Cisco IOS H.323 Configuration Guide
Cisco IOS H.323 Configuration Guide
Cisco IOS H.323 Configuration Guide
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, nc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco ress, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, ormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise, The Fastest Way to Increase our Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. ll other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship etween Cisco and any other company. (0609R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco IOS H.323 Configuration Guide Copyright 2003 2006 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List H.323 Overview Contents
7 7 7 1 1 1
Restrictions for Configuring an H.323 Network 8 H.323 Version 2 Restrictions 8 H.323 Signaling Enhancement Restrictions 9 Source Call Signal Address and H.245 Empty Capabilities Set Restrictions Call Transfer Restrictions 10 Ecosystem Gatekeeper Interoperability Restrictions 10 Information About H.323 10 H.323 Standards 10 Network Components 11 H.323 Terminals 12 Multipoint Control Unit 12 H.323 Gateways 13 H.323 Proxies 13 H.323 Gatekeepers 13 Alternate Gatekeepers 14 Alternate Endpoints 14 GKTMP Messages 15 Billing Information 15 Least-Cost Routing 15 Load Balancing 15 Border Elements 15 Gatekeeper Zones 15 Discovery and Registration 15 Call Setup 16 Call Termination 17 Security 18 Additional References 19 Related Documents 19
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
iii
Contents
Related Websites 21 Standards 21 MIBs 21 RFCs 21 Technical Assistance 22 Basic H.323 Setup and Management Contents
24 24 24 23
Prerequisites for Basic H.323 Setup and Management Restrictions for Basic H.323 Setup and Management
How to Set Up and Manage Basic H.323 Features 24 Managing Basic (Nonconfigurable) Gateway Features 24 H.323 Signaling 25 H.323 Call Statistics 26 Source Call Signal Address 28 Tunneling of Redirecting Number Information Element 29 H.323 Call Redirection 30 Multizone Features 32 Codec Negotiation 32 H.245 Empty Capabilities Set 33 Lightweight Registration 34 H.450.2 Call Transfer 34 H.450.3 Call Deflection 34 Gateway Support for a Network-Based Billing Number 35 Answer Supervision Reporting 35 Managing Basic (Nonconfigurable) Gatekeeper Features 36 Gateway-to-Gatekeeper Billing Redundancy 36 Ecosystem Gatekeeper Interoperability 36 Gatekeeper-Management Statistics 38 Configuring H.323 Gateways Contents
43 43 43 41
Prerequisites for Configuring H.323 Gateways Restrictions for Configuring H.323 Gateways
How to Configure H.323 Gateways 43 Configuring a Router Interface as a Gateway 44 Configuring a Router Interface 44 Verifying a Router Interface 46 Shutting Down and Enabling VoIP Services on a Gateway Shutting Down and Enabling VoIP Service 46
Cisco IOS H.323 Configuration Guide
46
iv
Contents
Shutting Down and Enabling VoIP Submodes 47 Verifying Gateway Status 48 Configuring Gateway RAS 48 Configuring Basic RAS 49 Configuring RAS Retries and Timers 52 Configuring Gateway-Resource-Availability Reporting 55 Configuring E.164-Address Registration 56 Configuring In-Band Tones and Announcements 56 Configuring Gateway AAA 57 Configuring H.235 Gateway Security 57 Information About H.235 Gateway Security 58 Downloading IVR Scripts 61 Configuring H.235 Gateway Security 62 Verifying H.235 Gateway Security 64 Configuring Alternate-Gatekeeper Support 65 Restrictions for Alternate-Gatekeeper Support 65 Information About Alternate-Gatekeeper Support 65 Configuring Alternate-Gatekeeper Support 66 Verifying Configuration of Alternate-Gatekeeper Support 67 Configuring DTMF Relay 67 Information About DTMF Relay 67 Configuring DTMF Relay 69 Monitoring and Maintaining DTMF Relay 71 Configuring FXS Hookflash Relay 72 Configuring Multiple Codecs 74 Configuring Rotary Calling Pattern 75 Configuring H.323 Support for Virtual Interfaces 76 Configuring the Source IP Address of a Gateway 76 Verifying the Source IP Address of the Gateway 77 Configuring Annex G 77 Information About Annex G 78 Configuring and Provisioning an Annex G Border Element 79 Configuring Basic Service Relationships 82 Configuring Usage Indication 85 Verifying Annex G Configuration 86 Configuring H.225 87 Associating the H.323 Voice Class with Each VoIP Dial Peer 87 Configuring the SETUP Response Timeout Value 88 Configuring the Number of Concurrent Calls Per Connection 89 Changing the Idle Timer for Concurrent Calls 89
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
Contents
Configuring Overlap Signaling on H.323 Terminating Gateways 90 Configuring No Retry on User Busy in an H.323 Gateway 91 Examples 92 Configuring the VoIP Transport Method 93 Configuring Zone Bandwidth Management 93 Configuring Generic Transparency Descriptor for GKTMP Using SS7 Interconnect for Voice Gateways Version 2.0 94 Information About GTD for GKTMP Using SS7 Interconnect for Voice Gateways 94 Prerequisites for GTD for GKTMP Using SS7 Interconnect for Voice Gateways 96 Configuring GTD System-Wide 96 Configuring GTD for a Dial Peer 97 Verifying GTD 99 Configuring H.323 Version 4 Zone Prefix Registration 100 Information About H.323v4 Gateway Zone Prefix Registration Enhancements 100 Configuring H.323v4 Gateway Zone Prefix Registration Enhancements 101 Configuring Call Admission Control 108 Configuring Trunk-Based and Carrier-Based Routing 108 Configuring Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks 108 Information About Signal ISDN B-Channel ID 108 Configuring Signal ISDN B-Channel ID 109 Troubleshooting Signal ISDN B-Channel ID 110 Configuring H.323 VoIP Call Preservation Enhancements for WAN Link Failures 111 Prerequisites 112 Restrictions 113 Configuring H.323 Call Preservation Enhancements for WAN Link Failures 113 Configuring the Gateway 113 Configuring Cisco Unified CallManager 118 Configuration Examples for H.323 Gateways 119 RAS: Example 120 Gateway Security: Example 121 Alternate Gatekeeper Support: Example 123 DTMF Relay: Example 124 Multiple Codecs: Example 124 Rotary Calling Pattern: Example 125 H.323 Support for Virtual Interfaces: Example 125 H.225 Annex-G: Example 125 GTD Payload: Examples 126 H.323v4 Gateway Zone Prefix Registration Enhancements: Examples 127 Signal ISDN B-Channel ID: Example 131 H.323 VoIP Call Preservation Enhancements for WAN Link Failures Examples
Cisco IOS H.323 Configuration Guide
133
vi
Contents
H.323 VoIP Call Preservation for All Calls Example 134 H.323 VoIP Call Preservation for a Dial Peer Example 134 H.323 Call Preservation for RTP and RTCP and Silence Detection Example RTP and RTCP Inactivity Detection Configuration Example 134 Bidirectional Silence Detection Enable Example 134 Additional References
135 137
134
Prerequisites for Configuring H.323 Gatekeepers and Proxies Restrictions for Configuring H.323 Gatekeepers and Proxies
140 140
How to Configure H.323 Gatekeepers and Proxies 140 Configuring Hot Standby 141 Configuring Gatekeeper Zones 141 Restrictions for Gatekeeper Zones 142 Information About Gatekeeper Zones 142 Configuring Gatekeeper Zones 143 Configuring Destination Zones 148 Configuring Intergatekeeper Communication 149 Configuring Intergatekeeper Communication Using DNS 149 Configuring Intergatekeeper Communication Manually 150 Configuring Gatekeeper Alias Registration and Address Resolution 151 Alias Registration 151 Address Resolution 152 Request Processing 153 Configuring Load Balancing with Alternate Gatekeepers 154 Restrictions for Load Balancing with Alternate Gatekeepers 154 Information About Load Balancing with Alternate Gatekeepers 154 Configuring Load Balancing with Alternate Gatekeepers 155 Verifying Load Balancing with Alternate Gatekeepers 156 Configuring Remote Clusters 157 Configuring Remote Clusters 157 Verifying Remote Clusters 159 Configuring Static Nodes 161 Configuring AAA and RADIUS 163 Configuring H.323 Users via RADIUS 163 Configuring a RADIUS/AAA Server 167 Configuring User Activity for RADIUS 168 Configuring Security and Authentication 170 Restrictions for Security and Authentication 170
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
vii
Contents
Information About Security and Authentication 170 Configuring Domain Zones and the IZCT Password 176 Configuring Cisco Access Tokens 177 Configuring Tokenless Call Authorization 180 Configuring E.164 Interzone Routing 182 Information About E.164 Interzone Routing 182 Configuring a Dialing Prefix for Each Gateway 185 Configuring Gatekeeper Interaction with External Applications 186 Configuring Gatekeeper-to-GKTMP Server Flow Control 187 Setting the Retry Timer for Failed GKTMP Server Connections 190 Configuring Registration and Call Rejection 191 Configuring Gatekeeper Proxied Access 193 Configuring Access 193 Verifying Access 194 Configuring a Forced Disconnect on a Gatekeeper 195 Configuring Disconnect 195 Verifying Disconnect 196 Configuring an H.323 Proxy Server 196 Proxy Inside the Firewall 197 Proxy in Co-Edge Mode 197 Proxy Outside the Firewall 198 Proxy and NAT 199 Configuring Quality of Service 200 Prerequisites for QoS 200 Information About QoS 200 Configuring QoS Using a Multimedia Backbone 201 Configuring QoS on a Proxy Without ASR 203 Configuring QoS on a Proxy with ASR 205 Configuring Border Elements 215 Configuring Endpoints 216 Information About Endpoints 217 Configuring Alternate Endpoints 221 Configuring Additional Routes to Alternate Endpoints 223 Configuring Nonavailability Information for Terminating Endpoints 225 Configuring Endpoint-Based Call-Capacity Management 226 Forcing Endpoint Unregistration 226 Configuring the IRR Timer and Disable IRQ Requests 228 Restrictions for the IRR Timer and Disable IRQ Requests 228 Information About the IRR Timer and Disable IRQ Requests 228 Configuring IRR Periodic Intervals on the Gatekeeper 229
Cisco IOS H.323 Configuration Guide
viii
Contents
Disabling IRQ Requests for All Calls in the Gatekeeper Configuring Sequential LRQs 230 Restrictions for Sequential LRQs 231 Information About Sequential LRQs 231 Configuring Sequential LRQ Enhancement 232 Configuring the Sequential LRQ Timer 233 Verifying Sequential LRQ Enhancement 233 Configuration Examples for H.323 Gatekeepers and Proxies 234 HSRP: Example 235 Gatekeeper Zones: Example 236 Load Balancing with Alternate Gatekeepers: Example 238 Security and Authentication: Example 238 Domain Zones and the IZCT Password 238 Cisco Access Tokens 240 Tokenless Call Authorization 241 E.164 Interzone Routing: Example 241 Interaction with External Applications: Example 243 Proxy Use: Example 244 Co-Edge Proxy: Example 246 Endpoints: Example 252 IRR Timer and Disable IRQ Requests: Example 254 Sequential LRQ Enhancement: Example 254 Additional References
255
230
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
ix
Contents
Note
For information about the full set of Cisco IOS voice features, see the entire Cisco IOS Voice Configuration Libraryincluding library preface, glossary, and other documentsat http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcg/vcl.htm.
Release
12.4(4)XC
Features Introduced1
Feature Description
Feature Documentation
Configuring H.323 H.323 VoIP Call Preservation Sustains connectivity for H.323 Enhancements for WAN Link Failures topologies where signaling is handled Gateways on page 41 of this by an entity that is different from the guide other endpoint, No Retry on User Busy in an H.323 Gateway Changes the default behavior of the gateway to not retry alternate endpoints when the release complete reason is user busy. Configuring No Retry on User Busy in an H.323 Gateway section on page 91 of this guide
12.4(4)T
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List
Table 1
Release
12.3(11)T
Feature Documentation Configuring a Cisco Multiservice IP-to-IP Gateway chapter of the Cisco Multiservice IP-to-IP Gateway Configuration Guide Configuring H.323 Gateways on page 41 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide
12.3(7)T
Signal ISDN B-Channel ID to Enable Enables the H.323 gateway to access Application Control of Voice Gateway B-channel information for all H.323 Trunks calls. Gatekeeper Enhancements for Managed Voice Services Adds call control based on available bandwidth and endpoint resources, allowing call rerouting to achieve higher call-completion rates and ensure QoS. Adds a way to shutdown and restart SIP and H.323 gateways.
12.3(1)
12.3(1) cont.
Gateway Codec Order Preservation and Shutdown Control Gatekeeper Management Statistics
12.2(15)T
Provides statistics that can be used to Basic H.323 Setup and monitor a network and troubleshoot Management on page 23 of network problems. this guide Reduces configuration complexity on Configuring H.323 the gatekeeper by enabling a gateway Gateways on page 41 of this to report supported E.164 prefixes to guide the gatekeeper at registration. Creates a trusted access list to handle Configuring H.323 networks that have not implemented Gatekeepers and Proxies on token-security features. page 137 of this guide Adds media flow-around capability to Cisco Multiservice IP-to-IP the multiservice IP-to-IP gateway. Gateway Application Guide
12.2(13)T
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List
Table 1
Release
12.2(11)T
Feature Description
Feature Documentation
Implements the minimal set of Annex Configuring H.323 Gateways on page 41 of this G features needed to allow Cisco border elements to interoperate with guide other border elements. Configuring H.323 Reduces unnecessary messages between gatekeeper and the gateways, Gatekeepers and Proxies on page 137 of this guide reducing network congestion and CPU over-utilization. Describes how to configure a gatekeeper to provide nonavailability information for terminating endpoints. Allows configuration of multiple prefixes for a local zone and registration of an endpoint belonging to multiple zone prefixes. Enable finer-grained control of gatekeeper registrations, and enable more capable and robust back-end server applications. Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide
Configuring a Gatekeeper to Provide Nonavailability Information for Terminating Endpoints Gatekeeper Alias Registration and Address Resolution Enhancements
Gatekeeper-to-Gatekeeper Authentication
Provides additional security for H.323 Configuring H.323 networks by introducing the ability to Gatekeepers and Proxies on validate intradomain and interdomain page 137 of this guide gatekeeper-to-gatekeeper LRQ messages on a per-hop basis. When used in conjunction with per-call security using IZCT, protects network resources from attackers and prevents security holes.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List
Table 1
Release
Feature Description
Feature Documentation
Configuring H.323 Enhances interoperability of Cisco gateways with equipment from other Gateways on page 41 of this guide vendors by implementing H245v7 extensions to support RFC2833 in-band audio telephone events and in-band audio tones as well as support for asymmetrical RTP dynamic payload types. Allows service providers to route VoIP Gatekeeper Trunk and traffic based on trunk and carrier rule Carrier Based Routing sets. Enhancements Addresses functional enhancements needed to improve routing on Cisco voice-over-packet platforms. Provides alternate endpoints by adding trunk group labels (outgoing trunk group identification) to endpoints on H.323 VoIP networks. Provides enhanced call-routing and address-translation services. Upgrades the gatekeeper to comply with H.323 Version 3. VoIP Gateway Trunk and Carrier Based Routing Enhancements Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Configuring H.323 Gateways section on page 41 of this guide
VoIP Gatekeeper Trunk and Carrier Based Routing Enhancements VoIP Gateway Trunk and Carrier Based Routing Enhancements VoIP Outgoing Trunk Group ID and Carrier ID for Gateways and Gatekeepers
12.2(8)T
Gatekeeper Transaction Message Protocol Interface Resiliency Enhancement Cisco H.323 Scalability and Interoperability Enhancements for Gatekeepers Cisco H.323 Scalability and Interoperability Enhancements for Gateways H.323 Version 2 Enhancements
12.2(4)T
Upgrades the gateway to comply with Configuring H.323 H.323 Version 3. Gateways section on page 41 chapter of this guide Upgrades Cisco IOS software to comply with the mandatory requirements and several optional features of the version 2 specification. Enhances the existing VoIP gateway and multimedia conference manager gatekeeper and proxy.
Basic H.323 Setup and Management on page 23 of this guide Configuring H.323 Gateways on page 41 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide
Configuring H.323 Provides a secure mechanism for authenticating and authorizing H.323 Gatekeepers and Proxies on page 137 of this guide calls from other administrative domains. Provides a potentially faster gatekeeper LRQ response when an LRJ response is received while the gatekeeper is sending sequential LRQs. Configuring H.323 Gatekeepers and Proxies on page 137 of this guide
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List
Table 1
Release
12.2(2)T
Features Introduced1 Call Admission Control for H.323 VoIP Gateways H.323 Call Redirection Enhancements
Feature Description Provides call-admission control for voice gateways. Indicates the nature of a call redirection and provides a nonstandard method for using the message to effect call transfer. Facilitates carrier-class reliability, security, and performance. Allows embedded IP addresses to be inspected for potential address translation. Allows a gateway to move between gatekeepers during GRQ and RRQ messages.
Feature Documentation Trunk-Management Features Call Admission Control for H.323 VoIP Gateways Basic H.323 Setup and Management on page 23 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Configuring H.323 Gatekeepers and Proxies on page 137 of this guide Basic H.323 Setup and Management on page 23 of this guide
12.1(1)T
Basic H.323 Setup and Provides redundant billing information to an alternate gatekeeper Management on page 23 of this guide if the primary gatekeeper becomes unavailable.
1. Features that are introduced in a particular release are available in that and subsequent releases.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
Cisco IOS H.323 Feature Roadmap Cisco IOS H.323 Feature List
H.323 Overview
This chapter provides an overview of the ITU- H.323 standard for sending and receiving audio, video, and data on an IP-based internetwork.
Note
For more information about Cisco IOS voice features, see the entire Cisco IOS Voice Configuration Libraryincluding library preface and glossary, feature documents, and troubleshooting informationat http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vcl.htm.
