762
IVR configuration examples
Configure a secondary call on a call node (match the
terminator of numbers)
Network requirements
As shown in
, configure an IVR access number and call node functions on Router B to meet the
following requirements.
•
After the subscriber dials
300
(the IVR access number) from Telephone A, Router B plays the audio
file
welcome.wav
.
•
The subscriber dials
50#
at Telephone A to originate a secondary call and then Telephone B1 rings.
•
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav
.
•
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav
.
Figure 789
Network diagram
Configuring Router A
# Configure a local number and call route.
1.
Configure a local number in the local number configuration page: The number ID is 100, the
number is 100, and the bound line is line 1/0.
2.
Configure a route to Router B in the call route configuration page: The route ID is 300; the
destination number is 300, the SIP routing method is IP routing, the destination IP address is
1.1.1.2, and the DTMF transmission mode is out-of-band.
Configuring Router B
# Configure local numbers in the local number configuration page:
•
Local number 500: The number ID is 500, the number is 500, and the bound line is line 1/0.
•
Local number 50: The number ID is 50, the number is 50, and the bound line is line 1/1.
# Upload g729r8 media resource files.
Select
Voice Management
>
IVR Services
>
Media Resources Management
from the navigation tree to
access the following page.
Telephone A
50
Eth1/1
1.1.1.1/24
Router A
Router B
100
Eth1/1
1.1.1.2/24
Telephone B2
Telephone B1
500
Содержание MSR SERIES
Страница 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Страница 20: ...3 Figure 3 Initial page of the Web interface ...
Страница 42: ...25 Figure 13 Firefox Web browser setting ...
Страница 59: ...42 Figure 27 Checking the basic service configuration ...
Страница 73: ...56 Figure 35 Sample interface statistics ...
Страница 156: ...139 Figure 139 Rebooting the 3G modem ...
Страница 168: ...151 Figure 152 Configuring Web server 2 ...
Страница 174: ...157 Figure 158 Configure the URL filtering function ...
Страница 187: ...170 Upon detecting the Land or Smurf attack on Ethernet 0 2 Router outputs an alarm log and drops the attack packet ...
Страница 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Страница 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Страница 255: ...238 Figure 241 Advanced limit setting ...
Страница 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Страница 354: ...337 Figure 339 Configuring a login control rule so Host B cannot access Router through the Web ...
Страница 400: ...383 Figure 387 Verifying the configuration ...
Страница 405: ...388 ...
Страница 523: ...506 Figure 530 Ping configuration page ...
Страница 538: ...521 a Click Device A on the topology diagram b Click Ethernet 0 2 on the panel diagram c Click Port Guard ...
Страница 744: ...727 Verifying the configuration In the case that the IP network is unavailable calls can be made over PSTN ...
Страница 775: ...758 Figure 785 Configuring a jump node ...
Страница 791: ...774 Figure 801 Configuring a jump node ...