background image

24

SmartWare Software Configuration Guide 

Table of Contents 

Configuring DTMF relay

 .............................................................................................................................574

Configuring RTP payload types

 ....................................................................................................................574

Configuring RTP payload type for transparent-clearmode

 ............................................................................575

Configuring RTP payload types for the g726-32k and g726-32k-cisco coders

 ..............................................575

Configuring RTP payload type for Cisco NSE

 ..............................................................................................575

Configuring Cisco NSE for Fax

 ....................................................................................................................575

Configuring the dejitter buffer (advanced)

 ....................................................................................................576

Enabling/disabling filters (advanced)

 .............................................................................................................578

Configuring Fax transmission

 .......................................................................................................................579

T.38 CED retransmission

 .............................................................................................................................582

T.38 No-Signal Retransmission

 ....................................................................................................................583

Fax bypass method

 ........................................................................................................................................583

Configuring fax failover

 ................................................................................................................................583

Configuring modem transmission

 .................................................................................................................584

Modem bypass method

 .................................................................................................................................584

Configuring the traffic class for Voice and Fax data

 ......................................................................................585

Configuring IP-IP codec negotiation

 .............................................................................................................585

Examples

.............................................................................................................................................................586

Home office in an enterprise network

 ...........................................................................................................586

Home office with fax

 ....................................................................................................................................588

Soft phone client gateway

 ..............................................................................................................................589

48

PSTN profile configuration

......................................................................................................................... 592

Introduction

........................................................................................................................................................593

PSTN profile configuration task list

....................................................................................................................593

Creating a PSTN profile

 ...............................................................................................................................593

Configuring the echo canceller

 ......................................................................................................................594

Configuring output gain

 ...............................................................................................................................594

49

SIP profile configuration

............................................................................................................................. 596

Introduction

........................................................................................................................................................597

SIP profile configuration task list

.........................................................................................................................597

Entering the configuration mode for a SIP profile

 .........................................................................................597

Mapping from a SIP disconnect cause

 ...........................................................................................................597

Mapping to a SIP cause

 .................................................................................................................................598

Mapping from a SIP redirection reason

 .........................................................................................................598

Mapping to a SIP redirection code

 ................................................................................................................598

50

Authentication Service

................................................................................................................................. 599

Introduction

........................................................................................................................................................600

Authentication Service configuration task list

......................................................................................................600

Creating an Authentication Service

 ...............................................................................................................600

Configuring a Realm

 .....................................................................................................................................601

Configuring the authentication protocol

 .......................................................................................................601

Creating credentials

 ......................................................................................................................................601

Configuration Examples

......................................................................................................................................601

Summary of Contents for SmartNode Series

Page 1: ...Release 5 1 Software Configuration Guide Sales Office 1 301 975 1000 Technical Support 1 301 975 1007 E mail support patton com URL www patton com Document Number 13211U8 006 Rev A Part Number 07MSWR51_SCG Revised February 6 2008 ...

Page 2: ...t designed or intended for use as critical components in human life support systems equipment used in hazardous environments or nuclear control systems Patton Electronics Company disclaims any express or implied warranty of fitness for such uses The information in this document is subject to change without notice Patton Electronics assumes no liabil ity for errors that may appear in this document ...

Page 3: ...uration 139 13 Link scheduler configuration 149 14 Serial port configuration 168 15 Frame Relay configuration 175 16 PRI port configuration 189 17 BRI port configuration 203 18 ISDN Overview 210 19 ISDN configuration 215 20 RBS configuration 223 21 DSL Port Configuration 228 22 Basic IP routing configuration 233 23 RIP configuration 240 24 Access control list configuration 251 25 SNMP configuratio...

Page 4: ...onfiguration 451 41 SIP call router services 519 42 Tone configuration 524 43 FXS port configuration 532 44 FXO port configuration 537 45 H 323 gateway configuration 541 46 Context SIP gateway overview 554 47 VoIP profile configuration 568 48 PSTN profile configuration 592 49 SIP profile configuration 596 50 Authentication Service 599 51 Location Service 602 52 VoIP debugging 615 A Terms and defin...

Page 5: ...rope Middle East and Africa EMEA 36 Warranty Service and Returned Merchandise Authorizations RMAs 37 Warranty coverage 37 Returns for credit 37 Return for credit policy 37 RMA numbers 37 Shipping instructions 37 1 System overview 38 Introduction 39 SmartWare embedded software 40 Applications 41 Carrier networks 41 Enterprise networks 42 LAN telephony 43 2 Configuration concepts 44 Introduction 45 ...

Page 6: ... listening port for the Telnet server 56 Disabling the Telnet server 56 Logging on 56 Selecting a secure password 57 Password encryption 58 Factory preset administrator account 58 Creating an operator account 58 Creating an administrator account 59 Displaying the CLI version 59 Displaying account information 59 Switching to another account 60 Checking identity and connected users 60 Command index ...

Page 7: ...n 82 Modifying the running configuration at the CLI 83 Modifying the running configuration offline 84 Deleting a specified configuration 85 Encrypted file download 86 Encrypted Configuration Download 86 Use Cases 87 7 Basic system management 89 Introduction 90 Basic system management configuration task list 90 Managing feature license keys 91 Setting system information 92 Setting the system banner...

Page 8: ...uring RIP 116 Configuring access control lists 117 Configuring quality of service QoS 117 10 IP interface configuration 118 Introduction 119 IP interface configuration task list 119 Creating an IP interface 119 Deleting an IP interface 120 Setting the IP address and netmask 121 Configuring a NAPT DMZ interface 121 ICMP message processing 122 ICMP redirect messages 122 Router advertisement broadcas...

Page 9: ...n task list 140 Entering the Ethernet port configuration mode 140 Configuring medium for an Ethernet port 140 Configuring Ethernet encapsulation type for an Ethernet port 141 Binding an Ethernet port to an IP interface 141 Multiple IP addresses on Ethernet ports 142 Configuring a VLAN 143 Configuring layer 2 CoS to service class mapping for an Ethernet port 144 Adding a receive mapping table entry...

Page 10: ...TP streams 163 Devoting the service policy profile to an interface 165 Displaying link arbitration status 166 Displaying link scheduling profile information 166 Enable statistics gathering 166 14 Serial port configuration 168 Introduction 169 Serial port configuration task list 169 Disabling an interface 169 Enabling an interface 170 Configuring the serial encapsulation type 171 Configuring the ha...

Page 11: ...4 Configuring PRI encapsulation 195 Create a Channel Group 196 Configuring Channel Group Timeslots 196 Configuring Channel Group Encapsulation 196 Entering HDLC Configuration Mode 197 Configuring HDLC CRC Type 197 Configuring HDLC Encapsulation 198 PRI Debugging 198 PRI Configuration Examples 199 Example 1 ISDN 200 Example 2 RBS without a channel group 200 Example 3 RBS with a channel group 200 Ex...

Page 12: ...SDN configuration task list 216 Enter Q 921 configuration mode 216 Configuring Q 921 parameters 216 Configuring Q 921 encapsulation 217 Enter Q 931 configuration mode 217 Configuring Q 931 parameters 218 Configuring Q 931 encapsulation 220 Debugging ISDN 220 ISDN Configuration Examples 221 20 RBS configuration 223 Introduction 224 RBS configuration task list 224 Enter RBS configuration mode 224 Co...

Page 13: ...P version 243 Specifying the receive RIP version 244 Enabling RIP learning 244 Enabling an interface to receive RIP 245 Enabling RIP announcing 245 Enabling RIP auto summarization 246 Specifying the default route metric 246 Enabling RIP split horizon processing 247 Enabling the poison reverse algorithm 247 Enabling holding down aged routes 248 Setting the RIP route expiry 248 Displaying RIP config...

Page 14: ...68 SNMP configuration task list 268 Setting basic system information 268 Setting access community information 270 Setting allowed host information 272 Specifying the default SNMP trap target 272 Displaying SNMP related information 273 Using the AdventNet SNMP utilities 273 Using the MibBrowser 274 Using the TrapViewer 275 Standard SNMP version 1 traps 277 SNMP interface traps 278 26 SNTP client co...

Page 15: ... Relay profile 300 Enable Disable DHCP Relay Agent 301 28 DNS configuration 302 Introduction 303 DNS configuration task list 303 Enabling the DNS resolver 303 Enabling the DNS relay 304 29 DynDNS configuration 306 Introduction 307 DynDNS configuration task list 307 Creating a DynDNS account 307 Configuring the DNS resolver 307 Configuring basic DynDNS settings 308 Configuring the DynDNS server 308...

Page 16: ...te a dialer 330 Create outbound destinations 330 Configure recovery strategy 331 Create inbound destinations 332 Debug dialer functionality 334 Example Dial on demand feature 334 Dial up 335 Dial up on demand 335 Dial up on monitor 336 Dial up nailed 336 336 31 CS context overview 337 Introduction 338 CS context configuration task list 339 Planning the CS configuration 339 Configuring general CS s...

Page 17: ...interface and the IP router for IPsec 366 Displaying IPsec configuration information 366 Debugging IPsec 367 Key management IKE 368 Main differences between manual IKE IPSEC configurations 368 Creating an ISAKMP transform profile 369 Creating an ISAKMP IPSEC policy profile 370 Creating modifying an outgoing ACL profile for IPSEC 371 Configuration of an IP interface and the IP router for IPSEC 371 ...

Page 18: ...ces 391 Configuring Call Hold on ISDN interfaces 392 Enabling Display Information Elements on ISDN Ports 392 Configuring date time publishing to terminals optional 392 Enabling sending the connected party number COLP optional 393 Enabling sending of date and time on ISDN DSS1 network interfaces 393 Defining the network type in ISDN interfaces 393 ISDN Explicit Call Transfer support SIP REFER Trans...

Page 19: ...ction 422 RBS interface configuration task list 422 Creating Deleting a RBS interface 422 Configuring an alternate PSTN profile 422 Configuring an alternate Tone Set profile 423 Configuring B Channel allocation strategy 423 Configuring additional disconnect signals 423 Configuring number of Rings before Off Hook 424 Configuring ready to dial strategy 424 RBS interface debugging 424 38 H 323 interf...

Page 20: ...ameters 443 SIP Diversion Header 444 Transmit Direction 445 Receive Direction 445 SIP REFER Transmission ISDN Explicit Call Transfer support 446 AOC Over SIP Optional 448 Enabling the session timer Optional 449 Enabling the SIP penalty box feature Optional 449 Initiating a new SIP session for redirected SIP calls Optional 449 Configure the SIP hold method Optional 450 40 Call router configuration ...

Page 21: ...complex functions 486 Digit collection sending complete behavior 487 Sending Complete 487 Ingress interface 487 Call Router 488 Egress Interface 490 Creating call services 492 Creating a hunt group service 492 Creating a distribution group service 501 Distribution Group Min Concurrent setting 503 Call router limiter service 503 Priority service 504 CS Bridge service VoIP Leased Line 506 Configurin...

Page 22: ...nt timeout 523 42 Tone configuration 524 Introduction 525 Tone set profiles 525 Tone configuration task list 526 Configuring call progress tone profiles 526 Configure tone set profiles 527 Enable tone set profile 528 Show call progress tone and tone set profiles 529 43 FXS port configuration 532 Introduction 533 Shutdown and enable FXS ports 533 Bind FXS ports to higher layer applications 534 Conf...

Page 23: ...oduction 555 Context SIP Gateway configuration task list 556 Creating a context SIP gateway 556 Creating a transport interface 557 Configuring the IP binding 557 Configuring a priority 557 Configuring a spoofed contact address 558 Binding location services 558 Enabling disabling the context SIP gateway 558 Troubleshooting 559 Show status information 559 Debug commands 559 Configuration Examples 56...

Page 24: ...585 Configuring IP IP codec negotiation 585 Examples 586 Home office in an enterprise network 586 Home office with fax 588 Soft phone client gateway 589 48 PSTN profile configuration 592 Introduction 593 PSTN profile configuration task list 593 Creating a PSTN profile 593 Configuring the echo canceller 594 Configuring output gain 594 49 SIP profile configuration 596 Introduction 597 SIP profile co...

Page 25: ...ng strategy 616 Filtering debug monitor output 617 Verifying IP connectivity 617 Debugging call signaling 618 Debugging ISDN signaling 618 Verify an incoming call 619 Verify an outgoing call 620 Verify ISDN layer 2 and 3 status 622 Debugging FXS Signaling 623 Verify an incoming call 623 Verify an outgoing call 624 Debugging H 323 Signaling 625 Verify an incoming call 625 Verify an outgoing call 62...

Page 26: ... summary 645 Introduction 646 New Configuration Commands 647 Other 647 Show help 647 Show command history 647 Restart system 647 D Internetworking terms acronyms 648 Abbreviations 649 E Used IP ports available voice codecs 653 Used IP ports 654 Available voice codecs 655 ...

Page 27: ...5 Scenario with Web server regarded as a single source host 156 26 Structure of a Service Policy Profile 158 27 Using a Service Policy Profile on an IP Interface 165 28 IP interface wan is bound to PVC 1 on port serial 0 0 181 29 Typical Integrated Service Access Scenario with dedicated PVCs 185 30 IP Context with logical IP interfaces bound to Ethernet port serial port PVC 1 and PVC 2 186 31 ISDN...

Page 28: ...3 Routing table outline 459 64 Mapping table outline 476 65 Mapping table examples 479 66 Hunt group service 493 67 Distribution group service 501 68 Distribution group service examples 502 69 Limiter service diagram 504 70 Priority service diagram 505 71 CS Bridge service VoIP Leased Line diagram 506 72 Bridge services diagram 507 73 Call routing example network 512 74 CS context and call router ...

Page 29: ... 231 10 PVC channels in PPPoE mode 231 11 Diagnostics commans 232 12 Details available in the Trap Details window 276 13 Time servers operated by NIST 288 14 FXS services with permanent patterns 405 15 FXS services with configurable patterns 405 16 ISDN number types 458 17 Routing table types 459 18 Wildcard symbols used as keys in E 164 tables calling e164 called e164 462 19 Wildcard symbols used...

Page 30: ... administrators with a basic networking background and experience but who might not be familiar with the SmartWare Operators Installers Maintenance technicians How to read this guide SmartWare is a complex and multifaceted operating system Without the necessary theoretical background you will not be able to understand and use all the features available Therefore we recommend reading at least the c...

Page 31: ...A component Chapter 9 IP context overview on page 112 outlines SmartWare Internet protocol IP context together with its related components Chapter 10 IP interface configuration on page 118 provides a general overview of SmartNode interfaces and describes the tasks involved in their configuration Chapter 11 NAT NAPT configuration on page 130 provides a general overview of the network address port t...

Page 32: ...le network management protocol SNMP and describes the tasks used to configure those of its features supported by SmartWare Chapter 26 SNTP client configuration on page 280 describes how to configure a simple network time pro tocol SNTP client Chapter 27 DHCP configuration on page 290 provides an overview of the dynamic host configuration control protocol DHCP and describes the tasks involved in it...

Page 33: ...volved in configuring FXO ports in SmartWare Chapter 45 H 323 gateway configuration on page 541 provides an overview of the H 323 gateway and describes the tasks involved in its configuration Chapter 46 Context SIP gateway overview on page 554 provides an overview of the SIP gateway and describes the tasks involved in its configuration Chapter 47 VoIP profile configuration on page 568 gives an ove...

Page 34: ... General conventions Convention Meaning Garamond blue type Indicates a cross reference hyperlink that points to a figure graphic table or section heading Clicking on the hyperlink jumps you to the reference When you have finished reviewing the reference click on the Go to Previous View button in the Adobe Acrobat Reader toolbar to return to your starting point Futura bold type Commands and keyword...

Page 35: ...35 SmartWare Software Configuration Guide About this guide An hash sign at the beginning of a line indicates a comment line Table 1 General conventions Convention Meaning ...

Page 36: ...port Available at www patton inalp com E mail support E mail sent to support patton inalp com will be answered within 1 business day Telephone support Standard telephone support is available five days a week from 8 00 am to 5 00 pm CET 0900 to 1800 UTC GMT by calling 41 0 31 985 25 55 Fax 41 0 31 985 25 26 Table 2 Mouse conventions Convention Meaning Left mouse button This button refers to the pri...

Page 37: ... the purchase price If you have ordered the wrong equipment or you are dissatisfied in any way please contact us to request an RMA number to accept your return Patton is not responsible for equipment returned without a Return Authorization Return for credit policy Less than 30 days No Charge Your credit will be issued upon receipt and inspection of the equipment 30 to 60 days We will add a 20 rest...

Page 38: ...38 Chapter 1 System overview Chapter contents Introduction 39 SmartWare embedded software 40 Applications 41 Carrier networks 41 Enterprise networks 42 LAN telephony 43 ...

Page 39: ...the SmartNode devices also referred to as hardware platforms or net work nodes that provide the physical connectivity the CPU and DSP resources All SmartNode models support packet routed and circuit switched traffic equally well The second element comprises the embedded software called SmartWare running on the SmartNode hardware platforms Finally a third party IP network and transmission infrastru...

Page 40: ...by allowing classi fication shaping and scheduling of multiple service classes For more detailed hardware information refer to the getting started guide that came with your Smart Node system Figure 1 Basic system abstract model SmartWare embedded software SmartWare is the application software that runs on the SmartNode hardware platforms SmartWare is available in several releases Refer to SmartWar...

Page 41: ...e in a multi service IP based provider network plays a vital role It pro vides the service access point for the subscriber with respect to physical connectivity and protocol interopera bility Since the access bandwidth in most cases represents a network bottleneck the NT must also ensure traffic clas sification and the enforcement of service level agreements SLA on the access link In broadband acc...

Page 42: ...ks SmartNodes can be used to converge voice and data communications on the same IP link In combination with centralized services such as groupware and unified messaging the SmartNodes provide migration and investment protection for legacy telephony systems Figure 3 Typical enterprise network with SmartNode Figure 3 shows the deployment of SmartNodes in enterprise networks Each site headquarter bra...

Page 43: ... standalone gateway has performance reliability and scalability advantages compared with PC based gateway cards In this application the SmartNode also offers a migration path to enterprise or carrier networking Figure 4 shows the deployment of a SmartNode as a LAN voice gateway The PSTN connections can be scaled from a single ISDN basic rate access to multiple primary rate lines With Q SIG integra...

Page 44: ... concepts Chapter contents Introduction 45 Contexts and Gateways 46 Context 46 Gateway 46 Interfaces Ports and Bindings 47 Interfaces 47 Ports and circuits 47 Bindings 47 Profiles and Use commands 48 Profiles 48 Use Commands 48 ...

Page 45: ...king of circuit switched and packet routed networks and services In order to consistently support a growing set of functions protocols and applications SmartWare configuration is based on a number of abstract concepts that represent the various SmartWare components Figure 5 Configuration concept overview Figure 5 shows the various elements of a complete SmartNode configuration Each of these elemen...

Page 46: ...oncept for newly supported net work layer technologies without complicating the configuration methods of existing features For example as bridging ATM or FR switching becomes available so a bridging ATM or FR context can be introduced Each context contains a number of interfaces which build the connections to other SmartWare elements and the outside world Figure 5 on page 45 shows two contexts one...

Page 47: ...h as line clocking line code framing and encapsulation formats or media access control Before any higher layer user data can flow through a physical port or circuit you must associate that port or circuit with an interface on a context This association is referred to as a binding Refer to the Bindings section for more information Examples of ports are Ethernet Serial DSL FXS or FXO Ports are numbe...

Page 48: ... or gateways This concept allows to avoid repetitions of groups of configuration commands that are the same for multiple elements in a configuration Profiles used in the IP and CS contexts are shown in figure 5 on page 45 Use Commands Use commands form the association between profiles and contexts gateways or interfaces For example when a profile is used in a context all the configuration settings...

Page 49: ... Introduction 50 Command modes 50 CLI prompt 50 Navigating the CLI 51 Initial mode 51 System changes 51 Configuration 51 Changing Modes 51 Command editing 51 Command help 51 The No form 51 Command completion 51 Command history 52 Command Editing Shortcuts 52 ...

Page 50: ...d All commands are mode specific and certain commands are valid in more than one mode A command mode provides command line completion and context help within the mode The command modes are organized hierarchically The current working mode is indicated by the CLI prompt Appendix B Mode summary on page 641 contains a detailed overview of all command modes and appendix C Command summary on page 645 d...

Page 51: ...session can also be terminated by using the logout command within any mode Command editing Command help To see a list of all CLI commands available within a mode type a question mark or the tab key at the system prompt in the mode of interest A list of all available commands is displayed Commands that have become available in the current mode are displayed at the bottom of the list separated by a ...

Page 52: ...tl or Ctrl depending on the key board and operating system of your computer Esc f is handled differently press and release the escape key often labeled Esc on many keyboards and then press the f key Table 3 Command edit shortcuts Keyboard Description Ctrl p or up arrow Recall previous command in the command history Ctrl p or up arrow Recall next command in the command history Ctrl p or up arrow Mo...

Page 53: ...6 Disabling the Telnet server 56 Logging on 56 Selecting a secure password 57 Password encryption 58 Factory preset administrator account 58 Creating an operator account 58 Creating an administrator account 59 Displaying the CLI version 59 Displaying account information 59 Switching to another account 60 Checking identity and connected users 60 Command index numbers 61 Ending a Telnet or console p...

Page 54: ...mand and then press the tab key the SmartWare shell will present you with either the remaining portion of the command or a list of possible commands These features are described in chapter 3 Command line interface CLI on page 49 The telnet server can be disabled if desired Accessing the SmartWare CLI task list The following sections describe the basic tasks involved in accessing the SmartWare comm...

Page 55: ...ttings if you access the SmartNode via the console port Console port procedure Before using the CLI to enter configuration commands do the following 1 Set up the hardware as described in the getting started guide 2 Configure your serial terminal as described in the getting started guide 3 Connect the serial terminal to your SmartNode Use a serial cable according to the description in the get ting ...

Page 56: ...ing in Using an alternate TCP listening port for the Telnet server The following command defines an alternate listening port for the telnet server Mode Configure Disabling the Telnet server The telnet server can be disabled using the following command Mode Configure Logging on Accessing your SmartNode via the local console port or via a Telnet session opens a login screen The following description...

Page 57: ... same password repeatedly Example Your ATM PIN cell phone voice mail house alarm setting code etc Could your password or a portion thereof be found in the dictionary Is your password less than six characters long To prevent unauthorized access you should select passwords that are not dictionary words or any of the above mentioned examples Every password should be at least 6 characters long and inc...

Page 58: ...nd only the newly created administrator account is available You can create more than one adminis trator account but there has to be at least one administrator account defined If for some reason the last administrator account is deleted the factory preset administrator account with the name administrator and an empty password is automatically recreated Configuring operators and administrators Crea...

Page 59: ...Displaying the CLI version This procedure displays the version of the currently running CLI Mode Operator execution Example Displaying the CLI version The following example shows how to display the version of the current running CLI on your device if you start from the operator execution mode node show version cli CLI version 3 00 Displaying account information You can use the show command to disp...

Page 60: ...ws how to change from your current user account to an administrator account starting from the operator execution mode In the example below the who command is used to check the identity within both accounts login support password password node who You are operator support node su super Enter password password node who You are administrator super Checking identity and connected users The who command...

Page 61: ...ator support Command index numbers A command index number indicated by the boldface 1 2 and 3 index numbers in the example below indi cates the position of a command in a list of commands that is a command with index 1 will appear higher in the configuration file than one with index 3 192 168 1 1 pf voip default show running config profile voip default codec 1 g711ulaw64k rx length 20 tx length 20...

Page 62: ...es are automatically renumbered Example 2 Moving the G 723 codec back position 3 This command moves the G 723 codec from the top to third place As a result the other two codecs move up in the list as their indexes are automatically renumbered to accommodate the new third place codec 192 168 1 1 pf voip default codec 1 after 3 192 168 1 1 pf voip default show running config profile voip default cod...

Page 63: ...on configuration mode node logout Press yes to logout no to cancel After confirming the dialog with yes the Telnet session is terminated Note Using the command exit in the operator execution mode also terminates a Telnet or console port session but without any confirmation dialog Showing command default values If a command is set to its default value it is not displayed in the running config in or...

Page 64: ... task list 67 Displaying system image information 68 Copying system images from a network server to Flash memory 68 Upgrading the software directly 70 Auto provisioning of firmware and configuration 71 Boot procedure 73 Factory configuration 74 Default Startup Configuration 74 IP Addresses in the Factory Configuration 74 ...

Page 65: ...default system software which is stored in persistent memory Along with the default system software application image and driver images a factory configuration factory config has been loaded into the SmartNode at the factory This configuration file sets the initial basic operating parameters of the SmartNode such as enabling the Ethernet ports setting the default IP addresses and the DHCP server O...

Page 66: ...can be restored as the running config by pressing the reset button For those models that do not have a reset button use the copy command The startup config and user specific con figurations are also stored in nvram The factory configuration is read only It is contained in the logical region nvram of the SmartNode It is used if no user specific configuration is available to start up SmartWare with ...

Page 67: ...cific configurations saved in nvram remain even after reload Figure 8 SmartNode memory regions logically defined in SmartWare System image handling task list To load and maintain system images perform the tasks described in the following sections Displaying system image information Copying system images from a network server to the Flash memory see page 68 Copying the driver software from a networ...

Page 68: ...new system image file must be stored permanently into the flash memory of your SmartNode to be present when booting the device Since the system image file is preloaded at the Patton Electronics Co factory you will have to download a new SmartWare application software only if a major software upgrade is necessary or if recommended by Patton Electronics Co Under normal circumstances downloading a sy...

Page 69: ...d line syntax definition file download starts automatically Mode Administrator execution Example Copy system images from a network server to the Flash memory The following example shows how to download the driver software image file from the TFTP server at IP address 172 16 36 80 The download is defined by a script file which has to be downloaded first After down loading the script file the driver...

Page 70: ... executed This leads to writing the SmartWare image which is also part of the ZIP file to the flash The web pages are updated too After writing the image to the flash the Smartware needs to be reloaded with the command reload Mode enable Example An example of such a Smartware upgrade session where the new software is in the file SN1000_SIP_R3 T_2006 08 10 zip which is stored on a tftp server with ...

Page 71: ...rmware b activation reload graceful Explanation Here s an example for configuration provisioning profile provisioning CONFIG destination configuration location 1 tftp tftp1 provider net configs system mac cfg location 2 tftp 172 16 1 33 configs system mac cfg activa tion reload graceful Explanation Step Command Purpose 1 name pf prov FIRMWARE destination script Chooses the unit s script interprete...

Page 72: ...ng with a polling interval of 10 minutes timer FIRMWARE_UPDATE now 2 minutes every 10 minutes provisioning execute FIRMWARE timer CONFIG_UPDATE now 2 minutes every 10 minutes provisioning execute CONFIG 2 name pf prov CONFIG location 1 tftp tftp1 provider net configs system mac cfg Specifies the location of the file to check for changes system mac is a place holder for the unit s MAC address of ET...

Page 73: ...ory to the logical region running config in the volatile memory The SmartWare now uses the running config to set up the operating configuration of the SmartNode Figure 9 illustrates the boot procedure Figure 9 Boot procedure There are two situations during bootstrap when the bootloader takes control If the user has pressed the system button it launches the bootloader the bootstrap application chec...

Page 74: ... delivered with a factory configuration stored in the logical region nvram of the memory It is used to initially parameterize the network and component settings of SmartWare which makes sense at the very begin ning Moreover in case of SmartWare malfunction you can reset to the initial state by reloading the factory con figuration The factory configuration consists of the default settings for the I...

Page 75: ...uration with a configuration from Flash memory 80 Copying configurations to and from a remote storage location 81 Replacing the startup configuration with a configuration downloaded from TFTP server 82 Displaying configuration file information 82 Modifying the running configuration at the CLI 83 Modifying the running configuration offline 84 Deleting a specified configuration 85 Encrypted file dow...

