Contents
This chapter explains how to configure H.323 Gateways.
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions are described in the "Restrictions for Configuring an H.323 Network" section.
Note |
The gatekeeper authenticates the endpoint based on the general ID. It does not relate the H.323 ID and general ID. Both the gateway H323_ID and the generalID in ClearTokens should be same. |
To configure a Cisco device as an H.323 gateway in a service provider environment, configure at least one of its interfaces as a gateway interface. Use either an interface that is connected to the gatekeeper or a loopback interface for the gateway interface. The interface that is connected to the gatekeeper is usually a LAN interface: Fast Ethernet, Ethernet, FDDI, or Token Ring.
To configure a gateway interface, use the following commands beginning in global configuration mode.
show gateway
Use this command to verify gateway configuration by displaying the current registration information and gateway status. Example:
Router# show gateway
|
This section contains the following procedures:
To shut down or enable all VoIP services on a Cisco gateway, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service-VoIP configuration mode. |
Step 2
|
no shutdown forced
Example: Router(conf-voi-serv)# shutdown forced |
Shuts down or enables VoIP call services. |
Step 3
|
exit
Example: Router(conf-voi-serv)# exit |
Exits the current mode. |
To shut down and enable VoIP submodes, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service-VoIP configuration mode. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Selects H.323-call-processing submode. |
Step 3
|
no call service stop forced maintain-registration
Example: Router(conf-voi-serv)# call service stop maintain-registration |
Shuts down or enables VoIP call services for the selected submode. |
Step 4
|
exit
Example: Router(conf-voi-serv)# exit |
Exits the current mode. |
show gateway
Use this command to display gateway status. The following example displays output after the gateway has been shut down: Example:
Router# show gateway
H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1
H.323 service is shutdown
Gateway Router is not registered to any gatekeeper
The following example displays output after a graceful shutdown with calls in progress: Example:
Router# show gateway
H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1
H.323 service is shutting down
Gateway Router is registered to Gatekeeper GK1
The following example displays output when H.323 call service has been shut down with the call service stop maintain-registration command: Example:
Router# show gateway
H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1
H.323 service is shutdown
Gateway Router is registered to Gatekeeper GK1
|
This section contains the following information:
Registration, Admission, and Status (RAS) signaling performs registration, admissions, status, and disengage procedures between the H.323 VoIP gateway and the H.323 VoIP gatekeeper. RAS tells the gatekeeper to translate a E.164 phone number of the session target into an IP address.
In the RAS exchange between a gateway and a gatekeeper, a technology prefix is used to identify the specific gateway when the selected zone contains multiple gateways. The tech-prefixcommand is used to define technology prefixes.
In most cases there is a dynamic protocol exchange between the gateway and the gatekeeper that enables the gateway to inform the gatekeeper about technology prefixes and where to forward calls. If, for some reason, that dynamic registry feature is not in effect, statically configure the gatekeeper to query the gateway for this information.
Note |
To configure the gatekeeper to query for prefix and forwarding information, see the "Configuring H.323 Gatekeepers and Proxies" section. |
To configure RAS, define specific parameters for the applicable POTS and VoIP dial peers. The POTS dial peer informs the system of which voice port to direct incoming VoIP calls to and (optionally) determines that RAS-initiated calls have a technology prefix prepended to the destination telephone number. The VoIP dial peer determines how to direct calls that originate from a local voice port into the VoIP cloud to the session target. The session target indicates the address of the remote gateway where the call is terminated. There are several different ways to define the destination gateway address:
show dial-peer voice
Use this command to verify the POTS and VoIP dial-peer configuration. The following example shows output for a VoIP dial peer using RAS on a Cisco AS5300: Example:
Router# show dial-peer voice 1234
VoiceOverIpPeer1234
tag = 1234, destination-pattern = 1234',
answer-address = ',
group = 1234, Admin state is up, Operation state is up,
incoming called-number = ', connections/maximum = 0/unlimited,
application associated:
type = voip, session-target = ras',
technology prefix: 8#
ip precedence = 0, UDP checksum = disabled,
session-protocol = cisco, req-qos = controlled-load,
acc-qos = best-effort,
fax-rate = voice, codec = g729r8,
Expect factor = 10, Icpif = 30,
VAD = enabled, Poor QOV Trap = disabled,
|
You can configure RAS message timeout values, message retry counter values, and registration request (RRQ) message time-to-live and early transmit time margins on Cisco gateways. This provides greater flexibility in configuring gateways in different network environments.
The ras timeout command configures the number of seconds for the gateway to wait before resending a RAS message to a gatekeeper. The ras retry command configures the number of times to resend the RAS message after the timeout period expires. The default values for timeouts and retries are acceptable in most networks. You can use these commands if you are experiencing problems in RAS message transmission between gateways and gatekeepers. For example, if you have gatekeepers that are slow to respond to a type of RAS request, increasing the timeout value and the number of retries increases the call success rate, preventing lost billing information and unnecessary switchover to an alternate gatekeeper.
The ras rrq ttl command configures the number of seconds that the gateway should be considered active by the gatekeeper. The gateway transmits this value in the RRQ message to the gatekeeper. The margin time keyword and argument allow the gateway to transmit an early RRQ to the gatekeeper before the time-to-live value advertised to the gatekeeper.
To configure RAS message timeout values and retry counters, use the following commands beginning in global configuration mode.
To configure the RRQ time-to-live value, use the following commands beginning in global configuration mode.
show running config
Use this command to verify RAS message retry counters, timeout values, and time-to-live values. Example:
Router# show running-config
Current configuration : 925 bytes
!
version 12.3
.
.
.
voice service voip
h323
ras rrq ttl 90 margin 30
ras timeout all 7
ras timeout grq 10
ras timeout drq 30
ras retry all 10
ras retry grq 5
.
.
.
|
The following example shows the GRQ message timeout value set to 10 seconds and all other RAS message timeout values set to 7 seconds:
Router(conf-serv-h323)# ras timeout grq 10 Router(conf-serv-h323)# ras timeout all 7
The following example shows the GRQ message counter set to 5 and all other RAS message counters set to 10:
Router(conf-serv-h323)# ras retry all 10 Router(conf-serv-h323)# ras retry grq 5
The following example shows the time-to-live value configured to 90 seconds and the margin time value configured to 30 seconds:
Router(conf-serv-h323)# ras rrq ttl 90 margin 30
To allow gatekeepers to make intelligent call-routing decisions, the gateway reports the status of its resource availability to its gatekeeper. Resources that are monitored are digital-signal-level 0 (DS0) channels and digital-signal-processor (DSP) channels.
The gateway reports its resource status to the gatekeeper using the RAS Resource Availability Indication (RAI). When a monitored resource falls below a configurable threshold, the gateway sends a RAI to the gatekeeper indicating that the gateway is almost out of resources. When the available resources then cross over another configurable threshold, the gateway sends an RAI indicating that the resource depletion condition no longer exists.
You can configure resource-reporting thresholds by using the resource threshold command. Upper and lower thresholds are separately configurable to prevent the gateway from operating sporadically because of the availability or lack of resources.
If phones are connected directly to the gateway, the Cisco H.323 Version 2 gateway allows fully qualified E.164 numbers to be registered with the gatekeeper. When configuring the gateway, use the register e164 command to register these E.164 numbers.
In-band progress tones and announcements are required for PSTN services and for ISDN speech and 3.1-kHz voice services, per Bellcore and ANSI specifications. To guarantee that in-band tones and announcements are generated when required and at the appropriate switch, Cisco H.323 signaling software ensures that the progress indicator (PI) is carried end to end in call-signaling messages between the called party and the calling party. The PI in outbound dial peers can also be configured at the H.323 VoIP gateway, if necessary.
The PI is an IE that signals when in-band tones and announcements are available. The PI controls whether the local switch generates the appropriate tone or announcement or whether the remote switch is responsible for the generation. For example, if the terminating switch generates the ringback tone, it sends a PI of 1 or 8 in the alerting message. If the originating switch receives an alerting message without a PI, it generates the ringback tone.
The specific PI that a switch sends in call messages, if any, depends on the model of the switch. To ensure that in-band communication is generated appropriately, it may be necessary in some instances to override the default behavior of the switch by manually configuring the PI at the Cisco H.323 gateway.
The PI is configurable in setup messages from the outbound VoIP dial peer, typically at the originating gateway, and in alert, progress, and connect messages from the outbound POTS dial peer, typically at the terminating gateway. The PI is configured by the progress_ind command. The table below shows the PI values that can be configured on the H.323 gateway.
Table 1 | Configurable Progress Indicator Values for H.323 Gateways |
PI |
Description |
Message Type |
---|---|---|
0 |
No progress indicator is included. |
Setup |
1 |
Call is not end-to-end ISDN; further call progress information may be available in-band. |
Alert, setup, progress, connect |
2 |
Destination address is non-ISDN. |
Alert, progress, connect |
3 |
Origination address is non-ISDN. |
Setup |
8 |
In-band information or appropriate pattern is now available. |
Alert, progress, connect |
When interworking is between ISDN and non-ISDN networks, the originating gateway reacts as follows:
Note |
If the terminating gateway sends an alert message with no PI value, the originating gateway generates the ringback tone. But if the terminating gateway sends an alert message that has a PI of 1, 2, or 8, the originating gateway does not generate ringback tone. |
Note |
Pure ISDN calls may use different protocols at the originating and terminating ends. For example, a call may originate on ETSI and terminate on NI2. If the two protocols are not compatible end to end, the gateway drops all IEs from messages, including the progress indicator. Because a progress indicator is required in all progress messages, the originating gateway inserts a PI of 1 in the progress message. To avoid dropping IEs, use the isdn gateway-max-internetworking command to prevent the gateway from checking protocol compatibility. |
For the gateway to provide authentication and accounting services, enable and configure your gateway to support authentication, authorization, and accounting (AAA) services. AAA enables the gateway to interact with a RADIUS security server to authenticate users (typically incoming calls) and to perform accounting services.
Note |
For information about AAA configuration on a gateway, see Configuring AAA for Cisco Voice Gateways at http://www.cisco.com/en/US/docs/ios/voice/aaa/configuration/guide/15_0/va_15_0_book.html |
This section contains the following information:
The Cisco H.235-based security and accounting features described in this section can be used by a gatekeeper, which is considered a known and trusted entity, to authenticate, authorize, and route H.323 calls.
The Cisco H.323 gateway supports the use of CryptoH323Tokens for authentication. The CryptoH323Token is defined in the ITU-T H.225 Version 2 standard and is used in a "password-with-hashing" security scheme as described in section 10.3.3 of the H.235 specification.
A cryptoToken can be included in any RAS message to authenticate the sender of the message. A separate database can be used for user ID and password verification.
Cisco H.323 gateways support three levels of authentication:
Note |
To secure the RAS messages and calls, it is essential that the gatekeeper provides authentication based on the secure key. The gatekeeper must support H.235 security using the same security scheme as the Cisco gateway. |
CryptoTokens for RRQs, unregistration requests (URQs), DRQs, and the terminating side of ARQs contain information about the gateway that generated the token. The cryptoTokens include the gateway identification (ID)--which is the H.323 ID configured on the gateway--and the gateway password. The cryptoTokens for the originating-side ARQ messages contain information about the user that is placing the call, including the user ID and PIN.
Although the scenarios in this document describe how to use the security and accounting features in a prepaid call environment, these features may also be used to authorize IP calls that originate in another domain (interservice provider or intercompany calls).
H.235-based security and accounting features can be used with AAA. The gateway can be configured to use the gatekeeper for call authentication or authorization, and AAA can be used for call accounting.
In addition, H.235-based security and accounting features include support for the following:
Note |
The H.235 security and accounting features described in this document are separate from, and should not be confused with, the standard interactive-voice-response (IVR) and AAA features used to authenticate inbound calls or with the settlement functions provided by the Open Settlement Protocol (OSP). |
The H.235 security and accounting features are designed to support a variety of situations in which some form of authentication or tracking is required. The security features control access through a userID-password database. The accounting enhancements allow call usage to be tracked at the origin and at the destination.