Contents
Prerequisites for Configuring an H.323 Network, page 7 Restrictions for Configuring an H.323 Network, page 8 Information About H.323, page 10
Network Components, page 11 Discovery and Registration, page 15 Call Setup, page 16 Call Termination, page 17 H.323 Standards, page 10 Security, page 18
Establish a working IP network. For information on IP configuration, see the references listed in the Related Documents section on page 19. Install the appropriate voice network module and voice-interface card for the Cisco router. For information on the module and card, see the Voice Network Module and Voice Interface Card Configuration Note that came with the voice network module. Configure your H.323 gateways, gatekeepers, and proxies. For information on VoIP configuration, see the resources in the Related Documents section on page 19.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
To ensure network security, configure a RADIUS authentication, authorization, and accounting (AAA) server. Configure the following information in your CiscoSecure AAA server:
In the /etc/raddb/clients file, ensure that the following information is provided:
#Client Name #----------gk215.cisco.com Key ------------------testing123
Configure an NTP server for your network. For gatekeeper-management statistics, do the following:
Configure the Simple Network Management Protocol (SNMP) agent in global configuration
mode.
Update the MIB data files on your management workstations so that the management
H.323 Version 2 Restrictions, page 8 H.323 Signaling Enhancement Restrictions, page 9 Source Call Signal Address and H.245 Empty Capabilities Set Restrictions, page 9 Call Transfer Restrictions, page 10 Ecosystem Gatekeeper Interoperability Restrictions, page 10
All systems must be running either Cisco IOS Release 11.3(9)NA and later releases or Cisco IOS Release 12.0(3)T and later releases to interoperate with the Cisco H.323 Version 2 features. Earlier releases contain H.323 Version 1 software that does not support protocol messages that have an H.323 Version 2 protocol identifier. The earlier releases do not interoperate with Cisco H.323 Version 2 Phase 2 features. To use H.450 services (call transfer or call deflection), use Cisco IOS Release 12.1(1)T or later on the gatekeeper: H.450 on the gateways is incompatible with previous releases of the Cisco gatekeeper. If a Cisco AS5300 is used, the software requires the appropriate version of VCWare.
The H.323 Version 2 Fast Connect feature is not explicitly configurable. It is assumed that the gateway is capable of sending and receiving fast-connect procedures unless its corresponding dial peer is configured for RSVP (in other words, the req-qos is set to a value other than the default of best-effort). In the latter case, traditional slow connect procedures are followed, and the endpoint neither attempts to initiate fast connect nor responds to a fast-connect request from its peer.
Supplementary voice services are not supported with ISDN and CAS over an H.323 networkexcept on the NET5 switch. Progress messages require a PI value, and only ITU-T standards are supported. Progress indicator 2 is not supported in progress messages for the DMS100 switch. TCL 2.0 for IVR supports the interworking signaling enhancements only on the Cisco AS5300. For IVR on other Cisco platforms, select TCL 1.0 as the session application. To use standard IVR applications with TCL 1.0, configure the application name as session.t.old by using the call application voice command. It is not necessary to do this if customized scripts are used. The Cisco AS5300 sends a connect message to the originating gateway after it receives a setup message only when it is configured for one of the following supported switch types:
5ESS NET5 NTT QSIG QSIGP
For the SS7 interconnect for voice gateways solution, the following behavior applies to suspend and resume messages, which are supported on NET5 and NI2+ ISDN interfaces:
If the ISDN interface is NET5, the Cisco AS5300 sends a notify message with the notification
Cisco SC2200.
If the Cisco SC2200 receives an ISUP suspend or resume message, it sends an NI2+ suspend or
The Cisco AS5300 timer, T307, is configurable from 30 to 300 seconds. The Cisco SC2200 timer, T6, is not configurable and has a default of 120 seconds if the ISUP variant Q.761 is used.
When the Cisco AS5300 and the Cisco SC2200 receive a resume message, the timers are stopped. If either of the timers expires, the call is released with a cause code of normal clearing.
Source Call Signal Address and H.245 Empty Capabilities Set Restrictions
To use H.450 services (call transfer or call deflection), Cisco IOS Release 12.1(2)T of the gatekeeper must be used. H.450 on the gateways is incompatible with previous releases of the Cisco gatekeeper. If a Cisco AS5300 is used, the system requires the appropriate version of VCWare.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
Interactive Voice Response (IVR) must be configured on the router and supplementary services must be provided for processing. For information about configuring IVR and supplementary services, see Configuring Interactive Voice Response for Cisco Access Platforms. The session application must be specified properly for the dial-peers. Release 12.1(1)T (or later) of the Cisco H.323 Gatekeeper is required. The H.323 Call Redirection Enhancements feature does not provide the ability for a Cisco H.323 Gateway to initiate a call transfer request.
The maximum number of alternate gatekeepers is eight (including static gatekeepers). During the retransmission of the GRQ or RRQ messages, the gateway responds only to the current gatekeeper (regardless of the state of the altGKisPermanent flag). The process of retransmission to an alternate gatekeeper can be time-consuming.
H.323 Standards, page 10 Network Components, page 11 Discovery and Registration, page 15 Call Setup, page 16 Call Termination, page 17 Security, page 18
H.323 Standards
Table 2 lists H.323 standards and applicable Cisco VoIP features.
10
Table 2
Standard
H.323 Version 1
Multimedia conferencing protocol which includes voice, video, and data conferencing for use over packet-switched networks Provides a framework that uses others to describe the actual protocol
H.245 conference-control protocol H.225 call signaling and communication between endpoints (call signaling)
Improved gateway selection process Gateway resource availability reporting Support for single proxy configurations Registration of E.164 addresses for gateway-attached devices Tunneling of redirecting number information element DTMF-relay Hookflash relay CODEC negotiation Caller ID Language preference Annex EProtocol for Multiplexed Call Signaling Transport Annex FSimple Endpoint Type Annex GCommunication Between Administrative Domains Gateway decomposition Additive registrations Dynamic zone prefix registration Alternate gatekeepers Endpoint capacity
H.323 Version 3
H.323 Version 4
1. To learn about restrictions that apply to Version 2, see the H.323 Version 2 Restrictions section on page 8.
Network Components
Figure 1 shows a typical H.323 network. Network components are described below.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
11
Figure 1
Corporate LAN
Router
Gateway
H.320 terminal (over ISDN) H.324 terminal (over POTS) Speech only (telephone)
60537
H.323 terminal
H.323 Terminals
An H.323 terminal is an endpoint in the network that provides for real-time, two-way communications with another H.323 terminal, gateway, or multipoint control unit (MCU). The communications consist of control, indications, audio, moving color video pictures, or data between the two terminals. A terminal may provide audio only; audio and data; audio and video; or audio, data, and video. The terminal can be a computer-based video conferencing system or other device. A gatekeeper supports a broad variety of H.323 terminal implementations from many different vendors. These terminals must support the standard H.323 Registration, Admission, and Status (RAS) protocol to function with the gatekeeper. Gatekeepers recognize one of two types of terminal aliases, or terminal names:
H.323 IDs, which are arbitrary, case-sensitive text strings E.164 addresses, which are telephone numbers
If an H.323 network deploys interzone communication, each terminal should at least have a fully qualified e-mail name as its H.323 identification (ID), for example, [email protected]. The domain name of the e-mail ID should be the same as the configured domain name for the gatekeeper of which it is to be a member. As in the previous example, the domain name would be cisco.com.
Note
Some terminals have limited multipoint control built into them. These terminals may not require an MCU that includes all the functionality mentioned.
12
H.323 Gateways
An H.323 gateway is an endpoint on the LAN that provides real-time communications between H.323 terminals on the LAN and other ITU terminals on a WAN or to other H.323 gateways. Gateways allow H.323 terminals to communicate with devices that are running other protocols. They provide protocol conversion between the devices that are running different types of protocols. For example, Figure 2 shows a gateway between an H.323 terminal and a non-H.323 terminal.
Figure 2 Gateway Between an H.323 Terminal and an H.320 Terminal
H.323 gateway Protocol translation and media transcoding
H.323 Proxies
H.323 proxies are special types of gateways that relay H.323 calls to another H.323 endpoint. They can be used to isolate sections of an H.323 network for security purposes, to manage quality of service (QoS), or to perform special application-specific routing tasks.
H.323 Gatekeepers
An H.323 gatekeeper is an H.323 entity on the LAN that provides address translation and that controls access to the LAN for H.323 terminals, gateways, and MCUs. Gatekeepers are optional nodes that manage endpoints in an H.323 network. The endpoints communicate with the gatekeeper using the RAS protocol. Endpoints attempt to register with a gatekeeper on startup. When they wish to communicate with another endpoint, they request admission to initiate a call using a symbolic alias for the endpoint, such as an E.164 address or an e-mail address. If the gatekeeper decides that the call can proceed, it returns a destination IP address to the originating endpoint. This IP address may not be the actual address of the destination endpoint, but it may be an intermediate address, such as the address of a proxy or a gatekeeper that routes call signaling.
Note
Although the gatekeeper is an optional H.323 component, it must be included in the network if proxies are used. The Cisco gatekeeper provides H.323 call management, including admission control, bandwidth management, and routing services for calls in the network. The Cisco H.323-compliant Multimedia Conference Manager (MCM) is a subset of gatekeeper functionality available in a special image.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
13
Note
To learn about MCM and other special images, use Cisco Feature Navigator. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Figure 3 Cisco H.323/Gatekeeper Overview
H.323 Terminal
H.323 Terminal
Gatekeeper
MCU
Gateway
Internet
Intranet
PSTN
Speech
H.323 Terminal
52602
Alternate Gatekeepers
An endpoint that detects the failure of its gatekeeper can safely recover from that failure by utilizing an alternate gatekeeper for future requests, including requests for existing calls. A gateway can only be registered to a single GK at a time. Only one GK is allowed to manage a single zone. The cluster manages up to five similarly configured zones and shares resources between the alternate gatekeepers in the cluster for each zone. You can define up to 100 zones in a single GK.
Alternate Endpoints
A calling endpoint can recover from a call setup failure by sending a setup message to one of the alternate endpoints so that it is possible for a call to finish even if a gateway goes down and the gatekeeper is not yet aware of the problem. Cisco supports a maximum of 20 alternates for each endpoint, and any alternates received through registration, admission, and status protocol (RAS) messages are merged with those entered manually in the gatekeeper command-line interface. If more than 20 alternates are submitted, the total list of alternates reverts back to 20.
14
GKTMP Messages
The Gatekeeper Transaction Message Protocol (GKTMP) servers can set triggers for disengage request (DRQ) and resource availability indication (RAI) messages. Other messages are extended to contain more parameters for added call control.
Billing Information
The gatekeeper sends detailed call information to a RADIUS distributed client/server system that can be used for billing purposes. RADIUS servers use the vendor-specific attribute (VSA) capability to configure features for individual users.
Least-Cost Routing
Cost and priority fields are included with each remote zone definition, which ensures that the zones with lower cost are given an advantage over zones with higher cost.
Load Balancing
Load balancing allows the gatekeeper to move registered H.323 endpoints to an alternate gatekeeper or to reject new calls and registrations once a certain threshold is met.
Border Elements
Border elements (BE) exchange addressing information and participate in call authorization between the administrative domains. The BEs are often located with a gatekeeper. The BE can reduce the routing information passed though the network by aggregating address information.
Gatekeeper Zones
An H.323 endpoint is an H.323 terminal, gateway, or MCU. An endpoint can call and be called. H.323 endpoints are grouped into zones. Each zone has one gatekeeper that manages all the endpoints in the zone. A zone is an administrative convenience similar to a Domain Name System (DNS) domain. (Because a zone is, by definition, the area of control of a gatekeeper, the terms zone name and gatekeeper name are used synonymously in this chapter.)
Note
The maximum number of local zones defined in a gatekeeper should not exceed 100.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
15
Cisco IOS Network Address Translation (NAT) supports all H.225 and H.245 message types, including those sent in the RAS protocol.
Call Setup
In a typical H.323 call setup scenario, after RAS messages are exchanged, H.225 setup messages are sent over a control channel. For example, in Figure 4, both gateways are registered to the same gatekeeper, and the gatekeeper has chosen direct call signaling.
1. 2. 3. 4. 5. 6. 7.
Gateway 1 (the calling gateway) initiates the admission request (ARQ) (1)/admission confirmation (ACF) (2) exchange with that gatekeeper. The gatekeeper returns the call signaling channel address of Gateway 2 (the called gateway) in the ACF. Gateway 1 then sends the setup (3) message to Gateway 2 using that transport address. The setup is complete and the call is proceeding (4). If Gateway 2 wishes to accept the call, it initiates an ARQ (5)/ACF (6) exchange with the gatekeeper. The gatekeeper responses with ACF/ARJ (6). Gateway 2 sends an alerting (7) message to Gateway 1. (If Gateway 2 receives an admission reject [ARJ] (6) message instead of an ACF message, it sends a release complete message to Gateway 1 instead of the alerting message.) Gateway 2 responds with the connect (8) messege to Gateway 1
8.
Note
An H.245 control channel transport for use in H.245 signalling can send in any of the H.225 messeges: call proceeding, alerting, or connect.
Both Gateways Registered to the Same Gatekeeper
Figure 4
Gateway 1
ARQ (1)
ACF/ARJ (2) Setup (3)
Gatekeeper 1
Gateway 2
Call proceeding ARQ (5) ACF/ARJ (6) Aler ting (7) Connect (8)
(4)
16
56581
Fast connect allows endpoints to establish media channels without waiting for a separate H.245 connection to be opened. This streamlines the number of messages that are exchanged and the amount of processing that must be done before endpoint connections can be established. A high-level view of the fast-connect procedures within the H.323 protocol follows:
1.
The calling endpoint transmits a setup message containing the fastStart element that contains a sequence of encoded logical channel structures, each representing a different capability media type for both send and receive directions. The called endpoint selects one or more of the media types offered by the calling endpoint for the send and receive directions and returns its selections in a fastStart element in any H.225 message up to and including connect. At this point, the called endpoint must be prepared to receive media along any of the channels it selected. If H.245 procedures are needed and one or both of the endpoints do not support tunneling, a separate H.245 connection is used.
2.
3.
Fast connect is not explicitly configurable. All H.323 Version 2 VoIP endpoints are capable of initiating or accepting fast-connect calls. It is assumed that the gateway is capable of sending and receiving fast-connect procedures unless its corresponding dial peer has been configured for the Resource Reservation Protocol (RSVP). RSVP means the quality of service is set by the req-qos command to a value other than the default of best-effort. If the dial peer has been configured for RSVP, traditional slow connect procedures are followed, and the endpoint neither attempts to initiate fast connect nor responds to a fast-connect request from its peer. A terminating endpoint can reject fast connect by simply omitting the fastStart element from all H.225 messages up to and including connect. In this case, normal H.245 procedures are followed and a separate H.245 TCP connection is established. So, if an endpoint does not support the fast-connect procedures, normal H.245 procedures are followed. In addition, certain conditions can cause a fast-connect call to fall back to normal H.245 procedures to complete the call. Once a media connection has been opened (an audio path has been established), either endpoint has the option of switching to H.245 procedures (if they are needed) by using H.245 tunneling, whereby H.245 messages are encapsulated within the h245Control element of H.225 messages. The dtmf-relay command is the only H.245-cognizant command that can initiate H.245-tunneling procedures from a fast-connect call. If H.245 tunneling is active on the call, switching to a separate H.245 connection is not supported. A Cisco terminating endpoint accepts a fast-connect request only if a pair of symmetric codecs (codecs that in both directions are equivalent or identical) can be selected from a list that has been offered. The originating endpoint is constrained only by what it can send through the codec (or voice class codec list) associated with the dial peer. If the Cisco originating endpoint has offered multiple codecs and the terminating endpoint selects a pair of asymmetric (mismatched) codecs, the originating endpoint initiates separate H.245 procedures to correct the asymmetric codec situation. Fast connect is backward compatible with H.323 Version 1 configurations.
Call Termination
Either gateway may terminate a call in one of the following ways:
1. 2.
Discontinuing transmission of video at the end of a complete picture and then closes all logical channels for video. Discontinuing transmission of data and then closes all logical channels for data.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
17
3. 4. 5. 6. 7.
Discontinuing transmission of voice and then closes all logical channels for voice. Transmitting the H.245 endSessionCommand message in the H.245 control channel, indicating to the far end that it wishes to disconnect the call and then discontinues H.245 message transmission. Waiting to receive the endSessionCommand message from the other gateway and then closes the H.245 control channel. Sending a release complete message if the call signaling channel is open and the channel is closed. Clearing the call by using the procedures defined below.
An endpoint receiving an endSessionCommand message without first having transmitted it carries out steps 1 and 7 above, except that in Step 5, the gateway waits for the endSessionCommand message from the first endpoint. Terminating a call may not terminate a conference; a conference may be explicitly terminated using an H.245 message (dropConference). In this case, the gateways wait for the multipoint controller to terminate the calls as described. In networks that contain a gatekeeper, the gatekeeper needs to know about the release of bandwidth. After performing steps 1 to 6 in the preceding section, each endpoint transmits an H.225 disengage request (DRQ) message (3) to its gatekeeper as shown in Figure 5. The gatekeeper responds with a disengage confirm (DCF) message (4). After sending the DRQ message, the endpoints do not send further unsolicited information request response (IRR) messages that relate to that call to the gatekeeper. At this point, the call is terminated. Figure 5 shows the direct call model. The DRQ and DCF messages are sent on the RAS channel. Cisco IOS H.323 gateways will terminate a call if a TCP connection is closed while the call is in progress, or if a TCP connection error is detected when signaling message are sent or received.