Page 76: ... then switch to the configuration mode with the command configure Once in configuration mode enter the configuration commands that are necessary to configure your SmartNode You can also create a new configuration file or modify an existing one offline You can copy configuration files from the flash memory to a remote server Transferring configuration files between the flash memory and a remote sys...

Page 77: ... 123 version 4 sntp client poll interval 600 sntp client gmt offset 01 00 00 system definitions system clock source 1 2 hostname node IP context configuration context ip router route 0 0 0 0 0 0 0 0 172 19 32 2 1 route 172 19 41 0 255 255 255 0 172 19 33 250 route 172 19 49 0 255 255 255 0 172 19 33 250 interface LAN used for connection to internal network interface lan ipaddress 172 19 33 30 255 ...

Page 78: ...is factory configuration initially parameterizes the most useful network and component settings of SmartWare Once a user specific configuration is created and stored as the startup configuration the factory configuration is no longer used but still remains in the persistent memory It is possible to switch back to the factory config uration at any time during the operation of a SmartNode configurat...

Page 79: ...emory Configuration files may be copied into the local memory in order to switch between different configurations Remember the different local memory regions in SmartWare as shown in figure 11 Figure 11 Local memory regions In most cases the interactively modified running configuration known as the running config which is located in the volatile memory region system is copied into the persistent m...

Page 80: ...e predefined configuration file names for which it is optional to specify the memory region namely factory config startup config and running config Mode Administrator execution Example Backing up the startup configuration The following example shows how to make a backup copy of the startup configuration It is copied under the name backup into the flash memory region nvram node copy startup config ...

Page 81: ...he persistent memory region nvram are often uploaded to the remote data store for backup edit or cloning pur poses The latter procedure is very helpful when you have several SmartNode devices each using a configura tion which does not greatly differ from the others or which is the same for all devices During the configuration of the first SmartNode according to your requirements the running config...

Page 82: ... new startup nvram startup config Download 100 node cfg 2 Check the content of the persistent startup configuration by listing its command settings with the show command node show nvram startup config Displaying configuration file information This procedure describes how to display information about configuration files Mode Administrator execution Step Command Purpose 1 node cfg copy tftp ip addre...

Page 83: ...de Because it is located in volatile memory to be made permanent your modifications must be copied to the persistent non volatile memory In most cases you will store it as the upcoming startup configuration in the persistent memory region nvram under the name startup config On the next start up the system will initialize itself using the modified configuration After the startup configuration has b...

Page 84: ...y region nvram under the name startup config Finally restart the SmartNode by using the reload command to activate the changes Mode Administrator execution Step Command Purpose 1 node copy running config tftp node ip address port current config Uploads the current running configuration as file current config to the TFTP server at address node ip address Optionally you can enter the UDP port where ...

Page 85: ...iguration file current config on the TFTP server takes place node copy tftp 172 16 36 80 user current config nvram startup config Download 100 node reload Press yes to restart no to cancel yes The system is going down Deleting a specified configuration This procedure describes how to delete configuration files from the SmartNode flash memory region nvram Mode Administrator execution Example Deleti...

Page 86: ...rized users have configuration access to the SmartNode The configurations can be stored in plain form on the SmartNode SNMP Write Access shall be restricted by means of communities and ACLs to prevent unauthorized SNMP initiated configuration downloads Telnet access shall be restricted by means of credentials and ACLs Encrypted Configuration Download An external encryption tool on the PC is used t...

Page 87: ...he key contains more than 24 characters only the first 24 characters are considered The key may contain variables that are resolved when the key file is downloaded to a SmartNode Using this mechanism you can specify device specific encryption keys We currently support the following variables system mac The MAC address of the first ethernet port Execute the show port ethernet command on a SmartNode...

Page 88: ...ual using the CLI copy command the auto provisioning feature HTTP or SNMP download The SmartNode automatically detects that a downloaded file is encrypted and tries to decrypt the file using the pre installed key Upload an encrypted configuration file The SmartNode immediately decrypts a configuration file after downloading it This is the configuration file is stored non encrypted in the flash mem...

Page 89: ...anner 93 Setting time and date 94 Display clock information 94 Display time since last restart 95 Configuring the Web server 95 Determining and defining the active CLI version 95 Restarting the system 96 Displaying the system logs 96 Displaying reports 97 Controlling command execution 97 Timed execution of CLI command 99 Displaying the checksum of a configuration 99 Configuration of terminal sessi...

Page 90: ... task list All tasks in the following sections are optional though some such as setting time and calendar services and sys tem information are highly recommended To configure basic system parameters perform the tasks described in the following sections Managing feature license keys see page 91 Setting system information see page 92 Setting the system banner see page 93 Setting time and date see pa...

Page 91: ...file on a TFTP server node cfg copy tftp 172 16 4 3 keystore myLicense lic licenses Mode Configure Example Installing license keys from the console The following example shows the command used to install license keys manually on the console node cfg install license 10011002R1Ws63yKV5v28eVmhDsVGj JwKqIdpC4Wr1BHaNtenXUYF 2gNLoihifacaTPLKcV uQDG8LJis6EdW6uNk GxVObDEwPFJ5bTV3bIIfUZ1eUe 8c5OpCCd7PSAe83...

Page 92: ...on to describe the system physical location of your SmartNode e g server room wiring closet 3rd floor etc is very supportive This entry corresponds to the MIB II system sys Location object The system provider information is used to identify the provider contact for this SmartNode device together with information on how to contact this provider The provider is a company making services available to...

Page 93: ...rators and operators such as scheduled maintenance or system shutdowns By default no banner is present on login To create a system banner use the banner command followed by the message you want displayed If the ban ner message has to be formed out of more than one word the information is enclosed by double quotes Adding the escape sequence n to the string forming the banner creates a new line on t...

Page 94: ...grated SNTP client allows synchronization of time of day and date to a reference time server Refer to chapter 26 SNTP client configuration on page 280 for more details Example Setting time and date The following example shows the commands used to set the system clock of your device to August 6 2001 at 16 55 57 if you start from the operator execution mode node cfg clock set 2001 08 06T16 55 57 Dis...

Page 95: ...the configuration mode node cfg webserver language en node cfg webserver port 80 Determining and defining the active CLI version SmartWare allows having a number of CLI version installed together whereas only one CLI version is acti vated There are commands available to determine the currently running CLI version and if necessary switch to another CLI version The idea of having several CLI version...

Page 96: ...ng configuration no need to type yes or no The question whether to save the running configuration is automatically answered with no the question whether to reload or not with yes Mode Administrator execution Example Restarting the system The following example shows how to restart the currently running system if you start from the administrator execution mode node reload System configuration has be...

Page 97: ... shell includes a basic set of commands that allow you to control the execution of other running commands In SmartWare the commands jobs and fg are used for such purposes The com mand jobs lists all running commands and fg allows switching back a suspended command to the fore ground Moreover using ctrl z suspends an active command and lets the system prompt reappear With ctrl c the currently activ...

Page 98: ... 36 80 Time 10ms Reply from 172 16 36 80 Time 10ms Reply from 172 16 36 80 Time 10ms Ctrl z suspend active command Suspended System prompt reappears and is ready to execute further commands node show ip interface Context router Show the currently running commands node jobs run jobs 0 bg ping Bring job 0 to foreground node fg Resumed ping Reply from 172 16 36 80 Time 10ms Reply from 172 16 36 80 Ti...

Page 99: ...cute FIRMWARE timer volatile RELOAD midnight 1 hour reload graceful Starts a volatile timer named RELOAD does not appear in the running configuration and thus is not stored in the startup configuration The timer is executed once 1 hour after midnight and reloads the system gracefully Displaying the checksum of a configuration In SmartWare configuration files e g startup configuration running confi...

Page 100: ...30 minutes without user input a terminal session is automatically closed If longer session periods are required logging debugging this command allows to increase the session timeout or to disable it com pletely 3 name sys terminal more Enables pausing of display for commands which pro duce more output than the current terminal window can display at once 4 name sys terminal width Configures the ter...

Page 101: ...nt 102 General AAA Configuration 103 RADIUS configuration 105 Configuring RADIUS clients 106 Configuring RADIUS accounting 107 Configuring the RADIUS server 109 Attributes in the RADIUS request message 109 Attributes in the RADIUS accept message 110 Configuring the local database accounts 110 ...

Page 102: ...g a user usually in the form of a login window where the user is expected to enter a username and password before allowing access to a client The AAA component compares the user s authentication login information with credentials stored in a database If the information is verified the user is granted access to the network Otherwise authentication fails and network access is denied Following authen...

Page 103: ... the sequence in which methods are applied to obtain AAA information Figure 15 illustrates the correlation between the Telnet login and console login services Figure 15 How to use AAA methods and AAA profiles The Telnet service uses an AAA profile called cli login This profile specifies that the following methods are used in the order they appear in the configuration 1 Query RADIUS server radius_d...

Page 104: ... console login services node enable node configure node cfg profile authentication remote radius node pf auth remote method radius radius_deepblue node pf auth remote method radius radius_extern node pf auth remote method local node pf auth remote server timeout 15 Step Command Purpose 1 node cfg profile authentication name Creates an authentication profile with name name and enters profile authen...

Page 105: ... second The Tel net login and the console login service use this profile If an emergency occurs you can reload this default configuration by reloading the factory configuration as described in section Boot procedure on page 73 RADIUS configuration RADIUS is a protocol for carrying authentication authorization and configuration information between a network access server NAS that desires to authent...

Page 106: ...t radius_extern node radius radius_ radius server 219 144 12 1 node radius radius_ shared secret authentication dd9351e13cc335 node radius radius_ exit node cfg node cfg show radius client RADIUS clients radius_deepblue radius_extern node cfg show radius client radius_deepblue AAA RADIUS Module radius_deepblue Authentication Shared Secret 78f8a23b Timeout 6 Sessions UDP Interface Configured Server...

Page 107: ...on a ATTRIBUTE Connect Time 33 string Patton a ATTRIBUTE Disconnect Time 34 string Patton a ATTRIBUTE Disconnect Cause 35 integer Patton b ATTRIBUTE Disconnect Source 36 string Patton c ATTRIBUTE Called Unique Id 48 string Patton d ATTRIBUTE Called IP Address 49 ipaddr Patton ATTRIBUTE Called Numbering Plan 50 string Patton e ATTRIBUTE Called Type Of Number 51 string Patton f ATTRIBUTE Calling Uni...

Page 108: ... Define your newly created radius client as the AAA method to be used Note If you require redundancy you can create multi ple radius clients and add all of them to the AAA profile 6 node pf auth pf name context cs Switch to the circuit switching context 7 node ctx cs ctx name service aaa name Create an AAA call control service 8 node svc aaa svc name accounting use profile aaa profile name Define ...

Page 109: ...terim update shall be sent if necessary The default is not to send periodic interim updates 14 node svc aaa svc name port name Create a port for the routing path you want to route through the AAA service 15 node port port name route call dest Define the routing destination for all calls received over this port 16 node svc aaa svc name accounting start trigger setup connect Go to the routing elemen...

Page 110: ... vendor data including Vendor Type and Vendor Length Vendor String Not null terminated String with the value console or Telnet Configuring the local database accounts The final step in configuring the authentication and authorization service in SmartWare is to set up local user accounts The local database which is queried with the AAA method local as described previously can con tain administrator...

Page 111: ...fg Note If you are creating an account that does not require a password type to indicate that no password is needed For example if you were configuring an account for an operator named James that did not need a password the entry would be node cfg operator james password Step Command Purpose 1 node cfg no administrator name pass word password Adds an administrator account to the local data base Th...

Page 112: ...nning your IP configuration 115 IP interface related information 115 QoS related information 115 Configuring physical ports 115 Creating and configuring IP interfaces 115 Configuring NAPT 116 Configuring static IP routing 116 Configuring RIP 116 Configuring access control lists 117 Configuring quality of service QoS 117 ...

Page 113: ...l IP related protocols and services for data and voice The IP context performs much the same function as a standalone IP router and since every context is defined by a name the IP context is named router by default This IP context can contain interface static routes RIP parameters NAPT QoS and access control profiles In figure 16 on page 113 the IP context with all its related elements is containe...

Page 114: ...ing configuration on page 233 and chapter 23 RIP configuration on page 240 give you the required information For essential knowledge related to network security requirements refer to chapter 24 Access control list configuration on page 251 If your network shall provide better service to selected network traffic chapter 13 Link scheduler configu ration on page 149 will help you to get in depth know...

Page 115: ...w does your provider perform packet classification e g which ToS bits have to be used to define the sup ported classes of service Configuring physical ports The configuration of a port includes parameters for the physical and data link layer such as framing and encapsu lation formats or media access control Before any higher layer user data can flow through a physical port you must associate that ...

Page 116: ...r routing traffic in the global Internet and is an interior gateway protocol IGP which means that it performs routing within a single autonomous system RIP sends routing update messages at regular intervals and also when the network topology changes When a router receives a routing update that includes changes to an entry it updates its routing table to reflect the new route The metric value for t...

Page 117: ...ch the order of the condi tions is critical If no conditions match the software rejects the address For information and examples on how configure access control lists refer to chapter 24 Access control list configuration on page 251 Configuring quality of service QoS The link scheduler enables the definition of QoS profiles for network traffic on a certain interface as shown in figure 16 on page 1...

Page 118: ...2 Router advertisement broadcast message 122 Defining the MTU and MSS of the interface 123 Configuring an interface as a point to point link 124 Displaying IP interface information 124 Displaying dynamic ARP entries 125 Flushing dynamic ARP entries 125 Processing gratuitous ARP requests 125 Testing connections with the ping command 125 IP link supervision 126 Check connectivity of an IP link 127 S...

Page 119: ...orm the tasks in the following sections Creating an IP interface see page 119 Deleting an IP interface see page 120 Setting the IP address and netmask see page 121 ICMP message processing see page 122 ICMP redirect messages see page 122 Router advertisement broadcast message see page 122 Defining the MTU of the interface see page 123 Configuring an interface as a point to point link see page 124 D...

Page 120: ...ault Deleting an existing interface in the IP context is often necessary Mode Context IP Example Delete IP interfaces The procedure below assumes that you would like to delete an IP interface named external Use the following commands in IP context configuration mode List the existing interfaces node ctx ip router interface interface New interface lan Existing interface wan Existing interface exter...

Page 121: ...e specific IP interfaces to be excluded from NAPT translations although their traffic is routed through an IP interface to which a NAPT profile is bound This configuration is usually neces sary for DMZ networks connected to an Ethernet port which uses public IP addresses Mode interface ip if name unnumbered Enables IP processing on an interface without assigning an explicit IP address to the inter...

Page 122: ...l The redirect message instructs the sender to remove the receiving device from the route and substitute a specified device representing a more direct path This feature is enabled by default ICMP message processing offers two options for host route redirects accept accepts ICMP redirect messages send sends ICMP redirect messages Mode Interface Example ICMP redirect messages The following example s...

Page 123: ...medium must have the same protocol MTU in order to operate accurately Procedure To set the MTU packet size or the MSS to size on the interface name Mode Interface Example Defining the MTU of the interface Step Command Purpose 1 node ctx ip router interface name Selects the interface name for ICMP message pro cessing configuration 2 node if ip name icmp router discovery Enables to send router adver...

Page 124: ...de ctx ip router interface lan node if ip lan point to point Displaying IP interface information The show ip interface command displays IP information for all interfaces The command is available in operator execution mode or in any of the administrator execution modes Mode Operator execution or any administrator execution Example Displaying IP interface information The following example shows how ...

Page 125: ...get protocol address and sender protocol address are the same are considered Because of security reasons this feature is deactivated as default and must be enabled by the user Mode configure Testing connections with the ping command As an aid to diagnosing basic network connectivity many network protocols support an echo protocol The protocol involves sending a special datagram to the destination ...

Page 126: ...en sent and received a brief summary is displayed Example Testing connections with the ping command The following example shows how to invoke the echo protocol to the destination host at IP address 172 16 1 10 by using the ping command from operator execution mode node ping 172 16 1 10 Sending 5 ICMP echo requests to 172 16 1 10 timeout is 1 seconds Reply from 172 16 1 10 Time 10ms Reply from 172 ...

Page 127: ... Debug ARP You may use the debug arp and show arp commands to assist you in debugging IP connectivity and its cor responding interfaces Step Command Purpose 1 name if ip interface no check con nectivity ping ip address source address ip address tolerance down number tolerance up number interval seconds timeout sec onds Configures or removes a host to ping Source address specifies the IP source add...

Page 128: ... Request Who has 10 9 10 1 tell 10 9 10 3 at 00 09 5B 53 D2 B0 17 25 40 ARP Entry 10 9 10 3 Updated by 00 09 5B 53 D2 B0 17 25 40 ARP Tx ARP Reply 10 9 10 1 is at 00 A0 BA 00 92 4F tell 10 9 10 3 at 00 09 5B 53 D2 B0 Aborted Ping statistics for 10 9 10 11 Packets Sent 1 Received 1 Lost 0 0 loss RTT Minimum 10ms Maximum 10ms Average 10ms Step Command Purpose 1 node cfg no debug arp Enables or disab...

Page 129: ...o enable the IGMP proxy functionality you need to define which interface shall be used to receive multicast streams upstream interface and to which interfaces the multicast streams shall be forwarded downstream interfaces The router then listens on the downstream interfaces for IGMP join messages and forwards them to the upstream interface Mode Context IP Step Command Purpose 1 node ctx ip ctx nam...

Page 130: ... NAPT traversal 133 NAT NAPT configuration task list 134 Creating a NAPT profile 134 Configuring a NAPT DMZ host 135 Defining NAPT port ranges 135 Preserving TCP UDP port numbers in NAPT 136 Defining the UDP NAPT type 136 Activate NAT NAPT 137 Displaying NAT NAPT configuration information 137 Configuring NAT static protocol entries 138 ...

Page 131: ...mponent It allows hosts on the local network to access any host on the global network by using the global interface address as source address It modifies not only the source address but also the source port so that it can tell different connections apart NAPT source ports are in the range 8 000 to 16 000 UDP and TCP connections from the local to the global network trig ger the creation of a dynami...

Page 132: ... Dynamic NAT NAT only modifies addresses but not ports Dynamic NAT assigns a global address from a global NAT address pool each time a local host wants to access the global network It creates a dynamic NAT entry for the reverse path If a connection is idle for some time 2 minutes the dynamic NAT entry is removed Should Dynamic NAT run out of global addresses it lets Dynamic NAPT handle the connect...

Page 133: ...ls that do not build on UDP or TCP but directly on IP e g GRE ESP and protocols that open addi tional connections unknown to the NAT NAPT component e g FTP H 323 SIP do not easily traverse a NAPT The SmartWare NAPT can handle one GRE Generic Routing Encapsulation connection and one ESP Encapsulating Security Payload connection at a time It also routes ICMP messages back to the source of the concer...

Page 134: ...nd activates the basic behavior of the Dynamic NAPT 2 optional node pf napt name range local ip range start local ip range stop global ip Configures and activates the enhanced behavior of the Dynamic NAPT local ip range start and local ip range stop define the subset of local hosts that use the global NAT address global ip to access to global network max 20 entries The IP ranges of different Dynam...

Page 135: ...h receives any inbound traffic on the global NAPT interface which Is not translated by any static or dynamic NAPT entry and Is not handled by the device itself The following procedure shows how a DMZ host can be configured Mode profile napt pf name Defining NAPT port ranges The TCP UDP port ranges to be used by the NAPT can be defined using the following procedure The default port ranges for both ...

Page 136: ...ist is ordered by the security of the NAPT type starting with the highest security type symmetric port restricted cone address restricted cone full cone You find a detailed description of these NAPT types in section 5 of RFC3489 To allow STUN to work through the NAPT the full cone setting is usually required The default setting is symmetric Mode profile napt pf name Step Command Purpose 1 name pf ...

Page 137: ...ace lan node cfg context ip router node ctx ip router interface lan node if ip lan use profile napt access Displaying NAT NAPT configuration information Two commands are available to display an existing NAPT profile There is no command yet to display the dynamic entries of a NAT NAPT component Procedure To display NAT NAPT configuration information Mode Configure Step Command Purpose 1 node cfg co...

Page 138: ...0 STATIC NAPT RANGE MAPPINGS Local IP Start Local IP Stop Global IP 192 168 1 10 192 168 1 19 131 1 1 15 STATIC NAT RANGE MAPPINGS Local IP Start Local IP Stop Global IP Start Global IP Stop 192 168 1 30 192 168 1 39 131 1 1 10 131 1 1 15 Configuring NAT static protocol entries The following command adds a static NAT entry which causes any packets of the specified protocol received on the global s...

Page 139: ... 140 Configuring Ethernet encapsulation type for an Ethernet port 141 Binding an Ethernet port to an IP interface 141 Multiple IP addresses on Ethernet ports 142 Configuring a VLAN 143 Configuring layer 2 CoS to service class mapping for an Ethernet port 144 Adding a receive mapping table entry 145 Adding a transmit mapping table entry 146 Closing an Ethernet port 146 Using the built in Ethernet s...

Page 140: ...an Ethernet port advanced see page 144 Closing an Ethernet port see page 146 Entering the Ethernet port configuration mode To enter port configuration mode and begin configuring an Ethernet port enter the command port ethernet slot port in administrator execution mode The keywords slot and port represent the number of the respective physical entity Configuring medium for an Ethernet port All Ether...

Page 141: ...e Example Configuring Ethernet encapsulation type for an Ethernet port The following example shows how to configure the encapsulation type to IP for the Ethernet port on slot 0 and port 0 node cfg port ethernet 0 0 node prt eth 0 0 encapsulation ip Binding an Ethernet port to an IP interface You must bind the Ethernet port to an existing IP interface When executing the bind command the requested i...

Page 142: ...t eth 0 0 bind interface lan router Multiple IP addresses on Ethernet ports It is possible to use multiple IP addresses on an Ethernet port by binding the port to multiple IP interfaces Each of the IP interfaces uses an IP address of one of the subnets on the Ethernet ports The procedures below demonstrate how IP addresses of two different networks can be used on an Ethernet port However if necess...

Page 143: ...e that is bound to this port is also closed All static routing entries that are using this interface change their state to invalid and all dynamic routing entries will be removed from the route table manager Step Command Purpose 1 name cfg context ip Enter the IP context configuration mode 2 name ctx ip router interface ip if 1 name Create the first IP interface 3 name if ip ip if 1 name ipaddress...

Page 144: ...escribes how to change layer 2 CoS to service class mapping Step Command Purpose 1 node config port ethernet slot port Enter Ethernet port configura tion 2 node prt eth slot port vlan id Create new VLAN port 3 node vlan id encapsulation ip pppoe multi Defines the payload type s to be used on this VLAN ip IP traffic only not used for PPP pppoe PPPoE sessions only multi both IP traffic and PPPoE ses...

Page 145: ...e into a firm ware specific service class value Each conversion is stored as a mapping table entry so the receive mapping table consists of several mapping table entries This procedure describes how to add a receive mapping table entry Mode Configure Example Adding a receive mapping table entry The following example shows how to add a receive mapping table entry which converts a layer 2 class of s...

Page 146: ...tdown command This command also disables and closes the IP interface that is bound to that port All static routing entries that are using this interface change their state to invalid and all dynamic routing entries will be removed from the route table manager This command can be used as soon as an encapsulation type is defined and the port was bound successful to an IP interface This procedure des...

Page 147: ...rt 0 gets also closed Checking the state of the IP interface wan indicates this with the CLOSED for parameter state node prt eth 0 1 show ip interface Context router Name wan IP Address 172 17 100 210 255 255 255 0 MTU 1500 ICMP router discovery enabled ICMP redirect send only State CLOSED Binding ethernet 0 0 1 ethernet ip Using the built in Ethernet sniffer The software contains a built in sniff...

Page 148: ...if the capture buffer is full 2 Now the sniffer is active and will capture the datapackets on the specified ethernet port 3 name cfg no sniff ether net 0 1 Disable the sniffer on ethernet port 0 1 Note that the captured data is not stored to flash memory unless you issue this command The file in the flash memory will be named as follows nvram ethernet 0 slot port cap In this example the name will ...

Page 149: ...control list 156 Creating a service policy profile 157 Specifying the handling of traffic classes 159 Defining fair queuing weight 159 Defining the bit rate 160 Defining absolute priority 160 Defining the maximum queue length 160 Specifying the type of service TOS field 160 Specifying the precedence field 161 Specifying differentiated services codepoint DSCP marking 161 Specifying layer 2 marking ...

Page 150: ...oice and data packets To improve QoS you can configure the SmartNode to send no more data to the Internet than the modem can carry This keeps the modem s queue empty and gives the SmartNode control over which packet is sent over the access link at what time Using traffic classes The link scheduler needs to distinguish between different types of packets We refer to those types as traffic classes Yo...

Page 151: ...ment because they will not use up the entire bandwidth Weighted fair queuing WFQ This arbitration method assures a given minimal bandwidth for each source An example you specify that traf fic class A gets three times the bandwidth of traffic class B So A will get a minimum of 75 and B will get a minimum of 25 of the bandwidth But if no class A packets are waiting B will get 100 of the bandwidth Ea...

Page 152: ...hat the burstiness needed for sources to catch up after collisions is implicitly allowed Future versions of SmartWare might allow setting the burst rate and bursting size if more control over its behavior is considered necessary Burst tolerance has a different effect when used with weighted fair queuing Think of it as a higher initial rate when a source device starts transmitting data packets This...

Page 153: ...the voice and data multiplexing to the capacity of the access link is the most common application of the SmartWare link scheduler 1 Create a minimal profile profile service policy modem 512 rate limit 512 header length 20 atm modem source traffic class local voice priority 2 Apply the profile just created to the interface connected to the modem context ip interface wan use profile service policy m...

Page 154: ... Release 12 2 QoS commands are in contrast with the respective SmartWare commands Link scheduler configuration task list To configure QoS features perform the tasks described in the following sections Depending on your require ments some of the tasks are required while other tasks are optional Defining the access control list profile Creating a service policy profile see page 157 Specifying the ha...

Page 155: ...that matches decides what happens to the packet As far as filtering is concerned the rule decides if the packet is discarded deny or passed on permit You can also add a traffic class to the rule and if this rule is the first matching rule for a packet it is tagged with the traffic class name Some types of packets you do not have to tag with ACL Voice and data packets from of for the SmartNode itse...

Page 156: ...used as source address in the permit statement of the IP filter rule for the access control list Figure 25 Scenario with Web server regarded as a single source host A new access control list has to be created In the example above the traffic class that represents outbound Web related traffic is named Web Access control list have an implicit deny all entry at the very end so packets that do not mat...

Page 157: ...control lists the link arbiter needs rules defining how to handle the different traffic classes For that purpose you create a service policy profile The service policy profile defines how the link arbiter has to share the available bandwidth among several traffic classes on a certain interface Creating a service policy profile The service policy profile defines how the link scheduler should handle...

Page 158: ... class local voice priority source traffic class Web share 30 source traffic class local default share 20 source traffic class default queue limit 40 share 50 The first line specifies the name of the link arbiter profile to configure On the second line the global band width limit is set The value defining the bandwidth is given in kilobits per second Each service policy profile must have a rate li...

Page 159: ...ning fair queuing weight The command share is used with wfq link arbitration to assign the weight to the selected traffic class When defining a number of source classes the values are relative to each other It is recommended to split 100 which can be read as 100 among all available source classes e g with 20 30 and 50 as value for the respec tive share commands which represent 20 30 and 50 Step Co...

Page 160: ... the class name Excess pack ets are dropped Used in class mode queuing only happens at the leaf of the arbitration hierarchy tree The no form of this command reverts the queue limit to the internal default value which depends on your configuration Mode Source Specifying the type of service TOS field The set ip tos command specifies the type of service TOS field value applied to packets of the clas...