Fields in the RAS messages allow the gateway to report call-usage information to the gatekeeper. The call-usage information is included in the DRQ message that is sent when the call is terminated.
With prepaid calling services, an account number and PIN must be entered and the duration of the call must be tracked against the remaining credit of the customer. The Cisco H.323 gateway monitors prepaid account balances and terminates a call if the account is exceeded.
Note |
Because authentication information includes a time stamp, it is important that all Cisco H.323 gateways and gatekeepers (or other entities that perform authentication) be synchronized. Cisco H.323 gateways must be synchronized using the Network Time Protocol (NTP). The figure below illustrates the flow of a possible call for which H.323 security and accounting features are used. |
In this example, Telephone A is attempting to establish a phone call to Telephone B. The following numbered explanations correspond to the action taking place at each number in the figure above.
If an authentication failure occurs, the gatekeeper responds with a registration rejection (RRJ) message.
If the authentication information is in error, Gatekeeper B sends an admission rejection (ARJ) message to Gateway B with a reject reason of securityDenial.
Tool Command Language (TCL) IVR scripts are the default scripts for all Cisco voice features that use IVR.
The H.323 security and accounting enhancements described in this document require the use of one of the following IVR scripts:
Note |
For more information on TCL IVR applications, see the Cisco IOS TCL and VoiceXML Application Guide at http://www.cisco.com/en/US/docs/ios/voice/ivr/configuration/guide/tcl_c.html . |
The voip_auth_acct_pin_dest.tcl script does the following:
If the caller is using a debit card account number, the following occurs:
This feature also allows the caller to continue making additional calls if the called party hangs up.
Note |
The normal terminating character for the account number, PIN, and destination number is the pound (#) key. |
The voip_auth_acct_pin_dest_2.tcl script is a simplified version of the voip_auth_acct_pin_dest.tcl script. It prompts the caller for an account number followed by a PIN. The caller is then prompted for a destination number. This information is provided to the H.323 gatekeeper that authenticates and authorizes the call. This script provides prompts only in English.
If the caller is using a debit account number, it plays a "time running out" message when the caller has 10 seconds of credit time remaining. It also plays a "time has expired" message when the credit of the caller has been exhausted.
To use the H.235 security features for routing H.323 calls as illustrated above, do the following:
http://www.cisco.com/cgi-bin/tablebuild.pl/tclware
To enable security on the gateway, use the following commands beginning in global configuration mode.
This section contains the following information:
A gatekeeper manages H.323 endpoints in a consistent manner, allowing them to register with the gatekeeper and to locate another gatekeeper. The gatekeeper provides logic variables for proxies or gateways in a call path to provide connectivity with the Public Switched Telephone Network (PSTN), to improve quality of service (QoS), and to enforce security policies. Multiple gatekeepers may be configured to communicate with one another, either by integrating their addressing into the DNS or by using Cisco IOS configuration options.
An alternate gatekeeper provides redundancy for a gateway in a system in which gatekeepers are used. Redundant H.323 zone support in the gateway allows a user to configure two gatekeepers in the gateway (one as the primary and the other as the alternate). All gatekeepers are active. Each alternate gatekeeper, or gatekeeper node, shares its local zone information so that the cluster can effectively manage all local zones within the cluster. Each alternate gatekeeper has a unique local zone. Clusters provide a mechanism for distributing call processing seamlessly across a converged IP network infrastructure to support IP telephony, facilitate redundancy, and provide feature transparency and scalability.
An endpoint that detects the failure of its gatekeeper can safely recover from that failure by utilizing an alternate gatekeeper for future requests, including requests for existing calls. A gateway can only be registered to a single gatekeeper at a time. Only one gatekeeper is allowed to manage a single zone. The cluster manages up to five similarly configured zones and shares resources between the alternate gatekeepers in the cluster for each zone. You can define up to 100 zones in a single gatekeeper.
With gatekeeper clustering there is the potential that bandwidth may be overcommitted in a cluster. For example, suppose that there are five gatekeepers in a cluster and that they share 10 Mbps of bandwidth. Suppose that the endpoints registered to those alternates start placing calls quickly. It is possible that within a few seconds, each gatekeeper could be allocating 3 Mbps of bandwidth if the endpoints on each of the gatekeepers request that much bandwidth. The net result is that the bandwidth consumed in the cluster is 15 Mbps.
The alternate gatekeeper was purposely designed to restrict bandwidth because there is no clear way to sync bandwidth information quickly and efficiently. To work around this problem, "announcement" messages were restricted to intervals as small as 10 seconds. If the gatekeepers get into a situation in which endpoints request bandwidth rapidly, the problem is discovered and corrective action takes place within 10 seconds. Assuming that the gatekeepers are not synchronized on their timers, the announcement messages from the various gatekeepers are likely to be heard more quickly. Therefore, the problem is less severe. The potential exists, however, for overcommitment of the bandwidth between announcement messages if the call volume increases substantially in a short amount of time (as small as 10 seconds).
Note |
If you monitor your bandwidth, it is recommended that you consider lowering the maximum bandwidth so that if "spikes" such as those described above do occur, some bandwidth is still available. |
To configure alternate gatekeeper support on a gateway, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
interface Ethernet 0/1
Example: Router(config)# interface Ethernet 0/1 |
Enters interface configuration mode for the selected Ethernet interface. |
Step 2
|
h323-gateway voip interface
Example: Router(config-if)# h323-gateway voip interface |
Identifies this as a VoIP gateway interface. |
Step 3
|
h323-gateway voip id gatekeeper-id {ipaddr ip-address [port]| multicast} [priority priority]
Example: Router(config-if)# h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1719 |
Identifies the gatekeeper for this gateway interface and sets its attributes. For an explanation of the keywords and arguments, see How to Configure H.323 Gateways, step 6. |
Step 4
|
h323-gateway voip id gatekeeper-id { ipaddr ip-address [ port ] | multicast } [ priority priority ]
Example: Router(config-if)# h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1721 |
Identifies the alternate gatekeeper and sets its attributes. |
Step 5
|
h323-gateway voip h323-id interface-id
Example: Router(config-if)$ h323-gateway voip id gk4.gg-dn1 ipaddr 209.165.202.132 1719 |
Defines the H.323 name of the gateway, identifying this gateway to its associated gatekeeper. Usually this ID is the name of the gateway, with the gatekeeper domain name appended to the end: name@domainname. |
Step 6
|
exit
Example: Router(config-if)# exit |
Exits the current mode. |
show gateway
Use this command to verify that an alternate gatekeeper is configured. Example:
Router# show gateway
Permanent Alternate Gatekeeper List
priority 127 id bmx1 ipaddr 10.77.241.103 1719 register needed
priority 127 id bmx2 ipaddr 10.77.241.117 1719 register needed
Primary gatekeeper ID bmx1 ipaddr 10.77.241.103 1719
|
This section contains the following information:
Dual-tone multifrequency (DTMF) is the tone generated on a touchtone phone when the keypad digits are pressed. During a call, DTMF may be entered to access interactive voice response (IVR) systems, such as voice mail and automated banking services.
Although DTMF is usually transported accurately when using high-bit-rate voice codecs such as G.711, low-bit-rate codecs such as G.729 and G.723.1 are highly optimized for voice patterns and tend to distort DTMF tones. As a result, IVR systems may not correctly recognize the tones.
DTMF relay solves the problem of DTMF distortion by transporting DTMF tones "out of band," or separate from the encoded voice stream.
Cisco gateways currently support the following methods of DTMF relay:
The ability of a gateway to receive DTMF digits in a particular format and the ability to send digits in that format are independent functions. No configuration is necessary to receive DTMF digits from another H.323 endpoint using any of the methods described. The Cisco gateway is capable of receiving DTMF tones transported by any of these methods at all times.
Cisco H.323 gateways advertise capabilities using H.245 capabilities messages. By default, they advertise that they can receive all DTMF relay modes. If the capabilities of the remote gateway do not match, the Cisco H.323 gateway transmits DTMF tones as in-band voice.
Configuring DTMF relay on the Cisco H.323 gateway sets preferences for how the gateway handles DTMF transmission. You can enable more than one DTMF relay option for a particular dial peer. If more than one option is enabled and if the peer indicates that it is capable of receiving DTMF in more than one of these formats, the gateway sends DTMF using the method among the supported formats that it considers to be the most preferred. If the remote device supports multiple formats, the gateway chooses the format according to the following priority:
In addition, Cisco gateways provide support for asymmetrical payload types. Payload types can differ between local and remote endpoints. Therefore, the Cisco gateway can transmit one payload type value and receive a different payload type value.
The dtmf-relay h245-signal command relays a more accurate representation of a DTMF digit than does the dtmf-relay h245-alphanumeric command because tone duration information is included along with the digit value. This information is important for applications requiring that a key be pressed for a particular length of time. For example, one popular calling card feature allows the caller to terminate an existing call by pressing the # key for more than 2 seconds and then making a second call without having to hang up in between. This feature is beneficial because the access number and personal identification number (PIN) code do not need to be dialed again. Outside-line access charges, which are common at hotels, may also be avoided.
The dtmf-relay h245-alphanumeric command simply relays DTMF tones as ASCII characters. For instance, the DTMF digit 1 is transported as the ASCII character 1. There is no duration information associated with tones in this mode. When the Cisco H.323 gateway receives a DTMF tone using this method, the gateway generates the tone on the PSTN interface of the call using a fixed duration of 500 ms. All systems that are H.323 Version 2-compliant are required to support the dtmf-relay h245-alphanumeric command, but support of the dtmf-relay h245-signal command is optional.
Through H.245 tunneling, H.245 messages are encapsulated within H.225 messages without using a separate H.245 TCP connection. When tunneling is enabled, one or more H.245 messages can be encapsulated in any H.225 message. H.245 tunneling is not supported as a stand-alone feature; initiation of H.245 tunneling procedures can be initiated only by using the dtmf-relay command and only from an active fast connect call. Furthermore, if dtmf-relay is configured on a Version 2 VoIP dial peer and the active call has been established by using fast connect, tunneling procedures initiated by the opposite endpoint are accepted and supported.
H.245 tunneling is backward compatible with H.323 Version 1 configurations.
To configure DTMF relay on a gateway, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
dial-peer voice tag voip
Example: Router(config)# dial-peer voice tag voip |
Enters dial-peer configuration mode for the VoIP dial peer designated by tag. |
Step 2
|
dtmf-relay [ cisco-rtp ] [ h245-alphanumeric ] [ h245-signal ] [ rtp-nte ]
Example: Router(config-dial-peer)# dtmf-relay cisco-rtp h245-alphanumeric h245-signal rtp-nte |
Forwards DTMF tones. Keywords are as follows:
|
Step 3
|
rtp payload-type nte number
Example: Router(config-dial-peer)# rtp payload-type nte 100 |
Identifies the payload type of a Real-Time Transport Protocol (RTP) packet. Keyword and argument are as follows:
Do not use the following numbers, because they have preassigned values: 96, 97, 100, 121 to 123, and 125 to 127. Use of these values causes the command to fail. You must first reassign the value in use to a different unassigned number, for example: rtp payload-type nse 105 rtp payload-type nte 100 |
Step 4
|
codec {clear-channel | g711alaw | g711ulaw | g723ar53 | g723ar63 | g723r53 | g723r63 | g726r16 | g726r24 | g726r32 | g726r53 | g726r63 | g728 | g729abr8 | g729ar8 | g729br8 | g729r8 | gsmefr| gsmfr} [bytes payload_size]
Example: Router(config-dial-peer)# codec g711alaw |
Specifies the voice coder rate of speech for a dial peer. |
Step 5
|
destination-pattern string [T]
Example: Router(config-dial-peer)# destination-pattern 1513200.... |
Specifies the prefix, the full E.164 telephone number, or an ISDN directory number to be used for a dial peer (depending on the dial plan). For an explanation of the keywords and arguments, see Configuring Gateway RAS, Step 2. |
Step 6
|
Cisco 2600 Series and Cisco 3600 Series
Example: session target {ipv4: destination-address | dns:[$s$. | $d$. | $e$. | $u$.] hostname | loopback:rtp | loopback:compressed | loopback:uncompressed} Example: Cisco AS5300 Example: session target {ipv4: destination-address | dns:[$s$. | $d$. | $e$. | $u$.] hostname | loopback:rtp | loopback:compressed | loopback:uncompressed | mailto:{name | $d$.}@ domainname} Example: Router(config-dial-peer)# session target ipv4:192.168.0.0 |
Specifies a network-specific address for a specified dial peer or destination gatekeeper. |
Step 7
|
exit
Example: Router(config-dial-peer)# exit |
Exits the current mode. |
A hookflash indication is a brief on-hook condition that occurs during a call. It is not long enough in duration to be interpreted as a signal to disconnect the call. Create a hookflash indication by quickly depressing and then releasing the hook on your telephone.