Figure 5 Call Termination Direct Call Model
Gateway 1
Gatekeeper 1
EndSessionCom
Gateway 2
mand (1)
EndSession
Command (1
Security
Security for RAS protocol signaling between H.323 endpoints and gatekeepers is enhanced in H.323 Version 2 software by including secure endpoint registration of the Cisco gateway to the Cisco gatekeeper and secure per-call authentication. In addition, it provides for the protection of specific
18
56580
messages related to Open Settlement Protocol (OSP) and to other messages as required via encryption tokens. The authentication type is password with hashing as described in the ITU H.235 specifications. Specifically, the encryption method is to use the MD5 algorithm, with password hashing. This functionality is provided by the security token required-for command on the gatekeeper and the security password command on the gateway. The gatekeeper can interact with a RADIUS security server to perform the authentications. The gateway can also authenticate an external application by using the Gatekeeper Transaction Message Protocol (GKTMP) application programming interface (API). Per-call authentication is accomplished by validating account and pin numbers that are entered by the user connected to the calling gateway by using an IVR prompt. The security mechanisms described above require the gateway and gatekeeper clocks to be synchronized within 30 seconds of each other by using a Network Time Protocol (NTP) server.
Additional References
The following sections provide references related to H.323.
Related Documents
Related Topic Cisco IOS Voice Configuration Library documents, including library preface and glossary Cisco IOS commands Document Title
Cisco IOS Voice Configuration Library at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vcl.htm Cisco IOS Debug Command Reference, Release 12.3T at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123tcr/123dbr/index.htm Cisco IOS Dial Technologies Command Reference, Release 12.3 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/dial_r/ Cisco IOS Dial Technologies Command Reference, Release 12.3 T at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123tcr/123tdr/ Cisco IOS Voice Command Reference, Release 12.3T at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123tcr/123tvr/index.htm
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
19
Document Title
Cisco Gatekeeper External Interface Reference, Version 4.2 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 122/rel_docs/gktmp4_2/ Cisco IOS IP Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/ip_vcg.htm Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/sec_vcg.htm Cisco IOS SIP Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vvfax_c/callc_c/sip_c/sipc1_c/ Configuring AAA for Cisco Voice Gateways at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vvfax_c/add_c/acct_c/index.htm Quality of Service for Voice at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vvfax_c/vclqos.htm Cisco IOS Voice Troubleshooting and Monitoring Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vvfax_c/voipt_c/index.htm Trunk Connections and Conditioning Features at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 123/123cgcr/vvfax_c/vcltrunk.htm VoIP Gatekeeper Trunk and Carrier Based Routing Enhancements at http://www.cisco.com/univercd/cc/td/doc/product/software/ios 122/122newft/122t/122t11/ftgkrenb.htm
20
Related Websites
Related Topic Cisco IOS configuration examples Title and Location Cisco Systems Technologies website at http://cisco.com/en/US/tech/index.html
Note
From the website, select a technology category and subsequent hierarchy of subcategories, then click Technical Documentation > Configuration Examples.
Standards
Standards ITU-T E.164 ITU-T H.225 Version 2 ITU-T H.235 ITU-T H.323 ITU-T H.450 Title Overall network operation, telephone service, service operation and human factors Call signalling protocols and media stream packetization for packet-based multimedia communication systems Security and encryption for H-Series (H.323 and other H.245-based) multimedia terminals Packet-based multimedia communications systems Supplementary services for multimedia
MIBs
MIBs
MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs
CISCO-GATEKEEPER-MIB
RFCs
RFCs RFC 2833 Title RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
21
Technical Assistance
Description Technical Assistance Center (TAC) home page, containing 30,000 pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even more content. Link http://www.cisco.com/public/support/tac/home.shtml
22
Release 12.1(1)T
Release 12.2(15)T
Modification This feature was introduced, and the CISCO-GATEKEEPER-MIB was enhanced to display gatekeeper-management statistics.
Release 12.1(1)T
Modification This feature was introduced. This feature was integrated into this release. This feature was implemented on the Cisco AS5850. This feature was integrated into this release.
Modification This feature was introduced. Support was added for the Cisco AS5350 and Cisco AS5400. The call rscmon update-timer command was added. The call rscmon update-timer command was integrated into this release. Support for the Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
23
12.2(2)XB1 12.2(11)T
This feature was implemented on the Cisco AS5850. This features was integrated into this release.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note
For more information about these and other related Cisco IOS voice features, see the following:
H.323 Overview section on page 7 Entire Cisco IOS Voice Configuration Libraryincluding library preface and glossary, other feature documents, and troubleshooting documentationat http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vcl.htm.
Contents
Prerequisites for Basic H.323 Setup and Management, page 24 Restrictions for Basic H.323 Setup and Management, page 24 How to Set Up and Manage Basic H.323 Features, page 24
Managing Basic (Nonconfigurable) Gateway Features, page 24 Managing Basic (Nonconfigurable) Gatekeeper Features, page 36
24
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
H.323 Call Statistics, page 26 Source Call Signal Address, page 28 Tunneling of Redirecting Number Information Element, page 29 H.323 Call Redirection, page 30 Multizone Features, page 32 Codec Negotiation, page 32 H.245 Empty Capabilities Set, page 33 Lightweight Registration, page 34 H.450.2 Call Transfer, page 34 H.450.3 Call Deflection, page 34 Gateway Support for a Network-Based Billing Number, page 35 Answer Supervision Reporting, page 35
H.323 Signaling
When interworking with ISDN, with T-1 channel-associated signaling (CAS), and with E-1 R2 services from the PSTN, H.323 signaling enables VoIP networks to properly signal the setup and teardown of calls. In-band tones and announcements are generated as needed at the originating or terminating switch. When a tone is played at the destination switch, the backward voice path from the called party to the calling party is cut through early so that the calling party can hear the tone or announcement. To prevent fraudulent calls, the voice path is cut through in both directions only after the connect message is received from the destination. The call progress indicator, which signals the availability of in-band communication, is carried end to end as required when interworking with ISDN and CAS protocols. The H.323 signaling feature prevents unexpected behavior, such as early alerting (when an alert message is returned immediately after a call proceeding message is sent), to ensure that the calling party does not hear conflicting call progress information, such as a ringback tone followed by a busy tone, and does not miss hearing a tone or announcement when one should play. Support for network-side ISDN and reduction in the risk of speech clipping is also addressed. The H.323 signaling feature is dependent on Cisco H.323 gateways, gatekeepers, and VoIP features. H.323 signaling provides the following capabilities:
End-to-End Alerting, page 25 Cut-Through of Voice Path, page 26 H.245 Initiation, page 26 Overlap Dialing, page 26
End-to-End Alerting
Early alerting is prevented in these ways:
For calls that terminate at an ISDN switchThe terminating gateway sends an alert message to the originating gateway only after it receives an alert message from the terminating switch. For calls that terminate at a CAS switchThe terminating gateway sends a progress message, rather than an alert message, to the originating gateway after it receives a setup message.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
25
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
For calls that terminate at an ISDN switchThe terminating gateway performs backward cut-through when it receives an alert or progress message and full cut-through (both directions) when it receives a connect message. The originating gateway performs backward cut-through when it receives a call proceeding message and full cut-through when it receives a connect message. For calls that terminate at a CAS switchThe terminating gateway performs backward cut-through after it sends a progress message and full cut-through (both directions) when it receives an off-hook signal. The originating gateway performs backward cut-through when it receives a progress message and full cut-through when it receives a connect message.
Note
If the originating or terminating gateway sends a call proceeding message and then receives a call proceeding message with a progress indicator of 1, 2, or 8, the gateway converts this call proceeding message into a progress message with a corresponding PI.
H.245 Initiation
To avoid speech clipping, H.245 capabilities are now initiated at the originating gateway at the earliest possible moment, when the originating gateway receives a call proceeding message from the terminating gateway. Previously, call proceeding messages were not passed end to end across the VoIP network; H.245 was initiated only after the originating gateway received an alert message.
Overlap Dialing
To enhance overlap dialing, the call proceeding message is now passed transparently from the terminating switch to the originating switch if the originating switch does not include the sending complete information element in the setup message. The call proceeding message notifies the originating switch that the terminating switch has collected all dialed digits that are required to route the call. If the originating switch sends a sending complete IE, the originating gateway responds with a call proceeding message, and the session application drops the call proceeding message sent by the terminating switch.
Note
Using any of the debug cch323 commands could slow your system and flood the TTY if there is significant call traffic.
26
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
The enhancements to H.323-call-statistics commands do not affect Cisco H.323 configurations. Therefore, there are no configuration tasks in this document. To display and clear H.323 call statistics, use the following commands in privileged EXEC mode.
SUMMARY STEPS
1. 2. 3.
clear h323 gateway [cause-code stats | h225 | ras] show h323 gateway [cause-code stats | h225 | ras] debug cch323 {all | error | h225 | h245 | ras | rawmsg | session}
DETAILED STEPS
Command
Step 1
clear h323 gateway [cause-code stats | h225 | ras]
Example:
Router# clear h323 gateway
cause-code statsDisconnect cause-code stats counters h225H.225 counters rasRAS counters If this command is entered without any of the optional keywords, all counters are cleared. If the command is entered with an optional keyword, only counters associated with that keyword are cleared.
Note
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
27
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Command
Step 2
show h323 gateway [cause-code stats | h225 | ras]
Purpose Displays statistics for H.323 gateway messages that have been sent and received and displays the reasons for which H.323 calls have been disconnected. Keywords are as follows:
Example:
Router# show h323 gateway
cause-code statsDisplays the disconnect cause codes that the H.323 subsystem has received. A disconnect can originate either from the far-end gateway or from the opposite call leg on the local gateway. h225Lists cumulative counts of the number of H.225 messages that have been sent and received since the counters were last cleared. rasLists the counters for RAS messages that have been sent to and received from the gatekeeper. If this command is entered without any of the optional keywords, all counters are displayed. If the command is entered with an optional keyword, only counters associated with that keyword are displayed.
Note
Step 3
Provides debug output for various components within the H.323 subsystem. Keywords are as follows:
allEnables all debug cch323 commands. errorTraces errors encountered in the H.323 subsystem and can be used to help troubleshoot problems with H.323 calls. h225Traces the state transition of the H.225 state machine on the basis of the processed event. h245Traces the state transition of the H.245 state machine on the basis of the processed events. rasTraces the state transition of the RAS state machine on the basis of the processed events. rawmsgTroubleshoots raw message buffer problems. sessionTraces general H.323 events and can be used to troubleshoot H.323 problems.
Example:
Router# debug cch323 all
To learn about restrictions that apply, see the Source Call Signal Address and H.245 Empty Capabilities Set Restrictions section on page 9. Source call signal address allows a source call-signal address field to be included in the ARQ.
28
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Previously, in the Cisco IOS implementation of H.323 gateway software, if the terminating gateway was registered to an H.323 gatekeeper and used RAS, the ARQ message sent for each incoming call did not contain the H.225 source call signal address (CSA). The source CSA is an optional parameter in the ARQ message. The source CSA is also an optional parameter in the H.225 call setup message sent by the originating endpoint. source call signal address also allows for the source CSA parameter to be included in the ARQ message, as illustrated by the message sequence shown in Figure 6.
Figure 6
EP1 ARQ ACF Setup Message with SrcCSA1 (SrcCSA = IP Addr. of EP1 + dynamic Port) Call Proceeding ARQ with SrcCSA1
28906
ACF GK2
In the message sequence shown in Figure 6, the ARQ messages are enhanced to send the source CSA. The originating gateway (EP1) sends the H.225 setup message to the destination gateway. The setup message contains the source CSA parameter, which is the combination of the IP address of the originator and the dynamic TCP port number used or obtained for the H.225 call signaling channel. If the terminating gateway (EP2) accepts the call upon receipt of the setup message, the gateway sends an ARQ message to the gatekeeper. The terminating gateway retrieves the source CSA parameter sent by the originating gateway in the setup message. It then sends an ARQ message to the gatekeeper with the source CSA parameter. The CSA parameter is optional and has the same value as the source CSA in the received setup message. If the setup message does not contain the source CSA parameter, the terminating gateway determines the source CSA by using the H.225 call-signaling TCP socket connection of the peer endpoint, which it uses in the ARQ message. If the originating gateway is registered to a gatekeeper and RAS is used as the session target, the originating gateway also sends an ARQ message. This ARQ does not include the optional source CSA parameter.
Destination number (DN) that was originally called Reason for the call being redirected Other related information
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
29
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
H.323 Version 2
H.323 Version 2 gateway passes the entire RDN or OCN IE from an incoming PRI message into the H.225 SETUP message. The IE is encapsulated in the nonStandardData field within the user-to-user information element (UUIE) of the H.225 SETUP message. The nonStandardData field can contain the encapsulated RDN or OCN IE and a tunneled global, signaling, and control standard QSIG message, or it can contain only the OCN or RDN. Cisco and other third-party H.323 endpoints can access the redirected information by decoding the nonStandardData field. In accordance with the H.225 specification, the nonStandardData is ignored by third-party endpoints and causes no interoperability problems. For redirected PRI calls that are routed to a Cisco gateway, that are sent using H.323 to another Cisco gateway, and that exit the gateway using PRI, the RDN/OCN IE is tunneled from the source gateway to the destination gateway. The incoming PRI setup message is tunneled through H.225 and is encoded into the outgoing PRI setup message by the destination gateway. Tunneling the RDN or OCN IE is important for applications such as Unified Messaging servers that need to know the telephone number that was originally dialed so as to access the correct account information.
H.323 Version 4
H.323 Version 4 introduces a standard-based RDN IE in the H.225 SETUP message in Cisco IOS Release 12.3(11)T. The RDN IE is sent as a Q.931 IE in the H.225 SETUP message. The nonStandardData RDN and OCN IE are still supported for backward compatibility. When both H.225 Q.931 RDN IE and nonStandardData IE are received, the RDN in the H.225 Q.931 is decoded and the nonStandardData is not decoded.
The gateway receives a facility message with routeCallToGatekeeper as a response to its H.225 SETUP message. Upon receiving the Facility message, the Cisco H.323 gateway attempts to route the call to the new gatekeeper, using the new IP address specified in the alternativeAddress field of the facility message.
If the IP address is not available, the gateway ignores the facility message and sends a release
complete toward the original destination end-point. The release complete message contains a ReleaseCompleteReason of facilityCallDeflection.
If the IP address is available, the gateway sends a disengage request (DRQ) message to the
gatekeeper and waits for the disengage confirmation (DCF) message before it sends the SETUP message to the new destination gatekeeper.
During the admission request (ARQ) phase of a call, a gatekeeper might determine that a call, which has come through an intermediate gateway, needs to be routed to another gatekeeper. The gatekeeper sends an admission rejection (ARJ) message with a RejectReason of routeCallToGatekeeper to the gateway. Upon receiving the message, the intermediate Cisco H.323 gateway sends a Facility
30
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
message to the originator of the SETUP message. This message indicates that the SETUP message should be sent to another address. (The gateway includes the callSignalAddress from ARJ in the alternativeAddresss field of the Facility message.) Upon receiving the Facility message, the calling gateway terminates the initial call and sends a new SETUP message to the specified gatekeeper, using the new IP address specified in the alternativeAddress field of the facility message. If the callSignalAddress is not provided, the gateway does not send the Facility message and the call is terminated without any rerouting.
Call Forward
In certain cases, an H.323 endpoint might determine that a call needs to be forwarded. The endpoint then sends a Facility message to the gateway with a facilityReason of callForwarded. This message includes the address of the new destination (either an alternativeAddress or alternativeAliasAddress). Upon receiving the Facility message, the Cisco H.323 gateway sends a release complete to the original destination endpoint and initiates a new call using the new destination address supplied in the Facility message. The release complete message contains a ReleaseCompleteReason of facilityCallDeflection. If the gateway is registered with a gatekeeper, the gateway sends a DRQ to the gatekeeper and waits for the DCF before sending a setup message to the destination gatekeeper. The Facility message must contain an E.164 address in the alternativeAliasAddress field. If no address is included, the Facility message is ignored. The E.164 is required because the call forwarding process initiates a new call, which may be subject to authentication processes that can handle only E.164 addresses. If the Facility message contains both and IP address (in the alternativeAddress field) and an E.164 address (in the alternativeAliasAddress field), the gateway first attempts to find a match for the new E.164 and the dial-peer. If there is no match, the gateway uses the same incoming peer to determine if there is a matching peer to reroute the call. If there is no match to the incoming peer, the message is ignored.
Call Transfer
Note
To learn about restrictions that apply, see the Call Transfer Restrictions section on page 10. If a Facility message with a facilityReason of callForwarded is received after the call has been accepted, it is considered a call transfer. In this case, the Cisco H.323 gateway places the call on hold and initiates a new call using the address (alternativeAddress or alternativeAliasAddress) supplied in the Facility message. As with call forwarding, the Facility message must contain an E.164 address in the alternativeAliasAddress field. If no address is included, the Facility message is ignored. The E164 is required because the call forwarding process initiates a new call, which may be subject to authentication processes that can handle only E.164 addresses. If the Facility message contains both and IP address (in the alternativeAddress field) and an E.164 address (in the alternativeAliasAddress field), the gateway first attempts to find a match for the new E.164 and the dial-peer. If there is no match, the gateway uses the same incoming peer to determine if there is a matching peer to reroute the call. If there is no match to the incoming peer, the message is ignored. Unlike in call forwarding case, the Facility message is accepted by both the called side and the originating side.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
31
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Note
Multizone Features
Cisco multizone software enables the Cisco gateway to provide information to the gatekeeper using additional fields in the RAS messages. The gatekeeper no longer terminates a call if it is unable to resolve the destination E.164 phone number with an IP address. Previously, the source gateway attempted to set up a call to a destination IP address as provided by the gatekeeper in an admission confirm (ACF) message. If the gatekeeper was unable to resolve the destination E.164 phone number to an IP address, the incoming call was terminated. Multizone software allows a gatekeeper to provide additional destination information and modify the destinationInfo field in the ACF message. The gateway includes the canMapAlias-associated destination information in setting up the call to the destination gateway. The gatekeeper indicates to the gateway that the call should be destined to a new E.164 number by sending an ACF message with an IP address of 10.0.0.0 in the destCallSignalAddress field and the new destination E.164 phone number in the destinationInfo field. The gateway that receives such an ACF falls back to routing the call on the basis of this new E.164 address and performing another lookup of the configured dial plan for the gateway. If the gateway routes the call on the basis of the new E.164 address, the call might be routed back to the PSTN or to an H.323 endpoint.