Page 161: ...vice RFC791 RFC1349 The precedence field is defined by the first three bits and supports eight levels of priority The low est priority is assigned to 0 and the highest priority is 7 The no form of this command disables precedence marking Mode Source Specifying differentiated services codepoint DSCP marking Differentiated services enhancements to the Internet protocol are intended to enable the han...

Page 162: ...n time critical data Under 802 1p a 4 byte Tag Control Info TCI field is inserted in the Layer 2 header between the Source Address and the MAC Client Type Length field of an Ethernet Frame Table 6 lists the tag components 802 1p compliant infrastructure devices read the 3 bit user priority field and route the frame through an inter nal buffer queue mapped to the corresponding user priority level T...

Page 163: ... packets that have to be included in the QoS process base upon their size In the service policy profile exists a command that allows mapping of a specific packet size or a range to a traffic class There are two predefined ranges the user can choose One of them is routed voice that specifies a packet size range from 50 Byte to 280 Byte the other one is routed voice encrypted that specifies a packet...

Page 164: ...ted voice traffic will be pro cessed like local generated voice traffic 4 name pf srvp name out source traffic class local voice Enters traffic class configuration mode 5 name src local v priority Specifies that local voice has priority Because route voice is mapped to local voice also routed voice has priority 6 name src local v profile service policy name in Creates a new service policy profile ...

Page 165: ...iders may use input shaping to improve downlink voice jitter in the absence of voice support The default setting no service policy sets the interface to FIFO queuing Mode Interface Example Devoting the service policy profile to an interface The following example shows how to attach the service policy profile Voice_Prio to the IP interface wan that is defined within the IP context for outgoing traf...

Page 166: ...heduling profile information The show profile service policy command displays link scheduling profile information of an existing ser vice policy profile This command is only available in the administrator mode Mode Administrator execution Example Displaying link scheduling profile information The following example shows how to display link scheduling profile information of an existing service poli...

Page 167: ...for all queues of a profile The following example shows how to enable statistic gathering for all traffic classes node enable node configure node cfg profile service policy sample node pf srvpl sample debug queue statistics 4 Table 7 Values defining detail of the queuing statistics Optional Value Implication on Command Output 0 Statistic gathering is switched off 1 Display amount of packets passed...

Page 168: ...roduction 169 Serial port configuration task list 169 Disabling an interface 169 Enabling an interface 170 Configuring the serial encapsulation type 171 Configuring the hardware port protocol 171 Configuring the active clock edge 172 Configuring the baudrate 173 ...

Page 169: ...task list Perform the tasks in the following sections to configure a synchronous serial interface Disabling an interface see page 169 Enabling an interface see page 170 Configuring the serial encapsulation type see page 171 Configuring the hardware port protocol see page 171 Configuring the active clock edge see page 172 Configuring the baudrate Disabling an interface Before you replace a compact ...

Page 170: ...enable the serial interfaces again When you enable an interface it has the state OPENED in the show port serial command display Note Use the shutdown command to disable the serial interface for any software or hardware configuration procedure This procedure describes how to enable a serial interface Mode Administrator execution Example Enabling an interface The example shows how to enable the buil...

Page 171: ...ministrator execution Example Configuring the serial encapsulation type The following example enables Frame Relay encapsulation for the serial interface on slot 0 and port 0 Check that in the command output of show port serial Encapsulation is set to framerelay node cfg port serial 0 0 node prt ser 0 0 encapsulation framerelay node prt ser 0 0 show port serial Serial Interface Configuration Port s...

Page 172: ... 16 Max Frame Length 2048 Recv Threshold 1 Encapsulation framerelay Configuring the active clock edge Depending on the system configurations i e when using long cables with certain modem types or data rates synchronization problems may occur on the serial port In these cases it may be necessary to configure the clock edge on which data is transmitted This procedure describes how to set the active ...

Page 173: ... Configuring the baudrate A DCE interface has to provide the signal clocks The desired baudrate can be configured Note Only available on certain devices This procedure describes how to set the baudrate for the serial interface Mode Port serial Example Configuring baudrate to 64 000 bps The following example configures a baudrate of 64 000 bps on the serial interface Verify that the command show po...

Page 174: ...Transmit Edge Normal Max Frame Length 1920 Baudrate 64000 bps Recv Threshold 1 Statistics Received frames 116101 Rx good frames 116099 Rx CD lost 0 Rx Overrun 0 Rx CRC errors 0 Rx abort sequence 0 Rx non octet 2 Rx frame len violation 0 Rx DPLL error 0 Sent frames 116106 Tx good frames 116106 Tx CTS lost 0 Tx underrun 0 Status Link Up Control Line enabled True Baudrate 64000 bps ...

Page 175: ...eep alive interval 177 Enabling fragmentation 178 Entering Frame Relay PVC configuration mode 179 Configuring the PVC encapsulation type 180 Binding the Frame Relay PVC to IP interface 180 Enabling a Frame Relay PVC 182 Disabling a Frame Relay PVC 182 Debugging Frame Relay 183 Displaying Frame Relay information 184 Integrated service access 185 Example 1 Frame Relay on e1t1 without a channel group...

Page 176: ...me Relay encapsulation Configuring the LMI type Configuring the keep alive interval Enabling fragmentation Entering Frame Relay PVC configuration mode Configuring the PVC encapsulation type Binding the Frame Relay PVC to IP interface Disabling a Frame Relay PVC Displaying Frame Relay information Configuring Frame Relay encapsulation Normally Frame Relay is used over a HDLC framed link Different ki...

Page 177: ...port serial 0 0 node prt ser 0 0 framerelay node frm rel 0 0 lmi type ansi Configuring the keep alive interval A keep alive interval must be set to configure the LMI By default this interval is 10 seconds and according to the LMI protocol must be less than the corresponding interval on the switch The keep alive interval in sec onds which is represented by number has to be in the range from 1 to 36...

Page 178: ...processing overhead is only spent for data traffic voice packets whose length should be smaller than the fragmentation length do not consume processing power and protocol over head for fragmentation The purpose of end to end FRF 12 fragmentation is to support real time and non real time data packets on lower speed links without causing excessive delay to the real time data The FRF 12 Implementatio...

Page 179: ...certain virtual circuits must exist all the time The Frame Relay network provides a number of virtual circuits that form the basis for connections between stations attached to the same Frame Relay network The resulting set of interconnected devices forms a private Frame Relay group which may be either fully inter connected with a complete mesh of virtual circuits or only partially interconnected I...

Page 180: ...ther vendor s equipment across a Frame Relay network This procedure describes how to set the encapsulation type to comply with RFC 1490 Mode Frame Relay PVC Example Configuring the PVC encapsulation type The following example sets the encapsulation type to comply with RFC 1490 for PVC with the assigned DLCI of 1 for Frame Relay over the serial interface on slot 0 and port 0 node cfg port serial 0 ...

Page 181: ...erface name which is related to the IP context router Mode PVC Example Binding the Frame Relay PVC to IP interface The following example binds the Frame Relay PVC 1 to the IP interface wan of IP context router to the serial interface on slot 0 and port 0 node cfg port serial 0 0 node prt ser 0 0 framerelay node frm rel 0 0 pvc 1 node pvc 1 bind interface wan router Step Command Purpose 1 node pvc ...

Page 182: ...nfig and verify that the entry no shutdown occurs in the con figuration part responsible for this PVC node pvc 1 show running config Running configuration pvc 1 encapsulation rfc1490 bind interface wan router no shutdown Disabling a Frame Relay PVC Frame Relay PVCs can be disabled whenever it is necessary Be aware that disabling a specific PVC also disables the related serial interface and vice ve...

Page 183: ...usly impact your system performance This procedure describes how to display the Frame Relay configuration settings for the serial interface Mode Administrator execution Command Purpose no debug framerelay Prints the status of the different monitors ON or OFF no debug framerelay all Enables Disables all framerelay debug monitors no debug framerelay error Enables Disables monitor which prints only o...

Page 184: ...Relay configuration settings for the serial interface Mode Port serial Example Displaying Frame Relay information The following example shows the commands used to display Frame Relay configuration settings node enable node configure node cfg show framerelay Framerelay Configuration Port LMI Type Keepalive Fragmentation serial 0 0 0 ansi 10 disabled PVC Configuration Port DLCI State Fragment Encaps...

Page 185: ...ine network via a leased line modem connected to the serial interface The hardware port protocol X 21 is used on the serial interface on slot 0 and port 0 Devices accessing the MSP and VPN services are attached to the 100 Mbps Ethernet port 0 0 on the SmartNode For that reason an IP context with three logical IP interfaces bound to Ethernet port 0 0 PVC 1 and PVC 2 on serial port 0 0 as shown in f...

Page 186: ...xternal node if ip external interface internal node if ip internal interface lan node if ip lan exit node ctx ip router interface internal node if ip internal ipaddress 192 168 3 1 255 255 255 0 node if ip internal interface external node if ip external ipaddress 192 168 2 1 255 255 255 0 node if ip external interface lan node if ip lan ipaddress 192 168 1 1 255 255 255 0 3 Define a voice profile ...

Page 187: ...so the minimum fragment size must be 66 Bytes Setting the fragment size to 300 Bytes introduces an additional delay of at most 4 7ms 300 8 512k but does not cause too much fragmenta tion overhead on large data packets node frm rel 0 0 pvc 1 node pvc 1 encapsulation rfc1490 node pvc 1 fragment 300 node pvc 1 bind interface external router node pvc 1 no shutdown node pvc 1 pvc 2 node pvc 2 encapsula...

Page 188: ...100 router no shutdown port e1t1 0 0 no shutdown Example 2 Frame Relay on e1t1 with a channel group port e1t1 0 0 port type e1 clock master framing crc4 encapsulation channelized channel group myGroup timeslots 13 17 encapsulation hdlc hdlc encapsulation framerelay framerelay lmi type gof keepalive 20 pvc 100 encapsulation rfc1490 bind interface pvc100 router no shutdown port e1t1 0 0 no shutdown ...

Page 189: ...shold E1T1 only 194 Configuring PRI Loopback detection E1T1 only 194 Configuring PRI encapsulation 195 Create a Channel Group 196 Configuring Channel Group Timeslots 196 Configuring Channel Group Encapsulation 196 Entering HDLC Configuration Mode 197 Configuring HDLC CRC Type 197 Configuring HDLC Encapsulation 198 PRI Debugging 198 PRI Configuration Examples 199 Example 1 ISDN 200 Example 2 RBS wi...

Page 190: ...t on the device it can either be E1 T1 or E1T1 The Hardware Type and its belong ing Slot and Port Number must be specified for entering the configuration mode of a port It is not possible to change the Hardware Type it is given by the system Port Type This expression is used in relation with the E1T1 port and describes if the E1T1 port is currently running in E1 or in T1 mode On an E1 or T1 port t...

Page 191: ...connected together In the other case the data transmission will fail due to bit failures This command has also the option auto that can be used if the application running on the port is also of an asymmetric nature like master slave server cli ent or user net Normally the option auto is used if the port is setup for ISDN In this case the clock mode will automatically derived from the Q 921 protoco...

Page 192: ...Bit The 24 F Bits of one Extended Super Frame are used for synchronization 6 Bit transmitting data link information 12 Bit and for CRC6 calculation 6 Bit SF T1 Super Frame The SF is made up of 12 Basic Frames Each Basic Frame includes one overhead bit the F Bit The 12 F Bits of one Super Frame represent the frame alignment pattern that is used for synchro nization Unframed The advantage of the unf...

Page 193: ...ation mode E1T1 only The PRI port can be configured to work in either short haul or in long haul mode Short haul is the default application and should be used for transmission distances up to 180m 600ft For transmission distances up to 1800m 6000ft select the long haul application Mode port e1t1 slot port Step Command Purpose 1 name prt e1t1 slot port line build out 0 7 5 15 22 5 Specifies the pul...

Page 194: ...sends the loopback up code to the customer device then subsequently starts for example a Pseudo Random Bit Sequence PRBS to determinate the quality of the connection Depending on the configured T1 framing the right loopback code detection mode will be enabled as soon as the command loop back auto detection will be executed For framing type uses a different loop back code detection mechanism ESF Th...

Page 195: ...tion mode In the Channel Group configuration mode the same encapsulation types as on the port configuration mode are available again except channelized hdlc Enables HDLC Framing on the selected port After encapsulation hdlc has been specified the hdlc configuration mode can be entered to configure hdlc specific parameters and to define the link layer proto col must run over hdlc q921 This encapsul...

Page 196: ...g Channel Group Encapsulation The encapsulation command prepares the Channel Group for a specific application protocol After the right encapsulation type has been set the configuration mode command for the selected protocol can be executed for protocol specific configuration hdlc Enables HDLC Framing on the selected Channel Group After encapsulation hdlc has been specified the hdlc configuration m...

Page 197: ... the hdlc configuration mode In channel group configura tion mode the encapsulation must be set to hdlc as well followed by configuring at least one timeslot per the timeslots command Mode port e1t1 slot port Mode channel group group Configuring HDLC CRC Type This command specifies the length of the checksum for calculating the CRC of the hdlc frame It can be either a 16 bit or a 32 bit checksum M...

Page 198: ...guration on page 175 and Chapter 30 PPP configuration on page 311 Mode hdlc PRI Debugging For the investigation of possible problems in link establishment data transmission or synchronization there exists a debug command with the options event and error The command has a hierarchical characteristic and can be applied to all ports of given type on the whole device or to all ports of slot or just to...

Page 199: ...the event monitor for all e1 ports of the device 3 no debug t1 error Enables Disables the error monitor for all t1 ports of the device 4 no debug e1 3 Enables Disables the event and error monitor for all e1 ports on slot 3 5 no debug e1t1 1 event Enables Disables the event monitor for all e1t1 ports on slot 1 6 no debug t1 2 error Enables Disables the error monitor for all t1 ports on slot 2 7 no ...

Page 200: ...auto encapsulation q931 q931 protocol ni2 uni side net bchan number order ascending encapsulation cc isdn bind interface pri00 switch port e1t1 0 0 no shutdown Example 2 RBS without a channel group port e1t1 0 0 port type t1 clock master linecode b8zs framing esf encapsulation rbs rbs protocol ground start exchange encapsulation cc rbs bind interface pri00 switch port e1t1 0 0 no shutdown Example ...

Page 201: ...ulation cc rbs bind interface pri00_9_16 switch channel group group_17_24 timeslots 17 24 encapsulation rbs rbs protocol eam double wink start encapsulation cc rbs bind interface pri00_17_24 switch port e1t1 0 0 no shutdown Example 4 Frame Relay without a channel group port e1t1 0 0 port type e1 framing crc4 encapsulation hdlc hdlc encapsulation framerelay framerelay lmi type itu pvc 100 encapsula...

Page 202: ...e itu pvc 100 encapsulation rfc1490 bind interface pvc100 router no shutdown port e1t1 0 0 no shutdown Example 6 PPP without a channel group port e1t1 0 0 port type e1 framing crc4 encapsulation hdlc hdlc encapsulation ppp bind interface myPPP router port e1t1 0 0 no shutdown Example 7 PPP with a channel group port e1t1 0 0 port type e1 framing crc4 encapsulation channelized channel group yourGrou...

Page 203: ...BRI encapsulation 205 Creating a channel group 205 Configuring channel group timeslots 206 Configuring channel group encapsulation 206 Entering HDLC configuration mode 206 Configuring HDLC encapsulation 206 BRI Debugging 207 BRI Configuration Examples 208 Example 1 ISDN with auto clock uni side settings 208 Example 2 ISDN with manual clock uni side settings 208 Example 3 Multi Link PPP over two B ...

Page 204: ...y of the internal data processing In clock master mode the internal data processing is running on an inde pendent clock source In clock slave mode the clock source for internal data processing is recovered from the receive line interface Be aware that always a port pair of clock master and clock slave are connected together In the other case the data transmission will fail due to bit failures This...

Page 205: ...t Normally all timeslots of a port are under full control of the appli cation specified with the encapsulation command In channelized mode and application uses only the specified timeslot If the encapsulation is set to channelized use the channel group command to create a new Channel Group and to enter its configuration mode The requested can then be selected with the Channel Group s encapsulation...

Page 206: ...tered from the channel group configuration mode if the encapsulation is set to hdlc and a timeslot has been specified If the hdlc configuration mode is not accessible it may be due to an invalid or incomplete configuration In this case an error message will be issued Mode channel group group name Configuring HDLC encapsulation The hdlc encapsulation command specifies what kinds of upper layer data...

Page 207: ...fault no debug bri Examples 1 no debug bri Enables Disables the event and the error monitor for all bri ports of the device 2 no debug bri event Enables Disables the event monitor for all bri ports of the device 3 no debug bri error Enables Disables the error monitor for all bri ports of the device 4 no debug bri 3 Enables Disables the event and error monitor for all bri ports on slot 3 5 no debug...

Page 208: ... uni side settings port bri 0 4 power feed encapsulation q921 q921 uni side auto encapsulation q931 q931 protocol dss1 uni side net bchan number order ascending encapsulation cc isdn bind interface bri04 switch port bri 0 4 no shutdown Example 2 ISDN with manual clock uni side settings port bri 0 4 clock slave encapsulation q921 q921 uni side user encapsulation q931 q931 protocol dss1 uni side use...

Page 209: ...55 255 255 0 subscriber ppp bri_0_0 dial in multilink max links 2 fragmentation equal distribution 320 bind interface wan bri router port bri 0 0 clock slave encapsulation channelized channel group Group0 timeslots 0 encapsulation hdlc hdlc encapsulation ppp bind subscriber bri_0_0 channel group Group1 timeslots 1 encapsulation hdlc hdlc encapsulation ppp bind subscriber bri_0_0 port bri 0 0 no sh...

Page 210: ...10 Chapter 18 ISDN Overview Chapter contents Introduction 211 ISDN reference points 211 Possible SmartNode port configurations 212 ISDN UNI Signaling 212 ISDN Configuration Concept 214 ISDN Layering 214 ...

Page 211: ...one synchronization timeslot on a standard E1 G 704 physical layer PRI ports are also called S2m ports The related PSTN access service is also called Primary Rate Access PRA ISDN reference points The ISDN standards define a number of reference points on the interfaces between the various equipment types on an ISDN access line Figure 31 illustrates these reference points The understanding of these ...

Page 212: ...n countries the U interface is not accessible to the subscriber the operator always provides the NT1 In the US and some other countries the NT1 can be integrated into the NT2 i e the PBX is connected directly to the U interface The V reference point is typically a y wire interface between the line card of the public switch and the 2 Mbps transmission equipment which transports the PRI signal over ...

Page 213: ... the CS context This reference clock source can be internal or it can be derived from one of the ISDN ports If the clock reference is not configured in accordance with the network environment clock slips and related voice quality degradations can occur Refer to chapter 31 CS context overview on page 337 on how to configure the reference clock S T S U T LE Basic Rate Access point to multipoint S bu...

Page 214: ...els Figure 34 ISDN layering model The layered model of ISDN is reflected in the configuration by the use of different modes for each layer The layers are connected by using encapsulations and bindings The encapsulation defines what the next higher layer protocol will be On the topmost layer the binding finally selects a logical interface to connect the port to For more information how to configure...

Page 215: ...uration task list 216 Enter Q 921 configuration mode 216 Configuring Q 921 parameters 216 Configuring Q 921 encapsulation 217 Enter Q 931 configuration mode 217 Configuring Q 931 parameters 218 Configuring Q 931 encapsulation 220 Debugging ISDN 220 ISDN Configuration Examples 221 ...

Page 216: ...er Q 921 configuration mode Normally Q 921 is running as ISDN Layer 2 protocol on a BRI or PRI port But it is also possible another protocol is using Q 921 as its next encapsulation step an then Q 921 will not be configured out of a port con text That means Q 921 encapsulation can be configured in different configuration modes For this reason the command description below refers to the configurati...

Page 217: ...n BRI ports can operate in point to point pp or point to multi point pmp mode Point to multipoint is used to connect multiple terminals to an ISDN S Bus In some cases small PBXs are also con nected to the public ISDN in point to multi point mode Point to point is typically used to connect PBXs to a public or private ISDN The Q 921 protocol of PRI ports always run in point to point pp mode 2 node q...

Page 218: ...ote QSIG is an ISDN based protocol for signaling between nodes of a Private Integrated Services Network The formal name of the signaling system by ISO IEC is PSS1 Both names will co exist and QSIG will continue to be used as the marketing name Mode q931 Step Command Purpose 1 name base mode no encapsulation q931 Enables Disables Q 931 2 name base mode q931 Enter the Q 931 configuration mode Step C...

Page 219: ...ake sure that the device connected to a SmartNode ISDN port is operating the oppo site side of the configured uni side 4 node q931 slot port max calls number of calls or node q931 slot port no max calls Limits the total number of concurrent calls on the port The no form of the command restores the default settings Note if the channel range and max calls command are used simultaneously the lower nu...

Page 220: ...ent state and statistic informa tion about received and transmitted frames Mode Operator execution 6 node q931 slot port bchan number order ascending or node q931 slot port bchan number order ascending cyclic or node q931 slot port bchan number order descending or node q931 slot port bchan number order descending cyclic Specify B channel allocation strategy Default ascending The numbering mode def...

Page 221: ...onfigured accordingly i e port 0 as USR clock master and port 1 NET clock slave 172 16 40 71 cfg port bri 0 0 172 16 40 71 prt bri 0 0 clock slave 172 16 40 71 prt bri 0 0 q921 172 16 40 71 q921 0 0 q931 172 16 40 71 q931 0 0 uni side net 172 16 40 71 q931 0 0 encapsulation cc isdn 172 16 40 71 q931 0 0 bind interface bri00 172 16 40 71 q931 0 0 exit 172 16 40 71 q921 0 0 exit 172 16 40 71 prt bri...

Page 222: ...q931 1 0 signalling rule etsi 172 16 40 71 q931 1 0 max channels 8 172 16 40 71 q931 0 0 exit 172 16 40 71 q921 0 0 exit 172 16 40 71 prt e1 0 0 no shutdown Example PRI Configure PRI port 1 0 as clock master From the Local Exchange timeslots 1 through 20 are available and the total number of concurrent calls shall be limited to 10 Use down cyclic channel numbering 172 16 40 71 cfg port e1 1 0 172 ...

Page 223: ...nfiguration Chapter contents Introduction 224 RBS configuration task list 224 Enter RBS configuration mode 224 Configuring RBS protocol 224 Configuring RBS encapsulation 225 Debugging RBS 225 RBS Configuration Examples 226 ...

Page 224: ...figuration mode There are two different ways how to use RBS First RBS encapsulation can be directly configured on the requested T1 port In this case all timeslots will use the same configured RBS protocol and will be bound to the same Call Control interface But if not all timeslots of a T1 port have to be configured for RBS or some timeslots have to use a different RBS protocol or different groups...

Page 225: ...tion has to be attached to the RBS protocol Here it will always be the CC RBS Call Control application and also a binding to a pre created RBS interface is neces sary For information about creation and configuration of a RBS interface please consult Chapter 37 RBS interface configuration on page 421 Mode rbs Debugging RBS For the investigation of possible RBS protocol problems or to get informatio...

Page 226: ...ng different RBS protocols with a Channel Group on an E1T1 port port e1t1 0 0 port type t1 clock slave linecode b8zs framing esf encapsulation channelized channel group RBS_GROUP_1_8 timeslots 1 8 encapsulation rbs rbs protocol eam wink start encapsulation cc rbs bind interface RBS00_1_8 switch channel group RBS_GROUP_9_16 timeslots 9 16 encapsulation rbs rbs protocol eam immediate start encapsula...

Page 227: ...rtWare Software Configuration Guide 20 RBS configuration channel group RBS_GROUP_17_24 timeslots 17 24 encapsulation rbs rbs protocol eam double wink start encapsulation cc rbs bind interface RBS00_17_24 switch port e1t1 0 0 no shutdown ...

Page 228: ...ntroduction 229 Line Setup 229 Configuring PPPoE 229 Configuration Summary 230 Setting up permanent virtual circuits PVC 231 Using PVC channels in bridged Ethernet mode 231 Using PVC channels with PPPoE 231 Diagnostics 232 Troubleshooting DSL Connections 232 ...

Page 229: ...the link is established If the modem keeps blinking check the cabling Configuring PPPoE Figure 36 explains how to configure PPPoE on the SmartNode s built in G SHDSL card To configure the DSL port for PPPoE first you need to log in to the SmartNode via the CLI and enter configuration mode login administrator password enter node enable node configure The Modem setup uses IP messages within its own ...

Page 230: ...se authentication which is why you bind to a subscriber You can use authentication chap or authentication pap The line bind sub scriber MySubscriber binds the PPPoE session to the PPP subscriber in case authentication is required If you do not use authentication then you will not have a subscriber and you will bind directly to the interface Configuration Summary The modems offer multiple bridged E...

Page 231: ... if the PVC was a regular Ethernet port Note The bridged PVC connections are internally mapped to VLANs on a virtual Ethernet port 0 2 You will therefore see references to this third Ethernet port when displaying PPPoE status information or debug logs Table 8 PVC Commands Command Purpose Step 1 node prt dsl 0 0 no pvc vpi 8 vci 35 Creates PVC 8 35 and enters configuration mode for this PVC The no ...

Page 232: ...ot working there is probably no compatible authentication protocol configured Make sure authentication chap and authentication pap are included in the subscriber setup If only CHAP failed there may be an error with the username or password Run the debug command node debug dsl setup See table 11 above Table 11 Diagnostics commans Command Purpose Step 1 node show dsl type Displays the type of modem ...

Page 233: ...uting 234 Policy routing 234 Basic IP routing configuration task list 234 Configuring static IP routes 235 Deleting static IP routes 236 Displaying IP route information 236 Configuring policy routing 237 Examples 238 Basic static IP routing example 238 Changing the default UDP port range for RTP and RTCP 239 ...

Page 234: ...Routing algorithms must converge rapidly i e all routers must agree on optimal routes When a network event causes routes either to go down or to become unavailable routers distribute routing update messages that permeate networks causing recalculation of optimal routes that are eventually agreed upon by all routers Routing algorithms that converge slowly can cause routing loops or network outages ...

Page 235: ... the network or subnet and the 0 bits indicate the host portion of the network address provided address The IP address of a next hop router that can access the target network or subnet interface The name of the outgoing interface to use for the target network or subnet metric This is an optional parameter Specifies the desirability of the route when compared against other routes The range is 0 thr...

Page 236: ...is command displays the destination address next hop interface protocol local static RIP or ICMP metric flags U up H host G Gateway L local D default and amount of use for each route in the routing table If there are multiple routes to the same destination the preferred route is indicated by an asterisk Example Displaying IP route In the following example IP route information is displayed node sho...

Page 237: ... as routing criteria The follow ing traffic classes are defined ß Default all IP packets that are arriving from the WAN or the LAN and need to be routed through ß Local voice IP packets that are created within the unit and contain voice data RTP ß Local default IP packets that are created within the unit and do not contain voice e g SIP signaling DNS lookup Telnet etc In addition packets can be ca...

Page 238: ...described in the subsection Testing connections with the ping command on page 125 in Chapter 10 IP interface configuration Traceroute refer to the traceroute command described in the subsection Traceroute on page 128 in Chap ter 10 IP interface configuration Examples Basic static IP routing example Figure 37 shows an Internetwork consisting of three routers a SmartNode device in the middle and the...

Page 239: ...uter Status codes valid U up H host G Gateway L local D default Destination Nexthop Protocol Metric Flags Used 127 0 0 1 32 local 0 LHG n a 172 16 40 1 24 local 0 LHG n a 172 17 100 1 24 local 0 LHG n a 172 17 100 0 24 wan local 1 UL 0 172 16 40 0 16 lan local 1 UL 0 10 1 5 10 32 172 16 40 2 static 0 U 0 10 2 0 0 16 172 17 100 2 static 0 U 0 Changing the default UDP port range for RTP and RTCP The...