PBXs and telephone switches are frequently programmed to intercept hookflash indications and use them as a way to allow a user to invoke supplemental services. For example, your local service provider may allow you to enter a hookflash as a means of switching between calls if you subscribe to a call waiting service.
In the traditional telephone network, a hookflash results in a voltage change on the telephone line. Because there is no equivalent of this voltage change in an IP network, the ITU H.245 standard defines a message representing a hookflash. To send a hookflash indication using this message, an H.323 endpoint sends an H.245 user input indication message containing a "signal" structure with a value of "!". This value represents a hookflash indication.
Cisco H.323 Version 2 software includes limited support for relaying hookflash indications using the H.245 protocol. H.245 user input indication messages containing hookflash indications that are received on the IP call leg are forwarded to the plain old telephone service (POTS) call leg if the POTS interface is Foreign Exchange Office (FXO). If the interface is not FXO, any H.245 hookflash indication that is received is ignored. This support allows IP telephony applications to send hookflash indications to a PBX through the Cisco gateway and thereby invoke the IOS supplementary services of the PBX if the PBX supports access to those features using hookflash.
The gateway does not originate H.245 hookflash indications in this release. For example, it does not forward hookflash indications from foreign-exchange-station (FXS) interfaces to the IP network over H.245.
The acceptable duration of a hookflash indication varies by equipment vendor and by country. Although one PBX may consider a 250-ms on-hook condition to be a hookflash, another PBX may consider this condition to be a disconnect. Therefore, the timing hookflash-out command allows the administrator to define the duration of a hookflash signal generated on an FXO interface.
The figure below illustrates an FXS hookflash being translated to an H.245 user input.
In Cisco H.323 Version 2 software, an FXS hookflash relay is generated only if the following two conditions are met:
This implies that the VoIP dial peer is configured for dtmf-relay h245-alphanumeric or dtmf-relay h245-signal, but not cisco-rtp.
Enter the timing hookflash-input command on FXS interfaces to specify the maximum length of a hookflash indication. If the hookflash lasts longer than the specified limit, then the FXS interface processes the indication as an onhook.
To configure hookflash relay on a gateway, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
Cisco 2600 and 3600 Series
Example: Router(config)# voice-port {slot / subunit / port} | {slot / port:ds0-group-no} Example: Cisco 7200 Series Example: Router(config)# voice-port {slot / port:ds0-group-no} | {slot-number / subunit-number / port} Example: Router(config)# voice-port 1/0/0 |
Enters voice-port configuration mode. Keywords and arguments vary by platform. |
Step 2
|
timing hookflash-input duration
Example: Router(config-voice-port)# timing hookflash-input 200 |
Specifies the maximum duration of a hookflash indication, in ms. If the hookflash lasts longer than the specified limit, the Foreign Exchange Station (FXS) interface processes the indication as an on-hook. Range: 50 to 1550. Default: 600. |
Step 3
|
timing hookflash-out duration
Example: Router(config-voice-port)# timing hookflash-out 200 |
Specifies the duration, in ms, of the hookflash indications that the gateway generates on a Foreign Exchange Office (FXO) interface. Range: 50 to 1550. Default: 400. |
Step 4
|
exit
Example: Router(config-voice-port)# exit |
Exits the current mode. |
Normally only one codec is specified when a dial peer is configured on a gateway. However, you can configure a prioritized list of codecs to increase the probability of establishing a connection between endpoints during the H.245 exchange phase.
Codec-order preservation enables a gateway to pass codec preferences to the terminating leg of a VoIP call. This feature was developed primarily for Cisco multiservice IP-to-IP gateways (IPIPGWs), which are configured to use a transparent codec. The transparent codec enables an IPIPGW to pass codecs from the originating endpoint to the terminating endpoint; however, previous versions of the IPIPGW did not preserve the preferential order of the codecs.
With codec-order preservation, the IPIPGW passes codecs transparently from the originating device, listed in order of preference, to the terminating device. It also enables gateways to pass user-configured codecs in their preferred order when the endpoints exchange capabilities, enabling endpoints to use the codec that best suits both devices.
Codec-order preservation is enabled by default in Cisco gateways running Cisco IOS Release 12.3(1) and later releases. No further configuration is needed.
To configure multiple codecs for a dial peer, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice class codec tag
Example: Router(config)# voice class codec 123 |
Enters voice-class configuration mode and assigns an identification tag number for a codec voice class. The tag argument is the unique number assigned to the voice class. Range: 1 to 10000. Each tag must be unique on the router. |
Step 2
|
codec preference value codec-type [bytes payload-size]
Example: Router(config-class)# codec preference 1 g711alaw |
Adds codecs to the prioritized list of codecs. Keyword and arguments are as follows:
|
Step 3
|
exit
Example: Router(config-class)# exit |
Exits the current mode. |
Step 4
|
dial-peer voice tag voip
Example: Router(config)# dial-peer voice 456 voip |
Enters dial-peer configuration mode for the VoIP dial peer designated by tag. |
Step 5
|
voice-class codec tag
Example: Router(config-dial-peer)# voice-class codec 123 |
Assigns a previously configured codec selection preference list (codec voice class) to the VoIP dial peer designated by tag. Range: 1 to 10000. Maps to the tag number created using the voice class codec command. |
Step 6
|
exit
Example: Router(config-dial-peer)# exit |
Exits the current mode. |
Rotary calling pattern routes an incoming call that arrives over a telephony interface back out through another telephony interface under certain circumstances. Rotary calling pattern primarily provides reliable service during network failures.
Call establishment using rotary calling pattern is supported by rotary group support of dial peers, where multiple dial peers may match a given destination phone number and be selected in sequence. In addition, if the destinations need to be tried in a certain order, preference may be assigned. Use the preference command when configuring the dial peers to reflect the preferred order (0 being the highest preference and 10 the lowest).
If several dial peers match a particular destination pattern, the system attempts to place a call to the dial peer configured with the highest preference. If the call cannot be completed because of a system outage (for example, the gatekeeper or gateway cannot be contacted), the rotary call pattern performs the following tasks:
If there are equal priority dial peers, the order is determined randomly.
Note |
You can configure hunting-algorithm precedence. See the preference command in the "Dial Peer Features and Configuration" chapter in Dial Peer Configuration on Voice Gateway Routers at http://www.cisco.com/en/US/docs/ios/12_3/vvf_c/dial_peer/dpeer_c.html . |
H.323 support for virtual interfaces allows the IP address of the gateway to be configured so that the IP address included in the H.323 packet is always the source IP address of the gateway, regardless of the physical interface and protocol used. This single-address feature allows firewall applications to be easily configured to work with H.323 messages.
To configure a source IP address for a gateway, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
interface type slot/port
Example: Router(config)# interface serial 0/0 |
Enters interface configuration mode for the specified interface. Keywords and arguments vary by platform. |
Step 2
|
h323-gateway voip bind srcaddr ip-address
Example: Router(config-if)# h323-gateway voip bind srcaddr 192.168.0.0 |
Sets the source IP address to be used for this gateway. The argument is as follows:
|
Step 3
|
exit
Example: Router(config-if)# exit |
Exits the current mode. |
show running-config
Use this command to verify the source IP address of the gateway. The output shows the source IP address that is bound to the interface. Example:
router# show running-config
interface Loopback0
ip address 10.0.0.0 255.255.255.0
no ip directed-broadcast
h323-gateway voip bind srcaddr 10.0.0.0
!
interface Ethernet0/0
ip address 172.18.194.50 255.255.255.0
no ip directed-broadcast
h323-gateway voip interface
h323-gateway voip id j70f_2600_gk2 ipaddr 172.18.194.53 1719
h323-gateway voip h323-id j70f_3640_gw1
h323-gateway voip tech-prefix 3#
.
.
.
In the following example, Ethernet interface 0/0 is used as the gateway interface. For convenience, the h323-gateway voip bind srcaddr command has been specified on the same interface. The designated source IP address is the same as the IP address assigned to the interface. Example: interface Ethernet0/0 ip address 172.18.194.50 255.255.255.0 no ip directed-broadcast h323-gateway voip interface h323-gateway voip id j70f_2600_gk2 ipaddr 172.18.194.53 1719 h323-gateway voip h323-id j70f_3640_gw1 h323-gateway voip tech-prefix 3# h323-gateway voip bind srcaddr 172.18.194.50 |
This section contains the following information:
Annex G of the H.323 standard provides address resolution using border elements (BE). The BE (as described in Annex G) is colocated with the Cisco H.323 gatekeeper and provides additional address resolution capabilities. The BE can cache address information from neighboring BEs. When the gatekeeper receives a call that it cannot resolve, it can contact its local BE. If the address is in the BE's cache, the BE on the gatekeeper sends an AccessRequest to the BE in the terminating domain. If the address is not in the BE's cache, then the BE attempts to resolve the address by sending an AccessRequest to each of its neighboring BEs.
Note |
The Annex G BEs support Hot Standby Routing Protocol (HSRP) for high reliability and availability. You can identically configure multiple gatekeepers and BEs and use HSRP to designate a primary BE and other standby BEs. If the primary BE is down, a standby BE operates in its place. You configure the local address with an HSRP address in BE configuration. |
The figure below illustrates a call flow for a scenario in which a call has originated in the zone administered by Border Element D, but the address cannot be resolved locally.
The table below describes how address resolution works in the illustration.
Table 2 | Address Resolution Using Border Elements |
Elements |
Action |
---|---|
Gateway A to Gatekeeper D/Border Element D |
GW A sends an ARQ to GK D/BE D. |
Gatekeeper D/Border Element D to Border Element B |
GK D/BE D is a noncaching BE and cannot resolve the address internally. Therefore, BE D sends an AccessRequest to BE B. |
Border Element B to Border Element F/Gatekeeper F |
BE B searches its cache to for the closest match and locates a descriptor that indicates that the access request should be sent to BE F/GK F. |
Border element F/gatekeeper F to Border Element D |
BE F/GK F returns an access confirmation to BE D. The access confirmation contains a template with a single address indicating where the SETUP message should be sent. |
Gatekeeper D/Border Element D to Gateway A |
GK D/BE D sends an ACF to GW A. |
Gateway A to Gateway F |
GW A sends a SETUP message to GW F. |
To configure and provision an Annex G border element, use the following commands beginning in global configuration mode.
