655
Figure 681
Specifying listening transport layer protocol
a.
Select
TCP
for
SIP Listening Transport Layer Protocol
.
b.
Click
Apply
.
Verifying the configuration
SIP calls from telephone 1111 to telephone 2222 are carried over TCP. You can view information about
TCP connections on the
TCP Connection Information
tab page by selecting
Voice Management
>
States
and Statistics
>
SIP UA States
from the navigation tree and clicking the
TCP Connection Information
tab.
Configuring TLS to carry outgoing SIP calls
Network requirements
Two routers Router A and Router B work as SIP UAs. It is required that the SIP calls between the two
parties be carried over TLS.
Figure 682
Network diagram
Configuration procedure
The certification authority (CA) server runs RSA Keon in this configuration example.
CAUTION:
To make sure the certificate on the device can be used, be sure that the device system time falls within the
validity time of the certificate.
1.
Retrieve the CA certificate from the certificate issuing server.
For more information about how to retrieve the CA certificate from the certificate issuing server,
see "Managing certificates."
2.
Configure basic voice calls, see "
Configure basic voice calls: configure a local number and the
"
3.
Specify the transport layer protocol on Router A:
# Specify TLS as the transport layer protocol for outgoing calls on Router A.
Select
Voice Management
>
Call Connection
>
SIP Connection
from the navigation tree, and click
the
Session Properties
tab to access the transport layer protocol configuration page as shown
Содержание MSR SERIES
Страница 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Страница 20: ...3 Figure 3 Initial page of the Web interface ...
Страница 42: ...25 Figure 13 Firefox Web browser setting ...
Страница 59: ...42 Figure 27 Checking the basic service configuration ...
Страница 73: ...56 Figure 35 Sample interface statistics ...
Страница 156: ...139 Figure 139 Rebooting the 3G modem ...
Страница 168: ...151 Figure 152 Configuring Web server 2 ...
Страница 174: ...157 Figure 158 Configure the URL filtering function ...
Страница 187: ...170 Upon detecting the Land or Smurf attack on Ethernet 0 2 Router outputs an alarm log and drops the attack packet ...
Страница 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Страница 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Страница 255: ...238 Figure 241 Advanced limit setting ...
Страница 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Страница 354: ...337 Figure 339 Configuring a login control rule so Host B cannot access Router through the Web ...
Страница 400: ...383 Figure 387 Verifying the configuration ...
Страница 405: ...388 ...
Страница 523: ...506 Figure 530 Ping configuration page ...
Страница 538: ...521 a Click Device A on the topology diagram b Click Ethernet 0 2 on the panel diagram c Click Port Guard ...
Страница 744: ...727 Verifying the configuration In the case that the IP network is unavailable calls can be made over PSTN ...
Страница 775: ...758 Figure 785 Configuring a jump node ...
Страница 791: ...774 Figure 801 Configuring a jump node ...