Page 240: ...ceive RIP version 244 Enabling RIP learning 244 Enabling an interface to receive RIP 245 Enabling RIP announcing 245 Enabling RIP auto summarization 246 Specifying the default route metric 246 Enabling RIP split horizon processing 247 Enabling the poison reverse algorithm 247 Enabling holding down aged routes 248 Setting the RIP route expiry 248 Displaying RIP configuration of an IP interface 249 ...

Page 241: ...P or the router can source generate the default network itself with RIP In both cases the default net work is advertised through RIP to other RIP neighbors a SmartNode will send and receive RIP information from the specified interface if the following conditions are met The rip supply flag for a specific interface is enabled The rip listen flag for a specific interface is enabled The default route...

Page 242: ...RIP commands have the character of a flag which is either enabled or disabled Enabling send RIP Enabling an interface to receive RIP see page 243 Specifying the send RIP version see page 243 Specifying the receive RIP version see page 244 Enabling RIP learning see page 244 Enabling an interface to receive RIP see page 245 Enabling RIP announcing see page 245 Enabling RIP auto summarization see pag...

Page 243: ...p router interface wan node if ip wan rip receive Specifying the send RIP version By default RIP 1compatible packets are sent Alternatively you can explicitly configure the RIP version to be sent with the last command argument as following 1 RIPv1 1compatible RIPv1 compatible 2 RIPv2 This procedure describes how to select the sending RIP version on interface Mode Interface Example Specifying the s...

Page 244: ...oute whose destination is already in the local table the new route is used only if it has a lower cost The cost of a route is determined by adding the cost of reaching the gateway that sent the update to the metric contained in the RIP update packet If the total metric is less than the metric of the current route the new route is used Two RIP learning mechanisms are offered which are represented b...

Page 245: ...m specific routing information to other elements in a network The RIP announcing command is used for this purpose and offers options for default for RIP default routes host for IP host routes self as default for self as RIP default routes and static for static IP routes Depending on the RIP announcing method the last option for the command in 3 must be explicitly selected It is possible to have mo...

Page 246: ...a destination net work Each hop in a path from source to destination is assigned a hop count value which is typically 1 When a SmartNode receives a routing update that contains a new or changed destination network entry the Smart Node adds one to the metric value indicated in the update and enters the network in the routing table The IP address of the sender is used as the next hop RIP prevents ro...

Page 247: ...plit horizon processing The following example shows how to enable split horizon on IP interface wan node cfg context ip router node ctx ip router interface wan node if ip wan rip split horizon Enabling the poison reverse algorithm Normally RIP uses a technique called split horizon to avoid routing loops and allow smaller update packets This technique specifies that when the router sends a RIP upda...

Page 248: ...y in the presence of transients This procedure describes how to enable holding down of aged routes on an interface Mode Interface Example Enabling holding down aged routes The following example shows how to enable holding down of aged routes on IP interface wan node cfg context ip router node ctx ip router interface wan node if ip wan rip route holddown Setting the RIP route expiry The rip route e...

Page 249: ...n 1compatible receive version 1or2 learn host disabled learn default disabled announce host disabled announce static disabled announce default disabled announce self as default disabled route holddown enabled poison reverse disabled auto summary disabled split horizon disabled default route value 0 Displaying global RIP information SmartWare also support displaying global RIP information for the I...

Page 250: ...RIP configuration task list 250 SmartWare Software Configuration Guide 23 RIP configuration rip enabled ...

Page 251: ...access control list 254 Creating an access control list profile and enter configuration mode 255 Adding a filter rule to the current access control list profile 255 Adding an ICMP filter rule to the current access control list profile 257 Adding a TCP UDP or SCTP filter rule to the current access control list profile 259 Binding and unbinding an access control list profile to an IP interface 261 D...

Page 252: ...r to forward or drop the packet based on the criteria you specified within the access lists Access list criteria could be the source address of the traffic the destination address of the traffic the upper layer protocol or other information Note Sophisticated users can sometimes successfully evade or fool basic access lists because no authentication is required Why you should configure access list...

Page 253: ...itioned between two parts of your network to control traffic entering or exiting a specific part of your internal network To provide the security benefits of access lists you should configure access lists at least on border routers i e those routers situated at the edges of your networks This provides a basic buffer from the outside network or from a less controlled area of your own network into a...

Page 254: ...et matching the criteria to be dropped To delete an entire access control list enter configuration mode and use the no form of the profile acl com mand naming the access list to be deleted e g no profile acl name To unbind an access list from the interface to which it was applied enter the IP interface mode and use the no form of the access control list command Access control list configuration ta...

Page 255: ...ual statements that will make up the access control list Use the no form of this command to delete an access control list profile You cannot delete an access control list profile if it is currently linked to an interface When you leave the access control list configuration mode the new settings immediately become active Example Create an access control list profile In the following example the acc...

Page 256: ...control list entry that denies access defined according to the command options Keyword Meaning src The source address to be included in the rule An IP address in dotted decimal format e g 64 231 1 10 src wildcard A wildcard for the source address Expressed in dotted decimal format this value specifies which bits are significant for matching One bits in the wildcard indicate that the corre sponding...

Page 257: ...s procedure describes how to create an ICMP access control list entry that denies access Mode Profile access control list Step Command Purpose 1 node pf acl name permit icmp src src wildcard any host src dest dest wildcard any host dest msg name type type type type code code cos group Creates an ICMP access of con trol list entry that permits access defined according to the com mand options Step C...

Page 258: ...cluded in the rule An IP address in dotted decimal format e g 64 231 1 10 dest wildcard A wildcard for the destination address See src wildcard host dest The address of a single destination host msg name The ICMP message name The following are valid message names administratively prohibited alternate address conversion error dod host prohibited dod net prohibited echo echo reply general parameter ...

Page 259: ...s Mode Profile access control list This procedure describes how to create a TCP UDP or SCTP access control list entry that denies access Mode Profile access control list Step Command Purpose 1 node pf acl name permit tcp udp sctp src src wild card any host src eq port gt port lt port range from to dest dest wildcard any host dest eq port gt port lt port range from to cos group cos rtp group data g...

Page 260: ... Indicates that a packets port must be equal to the specified port in order to match the rule lt port Optional Indicates that a packets port must be less than the specified port in order to match the rule gt port Optional Indicates that a packets port must be greater than the specified port in order to match the rule range from to Optional Indicates that a packets port must be equal or greater tha...

Page 261: ...list profile to incoming packets on the interface wan in the IP router context node cfg context ip router node cfg ip router interface wan node cfg if wan use profile acl WanRx in Step Command Purpose 1 node if ip if name use profile acl name in Binds access control list profile name to incom ing packets on IP interface if name Keyword Meaning if name The name of the IP interface to which an acces...

Page 262: ...profile Mode Administrator execution or any other mode except the operator execution mode Example Displaying an access control list entries The following example shows how to display the access control list profile named WanRx node show profile acl WanRx IP access list WanRx Linked to router wan in deny icmp any any msg echo permit ip 62 1 2 3 0 0 255 255 host 193 14 2 11 permit ip 97 123 111 0 0 ...

Page 263: ...le disables the debug monitor for access control lists globally node no debug acl Step Command Purpose 1 node cfg context ip router Selects the IP router context 2 node ctx ip router interface if name Selects IP interface if name for which access control list profile shall be debugged 3 node if ip if name debug acl in out level Enables access control list debug monitor with a certain debug level f...

Page 264: ...e lan Figure 39 Deny a specific subnet on an interface The commands that have to be entered are listed below 172 16 2 1 enable 172 16 2 1 configure 172 16 2 1 cfg profile acl Jamming 172 16 2 1 pf acl Jamming deny ip 172 16 2 0 0 0 0 255 172 16 1 0 0 0 0 255 172 16 2 1 pf acl Jamming permit ip any any 172 16 2 1 pf acl Jamming exit 172 16 2 1 cfg context ip router 172 16 2 1 cfg ip router interfac...

Page 265: ...Identification of a SmartNode via SNMP 267 SNMP tools 268 SNMP configuration task list 268 Setting basic system information 268 Setting access community information 270 Setting allowed host information 272 Specifying the default SNMP trap target 272 Displaying SNMP related information 273 Using the AdventNet SNMP utilities 273 Using the MibBrowser 274 Using the TrapViewer 275 Standard SNMP version...

Page 266: ...an SNMP agent and resides on a managed network Managed devices collect and store management information and make this information available to NMSs using SNMP Managed devices sometimes called network elements can be routers and access servers switches and bridges hubs computer hosts or printers An agent is a network management software module that resides in a managed device An agent has local kno...

Page 267: ...g and naming objects and events for the purpose of management The first ver sion Structure of Management Information SMIv1 is described in RFC 1155 Structure and Identifica tion of Management Information for TCP IP based Internets RFC 1212 Concise MIB Definitions RFC 1213 Management Information Base for Network Management of TCP IP based Internets MIB II and RFC 1215 A Convention for Defining Trap...

Page 268: ...information The implementation of the MIB II system group is mandatory for all systems By default an SNMP agent is configured to have a value for any of these variables and responds to get commands from a NMS The following MIB II panels should be set sysContact sysLocation sysName The system sysContact object is used to define the contact person together with information on how to con tact that pe...

Page 269: ...nternet mgmt mib 2 system sysLocation After setting these values according to 1 through 3 any SNMP MIB browser application should read the values using a get or get next command as shown in figure 40 The procedure to use the SNMP MIB browser is Enter the community string public into the Community field in the upper right corner of the window For safety reasons each entered character is displayed w...

Page 270: ... displays the IP address of the Ethernet port over which the Telnet session is running but shows the newly entered host name Setting access community information SNMP uses one or more labels called community strings to delimit groups of objects variables that can be viewed or modified on a device The SNMP data in such a group is organized in a tree structure called a Man agement Information Base M...

Page 271: ...affected devices possibly without the system administrators being aware that changes are being made resulting in a failure of integrity and a possible failure of device availability To prevent these situations define community strings that only allow read only access to the MIB objects should be the default By default SNMP uses the default communities public and private You probably do not want to...

Page 272: ...s a message that the SNMP agent sends to a network management station For example an SNMP agent would send a trap when an interface s status has changed from up to down The SNMP agent must know the address of the network management station so that it knows where to send traps It is possible to define more than one SNMP trap target The SNMP message header contains a community field The SNMP agent u...

Page 273: ...Closet 3rd floor contact Bill Anybody Phone 818 700 1504 Hosts 172 16 224 44 security name public Targets 172 16 224 44 security name Not4evEryOne Communities public access right ro Not4evEryOne access right rw Using the AdventNet SNMP utilities The AdventNet SNMP utilities are a set of cross platform applications and applets for SNMP and Web based network management These utilities can be used fo...

Page 274: ...form the same operations as the options available in the toolbar The left frame holds the MIB tree A MIB tree is a structure through which all the MIBs loaded can be viewed The MIB tree component enables us to traverse through the tree view the loaded MIBs and learn the definition for each SN The AdventNet MibBrowser allows loading additional MIB files in the text format the my file contains enter...

Page 275: ... the value in the Port text field is 162 Enter the desired port in the field on which the viewer will listen The default value in the Community text field is public Set the community of the incoming traps as desired depending on the SNMP configuration Click on Add button to add the port and community list on which the trap has to listen to This is visible in the TrapList combo box The port and com...

Page 276: ... in the MIB II sysUpTime variable converted into hours minutes and seconds Enterprise This field shows the OID of the management enterprise that defines the trap message The value is represented as an OBJECT IDENTIFIER value and has a variable length Generic Type The Generic type value is categorized and numbered 0 to 6 They are 0 coldStart 1 warm Start 2 linkDown 3 linkUp 4 authenticationFailure ...

Page 277: ...with the SNMP warmStart TRAP TYPE ENTERPRISE snmp DESCRIPTION A warmStart trap signifies that the sending protocol entity is reinitializing itself such that neither the agent configuration nor the protocol entity implementa tion is altered 1 linkDown TRAP TYPE ENTERPRISE snmp VARIABLES ifIndex DESCRIPTION A linkDown trap signifies that the sending protocol entity recognizes a failure in one of the...

Page 278: ...P community string which does not correspond to the system setting coldStart TRAP TYPE ENTERPRISE snmp DESCRIPTION A coldStart trap signifies that the sending protocol entity is reinitializing itself such that the agent s configuration or the protocol entity implementation may be altered 0 Note The standard SNMP version 1 trap coldStart as listed below is not sup ported After powering up a warmSta...

Page 279: ...e 25 SNMP configuration 2002 09 06T14 54 39 LOGINFO Link up on interface eth00 2002 09 06T14 54 39 LOGINFO Link up on interface eth01 2002 09 06T14 56 02 LOGINFO Link up on interface SLOT2 00 ISDN D 2002 09 10T14 21 20 LOGINFO Link down on interface SLOT2 00 ISDN ...

Page 280: ...sabling the SNTP client 284 Defining SNTP client poll interval 284 Defining SNTP client constant offset to GMT 285 Defining the SNTP client anycast address 285 Enabling and disabling local clock offset compensation 286 Showing SNTP client related information 287 Debugging SNTP client operation 287 Recommended public SNTP time servers 288 NIST Internet time service 288 Additional information on NTP...

Page 281: ...henticate traffic although you can configure extended access lists to provide some protection An SNTP client is more vulnerable to misbe having servers than an NTP client and should only be used in situations where strong authentication is not required SNTP client configuration task list To configure an SNTP client perform the tasks described in the following sections The tasks in the first four s...

Page 282: ...relative to the server In anycast mode multipoint to point the client sends a request to a designated local broadcast or multicast group address and expects a reply from one or more anycast servers In multicast mode point to multipoint the client sends no request and waits for a broadcast from a desig nated multicast server Note Unicast mode is the default SNTP client operating mode This procedure...

Page 283: ...nation port on SNTP time server fields in the UDP header The local port number which the SNTP client uses to contact the primary or secondary SNTP time server in unicast mode has to be defined Note The local port number setting is used when contacting the SNTP time server The SNTP time server will send its reply to the SNTP client Smart Node using the same port number as used in the request The lo...

Page 284: ... Specifies the seconds between each SNTP client request in unicast or anycast mode This SNTP client poll interval can be defined to be within the range from 1 to 4 294 967 295 The default value is 60 seconds This procedure describes how to set the SNTP client poll interval Mode Configure Example Setting the SNTP client poll interval In the following example the SNTP client poll interval is set to ...

Page 285: ...ss as described below For this purpose the NTP multicast group address assigned by the IANA is used One or more anycast servers listen on the designated local broadcast address or multicast group address Each anycast server upon receiving a request sends a unicast reply message to the originating client The client then binds to the first such message received and continues operation in unicast mod...

Page 286: ...lliseconds relative to the server In addition this provides a simple method to verify that the server reply is in fact a legitimate response to the specific client request and to avoid replays In multicast mode the client has no information available to calculate the propagation delay or to determine the validity of the server unless the NTP authentication scheme is used This procedure describes h...

Page 287: ...sntp client SNTP client enabled Operating mode unicast Local port 123 Primary server 172 16 1 10 123 v4 Secondary server 128 138 140 44 123 v4 Anycast address 224 0 1 1 123 Poll interval 30sec Local clock offset disabled GMT offset 2 00 00 Debugging SNTP client operation During setup and operation debugging the behavior of the SNTP client is very useful Note The debug sntp client is only available...

Page 288: ...e the SNTP debug monitor and end any debug information node cfg no debug sntp client Recommended public SNTP time servers NIST Internet time service The National Institute of Standards and Technology NIST Internet Time Service allows users to synchronize computer clocks via the Internet The time information provided by the service is directly traceable to UTC Table 13 contains information about al...

Page 289: ...nformation about NIST Internet Time Service ITS check their web server at http www boulder nist gov timefreq service its htm Additional information on NTP and a list of other NTP servers The site http ntp isc org contains a maintained list of available NTP SNTP servers Please only use the ones with an open access policy ...

Page 290: ...nt 294 DHCP server configuration tasks 295 Configure DHCP server profiles 295 Use DHCP server profiles and enable the DHCP server 297 Define the bootfile Option 67 for the DHCP server 298 Define the TFTP server Option 66 for the DHCP server 298 Check DHCP server configuration and status 298 Get debug output from the DHCP server 299 Configure DHCP relay 300 Create Modify DHCP Relay profile 300 Enab...

Page 291: ...assigning IP addresses was replaced by automatic distributing IP addresses The days when a network administrator had to manually configure each new network device before it could be used on the network are past In addition to distributing IP addresses DHCP enables configuration information to be distributed in the form of DHCP options These options include for example the default router address do...

Page 292: ... DHCP client on an IP interface Release or renew a DHCP lease manually advanced see page 294 Get debug output from DHCP client see page 294 Configure DHCP agent Enable DHCP client on an IP interface On every created IP interface a DHCP client could be enabled If enabled the SmartNode gets the IP address for this interface from a DHCP server Additionally other configuration information is received ...

Page 293: ... an IP interface node cfg context ip node ctx ip router interface eth0 node if ip eth0 ipaddress dhcp node if ip eth0 show dhcp client Context router Name eth0 IpAddress 172 16 224 102 255 255 0 0 Default gateway 172 16 1 10 Domain Name pacific DNS 172 16 1 10 146 228 10 16 Next Server Ip 172 16 1 10 DHCP Server 172 16 1 10 Lease obtained 2001 01 01T01 03 51 Lease expires 2001 01 01T09 03 51 State...

Page 294: ... renew node cfg context ip node ctx ip router interface eth0 node if ip eth0 debug dhcp client node if ip eth0 dhcp client release 01 12 28 DHCPC router eth0 Rels Unicasting DHCP release xid 490cb56b secs 1 01 12 29 DHCPC router eth0 Rels Shutting down 01 12 29 DHCPC router eth0 Rels Tearing down IP interface 2001 01 01T01 12 30 LOGINFO Link down on interface eth0 2001 01 01T01 12 30 LOGINFO Link ...

Page 295: ...er profiles and enable the DHCP server and to clear lease database see page 297 Define the bootfile for the DHCP server see page 298 Define the TFTP server for the DHCP server see page 298 Check DHCP server configuration and status see page 298 Get debug output from the DHCP server see page 299 Configure DHCP relay see page 300 Configure DHCP server profiles The DHCP server profiles hold the confi...

Page 296: ... pf dhcps name lease time days hours minutes Defines the time a lease is valid DHCP Option 51 6 optional node pf dhcps name no domain name domain name A PC DHCP client may use this domain name to complete host names to fully qualified domain names DHCP Option 15 7 optional node pf dhcps name no domain name server domain name server ip address Defines up to 2 domain name servers DNS to be used by t...

Page 297: ...mple shows how to assign a profile to the DHCP server and to start the DHCP server node ctx ip router dhcp server use LAN node ctx ip router dhcp server 10 optional node pf dhcps name no bootfile boot file name Defines the bootfile the client shall use when starting Usually this is used in conjunction with the next server command Basic DHCP information Boot file name 11 optional node pf dhcps name...

Page 298: ...onfiguration and status This procedure describes how to check the configuration and current status of the DHCP server Mode Any Example node ctx ip router show dhcp server The DHCP server is running Profiles LAN active Network 192 168 1 0 255 255 255 0 Include 192 168 1 32 192 168 1 63 Lease Time 2 days Default Router 192 168 1 1 Domain Name Server 80 254 161 125 80 254 161 126 Bound leases 192 168...

Page 299: ...ing DHCP OFFER to 192 168 1 32 via 255 255 255 255 68 21 41 29 DHCPS Deferring save of lease database 21 41 29 DHCPS Last saved at 2002 12 04T21 40 29 next at 2002 12 04T21 55 29 21 41 29 DHCPS Request from ethernet 00 10 A4 7C 7A F8 client id 01 00 10 A4 7C 7A F8 via 192 168 1 1 21 41 29 DHCPS Offer 192 168 1 32 has been selected 21 41 29 DHCPS Sending DHCP ACK to 192 168 1 32 via 255 255 255 255...

Page 300: ...ination IPs are removed the profile is considered invalid and the DHCP Relay is shut down Mode Configure Step Command Purpose 1 name cfg no profile dhcp relay name Enter dhcp relay profile mode A new profile is created if none with the given name exists 2 name pf dhcpr name destina tion ip address or name pf dhcpr name destina tion after index ip address or name pf dhcpr name destina tion before i...

Page 301: ...ation Guide 27 DHCP configuration Enable Disable DHCP Relay Agent Mode Context IP Step Command Purpose 1 name ctx ip name dhcp relay use profile or name ctx ip name no dhcp relay Enable or disable DHCP Relay DHCP Relay cannot be enabled if a DHCP Server is running ...

Page 302: ...302 Chapter 28 DNS configuration Chapter contents Introduction 303 DNS configuration task list 303 Enabling the DNS resolver 303 Enabling the DNS relay 304 ...

Page 303: ...at originated the query This process enables the SmartNode to provide answers more quickly to often queried DNS names reducing the number of DNS que ries that must be sent across the access link DNS configuration task list The following sections describe how to configure the DNS component Enabling the DNS resolver Enabling the DNS relay Enabling the DNS resolver To enable the SmartNode DNS resolve...

Page 304: ...iscovered IP 81 221 250 10 Not used Discovered IP 81 221 252 10 Not used node cfg Configured IP indicates a domain name server that has been configured as shown at the beginning of this section Discovered IP indicates a domain name server that was learned automatically Figure 45 DNS relay diagram Enabling the DNS relay DNS Domain Name System is a distributed database used in IP networks to provide...

Page 305: ...rvers can be consulted from the SmartNode The DNS resolver must be configured before you can use the DNS relay feature see section Enabling the DNS resolver on page 303 to enable the DNS resolver if you have not already done so Do the following to enable the DNS relay feature Mode Configure Example Enabling DNS relay The following example shows how to enable the DNS relay feature node enable node ...

Page 306: ...onfiguration task list 307 Creating a DynDNS account 307 Configuring the DNS resolver 307 Configuring basic DynDNS settings 308 Configuring the DynDNS server 308 Configuring advanced DynDNS settings optional 309 Defining a mail exchanger for your hostname 309 Troubleshooting 309 ...

Page 307: ...different levels of service The basic services are offered free of charge while the more advanced services are chargeable The SmartNode supports the following DynDNS services Dynamic DNS Static DNS Custom DNS DynDNS configuration task list This section describes configuring the DynDNS service All possible configurations which are involved in a specific configuration topic are described in the resp...

Page 308: ...5gf46te node dyndns service dynamic node dyndns hostname myhostname dyndns org node dyndns observe eth1 Configuring the DynDNS server A DynDNS server other than dyndns org can be configured in case you or your provider runs an own DynDNS server Mode context cs dyndns Step Command Purpose 1 node dyndns authentication user pass word Defines the authentication credentials of your DynDNS account 2 nod...

Page 309: ...s information as follows Mode DynDNS Example Displaying DynDNS status information The following example displays status information of a properly configured and working DynDNS client node dyndns show dyndns Current state Idle Last registered address 243 232 39 64 Hostname test dyndns org You can also monitor current activities of the DynDNS client This includes ongoing DNS queries for DynDNS serve...

Page 310: ... 32 59 64 If required you can force the DynDNS component to re register the current IP address on the DynDNS server even if the dynamic IP address has not changed using the following command this command could also be useful for observing the update process in the debug monitor You can also force the DynDNS client to resume normal operation if the state of the DynDNS client is shown as blocked and...

Page 311: ...guration information 322 Debugging PPP 323 Sample configurations 327 PPP over Ethernet PPPoE 327 Without authentication encapsulation multi with NAPT 327 With authentication encapsulation PPPoE 327 PPP over a HDLC Link Serial Port 328 Without authentication numbered interface 328 With authentication unnumbered interface 328 PPP over a HDLC Link E1T1 Port 328 Without authentication numbered interfa...

Page 312: ...lower right corner Figure 46 PPP configuration overview Since the purpose of PPP is providing IP connectivity over different types of link layers all PPP configuration elements connect to the IP context through an IP interface This connection is relayed via a subscriber profile if either PPP peer requires authentication For PPP over Ethernet a PPPoE session must be configured on the respective Eth...

Page 313: ...face for PPP An IP interface is required to link a PPP connection to the IP context The IP interface must apply a network address port translation NAPT if the PPP service provider only offers a single IP address and not an IP sub net or if the IP addresses on the LAN shall be private and hidden behind a public IP address see 11 NAT NAPT configuration on page 130 for more information about NAPT Thi...

Page 314: ...IP address offered by the PPP remote peer The parameter netmask specifies the size of the subnet in case no point to point is configured 4 optional node if ip name no tcp adjust mss rx tx mtu mss Limits to the MSS Maximum Segment Size in TCP SYN packets to mss or to MTU Maximum Transmit Unit 40 Bytes if mtu is used rx applies to packets which arrive inbound at this IP interface tx to packets which...

Page 315: ... disables automatic configuration of the interface IP address from the PPP network control protocol negotiation Mode profile ppp Creating a PPP subscriber One or more PPP subscriber shall be configured if either PPP peer requires authentication This procedure describes how to create a PPP subscriber Mode Configure 5 optional node if ip name use profile napt name Assigns the NAPT profile name to ap...

Page 316: ...l in 3 node subscr name no authentication chap pap chap pap Defines the authentication protocol to be used PAP and or CHAP 4 optional node subscr name no identification outbound inbound user password password Sets the credentials to be provided during the authentication procedure the user name user and the password password The keywords inbound and outbound define the direction of authentication i...

Page 317: ...nterface IP address auto configuration from PPP This procedure enables disables automatic configuration of the interface IP address from the PPP network control protocol negotiation Mode profile ppp Configuring a PPPoE session PPP can run over Ethernet PPPoE The active discovery protocol identifies the PPP remote peer on the Ether net and establishes a PPPoE session with it The PPPoE session provi...

Page 318: ...ession with the name name 7 node pppoe slot port no bind inter face name router or node pppoe slot port no bind sub scriber name Binds the PPPoE session directly to the IP inter face name in case no authentication is required Binds the PPPoE session to the PPP subscriber name in case authentication is required 8 optional node pppoe slot port no use profile ppp name Assigns a PPP profile other than...

Page 319: ... Mode hdlc sub Creating a PPP profile A PPP profile allows to adjust additional PPP parameters like the maximum transmit unit MTU and maxi mum receive unit MRU Only the most important parameters are listed here The profile default is always present and supplies the parameters if no other profile has been created or no pro file can be used with a certain type of PPP connection Profiles created by t...

Page 320: ... packets in Bytes allowed on the outbound PPP connection Outbound packets larger than the maximum size are fragmented into smaller ones if allowed The default value is 1492 Bytes On the IP interface over which the PPP connec tion runs the minimum of the IP interface MTU and PPP MTU applies 3 optional node pf ppp name mru min min max max Defines the minimum and maximum size of IP packets in Bytes a...

Page 321: ... Configures the minimum maximum and default value of the local MRRU The configured range min max is forced during PPP LCP negotiation while the default value is offered first Note that the MRRU option is only offered when multi link is enabled The default minimum value is 68 The default maximum value is 1920 The default default value is 1500 2 name pf ppp profile mtru min min max max default defau...

Page 322: ...for disconnect no absolute timeout no idle timeout Max sessions no limit IP address none Callback none Binding interface ppp_interface router Binding interface ppp_interface router Step Command Purpose 1 node cfg show running config Gives the best overview of all PPP related configura tion information The following parts are of interest profile ppp default profile ppp name interface name subscribe...

Page 323: ... LCP Configure Request interval 3000 ms max 10 LCP Configure Nak max 5 LCP Terminate Request interval 3000 ms max 2 LCP Echo Request interval 10000 ms max 3 MTU 68 1492 MRU 68 1492 Callback both CHAP allowed PAP allowed Authentication interval 3000 ms max 3 IPCP Configure Request interval 3000 ms max 10 IPCP Configure Nak max 5 IPCP Terminate Request interval 3000 ms max 2 Van Jacobson Compression...