Note |
Cisco supports one BE per gatekeeper. |
Command or Action | Purpose | |
---|---|---|
Step 1
|
call-router h323-annexg border-element-id
Example: Router(config)# call-router h323-annexg be20 |
Enters Annex G configuration mode for the border element. |
Step 2
|
local ip ip-address [port local-port]
Example: Router(config-annexg)# local ip 192.168.0.0 |
Defines the local domain, including the IP address and port that this BE should use for interacting with remote BEs. Specify a port only if you want to use a nonstandard port number; otherwise, use the default standard well-known port 2099. |
Step 3
|
neighbor ip-address
Example: Router(config-annexg)# neighbor 192.168.0.0 |
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. |
Step 4
|
port neighbor-port
Example: Router(config-annexg-neigh)# port 2000 |
(Optional) Specifies the neighbor's port number that is used for exchanging Annex G messages. Default: 2099. Do not use this command if you want to use the default value; use it only if you want a value other than 2099. |
Step 5
|
id neighbor-id
Example: Router(config-annexg-neigh)# id be20 |
(Optional) Sets the local ID of the neighboring BE. The ID is used locally to identify the neighbor and has no global significance in the Annex G network. |
Step 6
|
cache
Example: Router(config-annexg-neigh)# cache |
(Optional) Configures the local BE to cache the descriptors received from its neighbors. If caching is enabled, the neighbors are queried at the specified interval for their descriptors. |
Step 7
|
query-interval query-interval
Example: Router(config-annexg-neigh)# query-interval 20 |
(Optional) Sets the interval at which the local BE queries the neighboring BE, in minutes. Default: 30. Do not use this command if you want to use the default query interval; use it only if you want a query interval other than 30 minutes. |
Step 8
|
exit
Example: Router(config-annexg-neigh)# exit |
Exits the current mode. |
Step 9
|
Repeat Steps 3 to 8 for each neighbor BE that you configure.
|
-- |
Step 10
|
advertise [static | dynamic | all]
Example: Router(config-annexg)# advertise dynamic |
Specifies the type of descriptors that the BE advertises to its neighbors. Keywords are as follows:
|
Step 11
|
ttl value
Example: Router(config-annexg)# ttl 2600 |
Sets the time-to-live value for advertisements, in seconds. Default: 3180 (53 minutes). |
Step 12
|
hopcount value
Example: Router(config-annexg)# hopcount 5 |
Specify the maximum number of BE hops through which an address resolution request can be forwarded. Default: 7. |
Step 13
|
no shutdown
Example: Router(config-annexg)# no shutdown |
Starts the BE. By default, when a BE is first configured, it is shut down, so you must use this command after you configure each BE. |
Step 14
|
timer accessrequest sequential delay value
Example: Router(config-annexg)# timer accessrequest sequential delay 3 |
Specifies the intermessage delay (in increments of 100 ms). Range: 0 to 10. Default: 1 (100 ms). Setting this to 0 causes AccessRequest messages to be blasted to applicable neighboring BEs. |
Step 15
|
exit
Example: Router(config-annexg)# exit |
Exits the current mode. |
Step 16
|
gatekeeper
Example: Router(config)# gatekeeper |
Enters H.323-gatekeeper configuration mode. |
Step 17
|
h323-annexg border-element-id cost cost priority priority
Example: Router(config-gk)# h323-annexg be20 cost 35 priority 20 |
Enters BE configuration mode and enables the BE on the GK. Keywords and arguments are as follows:
|
Step 18
|
prefix prefix* * [seq | blast]
Example: Router(config-gk-annexg)# 419* |
(Optional) Specifies the prefixes for which a BE should be queried for address resolution. Default: the GK forwards all remote zone queries to the BE. Do not use this command unless you want to restrict queries sent to the BE to a specific prefix or set of prefixes. |
Step 19
|
exit
Example: Router(config-gk-annexg)# exit |
Exits the current mode. |
Step 20
|
exit
Example: Router(config-gk)# exit |
Exits the current mode. |
To remove an Annex G border element ID, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1
|
call-router h323-annexg border-element-id
Example: Router(config)# call-router h323-annexg be20 |
Enters Annex G configuration mode for the border element. |
||
Step 2
|
neighbor ip-address
Example: Router(config-annexg)# neighbor 192.168.0.0 |
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. |
||
Step 3
|
no id neighbor-id
Example: Router(config-annexg-neigh)# no id be20 |
Removes a neighbor ID from the list of configured neighbor BEs.
|
||
Step 4
|
exit
Example: Router(config-annexg-neigh)# exit |
Exits the current mode. |
||
Step 5
|
Repeat Steps 3 to 8 for each neighbor BE that you configure.
|
-- |
||
Step 6
|
shutdown
Example: Router(config-annexg)# no shutdown |
Starts the BE. By default, when a BE is first configured, it is shut down, so you must use this command after you configure each BE. |
||
Step 7
|
exit
Example: Router(config-annexg-neigh)# exit |
Exits the current mode. |
Cisco H.225 Annex G implementation supports the minimal set of Annex G features that are needed to allow Cisco border elements (BE) to interoperate with other BEs per the iNow profile for IP telephony interoperability. The implementation also allows Cisco BEs to interoperate with ClearingHouse and other third-party elements. The figure below depicts a basic network configuration of BEs, gatekeepers, and Clearing Houses. This feature addresses the link between the gatekeeper/border element (GK/BE) in a Cisco domain and the ClearingHouse border element that complies with the Annex G specification and the iNow profile.
Prerequisites
Command or Action | Purpose | |
---|---|---|
Step 1
|
call-router h323-annexg border-element-id
Example: Router(config)# call-router h323-annexg be20 |
Enters Annex-G configuration mode for the specified border element. |
Step 2
|
access-policy neighbors-only
Example: Router(config-annexg)# access-policy neighbors-only |
As a prerequisite for configuring service relationships, sets the access-policy to accept requests only from known neighbors. Default: no access-policy allows request from any border element. |
Step 3
|
domain-name id
Example: Router(config-annexg)# domain-name id |
Sets the domain name reported in service relationships. |
Step 4
|
neighbor ip-address
Example: Router(config-annexg-neigh)# neighbor 192.168.0.0 |
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. |
Step 5
|
service-relationship
Example: Router(config-annexg-neigh)# service-relationship |
Enters service-relationship mode. |
Step 6
|
outbound retry-interval interval_number
Example: Router(config-nxg-neigh-svc)# outbound retry-interval 15 |
(Optional) Defines the retry period for attempting to establish the outbound relationship between border elements, in seconds. Default: 30. |
Step 7
|
inbound ttl ttl-value
Example: Router(config-nxg-neigh-svc)# inbound 100 |
(Optional) Sets the duration of the inbound service relationship and interval in which the remote peer must reestablish the service relationship, in seconds. Default: 120. |
Step 8
|
no shutdown
Example: Router(config-nxg-neigh-svc)# no shutdown |
Enables the service relationship. |
Step 9
|
exit
Example: Router(config-nxg-neigh-svc)# exit |
Exits the current mode. |
Step 10
|
exit
Example: Router(config-annexg-neigh)# exit |
Exits the current mode. |
Step 11
|
exit
Example: Router(config-annexg)# exit |
Exits the current mode. |
To enter usage indication submode and configure usage-indicators after service relationships are established, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
call-router h323-annexg border-element-id
Example: Router(config)# call-router h323-annexg be20 |
Enters Annex-G configuration mode for the specified border element. |
Step 2
|
neighbor ip-address
Example: Router(config-annexg)# neighbor 192.168.0.0 |
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. |
Step 3
|
usage-indication
Example: Router(config-annexg-neigh)# usage-indication |
Enters config-nxg-neigh-usg mode. |
Step 4
|
retry interval seconds
Example: Router(config-nxg-neigh-usg)# retry interval 600 |
(Optional) Defines the time, in seconds, between delivery attempts. Default: 900. |
Step 5
|
retry window minutes
Example: Router(config-nxg-neigh-usg)# retry window 1200 |
(Optional) Defines the total time, in minutes, that a border element attempts delivery. Default: 1440 (24 hours). |
Step 6
|
exit
Example: Router(config-nxg-neigh-usg)# exit |
Exits the current mode. |
Step 7
|
exit
Example: Router(config-annexg-neigh)# exit |
Exits the current mode. |
Step 8
|
Router(config-annexg)# exit
Example: Router(config-annexg)# exit |
Exits the current mode. |
show call-router status
Use this command to display Annex G border-element status. Example:
Router# show call-router status neighbors
ANNEX-G CALL ROUTER STATUS:
===========================
Border Element ID Tag : Celine
Domain Name : Celine-Domain
Border Element State : UP
Border Element Local IP : 172.18.193.31:2099
Advertise Policy : STATIC descriptors
Hopcount Value : 7
Descriptor TTL : 3180
Access Policy : Neighbors only
Current Active Calls : 0
Current Calls in Cache : 0
Cumulative Active Calls : 0
Usage Ind Messages Sent : 0
Usage Ind Cfm Rcvd : 0
IRRs Received : 0
DRQs Received : 0
Usage Ind Send Retrys : 0
NEIGHBOR INFORMATION:
=====================
Local Neighbor ID : (none)
Remote Element ID : (unknown)
Remote Domain ID : (unknown)
IP Addr : 1.2.3.4:2099
Status : DOWN
Caching : OFF
Query Interval : 30 MIN (querying disabled)
Usage Indications :
Current Active Calls : 0
Retry Period : 600 SEC
Retry Window : 3600 MIN
Service Relationship Status: ACTIVE
Inbound Service Relationship : DOWN
Service ID : (none)
TTL : 1200 SEC
Outbound Service Relationship : DOWN
Service ID : (none)
TTL : (none)
Retry interval : 120 SEC (0 until next attempt)
|
This section contains the following information:
To associate the H.323 voice class with a dial peer, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
dial-peer voice tag voip
Example: Router(config)# dial-peer voice 123 voip |
Enters dial-peer configuration mode for the remote VoIP dial peer designated by tag. |
Step 2
|
voice-class h323 number
Example: Router(config-dial-peer)# voice-class h323 456 |
Associates the specified H.323 voice class (and all of its related attributes) with the dial peer. |
Step 3
|
exit
Example: Router(config-dial-peer)# exit |
Exits the current mode. |
To configure the timeout value for the response of the outgoing SETUP message, use the following commands in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice class h323 number
Example: Router(config)# voice class h323 123 |
Enters voice-class mode to create or modify the specified H.323 voice class. |
Step 2
|
h225 timeout setup value
Example: Router(config-class)# h225 timeout setup 10 |
Sets the timeout value, in seconds, for the response of the outgoing SETUP message. If the timer expires, the GK tries an alternate endpoint (if configured and specified in the ACF); otherwise, it terminates the call. Range: 0 to 30. Default: 15. |
Step 3
|
exit
Example: Router(config-class)# exit |
Exits the current mode. |
To limit the number of concurrent calls on an H.225 TCP connection, use the following commands in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Enters H.323-voice-service configuration mode. |
Step 3
|
session transport tcp [calls-per-connection value]
Example: Router(conf-serv-h323)# session transport tcp |
Sets the number of concurrent calls for a single TCP connection. Range: 1 to 9999. Default:5. |
Step 4
|
exit
Example: Router(conf-serv-h323)# exit |
Exits the current mode. |
To change the H.225 idle timer for concurrent calls, use the following commands in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Enter s H.323-voice-service configuration mode. |
Step 3
|
h225 timeout tcp call-idle {value value | never}
Example: Router(conf-serv-h323)# h225 timeout tcp call-idle never |
Sets a timer to maintain a connection when no calls are active. |
Step 4
|
exit
Example: Router(conf-serv-h323)# exit |
Exits the current mode. |
The terminating gateway is responsible for collecting all the called number digits. Overlap signaling is implemented by matching destination patterns on the dial peers. When H.225 signal overlap is configured on the originating gateway, it sends the SETUP to the terminating gateway once a dial-peer match is found. The originating gateway sends all further digits received from the user to the terminating gateway using INFO messages until it receives a sending complete message from the user. The terminating gateway receives the digits in SETUP and subsequent INFO messages and does a dial-peer match. If a match is found, it sends a SETUP with the collected digits to the PSTN. All subsequent digits are sent to the PSTN using INFO messages to complete the call.
To configure overlap signaling on H.323 terminating gateways, perform the following steps.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters VoIP voice-service configuration mode. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Enters H.323 voice-service configuration mode. |
Step 3
|
h225 signal overlap
Example: Router(conf-serv-h323)# h225 signal overlap |
Activates overlap signaling to the destination gateway. |
Step 4
|
h225 timeout t302 seconds
Example: Router(conf-serv-h323)# h225 timeout t302 15 |
Sets the t302 timer timeout value. The argument is as follows:
|
Step 5
|
exit
Example: Router(conf-serv-h323)# exit |
Exits the current mode. |
This section describes how to configure the alternate endpoint hunt for failed calls in an IP-to-IP Gateway (IPIPGW) based on Q.850 disconnect cause codes.
