Using routing to create networking” on page 512
•
“Using shared line pools to create a network” on page 516
•
“PRI networking using Call-by-Call services” on page 519
TIPS:
Most of the diagrams in this section use the BCM1000 base unit. The BCM400 and
BCM200 can be used in any of these situations, as well. Keep in mind that the BCM200 only
supports two PECs, and therefore, has less processing capacity than the other two units. This
affects both networking and IP telephony deployment.
Private network programming parameters
The following section provides an overview of the values in the system that affect private
networking, including:
•
“Private networking protocols” on page 510
•
“Keycode requirements” on page 510
•
“Remote access to the network” on page 510
•
“Lines used for networking” on page 511
•
“Other programming that affects private networking” on page 511
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...