Page 324: ...e name Displays status configuration information and sta tistics of PPPoE in general and of the PPPoE ses sion s Check whether state of the respective session is Opened level specifies to level of details displayed 1 4 default is 1 4 node cfg show port interface name Displays status and configuration information of the IP interface at which a PPP connection terminates Check whether state of the in...

Page 325: ...3 Local ID 100000020390 Remote ID Local configured options Magic Number 0x00000000 MRU 1492 68 1492 ACCM 0xffffffff Local acknowledged options Remote configured options Magic Number 0xb89d9e6b MRU 1492 68 1492 ACCM 0xffffffff Authentication Protocol PAP Remote acknowledged options MRU 1492 68 1492 Magic Number 0xb89d9e6b Authentication Protocol PAP Remote denied options Remote rejected options PAP...

Page 326: ...ssion Protocol VJC Max Slot Id 31 Comp Slot Id 1 Remote configured options IP Address 0 0 0 0 IP Compression Protocol VJC Max Slot Id 24 Comp Slot Id 1 Remote acknowledged options IP Address 10 10 10 1 IP Compression Protocol VJC Max Slot Id 15 Comp Slot Id 1 Remote denied options Remote rejected options Example Display PPPoE information node session green show pppoe 4 PPPoE Information Instance I...

Page 327: ...ace ipaddress 172 16 1 1 255 255 0 0 interface ppp_interface ipaddress unnumbered point to point tcp adjust mss rx mtu tcp adjust mss tx mtu use profile napt WAN context ip router route 0 0 0 0 0 0 0 0 ppp_interface 0 port ethernet 0 0 encapsulation multi bind interface normal_ip_interface no shutdown pppoe session green bind interface ppp_interface no shutdown With authentication encapsulation PP...

Page 328: ... 172 17 1 1 255 255 255 252 point to point port serial 0 0 encapsulation ppp bind interface ppp_interface no shutdown With authentication unnumbered interface context ip router interface ppp_interface ipaddress unnumbered point to point subscriber ppp joe_example dial in authentication pap identification inbound user password password bind interface ppp_interface router port serial 0 0 encapsulati...

Page 329: ...r is fired on the first packet sent over that IP interface or if the primary link to the destination goes down is configured using the dial up command on bound IP interface When the dialer receives the trigger event it tries to establish one or more connections to the configured desti nation You can specify a list of destinations to be tried Each destination configuration contains all informa tion...

Page 330: ...credentials PPP parameters ect You can create more than one destination in order to fall back to another provider if the first provider is not accessible at the moment Mode context cs interface dialer Step Command Purpose 1 name ctx cs router interface dialer dialer name Creates a new dialer and enters its configura tion mode Step Command Purpose 1 name if dialer dialer outbound PROVIDER1 Creates ...

Page 331: ...e reset command in the context cs interface dialer mode 5 name outbound provider no retry timeout1 timeout2 timeout3 Specifies how many times and after which timeouts the dialer shall redial the same pro vider if the previous dial attempt failed Up to 8 retry timeouts can be specified The speci fied timeouts are relative to the previous try So if you specify a timeout list of retry 5 10 10 calls a...

Page 332: ...n inbound destination with the same configuration parameters Step Command Purpose 1 name if dialer dialer no recovery ini tial link on signaling failure timeout Configures the recovery timeout from a call signaling failure of the first link of a multi link bundle The default value is 30 seconds 2 name if dialer dialer no recovery ini tial link on network error timeout Configures the recovery timeo...

Page 333: ... e164 e164 The incoming call must have the configured called party number to be accepted Use the no form of the command to accept calls to all numbers 3 name inbound provider remote e164 e164 The incoming call must have the configured calling party number to be accepted Use the no form of the command to accept calls from all numbers 4 name inbound provider encapsulation ppp Defines the data protoc...

Page 334: ...tivity ping 10 1 1 1 interface IF_SECONDARY ipaddress unnumbered point to point dial up monitor interface IF_PRIMARY route 0 0 0 0 0 0 0 0 10 1 1 1 0 route 0 0 0 0 0 0 0 0 IF_SECONDARY 1 subscriber ppp SUB_PROVIDER1 dial out authentication chap pap identification outbound MY_NAME password MY_PASSWORD bind interface IF_SECONDARY subscriber ppp SUB_PROVIDER2 dial out authentication pap identificatio...

Page 335: ... the IP interface and the interface dialer mode page 329 in context cs Dial up brings up an IP interface even if the link is not established spoofing On some trigger conditions the spoofer gives the signal to dial or to drop the connection to dialer that is bound to the IP interface There are three different trigger conditions available Dial up on demand Dial when the first packet is sent out that...

Page 336: ...ep Command Purpose 1 name if ip interface no dial up mon itor interface ip interface dial delay seconds drop delay seconds queue limit number Configure dial up to monitor the interface specified Dial delay specifies the timeout before dialing Default 10 Drop delay speci fies the timeout before dropping connection Default 10 Queue limit specifies the max number of packets to queue while the link is...

Page 337: ...es 344 Specify call routing 344 Configuring dial tones 345 Configuring voice over IP parameters 345 Configuring ISDN ports 346 Configuring FXS ports 346 Configuring an H 323 VoIP connection 346 Configuring a SIP VoIP connection 346 Activating CS context configuration 347 Planning the CS context 350 Configuring general CS settings 351 Configuring call routing 351 Configuring VoIP settings 353 Confi...

Page 338: ...esponsible for all aspects of circuit signaling switching and emulation Besides the CS context itself the CS entity consists of the following indicated by the shaded area enclosed by a dashed line in figure 47 The CS interfaces ISDN and FXS ports Tone set profiles SIP and H 323 gateways VoIP profiles The CS Context is enabled by default Figure 47 CS context configuration components ACL Profile Ser...

Page 339: ...he relationship between the CS configuration components We recommend that you perform the CS context configuration in the sequence described below Many of the parameters have default values that do not need to be changed which means that you do have to modify all of the described configura tion tasks In such cases it is stated in the text that you can skip the optional configuration task 1 Plannin...

Page 340: ...nding on its prefix and number length Figure 48 Remote office in an Enterprise network An application like that shown in figure 48 would require the following CS configuration Since the remote office is connected to the public switched telephone network the clock source comes from the corresponding ISDN port Described in section Configuring general CS settings on page 341 Node Node IP Backbone PST...

Page 341: ...ave finished planning your voice environment The following chapters explain how to convert the planned voice environment into the Smart Ware CS configuration The IP configuration is not a topic in this example For more information on IP con figuration refer to chapter 9 IP context overview on page 112 Configuring general CS settings There are several parameters that cannot be collected into one sp...

Page 342: ...ode show system clock Current clock source t1 0 2 0 Registered clock sources Name Sync e1 0 1 0 t1 0 2 0 X bri 0 3 0 bri 0 3 1 bri 0 3 2 bri 0 3 3 internal X Step Command Purpose 1 node sys clock source hw type slot port Add an entry to the end of the list node sys clock source index hw type slot port Overwrite and entry at position index node sys clock source before index hw type slot port Insert...

Page 343: ...eria The entity that manages call routing is called the call router Calls are routed from one CS interface to another The call router determines the destination interface for every incoming call It supports complex call routing and call property manipula tion e g number manipulation functions See chapter 40 Call router configuration on page 451 Call routing occurs in the context CS element between...

Page 344: ...of CS contexts are supported The name of the default instance is switch The name and number of CS interfaces depends on your own configuration The interfaces on the CS context represent logi cal connections to other equipment or networks CS interfaces are used as source and destination in the call router VoIP CS interfaces are bound to a gateway Telephony ports are bound to respective interfaces I...

Page 345: ...ignals The tones are configured in tone set profiles that are used from a specific CS interface If no tone set profile is specified a default tone set profile is used In most cases the default profile can be used so you do not need to perform this configuration task Configuring voice over IP parameters In SmartWare there are many configurable parameters that can affect a voice over IP connection T...

Page 346: ...n address For examples and information on how to configure direct call sig naling on H 323 voice connections refer to chapter 38 H 323 interface configuration on page 426 To con figure gatekeeper routed call signaling on H 323 voice connections refer to chapter 45 H 323 gateway configuration on page 541 Configuring a SIP VoIP connection To configure a SIP connection you have to specify the voice c...

Page 347: ...overview on page 554 In order to become active the CS context must be enabled When recovering from the shutdown status the CS context and call router configuration is checked and possible errors are indicated The call router debug monitor can be enabled to show the loading of the CS context and call router configuration SmartWare offers a number of possibilities to monitor and debug the CS context...

Page 348: ...36652 dest interface IF NODE B default dest interface IF LOCAL BA Table switch CAC APPLE Key Value Function Dest Type Dest Name called e164 called e164 1055 1 node cfg debug call router node cfg context cs node ctx cs switch no shutdown Step Command Purpose 1 node ctx cs switch show call router config detail level Show the CS context configuration Level could be 1 5 Level 1 shows less level 5 show...

Page 349: ... precall service 02 14 33 CR switch Loading table IF NODE C precall service node ctx cs switch Example Configure SmartNode in an Enterprise Network Situation Figure 50 shows an enterprise network with a SmartNode configured with a BRI port A PBX a LAN the PSTN and the company network are connected The VoIP protocol used is H 323 There is no gate keeper so direct call signaling is used The voice co...

Page 350: ...N inter faces A hunt group that summarizes two ISDN interfaces is configured later during call router configura tion For every remote H 323 device we need a H 323 interface There are two in total One gets the remote IP address of the SmartNode in office A the other the IP address of the SmartNode in office B Refer to sec tion Configuring call routing on page 343 We need a call router routing table...

Page 351: ... node ctx cs switch interface isdn IF PBX2 node if pstn IF PBX2 route call dest table TAB CALLED NUMBER node if pstn IF PBX2 exit node ctx cs switch interface isdn IF PUBLIC PSTN1 node if pstn IF PUBL route call dest table TAB CALLED NUMBER node if pstn IF PUBL exit node ctx cs switch interface isdn IF PUBLIC PSTN2 node if pstn IF PUBL route call dest table TAB CALLED NUMBER node if pstn IF PUBL e...

Page 352: ...fault dest service HUNT PUBLIC PSTN node rt tab TAB CAL exit node ctx cs switch The hunt group HUNT COMPOFF A tries to reach the company office A routing the call directly to the H 323 interface IF COMPOFF A When this call fails e g because the data network is broken we route the call to the PSTN hunt group Likewise hunt group HUNT COMPOFF B works but tries to route the call to the H 323 interface...

Page 353: ...tx cs switch interface h323 IF COMPOFF B node if h323 IF COMP use profile voip H323 VOIP PROFILE node if h323 IF COMP exit node cfg Configuring BRI ports Next step is to configure the BRI ports and to bind the ports to the ISDN interfaces We configure the layer 2 Q 921 to use point to point mode and layer 3 Q 931 for user or net operation mode node cfg port bri 2 0 node prt bri 2 0 q921 node q921 ...

Page 354: ... call signaling node cfg gateway h323 h323 node gw h323 h323 no ras node gw h323 h323 faststart node gw h323 h323 bind interface eth0 node gw h323 h323 exit node cfg Activating the CS context configuration Prior to activating our configuration we use two show commands to display part of our configuration node cfg show call router config detail 5 Table switch IF PBX1 precall service Key Value Funct...

Page 355: ...H 323 Gateway h323 RAS Engine Administrative Status no Gatekeeper Discovery auto Gatekeepers Re Registration Time 90s Local Aliases Source Information Faststart yes Early H 245 no H 245 Tunneling no Call Signaling 147 86 130 1 1720 Administrative Status close node cfg Finally activate the gateway and CS context node cfg gateway h323 node gw h323 gw_name no shutdown node gw h323 gw_name exit node c...

Page 356: ...ngth 20 codec 3 g711ulaw64k rx length 20 tx length 20 context ip router interface eth0 ipaddress 147 86 130 1 255 255 225 0 mtu 1500 interface eth1 ipaddress 10 0 0 1 255 255 225 0 mtu 1500 context cs switch routing table called e164 TAB CALLED NUMBER route 1 dest service HUNT COMPOFF A route 2 dest service HUNT COMPOFF B route 5 dest service HUNT PBX route default dest service HUNT PUBLIC PSTN in...

Page 357: ... out of order drop cause temporary failure drop cause switching equipment congestion drop cause access info discarded drop cause circuit channel not available drop cause resources unavailable route call 1 dest interface IF COMPOFF B route call 2 dest service HUNT PUBLIC PSTN service hunt group HUNT PBX cyclic drop cause normal unspecified drop cause no circuit channel available drop cause network ...

Page 358: ...10 half encapsulation ip bind interface eth0 router no shutdown port ethernet 0 1 medium 10 half encapsulation ip bind interface eth1 router shutdown port bri 2 0 clock auto encapsulation q921 q921 protocol pp uni side auto encapsulation q931 q931 protocol dss1 uni side net encapsulation cc isdn bind interface IF PBX1 port bri 2 0 no shutdown port bri 2 1 clock auto encapsulation q921 q921 protoco...

Page 359: ...921 q921 protocol pp uni side auto encapsulation q931 q931 protocol dss1 uni side user encapsulation cc isdn bind interface IF PUBLIC PSTN1 port bri 2 2 no shutdown port bri 2 3 clock auto encapsulation q921 q921 protocol pp uni side auto encapsulation q931 q931 protocol dss1 uni side user encapsulation cc isdn bind interface IF PUBLIC PSTN2 port bri 2 3 no shutdown ...

Page 360: ...AKMP IPSEC policy profile 370 Creating modifying an outgoing ACL profile for IPSEC 371 Configuration of an IP interface and the IP router for IPSEC 371 Policy matching 371 Sample configuration snippet 371 Troubleshooting 372 Encrypted Voice Performance considerations 373 Performance considerations 373 Enabling RTP encryption support 373 Using an alternate source IP address for specific destination...

Page 361: ...is a combination of the keyed hashing for message authentication HMAC and the mes sage digest version 5 MD5 hash algorithm It requires an authenticator of 128 bit length and calculates a hash of 96 bits over the packet to be protected see RFC 2403 HMAC SHA1 96 is a combination of the HMAC and the secure hash algorithm version 1 SHA1 It requires an authenticator of 160 bit length and calculates a h...

Page 362: ...IPsec or using Internet Key Exchange IKE Keys are manually generated distributed and stored as a hexa decimal string in the startup configuration of the SmartNode and its peer Note Depending on the processing hardware applied to reverse engineering a DES key it can take from 3 hours to 3 days to break the key Thus for maximum security DES keys must be manually updated regularly AES or 3DES keys be...

Page 363: ...S_128 node pf ipstr AES_128 esp encryption aes cbc 128 Creating an IPsec policy profile The IPsec policy profile supplies the keys for the encryption and or the authenticators for the authentication the security parameters indexes SPIs and IP address of the peer of the secured communication Furthermore the profile defines which IPsec transformation profile to apply and whether transport or tunnel ...

Page 364: ...cation on page 361 and Encryption on page 361 or explicit specification Keys must be available for inbound and out bound directions They can be different for the two directions Make sure that the inbound key of one peer matches the outbound key of the other peer 4 node pf ipstr name spi inbound outbound ah esp spi Sets the SPI for encryption esp or authentication ah either for inbound or outbound ...

Page 365: ...ACL Note Outgoing and incoming IPsec traffic passes an ACL if available twice once before and once after encryption authentication So the respective ACLs must permit the encrypted authenticated and the plain traffic For detailed information on how to set up ACL rules see chapter 24 Access control list configuration on page 251 Procedure To create modify an outgoing ACL profile for IPsec Mode Confi...

Page 366: ...rmation This section shows how to display and verify the IPsec configuration information Procedure To display IPsec configuration information Mode Configure Step Command Purpose 1 node cfg context ip router Enter IP context 2 node ctx ip router interface if name Create enter the IP interface if name 3 node if ip if name use profile acl name out Activate the outgoing ACL profile name 4 node if ip i...

Page 367: ... problems Procedure To debug IPsec connections Mode Configure Example IPsec Debug Output node cfg debug ipsec IPSEC monitor on 23 11 04 ipsec Could not find security association for inbound ESP packet SPI 1201 Example Display IPsec Security Associations node cfg show ipsec security associations Active security associations Dir Type Policy Mode Udp Encapsulation Peer SPI AH SPI ESP AH ESP Auth ESP ...

Page 368: ...ly authenticates the peers establishes a shared secret between them and negoti ates cryptographic transforms in order to create an ISAKMP security association between the two peers The ISAKMP security association is only used to provide a secure authenticated and encrypted channel between the peers which can be used for any further communication In QUICK MODE IKE negotiates all the security parame...

Page 369: ...onfigure an ISAKMP transform profile Mode configure Step Command Purpose 1 optional node pf ipstr ctx name key life time seconds seconds Define a new maximum lifetime of the security associations in seconds 2 optional node pf ipstr ctx name key life time kilobytes kilobytes Define a new maximum lifetime of the security associations in kilobytes Step Command Purpose 1 node cfg profile isakmp transf...

Page 370: ...man group to be used Note The higher the group number is the higher is the key length during the diffie hellman exchange and the higher is the processing time for the establishment of the shared secret Espe cially Group 5 requires a considerable amount of time for processing You should not use this group in time critical applications unless you know that the tunnel will always be established 4 nod...

Page 371: ...ection group ID in the ISAKMP IPSEC policy profiles of all the peers which should use the same remote policy In this case if the system receives an initial IKE packet it will search for an ISAKMP IPSEC policy profile which has the same protection group ID as the policy which created the ISAKMP packet Sample configuration snippet Below you see a sample of the minimal required settings to be added t...

Page 372: ...tunnel peer 1 2 3 4 diffie hellman group group2 use profile ipsec transform 1 IPSEC_3DES_192 use profile isakmp transform 1 ISAKMP_3DES_192 context ip interface WAN use profile acl WAN_Out out Troubleshooting To analyze configuration or networking problems related to IKE the IKE module contains the following debug monitors which log important information about the exchanged ISAKMP messages debug i...

Page 373: ...raphic accelerator hardware which does these computationally intensive tasks for the main CPU On such systems RTP encryption has almost no impact on the overall system performance You can see using the com mand show crypto offload whether your systems contains the cryptographic accelerator or not Systems without the crEncrptedyptographic accelerator hardware will display the following line Crypto ...

Page 374: ...fy using the following command that for one or more destination network the IP address of an alternate IP interface should be used This configuration com mand affects all locally originated IP packets except those which originate from explicitly bound components like SIP and H 323 Mode context ip Step Command Purpose 1 node if ip if name no rtp encryp tion Enable or disable RTP encryption support ...

Page 375: ...psec transform DES esp encryption des cbc 64 profile ipsec policy manual VPN_DES use profile ipsec transform DES session key inbound esp encryption 1234567890ABCDEF session key outbound esp encryption FEDCBA0987654321 spi inbound esp 1111 spi outbound esp 2222 peer 200 200 200 1 mode tunnel profile acl VPN_Out permit ip 192 168 1 0 0 0 0 255 172 16 0 0 0 0 255 255 ipsec policy VPN_DES permit ip an...

Page 376: ...de configuration profile ipsec transform AES_SHA1 esp encryption aes cbc 256 ah authentication hmac sha1 96 profile ipsec policy manual VPN_AES_SHA1 use profile ipsec transform AES_SHA1 session key inbound ah authentication 1234567890ABCDEF1234567890ABCDEF12345678 session key outbound ah authentication FEDCBA0987654321FEDCBA0987654321FEDCBA09 session key inbound esp encryption 1234567890ABCDEF1234...

Page 377: ...rofile ipsec transform TDES_MD5 session key inbound esp authentication 1234567890ABCDEF1234567890ABCDEF session key outbound esp authentication FEDCBA0987654321FEDCBA0987654321 session key inbound esp encryption 1234567890ABCDEF1234567890ABCDEF1234567890ABCDEF session key outbound esp encryption FEDCBA0987654321FEDCBA0987654321FEDCBA0987654321 spi inbound esp 7777 spi outbound esp 8888 peer 200 20...

Page 378: ...le configurations 378 SmartWare Software Configuration Guide 32 VPN configuration For the remainder of the configuration see above just change the name of the IPsec policy profile in the ACL profile VPN_Out ...

Page 379: ...tion Chapter contents Introduction 380 CS interface configuration task list 380 Creating and configuring CS interfaces 381 Configuring call routing 382 Configuring the interface mapping tables 383 Configuring the precall service tables 386 ...

Page 380: ...e Figure 52 illustrates the function of the CS interfaces The types of CS interfaces are PSTN interfaces telephony Binding is done from a port to an interface VoIP interface provide voice over IP settings in addition to the general CS interface parameters These inter faces must be explicitly bound to an existing VoIP gateway Figure 52 CS interfaces on the CS context Interfaces can use mapping tabl...

Page 381: ... deleted as described in the following table Procedure Create and configure CS interfaces Mode Configure Examples Create CS interfaces and delete another Step Command Purpose 1 node cfg context cs Enter the CS Context Configuration Mode 2 node ctx cs switch interface if type if name Enter the CS Interface Configuration Mode select the CS interface with type if type and name if name for configurati...

Page 382: ...al router sn43 IF PBX1 IF PBX2 IF PUBLIC PSTN1 IF PUBLIC PSTN2 IF COMPOFF A HUNT COMPOFF A HUNT PBX HUNT PUBLIC PSTN node ctx cs switch no interface isdn IF PBX1 node ctx cs switch Configuring call routing SmartWare offers two levels of call routing basic interface routing and advanced call routing Basic interface routing allows you to forward all incoming calls on a CS interface to a destination ...

Page 383: ...e when a call arrives on a CS interface and is routed to another interface through routing and mapping tables This imposes a limitation to call property manipulation When a call property like a party s number is changed during a call the call is not routed through the call router again and thus the mapping tables are not processed for the new number Call property manipulation e g removing a prefix...

Page 384: ...fer to the chapter 40 Call router configuration on page 451 for more information about how to create and configure mapping tables Procedure To use mapping tables to filter properties on an CS interface Mode Context CS Example Use interface mapping tables for dialing plan conversion The following example shows how to configure a dialing plan conversion on an interface In this case you can plan your...

Page 385: ...applied to the called party number and the call ing party number The mapping table adds a prefix of 00419988825 to the called and calling party number Incoming call 2 originally has a calling party number of 20 but already a called party number of the global numbering plan Again the mapping table is applied to both number but only the calling party number of 20 is translated into 0041998882520 The...

Page 386: ...plementary services like call waiting etc Precall service tables are configured as part of the call router in the context CS configuration mode Precall service tables are used on an FXS interface where the attached phone should be able to activate or deactivate services by dialing a special number SmartWare currently supports the following service commands activate cw Activates call waiting on the...

Page 387: ...VC map 43 to activate cw node pcs tab SUPP SVC map 43 to deactivate cw node pcs tab SUPP SVC map 43 to interrogate cw node pcs tab SUPP SVC exit node ctx cs switch interface fxs IF PHONE node if fxs IF PHONE use mapping table precall service SUPP SVC node if fxs IF PHONE exit node ctx cs switch Step Command Purpose 1 node ctx cs switch precall service table table name Creates a new table that maps...

Page 388: ...ces 391 Configuring Call Hold on ISDN interfaces 392 Enabling Display Information Elements on ISDN Ports 392 Configuring date time publishing to terminals optional 392 Enabling sending the connected party number COLP optional 393 Enabling sending of date and time on ISDN DSS1 network interfaces 393 Defining the network type in ISDN interfaces 393 ISDN Explicit Call Transfer support SIP REFER Trans...

Page 389: ...interface can encapsulate user and network side of the following protocols DSS1 NI2 NTT The settings are automatically taken from the port that binds to the interface and changes on the port are automat ically reflected on the interface Figure 55 ISDN interfaces on the CS context ISDN interface configuration task list This section describes the configuration tasks for ISDN interfaces There are no ...

Page 390: ...e the digits arrive twice as keypad facility messages and also as DTMF tones Procedure To enable DTMF dialing Mode Interface ISDN Example Enable DTMF dialing The following example shows how to enable DTMF dialing for a given ISDN interface node enable node configure node cfg context cs node ctx cs switch interface isdn MyIsdnIf node if isdn myIsdnIf dtmf dialing Configuring an alternate PSTN profi...

Page 391: ...nterface the interface can a Signal the new call to all connected terminals although both B Channels are in use One terminal can then put its current call on hold to accept the new one putting the call on hold frees its B Channel b Not signal the new call because there is no B Channel available This is the desired behavior particularly if the bound port is part of a hunt group and no user terminal...

Page 392: ...ation from a port configured as network to the con nected terminals You can configure each ISDN interface to propagate the current SmartNode system time and date to the connected terminals with the following command Procedure To configure date and time publishing Mode Interface ISDN Date and time information can only be contained in the ISDN CONNECT message This message is only delivered to a term...

Page 393: ... reject ECT invocations SmartWare detects calls that are looped internally i e calls that leave the device over the same ISDN interface over which they enter the device If an internal loop is detected for an ISDN interface bound by an ISDN user port SmartWare sends an explicit call transfer ECT to push back the call to the connected network as soon as the call is connected An ISDN interface can be...

Page 394: ...d e 41 18 Li nk 10 0M Ac tiv ity 0 0 0 1 0 2 0 3 En et 0 Vo ice Po rts Po w er R un Vo IP Li nk 0 4 0 5 0 6 0 7 Co ns ole Vo IP Ga tewa y Ro ut er To IP In te gr at ed Ac ce ss De vice Sm ar tN ode 45 24 Li nk 10 0M Ac tiv ity 0 0 0 1 0 2 0 3 En et 0 Vo ice Po rts Po w er R un Vo IP Li nk Li nk 10 0M Ac tiv ity En et 1 SIP b REFER Co ns ole Vo IP Me dia Ga tewa y To IP Ac ce ss De vice Sm ar tN od...

Page 395: ... Charge support The exchange of Advice of Charge information is supported between two ISDN interfaces The charge infor mation can be transmitted and received over H 323 See Chapter 38 H 323 interface configuration on page 426 for additional information on AOC D support for H 323 Without configuration changes Smart Ware tunnels the Advice of Charge information from an ISDN user interface to an ISDN...

Page 396: ...ollowing procedure enables the transmission of AOC message on an ISDN network interface even if Step Command Purpose 1 node ctx ip ctx name interface isdn if name Go to the ISDN interface for which you want to disable AOC 2 node if isdn if name no aoc s Disables the reception of AOC S messages at call setup time 3 node if isdn if name no aoc d Disables the reception of AOC D messages during the ca...

Page 397: ...isdn if name aoc d automatic Enables the transmission of AOC D messages even if there is not charge information from the network for all calls 4 node if isdn if name aoc e automatic Enables the transmission of AOC E message even if there is no charge information from the network for all calls Step Command Purpose 1 node ctx ip ctx name interface isdn if name Go to the ISDN network interface for wh...

Page 398: ... warded to the peer interface Information for warded to the peer interface Information for warded to the peer interface Information for warded to the peer interface ISDN Network Interface connected to phones Phone does not request AOC on a per call basis No information sent Information sent as received from the network no informa tion sent if the net work does not provide information Always send i...

Page 399: ...n NI2 networks an incoming ISDN SETUP message may contain a NameInfomationFollowing indication instead of the name This means that the calling party name is not available yet but will be sent later for exam ple after the dictionary database lookup in progress succeeded If such an incoming ISDN call is internally routed to another network e g to a SIP network or to a ISDN DSS 1 network we must know...

Page 400: ...NameInformationFollowing indication to the remote side itself The following example enables and configures the caller name feature on a T1 ISDN interface for incoming calls If no name is present in the SETUP message but the SETUP message contains the NameInformationFol lowing indication an ALERTING message is sent back after 500ms If there is no name after additional 500ms the call is routed to th...