The default behavior of the gateway is to retry all alternate endpoints received from the gatekeeper regardless of the ReasonComplete reason. Perform this task if you want to stop the alternate endpoint hunt retry attempts when the ReasonComplete is User-busy or Invalid-number.
Command or Action | Purpose | |||||
---|---|---|---|---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
||||
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
||||
Step 3
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice service configuration mode and specifies a voice encapsulation type. |
||||
Step 4
|
h323
Example: Router(conf-voice-service)# h323 |
Enters H.323 configuration mode. |
||||
Step 5
|
no h225 alt-ep hunt user-busy
Example: Router(conf-serv-h323)# no h225 alt-ep hunt user-busy |
Disables alternate endpoint hunts.
|
To configure the VoIP transport method, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Enters H.323-voice-service configuration mode. |
Step 3
|
session transport {udp | tcp}
Example: Router(conf-serv-h323)# session transport tcp |
Sets the underlying transport layer protocol for H.323 messages to be used across all VoIP dial peers. If you specify udp, Annex E is used. For concurrent calls, you must specify tcp. |
Step 4
|
exit
Example: Router(conf-serv-h323)# exit |
Exits the current mode. |
In the current version of the Cisco H.323 gateway (which conforms with H.323 version 3), the reported bandwidth is bidirectional. Initially, 128 kb is reserved. If the endpoints in the call select a more efficient codec, the gatekeeper is notified of the bandwidth change.
If you prefer to use the behavior of previous Cisco H.323 gateway versions for zone bandwidth management, configure the gateway accordingly.
To configure the Cisco H.323 gateway to use its previous behavior, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
gateway
Example: Router(config)# gateway |
Enters gateway configuration mode. |
Step 2
|
emulate cisco h323 bandwidth
Example: Router(config-gateway)# emulate cisco h323 bandwidth |
Sets the gateway to use its previous behavior for bandwidth management. |
Step 3
|
exit
Example: Router(config-gateway)# exit |
Exits the current mode. |
This section contains the following information:
The GTD for GKTMP Using SS7 Interconnect for Voice Gateways feature provides additional functionality to Cisco gateways and gatekeepers in a Cisco SS7 Interconnect for Voice Gateways Solution. The generic transparency descriptor or generic telephony descriptor (GTD) format is defined in the a Cisco-proprietary draft. GTD format defines parameters and messages of existing SS7 ISUP protocols in text format and allows SS7 messages to be carried as a payload in the H.225 RAS messages between gateway and gatekeeper. With the GTD feature, the gatekeeper extracts the GTD message and the external route server derives routing and accounting information based upon the GTD information provided from the Cisco Gatekeeper Transaction Message Protocol (GKTMP).
Currently routing on Cisco gateways is based on generic parameters such as originating number, destination number, and port source. Adding support for SS7 ISUP messages allows the VoIP network to use additional routing enhancements found in traditional TDM switches.
The figure below shows an example of a Cisco SS7 Interconnect for Voice Gateways solution using the GTD feature.
In the originating network, the following events occur:
In the terminating network, the following events occur:
Note |
For more information on software and components of the Cisco SS7 Interconnect for Voice Gateways Solution, see the release notes and other documentation at http://www.cisco.com/univercd/cc/td/doc/product/access/sc/rel7/soln/das/index.htm |
To configure the GTD feature system-wide for a VoIP network, enter the commands shown below. If you want to configure the feature on individual dial peers rather than system-wide, use the commands in the "Configuring GTD for a Dial Peer" module.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode. |
Step 2
|
signaling forward {unconditional | none
Example: Router(conf-voi-serv)# signaling forward unconditional |
Chooses whether or not the gateway forwards signaling payload to another gateway. Keywords are as follows:
|
Step 3
|
exit
Example: Router(conf-voi-serv)# exit |
Exits the current mode. |
Command or Action | Purpose | |
---|---|---|
Step 1
|
dial-peer voice tag voip
Example: Router(config)# dial-peer voice 4 voip |
Enters dial-peer configuration mode for the VoIP dial peer designated by tag. |
Step 2
|
signaling forward conditional | unconditional | none
Example: Router(config-dial-peer)# signaling forward conditional |
Chooses whether or not the gateway forwards signaling payload to another gateway. Keywords are as follows:
|
Step 3
|
exit
Example: Router(config-dial-peer)# exit |
Exits the current mode. |
show running-config
Use this command to verify that the GTD feature is configured. The following shows sample output for system-wide employment. Example:
Router# show running-config
Building configuration...
Current configuration : 4192 bytes
!
version 12.2
service config
no service single-slot-reload-enable
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service internal
service udp-small-servers
!
hostname as5300-2
!
voice service voip
signaling forward unconditional
h323
.
.
.
The following shows sample output for employment on select dial peers. Example:
Router# show running-config
Building configuration...
Current configuration : 4192 bytes
!
version 12.2
service config
no service single-slot-reload-enable
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service internal
service udp-small-servers
!
hostname as5300-2
!
.
.
.
!
dial-peer voice 1 pots
application session
incoming called-number 25164
port 0:D
!
dial-peer voice 1513 voip
destination-pattern 1513.......
session target ipv4:1.8.156.3
!
dial-peer voice 1408525 voip
destination-pattern 1408525....
!
dial-peer voice 1800877 voip
destination-pattern 1800877....
session target ipv4:1.8.156.3
!
dial-peer voice 2 pots
destination-pattern 51550
no digit-strip
direct-inward-dial
port 3:D
!
dial-peer voice 51557 voip
destination-pattern 51557
signaling forward unconditional
session target ras
!
dial-peer voice 52557 voip
destination-pattern 52557
signaling forward unconditional
session target ipv4:1.8.156.3
!
.
.
.
|
The H.323v4 Gateway Zone Prefix Registration Enhancements feature provides support for two capabilities included in H.323 Version 4: additive registration and dynamic zone prefix registration. Additive registration allows a gateway to add to or modify a list of aliases contained in a previous registration without first unregistering from the gatekeeper. Dynamic zone prefix registration allows a gateway to register actual public switched telephone network (PSTN) destinations served by the gateway with its gatekeeper.
To configure the H.323v4 Gateway Zone Prefix Registration Enhancements feature, you must understand the following concepts:
Prior to H.323 version 4, there was no way for a large device, such as a gateway, to register hundreds or thousands of E.164 alias addresses with a gatekeeper. The limiting factor was the size of a User Datagram Protocol (UDP) packet, which does not allow an unlimited number of aliases in a single heavyweight registration request(RRQ) RAS message.
To allow an endpoint to register an unlimited number of aliases with the gatekeeper, H.323v4 introduces the concept of additive registration . When the gateway registers with a gatekeeper, it provides an initial list of aliases. Additive registration allows the gateway to send subsequent RRQ messages with more lists of aliases until the gatekeeper has the complete list of the gateway's aliases.
When the gatekeeper wants to acknowledge only a subset of the aliases proposed in an additive RRQ, the gatekeeper returns a registration confirm (RCF) RAS message specifying the accepted aliases. The gateway assumes that the aliases not listed in the RCF were rejected.
H.323v4 allows a gateway to register actual zone prefixes that it can terminate to the PSTN with a gatekeeper. A gateway can register multiple zone prefixes with the gatekeeper via the RRQ message and subsequently remove one or more zone prefixes using an unregistration request (URQ) RAS message indicating the specific prefixes to be removed. When the gatekeeper receives the URQ, it leaves the gateway registered and removes the specified zone prefixes.
When the H.323v4 Gateway Zone Prefix Registration Enhancements feature is enabled on a trunking gateway, all addresses specified by the destination patterns in the plain old telephone service (POTS) dial peers that are operational are advertised to the gatekeeper.
The gatekeeper treats these addresses similarly to configured zone prefixes. The dynamically registered zone prefixes are used in routing decisions just as if they had been entered using the zone prefix command. Dynamically registered zone prefixes have a default gateway priority of 5.
The table below shows destination patterns on gateway GW1 and how the gatekeeper GK1 views the dynamically registered prefixes.
Table 3 | Gateway Prefixes Dynamically Registered on the Gatekeeper |
GW1 Configuration |
GK1 Corresponding Pseudo Configuration |
---|---|
dial-peer voice 919 pots destination-pattern 919....... port 0:D |
gatekeeper zone local GK1 cisco.com 172.18.197.132 zone prefix GK1 919....... gw-priority 5 GW1 |
dial-peer voice 5551001pots destination-pattern 5551001 port 0:D |
gatekeeper zone local GK1 cisco.com 172.18.197.132 zone prefix GK1 5551001* gw-priority 5 GW1 |
dial-peer voice 408 pots destination-pattern 408T port 0:D |
gatekeeper zone local GK1 cisco.com 172.18.197.132 zone prefix GK1 408* gw-priority 5 GW1 |
This section contains the following tasks:
This task shows you how to enable the gateway to send an advertisement of dynamic prefixes in additive RRQ RAS messages automatically to the gatekeeper.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
||
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
||
Step 3
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice service configuration mode. |
||
Step 4
|
h323
Example: Router(config-voice-service)# h323 |
Enters the H.323 voice service configuration mode. |
||
Step 5
|
ras rrq dynamic prefixes
Example: Router(conf-serv-h323)# ras rrq dynamic prefixes |
Enables the gateway to send an advertisement of dynamic prefixes in additive RRQ RAS messages.
|
||
Step 6
|
exit
Example: Router(conf-serv-h323)# exit |
Exits voice service voip h323 configuration mode and enters global configuration mode. |
||
Step 7
|
gatekeeper
Example: Router(config)# gatekeeper |
Enters gatekeeper configuration mode. |
||
Step 8
|
rrq dynamic-prefixes-accept
Example: Router(config-gk)# rrq dynamic-prefixes-accept |
Enables the gatekeeper to receive the RRQ RAS messages from the gateway.
|
||
Step 9
|
exit
Example: Router(config-gk)# exit |
Exits gatekeeper configuration mode. |
This task shows you how to configure the priority to the dynamic prefixes on the gateway. Allowing you to configure a different priority to each of the dynamic prefix. When configured, the gateway sends the priority along with the prefixes in additive RRQ and the gatekeeper assigns the received priority to the gateway for a given dynamic prefix.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
||
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
||
Step 3
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode. |
||
Step 4
|
h323
Example: Router(config-voice-service)# h323 |
Enters H.323 voice-service configuration mode. |
||
Step 5
|
terminal-alias-pattern 22... priority 8
Example: Router(conf-serv-h323)# terminal-alias-pattern 23 priority 8 |
Assigns priority to a dynamic prefix. The prefixes mentioned in this command should exactly match the prefixes configured in the destination-pattern command of POTS dial-peer.
|
||
Step 6
|
terminal-alias-pattern 23* priority 7
Example: Router(conf-serv-h323)# terminal-alias-pattern 23* priority 7 |
Assigns priority to a dynamic prefix. The prefixes mentioned in this command should exactly match the prefixes configured in the destination-pattern command of POTS dial-peer.
|
||
Step 7
|
Repeat Step 5 for each priority you configure.
|
-- |
||
Step 8
|
ras rrq dynamic prefixes
Example: Router(conf-serv-h323)# ras rrq dynamic prefixes |
Enables the gateway to send an advertisement of dynamic prefixes in additive RRQ RAS messages.
|
||
Step 9
|
exit
Example: Router(conf-serv-h323)# exit |
Exits gatekeeper configuration mode. |
Command or Action | Purpose | |
---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
Step 2
|
show gateway
Example: Router# show gateway |
Displays the current status of the gateway. |
Step 3
|
show h323 gateway prefixes
Example: Router# show h323 gateway prefixes |
Displays the status of the gateway destination pattern database and the status of the individual destination patterns along with it's configured priority.
|
Command or Action | Purpose | |
---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
Step 2
|
show gatekeeper zone prefix [all]
Example: Router# show gatekeeper zone prefix all |
Displays the gatekeeper zone prefix table.
|
Step 3
|
show gatekeeper gw-type-prefix
Example: Router# show gatekeeper gw-type-prefix |
Displays the gateway technology prefix table. |
Step 4
|
show gatekeeper endpoints
Example: Router# show gatekeeper endpoints |
Displays the status of all registered endpoints for a gatekeeper. |
Use the debug h225 asn1 command to observe the dynamic registration process. The debug h225 asn1 command is intended only for troubleshooting purposes because the volume of output generated by the software can result in severe performance degradation on the router.