Codec Negotiation
Codec negotiation allows the gateway to offer several codecs during the H.245 capability exchange phase and to ultimately settle on a single common codec during the call establishment phase. Offering several codecs increases the probability of establishing a connection because there is a greater chance of overlapping voice capabilities between endpoints. Normally, only one codec can be specified when a dial peer is configured, but codec negotiation allows a prioritized list of codecs associated with a dial peer to be specified. During call establishment, the router uses the highest-priority codec from the list that it has in common with the remote endpoint. It also adjusts to the codec selected by the remote endpoint so that a common codec is established for both the receive and send voice directions. When a call is originated, all the codecs associated with the dial peer are sent to the terminating endpoint in the H.245 terminal capability set message. At the terminating endpoint, the gateway advertises all the codecs that are available in firmware in its terminal capability set. If there is a need to limit the codecs advertised to a subset of the available codecs, a terminating dial peer must be matched that includes this subset. The incoming called-number command in dial peer configuration mode can be used to force this match. Supported codecs (Table 3) are available for use with Cisco H.323 Version 2 software.
Table 3 Codec Default Packet Size
32
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Table 3
Codecs G.723ar63 G.723ar53 G.726r32 G.726r24 G.726r16 G.728 G.729br8 G.729r8 pre-ietf G.729r8
Range (bytes) 24240 20240 20240 15240 10240 10240 10240 10240 10240
Default (bytes) 24 20 40 30 20 10 20 20 20
Note
A separate codec for G.729 Annex B is included, which adds Annex B functionality to G.729. A separate codec for G.723.1 Annex A adds Annex A functionality to G.723.1. The Annex B functionality added to G.729 and the Annex A functionality added to G.723.1 are the built-in, codec-specific voice-activated detection/calling tone (VAD/CNG) functions.
To learn about restrictions that apply, see the Source Call Signal Address and H.245 Empty Capabilities Set Restrictions section on page 9. Empty capabilities set support is a mandatory part of the H.323 Version 2 standard. It is used by applications to redirect the voice media stream. This feature is particularly useful for applications such as the following:
Selsius IP phones, which rely on a hub or call manager to direct the media stream to IP phones. Unified messaging for which it is desirable to redirect the media stream to various message servers for message playout.
The empty capabilities set feature was added to provide a way to redirect RTP streams. The RTP streams are redirected as follows:
The sequence starts with the an empty capabilities set being received at an endpoint. After an open logical channel (OLC) is established (or if in the middle of this process) one of the endpoints sends an empty capabilities set message. When the empty capabilities set message is received, the other endpoints close the logical channel if any was opened with that endpoint and move to a pause state, waiting for a nonempty capability set message.
After receiving the nonempty capabilities set message, the endpoint moves to the beginning of Phase B, which is the initial communication and capabilities exchange, as described in H.323 Version 3 (June 1999), item 8.4.6.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
33
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
In other words, the exchange of the capabilities message determines a master/slave relationship, and a new OLC message is created to open a new logical channel with another endpoint. From this point on, the RTP streams are sent to the new endpoint.
Lightweight Registration
Before the release of its H.323 Version 2 software, Cisco gateways reregistered with the gatekeeper every 30 seconds. Each registration renewal used the same process as the initial registration, even though the gateway was already registered with the gatekeeper. These registration renewals generated considerable overhead at the gatekeeper. Cisco H.323 Version 2 software defines a lightweight registration procedure that still requires the full registration process for initial registration but that uses an abbreviated renewal procedure to update the gatekeeper and minimize overhead. Lightweight registration requires each endpoint to specify a time-to-live (TTL) value in its registration request (RRQ) message. When a gatekeeper receives an RRQ message with a TTL value, it returns an updated TTL timer value in a registration confirmation (RCF) message to the endpoint. Shortly before the TTL timer expires, the endpoint sends an RRQ message with the KeepAlive field set to TRUE, which refreshes the existing registration. It is not required that an H.323 Version 2 endpoint indicate a TTL in its registration request. If the endpoint does not indicate a TTL, the gatekeeper assigns one and sends it to the gateway in the RCF message. No configuration changes are permitted during a lightweight registration, so all fields other than the endpointIdentifier, gatekeeperIdentifier, tokens, and TTL are ignored. In the case of H.323 Version 1 endpoints that cannot process the TTL field in the RCF, the gatekeeper probes the endpoint with information requests (IRQs) for a predetermined grace period to see if the endpoint is still alive.
Note
Certain devices are limited in their support of H.450. The Cisco 1700 and Cisco uBR820 platforms do not support IVR. Therefore, these platforms are not able to act as H.450 transferring endpoints. H.450.2 specifies two variants of call transfer:
Transfer without consultationThe transferring endpoint supplies the number of the transferred-to endpoint as part of the transfer request, and the two remote endpoints are transferred together. A Cisco gateway cannot be the transferring endpoint. Transfer with consultationThis feature is not currently supported.
34
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
If the deflecting endpoint is a Cisco gateway, the telephony endpoint on the PRI of the deflecting gateway invokes call deflection by sending an equivalent QSIG reroute invoke request within a FACILITY message to the gateway. The deflecting gateway then uses the procedures outlined in the H.450.3 call deflection standard to transfer the call to another endpoint. Note that the initiation of deflection using QSIG reroute invoke is valid only on calls that arrived as H.323 calls at the deflecting gateway. In other words, for calls that arrive at the gateway through a telephony interface (such as a hairpin call) or by using a non-H.323 IP protocol, QSIG reroute invoke is ignored. Cisco H.323 Version 2 software does not support gatekeeper-controlled or gatekeeper-initiated call deflection.
Note
Certain devices are limited in their support of the H.450 standard. The Cisco AS5800 is not able to convert QSIG to H.450. The Cisco 1700 and Cisco uBR820 do not support IVR. Therefore, these devices are not able to act as H.450 deflecting endpoints.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
35
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Gateway-to-Gatekeeper Billing Redundancy, page 36 Ecosystem Gatekeeper Interoperability, page 36 Gatekeeper-Management Statistics, page 38
To learn about restrictions that apply, see the Ecosystem Gatekeeper Interoperability Restrictions section on page 10. Ecosystem gatekeeper interoperability adds support for the alternate gatekeeper field (altGKInfo) in the gatekeeper rejection (GRJ), registration rejection (RRJ), and admission rejection (ARJ) messages. This allows a gateway to move between gatekeepers during the GRQ, RRQ, and ARQ phases. There is no need for gateway reconfiguration or for a gatekeeper failover in the gateway. Gateways can be configured to switch from their primary gatekeeper to an alternate gatekeeper if a failure or outage occurs. If an outage occurs and gateways move from one gatekeeper to another, there may be an imbalance in the number of gateways registered to each gatekeeper. The ecosystem gatekeeper interoperability feature helps to restore the balance (when the outage has been corrected) by allowing some of the gateways to be moved back to their proper gatekeepers. The altGKInfo consists of two subfields: the alternateGatekeeper and the altGKisPermanent flag. The alternateGatekeeper is the list of alternate gatekeepers. The altGKisPermanent is a flag that indicates whether the gatekeepers in the associated alternateGatekeeper field are permanent or temporary.
If the current state of the altGKisPermanent flag is TRUE, the new altGKInfo of any RAS message received from one of the alternate gatekeepers is accepted and the new list replaces the existing list. If the current state of the altGKisPermanent flag is FALSE, the altGKInfo of any RAS message received from one of the alternate gatekeepers is ignored.
If the current permanent gatekeeper becomes nonresponsive and the altGKisPermanent flag is set to FALSE, the gateway sets the internal state of the altGKisPermanent flag to TRUE. This allows the gateway to accept the alternate gatekeeper list from one of the gatekeepers in the existing alternate gatekeeper list.
36
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
The handling of the altGKInfo field varies depending on whether it is included in a GRJ or an RRJ message.
If the state of the altGKisPermanent flag is TRUE and the state of the needToRegister flag is NO, the gateway retransmits the full RRQ to an alternate gatekeeper for full RRQs and a lightweight RRQ for lightweight RRQs. If the state of the altGKisPermanent flag is TRUE and the state of the needToRegister flag is YES, the gateway retransmits the full RRQ to an alternate gatekeeper for full RRQs and lightweight RRQs. If the state of the altGKisPermanent flag is FALSE and the state of the needToRegister flag is NO, the gateway retransmits a lightweight RRQ for lightweight RRQs and nothing for full RRQs. If the state of the altGKisPermanent flag is TRUE and the state of the needToRegister flag is YES, the gateway does not retransmit the RRQ.
If the gateway receives an RRJ message without the AltGKInfo field, it accepts the rejection and returns to the GRQ phase. If the state of the altGKisPermanent flag is FALSE, the gateway sends the GRQ message to the original gatekeeper that sent the first RRJ. If the state of the altGKisPermanent flag is TRUE, the gateway sends the GRQ to the current gatekeeper. If the current state of the altGKisPermanent flag is TRUE, then the next RAS message is sent to the new gatekeeper. Otherwise, the next RAS message is sent to the original gatekeeper. If the gateway exhausts the list of alternate gatekeepers without receiving any response from an alternate gatekeeper, the gateway returns to the GRQ phase.
Note
For more information on the Cisco ecosystem gatekeeper interoperability feature, see the Configuring Alternate-Gatekeeper Support section on page 65.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
37
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
Gatekeeper-Management Statistics
Performance-management parameters provide gatekeeper-management statistics that may be used to monitor a network and troubleshoot problems on the network. Parameters provide statistics such as the following:
Number of calls that originate and terminate from a specific location Number of ongoing calls Aggregate messaging information per zone Equipment behavior Registration and unregistration information Counter information (such as location requests [LRQs]) to gauge the level of activity
Statistics are counted when the Registration, Admission, and Status (RAS) messages are sent and received by the gatekeeper. They are in raw form and reflect only a count of messages. Retries or retransmissions are not counted. There are two ways to monitor gatekeeper-management statistics:
Using the MIB moduleThe MIB module consists of a repository of characteristics and parameters that support the gatekeeper function. The MIB gathers statistics and responds to queries as specified by the Simple Network Management Protocol (SNMP). SNMP operations are supported on the object identifiers (OIDs) for the managed objects. These OIDs can configure, manage, or analyze aspects of SNMP operation. Gatekeeper-management statistics are supported by the CISCO-GATEKEEPER-MIB; parameters for this MIB are shown in a table that you can access on your network management station. Using the command-line interface as in the following steps.
Prerequisites
Perform the prerequisite tasks listed in the Prerequisites for Configuring an H.323 Network section on page 7.
SUMMARY STEPS
1. 2. 3.
show gatekeeper performance stats clear h323 gatekeeper statistics show h323 gatekeeper statistics aggregate
38
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
DETAILED STEPS
Command or Action
Step 1
show gatekeeper performance stats
Purpose Displays performance statistics gathered from the gatekeeper that include per-gatekeeper and per-zone-level statistics, counters, and other gatekeeper-management statistics. Clears the counters of H.323 gatekeeper statistics.
Example:
Router# show gatekeeper performance stats
Step 2
Example:
Router# clear h323 gatekeeper statistics
Step 3
Example:
Router# show h323 gatekeeper statistics aggregate
Displays the system statistics since it was started, regardless of whether or not the counters have been cleared. Without the aggregate keyword, the counters reflects the activity since the last clear command.
Examples
The following sample output displays BASIC gatekeeper-management statistics.
Router# show gatekeeper performance stats -----Gatekeeper Performance Statistics----Performance statistics captured since: 00:17:00 UTC Mon Mar 1 1993 Gatekeeper level Admission Statistics: ARQs received: 1 ARQs received from originating endpoints: 0 ACFs sent: 1 ACFs sent to the originating endpoint: 0 ARJs sent: 0 ARJs sent to the originating endpoint: 0 ARJs sent due to overload: 0 Number of concurrent calls: 0 Number of concurrent originating calls: 0 Gatekeeper level Location Statistics: LRQs received: 1 LRQs sent: 0 LCFs received: 0 LCFs sent: 1 LRJs received: 0 LRJs sent: 0 LRJs sent due to overload: 0 Gatekeeper level Registration Statistics: RRJ due to overload: 0 Total Registered Endpoints: 1 Gatekeeper level Disengage Statistics: DRQs received: 1 DRQs sent: 0 DCFs received: 0 DCFs sent: 1
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
39
Basic H.323 Setup and Management How to Set Up and Manage Basic H.323 Features
The following CUMULATIVE sample output is the same as for BASIC output; the difference is that the BASIC counters are cleared by the clear h323 gatekeeper statistics command, and CUMULATIVE counters are not.
Router# show gatekeeper performance stats zone name voip3-2600-2 Performance statistics for zone voip3-2600-2
-----Zone Level Performance Statistics----Performance statistics captured since: 00:17:00 UTC Mon Mar 1 1993 Zone level Admission Statistics: ARQs received: 1 ARQs received from originating endpoints: 0 ACFs sent: 1 ACFs sent to the originating endpoint: 0 ARJs sent: 0 ARJs sent to the originating endpoint: 0 Number of concurrent total calls: 0 Number of concurrent originating calls: 0 Zone level Location Statistics: LRQs received: 1 LRQs sent: 0 LCFs received: 0 LCFs sent: 1 LRJs received: 0 LRJs sent: 0 Zone level Registration Statistics: Full RRQs received: 1 Light RRQs received: 574 RCFs sent: 576 RRJs sent: 0 Total Registered Endpoints: 1 Zone level UnRegistration Statistics: URQs received: 0 URQs sent: 0 UCFs received: 0 UCFs sent: 0 URJs received: 0 URJs sent: 0 URQs sent due to timeout: 0 Zone level Disengage Statistics: DRQs received: 1 DRQs sent: 0 DCFs received: 0 DCFs sent: 1 DRJs received: 0 DRJs sent: 0
40
Release 12.2(11)T
Feature History for Cisco H.323 Scalability and Interoperability Enhancements for Gatekeepers
Modification This feature was introduced. This feature was integrated into this release. This feature was implemented on the Cisco AS5850. This feature was integrated into this release.
Feature History for Gateway Codec Order Preservation and Shutdown Control
Release 12.3(1)
Feature History for H.323 Dual Tone Multifrequency Relay Using Named Telephone Events
Release 12.2(2)XB
Modification The Dual Tone Multifrequency Relay for SIP Calls Using Named Telephone Events feature was introduced. The Media Gateway Control Protocol-Based Fax (T.38) and Dual Tone Multifrequency (IETF RFC 2833) Relay feature was also introduced. H.323 support for DTMF relay was added.
12.2(11)T
Modification This feature was introduced. Support was added for the Cisco AS5350 and Cisco AS5400. The call rscmon update-timer command was added.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
41
12.2(4)T
The call rscmon update-timer command was integrated into this release. Support for the Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included. This feature was implemented on the Cisco AS5850. This feature was integrated into this release.
12.2(2)XB1 12.2(11)T
Modification This feature was introduced. The ras rrq dynamic prefixes and the rrq dynamic-prefixes-accept commands were modified to be disabled by default. This feature was integrated into this release. The terminal-alias-pattern command was introduced to send the gateway priority along with dynamic zone prefixes from the gateway.
Feature History for Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
Release 12.3(7)T
Feature History for H.323 VoIP Call Preservation Enhancements for WAN Link Failures
Modification This feature was introduced. This feature was integrated into this release.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note
For more information about these and other related Cisco IOS voice features, see the following:
H.323 Overview section on page 7 Entire Cisco IOS Voice Configuration Libraryincluding library preface and glossary, other feature documents, and troubleshooting documentationat http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcg/vcl.htm.
42
Contents
Prerequisites for Configuring H.323 Gateways, page 43 Restrictions for Configuring H.323 Gateways, page 43 How to Configure H.323 Gateways, page 43 Configuration Examples for H.323 Gateways, page 119 Additional References, page 135
Note
For complete descriptions of the commands used in this chapter, see the command references listed in the Additional References section on page 135.
Perform the prerequisites that are listed in the Prerequisites for Configuring an H.323 Network section on page 7. Develop a network plan that details the requirements and characteristics of your VoIP network. For more information, see the documents in the Additional References section on page 19. Ensure that the routers you intend to configure as H.323 gateways are running a Cisco IOS software image that contains gateway functionality. To use H.323 security and accounting features, do the following:
These features use the H.235 standard. Because the standard is broad, ensure that the gatekeeper
provides H.235 functionality that specifically complements the gateway implementation described in this document.
The H.323 gateway sends accounting information using a nonstandard field in the ClearToken
field. Ensure that the gatekeeper can retrieve this information from the ClearToken field.
Configuring a Router Interface as a Gateway, page 44 Shutting Down and Enabling VoIP Services on a Gateway, page 46 Configuring Gateway RAS, page 48 Configuring E.164-Address Registration, page 56 Configuring In-Band Tones and Announcements, page 56 Configuring Gateway AAA, page 57
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
43
Configuring H.235 Gateway Security, page 57 Configuring Alternate-Gatekeeper Support, page 65 Configuring DTMF Relay, page 67 Configuring FXS Hookflash Relay, page 72 Configuring Multiple Codecs, page 74 Configuring Rotary Calling Pattern, page 75 Configuring H.323 Support for Virtual Interfaces, page 76 Configuring Annex G, page 77 Configuring H.225, page 87 Configuring the VoIP Transport Method, page 93 Configuring Zone Bandwidth Management, page 93 Configuring H.323 Version 4 Zone Prefix Registration, page 100 Configuring Call Admission Control, page 108 Configuring Trunk-Based and Carrier-Based Routing, page 108 Configuring Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks, page 108 Configuring H.323 VoIP Call Preservation Enhancements for WAN Link Failures, page 111
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
gateway exit ip cef interface type number [nametag] h323-gateway voip interface h323-gateway voip id gatekeeper-id {ipaddr ip-address [port] | multicast} [priority priority] h323-gateway voip h323-id interface-id h323-gateway voip tech-prefix prefix exit
44
DETAILED STEPS
Command
Step 1
gateway
Example:
Router(config)# gateway
Step 2
exit
Example:
Router(config-gateway)# exit
Step 3
ip cef
Example:
Router(config)# ip cef
Step 4
Example:
Router(config)# interface serial 0
Enters interface configuration mode for the interface that is connected to the gatekeeper. Keywords and arguments are as follow:
typeType of interface to be configured. numberPort, connector, or interface card number. The number is assigned at the factory at the time of installation or when added to a system and can be displayed with the show interfaces command. nametagLogic name to identify the server configuration so that multiple entries of server configuration can be entered.