Page 401: ...ication we forward the call to the routing destination any way after 1000ms 500ms after faking the ALERT ING message in this example This step is optional When not configured the call is forwarded after 4s by default You can disable forwarding a call without a name by using the no form of the command Note The specified timeout is measured starting at the reception of the SETUP message not when the...

Page 402: ... 403 Configuring an alternate PSTN profile optional 404 Configuring caller ID presentation optional 404 Configuring flash hook processing optional 404 FXS supplementary services description 405 Call hold 406 Call waiting 406 Call waiting reminder ring 407 Drop passive call 407 Drop active call 407 Call toggle 407 Call transfer 407 Conferencing 408 Call park 408 ...

Page 403: ...ee figure 57 Figure 57 FXS interfaces on the CS context FXS interface configuration task list This section describes the configuration tasks for FXS interfaces There is no mandatory configuration for basic FXS operation Configuring a subscriber number recommended see page 403 Using an alternate PSTN profile optional see page 404 Configuring caller id presentation optional see page 404 Configuring ...

Page 404: ... the interface Mode Interface FXS Configuring flash hook processing optional The flash hook command specifies if the flash hook pattern must be handled locally or if it must be relayed to the remote subscriber Per default flash hook is handled locally because it is the initial pattern for local initiated supplementary services If the flash hook is relayed to the remote subscriber the local user wi...

Page 405: ...te The local subscriber is always the one who executes the service The services call hold and call waiting allow the local subscriber to open or accept a second call This is the condition for all the other services that are applied as soon as the local subscriber has two calls initiated to remote subscribers That means the call hold service can only be applied as long as only one call is ongoing A...

Page 406: ... call offering on the fxs interface Mode Interface FXS Call waiting The call waiting service doesn t need a special pattern The user can use either drop passive call to reject the incoming call can use call toggle to hold the active call and to accept the incoming call or can use drop active call to disconnect the current one and to switch to the incoming call Call waiting can be explicitly disabl...

Page 407: ...g call that has been previously set on hold Drop active call The drop active call service can be used if the local subscriber has an active call and a call previously set on hold This feature provides the possibility to drop the active call and to switch to the hold one without going on hook first Call toggle In general the call toggle feature is used to switch between an active and a passive call...

Page 408: ...on a specific number This park number starts with a spe cific Park Code that must be configured with the service pattern command After the user pressed flash to open a new call and the dialed number starts with the defined park service pattern the service will be executed 5s after the last digit has been pressed or the user completes the number with the character This service is not handled locall...

Page 409: ...on caller ID 413 Configuring an alternate PSTN profile optional 413 Configuring when the digits are dialed optional 414 Configuring the number of rings to wait before answering the call optional 416 Configuring how to detect a call has disconnected optional 417 Configuring how to detect an outgoing call is connected optional 418 Configuring the destination of the call 419 FXO Mute dialing 419 FXO ...

Page 410: ...ol process in SmartWare Recall that an interface in SmartNode products is a logical device and a port is a physical device So the FXO feature consists of the logical interface with all its processes together with its configurable parameters and the physical interface for the actual analog 2 wire connection to an FXS device There is a one to one correspondence between the port and the interface In ...

Page 411: ... ITU Call routing based on caller ID Second dial tone for two stage DTMF dialing with call routing based on DTMF numbers Creating an FXO interface Interface names can be any arbitrary string Use self explanatory names for your interfaces to reflect their usage in your application After creating the FXO interface it is necessary to bind the FXO interface Refer to chapter 44 FXO port configuration o...

Page 412: ...he interface Mode Context CS Step Prompt command Purpose 5 node ctx cs switch interface fxo name The interface fxo command creates the new interface name which represents an FXO inter face This command also places you in the FXO interface configuration mode for the created inter face 6 node if fxo name You are now in the FXO interface configuration mode In this mode you may configure the param ete...

Page 413: ...the command ring number Instead of specifying the number of ring bursts to wait before going off hook for calls coming in through FXO it is now also possible to go off hook upon reception of the caller ID With this setting if a caller ID is available the time before FXO goes off hook to accept the call can be decreased by 2 to 3 seconds If no caller ID is detected the call is accepted upon recep t...

Page 414: ... to wait Zero 0 seconds means that the interface dials immediately Step Prompt command response Purpose 1 node Basic prompt in Operator Exec mode 2 node enable Enters Administration execution mode node Response The prompt in administration execu tion mode is the 3 node configure Enters the Configure configuration mode node cfg Response The prompt in the Configure configu ration mode is cfg 4 node ...

Page 415: ...ore dialing enter the command again using dial tone Step Prompt command response Purpose 1 node Basic prompt in Operator Exec mode 2 node enable Enters Administration execu tion mode node Response The prompt in administration execution mode is the 3 node configure Enters the Configure configu ration mode node cfg Response The prompt in the Configure configuration mode is cfg 4 node cfg context cs ...

Page 416: ...other hand numerous countries send the CLID prior to the first ring so the default setting of 1 would be satisfactory Mode Interface FXO Example Configure the ring number to wait for CLID by setting the count to 2 The name of the specific FXO interface is pstn local node enable node configure node cfg context cs node ctx cs switch interface fxo pstn local node if fxo pstn local ring number 2 You c...

Page 417: ...f the end party to execute the on hook completing the discon nection phase for the call to be completely cleared Note Verify that the busy and release tones are correctly configured for the country where the SmartNode is installed see chapter 42 Tone configuration on page 524 for configuration information If the tones are improperly config ured the FXO port will not detect them resulting in missed...

Page 418: ...properly connected call with the remote party Should both be disabled the SmartNode waits for the call connect signal from the FXS switch Mode Interface FXO Note Only disable connect signal if you are sure that the FXS switch provides a call connect signal Step Prompt command response Purpose 1 node Basic prompt in Operator Exec mode 2 node enable Enters Administration execution mode node Response...

Page 419: ...e is the 3 node configure Enters the Configure configuration mode node cfg Response The prompt in the Configure configuration mode is cfg 4 node cfg context cs Enters the Context CS configure mode node ctx cs switch Response The prompt in the Context CS configuration mode is ctx cs switch 5 node ctx cs switch interface fxo if name Enter the Interface FXO configuration mode node if fxo if name Resp...

Page 420: ...erface fxo pstn local node if fxo pstn local connect signal battery reversal node if fxo pstn local ring number 2 node if fxo pstn local route call dest interface pstn 1 voip Example 2 Configuring an FXO interface to be used as fallback if the IP network link is down This means that there are only out going calls You are not sure whether the FXS switch provides a connect signal In this case you on...

Page 421: ...ng Deleting a RBS interface 422 Configuring an alternate PSTN profile 422 Configuring an alternate Tone Set profile 423 Configuring B Channel allocation strategy 423 Configuring additional disconnect signals 423 Configuring number of Rings before Off Hook 424 Configuring ready to dial strategy 424 RBS interface debugging 424 ...

Page 422: ... details RBS interface configuration task list Creating Deleting a RBS interface Configuring an alternate PSTN profile Configuring an alternate Tone Set profile Configuring B Channel allocation strategy Configuring additional disconnect signals Configuring number of Rings before Off Hook Configuring ready to dial strategy Creating Deleting a RBS interface Interface names can be any arbitrary strin...

Page 423: ...be chosen for initiating the outgoing call or the lowest one For incoming calls over TDM this command has no effect because the timeslot has already been selected by the remote party Mode Interface RBS Configuring additional disconnect signals Most of the RBS protocols define a ABCD Bit pattern can be sent to indicate a call disconnection to the remote party In case of the Loop Start protocol wher...

Page 424: ...ltone The originating side sends the called party number as soon as it detects the dial tone Timeout The originating side sends the called party number after a timeout that starts at the Off Hook moment Mode Interface RBS RBS interface debugging For the investigation of possible call signaling or interoperability problems there exists a debug command with the options datapath error and signaling I...

Page 425: ...rator execution Step Command Purpose 1 node show ccrbs call if name detail level Prints information about ongoing calls on the selected interface node show ccrbs interface if name detail level Prints information about the configuration of the selected interface and about the states of the belonging protocol endpoints ...

Page 426: ...ring CLIP CLIR support optional 430 Enabling early proceeding on H 323 interfaces 431 Enabling the early call connect optional 431 Enabling the early call disconnect optional 432 Enabling the via address support optional 432 Override the default destination call signaling port Optional 432 Configuring status inquiry settings optional 433 Enabling or disabling overlapped sending support in H 323 43...

Page 427: ...ed call When a call arrives over H 323 in the H 323 gateway The gateway looks for the best matching H 323 inter face which is bound to that gateway If there is an H 323 interface which contains the IP address of the source of the H 323 call in its remoteip configuration parameter the call will be handed over to that interface for fur ther call processing If no such interface is found the gateway l...

Page 428: ...y instance named h323 node enable node configure node cfg context cs node ctx cs switch interface h323 MyH323If node if h323 MyH323If bind gateway h323 Configure a remote IP address If the gateway to which the H 323 interface is bound does not use a gatekeeper it is required to specify the IP address of the remote entity for which the H 323 interface is used directly within the H 323 interface Thi...

Page 429: ...configure node cfg context cs node ctx cs switch interface h323 MyH323If node if h323 MyH323If use profile voip myprofile Configure information transfer capability handling Optional Normally the H 323 gateway transparently forwards the information transfer capability information element between the H 323 network and other gateways of the SmartNode There are however several H 323 clients that do no...

Page 430: ...element in the Q 931 part of the H 323 setup message Note This functionality is not standardized and might cause interoperability prob lems if enabled Procedure To enable tunnelling of CLIP CLIR information over H 323 Step Command Purpose 1 node if h323 if name itc rx 3k1 audio 7k audio restricted digital unrestricted digital speech video transparent Specifies the information transfer capability t...

Page 431: ...23 setup message without waiting for a response from the destination Mode interface h323 if h323 Example Enable early call disconnect The following example shows how to enable early call disconnect on an H 323 interface named MyH323If node enable node configure node cfg context cs node ctx cs switch interface h323 MyH323If node if h323 MyH323If early disconnect Enabling the early call connect opti...

Page 432: ...rty number of the connected terminal as an H 323 E 164 Alias to the Facility message when transferring a call to another gateway This enables a gatekeeper to detect loops of call forwarding and to stop them Procedure To enable sending of the via address in call transfers Mode Interface H 323 Example Enabling the via address support The following example shows how to enable the via address support ...

Page 433: ...e entity must respond to these status inquiries which allows the H 323 gateway to detect if the call on the remote H 323 entity is still alive If no response is received after another minute the call will be dropped Unfortunately there are H 323 entities which do no respond to these status inquiries This causes every call to be dropped after being connected for two minutes using the default settin...

Page 434: ...send Advice of Charge during the call AOC D messages according to the ITU T standard Q 956 Facility Information Elements IEs in the Q 931 portion of the protocol are used to transport AOC D PDUs Refer to Chapter 28 ISDN interface configuration section ISDN Advice of Charge support You can enable disable reception and transmission of AOC D messages separately on each H 323 interface When reception ...

Page 435: ...isables reception of AOC D infor mation in FACILITY messages received in calls over the current interface Default Reception is disabled When enabled Advice of Charge informa tion is received and accepted from the other side of the gateway 2 node if h323 if name no aoc d emit Enables or disables transmission of AOC D information in FACILITY messages received from the other side of the gateway Defau...

Page 436: ...tional 441 Mapping call control properties in SIP headers 441 Mapping SIP headers to call control properties 442 Configuring ISDN Redirecting Number Tunneling Over SIP 442 Enabling SIP RFC Privacy Asserted Identity Preferred Identity headers RFC 3323 3325 443 Updating caller address parameters 443 SIP Diversion Header 444 Transmit Direction 445 Receive Direction 445 SIP REFER Transmission ISDN Exp...

Page 437: ... to be translated to call control properties and vice versa In addition it offers VoIP settings and the possibility to configure SIP supplementary services like Call Transfer Call Reroute or Session Timer All SIP interfaces must be explicitly bound to a context SIP gateway Calls that are routed from the Context CS to one of the SIP interfaces will be forwarded for call establishment to the context...

Page 438: ...terfaces to be used to send requests and also from where it expects to receive incoming calls Mode Interface SIP Configure a remote host The remote host parameter is used to build the host part of the To Header URI and the Request URI All calls forwarded to the context SIP gateway through this SIP interface will be sent to that host unless an outbound proxy has been configured for the outgoing Req...

Page 439: ...olved by manually entering a local host name Mode Interface SIP Using an alternate VoIP profile Optional A VoIP profile is a container for all datapath related settings on VoIP connections The predefined default pro file exists persistently in the system and it is preconfigured with proper default parameters It will always be taken if no other profile has been specified This command allows the use...

Page 440: ...nterface SIP Using an alternate Tone Set profile Optional A Tone Set profile contains a mapping of call progress tones to defined tone sequences The predefined default profile exists persistently in the system and it is preconfigured with the Swiss standard call progress tone map ping It will always be taken if no other profile has been specified This command allows the user to specify an alternat...

Page 441: ...SIP user agent when the connected terminal hangs up ISDN when Disconnect message is received analog line when busy tone is detected loop current is interrupted or battery voltage is reversed Mode Interface SIP Configuring address translation Optional Mapping call control properties in SIP headers This functionality specifies rules for building the SIP headers for outgoing SIP requests The user can...

Page 442: ...oming ISDN SETUP message contains additional information elements for the Redirecting Party Number B and the Redirecting Reason Call Forwarding Unconditional for example When the Redirecting Number Tunneling over SIP has been enabled the Request URI of the outgoing SIP INVITE message has additional parameters for the redirected number target and the redirecting reason cause Normally the Redirectin...

Page 443: ...st be included in the P Asserted Identity header of the sip update message This feature is often required if sip has to interwork with an analog telephone network where the Caller Id cannot be deliv ered together with the call offering If SmartWare is working as SIP to FXS Gateway the UAC can send the update at any time between the initial invite and the final response The delivered parameters wil...

Page 444: ...header can be configured independent of each other Even though the Diversion Header standard would allow appending a header for each diversion occurred in the network SmartWare only records the last and the first diversion If only one Diversion Header is attached to the INVITE request then it represents the last diversion Step Command Purpose 1 node if sip interface no update accept address wait f...

Page 445: ...information are available this expression specifies that they must be taken from the Diversion Header when providing them to the call control Mode Interface SIP Step Command Purpose 1 name if sip interface address transla tion outgoing call diversion header host part call default server domain fix interface none Enables or disables sending of the Diversion Header and specifies the Host Part of the...

Page 446: ...abled by default for ISDN interfaces BRI ports by accepting or rejecting explicit call transfer ECT invocations An ISDN phone that is connected to a BRI port and that has two active calls can send an ECT invocation to connect the two calls inside the device An ISDN interface can be configured to accept or reject ECT invocations SmartWare detects calls that are looped internally i e calls that leav...

Page 447: ...d e 41 18 Li nk 10 0M Ac tiv ity 0 0 0 1 0 2 0 3 En et 0 Vo ice Po rts Po w er R un Vo IP Li nk 0 4 0 5 0 6 0 7 Co ns ole Vo IP Ga tewa y Ro ut er To IP In te gr at ed Ac ce ss De vice Sm ar tN ode 45 24 Li nk 10 0M Ac tiv ity 0 0 0 1 0 2 0 3 En et 0 Vo ice Po rts Po w er R un Vo IP Li nk Li nk 10 0M Ac tiv ity En et 1 SIP b REFER Co ns ole Vo IP Me dia Ga tewa y To IP Ac ce ss De vice Sm ar tN od...

Page 448: ...ected that is looped internally Mode Interface ISDN The following procedure disables the push back mechanism on a SIP interface No REFER message is sent when a call is detected that is looped internally Mode Interface SIP AOC Over SIP Optional This enhancement sends AOC information transparently from ISDN or H 323 to SIP and vice versa AOC D elements are hex encoded and sent as application QSIG co...

Page 449: ...specified duration A server will be in the penalty box for the specified time as soon as a single transaction with that server fails Mode Interface SIP Initiating a new SIP session for redirected SIP calls Optional Normally if a SIP call is redirected to a different location by receiving a SIP 3xx response only the request header is replaced in the original INVITE message and the INVITE is sent to...

Page 450: ...different ways to set a remote SIP subscriber On Hold This command specifies which method the SmartNode uses to indicate this call state In receive direction all of them will be accepted Mode Interface SIP Step Command Purpose 1 node if sip if name hold method direction attribute zero ip Configures the method to be used to signal the hold state Default zero ip ...

Page 451: ...number routing table 467 Number type routing table 467 Numbering plan routing table 468 Name routing table 469 IP address routing table 469 URI routing table 470 Presentation Indicator Routing Table 470 Screening Indicator Routing Table 471 Information transfer capability routing table 472 Call router support for redirecting number and redirect reason 473 Time of day routing table 474 Day of Week ...

Page 452: ... 508 Deleting call services 509 Activate the call router configuration 509 Test the call router configuration 510 Configure partial rerouting 516 Call reroute 517 Enable acceptation of rerouting requests on ISDN 517 Enable emission of rerouting requests on ISDN 517 Enable sending of 302 moved temporary message on SIP 517 Allow Push Back 517 Enable push back aaa service 517 Enable push back bridge ...

Page 453: ...ng More complex call forwarding decisions can be configured in the call router The call router is a very efficient and flexible tool for routing calls between CS interfaces Based on a set of routing criteria the call router determines the destination interface for every incoming call The forwarding decisions and features are based on a set of routing tables mapping tables and call services Each ro...

Page 454: ...y number calling e164 also called source Nr A Nr MSN DDI or CLIP Called party number called e164 also called destination Nr or B Nr Calling and called party number type Calling and called party number plan Calling and called party name the display name Calling and called party IP address for VoIP calls Calling and called party URIs for SIP calls Presentation indicator whether the number shall be p...

Page 455: ...es and factors that may influence the call router configuration Some examples are On net off net call routing ISDN service routing Carrier selection Service quality Fallback strategies Network and gateway selection Other factors that must be taken into account are Available number ranges DDI MSN PISN Potential restrictions imposed by neighboring equipment Gatekeepers Remote Gateways PBXs on the nu...

Page 456: ...de Context CS Configure general call router behavior Configure address completion timeout A call that is routed through a called party number routing table possibly has a called party number that is too short for a routing decision to be made In this case the call router waits for additional digits being entered by the calling user When the user does not enter additional digits during the address ...

Page 457: ...r is the pound character by default Note The digit completion timeout is active when the call router waits for optional digits of a called party number before placing the call to the selected destination Contrary to this the address completion timeout described above waits for mandatory digits Procedure To configure the digit collection timeout and terminating character Mode Context CS Step Comman...

Page 458: ...e possibility to expand these numbers before entering the first call router table Note The configured prefix is not removed at the exit of the call router i e when a destination interface is found but the number has the number type unknown Procedure To configure number prefix Mode Context CS Example Configure number prefix node switch national prefix 0041 Input 99888xxxx Result 004199888xxxx node ...

Page 459: ...ng table A routing table forwards the call to another table interface or service based on a specific call property like the called party number or the current date The call router provides a number of different routing table types A routing table looks like the following Figure 63 Routing table outline Each table contains a header and one or more entries The header declares the type of the routing...

Page 460: ...number Route calls based on the calling party number type ISDN distinguishes different type of numbers called numbering plan Route calls based on the called party numbering plan ISDN distinguishes different numbering plans calling numbering plan Route calls based on the calling party numbering plan ISDN distinguishes different numbering plans called name Route calls based on the display name of th...

Page 461: ... at least four additional digits matches this entry In addition to the period there are several other symbols that can be used as wildcard characters in the key These symbols provide additional flexibility in designing call routing and decrease the need for multiple entries in configuring number ranges Step Command Purpose 1 node ctx cs switch routing table table type table name Create a routing t...

Page 462: ...range of numbers between 99 and 102 using 99 102 Indicates a pattern For example 888 2525 It is used in conjunction with the symbol or or when replacing a number in a mapping table Indicates that the preceding digit or pattern occurred zero or one time Enter Ctrl V before entering from your keyboard since the CLI normally uses the question mark to display help texts Indicates that the preceding di...

Page 463: ...ollowing example shows how the T indicator is set to allow variable length numbers node cfg context cs node ctx cs switch routing table called e164 collect node rt tab collect route 0041T dest interface CHVoIP A In the example above the call router accepts the digits 0041 and then waits for an unspecified number of addi tional digits as long as the interdigit timeout has not expired When the inter...

Page 464: ...digit collection Consider the following examples routing table called e164 TAB PREFIX route 099 dest interface IF OUT routing table called e164 TAB COMPLETE route 099 dest interface IF OUT routing table called e164 TAB COLLECT route 099T dest interface IF OUT Now assume someone picks up a phone and dials a number using overlap dialing After picking up the phone an empty called party number is offe...

Page 465: ...rt tab DIST route 001T dest interface USVOIP node rt tab DIST route default dest interface PSTN Example Digit collection of any number If you want to route calls from interface A directly to interface B wanting to collect dialed digits you have to route calls from interface A to a routing table like the one shown in this example This table does not require the dialed number to be of any format or ...

Page 466: ...onal mandatory digits or drops the call after 12 seconds address completion timeout 2 5 No entry matches so the default entry is selected the call is placed immediately 11 No entry is selected Though the dialed number completely matches entry 1 2 and 3 entry 4 is still incomplete The call router waits for additional mandatory digits or drops the call after 12 seconds address completion timeout 12 ...

Page 467: ...h any digit appearing zero or more times followed by 52 and a 3 or 5 matches the entry For exam ple the following calling party numbers match the first entry 0998882523 or 0998882525 or simply 523 or 525 Note This table does not contain a default entry All calls where the calling party number does not match to one of the entries are dropped node cfg context cs node ctx cs switch routing table call...

Page 468: ...pe digits network specific Network specific number used to indicate administration or service number specific to the serving network e g used to access an operator subscriber Subscriber number the number does not include prefix or escape digits abbreviated Abbreviated number Example Calling type of number routing table The following example routes calls with an international calling party number t...

Page 469: ...e isdn telephony dest table TAB INCOMING ISDN node rt tab NP route data dest table TAB INCOMING DATA node rt tab NP route default dest table TAB INCOMING UNKNOWN Name routing table The calling display name or called display name calling name or called name table is used to route calls based on the human readable name of the calling or called party The key you specify in a routing table entry must ...

Page 470: ...oming calls is not set unless modified by a previous mapping table in the routing path You can use regular expressions to specify the parts of an URI that must match in order to route the call to a specified destination The following example shows how to create a routing table to route all SIP calls from John Smith to the next table TAB FROM JOHN while all other calls are routed to the next table ...

Page 471: ...pty string as it is shown in the example below Example Presentation indicator routing table This example uses a pseudo routing table that just forwards all calls to the interface IF OUT but first executes the mapping table NO CNPN This mapping table examines the presentation indicator and modifies the call ing party number If the presentation indicator is restricted the calling party number is cle...

Page 472: ...umber that was not accepted by the network user failed we drop the call Else we route the call to the interface IF OUT but first execute the mapping table NO CNPN This mapping table again examines the screening indicator If the user provided a number that was not screened by the network the table sets the calling party number to an empty string For all other screening indicator values the calling ...

Page 473: ... cfg context cs node ctx cs switch routing table itc ITC node rt tab ITC route unrestricted digital dest interface IF ACCESS node rt tab ITC route 7k audio dest interface IF LOCAL BREAKOUT node rt tab ITC route video dest interface IF ACCESS node rt tab ITC route default dest interface IF VOIP CARRIER A Call router support for redirecting number and redirect reason The call router can be used to m...

Page 474: ...rding to the day of the week The days are defined by the long lowercase names monday tuesday wednesday thursday friday saturday and sunday To configure weekday routing table entries use the following commands starting in the CS context configuration mode Example Day of week routing table node cfg context cs node ctx cs switch routing table day of week TAB DAY node rt tab TAB DAY route saturday des...

Page 475: ...IF1 route 11 dest interface IF2 route 12 dest interface IF3 route default dest interface IF4 To remove the first two entries from the table enter the following commands node cfg context cs node ctx cs switch routing table MY TABLE node rt tab MY TABLE no route 10 node rt tab MY TABLE no route 11 The resulting running config is routing table called e164 MY TABLE route 12 dest interface IF3 route de...

Page 476: ... a call property pair characterizes a mapping table the input and output type While the input type defines which call property is examined by the call router the output type defines which property is modified once the best matching entry is found for example you may want to find a best matching entry in a mapping table based on the presentation indicator and once found you want to manipulate the c...

Page 477: ...ors to use parts of the lookup key e164 If the output type is also a generic kind of property this mapping table is applied to both this calling e164 and the called e164 property If the input type is also a generic kind of property this mapping table is applied to both the calling e164 and the called e164 property called type of number Select an entry based on the called party number type ISDN dis...

Page 478: ...e and the called name If the input type is also a generic kind of property this mapping table is applied to both the calling name and the called name property called ip Selects an entry based on the remote sig naling IP address of the destination VoIP peer Sets the remote IP address of the destina tion VoIP peer calling ip Selects an entry based on the remote sig naling IP address of the originati...

Page 479: ...string Example 3 This example shows a mapping table that selects the best matching entry based on the called party number and once found changes the same property the called party number This is a very powerful method to manipulate numbers using regular expressions In this example a call arrives to the mapping table with a called party number of 234 The mapping table selects the only entry which m...

Page 480: ...ontext CS Example Called and calling party manipulation mapping table node cfg context cs node ctx cs switch mapping table e164 to uri SETURI node rt tab SETURI map 100 to sip john smith nil net node rt tab SETURI map 101 to sip jane smith nil net E 164 to E 164 Mapping Tables As with routing tables you can use regular expressions when selecting an entry in a mapping table based on a calling or ca...

Page 481: ...uted This means setting the calling party number to 09988825 1 The last part of the value a backslash followed by a single digit number is a placeholder and means that the first pattern expression in brackets of the key shall be used instead Thus the called party number is replaced with the specified prefix 09988825 concatenated with the bracketed pattern in the key 44 The result is 0998882544 Lik...

Page 482: ...lling party number when restricted Input calling e164 0998882525 calling pi restricted Output calling e164 calling pi restricted node cfg context cs node ctx cs switch mapping table calling pi to calling e164 REM CNPN node rt tab REM CNPN map restricted to The input presentation indicator restricted matches the expression restricted The output calling party number is an empty string The calling pa...

Page 483: ...g SIP calls from the called party number of an incoming call The following example shows how to set the called party name based on the called party number Mode Context CS Other mapping tables Example Mapping table to set the called party number type to international unconditionally Input called e164 0041998882525 calling type of number unknown Result called e164 0041998882525 calling type of numbe...

Page 484: ...de rt tab TRANS map 554 to 254 node rt tab TRANS map 555 to 255 node rt tab TRANS map 556 to 256 node rt tab TRANS map 557 to 257 node rt tab TRANS map 558 to 258 node rt tab TRANS map 559 to 259 Note The translation table above can be reduced using regular expressions node cfg context cs node ctx cs switch mapping table called e164 to called e164 TRANS node rt tab TRANS map 55 to 25 1 Deleting ma...

Page 485: ... e164 MY TABLE map 12 to 22 map 13 to 23 Procedure To delete an entire mapping table Mode Context CS Example Remove an entire mapping table node cfg context cs node ctx cs switch no mapping table MY TABLE Creating complex functions Complex functions allow combining mapping tables which need to be executed in sequence This is useful if for example the calling and the called party number have to be ...

Page 486: ...complex function MY FUNC execute 1 MAP1 execute 2 MAP2 execute 3 MAP3 execute 4 MAP4 Step Command Purpose 1 node ctx cs switch complex function function name Create a complex function function name 2 node func function name execute function or node func function name execute index function Add or inserts an entry to the complex function function can be another complex function or a mapping table t...