Attach a console directly to a router running Cisco IOS Release 12.2(15)T or a later release.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
||
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
||
Step 3
|
logging buffered [buffer-size | level]
Example: Router(config)# logging buffered 65536 |
Limits messages logged to an internal buffer based on severity. |
||
Step 4
|
no logging console
Example: Router(config)# no logging console |
Disables all logging to the console terminal.
|
||
Step 5
|
end
Example: Router(config)# end |
Exits to privileged EXEC mode. |
||
Step 6
|
debug h225 asn1
Example: Router# debug h225 asn1 |
Displays ASN1 contents of RAS and Q.931 messages.
|
||
Step 7
|
show logging [history | slot slot-number | summary | count]
Example: Router# show logging |
Displays the state of logging (syslog). |
||
Step 8
|
no debug h225 asn1
Example: Router# no debug h225 asn1 |
Disables display of ASN1 contents of RAS and Q.931 messages. |
Cisco H.323 gateways provide the ability to support resource-based call admission control (CAC) processes. These resources include system resources such as CPU, memory, and call volume, and interface resources such as call volume.
If system resources are not available to admit the call, two kinds of actions are provided: system denial which busyouts all of T1 or E1 or per call denial, which disconnects, hairpins, or plays a message or tone. If the interface-based resource is not available to admit the call, the call is dropped from the session protocol.
Note |
For information on CAC, see Trunk Connections and Conditioning Features at http://www.cisco.com/en/US/docs/ios/12_3/vvf_c/cisco_ios_voice_configuration_library_glossary/vcltrunk.html . |
Voice wholesalers use multiple ingress and egress carriers to route traffic. A call coming into a gateway on a particular ingress carrier must be routed to an appropriate egress carrier. As networks grow and become more complicated, the dial plans needed to route the carrier traffic efficiently become more complex and the need for carrier-sensitive routing (CSR) increases.
Note |
For information on routing, see VoIP Gateway Trunk and Carrier Based Routing Enhancements at the following URL: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t11/feature/guide/ftgwrepg.html |
This section contains the following information:
The Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks feature enables call-management applications to identify specific ISDN bearer (B) channels used during a voice-gateway call for billing purposes. With identification of the B channel, H.323 gateways can enable port-specific features such as voice recording and call transfer.
In Cisco IOS releases prior to 12.3(7)T, fields used to store call leg information regarding the telephony port do not include B channel information. B-channel information is used to describe incoming ISDN call legs. The Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks feature allows H.323 and SIP gateways to receive B-channel information from incoming ISDN calls. The acquired B-channel information can be used during call transfer or to route a call.
SIP and H.323 gateways use two different commands to enable receiving the B channel of a telephony call leg. Using a different command for each protocol allows users to run the two protocols on one gateway simultaneously.
Note |
For information on using this feature on SIP gateways, see the information on SIP ISDN support features in the Cisco IOS SIP Configuration Guide at http://www.cisco.com/en/US/docs/ios/voice/sip/configuration/guide/15_0/sip_15_0_book.html |
For H.323, if the billing b-channel command is configured, the H.323 gateway accesses B-channel information on all calls in the ARQ, LRQ, and GKTMP messages.
To provide H.323 users with B-channel information, use the following commands beginning in global configuration mode.
Command or Action | Purpose | |
---|---|---|
Step 1
|
voice service voip
Example: Router(config)# voice service voip |
Enters voice-service configuration mode and specifies a voice-encapsulation type. |
Step 2
|
h323
Example: Router(conf-voi-serv)# h323 |
Enters H.323-voice-service configuration mode. |
Step 3
|
billing b-channel
Example: Router(conf-serv-h323)# billing b-channel |
Enables the H.323 gateway to access B-channel information on all H.323 calls. |
Step 4
|
exit
Example: Router(conf-serv-h323)# end |
Exits the current mode. |
Step 1 | debug h245 asn1 Use this command to display ASN1 contents of H.245 messages. The following sample command output shows an H.323 ARQ nonstandard message. The format of the B-channel billing information is: 1 is the D-channel ID, 1 is the T1 controller, and 10 is the B-channel. Example:
Router# debug h245 asn1
.
.
.
value ARQnonStandardInfo ::=
{
sourceAlias
{
}
sourceExtAlias
{
}
interfaceSpecificBillingId 1:D 1:DS1 10:DS0
gtd '49414D2C0D0A50524E2C6973646E2A2C2...'H
}
.
.
.
|
Step 2 | debug gatekeeper servers Use this command on gatekeeper to trace all the message exchanges between a gatekeeper and an external application. It also displays any errors that occur in sending messages to the external application or in parsing messages from the external application. The following sample command output also shows B-channel information. The format of the B-channel billing information is as follows: 1 is the D-channel ID, 1 is the T1 controller, and 10 is the B-channel. Example:
Router# debug gatekeeper servers
"REQUEST ARQ
Version-id:402
From:voip6-2600-1
To:GKTMP_SERVER
Transaction-Id:81A3EB4000000001
Content-Length:258
i=I:1.3.26.21:1720
s=E:9190001 H:voip6-5300-1
d=E:4080001
b=1280
A=F
C=C13CB8DE-C47F-11D3-80A9-FC0BFCA7B068
c=C13D5506-C47F-11D3-80AB-FC0BFCA7B068
B= 1:D 1:DS1 10:DS0
|
H.323 VoIP call preservation enhancements for WAN link failures sustains connectivity for H.323 topologies where signaling is handled by an entity that is different from the other endpoint, such as a gatekeeper that provides routed signaling or a call agent, such as the Cisco BTS 10200 Softswitch, Cisco PGW 2200, or Cisco CallManager, that brokers signaling between the two connected parties.
Call preservation is useful when a gateway and the other endpoint (typically an Cisco Unified IP phone) are collocated at the same site and the call agent is remote and therefore more likely to experience connectivity failures.
Note |
If a preserved H.323 call is torn down at a IP PBX, a call-stop record will be generated while Real-time Transport Protocol (RTP) is still flowing. Such an event can be misused to generate a signaling error and allow toll bypass, thus affecting per-call billing integrity. |
H.323 call preservation covers the following types of failures and connections:
Note that after the media is preserved, the call is torn down later when either one of the parties hangs up or media inactivity is detected. In cases where there is a machine-generated media stream, such as music streaming from a media server, the media inactivity detection will not work and the call may hang. Cisco Unified CallManager addresses such conditions by indicating to the gateway that such calls should not be preserved, but third-party devices or IPIP gateways would not do this.
Flapping is defined for this feature as the repeated and temporary loss of IP connectivity that can be caused by WAN or LAN failures. H.323 VoIP calls between a Cisco IOS gateway and Cisco Unified CallManager may be torn down when flapping occurs. When Cisco Unified CallManager detects that the TCP connection is lost, it clears the call and closes the TCP sockets used for the call by sending a TCP FIN, without sending an "H.225.0 Release Complete" or "H.245 End Session" message. This is called quiet clearing. The TCP FIN sent from the Cisco Unified CallManager could reach the gateway if the network comes up for a short duration, and the gateway will tear the call down. Even if the TCP FIN does not reach the gateway, the TCP keepalives sent from the gateway could reach Cisco Unified CallManager when the network comes up. Cisco Unified CallManager will send TCP RST messages in response to the keepalives as it has already closed the TCP connection. The gateway will tear down H.323 calls if it receives the RST message.
Configuration of H.323 VoIP call preservation enhancements for WAN link failures involves configuring the call preserve command. If you are using Cisco Unified CallManager you must enable the "Allow Peer to Preserve H.323 Calls" parameter from Cisco Unified CallManager's Service Parameters window.
The call preserve command causes the gateway to ignore socket closure or socket errors on H.225.0 or H.245 connections for active calls, allowing the socket to be closed without tearing down calls using those connections.
Call preservation may be reported through Syslog, which optionally can be obtained through a simple network management protocol (SNMP) trap. New syslog messages are printed when call preservation is applied. An SNMP trap can be configured on this syslog message, so you can be notified when call preservation occurs on a gateway.
Preservation information is displayed through the show h323 calls preserved command. The following is an example of the command's output:
CallID = 11EC , Calling Number = , Called Number = 3210000 , RemoteSignallingIPAddress=9.13.0.26 , RemoteSignallingPort=49760 , RemoteMediaIPAddress=9.13.0.11 , RemoteMediaPort=17910 , Preserved Duration = 262 , Total Duration = 562 , H225 FD = -1 , H245 FD = -1
The previous example represents one preserved call. One such display is provided per preserved call. The show h323 calls preserved displays active calls only. No history is output.
To obtain additional information about a call, you can also use the show call active voice command. Calls can be cleared with the clear call voice causecode command.
H.323 VoIP Call preservation enhancements for WAN link failures does not support the following:
The tasks for configuring H.323 VoIP call preservation enhancements for WAN link failures include the following:
The call preservecommand activates H.323 VoIP call preservation. RTP and RTCP inactivity detection and bidirectional silence detection can be used with this feature. Note that voice activity detection (VAD) must be set to off if you are using RTP and RTCP inactivity detection. VAD may be set to on, for bidirectional silence detection. For configuration examples, see the "Configuring the Gateway Example" and "Bidirectional Silence Detection Enable Example" sections.
When bidirectional silence and RTP and RTCP inactivity detection are configured, they are enabled for all calls by default. To enable them for H.323 VoIP preserved calls only, you must use the call preservecommand's limit-media-detection keyword.
H.323 VoIP call preservation can be applied to all calls and to dial peers. The required steps are described in the following sections:
Command or Action | Purpose | |
---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
Step 3
|
voice service voip
Example: Router (config)# voice service voip |
Enters voice-service configuration mode. |
Step 4
|
h323
Example: Router (config-voi-serv)# h323 |
Enables the H.323 voice service configuration commands. |
Step 5
|
call preserve [limit-media-detection]
Example: Router (config-voi-h323)# call preserve |
Enables the preservation of H.323 VoIP calls.
|
Step 6
|
exit
Example: Router# exit |
Exits H.323 configuration mode. |
Step 7
|
exit
Example: Router# exit |
Exist voice service voip configuration mode. |
The following configuration example enables H.323 VoIP call preservation for all calls.
voice service voip h323 call preserve
The following configuration example enables H.323 VoIP call preservation and limits RTP and RTCP inactivity detection and bidirectional silence detection (if configured) to preserved calls only:
voice service voip h323 call preserve limit-media-detection
Command or Action | Purpose | |
---|---|---|
Step 1
|
enable
Example: Router> enable |
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example: Router# configure terminal |
Enters global configuration mode. |
Step 3
|
voice-class h323 tag
Example: Router (config)# voice-class h323 4 |
Assigns an H.323 voice class to a VoIP dial peer.
|
Step 4
|
call preserve [limit-media-detection]
Example: Router (config-class)# call preserve |
Enables the preservation of H.323 VoIP calls.
|
Step 5
|
exit
Example: Router (config)# exit |
Exits H.323 voice class configuration mode. |
Step 6
|
dial-peer voice tag voip
Example: Router (config)# dial-peer voice 1 voip |
Defines a particular dial peer. |
Step 7
|
voice-class h323 tag
Example: Router (config-dial-peer)# voice-class h323 4 |
Assigns an H.323 voice class to a VoIP dial peer.