Step 5
Example:
Router(config-if)# h323-gateway voip interface
Step 6
(Optional) Defines the name and location of the gatekeeper for this gateway. Keywords and arguments are as follows:
Example:
Router(config-if)# h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1719
gatekeeper-idH.323 identification of the gatekeeper. Must exactly match the gatekeeper ID in the gatekeeper configuration. Recommended format: name.domainname. ipaddr ip-addressIP address to be used to identify the gatekeeper. portPort number used. multicastGateway uses multicast to locate the gatekeeper. priority priorityPriority of this gatekeeper. Range: 1 to 127. Default: 127.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
45
Command
Step 7
h323-gateway voip h323-id interface-id
Purpose (Optional) Defines the H.323 name of the gateway, identifying this gateway to its associated gatekeeper. Usually this ID is the name of the gateway, with the gatekeeper domain name appended: name@domainname. (Optional) Defines the numbers used as the technology prefix that the gateway registers with the gatekeeper. Can contain up to 11 characters. Although not strictly necessary, a pound symbol (#) is frequently used as the last digit in a prefix. Valid characters: 0 to 9, #, and *. Exits the current mode.
Example:
Router(config-if)# h323-gateway voip h323-id name@domainname
Step 8
Example:
Router(config-if)# h323-gateway voip tech-prefix 1#
Step 9
exit
Example:
Router(config-if)# exit
show gateway Use this command to verify gateway configuration by displaying the current registration information and gateway status.
Router# show gateway
Shutting Down and Enabling VoIP Service, page 46 (optional) Shutting Down and Enabling VoIP Submodes, page 47 (optional) Verifying Gateway Status, page 48
SUMMARY STEPS
1. 2. 3.
46
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
no shutdown forced
Example:
Router(conf-voi-serv)# shutdown forced
Step 3
exit
Example:
Router(conf-voi-serv)# exit
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
47
Command or Action
Step 3
no call service stop forced maintain-registration
Purpose Shuts down or enables VoIP call services for the selected submode.
Example:
Router(conf-voi-serv)# call service stop maintain-registration
Step 4
exit
Example:
Router(conf-voi-serv)# exit
show gateway Use this command to display gateway status. The following example displays output after the gateway has been shut down:
Router# show gateway H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1 H.323 service is shutdown Gateway Router is not registered to any gatekeeper
The following example displays output after a graceful shutdown with calls in progress:
Router# show gateway H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1 H.323 service is shutting down Gateway Router is registered to Gatekeeper GK1
The following example displays output when H.323 call service has been shut down with the call service stop maintain-registration command:
Router# show gateway H.323 ITU-T Version: 4.0 H323 Stack Version: 0.1 H.323 service is shutdown Gateway Router is registered to Gatekeeper GK1
Configuring Basic RAS, page 49 Configuring RAS Retries and Timers, page 52 Configuring Gateway-Resource-Availability Reporting, page 55
48
Registration, Admission, and Status (RAS) signaling performs registration, admissions, status, and disengage procedures between the H.323 VoIP gateway and the H.323 VoIP gatekeeper. RAS tells the gatekeeper to translate a E.164 phone number of the session target into an IP address. In the RAS exchange between a gateway and a gatekeeper, a technology prefix is used to identify the specific gateway when the selected zone contains multiple gateways. The tech-prefix command is used to define technology prefixes. In most cases there is a dynamic protocol exchange between the gateway and the gatekeeper that enables the gateway to inform the gatekeeper about technology prefixes and where to forward calls. If, for some reason, that dynamic registry feature is not in effect, statically configure the gatekeeper to query the gateway for this information.
Note
To configure the gatekeeper to query for prefix and forwarding information, see Configuring H.323 Gatekeepers and Proxies on page 137. To configure RAS, define specific parameters for the applicable POTS and VoIP dial peers. The POTS dial peer informs the system of which voice port to direct incoming VoIP calls to and (optionally) determines that RAS-initiated calls have a technology prefix prepended to the destination telephone number. The VoIP dial peer determines how to direct calls that originate from a local voice port into the VoIP cloud to the session target. The session target indicates the address of the remote gateway where the call is terminated. There are several different ways to define the destination gateway address:
By statically configuring the IP address of the gateway. By defining the Domain Name System (DNS) name of the gateway. By using RAS. If RAS is used, the gateway determines the destination target by querying the RAS gatekeeper.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
dial-peer voice tag pots destination-pattern string[T] port controller:D exit dial-peer voice tag voip destination-pattern string[T] tech-prefix number session target ras exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
49
DETAILED STEPS
Command
Step 1
dial-peer voice tag pots
Purpose Enters dial-peer configuration mode for the POTS dial peer designated by tag.
Example:
Router(config)# dial-peer voice 456 pots
Step 2
destination-pattern string[T]
Specifies the E.164 address associated with this dial peer. Keywords and arguments are as follows:
Example:
Router(config-dial-peer)# destination-pattern 1513200....
stringE.164 or private dialing plan telephone number. Valid entries: digits 0 to 9, letters A to D, and the following special characters:
Asterisk (*) and pound sign (#)Keys that appear
wildcard).
Percent sign (%)The previous digit or pattern
string.
Dollar sign ($)Match to the null string at the end
matching that character or used with a single character having no other significance (matching that character).
Question mark (?)The previous digit occurred
expression rulefor example, 408(555). Use parentheses in conjunction with symbols ? or %. For more information on applying wildcard symbols to destination patterns and the dial strings that result, see Dial Peer Configuration on Voice Gateway Routers.
TControl character indicating that the destination-pattern value is a variable-length dial string.
50
Command
Step 3
port controller:D
Purpose (Cisco AS5300 only) Associates this POTS dial peer with a specific voice port. Keywords and arguments are platform dependent. Exits the current mode.
Example:
Router(config-dial-peer)# port 0:D
Step 4
exit
Example:
Router(config-dial-peer)# exit
Step 5
Enters dial-peer configuration mode for the VoIP peer designated by tag.
Example:
Router(config)# dial-peer voice 123 voip
Step 6
destination-pattern string[T]
Example:
Router(config-dial-peer)# destination-pattern 1513200....
Step 7
tech-prefix number
Example:
Router (config-dial-peer)# tech-prefix 9#
Defines the numbers used as the technology prefix that the gateway registers with the gatekeeper. Can contain up to 11 characters. Although not strictly necessary, a pound symbol (#) is frequently used as the last digit in a prefix. Valid characters: 0 to 9, #, and *. Specifies that the RAS protocol is being used to determine the IP address of the session targetmeaning that a gatekeeper translates the E.164 address to an IP address. Exits the current mode.
Step 8
Example:
Router (config-dial-peer)# session target ras
Step 9
exit
Example:
Router (config-dial-peer)# exit
show dial-peer voice Use this command to verify the POTS and VoIP dial-peer configuration. The following example shows output for a VoIP dial peer using RAS on a Cisco AS5300:
Router# show dial-peer voice 1234 VoiceOverIpPeer1234 tag = 1234, destination-pattern = 1234', answer-address = ', group = 1234, Admin state is up, Operation state is up, incoming called-number = ', connections/maximum = 0/unlimited, application associated: type = voip, session-target = ras',
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
51
technology prefix: 8# ip precedence = 0, UDP checksum = disabled, session-protocol = cisco, req-qos = controlled-load, acc-qos = best-effort, fax-rate = voice, codec = g729r8, Expect factor = 10, Icpif = 30, VAD = enabled, Poor QOV Trap = disabled,
Troubleshooting Tips
To display the types and addressing of RAS messages sent and received, use the debug ras command. The debug output lists the message type using mnemonics defined in ITU-T specification H.225. To display additional information about the actual contents of the H.225 RAS messages, use the debug h225 asn1 command.
SUMMARY STEPS
1. 2. 3. 4. 5.
voice service voip h323 ras timeout {all | arq | brq | drq | grq | rai | rrq} value ras retry {all | arq | brq | drq | grq | rai | rrq} value exit
52
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
ras timeout {all | arq | brq | drq | grq | rai | rrq} value
Example:
Router(conf-serv-h323)# ras timeout all 10
allAll RAS message counters that do not have explicit values configured individually. If the no ras timeout all command is entered, all values are set to the default except the individual values that were configured separately. arqAdmission request (ARQ) message counter. brqBandwidth request (BRQ) message counter. drqDisengage request (DRQ) message counter. grqGatekeeper request (GRQ) message counter. raiResource availability indication (RAI) message counter. rrqRegistration request (RRQ) message counter. valueHow long the gateway waits for a message from the gatekeeper before timing out, in seconds. Range: 1 to 45.
Step 4
ras retry {all | arq | brq | drq | grq | rai | rrq} value
Sets RAS retry conditions. Keywords are as in step 3. The argument is as follows:
Example:
Router(conf-serv-h323)# ras retry grq 5
valueNumber of times that the gateway resends messages to the gatekeeper after timeout. Range: 1 to 30.
Step 5
exit
Example:
Router(conf-serv-h323)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
53
SUMMARY STEPS
1. 2. 3. 4.
voice service voip h323 ras rrq ttl time-to-live [margin time] exit
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
Example:
Router(conf-serv-h323)# ras rrq ttl 90 margin 30
time-to-liveHow long, in seconds, the gatekeeper considers the gateway active. Range: 15 to 4000 (must be greater than the margin time value). margin timeHow long, in seconds, an RRQ message can be transmitted from the gateway before the time-to-live value advertised to the gatekeeper. Range: 1 to 60 (this value times two must be less than or equal to the time-to-live value).
Step 4
exit
Example:
Router(conf-serv-h323)# exit
54
show running config Use this command to verify RAS message retry counters, timeout values, and time-to-live values.
Router# show running-config Current configuration : 925 bytes ! version 12.3 . . . voice service voip h323 ras rrq ttl 90 margin 30 ras timeout all 7 ras timeout grq 10 ras timeout drq 30 ras retry all 10 ras retry grq 5 . . .
Examples
The following example shows the GRQ message timeout value set to 10 seconds and all other RAS message timeout values set to 7 seconds:
Router(conf-serv-h323)# ras timeout grq 10 Router(conf-serv-h323)# ras timeout all 7
The following example shows the GRQ message counter set to 5 and all other RAS message counters set to 10:
Router(conf-serv-h323)# ras retry all 10 Router(conf-serv-h323)# ras retry grq 5
The following example shows the time-to-live value configured to 90 seconds and the margin time value configured to 30 seconds:
Router(conf-serv-h323)# ras rrq ttl 90 margin 30
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
55
You can configure resource-reporting thresholds by using the resource threshold command. Upper and lower thresholds are separately configurable to prevent the gateway from operating sporadically because of the availability or lack of resources.
PI 0 1 2 3 8
Description No progress indicator is included. Call is not end-to-end ISDN; further call progress information may be available in-band. Destination address is non-ISDN. Origination address is non-ISDN. In-band information or appropriate pattern is now available.
Message Type Setup Alert, setup, progress, connect Alert, progress, connect Setup Alert, progress, connect
When interworking is between ISDN and non-ISDN networks, the originating gateway reacts as follows:
56
If the originating switch does not include a PI in setup messages, the originating gateway assumes that the originating switch is ISDN and expects the switch to generate the ringback tone. Determine which device generates the ringback tone by using the progress_ind command in dial-peer configuration mode:
To enable the terminating switch to generate the ringback tone, set the PI to 8 in the alert
messages on the terminating gateway. The progress indicator is configured in the POTS dial peer.
To enable the originating gateway to generate the ringback tone, set the PI to 3 in setup
messages on the originating gateway. The PI is configured in the VoIP dial peer.
Note
If the terminating gateway sends an alert message with no PI value, the originating gateway generates the ringback tone. But if the terminating gateway sends an alert message that has a PI of 1, 2, or 8, the originating gateway does not generate ringback tone.
The originating gateway cuts through the voice path in the backward direction when it receives a progress or alert message that has a PI of 1, 2, or 8.
Note
Pure ISDN calls may use different protocols at the originating and terminating ends. For example, a call may originate on ETSI and terminate on NI2. If the two protocols are not compatible end to end, the gateway drops all IEs from messages, including the progress indicator. Because a progress indicator is required in all progress messages, the originating gateway inserts a PI of 1 in the progress message. To avoid dropping IEs, use the isdn gateway-max-internetworking command to prevent the gateway from checking protocol compatibility.
Note
For information about AAA configuration on a gateway, see Configuring AAA for Cisco Voice Gateways at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/add_c/acct_c/i ndex.htm. For information about RADIUS and AAA security services, see the Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/sec_vcg.htm.
Information About H.235 Gateway Security, page 58 Downloading IVR Scripts, page 61
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
57
Configuring H.235 Gateway Security, page 62 Verifying H.235 Gateway Security, page 64
EndpointThe RAS channel used for gateway-to-gatekeeper signaling is not a secure channel. To ensure secure communication, H.235 allows gateways to include an authentication key in their RAS messages. This key is used by the gatekeeper to authenticate the source of the messages. At the endpoint level, validation is performed on all messages from the gateway. The cryptoTokens are validated using the password configured for the gateway.
Note
To secure the RAS messages and calls, it is essential that the gatekeeper provides authentication based on the secure key. The gatekeeper must support H.235 security using the same security scheme as the Cisco gateway.
Per-CallWhen the gateway receives a call over the telephony leg, it prompts the user for an account number and PIN. These two numbers are included in certain RAS messages sent from the endpoint to authenticate the originator of the call. AllThis option is a combination of the other two. With this option, the validation of cryptoTokens in ARQ messages is based on an the account number and PIN of the user making a call. The validation of cryptoTokens sent in all the other RAS messages is based on the password configured for the gateway.
CryptoTokens for RRQs, unregistration requests (URQs), DRQs, and the terminating side of ARQs contain information about the gateway that generated the token. The cryptoTokens include the gateway identification (ID)which is the H.323 ID configured on the gatewayand the gateway password. The cryptoTokens for the originating-side ARQ messages contain information about the user that is placing the call, including the user ID and PIN. Although the scenarios in this document describe how to use the security and accounting features in a prepaid call environment, these features may also be used to authorize IP calls that originate in another domain (interservice provider or intercompany calls). H.235-based security and accounting features can be used with AAA. The gateway can be configured to use the gatekeeper for call authentication or authorization, and AAA can be used for call accounting. In addition, H.235-based security and accounting features include support for the following:
Settlement with the gatekeeper, which allows the gateway to obtain, track, and return accounting information Call metering, which allows the gateway to terminate a call if it exceeds the allotted time (in the case of prepaid calls)
58
Note
The H.235 security and accounting features described in this document are separate from, and should not be confused with, the standard interactive-voice-response (IVR) and AAA features used to authenticate inbound calls or with the settlement functions provided by the Open Settlement Protocol (OSP).
Call Tracking
With prepaid calling services, an account number and PIN must be entered and the duration of the call must be tracked against the remaining credit of the customer. The Cisco H.323 gateway monitors prepaid account balances and terminates a call if the account is exceeded.
Note
Because authentication information includes a time stamp, it is important that all Cisco H.323 gateways and gatekeepers (or other entities that perform authentication) be synchronized. Cisco H.323 gateways must be synchronized using the Network Time Protocol (NTP). Figure 7 illustrates the flow of a possible call for which H.323 security and accounting features are used.
Figure 7 Flow for a Call That Requires H.323 Security and Accounting Features
Billing sytem
Billing sytem
Gatekeeper A
20 19 18 17 9 8 5 4 3 2 1
Gateway A
14 10
Gateway B
20 19 18 17 12 11 5 4 3 2 1
Gatekeeper B
6-7
13
Telephone A
Telephone B
In this example, Telephone A is attempting to establish a phone call to Telephone B. The following numbered explanations correspond to the action taking place at each numbered reference in Figure 7.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
60098
59
Gateways A and B send GRQ messages to their respective gatekeepers. The GRQ message includes the authentication capability and the algorithm object ID. Gatekeepers A and B respond to their respective gateways with gatekeeper confirmation (GCF) messages. The GCF message includes the authentication capability and the algorithm object ID. If the values for the H.323 security parameters do not match what is expected, the gatekeeper responds with a gatekeeper rejection (GRJ) message that contains a reject reason of securityDenial. This prompts the gateway to resend the GRQ. Gateways A and B send RRQ messages to their respective gatekeepers. The RRQ message includes authentication information in the cryptoToken field. Gatekeepers A and B respond to their respective gateways with registration confirmation (RCF) messages. If an authentication failure occurs, the gatekeeper responds with a registration rejection (RRJ) message.
4. 5.
Telephone A establishes a connection with Gateway A. Gateway A initiates the IVR script to obtain the account number and PIN of the user and the desired destination telephone number. Gateway A sends an ARQ message to Gatekeeper A. The gateway must include additional information in the ARQ message to enable the gatekeeper to authenticate the call. The information included in the ARQ message varies depending on whether the ARQ message is being sent by the source or the destination gateway. At this point in the scenario, it is the source gateway that is requesting admission. Therefore, the ARQ message includes the account number and PIN of the user. This information is encrypted using MD5 hashing and is included in the cryptoTokens field. Gatekeeper A validates the authentication information, resolves the destination telephone number, and determines the appropriate destination gateway (which is Gateway B in this case). Then Gatekeeper A sends an admission confirmation (ACF) message to Gateway A. The ACF message includes the billing information of the user (such as a reference ID and current account balance for prepaid call services) and an access token.
9.
10. Gateway A sends a setup message to Gateway B. The setup message also includes the access token. 11. Gateway B sends an ARQ message to Gatekeeper B. The ARQ message includes the access token
Gateway B with an ACF message. If the authentication information is in error, Gatekeeper B sends an admission rejection (ARJ) message to Gateway B with a reject reason of securityDenial.