Page 487: ...ss transparently address complete indications or to explicitly insert or remove it for incoming and outgoing calls In addition the behavior of the call router can be configured Some call signaling protocols allow a user to dial a destination by using the overlap sending procedure These protocols include analog telephony FXS FXO ISDN and H 323 ISDN and H 323 support address com plete indication usi...

Page 488: ...out elapses Filtering out the terminating character and optionally set the address complete indication Setting the address complete indication when a called party number matches a fully specified call router rule terminated entry Appending the terminating character when the called party number matches a fully specified call router rule terminated entry The command digit collection timeout secs has...

Page 489: ...address complete indication The extensions configure what action s shall be performed when the digit collection timeout is stopped by the reception of a terminating character Normally without specifying an action the received terminating charac ter is removed from the called party number The append terminating char action re appends the terminat ing character The set address complete indication ac...

Page 490: ...the terminating character while the set address complete indication action sets the address complete indication Whether or not the egress interface propagates the address complete indication depends on the interface configuration see below Egress Interface On the egress interface ISDN H 323 the address complete indication emit type command configures how the internal representation of the address ...

Page 491: ...er sion types and the default setting for each interface type The following procedure demonstrates how to disable overlap sending for incoming SIP calls SIP does not provide an overlap dialing procedure so for most applications address complete indications should be cleared Mode context cs interface sip The following procedure demonstrates how to create a routing table that allows overlap dialing ...

Page 492: ...tion is not reachable another destination is tried until one of the con figured destinations accept the call Creating a hunt group service A hunt group service hunts an incoming call to multiple interfaces Figure 66 shows an example scenario where a call from a SIP interface is first processed by several tables The second table decides that the call must be for warded to the PSTN The device is con...

Page 493: ... BRI1 which in turn also drops the call due to unavailable resources In our example the hunt group then tries the third and eventually the fourth destination When an interface accepts a call the interface hunting is complete and the hunt group service merges the orig inal with the new call to the interface that accepted the call You can influence the algorithm of the hunt group by several configur...

Page 494: ...ed destination Note When you use the hunt group for a fallback scenario you must switch off cyclic operation mode 3 node svc hunt service name timeout timeout Configures a timeout in seconds after which the next destina tion is tried when the current destination does not answer at all Some interface e g SIP may wait an arbitrary long time until an answer is returned Default is not to use a time ou...

Page 495: ...cause the transit network does not exist or because that particular network while it does exist does not serve the equipment that is sending this cause no route to destination Drop original call The call routes through an intermediate network that does not serve the destination address The called user cannot be reached because the network through which the call has been routed does not serve the d...

Page 496: ...cates that the equipment send ing this cause does not wish to accept this call although it could have accepted the call because the equipment sending this cause is neither busy nor incompatible number changed Drop original call The number used to set up the call is not assigned to a system This cause is returned to a calling user when the called party number indicated by the calling user is no lon...

Page 497: ...erloaded access info discarded Hunt for next desti nation The network cannot provide the requested access information This cause indicates that the network could not deliver access information to the remote user as requested circuit channel not available Hunt for next desti nation The equipment cannot provide the requested channel for an unknown rea son resources unavailable Hunt for next desti na...

Page 498: ...original call The network cannot provide unrestricted digital information bearer capability This cause indicates that a device has requested an unrestricted bearer service but the equipment sending this cause only supports the restricted version of the requested bearer capability service or option not implemented Drop original call The network or remote equipment cannot provide the requested servi...

Page 499: ...ansit network Drop original call This cause indicates that a transit network identification of an incorrect format was received invalid message Drop original call Received an invalid message with no stan dard cause Protocol Error mandatory ie missing Drop original call The receiving equipment receives a message that does not include one of the mandatory information elements This cause indicates th...

Page 500: ...s not exist Drop original call The remote equipment receives a message that includes information elements or call properties that are not recognized invalid ie contents Drop original call The remote equipment receives a message that includes invalid information in the information element or call property recovery on timer expiry Drop original call Your call was not completed probably because an er...

Page 501: ...ually one of the phones e g PHONE10 goes off hook The other three calls to interfaces PHONE11 PHONE12 and PHONE13 are immediately dropped and the phones on these interfaces stop ringing Now the distribution service is no longer needed Thus the service merges the original call to the accepted destination call to inter face PHONE10 You can configure how the distribution algorithm works in many ways ...

Page 502: ...ent Configures how many destinations shall be called at the same time If you also configure a timeout the first call is cleared and an additional call is made after that timeout Thus only the specified number of destinations is ringing at the same time 4 node svc hunt service name timeout timeout Configures a timeout in seconds after which one destination is dropped and a next destination is calle...

Page 503: ...llowing commands node svc hunt service name min concurrent 1 node svc hunt service name max concurrent 2 node svc hunt service name timeout 3 node svc hunt service name route call dest interface PHONE1 node svc hunt service name route call dest interface PHONE2 Call router limiter service The call router limiter service limit offers a flexible technique to limit the maximum number of concurrent ca...

Page 504: ...in the limiter port configuration mode There is no limitation on the number of ports a limiter can have You can create as many as you need for your application Priority service The service priority can automatically free resources if a high priority call needs to be established while no resources are available The service priority can have multiple ports You can assign a priority level for each po...

Page 505: ...ng destination for calls received on this port 4 Optional node port port name service priority Define the priority for calls received through this port The default priority level is 0 5 node port port name exit Leave the port configuration mode 6 Repeat steps 2 to 5 for any additional calls you need to create 7 Optional node svc prio svc name max calls to drop calls Define the maximum number of lo...

Page 506: ...P network Clearly the FXO port at a location must connect to an FXS port But since the network between the two sites is IP there needs to be a mapping of the information on the FXS FXO link to a method of transporting the information over an IP network Additionally you do not want any ringing to occur when the connection is made you simply want it to be connected so the Smart Nodes and IP network ...

Page 507: ...mes However if the listener port loses its connection that is its call the dialer port does not disconnect its RTP call but remains connected to the other SmartNode s dialer port Similarly if the local dialer port loses its connection with the remote Smart Node s dialer port the SmartNode s listener port does not disconnect its FXS call but remains connected to the FXO device Though the calls oper...

Page 508: ...rs the first DTMF digit Step Command Purpose 1 name ctx cs switch no ser vice bridge BRIDGE1 Enters the bridge service configuration mode deletes a bridge service 2 name svc bridg BRIDGE1 port DIALER Creates a port on the service that can accept or spawn calls the max number of ports is currently limited to two 3 name port DIALER dial persis tent 123 dest interface REMOTE Configures the port to ac...

Page 509: ...ive after 3 seconds SmartWare offers a number of possibilities to monitor and debug the CS context and call router configurations For more information refer to chapter 52 VoIP debugging on page 615 Note It is not necessary to shutdown the CS context prior to making any configu ration changes Step Command Purpose 1 node ctx cs switch service second dialtone name Enters the service second dialtone m...

Page 510: ...witch show call router config Show the actual call router configuration This displays all routing and mapping tables in the current context CS When you are inside a routing or mapping table configuration mode only the current table is displayed 2 node ctx cs switch show running config Show the whole running config includes the call routing tables 3 node ctx cs switch debug call router detail level...

Page 511: ...erties E164 Number 123 String CdPN after lookup change Properties 16 55 33 CR switch Routing Lookup 16 55 33 CR Find best matching called element in table test 16 55 33 CR 01 Prefix Timeout Expression E164 Number of 123 completely no timeout matches 1 16 55 33 CR 02 Prefix Timeout Expression E164 Number of 123 completely no timeout matches 1 0 4 16 55 33 CR 03 Prefix Timeout Expression E164 Number...

Page 512: ... sites On the IP network there is also a PSTN gateway Node C to an alternative voice carrier Melon that shall be used for most call destinations Sites A and B also have connections to the local ISDN network This is called the local breakout connection The local breakout is to be used as a fallback for ISDN data connections We assume the following The number block for site A is 022 782 55 00 to 99 ...

Page 513: ... from the PSTN nodes B and C are forwarded directly to the PBX The remainder of this example will focus on the configuration for Node A The configuration for Node B can be built accordingly Node C has an even simpler configuration It is a good idea to specify the required call router elements and names before starting the configuration A sketch may be helpful Bearer capability table named TAB ISDN...

Page 514: ...ul to create the configuration offline and download it using TFTP Note In the following lines the prompt is omitted as in a configuration file and for better readability Call Router Config File context cs switch Hunt group service SVC FALLBACK to catch VoIP network errors service hunt group SVC FALLBACK no cyclic timeout 6 route call 1 dest table ISDN SERVICE route call 2 dest interface LOCAL BREA...

Page 515: ...add prefix 1066 mapping table called e164 to called e164 MAP CAC ORANGE map to 1066 1 Number manipulation CLI MELON Truncate CLI to last 2 digits and add 08004455 prefix in front mapping table calling e164 to calling e164 MAP CLI MELON map to 08004455 1 Prior to downloading this file you should make sure there are no other tables and functions in the call router node ctx cs switch copy tftp 172 16...

Page 516: ...PLE 02 14 33 CR switch Loading table MAP CAC ORANGE 02 14 33 CR switch Loading table MAP CLI MELON 02 14 33 CR switch Loading table IF LOCAL BREAKOUT precall service 02 14 33 CR switch Loading table IF PBX A precall service 02 14 33 CR switch Loading table IF NODE B precall service 02 14 33 CR switch Loading table IF NODE C precall service node ctx cs switch Configure partial rerouting To save ban...

Page 517: ...ry message on SIP To reroute a call must enter and leave Smart Node through the same SIP gateway and every service invoked must allow push back Mode context cs interface sip Allow Push Back The push back command allows or forbids rerouting of a call if the service is invoked Enable push back aaa service Mode context cs service aaa Step Command Purpose 1 name if isdn interface no call reroute accep...

Page 518: ...e priority Step Command Purpose 1 name svc brdg service no allows push back Enables push back of a call of this service Default is disabled Step Command Purpose 1 name svc dist service no allows push back Enables push back of a call of this service Default is disabled Step Command Purpose 1 name svc hunt service no allows push back Enables push back of a call of this service Default is disabled St...

Page 519: ...ing conference service configuration mode 520 Configuring the call routing destination 520 Configuring the conference server 521 SIP location service 521 SIP location service configuration task list 522 Entering SIP location service configuration mode 522 Binding a location service 523 Configuring multi contact behavior 523 Configuring the hunt timeout 523 ...

Page 520: ...eate a new conference service and how to enter the configuration mode of an existing one In addition it describes all commands and sub commands of the conference service configuration mode All configuration tasks for a conference service are listed below Enter conference service configuration mode see page 520 Configure the call routing destination see page 520 Configure the conference server see ...

Page 521: ... a lookup with the requested URI to find the right contact information If the call is originated by the PSTN network then this URI does not yet exist and must be built first with a mapping table If this is not done the lookup uses the called e164 number and checks if a registered identity matches this number For more information about this process see section B2B User Agent with Registered Clients...

Page 522: ... SIP location service configuration mode The service sip location service command enters the configuration mode of an existing location service or cre ates a new one with a specified name It also destroys an existing service by using the no form of the command Mode Context CS Step Command Purpose 1 name ctx cs switch no service sip location service service name Creates Destroys a SIP location serv...

Page 523: ...odes are available Hunt Contact one registration after the other depending on the priority Highest priority first Distribute Contact all registrations at the same time Distribute and Hunt Registrations with the same priority build a distribution group Hunt over this groups beginning with the highest priority Mode Service SIP location service Configuring the hunt timeout The hunt timeout command is...

Page 524: ...pter contents Introduction 525 Tone set profiles 525 Tone configuration task list 526 Configuring call progress tone profiles 526 Configure tone set profiles 527 Enable tone set profile 528 Show call progress tone and tone set profiles 529 ...

Page 525: ... has accepted and activated it for future use Congestion tone Tone you hear when you try to reach a remote extension but the network is busy or out of order for future use Dial tone Tone you hear when you lift the handset and the network is ready to accept the dialed digits of the called party number Hold tone Tone you hear when you are in an active connection and the remote extension sets you On ...

Page 526: ... tone set profiles Configuring call progress tone profiles Each call progress tone consists of a sequence of different tones and pauses Arbitrary tone cadences can be configured With these parameters all country specific tones can be defined Tone configuration knows only one command that have to be used repeatedly The sequence in which the commands are entered or appear in the config file defines ...

Page 527: ...is element has infinite duration The duration parameter is ignored in this case Configure tone set profiles A tone set profile maps one call progress tone profile to each internal call progress tone A tone set profile typ ically includes all the call progress tones for one country Procedure To configure a tone set profile Mode Configure Step Command Purpose 1 node cfg profile call progress tone na...

Page 528: ...ormation and the PSTN endpoint is NOT of type ISDN USER or FXO If availability of inband information will be noti fied by one endpoint the bearer channel already contains the necessary tone information and must not be gen erated locally If the user has not specified a tone set profile the default tone set will be taken to generate the local inband information For enabling a user defined tone set p...

Page 529: ... Show call progress tone profile The following example shows how to display the call progress tone profiles node show profile call progress tone belgianSpec Profiles belgianSpec Play 330ms 950Hz at 4dB Play 330ms 1400Hz at 4dB Play 330ms 1800Hz at 4dB Pause 100ms Procedure To show tone set profiles Mode Administrator execution Example Show tone set profile Step Command Purpose 1 node ctx cs switch...

Page 530: ...or UK and apply it to the isdn interface bri0 Create the call progress tone profiles node cfg profile call progress tone dial UK node pf callp dial UK play 5000 350 0 440 0 node pf callp dial UK profile call progress tone alerting UK node pf callp alertin play 400 400 0 450 0 node pf callp alertin pause 200 node pf callp alertin play 400 400 0 450 0 node pf callp alertin pause 2000 node pf callp a...

Page 531: ...Tone configuration task list 531 SmartWare Software Configuration Guide 42 Tone configuration node ctx cs switch interface isdn bri0 node if isdn bri0 use profile tone set UK ...

Page 532: ...t configuration Chapter contents Introduction 533 Shutdown and enable FXS ports 533 Bind FXS ports to higher layer applications 534 Configure country specific FXS port parameters 534 Other FXS port parameters 535 Example 535 ...

Page 533: ...dwide and will do so in the future These analog devices be they phones facsimile machines and the like represent a large investment and it is desirable to have the technical means to hook such devices to a Voice over IP enabled network POTS signaling The signaling procedure used on FXS ports is different throughout different countries but the basic idea is to use the POTS line itself as a current ...

Page 534: ...ter for your country is available as a profile before you begin operation Procedure Configure country specific FXS parameters Mode Port FXS Step Command Purpose 1 node config port fxs slot port Enter configuration mode for FXS port 2 node prt fxs slot port encap sulation cc fxs Sets the encapsulation for the port cc fxs designs the encapsulation is a context CS interface 3 node prt fxs slot port b...

Page 535: ...e duration in ms Default busy tone 4 optional node prt fxs slot port caller id for mat bell etsi Specifies which line protocol is used for caller id transmission Use bell for US Canada etsi for Europe Caller id is enabled disabled in the higher layer application interface fxs in context CS Default etsi 5 optional node prt fxs slot port no caller id attenuation attenuation Attenuates the modulated ...

Page 536: ...71 cfg port fxs 0 0 172 16 40 71 prt fxs 0 0 use profile fxs us 172 16 40 71 prt fxs 0 0 caller id format bell 172 16 40 71 prt fxs 0 0 flash hook duration 350 172 16 40 71 prt fxs 0 0 encapsulation cc fxs 172 16 40 71 prt fxs 0 0 bind interface fxs00 switch 172 16 40 71 prt fxs 0 0 exit 172 16 40 71 cfg system ...

Page 537: ...XO port configuration Chapter contents Introduction 538 Shutdown and enable FXO ports 538 Bind FXO ports to higher layer applications 538 Configure country specific FXO port parameters 539 Other FXO port parameters 539 ...

Page 538: ...y also can be configured when they are active But keep in mind that configuration of an active port temporarily disables the port for a short time some milliseconds Mode Configure Bind FXO ports to higher layer applications An FXO port needs to be associated to an fxo interface in a CS context The same mechanism of encapsulation and binding is used as known for e g ethernet ports see section Inter...

Page 539: ... Configure country specific FXO parameters Mode Port FXO Other FXO port parameters This section describes the commands available for the configuration of an FXO port Procedure Configure the FXO port parameters Step Command Purpose 1 node config port fxo slot port Enter configuration mode for FXO port 2 node prt fxo slot port use profile fxo profile Select a profile containing the country specific ...

Page 540: ...id for mat bell etsi Specifies which line protocol is used for caller id transmission Use bell for US Canada etsi for Europe If caller id is not enabled or wrong configured detection of caller id is not possible Default etsi 3 optional node prt fxo slot port flash hook duration duration Specifies for what time the SmartNode should go on hook to signal flash hook to the CO Default of duration is 20...

Page 541: ...ty optional 545 H 235 configuration 546 Advanced configuration options optional 549 Enabling H 245 Tunneling 549 Enabling the fastconnect procedure 550 Enabling the early H 245 procedure 550 Changing the TCP port for inbound call signaling connections 551 Configuring the traffic class for H 323 signaling 551 Setting the response timeout 551 Setting the connect timeout 552 Configuring the terminal ...

Page 542: ... and is an implementation of the ITU T H 323 Version 4 standard The H 323 gateway has bindings to interfaces on the two different contexts The CS Context has H 323 CS interfaces and the IP context has IP interfaces The H 323 CS interfaces are explained in detail in chapter 38 H 323 interface configuration on page 426 The H 323 interfaces in the CS context must be explicitly bound to a H 323 gatewa...

Page 543: ...teway to an IP interface Binding the gateway to one of the available IP interfaces is required to allow the gateway to determine the local IP address it should use The gateway needs to know the local IP address For example when it needs to tell the remote gateway in the call signaling to which IP address the remote gateway should send the media streams RTP data The gateway always uses the IP addre...

Page 544: ...ore names E 164 numbers or gatekeeper prefixes which can be specified using this procedure too Furthermore the gatekeeper discovery method must be specified as automatic or manual Normally the remote IP address which could be specified in the CS interface is not set if gatekeepers are used because the gatekeeper supplies the remote destination IP address Redundancy is of great importance in commun...

Page 545: ...describes enhancements within the framework of the H 3xx Series Recommendations to incorporate security services such as Authentication and Privacy data encryption Step Command Purpose 1 node gw h323 h323 gatekeeper discov ery auto gkid or node gw h323 h323 gatekeeper discov ery manual ip address ip port gkid Specify that gatekeeper discovery has to be done automatically or Specify the gatekeeper ...

Page 546: ...word must be a random alphanumeric character string of 1 through 12 characters e g 12ygR34230kG The master password must be a 32 digit hex number characters 0 9 a f To achieve best encryption security choose a random value no repeating character sequences The tool generates the encrypted H 235 password and the hash of the master password The encrypted H 235 password is then to be used for remote o...

Page 547: ...d The password to be entered is the output of the tool getcryptopassword exe Configures the password used for crypto hashed token calculation The password is entered in clear text min 1 max 12 alpha numeric characters Note Do not use this command over inse cure links subject to wiretapping If you enter the password as clear text you don t need to configure a master password 4 node gw h323 h323 h23...

Page 548: ... int rx response no h235 security ras auth int rx reject h235 security ras auth int tx request h235 security ras auth int tx response no h235 security ras auth int tx reject The command show h235 security shows the current setting 7 node gw h323 h323 h235 security ras auth int tx msg or node gw h323 h323 no h235 security ras auth int tx msg Enables or disables H 235 security for trans mitted RAS p...

Page 549: ...323 h235security time window 100 172 16 224 102 gw h323 h323 h235security version v2 172 16 224 102 gw h323 h323 h235security ras auth int tx 172 16 224 102 gw h323 h323 h235security ras auth int rx 172 16 224 102 gw h323 h323 h235security q931 auth int 172 16 224 102 gw h323 h323 show h235security H 235 SECURITY SETTINGS H 235 Security Disabled H 235 Module Version 2 02 01 H 235 Version 2 Sender ...

Page 550: ...xample shows how to enable the fastconnect procedure on an already defined H 323 Gateway node cfg gateway h323 h323 node gw h323 h323 faststart Enabling the early H 245 procedure If the early H 245 procedure is enabled the H 245 connection is opened as soon as possible instead of waiting for the call signaling connect message Early H 245 is disabled by default If enabled it only takes place when b...

Page 551: ...iterion in the IP routing table Mode Gateway H 323 Setting the response timeout Per default the H 323 gateway waits for 12s from the time it initiated a call towards the IP network until it ter minates the call if no response has been received This time can be changed using the following procedure Mode Gateway H 323 Example Defining an alternate response timeout The following example shows how to ...

Page 552: ...epers may differentiate between two terminal types terminals and gateways of the registrant In some applications it is necessary for the gateway to register as a terminal while in other applications it is neces sary to register as a gateway with the gatekeeper The default terminal type is gateway It can be changed using the following procedure Usually you do not need to change this setting Procedu...

Page 553: ... provides several debugging monitors to observe its dynamic behavior These monitors allow efficient troubleshooting of H 323 problems The most often used monitors are listed in the following table Step Command Purpose 1 node gw h323 h323 show gateway h323 status detail level Displays H 323 gateway status information The detail level parameter is a number in the range 0 to 5 and indicates how much ...

Page 554: ...ng a priority 557 Configuring a spoofed contact address 558 Binding location services 558 Enabling disabling the context SIP gateway 558 Troubleshooting 559 Show status information 559 Debug commands 559 Configuration Examples 560 Example 1 560 Example 2 560 Example 3 560 Applications 561 Outbound Authentication 561 Inbound Authentication 562 Outbound Registration 563 Inbound Registration 565 B2B ...

Page 555: ...f this interface is to build Request URI and to determine a possible outbound proxy If a proxy is available it represents the next SIP hop and all outgoing messages will be sent to this host If no proxy has been configured the messages will be sent to the Request URI s host Depending on these two SIP parameters the context SIP gateway chooses the right outgoing IP interface The IP address of the o...

Page 556: ...he context SIP gateway configuration mode All configuration tasks for a Context SIP Gateway are listed below Create a context SIP gateway see page 556 Create a transport interface see page 557 Configure the IP binding see page 557 Configure a priority see page 557 Configure a spoofed contact address see page 558 Bind location services see page 558 Enable Disable see page 558 Creating a context SIP...

Page 557: ...he command removes an existing binding Mode Transport Interface Configuring a priority The priority is used if a SIP request is sent out over an ip interface to which the context SIP gateway has no binding In this case the Contact SIP SDP and VIA headers will get the ip address of the transport interface with the highest priority The lower the priority number then the higher the priority The highe...

Page 558: ...ific confirguation for the identity Also they provide transport properties like Proxy or Traffic Class and media configuration parameters like VoIP Profile SIP Profile or Tone Profile For more information about configuration of location services and identi ties see Chapter 51 Location Service on page 602 Mode Context SIP Gateway Enabling disabling the context SIP gateway The shutdown command disab...

Page 559: ... the call control sip interfaces Step Command Purpose 1 node debug context sip gateway data path detail level Logs information related to the media chan nels node debug context sip gateway error detail level Logs all errors detected within the Context SIP Gateway node debug context sip gateway regis tration detail level Logs information about user registration activ ities node debug context sip ga...

Page 560: ...pplication that interconnects a private SIP environment and a public SIP envi ronment context sip gateway SIP GW interface lan bind interface eth0 context router port 5060 interface wan bind interface pvc100 context router port 5060 context sip gateway SIP GW no shutdown Example 3 If special features like Outbound Registration Inbound Registration or Authentication is required one or more location...

Page 561: ... which belongs to a certain domain there can be a default identity group configured The authentication credentials configured in the identity group default are used for any identity in this location service that is not explicitly configured authentication service AUTH_INALP realm inalp com username hermes password Wh6Xbk9G encrypted username john password Fa0Y9e4L encrypted authentication service ...

Page 562: ...tials The username and password used for challenges must be configured in an authentication service There must be at least one realm configured in the authentication service The first realm configured is used for challenging requests In an authentication service there can be multiple usernames and passwords An identity which should be challenged can direct the authentication inbound face to a pair...

Page 563: ...e which challenges credentials The domain of the location service must match the host part of the request uri and the location service is bound to the context sip gateway which handles the request 2 Determine the identity which challenges credentials The name or the alias of the identity must match the user part of the request uri If there is no identity that matches and an identity group with the...

Page 564: ...r The name of the identity builds the user part The first domain con figured in the location service builds the host part 3 Build the address of the registrar The registrar configured in the registration outbound face is taken as request uri If no registrar is configured the first domain configured in the location service builds the request uri 4 Build expire header If a lifetime is configured in ...

Page 565: ...s the request should be forwarded This happens accord ing the same rules as an incoming INVITE is forwarded Outgoing calls to the registered contacts will pass through the same sip interface as the incoming REGISTER request 2 Check request uri The host part of the request uri must match a domain of a location service which has configured imperative authoritative and is bound to the context sip gat...

Page 566: ... is necessary to bind a location service to the sip location service because the domain information is needed An alternative way would be to map a complete sip uri to the call destination properties The mode command in the sip location service configures the behavior of the service when multiple contacts are registered for one address of record In distribute mode the call is distributed to all con...

Page 567: ...ri is taken as requested user b If there is no destination uri set the destination e164 is taken as requested user 3 Determine the location service The location services are checked if one domain matches the requested domain and if the imperative of the location service is authoritative If a location service is bound and it does not match for the requested domain the call is dropped 4 Determine th...

Page 568: ...or the g726 32k and g726 32k cisco coders 575 Configuring RTP payload type for Cisco NSE 575 Configuring Cisco NSE for Fax 575 Configuring the dejitter buffer advanced 576 Enabling disabling filters advanced 578 Configuring Fax transmission 579 T 38 CED retransmission 582 T 38 No Signal Retransmission 583 Fax bypass method 583 Configuring fax failover 583 Configuring modem transmission 584 Modem b...

Page 569: ... between VoIP profiles gateways and CS interfaces The follow ing components are configurable Codecs and codec parameters such as silence suppression RTP payload type and audio filters DTMF relay Dejitter buffer Fax transmission Modem transmission Figure 1 VoIP profile association Configuring voice datapath options can improve or degrade the quality of the transmitted voice data Many of the default...

Page 570: ...ers When you create the VoIP profile the VoIP profile config uration mode appears so you can configure VoIP components Note The VoIP profile named default always exists in the system It is used by all interface components if there is no other VoIP profile available If VoIP parameters are the same throughout all interfaces you can simply change the profile default instead of creating a new profile ...

Page 571: ... the tab key after entering a few letters of a configuration com mand the full command name will display or a listing of commands that begin with those letters will display Press the enter key to select the desired command Signaling protocols have a codec negotiation mechanism it is not guaranteed that the first codec in the list is used to set up the con nection Each codec in the list may be used...

Page 572: ...llows silence suppression to be used with this codec If the codec g729 already existed in the list its parameters are updated with the entered values The following codecs are available g711alaw64k g711ulaw64k g723 5k3 g723 6k3 g726 16k g726 16k ciscoa g726 24k g726 24k cisco g726 32k g726 32k cisco g726 40k g727 16k g727 24k g727 32k g729 netcoder 6k4 netcoder 9k6 transparent transparent cisco a C...

Page 573: ...IP or H 323 network Cisco does not use the standard ITU G 726 version of G 726 instead it uses the ATM AAL2 version All supported Cisco codecs are available in profile voip Mode VoIP name The next table indicates the method of configuring a Cisco variant codec as the most preferred codec This example sets the transparent cisco as number 1 the most preferred Mode VoIP name Step Command Purpose 1 no...

Page 574: ...cribes how to configure DTMF relay Mode Profile VoIP Configuring RTP payload types If you are using DTMF relay with SIP the DTMF digits are transported in RTP packets with a special payload type The default value for this payload type can be configured in the profile VoIP Procedure Configure RTP NTE payload type Mode Profile VoIP Step Command Purpose 1 node pf voip pf name dtmf relay default rtp s...