|
Step 8
|
exit
Example: Router# exit |
Exits dial-peer voice configuration mode. |
Nov 29 12:39:55.167: %VOICE_IEC-3-GW: H323: Internal Error (Socket error):
Router# debug h225 asn
H.225 ASN1 Messages debugging is on
3725-GW1#
*May 3 15:57:27.920: H225.0 INCOMING ENCODE BUFFER::= 28501900060008914A00040000D2D6D6D87EB11D02000000090D194410A00100110140B50000120A80A48004000101000100
*May 3 15:57:27.920:
*May 3 15:57:27.920: H225.0 INCOMING PDU ::=
value H323_UserInformation ::=
{
h323-uu-pdu
{
h323-message-body notify :
{
protocolIdentifier { 0 0 8 2250 0 4 }
callIdentifier
{
guid '00D2D6D6D87EB11D02000000090D1944'H
}
}
h245Tunneling FALSE
nonStandardControl
{
{
nonStandardIdentifier h221NonStandard :
{
t35CountryCode 181
t35Extension 0
manufacturerCode 18
}
data '80A48004000101000100'H
}
}
}
}
*May 3 15:57:27.924: H225 NONSTD INCOMING ENCODE BUFFER::= 80A48004000101000100
*May 3 15:57:27.924:
*May 3 15:57:27.924: H225 NONSTD INCOMING PDU ::=
value H323_UU_NonStdInfo ::=
{
callMgrParam
{
interclusterVersion 1
enterpriseID {}
}
callPreserveParam
{
callPreserveIE FALSE
}
}
When the call is resumed, "callPreserve" is again set to True as shown in the following output example:
Router# debug h225 asn
*May 3 15:57:32.676: H225.0 INCOMING ENCODE BUFFER::= 28501900060008914A00040000D2D6D6D87EB11D02000000090D194410A001001B0140B50000121480A68004000101000943004C0580323030300140
*May 3 15:57:32.676:
*May 3 15:57:32.676: H225.0 INCOMING PDU ::=
value H323_UserInformation ::=
{
h323-uu-pdu
{
h323-message-body notify :
{
protocolIdentifier { 0 0 8 2250 0 4 }
callIdentifier
{
guid '00D2D6D6D87EB11D02000000090D1944'H
}
}
h245Tunneling FALSE
nonStandardControl
{
{
nonStandardIdentifier h221NonStandard :
{
t35CountryCode 181
t35Extension 0
manufacturerCode 18
}
data '80A68004000101000943004C0580323030300140'H
}
}
}
}
*May 3 15:57:32.680: H225 NONSTD INCOMING ENCODE BUFFER::= 80A68004000101000943004C0580323030300140
*May 3 15:57:32.680:
*May 3 15:57:32.680: H225 NONSTD INCOMING PDU ::=
value H323_UU_NonStdInfo ::=
{
callMgrParam
{
interclusterVersion 1
enterpriseID {}
}
callSignallingParam
{
connectedNumber '4C058032303030'H
}
callPreserveParam
{
callPreserveIE TRUE
}
}
Router# debug cch323 all (CCH323-6-CALL_PRESERVED). Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 3 Event 0x1 Nov 29 12:39:55.167: //31/A9E0FB268017/H323/cch323_h225_handle_conn_loss: cch323_h225_handle_conn_loss Call not torn down despite H.225.0 socket error: socket error status = 1, ccb status = 403760899, fd = 3, pre-V3 = 0 Nov 29 12:39:55.167: %CCH323-6-CALL_PRESERVED: cch323_h225_handle_conn_loss: H.323 call preserved due to socket closure or error, Call Id = 4593, fd = 3 Nov 29 12:39:55.167: %VOICE_IEC-3-GW: H323: Internal Error (Socket error): IEC=1.1.186.5.7.6 on callID 31 GUID=A9E0FB26600B11DA8017000653455072 Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/h323_set_release_source_for_peer: ownCallId[31], src[6] Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 3 Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/cch323_cleanup_xport: hashDestroy for TcpFDTbl
If you are using Cisco Unified CallManager, you must activate H.323 call preservation through the "Allow Peer to Preserve H.323 Calls" parameter, which preserves the following:
Procedure
1. Choose Service > Service Parameters.
2. From the Service menu select Cisco Unified CallManager.
3. Click Advanced.
4. Scroll to the Clusterwide Parameter (Device -- H.323) section.
5. Set the "Allow Peer to Preserve H.323 Calls" parameter to True.
6. At the top of the screen click Update.
Step 1 | Choose Service > Service Parameters. |
Step 2 | From the Service menu select Cisco Unified CallManager. |
Step 3 | Click Advanced. |
Step 4 | Scroll to the Clusterwide Parameter (Device -- H.323) section. |
Step 5 | Set the "Allow Peer to Preserve H.323 Calls" parameter to True. |
Step 6 | At the top of the screen click Update. |
The figure below shows a Cisco 2600 and a Cisco AS5800 as gateways and a Cisco 3640 as a gatekeeper.
The following example shows a Cisco AS5800 as a gateway using RAS:
! Configure the T1 controller. (This configuration is for a T3 card.) controller T1 1/0/0:1 framing esf linecode b8zs pri-group timeslots 1-24 ! ! Configure POTS and VoIP dial peers. dial-peer voice 11111 pots incoming called-number 12345 destination-pattern 9#11111 direct-inward-dial port 1/0/0:1:D prefix 11111 ! dial-peer voice 12345 voip destination-pattern 12345 tech-prefix 6# session target ras ! ! Enable gateway functionality. gateway ! ! Enable Cisco Express Forwarding. ip cef ! ! Configure and enable the gateway interface. interface FastEthernet0/3/0 ip address 172.16.0.0.255.255.255.0 no ip directed-broadcast no keepalive full-duplex no cdp enable h323-gateway voip interface h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1719 h323-gateway voip h323-id gw3@gg-dn1 h323-gateway voip tech-prefix 9# ! ! Configure the serial interface.(This configuration is for a T3 serial interface.) interface Serial1/0/0:1:23 no ip address no ip directed-broadcast ip mroute-cache isdn switch-type primary-5ess isdn incoming-voice modem no cdp enable
The following example illustrates H.323 security configuration on a Cisco AS5300 gateway.
hostname um5300 ! enable password xyz ! resource-pool disable ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero no ip domain-lookup ! isdn switch-type primary-5ess isdn voice-call-failure 0 call application voice xyz tftp://172.18.16.2/samp/xyz.tcl call application voice load xys mta receive maximum-recipients 1024 ! xgcp snmp sgcp ! controller T1 0 framing esf clock source line primary linecode b8zs pri-group timeslots 1-24 ! controller T1 1 framing esf clock source line secondary 1 linecode b8zs pri-group timeslots 1-24 ! controller T1 2 ! controller T1 3 ! voice-port 0:D ! voice-port 1:D ! dial-peer voice 4001 pots application xyz destination-pattern 4003 port 0:D prefix 4001 ! dial-peer voice 513 voip destination-pattern 1513200.... session target ras ! dial-peer voice 9002 voip destination-pattern 9002 session target ras ! dial-peer voice 4191024 pots destination-pattern 4192001024 port 0:D prefix 4001 ! dial-peer voice 1513 voip destination-pattern 1513....... session target ras ! dial-peer voice 1001 pots destination-pattern 14192001001 port 0:D ! gateway security password 151E0A0E level all ! interface Ethernet0 ip address 10.99.99.7 255.255.255.0 no ip directed-broadcast shutdown ! interface Serial0:23 no ip address no ip directed-broadcast isdn switch-type primary-5ess isdn protocol-emulate user isdn incoming-voice modem fair-queue 64 256 0 no cdp enable ! interface Serial1:23 no ip address no ip directed-broadcast isdn switch-type primary-5ess isdn protocol-emulate user isdn incoming-voice modem isdn guard-timer 3000 isdn T203 10000 fair-queue 64 256 0 no cdp enable ! interface FastEthernet0 ip address 172.18.72.121 255.255.255.192 no ip directed-broadcast duplex auto speed auto h323-gateway voip interface h323-gateway voip id um5300@vgkcisco3 ipaddr 172.18.72.58 1719 h323-gateway voip h323-id um5300 h323-gateway voip tech-prefix 1# ! no ip http server ip classless ip route 10.0.0.0 172.18.72.65 ! ! line con 0 exec-timeout 0 0 length 0 transport input none line aux 0 line vty 0 4 password xyz login ! ntp clock-period 17179974 ntp server 172.18.72.124
The following example shows output from configuring secure registrations from the gatekeeper and identifying which RAS messages the gatekeeper checks to find authentication tokens:
dial-peer voice 10 voip destination-pattern 4088000 session target ras dtmf-relay h245-alphanumeric ! gateway security password 09404F0B level endpoint
The following example shows output from configuring which RAS messages contain gateway-generated tokens:
dialer-list 1 protocol ip permit dialer-list 1 protocol ipx permit radius-server host 10.25.0.0 auth-port 1645 acct-port 1646 radius-server retransmit 3 radius-server deadtime 5 radius-server key lab radius-server vsa send accounting ! gatekeeper zone local GK1 test.com 10.0.0.3 zone remote GK2 test2.com 10.0.2.2 1719 accounting security token required-for registration no use-proxy GK1 remote-zone GK2 inbound-to terminal no use-proxy GK1 remote-zone GK2 inbound-to gateway no shutdown
In the following example, the gateway is configured to have alternate gatekeepers. The primary and secondary gatekeepers are configured with the priority option. The priority range is 1 to 127. The first alternate gatekeeper is configured as priority 120; the second alternate gatekeeper is not configured, so remains at the default setting of 127.
interface Ethernet 0/1 ip address 172.18.193.59 255.255.255.0 h323-gateway voip interface h323-gateway voip id GK1 ipaddr 172.18.193.65 1719 priority 120 h323-gateway voip id GK2 ipaddr 172.18.193.66 1719 h323-gateway voip h323-id cisco2
The following example configures DTMF relay with the cisco-rtp keyword when sending DTMF tones to dial peer 103:
dial-peer voice 103 voip dtmf-relay cisco-rtp
The following example configures DTMF relay with the cisco-rtp or h245-signal keywords when DTMF tones are sent to dial peer 103:
dial-peer voice 103 voip dtmf-relay cisco-rtp h245-signal
The following example configures the gateway to send DTMF in-band (the default) when DTMF tones to are sent dial peer 103:
dial-peer voice 103 voip no dtmf-relay
The following example shows that DTMF relay is configured on an H.323 gateway using NTE RTP and H.245 signaling. In this example, the Named Signaling Event (NSE) value in use is reassigned to a different, unassigned number (110). NTE payload is then assigned to the previously used value (100).
dial-peer voice 400 voip destination-pattern 400 dtmf-relay rtp-nte h245-signal rtp payload nse 110 rtp payload-type nte 100 session target ipv4:172.18.193.181
The following configuration shows how to create a list of prioritized codecs and apply that list to a specific VoIP dial peer:
voice class codec 99 codec preference 1 g711alaw codec preference 2 g711ulaw bytes 80 codec preference 3 g723ar53 codec preference 4 g723ar63 bytes 144 codec preference 5 g723r53 codec preference 6 g723r63 bytes 120 codec preference 7 g726r16 codec preference 8 g726r24 codec preference 9 g726r32 bytes 80 codec preference 10 g728 codec preference 11 g729br8 codec preference 12 g729r8 bytes 50 ! dial-peer voice 1919 voip voice-class codec 99
The following example configures POTS dial peer 10 for a preference of 1, POTS dial peer 20 for a preference of 2, and Voice over Frame Relay dial peer 30 for a preference of 3:
dial-peer voice 10 pots destination pattern 5552150 preference 1 dial-peer voice 20 pots destination pattern 5552150 preference 2 dial-peer voice 30 vofr destination pattern 5552150 preference 3
In the following example, Ethernet interface 0/0 is used as the gateway interface. For convenience, the h323-gateway voip bind srcaddr command is specified on the same interface. The designated source IP address is the same as the IP address assigned to the interface.
interface Ethernet0/0 ip address 172.18.194.50 255.255.255.0 no ip directed-broadcast h323-gateway voip interface h323-gateway voip id j70f_2600_gk2 ipaddr 172.18.194.53 1719 h323-gateway voip h323-id j70f_3640_gw1 h323-gateway voip tech-prefix 3# h323-gateway voip bind srcaddr 172.18.194.50
The following example shows the gatekeeper border element router with service relationship and usage-reporting functionality turned on:
Router# show running config
Building configuration...
.
.
.
call-router h323-annexg boston1
neighbor 1.2.3.4
service-relationship
outbound retry interval 120
inbound ttl 1200
no shutdown
usage-indication
retry interval 600
retry window 3600
domain-name Celine-Domain
access-policy neighbors-only
local ip 172.18.193.31
no shutdown
.
.
.
The following example shows the GTD feature configured on the system:
Router# show running-config
Building configuration...
Current configuration : 4192 bytes
!
version 12.2
service config
no service single-slot-reload-enable
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service internal
service udp-small-servers
!
hostname as5300-2
!
voice service voip
signaling forward unconditional
h323
!
.
.
.
The following example shows GTD configured with unconditional forwarding on two dial peers:
Router# show running-config
Building configuration...
Current configuration : 4192 bytes
!
version 12.2
service config
no service single-slot-reload-enable
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service internal
service udp-small-servers
!
hostname as5300-2
!
.
.
.
!
dial-peer voice 1 pots
application session
incoming called-number 25164
port 0:D
!
dial-peer voice 1513 voip
destination-pattern 1513.......
session target ipv4:1.8.156.3
!
dial-peer voice 1408525 voip
destination-pattern 1408525....
!
dial-peer voice 1800877 voip
destination-pattern 1800877....
session target ipv4:1.8.156.3
!
dial-peer voice 2 pots
destination-pattern 51550
no digit-strip
direct-inward-dial
port 3:D
!
dial-peer voice 51557 voip
destination-pattern 51557
signaling forward unconditional
session target ras
!
dial-peer voice 52557 voip
destination-pattern 52557
signaling forward unconditional
session target ipv4:1.8.156.3
!
gateway
!
.
.
The following example displays the status of the destination pattern database and the status of the individual destination patterns for Gatekeeper1:
Gateway1# show h323 gateway prefixes
GK Supports Additive RRQ : True
GW Additive RRQ Support Enabled : True
Pattern Database Status : Active
Destination Active
Pattern Status Dial-Peers
================================================================
1110509* ADD ACKNOWLEDGED 2
1110511* ADD ACKNOWLEDGED 2
23* ADD ACKNOWLEDGED 2
The following example displays the zone prefix table, including the dynamic zone prefixes, for Gatekeeper1:
Gatekeeper1# show gatekeeper zone prefix all ZONE PREFIX TABLE =============================================== GK-NAME E164-PREFIX Dynamic GW-priority ------- ----------- ------------------- gatekeeper1 1110507* gateway2 /5 gatekeeper2 1110508* gatekeeper1 1110509* gateway1 /5 gatekeeper1 1110511* gateway1 /5 gatekeeper1 23* gateway1 /5 gatekeeper1 4666002* gatekeeper3 55530.. gatekeeper1 7779...
The following example displays the gateway destination-pattern database status:
Router# show h323 gateway prefixes
GK Supports Additive RRQ :True
GW Additive RRQ Support :True
Pattern Database :Active
Destination Active
Pattern Status Dial-Peers Priority
=================================================================
1110509* ADD ACKNOWLEDGED 2 8
1110511* ADD ACKNOWLEDGED 2
23* ADD ACKNOWLEDGED 2 4
The following example displays the ASN1 contents of RAS messages sent during the registration process:
Gatekeeper1# debug h225 asn1 U.S. Eastern time (GMT -5/-4) voice:(919) 392-6007.Feb 5 16:27:05.894:RAS INCOMING ENCODE BUFFER::= 00 A0004306 0008914A 00040001 07072ACC 3D2800B5 00001240 0238500A 00320036 00300030 002D0031 02400500 33003600 34003000 2D003101 00C4C0 .Feb 5 16:27:05.906: .Feb 5 16:27:05.906:RAS INCOMING PDU ::= value RasMessage ::= gatekeeperRequest : { requestSeqNum 68 protocolIdentifier { 0 0 8 2250 0 4 } rasAddress ipAddress : { ip '0107072A'H port 52285 } endpointType { vendor { vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } gateway { protocol { voice : { }, h323 : { } } } mc FALSE undefinedNode FALSE } gatekeeperIdentifier {"2600-1"} endpointAlias { h323-ID :{"3640-1"}, dialedDigits :"919" } } .Feb 5 16:27:05.926:RAS OUTGOING PDU ::= value RasMessage ::= gatekeeperConfirm : { requestSeqNum 68 protocolIdentifier { 0 0 8 2250 0 4 } gatekeeperIdentifier {"2600-1"} rasAddress ipAddress : { ip '01070721'H port 1719 } } .Feb 5 16:27:05.934:RAS OUTGOING ENCODE BUFFER::= 04 80004306 0008914A 00040A00 32003600 30003000 2D003100 01070721 06B7 .Feb 5 16:27:05.938: .Feb 5 16:27:05.946:RAS INCOMING ENCODE BUFFER::= 0E C0004406 0008914A 00048001 00010707 2A06B801 00010707 2ACC3D28 00B50000 12400238 50024005 00330036 00340030 002D0031 0100C4C0 A0003200 36003000 30002D00 3100B500 0012288B 08000200 3B010001 00018002 7000 .Feb 5 16:27:05.958: .Feb 5 16:27:05.958:RAS INCOMING PDU ::= value RasMessage ::= registrationRequest : { requestSeqNum 69 protocolIdentifier { 0 0 8 2250 0 4 } discoveryComplete TRUE callSignalAddress { ipAddress : { ip '0107072A'H port 1720 } } rasAddress { ipAddress : { ip '0107072A'H port 52285 } } terminalType { vendor { vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } gateway { protocol { voice : { }, h323 : { } } } mc FALSE undefinedNode FALSE } terminalAlias { h323-ID :{"3640-1"}, dialedDigits :"919" } gatekeeperIdentifier {"2600-1"} endpointVendor { vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } timeToLive 60 keepAlive FALSE willSupplyUUIEs FALSE maintainConnection TRUE usageReportingCapability { nonStandardUsageTypes { } startTime NULL endTime NULL terminationCause NULL } } .Feb 5 16:27:05.998:RAS OUTGOING PDU ::= value RasMessage ::= registrationConfirm : { requestSeqNum 69 protocolIdentifier { 0 0 8 2250 0 4 } callSignalAddress { } terminalAlias { h323-ID :{"3640-1"}, dialedDigits :"919" } gatekeeperIdentifier {"2600-1"} endpointIdentifier {"816F7A1000000001"} alternateGatekeeper { } timeToLive 60 willRespondToIRR FALSE maintainConnection TRUE supportsAdditiveRegistration NULL usageSpec { { when { end NULL inIrr NULL } callStartingPoint { connect NULL } required { nonStandardUsageTypes { } startTime NULL endTime NULL terminationCause NULL } } }
The following example shows an H.323 and SIP ISDN B-channel configuration example.
Current configuration : 3394 bytes ! version 12.3 service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! memory-size iomem 15 ip subnet-zero ! ! no ip domain lookup ! voice service voip h323 billing b-channel sip ds0-num ip dhcp pool vespa network 192.168.0.0 255.255.255.0 option 150 ip 192.168.0.1 default-router 192.168.0.1 ! ! voice call carrier capacity active ! voice class codec 1 codec preference 2 g711ulaw ! ! no voice hpi capture buffer no voice hpi capture destination ! ! fax interface-type fax-mail mta receive maximum-recipients 0 ! ! interface Ethernet0/0 ip address 10.8.17.22 255.255.0.0 half-duplex ! interface FastEthernet0/0 ip address 192.168.0.1 255.255.255.0 speed auto no cdp enable h323-gateway voip interface h323-gateway voip id vespa2 ipaddr 10.8.15.4 1718 ! router rip network 10.0.0.0 network 192.168.0.0 ! ip default-gateway 10.8.0.1 ip classless ip route 0.0.0.0 0.0.0.0 10.8.0.1 no ip http server ip pim bidir-enable ! ! tftp-server flash:SEPDEFAULT.cnf tftp-server flash:P005B302.bin call fallback active ! ! call application global default.new call rsvp-sync ! voice-port 1/0 ! voice-port 1/ ! mgcp profile default ! ! dial-peer voice 1 pots destination-pattern 5100 port 1/0 ! dial-peer voice 2 pots destination-pattern 9998 port 1/1 ! dial-peer voice 123 voip destination-pattern [12]... session protocol sipv2 session target ipv4:10.8.17.42 dtmf-relay sip-notify ! gateway ! sip-ua retry invite 3 retry register 3 timers register 150 registrar dns:myhost3.cisco.com expires 3600 registrar ipv4:10.8.17.40 expires 3600 secondary ! ! telephony-service max-dn 10 max-conferences 4 ! ephone-dn 1 number 4001 ! ephone-dn 2 number 4002 ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 login line vty 5 15 login ! no scheduler allocate end
Related Topic |
Document Title |
||
---|---|---|---|
Cisco IOS Release 12.4 |
http://www.cisco.com/en/US/docs/ios/12_3/vvf_c/cisco_ios_voice_configuration_library_glossary/vcl.htm
|
||
Cisco IOS Release 12.3 |
|
||
Cisco IOS Release 12.2 |
http://www.cisco.com/en/US/docs/ios/12_2/voice/configuration/guide/fvvfax_c.html |
||
Troubleshooting and Debugging guides |
http://www.cisco.com/en/US/docs/ios/debug/command/reference/db_book.html
http://www.cisco.com/en/US/docs/routers/access/1700/1750/software/configuration/guide/debug.html |
||
Cisco Unified Border Element Configuration Examples |
|
||
Related Application Guides |
http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_programming_reference_guides_list.html
|
Standards |
Title |
---|---|
ITU-T E.164 |
Overall network operation, telephone service, service operation and human factors |
ITU-T H.225 Version 2 |
Call signalling protocols and media stream packetization for packet-based multimedia communication systems |
ITU-T H.235 |
Security and encryption for H-Series (H.323 and other H.245-based) multimedia terminals |
ITU-T H.323 |
Packet-based multimedia communications systems |
ITU-T H.450 |
Supplementary services for multimedia |
MIBs |
MIBs Link |
---|---|
|
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs |
Description |
Link |
---|---|
The Cisco Technical Support website contains thousands of pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even more content. |
http://www.cisco.com/techsupport
|
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Release |
Modification |
---|---|
12.2(2)XB |
The Dual Tone Multifrequency Relay for SIP Calls Using Named Telephone Events feature was introduced. The Media Gateway Control Protocol-Based Fax (T.38) and Dual Tone Multifrequency (IETF RFC 2833) Relay feature was also introduced. |
12.2(11)T |
H.323 support for DTMF relay was added. |
Release |
Modification |
---|---|
12.0(5)T |
This feature was introduced. |
12.1(5)XM2 |
Support was added for the Cisco AS5350 and Cisco AS5400. |
12.2(2)XA |
The call rscmon update-timer command was added. |
12.2(4)T |
The call rscmon update-timer command was integrated into this release. Support for the Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included. |
12.2(2)XB1 |
This feature was implemented on the Cisco AS5850. |
12.2(11)T |
This feature was integrated into this release. |
Release |
Modification |
---|---|
12.2(15)T |
This feature was introduced. |
12.3(3) |
The ras rrq dynamic prefixes and the rrq dynamic-prefixes-acceptcommands were modified to be disabled by default. |
12.3(4)T |
This feature was integrated into this release. |
12.4(9)T |
The terminal-alias-pattern command was introduced to send the gateway priority along with dynamic zone prefixes from the gateway. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.