13. Gateway B initiates a call to the destination telephone. 14. When the destination telephone is answered, Gateway B sends a connect message to Gateway A. 15. Gateways A and B start their timers to meter the call. If the caller is using prepaid call services, the
meter is constantly compared to the account balance of the user, which was included in the ACF message sent in Step 9.
Telephone Communications Terminated
16. The call is terminated when one of the parties hangs up or, in the case of prepaid call services, when
either of the gateways determines that the account balance of the user has been exceeded.
60
17. Gateways A and B send DRQ messages to the their respective gatekeepers. The DRQ message
gateways.
voip_auth_acct_pin_dest.tcl voip_auth_acct_pin_dest_2.tcl
Note
For more information on TCL IVR applications, see the Cisco IOS TCL and VoiceXML Application Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ivrapp/index. htm.
voip_auth_acct_pin_dest.tcl Script
The voip_auth_acct_pin_dest.tcl script does the following:
Prompts the caller to enter an account number, PIN, and destination number. This information is provided to an H.323 gatekeeper, which authenticates and authorizes the call. If the caller is using a debit card account number, the following occurs:
The gatekeeper returns the remaining credit time amount. The TCL script monitors the time remaining and, based on a configured value, plays a time
running out message to the caller. The message (such as, You have only 3 minutes remaining on your credit.) is played only to the calling party. The called party hears silence during this time. For example, if the configured timeout value is 3 minutes, the message is played when the caller has only 3 minutes of credit left.
The TCL script plays a warning message when the credit of the user has been exhausted. The
message (such as, Sorry, you have run out of credit.) is played only to the calling party. The called party hears silence during this time.
Allows the caller to make subsequent calls to different destinations without disconnecting from the call leg. Thus, the caller is required to enter the account ID and PIN only once (during initial authorization). For making subsequent calls, the caller needs to enter only the destination number. After completing a call to one destination, the caller can disconnect the call by pressing the pound (#) key on the keypad and holding it down from 1 to 2 seconds. If the # key is pressed down for more than 1 second, it is treated as a long pound (#). The called party is disconnected, and the caller is
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
61
prompted to enter a new destination number. Once a new destination number is entered, the call is authenticated and authorized using this number and the previously provided account number and PIN. This feature also allows the caller to continue making additional calls if the called party hangs up.
Reauthenticates and authorizes each new call. Each time a caller enters a new destination number, the TCL script reauthenticates or authorizes the call with the gatekeeper and, if the caller is using a debit card account, obtains the remaining credit time information. Allows the caller to enter the necessary information without having to hear all or any of the prompts. The TCL script stops playing (or does not begin playing) the prompt if it detects that the caller wants to enter the information without listening to the prompt.
Note
The normal terminating character for the account number, PIN, and destination number is the pound (#) key.
Allows the caller to interrupt announcements by pressing the touchtone key. This TCL script stops playing announcements when the system detects that the caller has pressed any touchtone key. Allows the caller to interrupt partially entered numbers and restart from the beginning by pressing a designated key on the keypad. The asterisk (*) key is configured as the interrupt key in the TCL script. The caller can use the asterisk key to cancel an entry and then reenter the account number, PIN, or destination number. The caller is allowed to re-enter a field only a certain number of times. The number of retries may be configured. The default is three times. Can terminate a field by size instead of the terminating character (#). The TCL script allows a specified number of digits to be entered in the account number and PIN fields. This means that the caller can type all the digits (without the terminating character) and the script determines how to extract different fields from the number strings. If the caller uses the terminating character, the terminating character takes precedence and the fields are extracted accordingly. Supports two languages. The IVR script supports two languages, which must be similar in syntax. The languages must be similar in the manner in which numbers are constructedespecially for currency, amount, and time. All the prompts are recorded and stored in both languages. The language selection is made when the caller presses a predefined key in response to a prompt (such as, For English, press 1. For Spanish, press 2.). The TCL script uses the selected language until the caller disconnects.
voip_auth_acct_pin_dest_2.tcl Script
The voip_auth_acct_pin_dest_2.tcl script is a simplified version of the voip_auth_acct_pin_dest.tcl script. It prompts the caller for an account number followed by a PIN. The caller is then prompted for a destination number. This information is provided to the H.323 gatekeeper that authenticates and authorizes the call. This script provides prompts only in English. If the caller is using a debit account number, it plays a time running out message when the caller has 10 seconds of credit time remaining. It also plays a time has expired message when the credit of the caller has been exhausted.
62
Download the appropriate TCL IVR scripts from the Cisco Connection Online Software Support Center. The URL to this site is as follows: http://www.cisco.com/cgi-bin/tablebuild.pl/tclware Configure the IVR inbound dial peer on the gateway router.
To enable security on the gateway, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
gateway security password password level {endpoint | per-call | all} exit dial-peer voice tag pots call application voice application-name location word destination-pattern string[T] port controller-number:D exit
DETAILED STEPS
Command
Step 1
gateway
Example:
Router(config)# gateway
Step 2
passwordGateway password. endpointValidation is performed on all RAS messages sent by the gateway using the cryptoTokens that are generated based on the security password configured for the gateway. per-callValidation is performed only on the admission messages from the H.323 endpoints to the gateway ARQ messages). The gateway prompts the user for an account number and PIN. These two numbers are sent from the endpoint and are used to authenticate the originator of the call. allCombination of the endpoint and per-call options. Specifies that validation be performed on all RAS messages sent by the gateway. The validation of cryptoTokens in ARQ messages is based on the account number and PIN of the user making the call, and the validation of cryptoTokens sent in all other RAS messages is based on the password configured for the gateway.
Example:
Router(config-gateway)# security password password level all
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
63
Command
Step 3
exit
Example:
Router(config-gateway)# exit
Step 4
Enters dial-peer configuration mode for the POTS dial peer designated by the tag value.
Example:
Router(config)# dial-peer voice 1 pots
Step 5
Initiates the IVR application and the selected TCL application name.
Example:
Router(config-dial-peer)# call application voice xyz tftp://172.18.16.2/samp/xyz.tcl
application-nameCharacter string that defines the name of the application. locationLocation of the TCL file in URL format. Valid values: TFTP, FTP, or flash. wordText string that defines an attribute-value (AV) pair specified by the TCL script and understood by the RADIUS server.
Step 6
destination-pattern string[T]
Example:
Router(config-dial-peer)# destination-pattern 1513200....
Specifies the E.164 address associated with this dial peer. For an explanation of the keywords and arguments, see the Configuring Gateway RAS section on page 48, Step 2.
Step 7
port controller-number:D
(Cisco AS5300 only) Configures the voice port associated with this dial peer. Keywords and arguments are as follows:
Note
Example:
Router(config-dial-peer)# port 0:D
controller-numberThe T1 or E1 controller. :DD channel associated with the ISDN PRI. Command syntax varies by platform.
Step 8
exit
Example:
Router(config-dial-peer)# exit
show running-config Use this command to display the security password and level when it is enabled. By default, security is disabled.
Router# show running-config security password 151E0A0E level all
64
Restrictions for Alternate-Gatekeeper Support, page 65 Information About Alternate-Gatekeeper Support, page 65 Configuring Alternate-Gatekeeper Support, page 66 Verifying Configuration of Alternate-Gatekeeper Support, page 67
You can use this feature only with a gatekeeper that supports the alternate gatekeeper functionality. The timer/retry number of RAS messages remains internal to the gateway as currently implemented. This feature does not include commands to allow tuning of these parameters. The alternate gatekeeper list is volatilewhen the gateway loses power or is reset or reloaded, the alternate gatekeeper list that has been acquired from the gatekeeper is lost.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
65
announcement messages from the various gatekeepers are likely to be heard more quickly. Therefore, the problem is less severe. The potential exists, however, for overcommitment of the bandwidth between announcement messages if the call volume increases substantially in a short amount of time (as small as 10 seconds).
Note
If you monitor your bandwidth, it is recommended that you consider lowering the maximum bandwidth so that if spikes such as those described above do occur, some bandwidth is still available.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
interface Ethernet 0/1 h323-gateway voip interface h323-gateway voip id gatekeeper-id {ipaddr ip-address [port]| multicast} [priority priority] h323-gateway voip id gatekeeper-id {ipaddr ip-address [port] | multicast} [priority priority] h323-gateway voip h323-id interface-id exit
DETAILED STEPS
Command
Step 1
interface Ethernet 0/1
Purpose Enters interface configuration mode for the selected Ethernet interface.
Example:
Router(config)# interface Ethernet 0/1
Step 2
Example:
Router(config-if)# h323-gateway voip interface
Step 3
Identifies the gatekeeper for this gateway interface and sets its attributes. For an explanation of the keywords and arguments, see the How to Configure H.323 Gateways section on page 43, step 6.
Example:
Router(config-if)# h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1719
66
Command
Step 4
h323-gateway voip id gatekeeper-id {ipaddr ip-address [port] | multicast} [priority priority]
Example:
Router(config-if)# h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1721
Step 5
Example:
Router(config-if)$ h323-gateway voip id gk4.gg-dn1 ipaddr 209.165.202.132 1719
Defines the H.323 name of the gateway, identifying this gateway to its associated gatekeeper. Usually this ID is the name of the gateway, with the gatekeeper domain name appended to the end: name@domainname. Exits the current mode.
Step 6
exit
Example:
Router(config-if)# exit
show gateway Use this command to verify that an alternate gatekeeper is configured.
Router# show gateway Permanent Alternate Gatekeeper List priority 127 id bmx1 ipaddr 10.77.241.103 1719 register needed priority 127 id bmx2 ipaddr 10.77.241.117 1719 register needed Primary gatekeeper ID bmx1 ipaddr 10.77.241.103 1719
Information About DTMF Relay, page 67 Configuring DTMF Relay, page 69 Monitoring and Maintaining DTMF Relay, page 71
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
67
Although DTMF is usually transported accurately when using high-bit-rate voice codecs such as G.711, low-bit-rate codecs such as G.729 and G.723.1 are highly optimized for voice patterns and tend to distort DTMF tones. As a result, IVR systems may not correctly recognize the tones. DTMF relay solves the problem of DTMF distortion by transporting DTMF tones out of band, or separate from the encoded voice stream.
Relay Types
Cisco gateways currently support the following methods of DTMF relay:
Cisco-proprietary Real-Time Transport Protocol (RTP)DTMF tones are sent in the same RTP channel as voice data. However, the DTMF tones are encoded differently from the voice samples and are identified by a different RTP payload type code. Use of this method accurately transports DTMF tones, but because it is proprietary, it requires the use of Cisco gateways at both the originating and terminating endpoints of the H.323 call. H.245 signal or alphanumericThese methods separate DTMF digits from the voice stream and send them through the H.245 signaling channel instead of through the RTP channel. The tones are transported in H.245 User Input Indication messages. The H.245 signaling channel is a reliable channel, so the packets that transport the DTMF tones are guaranteed to be delivered. However, because of the overhead of using a reliable protocol, and depending on network congestion conditions, the DTMF tones may be slightly delayed. All H.323 version 2 compliant systems are required to support the h245-alphanumeric method, while support of the h245-signal method is optional. Named Telephone Events (NTEs). Using NTE to relay DTMF tones provides a standardized means of transporting DTMF tones in RTP packets according to section 3 of RFC 2833, RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals, developed by the Internet Engineering Task Force (IETF) Audio/Video Transport (AVT) working group. RFC 2833 defines formats of NTE RTP packets used to transport DTMF digits, hookflash, and other telephony events between two peer endpoints. With the NTE method, the endpoints perform per-call negotiation of the DTMF relay method. They also negotiate to determine the payload type value for the NTE RTP packets. User preference for DTMF relay types is not supported, and DTMF relay forking is not supported.
The ability of a gateway to receive DTMF digits in a particular format and the ability to send digits in that format are independent functions. No configuration is necessary to receive DTMF digits from another H.323 endpoint using any of the methods described. The Cisco gateway is capable of receiving DTMF tones transported by any of these methods at all times.
68
4. 5.
Payload Types
In addition, Cisco gateways provide support for asymmetrical payload types. Payload types can differ between local and remote endpoints. Therefore, the Cisco gateway can transmit one payload type value and receive a different payload type value. The dtmf-relay h245-signal command relays a more accurate representation of a DTMF digit than does the dtmf-relay h245-alphanumeric command because tone duration information is included along with the digit value. This information is important for applications requiring that a key be pressed for a particular length of time. For example, one popular calling card feature allows the caller to terminate an existing call by pressing the # key for more than 2 seconds and then making a second call without having to hang up in between. This feature is beneficial because the access number and personal identification number (PIN) code do not need to be dialed again. Outside-line access charges, which are common at hotels, may also be avoided. The dtmf-relay h245-alphanumeric command simply relays DTMF tones as ASCII characters. For instance, the DTMF digit 1 is transported as the ASCII character 1. There is no duration information associated with tones in this mode. When the Cisco H.323 gateway receives a DTMF tone using this method, the gateway generates the tone on the PSTN interface of the call using a fixed duration of 500 ms. All systems that are H.323 Version 2-compliant are required to support the dtmf-relay h245-alphanumeric command, but support of the dtmf-relay h245-signal command is optional.
SUMMARY STEPS
1. 2. 3. 4.
dial-peer voice tag voip dtmf-relay [cisco-rtp] [h245-alphanumeric] [h245-signal] [rtp-nte] rtp payload-type nte number codec {clear-channel | g711alaw | g711ulaw | g723ar53 | g723ar63 | g723r53 | g723r63 | g726r16 | g726r24 | g726r32 | g726r53 | g726r63 | g728 | g729abr8 | g729ar8 | g729br8 | g729r8 | gsmefr | gsmfr} [bytes payload_size] destination-pattern string[T]
5.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
69
6.
session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] hostname | loopback:rtp | loopback:compressed | loopback:uncompressed} or session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] hostname | loopback:rtp | loopback:compressed | loopback:uncompressed | mailto:{name | $d$.}@domainname}
7.
exit
DETAILED STEPS
Command
Step 1
dial-peer voice tag voip
Purpose Enters dial-peer configuration mode for the VoIP dial peer designated by tag.
Example:
Router(config)# dial-peer voice tag voip
Step 2
cisco-rtpForwards DTMF tones by using RTP with a Cisco-proprietary payload type. h245-alphanumericForwards DTMF tones by using the H.245 alphanumeric User Input Indication (UII) method. Range: tones 0 to 9, *, #, and A to D. Use this keyword to configure DTMF relay. h245-signalForwards DTMF tones by using the H.245 signal UII method. Range: tones 0 to 9, *, #, and A to D. rtp-nteForwards DTMF tones by using Real-Time Transport Protocol (RTP) with the Named Telephone Event (NTE) payload type.
Example:
Router(config-dial-peer)# dtmf-relay cisco-rtp h245-alphanumeric h245-signal rtp-nte
Step 3
Example:
Router(config-dial-peer)# rtp payload-type nte 100
Identifies the payload type of a Real-Time Transport Protocol (RTP) packet. Keyword and argument are as follows:
nte numberPayload type is a Named Telephone Event (NTE). Range: 96 to 127. Default: 101.
Do not use the following numbers, because they have preassigned values: 96, 97, 100, 121 to 123, and 125 to 127. Use of these values causes the command to fail. You must first reassign the value in use to a different unassigned number, for example:
rtp payload-type nse 105 rtp payload-type nte 100
70
Command
Step 4
codec {clear-channel | g711alaw | g711ulaw | g723ar53 | g723ar63 | g723r53 | g723r63 | g726r16 | g726r24 | g726r32 | g726r53 | g726r63 | g728 | g729abr8 | g729ar8 | g729br8 | g729r8 | gsmefr | gsmfr} [bytes payload_size]
Purpose Specifies the voice coder rate of speech for a dial peer.
Example:
Router(config-dial-peer)# codec g711alaw
Step 5
destination-pattern string[T]
Example:
Router(config-dial-peer)# destination-pattern 1513200....
Specifies the prefix, the full E.164 telephone number, or an ISDN directory number to be used for a dial peer (depending on the dial plan). For an explanation of the keywords and arguments, see the Configuring Gateway RAS section on page 48, Step 2. Specifies a network-specific address for a specified dial peer or destination gatekeeper.
Step 6
Cisco AS5300
session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] hostname | loopback:rtp | loopback:compressed | loopback:uncompressed | mailto:{name | $d$.}@domainname}
Example:
Router(config-dial-peer)# session target ipv4:192.168.0.0
Step 7
exit
Example:
Router(config-dial-peer)# exit
debug voip rtp session named-event Use this command to turn on debugging for RTP NTEs.
Step 2
show voip rtp connections Use this command to display local and remote calling ID and IP address and port information.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
71
PBX
30764
In Cisco H.323 Version 2 software, an FXS hookflash relay is generated only if the following two conditions are met:
The other endpoint supports the reception of an H.245 hookflash and advertise this using the Receive User Input Capability message during H.245 capabilities exchange. The call is established with either the h245-alphanumeric or h245-signal variant of the dtmf-relay command.
This implies that the VoIP dial peer is configured for dtmf-relay h245-alphanumeric or dtmf-relay h245-signal, but not cisco-rtp.
72
Enter the timing hookflash-input command on FXS interfaces to specify the maximum length of a hookflash indication. If the hookflash lasts longer than the specified limit, then the FXS interface processes the indication as an onhook. To configure hookflash relay on a gateway, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Step 1
Purpose Enters voice-port configuration mode. Keywords and arguments vary by platform.
slotSlot in which the voice interface card or voice port adapter is installed. Range: 0 to 3. subunitSubunit on the voice interface card in which the voice port is located. Range: 0 to 1. portVoice port. Range varies by type of router.
Example:
Router(config)# voice-port 1/0/0
Step 2
Example:
Router(config-voice-port)# timing hookflash-input 200
Specifies the maximum duration of a hookflash indication, in ms. If the hookflash lasts longer than the specified limit, the Foreign Exchange Station (FXS) interface processes the indication as an on-hook. Range: 50 to 1550. Default: 600. Specifies the duration, in ms, of the hookflash indications that the gateway generates on a Foreign Exchange Office (FXO) interface. Range: 50 to 1550. Default: 400.