Page 575: ...esenting signaling events not by the presence of tones but by sending a binary code representing the tone that is recreated at the destination Cisco s proprietary NSEs use different values to represent tones and events than the NTEs use NSEs are normally sent with RTP payload type 100 The RTP packets have the same source and destination IP addresses and UDP ports as the other packets in the media ...

Page 576: ...onditions a dejitter buffer is integrated in the RTP processing engine Typical voice sources generate voice packets at a constant rate the matching voice decompression algorithm also expects incoming voice packets to arrive at a constant rate However the packet by packet delay inflicted by the net work may be different for each packet As shown in figure 3 the result of the delays is that packets w...

Page 577: ... modem transmission without using the T 38 or fax bypass features described later in this chapter Figure 4 Adaptive versus static dejitter buffer Procedure Configure the dejitter buffer In the adaptive dejitter buffer there are parameters that can be configured such as shrink speed grow step etc that should not be changed unless it is necessary to do so An incorrect configura tion can lead to inte...

Page 578: ...g This procedure describes how to disable post filtering and high pass filtering Mode Profile VoIP Example Disable filters The following example shows how to disable the decoder output post filter and the input high pass filter node enable node configure node cfg profile voip myProfile node pf voip myProfi no post filter node pf voip myProfi no high pass filter Step Command Purpose 1 node pf voip ...

Page 579: ...d data Compressing and decompressing always incurs a loss of data SmartWare provides two solutions for fax transmission problems Fax bypass When a fax transmission is detected by the SmartNode it automatically switches to a config ured fallback codec that does no or little compression The dejitter buffer is configured with settings opti mized for fax transmission Fax relay Terminates the fax proto...

Page 580: ...red list of fax transmission modes the most preferred fax transmission mode is the first one in the list Procedure Configure fax bypass RTP Stream Node Node Node Node Node Node Node Node generated tones transported in RTP payload FAX Bypass FAX Relay reference data transported over T 38 Terminate fax protocol Terminate fax protocol Modulated data Modulated data Modulated data Modulated data refere...

Page 581: ...necessary to increase this value maximum 400ms Step Command Purpose 1 node pf voip name fax transmis sion relay t38 udp Adds fax relay transmission with T 38 protocol over UDP to the list of fax transmission modes 2 optional node pf voip name fax redundancy ls low speed redundancy hs high speed redundancy Packet loss can be avoided by transmitting the fax data packets several times This can be con...

Page 582: ...me fax max bit rate 2400 4800 7200 9600 12000 14400 Sets maximum allowed bit rate for fax relay Default 14400 Bit sec 6 optional node pf voip name fax detection ced tone fax frames Selects the method when fax transmissions are detected By CED tone or by fax frames Default ced tone It takes longer to detect Fax frames than CED tones but the risk of misdetection is mini mized 7 optional node pf voip...

Page 583: ...description part It signals the remote device of the new media transmission If the command option default is selected the system behavior is the same as before For a fax transmission over a VoIP SIP or H 323 network the Cisco NSE standard uses events defined by RFC2833 These events are used for the setup of the fax transmission starting between the calling and called peer Upon detecting a fax tran...

Page 584: ...e vbd yes ecan off in the media description part This attribute signals the remote device of the new media transmission If the command option default is selected the system behavior is the same as before SmartWare also supports the Cisco NSE standard which uses RFC2833 events for modem transmission over a VoIP SIP or H 323 network Upon detecting a modem transmission the called peer issues NSE Even...

Page 585: ...profile voip Disabled codec negotiation honors the codec lists from each call leg independently formed out of the remote and local capabilities The DSP is inserted into the RTP path to make sure each side can use its codec The DSP is transcoding between the codecs of the two RTP streams Enabled codec negotiation will keep the DSP out of the picture for IP IP calls and tries to negotiate a com mon ...

Page 586: ... maximum delay of 100 ms Figure 7 Home office in an enterprise network First configure the required CS interfaces see chapter 33 CS interface configuration on page 379 and call routing see chapter 40 Call router configuration on page 451 Next configure the voice over IP settings as needed based on the previous description First we create the VoIP profile with the needed configurations 1 node enabl...

Page 587: ...Redundant Packets 0 T 38 Low Speed Redundant Packets 0 Max Bit Rate 14400bps Volume 9 500dB Error Correction enabled HDLC enabled Dejitter Max Delay 200ms Modem Max Bit Rate 14400 Volume 9 500dB HDLC enabled DTMF Relay enabled Mute Encoder enabled RTP Payload Type NTE 101 Description 3 Create VoIP profile and give it a name All settings have default values 4 5 Remove the default codecs G 711alaw a...

Page 588: ... voip g729_Fa no codec g711uLaw64k 6 node pf voip g729_Fa codec g729 tx length 20 rx length 20 silence suppression 7 node pf voip g729_Fa dejitter max delay 100 8 node pf voip g729_Fa fax transmission relay t38 udp 9 node pf voip g729_Fa fax max bit rate 9600 10 node pf voip g729_Fa show profile voip g729_FaxRelay VoIP Profile g729_FaxRelay Used by 0 module s Codecs G 729A rxlen 20 txlen 20 ss T 3...

Page 589: ...compensate 100 milliseconds of network jitter 8 Enable fax relay over T 38 protocol 9 Limit the maximum bit rate the fax devices can communicate with each other to 9600 kbps 10 Show the configured profile Soft phone client gateway A soft phone client can only use G 711uLaw or G 723 codes neither of which can use silence suppression DTMF relay or fax 1 node enable 2 node configure 3 node cfg profil...

Page 590: ...er enabled Fax Detection CED Tone T 38 High Speed Redundant Packets 0 T 38 Low Speed Redundant Packets 0 Max Bit Rate 14400bps Volume 9 500dB Error Correction enabled HDLC enabled Dejitter Max Delay 200ms Modem Max Bit Rate 14400 Volume 9 500dB HDLC enabled DTMF Relay disabled Mute Encoder disabled RTP Payload Type NTE 101 Description 3 Create VoIP profile and give it a name All settings have defa...

Page 591: ...Examples 591 SmartWare Software Configuration Guide 47 VoIP profile configuration 6 Disable DTMF relay 7 Show the configured profile ...

Page 592: ... Chapter 48 PSTN profile configuration Chapter contents Introduction 593 PSTN profile configuration task list 593 Creating a PSTN profile 593 Configuring the echo canceller 594 Configuring output gain 594 ...

Page 593: ...nts that can be configured through the PSTN profile Creating a PSTN profile Configuring the echo canceller see page 594 Configuring output gain see page 594 If a PSTN profile is modified the saved modification is applied to all open calls and is valid for all future calls on the interface using this PSTN profile Creating a PSTN profile Before configuring voice parameters a PSTN profile must be cre...

Page 594: ...iguring output gain The output gain determines the voice output volume gain towards PSTN ports as shown in figure 10 Figure 10 Applying output gain Procedure Configure voice output gain Step Command Purpose 1 node cfg profile pstn name Create a PSTN profile with name name and enter PSTN profile configuration mode The newly created profile contains default values for all parameters If a profile wit...

Page 595: ...ile configuration task list 595 SmartWare Software Configuration Guide 48 PSTN profile configuration Mode Profile PSTN Step Command Purpose 1 node pf pstn name output gain gain Set the output gain to value in dB ...

Page 596: ... Introduction 597 SIP profile configuration task list 597 Entering the configuration mode for a SIP profile 597 Mapping from a SIP disconnect cause 597 Mapping to a SIP cause 598 Mapping from a SIP redirection reason 598 Mapping to a SIP redirection code 598 ...

Page 597: ...SIP profile listed below Enter the configuration mode for a SIP profile see page 597 Map from a SIP disconnect cause to a Q 931 cause see page 597 Map to a SIP cause from a Q 931 disconnect cause see page 598 Map from a SIP redirection code to a Q 931 redirect reason see page 598 Map to a SIP redirection code from a Q 931 redirect reason see page 598 Entering the configuration mode for a SIP profi...

Page 598: ...ned in the system and are provided by the command Mode Profile SIP Mapping to a SIP redirection code The map redir reason to sip command can be used to map a Q 931 redirect reason to a specific SIP redirect code All redirect codes and reasons are pre defined in the system and are provided by the command Mode Profile SIP Step Command Purpose 1 name pf sip name map cause to sip q931 cause to sip cau...

Page 599: ...apter contents Introduction 600 Authentication Service configuration task list 600 Creating an Authentication Service 600 Configuring a Realm 601 Configuring the authentication protocol 601 Creating credentials 601 Configuration Examples 601 ...

Page 600: ...l be considered to find the right Authentication Credentials Authentication Service configuration task list The following section describes how to create a new authentication service and how to enter the configuration mode of an existing service Additionally it describes all commands and sub commands of the authentication service configuration mode All configuration tasks for Authentication Servic...

Page 601: ...e entered username The no form of the command removes an existing Credential It is possible to enter this command without a password Mode Authentication Service Configuration Examples authentication service AUTH_SRV realm 1 voip public realm 2 voip intranet realm 3 ms exchange username 433 password fK bfnzL45Goh VdjrWxAA encrypted username john doe password D60t7CBZ58k7JK2jxdlw4w encrypted Step Co...

Page 602: ...vice 603 Adding a domain 603 Creating an identity 604 Authentication outbound face 605 Authentication inbound face 606 Registration outbound face 608 Registration inbound face 610 Call outbound face 611 Call inbound face 612 Creating an identity group 613 Inheriting from an identity group to an identity 613 Configuration Examples 614 ...

Page 603: ...ins that the location service is responsible for If the application needs information from the location service it performs a lookup with the Host Part of the Request URI or the From URI to find the right instance The header selection from which the URI will be taken depends on the call direction Outgoing Incoming SIP Call and the requested information The SIP environment deter mines which format ...

Page 604: ...he behavior when this identity sends requests When creating an identity it is important to consider that the name of the identity is always used as user part when building a sip uri The name of the identity is also used when comparing to or matching with a sip uri Mode Location Service Mode Identity Mode Identity Step Command Purpose 1 node ls name no domain name or node ls name domain index name ...

Page 605: ...ation inbound face see page 610 Call outbound face see page 611 Call inbound face see page 612 Authentication outbound face The authentication outbound face is used to provide authentication credentials to challenges from other user agents or proxies Mode Identity An authentication entry establishes a link between an identity and exactly one pair of credentials in an authen tication service To lin...

Page 606: ...tion service authentication service user name username or node authout authenticate index authentication service authentication ser vice username username or node authout authenticate before index authentication service authentica tion service username username or node authout authenticate after index authentication service authentica tion service username username Adds a new authentication entry ...

Page 607: ...uthentica tion service username username or node authin authenticate after index authentication service authentication ser vice username username Adds a new authentication entry to the authentica tion inbound face If more than one authentication entry has to be entered the order of the list can be modified by using the index and or the insert key words before and after Step Command Purpose 1 node ...

Page 608: ...auto none Enables registration with auto or disables registra tion explicitly with none Step Command Purpose 1 node regout no registrar host port Configures the address of the registrar to send your register requests When no registrar is config ured the register requests are sent to the first domain entry in the location service Step Command Purpose 1 node regout no lifetime seconds Configures the...

Page 609: ... each proxy configured there is a route header added If more than one proxy entry has to be entered the order of the list can be mod ified by using the index and or the insert key words before and after Step Command Purpose 1 node regout proxy index down posi tions or node regout proxy index up posi tions If multiple proxies are configured the entry at the index can be moved in the proxy list up o...

Page 610: ...node regin no lifetime default sec onds min seconds max seconds Configures the range of the expiration time accepted for inbound registration If there is a time requested which is out of the range the time is set to a value which fits the range If there is no time requested it is set to the default lifetime Step Command Purpose 1 node regin no contact host port context cs interface sip priority pr...

Page 611: ... 1 node callout name no preferred transport protocol tcp udp Selects which protocol to prefer if an outgoing call destines this identity Step Command Purpose 1 node callout name no traffic class traffic class Selects which traffic class to set if an outgoing call destines this identity Step Command Purpose 1 node callout proxy host port strict route or node callout proxy index host port strict rou...

Page 612: ... be moved in the proxy list up or down the number of positions given in the command Step Command Purpose 1 node callout no proxy index Removes the proxy entry at the index or remove all proxy entries if no index is given Step Command Purpose 1 node callout proxy none Removes all proxy entries and disables explicitly the use of a proxy Step Command Purpose 1 node identity name no call inbound Adds ...

Page 613: ... parameters are not configured in the identity itself Some commands allow the identity to explicitly disable some configurations that were otherwise inher ited Mode Location Service Mode Location Service Mode Location Service Mode Location Service Step Command Purpose 1 node ls name no identity group name Adds a new identity group to the location service The no form of the command removes an exist...

Page 614: ...entity identity 400 inherits REGISTER Exactly the same can be configured without inheritance All inherited parameters can be configured in the identity itself Inheritance is useful if multiple identities share the same configuration Example location service INALP domain inalp com identity 300 authentication outbound authenticate 1 authentication service AUTH_INALP username john registration outbou...

Page 615: ...n outgoing call 620 Verify ISDN layer 2 and 3 status 622 Debugging FXS Signaling 623 Verify an incoming call 623 Verify an outgoing call 624 Debugging H 323 Signaling 625 Verify an incoming call 625 Verify an outgoing call 627 Debugging SIP signaling 629 Verify an incoming call 629 Verify an outgoing call 629 Using SmartWare s internal call generator 630 Debugging voice data 631 Check system logs ...

Page 616: ... the link layer and check IP connectivity before working on application problems Work from the core to the edge Problems always show up end to end the phone does not ring or the browser cannot find the web site To track down network problems it is however helpful to start with a min imal number of hops make sure everything is ok and then increase the end to end distance hop by hop Note Event log f...

Page 617: ... connectivity This procedure describes how to use the ping command to test IP connectivity It verifies that your SmartNode can communicate with such hosts as a gatekeeper and IP phone a registrar and other VoIP gateways Use Telnet to access your SmartNode then use the ping command to verify that an IP packet can be sent to and received from all hosts with which the SmartNode should be able to comm...

Page 618: ... your unit debug the source signaling protocol depending on where the call comes from 3 Make sure that the call leaves correctly the context CS of your unit debug the destination signaling proto col depending on where the call goes to 4 Debug call routing when the call enters the context CS but it does not leave it Remember that context CS must be activated no shutdown for call routing to work Ple...

Page 619: ...ate NULL Event TERMINAL SETUP IND 18 34 10 ICC TERMINAL 00b73348 Set state to OVERLAP SENDING unit debug ccisdn error Prints all errors occurring in ISDN call control and ISDN datapath control Always switch this monitor on when debugging ISDN unit debug ccisdn datapath Prints operations on the ISDN part of the voice data path Use this monitor if you experience prob lems in the data path no speech ...

Page 620: ...nds see below The SETUP message contains different elements among others the calling party number 60 and the called party number 50 Verify these depending on your application there might be as well other ele ments in the message The line 18 34 10 ICC TERMINAL 00b73348 ALERTING DSS1 Ntwk shows that the dialed number is alerting now The ALERTING message is sent back to the terminals represented by t...

Page 621: ... Progress indicator inband information available private network serving local user CCITT 22 03 14 ICC PSTN Message primitive 50 22 03 14 ICC PSTN 00b70a20 RELEASE COMPLETE DSS1 User 22 03 14 ICC PSTN 00b70a20 State DISCONNECT INDICATION Event PSTN RELEASE IND 22 03 14 ICC PSTN 00b70a20 Set state to NULL 22 03 14 ICC PSTN CLEARING CALL PSTN 00b70a20 22 03 14 ICC PSTN Removed endpoint PSTN 00b70a20...

Page 622: ...r 2 and 3 status ISDN layer 2 and 3 can be verified using a show command node cfg show port isdn 0 2 status Logical Isdn Driver 0 0 Slot 0 Number of Ports 5 Statistics Leased buffers 24 Max leased buffers 34 Next Call Key 0 Logical Port 0 0 2 Admin State Open Real State Open Operating Layer 3 Link State up Layer 2 Permanent Layer 2 off Protocol PointToMultiPoint UniSide Net Layer 3 Protocol Dss1 Un...

Page 623: ...vent timeout 09 00 11 FXS FXS 00 01 new state off hook 09 00 13 CFXS EP PHONE Change state to DIALING 09 00 13 CFXS EP PHONE Stop tone 09 00 43 CFXS EP PHONE Play tone ringback tone 09 01 01 CFXS EP PHONE Change state to CONNECTED 09 01 01 CFXS EP PHONE Stop tone 09 01 01 CFXS EP PHONE Change datapath direction to send receive Explanation unit cfg 09 00 11 FXS 0 1 Off hook The phone went off hook ...

Page 624: ...al 2 dest interface PHONE unit cfg 09 13 55 CFXS EP PHONE Change state to RINGING 09 13 55 CFXS EP PHONE Start Ring 09 13 55 FXS FXS 00 01 state on hook event ring start 09 13 55 FXS 0 1 Set state to Ringing 09 13 55 FXS FXS 00 01 new state ringing 09 13 56 FXS 0 1 Set state to RingPause 09 14 00 FXS 0 1 Set state to Ringing 09 14 01 FXS 0 1 Set state to RingPause 09 14 02 FXS 0 1 Off hook 09 14 0...

Page 625: ...fg show gateway h323 status H 323 Gateway h323 State UP Stack Handle 0x193ce44 RAS Engine Command Purpose unit debug gateway h323 signaling Prints all signaling operations on H 323 interfaces unit debug gateway h323 error General purpose error monitor of H 323 Always enable this when debugging H 323 unit debug gateway h323 datapath Prints operations on the H 323 part of the voice data path Use thi...

Page 626: ...3 EP h323 00c13dc0 Stack State DIALTONE 00 29 03 H323 EP h323 00c13dc0 Call ID is 0213 4d80 eacb 11e0 2eee 0030 2b00 1e0e 00 29 03 H323 EP h323 00c13dc0 Stack Received Incomplete Address Indication 00 29 03 H323 EP h323 00c13dc0 Stack State RINGBACK 00 29 03 H323 EP h323 00c13dc0 Stack Received ALERTING 00 29 03 H323 EP h323 00c13dc0 Progress Indicator none 00 29 03 H323 EP h323 00c13dc0 State TER...

Page 627: ...te way to debug wants to make a call towards a H 323 VoIP network using a gatekeeper The debug output below shows a normal working call setup sequence unit enable unit configure unit cfg debug gateway h323 error unit cfg debug gateway h323 signaling unit debug gateway h323 ras unit cfg show gateway h323 status H 323 Gateway h323 State UP Stack Handle 0x193ce44 RAS Engine State REGISTERED Gatekeepe...

Page 628: ...EP h323 00c07230 State CONNECTED Call Event PROGRESS 01 00 14 H323 EP h323 00c07230 Stack Received STATUS Audit successful 01 00 14 H323 EP h323 00c07230 Channel State IDLE Channel Event CONTROL UP 01 00 14 H323 EP h323 00c07230 Set channel state to OPENING 01 00 14 H323 EP h323 00c07230 State CONNECTED Call Event PROGRESS 01 00 14 H323 EP h323 00c07230 Stack State CONNECTED CALL 01 00 14 H323 EP ...

Page 629: ...l has found its destination on the gateway that is debugged If there are no responses or a nega tive response continue debugging call routing and the destination protocol Verify an outgoing call Make sure that an outgoing call from context CS leaves correctly to the SIP network The following sequence shows a working call setup unit cfg debug gateway sip error unit cfg debug gateway sip transport u...

Page 630: ...al 50 dest interface TERMINAL unit cfg 19 17 38 ICC TERMINAL Added endpoint TERMINAL 00df2760 19 17 38 ICC TERMINAL NEW CALL Allocated Endpoint TERMINAL 00df2760 19 17 38 ICC TERMINAL 00df2760 SETUP DSS1 Ntwk Bearer capability speech CCITT circuit mode 64kBit s G 711 A law Calling party number 55 unknown number unknown numbering plan presentation allowed user provided not screened Called party num...

Page 631: ...ase no response or a RELEASE message con tinue debugging ISDN signaling unit cfg call 55 drop Drops the call initiated with the dial command You can proceed as in this example with any other context CS interface also for VoIP protocols like SIP and H 323 Debugging voice data There are several debug monitors that can help identify problems in VoIP connections The most common VoIP problems are voice...

Page 632: ...ays periodically updated statistics containing the number of sent and received packets the number of lost packets Usage To verify that RTP packets are sent received and to debug net work quality issues lost packets no debug media gate way switch Displays control activities on the TDM part of the Data Path Usage To investigate problems with hair pinning or timeslot switching no debug media gate way...

Page 633: ... the Command Line Inter face commands show running config and show version you can display the currently active configura tion of the system in a Telnet and or console session Adding to the submitted trouble report will help us analyze the configuration and preclude possible configuration problems In the unlikely case of a suspected hardware problem also submit the serial number of your unit s and...

Page 634: ... IP network in order to inspect packet contents Please use one of the following tools supporting trace file formats which our tools can read Network Associates Sniffer Details are available at www sniffer com TTC Firebird Details are available at www ttc com Ethereal Details are available at www ethereal com freeware When possible submit the package of trouble report files by mail to the following...

Page 635: ...635 Appendix A Terms and definitions Chapter contents Introduction 636 SmartWare architecture terms and definitions 636 ...

Page 636: ...ootloader is installed in the factory and is in general never upgraded Bootloader Image The binary code of the Bootloader stored in the persistent memory flash of a SmartNode Bootstrap The starting up of a SmartNode which involves checking the Reset button loading and starting the application image and starting other software modules or if no valid application image is available the bootloader Bui...

Page 637: ...local ISDN equip ment e g telephone a variable delay is converted into a fixed delay giv ing voice a better quality See also Jitter Digit Collection Some devices PBX ISDN network remote gateways and gatekeepers may require bloc sending of the dialed number Digit collection collects the overlap dialed digits and forwards them in a single call setup message Driver Software Download A driver software...

Page 638: ...der input See also post filter Host Computer system on a network Similar to node except that host usually implies a PC or workstation whereas node generally applies to any net worked system including access servers and routers See also node Hostname Name given to a computer system e g a PC or workstation Hunt Group In SmartNode terminology a hunt groups allows you to apply the inter face configura...

Page 639: ...s a physical connector on the SmartNode Port Address A port address can be assigned to a CS interface to realize a virtual voice tunnel between two nodes Post Filter The voice decoder output is normally filtered using a perceptual post filter to improve voice quality See also High Pass Filter POTS Plain Old Telephone Service Profile A profile provides configuration shortcutting A profile contains ...

Page 640: ... for application images and interface card driver soft ware excluding configuration files System Memory The volatile memory that includes the system region holding the running config for the SmartWare during operation of a SmartNode system A region in the volatile memory of a SmartNode See also system mem ory TFTP Server A central server used for configuration up and download download of applicati...

Page 641: ...641 Appendix B Mode summary Chapter contents Introduction 642 ...

Page 642: ...ommand prompt Indicates that there could be more than one instance of this component Context IP context ip router host ctx ip name IP Interface interface name host if ip name DYNDNS host dyndns Service CFNR service cfnr name host svc cfnr name Service Distribute service distribution group name host svc dist name Service Hunt Group service hunt group name host svc hunt name Interface FXS interface ...

Page 643: ...port PPPoE Session session session host session session Gateway H323 gateway h323 name Port E1T1 or BRI port bri slot port host prt bri slot port Gateway H323 Q 921 host q921 slot port Gateway H323 gateway h323 name Q 931 q931 host q931 slot port q921 Gateway H323 gateway h323 name Port FXO port fxo slot port host prt fxo slot port Gateway H323 gateway h323 name Port FXS port fxs slot port host pr...

Page 644: ...y manual name host pf ipsma name Gateway H323 Profile IPSEC Transform host pf ipstr name Profile NAPT profile napt name host pf napt name Gateway H323 gateway h323 name Profile PPP profile ppp name host pf ppp name Gateway H323 gateway h323 name Profile PSTN profile pstn name host pf pstn name profile ipsec transform name Gateway H323 gateway h323 name Service CFNR host svc cfnr name service cfnr ...

Page 645: ...645 Appendix C Command summary Chapter contents Introduction 646 New Configuration Commands 647 Other 647 Show help 647 Show command history 647 Restart system 647 ...

Page 646: ...ribed as follows Arguments where you must supply the value are surrounded by angle brackets Optional arguments within commands are shown in square brackets Alternative parameters within commands are separated by vertical bars Alternative but required parameters are shown within grouped braces and are separated by vertical bars Command syntax is illustrated by an example in figure 14 Figure 14 EBNF...

Page 647: ...figuration Guide You may download the release notes at www pat ton com support Current Revision Document Number 13211U8 001 Rev D Part Number 07MSWR320_SCG Revised July 17 2006 Other Show help Show command history Use CTRL N and CTRL P to browse The cursor keys up down are not working Restart system Step Command Purpose 1 help topic Shows command help Step Command Purpose 1 history Shows command h...

Page 648: ...648 Appendix D Internetworking terms acronyms Chapter contents Abbreviations 649 ...

Page 649: ...ode CBR Constant Bit Rate CD ROM Compact Disc Read Only Memory CDR Call Detail Record CFP Call Forwarding Procedure CLEC Competitive Local Exchange Carriers CLI Command Line Interface CLIP Calling Line Identification Presentation CO Central Office CPE Customer Premises Equipment CPU Central Processor Unit CRC32 32 bit Cyclic Redundancy Check D DC Direct Current DDI Direct Dialing In number DHCP Dy...

Page 650: ...P HyperText Transport Protocol HW Hardware I IAD Integrated Access Device ICMP Internet Control Message Protocol ILEC Incumbent Local Exchange Carriers IP Internet Protocol ISDN Integrated Services Digital Network ISDN NT ISDN Network Termination ISDN S ISDN S ubscriber Line Interface ISDN T ISDN T runk Line Interface ISDN TE ISDN Network Terminal Mode ITC Information Transfer Bearer Capability L ...

Page 651: ...hortest Path First P PBR Policy Based Routing principles PBX Private Branch Exchange PC Personal Computer PMC Production Technology Management Commit tee POP Point of Presence POTS Plain Old Telephony Service PRA Primary Rate Access PRI Primary Rate Interface PSTN Public Switched Telephone Network pt mpt point to multi point pt pt point to point PVC Permanent Virtual Circuit pwd Password PWR Power...

Page 652: ... and Medium Enterprises SNMP Simple Network Management Protocol SOHO Small Office Home Office SONET Synchronous Optical Network SS7 Signaling System No 7 STM SDH Transmission at 155 Mb s SVC Switched Virtual Circuit SW Software T TCP IP Transport Control Protocol Internet Protocol TE Terminal Equipment TFTP Trivial File Transfer Protocol U UBR Unspecified Bit Rate UD 64 Unrestricted Data 64 kb s U...

Page 653: ...653 Appendix E Used IP ports available voice codecs Chapter contents Used IP ports 654 Available voice codecs 655 ...

Page 654: ...119 odd numbers Voice statistics RTCP SIP UDP 5060 Call signaling port for SIP configurable TCP 5060 Call signaling port for SIP configurable UDP 4864 5118 even numbers Voice data RTP UDP 4865 5119 odd numbers Voice statistics RTCP NAPT TCP 8000 15999 NAPT port range Telnet TCP 23 TCP server port Webserver TCP 80 TCP server port DHCP UDP 67 Source port DHCP Server UDP 68 Source port DHCP Client TF...

Page 655: ...best voice qual ity American audio digitizing G 723 1 6 3 30 17 Good voice quality at lowest bandwidth like analog phone acceptable delay G 729 G 729a 8 10 40 Best relationship between voice quality and used bandwidth low delay Transparent 64 10 96 Transparent ISDN data no echo cancellation G 726 16 24 32 40 20 32 40 48 56 The G 726 is an ADPCM based codec with small memory foot print but fairly h...

Reviews: