24
SmartWare Software Configuration Guide
Table of Contents
Configuring DTMF relay
.............................................................................................................................574
Configuring RTP payload types
....................................................................................................................574
Configuring RTP payload type for transparent-clearmode
............................................................................575
Configuring RTP payload types for the g726-32k and g726-32k-cisco coders
..............................................575
Configuring RTP payload type for Cisco NSE
..............................................................................................575
Configuring Cisco NSE for Fax
....................................................................................................................575
Configuring the dejitter buffer (advanced)
....................................................................................................576
Enabling/disabling filters (advanced)
.............................................................................................................578
Configuring Fax transmission
.......................................................................................................................579
T.38 CED retransmission
.............................................................................................................................582
T.38 No-Signal Retransmission
....................................................................................................................583
Fax bypass method
........................................................................................................................................583
Configuring fax failover
................................................................................................................................583
Configuring modem transmission
.................................................................................................................584
Modem bypass method
.................................................................................................................................584
Configuring the traffic class for Voice and Fax data
......................................................................................585
Configuring IP-IP codec negotiation
.............................................................................................................585
Examples
.............................................................................................................................................................586
Home office in an enterprise network
...........................................................................................................586
Home office with fax
....................................................................................................................................588
Soft phone client gateway
..............................................................................................................................589
48
PSTN profile configuration
......................................................................................................................... 592
Introduction
........................................................................................................................................................593
PSTN profile configuration task list
....................................................................................................................593
Creating a PSTN profile
...............................................................................................................................593
Configuring the echo canceller
......................................................................................................................594
Configuring output gain
...............................................................................................................................594
49
SIP profile configuration
............................................................................................................................. 596
Introduction
........................................................................................................................................................597
SIP profile configuration task list
.........................................................................................................................597
Entering the configuration mode for a SIP profile
.........................................................................................597
Mapping from a SIP disconnect cause
...........................................................................................................597
Mapping to a SIP cause
.................................................................................................................................598
Mapping from a SIP redirection reason
.........................................................................................................598
Mapping to a SIP redirection code
................................................................................................................598
50
Authentication Service
................................................................................................................................. 599
Introduction
........................................................................................................................................................600
Authentication Service configuration task list
......................................................................................................600
Creating an Authentication Service
...............................................................................................................600
Configuring a Realm
.....................................................................................................................................601
Configuring the authentication protocol
.......................................................................................................601
Creating credentials
......................................................................................................................................601
Configuration Examples
......................................................................................................................................601