Step 3
Example:
Router(config-voice-port)# timing hookflash-out 200
Step 4
exit
Example:
Router(config-voice-port)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
73
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
voice class codec tag codec preference value codec-type [bytes payload-size] exit dial-peer voice tag voip voice-class codec tag exit
DETAILED STEPS
Command
Step 1
voice class codec tag
Purpose Enters voice-class configuration mode and assigns an identification tag number for a codec voice class. The tag argument is the unique number assigned to the voice class. Range: 1 to 10000. Each tag must be unique on the router. Adds codecs to the prioritized list of codecs. Keyword and arguments are as follows:
Example:
Router(config)# voice class codec 123
Step 2
Example:
Router(config-class)# codec preference 1 g711alaw
valueOrder of preference, with 1 being the most preferred and 12 being the least preferred. codec-typeType of codec preferred. bytes payload-sizeSize of the voice frame in bytes. Values depend on the codec type and the packet voice protocol.
74
Step 3
exit
Example:
Router(config-class)# exit
Step 4
Enters dial-peer configuration mode for the VoIP dial peer designated by tag.
Example:
Router(config)# dial-peer voice 456 voip
Step 5
Assigns a previously configured codec selection preference list (codec voice class) to the VoIP dial peer designated by tag. Range: 1 to 10000. Maps to the tag number created Example: using the voice class codec command. Router(config-dial-peer)# voice-class codec 123
voice-class codec tag exit
Step 6
Example:
Router(config-dial-peer)# exit
Verifying Preservation
To verify preservation, perform the following step.
Step 1
show running-config Use this command to verify the codecs defined for a particular prioritized list of codecs.
Router(config-dial-peer)# show running config
Lists all the conditions under which this instance occurs. Retries the call to the next highest preference dial peer. Continues until no more matching dial peers are found.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
75
If there are equal priority dial peers, the order is determined randomly.
Note
You can configure hunting-algorithm precedence. See the preference command in the Dial Peer Features and Configuration chapter in Dial Peer Configuration on Voice Gateway Routers at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/int_c/dpeer_c/inde x.htm.
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
interface type slot/port
Purpose Enters interface configuration mode for the specified interface. Keywords and arguments vary by platform.
Example:
Router(config)# interface serial 0/0
Step 2
Sets the source IP address to be used for this gateway. The argument is as follows:
Example:
Router(config-if)# h323-gateway voip bind srcaddr 192.168.0.0
ip-addressIP address to be used for outgoing H.323 traffic, which includes H.225, H.245, and RAS messages. Typically, this is the IP address assigned to the Ethernet interface.
Step 3
exit
Example:
Router(config-if)# exit
76
show running-config Use this command to verify the source IP address of the gateway. The output shows the source IP address that is bound to the interface.
router# show running-config interface Loopback0 ip address 10.0.0.0 255.255.255.0 no ip directed-broadcast h323-gateway voip bind srcaddr 10.0.0.0 ! interface Ethernet0/0 ip address 172.18.194.50 255.255.255.0 no ip directed-broadcast h323-gateway voip interface h323-gateway voip id j70f_2600_gk2 ipaddr 172.18.194.53 1719 h323-gateway voip h323-id j70f_3640_gw1 h323-gateway voip tech-prefix 3# . . .
In the following example, Ethernet interface 0/0 is used as the gateway interface. For convenience, the h323-gateway voip bind srcaddr command has been specified on the same interface. The designated source IP address is the same as the IP address assigned to the interface.
interface Ethernet0/0 ip address 172.18.194.50 255.255.255.0 no ip directed-broadcast h323-gateway voip interface h323-gateway voip id j70f_2600_gk2 ipaddr 172.18.194.53 1719 h323-gateway voip h323-id j70f_3640_gw1 h323-gateway voip tech-prefix 3# h323-gateway voip bind srcaddr 172.18.194.50
Configuring Annex G
This section contains the following information:
Information About Annex G, page 78 Configuring and Provisioning an Annex G Border Element, page 79 Configuring Basic Service Relationships, page 82 Configuring Usage Indication, page 85 Verifying Annex G Configuration, page 86
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
77
Note
The Annex G BEs support Hot Standby Routing Protocol (HSRP) for high reliability and availability. You can identically configure multiple gatekeepers and BEs and use HSRP to designate a primary BE and other standby BEs. If the primary BE is down, a standby BE operates in its place. You configure the local address with an HSRP address in BE configuration.
Figure 9 illustrates a call flow for a scenario in which a call has originated in the zone administered by Border Element D, but the address cannot be resolved locally.
Figure 9
Gateway A
Border Element B
Gateway F
Elements Gateway A to Gatekeeper D/Border Element D Gatekeeper D/Border Element D to Border Element B Border Element B to Border Element F/Gatekeeper F
Action GW A sends an ARQ to GK D/BE D. GK D/BE D is a noncaching BE and cannot resolve the address internally. Therefore, BE D sends an AccessRequest to BE B. BE B searches its cache to for the closest match and locates a descriptor that indicates that the access request should be sent to BE F/GK F.
Border element F/gatekeeper F to Border Element BE F/GK F returns an access confirmation to D BE D. The access confirmation contains a template with a single address indicating where the SETUP message should be sent.
78
Table 5
Note
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
call-router h323-annexg border-element-id local ip ip-address [port local-port] neighbor ip-address port neighbor-port id neighbor-id cache query-interval query-interval exit Repeat Steps 3 to 8 for each neighbor BE that you configure.
10. advertise [static | dynamic | all] 11. ttl value 12. hopcount value 13. no shutdown 14. timer accessrequest sequential delay value 15. exit 16. gatekeeper 17. h323-annexg border-element-id cost cost priority priority 18. prefix prefix* [seq | blast] 19. exit 20. exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
79
DETAILED STEPS
Command
Step 1
call-router h323-annexg border-element-id
Example:
Router(config)# call-router h323-annexg be20
Step 2
Defines the local domain, including the IP address and port that this BE should use for interacting with remote BEs. Specify a port only if you want to use a nonstandard port number; otherwise, use the default standard well-known port 2099. Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. (Optional) Specifies the neighbors port number that is used for exchanging Annex G messages. Default: 2099. Do not use this command if you want to use the default value; use it only if you want a value other than 2099. (Optional) Sets the local ID of the neighboring BE. The ID is used locally to identify the neighbor and has no global significance in the Annex G network. (Optional) Configures the local BE to cache the descriptors received from its neighbors. If caching is enabled, the neighbors are queried at the specified interval for their descriptors. (Optional) Sets the interval at which the local BE queries the neighboring BE, in minutes. Default: 30. Do not use this command if you want to use the default query interval; use it only if you want a query interval other than 30 minutes. Exits the current mode.
Example:
Router(config-annexg)# local ip 192.168.0.0
Step 3
neighbor ip-address
Example:
Router(config-annexg)# neighbor 192.168.0.0
Step 4
port neighbor-port
Example:
Router(config-annexg-neigh)# port 2000
Step 5
id neighbor-id
Example:
Router(config-annexg-neigh)# id be20
Step 6
cache
Example:
Router(config-annexg-neigh)# cache
Step 7
query-interval query-interval
Example:
Router(config-annexg-neigh)# query-interval 20
Step 8
exit
Example:
Router(config-annexg-neigh)# exit
Step 9
80
Command
Step 10
advertise [static | dynamic | all]
Purpose Specifies the type of descriptors that the BE advertises to its neighbors. Keywords are as follows:
Example:
Router(config-annexg)# advertise dynamic
staticOnly the descriptors provisioned on this BE are advertised. This is the default. dynamicOnly dynamically learned descriptors are advertised. allBoth static and dynamic descriptors are advertised.
Step 11
ttl value
Sets the time-to-live value for advertisements, in seconds. Default: 3180 (53 minutes).
Example:
Router(config-annexg)# ttl 2600
Step 12
hopcount value
Specify the maximum number of BE hops through which an address resolution request can be forwarded. Default: 7.
Example:
Router(config-annexg)# hopcount 5
Step 13
no shutdown
Example:
Router(config-annexg)# no shutdown
Starts the BE. By default, when a BE is first configured, it is shut down, so you must use this command after you configure each BE. Specifies the intermessage delay (in increments of 100 ms). Range: 0 to 10. Default: 1 (100 ms). Setting this to 0 causes AccessRequest messages to be blasted to applicable neighboring BEs. Exits the current mode.
Step 14
Example:
Router(config-annexg)# timer accessrequest sequential delay 3
Step 15
exit
Example:
Router(config-annexg)# exit
Step 16
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
81
Command
Step 17
h323-annexg border-element-id cost cost priority priority
Purpose Enters BE configuration mode and enables the BE on the GK. Keywords and arguments are as follows:
Example:
Router(config-gk)# h323-annexg be20 cost 35 priority 20
border-element-idIdentifier of the border element that you are provisioning. Associates the gatekeeper with the BE identifier that is configured on the BE. Valid values: any International Alphabet 5 (IA5) string, without spaces and up to 20 characters in length. cost costCost associated with this border element. When a gatekeeper sends requests to remote zones and to the BE in its attempt to resolve an address, the remote zone or BE that resolves the address and has the lowest cost and highest priority is given preference. Range: 1 to 99. Default: 50. priority priorityPriority associated with this border element. When a gatekeeper sends requests to remote zones and to the BE in its attempt to resolve an address, the remote zone or BE that resolves the address and has the lowest cost and highest priority is given preference. Range: 1 to 99. Default: 50.
Step 18
prefix prefix*
* [seq | blast]
(Optional) Specifies the prefixes for which a BE should be queried for address resolution. Default: the GK forwards all remote zone queries to the BE. Do not use this command unless you want to restrict queries sent to the BE to a specific prefix or set of prefixes. Exits the current mode.
Example:
Router(config-gk-annexg)# 419*
Step 19
exit
Example:
Router(config-gk-annexg)# exit
Step 20
exit
Example:
Router(config-gk)# exit
82
Figure 10
Cisco Domain
Gateway
Gateway
Authentication is not supported Packet-level integrity checking is not supported. ClearingHouse CryptoTokens are not supported. Clustered gatekeeper and border element are not supported. Interoperation with LRQ-based gatekeeper networks is not supported. Layered Annex G networks are not supported. Usage indications are supported only within the context of active Service Relationships.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
call-router h323-annexg border-element-id access-policy neighbors-only domain-name id neighbor ip-address service-relationship outbound retry-interval interval_number inbound ttl ttl-value no shutdown exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
82344
83
DETAILED STEPS
Command
Step 1
call-router h323-annexg border-element-id
Purpose Enters Annex-G configuration mode for the specified border element.
Example:
Router(config)# call-router h323-annexg be20
Step 2
access-policy neighbors-only
Example:
Router(config-annexg)# access-policy neighbors-only
As a prerequisite for configuring service relationships, sets the access-policy to accept requests only from known neighbors. Default: no access-policy allows request from any border element. Sets the domain name reported in service relationships.
Step 3
domain-name id
Example:
Router(config-annexg)# domain-name id
Step 4
neighbor ip-address
Example:
Router(config-annexg-neigh)# neighbor 192.168.0.0
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution. Enters service-relationship mode.
Step 5
service-relationship
Example:
Router(config-annexg-neigh)# service-relationship
Step 6
Example:
Router(config-nxg-neigh-svc)# outbound retry-interval 15
(Optional) Defines the retry period for attempting to establish the outbound relationship between border elements, in seconds. Default: 30.
Step 7
Example:
Router(config-nxg-neigh-svc)# inbound 100
(Optional) Sets the duration of the inbound service relationship and interval in which the remote peer must reestablish the service relationship, in seconds. Default: 120. Enables the service relationship.
Step 8
no shutdown
Example:
Router(config-nxg-neigh-svc)# no shutdown
Step 9
exit
Example:
Router(config-nxg-neigh-svc)# exit
84
Command
Step 10
exit
Example:
Router(config-annexg-neigh)# exit
Step 11
exit
Example:
Router(config-annexg)# exit
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
call-router h323-annexg border-element-id neighbor ip-address usage-indication retry interval seconds retry window minutes exit exit exit
DETAILED STEPS
Command
Step 1
call-router h323-annexg border-element-id
Purpose Enters Annex-G configuration mode for the specified border element.
Example:
Router(config)# call-router h323-annexg be20
Step 2
neighbor ip-address
Example:
Router(config-annexg)# neighbor 192.168.0.0
Enters neighbor configuration mode to configure a neighboring BE that interacts with the local BE for the purpose of obtaining addressing information and aiding in address resolution.
Step 3
usage-indication
Example:
Router(config-annexg-neigh)# usage-indication
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
85
Step 4
(Optional) Defines the time, in seconds, between delivery attempts. Default: 900.
Example:
Router(config-nxg-neigh-usg)# retry interval 600
Step 5
(Optional) Defines the total time, in minutes, that a border element attempts delivery. Default: 1440 (24 hours).
Example:
Router(config-nxg-neigh-usg)# retry window 1200
Step 6
exit
Example:
Router(config-nxg-neigh-usg)# exit
Step 7
exit
Example:
Router(config-annexg-neigh)# exit
Step 8
Router(config-annexg)# exit
Example:
Router(config-annexg)# exit
show call-router status Use this command to display Annex G border-element status.
Router# show call-router status neighbors ANNEX-G CALL ROUTER STATUS: =========================== Border Element ID Tag : Domain Name : Border Element State : Border Element Local IP : Advertise Policy : Hopcount Value : Descriptor TTL : Access Policy : Current Active Calls : Current Calls in Cache : Cumulative Active Calls : Usage Ind Messages Sent : Usage Ind Cfm Rcvd : IRRs Received : DRQs Received : Usage Ind Send Retrys : NEIGHBOR INFORMATION: =====================
86
Local Neighbor ID : (none) Remote Element ID : (unknown) Remote Domain ID : (unknown) IP Addr : 1.2.3.4:2099 Status : DOWN Caching : OFF Query Interval : 30 MIN (querying disabled) Usage Indications : Current Active Calls : 0 Retry Period : 600 SEC Retry Window : 3600 MIN Service Relationship Status: ACTIVE Inbound Service Relationship : DOWN Service ID : (none) TTL : 1200 SEC Outbound Service Relationship : DOWN Service ID : (none) TTL : (none) Retry interval : 120 SEC (0 until next attempt)
Configuring H.225
This section contains the following information:
Associating the H.323 Voice Class with Each VoIP Dial Peer, page 87 Configuring the SETUP Response Timeout Value, page 88 Configuring the Number of Concurrent Calls Per Connection, page 89 Changing the Idle Timer for Concurrent Calls, page 89 Configuring Overlap Signaling on H.323 Terminating Gateways, page 90 Configuring No Retry on User Busy in an H.323 Gateway, page 91 Configuring the VoIP Transport Method, page 93
Associating the H.323 Voice Class with Each VoIP Dial Peer
To associate the H.323 voice class with a dial peer, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
87
DETAILED STEPS
Command
Step 1
dial-peer voice tag voip
Purpose Enters dial-peer configuration mode for the remote VoIP dial peer designated by tag.
Example:
Router(config)# dial-peer voice 123 voip
Step 2
Associates the specified H.323 voice class (and all of its related attributes) with the dial peer.
Example:
Router(config-dial-peer)# voice-class h323 456
Step 3
exit
Example:
Router(config-dial-peer)# exit
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
voice class h323 number
Purpose Enters voice-class mode to create or modify the specified H.323 voice class.
Example:
Router(config)# voice class h323 123
Step 2
Example:
Router(config-class)# h225 timeout setup 10
Sets the timeout value, in seconds, for the response of the outgoing SETUP message. If the timer expires, the GK tries an alternate endpoint (if configured and specified in the ACF); otherwise, it terminates the call. Range: 0 to 30. Default: 15. Exits the current mode.
Step 3
exit
Example:
Router(config-class)# exit
88
SUMMARY STEPS
1. 2. 3. 4.
voice service voip h323 session transport tcp [calls-per-connection value] exit
DETAILED STEPS
Command
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
Sets the number of concurrent calls for a single TCP connection. Range: 1 to 9999. Default: 5.
Example:
Router(conf-serv-h323)# session transport tcp
Step 4
exit
Example:
Router(conf-serv-h323)# exit
SUMMARY STEPS
1. 2. 3. 4.
voice service voip h323 h225 timeout tcp call-idle {value value | never} exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
89
DETAILED STEPS
Command
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
Example:
Router(conf-serv-h323)# h225 timeout tcp call-idle never
Step 4
exit
Example:
Router(conf-serv-h323)# exit
SUMMARY STEPS
1. 2. 3. 4. 5.
voice service voip h323 h225 signal overlap h225 timeout t302 exit
90
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
Example:
Router(conf-serv-h323)# h225 signal overlap
Step 4
Example:
Router(conf-serv-h323)# h225 timeout t302 15
Step 5
exit
Example:
Router(conf-serv-h323)# exit
SUMMARY STEPS
1. 2. 3. 4. 5.
enable configure terminal voice service voip h323 no h225 alt-ep hunt [ all | cause-code ]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
91
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Enters voice service configuration mode and specifies a voice encapsulation type.
Example:
Router(config)# voice service voip
Step 4
h323
Example:
Router(conf-voice-service)# h323
Step 5
allContinue hunt for all disconnect cause codes. cause-codeMay be entered as standard Q.850 number or as text. Alternate endpoint hunt is enabled for all cause codes by default. Command will be visible only for the negated hunt cause codes (with no prefixed). This functionality, requires a Cisco Gatekeeper. See the Configuring H.323 Gatekeepers and Proxies chapter of this guide.
Example:
Router(conf-serv-h323)# no h225 alt-ep hunt user-busy
Note
Note
Examples
The following example shows a configuration that disables the alternate endpoint hunt for user busy and no answer:
! voice service voip h323 no h225 alt-ep hunt user-busy no h225 alt-ep hunt no-answer !
92
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
Example:
Router(conf-serv-h323)# session transport tcp
Sets the underlying transport layer protocol for H.323 messages to be used across all VoIP dial peers. If you specify udp, Annex E is used. For concurrent calls, you must specify tcp. Exits the current mode.
Step 4
exit
Example:
Router(conf-serv-h323)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
93
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gateway
Example:
Router(config)# gateway
Step 2
Sets the gateway to use its previous behavior for bandwidth management.
Example:
Router(config-gateway)# emulate cisco h323 bandwidth
Step 3
exit
Example:
Router(config-gateway)# exit
Configuring Generic Transparency Descriptor for GKTMP Using SS7 Interconnect for Voice Gateways Version 2.0
This section contains the following information:
Information About GTD for GKTMP Using SS7 Interconnect for Voice Gateways, page 94 Prerequisites for GTD for GKTMP Using SS7 Interconnect for Voice Gateways, page 96 Configuring GTD System-Wide, page 96 Configuring GTD for a Dial Peer, page 97 Verifying GTD, page 99
Information About GTD for GKTMP Using SS7 Interconnect for Voice Gateways
The GTD for GKTMP Using SS7 Interconnect for Voice Gateways feature provides additional functionality to Cisco gateways and gatekeepers in a Cisco SS7 Interconnect for Voice Gateways Solution. The generic transparency descriptor or generic telephony descriptor (GTD) format is defined in the a Cisco-proprietary draft. GTD format defines parameters and messages of existing SS7 ISUP protocols in text format and allows SS7 messages to be carried as a payload in the H.225 RAS messages between gateway and gatekeeper. With the GTD feature, the gatekeeper extracts the GTD message and the external route server derives routing and accounting information based upon the GTD information provided from the Cisco Gatekeeper Transaction Message Protocol (GKTMP).
94
Currently routing on Cisco gateways is based on generic parameters such as originating number, destination number, and port source. Adding support for SS7 ISUP messages allows the VoIP network to use additional routing enhancements found in traditional TDM switches. Figure 11 shows an example of a Cisco SS7 Interconnect for Voice Gateways solution using the GTD feature.
Figure 11 Cisco SS7 Interconnect for Voice Gateways Solution With the GTD Feature
OGW PSTN
TGW PSTN
GK
GK
GK
The Cisco SC2200 receives SS7 messages from the SS7 network and encapsulates them into GTD format. The messages are then passed to the Cisco originating gateway (OGW). Using the GTD feature, the OGW transmits the GTD payload in the Admission Request (ARQ) message to GK1. GK1 transmits the GTD payload in a Location Request (LRQ) message to GK2. GK 2 uses GKTMP with the GTD feature to decode the GTD payload and transmits it to the route server with the REQUEST LRQ message. The route server returns a RESPONSE LCF (Location Confirmation) message that includes the GTD payload to GK2. The route server also returns a service descriptor code (SC) field to GK2. (The SC field is transmitted to the AAA server for billing purposes. The SC field conveys the Carrier ID and trunk number information that is determined by and passed from the Route Server.) GK2 passes the LCF that includes the GTD payload and the SC field to GK1. GK1 sends an Admission Confirmation (ACF) message that includes the GTD payload to the OGW, along with the SC field. The OGW sends the SC field and call detail records (CDRs) to the AAA server. When the call ends, the Cisco SC2200 receives the SS7 messages, encodes them into GTD format, and passes them to the OGW.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
62830
95
The OGW sends a Disengage Request (DRQ) with the GTD payload to GK1. GK1 sends the DRQ with the GTD payload to the route server. The OGW sends the GTD in H.225 the SETUP message to the terminating gateway (TGW). The TGW sends regular RAS messages to the gatekeeper.
Prerequisites for GTD for GKTMP Using SS7 Interconnect for Voice Gateways
Configure your VoIP network and the Cisco SS7 Interconnect for Voice Gateways Solution, including the following components:
Cisco SC2200Cisco MGC Software Release 9.1(5) or higher Cisco IOS gatewaysCisco IOS Release 12.2(2)XU or higher Cisco IOS gatekeepersCisco IOS Release 12.2(2)XU or higher Route servers AAA servers
Note
For more information on software and components of the Cisco SS7 Interconnect for Voice Gateways Solution, see the release notes and other documentation at http://www.cisco.com/univercd/cc/td/doc/product/access/sc/rel7/soln/das/index.htm
SUMMARY STEPS
1. 2. 3.
96
DETAILED STEPS
Command
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
Chooses whether or not the gateway forwards signaling payload to another gateway. Keywords are as follows:
Example:
Router(conf-voi-serv)# signaling forward unconditional
unconditionalForward payload to the remote end, even if the attached external route server has modified the payload. noneDo not forward payload.
Step 3
exit
Example:
Router(conf-voi-serv)# exit
SUMMARY STEPS
1. 2. 3.
dial-peer voice tag voip signaling forward {conditional | unconditional | none} exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
97
DETAILED STEPS
Command
Step 1
dial-peer voice tag voip
Purpose Enters dial-peer configuration mode for the VoIP dial peer designated by tag.
Example:
Router(config)# dial-peer voice 4 voip
Step 2
Chooses whether or not the gateway forwards signaling payload to another gateway. Keywords are as follows:
Example:
Router(config-dial-peer)# signaling forward conditional
payload, forward. For a GTD payload, encapsulate the payload in an ARQ/DRQ message and send it to the originating gateway. The gateway conveys the payload to the GKTMP and external route server for a flexible route decision based up the ISUP GTD parameters. The gateway then conditionally forwards the payload based upon the route server's instruction.
unconditionalForward the payload to the remote end, even if the attached external route server has modified the payload. noneDo not forward payload.
Step 3
exit
Example:
Router(config-dial-peer)# exit
98
Verifying GTD
To verify GTD, perform the following step.
Step 1
show running-config Use this command to verify that the GTD feature is configured. The following shows sample output for system-wide employment.
Router# show running-config Building configuration... Current configuration : 4192 bytes ! version 12.2 service config no service single-slot-reload-enable no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal service udp-small-servers ! hostname as5300-2 ! voice service voip signaling forward unconditional h323 . . .
The following shows sample output for employment on select dial peers.
Router# show running-config Building configuration... Current configuration : 4192 bytes ! version 12.2 service config no service single-slot-reload-enable no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal service udp-small-servers ! hostname as5300-2 ! . . . ! dial-peer voice 1 pots application session incoming called-number 25164 port 0:D !
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
99
dial-peer voice 1513 voip destination-pattern 1513....... session target ipv4:1.8.156.3 ! dial-peer voice 1408525 voip destination-pattern 1408525.... ! dial-peer voice 1800877 voip destination-pattern 1800877.... session target ipv4:1.8.156.3 ! dial-peer voice 2 pots destination-pattern 51550 no digit-strip direct-inward-dial port 3:D ! dial-peer voice 51557 voip destination-pattern 51557 signaling forward unconditional session target ras ! dial-peer voice 52557 voip destination-pattern 52557 signaling forward unconditional session target ipv4:1.8.156.3 ! . . .
Additive Registration, page 100 Dynamic Zone Prefix Registration, page 101
Additive Registration
Prior to H.323 version 4, there was no way for a large device, such as a gateway, to register hundreds or thousands of E.164 alias addresses with a gatekeeper. The limiting factor was the size of a User Datagram Protocol (UDP) packet, which does not allow an unlimited number of aliases in a single heavyweight registration request (RRQ) RAS message.
100
To allow an endpoint to register an unlimited number of aliases with the gatekeeper, H.323v4 introduces the concept of additive registration. When the gateway registers with a gatekeeper, it provides an initial list of aliases. Additive registration allows the gateway to send subsequent RRQ messages with more lists of aliases until the gatekeeper has the complete list of the gateways aliases. When the gatekeeper wants to acknowledge only a subset of the aliases proposed in an additive RRQ, the gatekeeper returns a registration confirm (RCF) RAS message specifying the accepted aliases. The gateway assumes that the aliases not listed in the RCF were rejected.
GW1 Configuration
dial-peer voice 919 pots destination-pattern 919....... port 0:D dial-peer voice 5551001pots destination-pattern 5551001 port 0:D dial-peer voice 408 pots destination-pattern 408T port 0:D
Enabling the Dynamic Zone Prefix Registration, page 102 (required) Enabling the Dynamic Zone Prefix Registration Along with the Gateway Priority, page 103 Verifying Gateway Advertisement of Dynamic Zone Prefixes, page 105 Verifying Gatekeeper Processing of Additive RRQ Messages, page 105 Troubleshooting H.323v4 Gateway Zone Prefix Registration Enhancements, page 106
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
101
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
enable configure terminal voice service voip h323 ras rrq dynamic prefixes exit gatekeeper rrq dynamic-prefixes-accept exit
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 1
configure terminal
Example:
Router# configure terminal
Step 2
Example:
Router(config)# voice service voip
Step 3
h323
Example:
Router(config-voice-service)# h323
Step 4
Enables the gateway to send an advertisement of dynamic prefixes in additive RRQ RAS messages.
Note
Example:
Router(conf-serv-h323)# ras rrq dynamic prefixes
In Cisco IOS Release 12.2(15)T, this command was enabled by default. Beginning in Cisco IOS Release 12.3(3), this command is disabled by default.
102
Command or Action
Step 5
exit
Purpose Exits voice service voip h323 configuration mode and enters global configuration mode.
Example:
Router(conf-serv-h323)# exit
Step 6
gatekeeper
Example:
Router(config)# gatekeeper
Step 7
rrq dynamic-prefixes-accept
Enables the gatekeeper to receive the RRQ RAS messages from the gateway.
Note
Example:
Router(config-gk)# rrq dynamic-prefixes-accept
In Cisco IOS Release 12.2(15)T, this command was enabled by default. Beginning in Cisco IOS Release 12.3(3), this command is disabled by default.
Step 8
exit
Example:
Router(config-gk)# exit
Enabling the Dynamic Zone Prefix Registration Along with the Gateway Priority
This task shows you how to configure the priority to the dynamic prefixes on the gateway. Allowing you to configure a different priority to each of the dynamic prefix. When configured, the gateway sends the priority along with the prefixes in additive RRQ and the gatekeeper assigns the received priority to the gateway for a given dynamic prefix.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
enable configure terminal voice service voip h323 terminal-alias-pattern 22... priority 8 terminal-alias-pattern 23* priority 7 Repeat Step 5 for each prefix on the gateway. ras rrq dynamic prefixes exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
103
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 1
configure terminal
Example:
Router# configure terminal
Step 2
Example:
Router(config)# voice service voip
Step 3
h323
Example:
Router(config-voice-service)# h323
Step 4
Example:
Router(conf-serv-h323)# terminal-alias-pattern 23 priority 8
Assigns priority to a dynamic prefix. The prefixes mentioned in this command should exactly match the prefixes configured in the destination-pattern command of POTS dial-peer.
Note
Dynamic zone prefix does not support destination patterns with regular expression. It accepts the patterns ending with dot . and asterisk * only.
Step 5
Example:
Router(conf-serv-h323)# terminal-alias-pattern 23* priority 7
Assigns priority to a dynamic prefix. The prefixes mentioned in this command should exactly match the prefixes configured in the destination-pattern command of POTS dial-peer.
Note
Dynamic zone prefix does not support destination patterns with regular expression. It accepts the patterns ending with dot . and asterisk * only.
Step 6 Step 7
Enables the gateway to send an advertisement of dynamic prefixes in additive RRQ RAS messages.
Note
Example:
Router(conf-serv-h323)# ras rrq dynamic prefixes
In Cisco IOS Release 12.2(15)T, this command was enabled by default. Beginning in Cisco IOS Release 12.3(3), this command is disabled by default.
Step 8
exit
Example:
Router(conf-serv-h323)# exit
104
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
show gateway
Example:
Router# show gateway
Step 3
Example:
Router# show h323 gateway prefixes
Displays the status of the gateway destination pattern database and the status of the individual destination patterns along with it's configured priority.
Verify that gateway additive RRQ support is enabled, that the pattern database is active, and that destination patterns have been acknowledged by the gatekeeper.
SUMMARY STEPS
1. 2. 3. 4.
enable show gatekeeper zone prefix [all] show gatekeeper gw-type-prefix show gatekeeper endpoints
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
105
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
Example:
Router# show gatekeeper zone prefix all
Use the all keyword to display the dynamic zone prefixes registered by each gateway. Use the include filter with the all keyword to display the prefixes associated with a particular gateway.
Step 3
Example:
Router# show gatekeeper gw-type-prefix
Step 4
Example:
Router# show gatekeeper endpoints
Prerequisites
Attach a console directly to a router running Cisco IOS Release 12.2(15)T or a later release.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
enable configure terminal logging buffered [buffer-size | level] no logging console end debug h225 asn1 show logging [history | slot slot-number | summary | count] no debug h225 asn1
106
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# logging buffered 65536
Step 4
no logging console
Example:
Router(config)# no logging console
To reenable logging to the console, use the logging console command in global configuration mode.
Step 5
end
Example:
Router(config)# end
Step 6
Example:
Router# debug h225 asn1
Caution
This command slows down the system considerably. Connections may time out.
Step 7
Example:
Router# show logging
Step 8
Example:
Router# no debug h225 asn1
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
107
Note
For information on CAC, see Trunk Connections and Conditioning Features at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/vcltrunk.htm.
Note
For information on routing, see VoIP Gateway Trunk and Carrier Based Routing Enhancements at the following URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ftgwrepg.htm
Configuring Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
This section contains the following information:
Information About Signal ISDN B-Channel ID, page 108 Configuring Signal ISDN B-Channel ID, page 109 Troubleshooting Signal ISDN B-Channel ID, page 110
108
SIP and H.323 gateways use two different commands to enable receiving the B channel of a telephony call leg. Using a different command for each protocol allows users to run the two protocols on one gateway simultaneously.
Note
For information on using this feature on SIP gateways, see the information on SIP ISDN support features in the Cisco IOS SIP Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/callc_c/sip_c/sipc 1_c/chapter8.htm. For H.323, if the billing b-channel command is configured, the H.323 gateway accesses B-channel information on all calls in the ARQ, LRQ, and GKTMP messages.
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command or Action
Step 1
voice service voip
Example:
Router(config)# voice service voip
Step 2
h323
Example:
Router(conf-voi-serv)# h323
Step 3
billing b-channel
Enables the H.323 gateway to access B-channel information on all H.323 calls.
Example:
Router(conf-serv-h323)# billing b-channel
Step 4
exit
Example:
Router(conf-serv-h323)# end
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
109
debug h245 asn1 Use this command to display ASN1 contents of H.245 messages. The following sample command output shows an H.323 ARQ nonstandard message. The format of the B-channel billing information is: 1 is the D-channel ID, 1 is the T1 controller, and 10 is the B-channel.
Router# debug h245 asn1 . . . value ARQnonStandardInfo ::= { sourceAlias { } sourceExtAlias { } interfaceSpecificBillingId 1:D 1:DS1 10:DS0 gtd '49414D2C0D0A50524E2C6973646E2A2C2...'H } . . .
Step 2
debug gatekeeper servers Use this command on gatekeeper to trace all the message exchanges between a gatekeeper and an external application. It also displays any errors that occur in sending messages to the external application or in parsing messages from the external application. The following sample command output also shows B-channel information. The format of the B-channel billing information is as follows: 1 is the D-channel ID, 1 is the T1 controller, and 10 is the B-channel.
Router# debug gatekeeper servers "REQUEST ARQ Version-id:402 From:voip6-2600-1 To:GKTMP_SERVER Transaction-Id:81A3EB4000000001 Content-Length:258 i=I:1.3.26.21:1720 s=E:9190001 H:voip6-5300-1 d=E:4080001 b=1280 A=F C=C13CB8DE-C47F-11D3-80A9-FC0BFCA7B068 c=C13D5506-C47F-11D3-80AB-FC0BFCA7B068 B= 1:D 1:DS1 10:DS0
110
Configuring H.323 VoIP Call Preservation Enhancements for WAN Link Failures
H.323 VoIP call preservation enhancements for WAN link failures sustains connectivity for H.323 topologies where signaling is handled by an entity that is different from the other endpoint, such as a gatekeeper that provides routed signaling or a call agent, such as the Cisco BTS 10200 Softswitch, Cisco PGW 2200, or Cisco CallManager, that brokers signaling between the two connected parties. Call preservation is useful when a gateway and the other endpoint (typically an Cisco Unified IP phone) are collocated at the same site and the call agent is remote and therefore more likely to experience connectivity failures.
Note
If a preserved H.323 call is torn down at a IP PBX, a call-stop record will be generated while Real-time Transport Protocol (RTP) is still flowing. Such an event can be misused to generate a signaling error and allow toll bypass, thus affecting per-call billing integrity. H.323 call preservation covers the following types of failures and connections:
Failure Types
WAN failures that include WAN links flapping or degraded WAN links Cisco Unified CallManager software failure, such as when the ccm.exe service crashes on a Cisco Unified CallManager server. LAN connectivity failure, except when a failure occurs at the local branch
Connection Types
Cisco Unified CallManager used for signaling H.225.0 or H.245 messages is lost or flapping
Between endpoints that are registered to different Cisco Unified CallManagers in a cluster and
the TCP connection between the two Cisco Unified CallManagers is lost
Between IP phones and the PSTN at the same site
Calls between Cisco IOS gateway and an endpoint controlled by a softswitch where the signaling (H.225.0, H.245 or both) flows between the gateway and the softswitch and media flows between the gateway and the endpoint.
When the softswitch reloads. When the H.225.0 or H.245 TCP connection between the gateway and the softswitch is lost, and
Call flows that involve a Cisco IP in IP (IPIP) gateway running in media flow-around mode that reload or lose connection with the rest of the network
Note that after the media is preserved, the call is torn down later when either one of the parties hangs up or media inactivity is detected. In cases where there is a machine-generated media stream, such as music streaming from a media server, the media inactivity detection will not work and the call may hang. Cisco Unified CallManager addresses such conditions by indicating to the gateway that such calls should not be preserved, but third-party devices or IPIP gateways would not do this.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
111
Flapping is defined for this feature as the repeated and temporary loss of IP connectivity that can be caused by WAN or LAN failures. H.323 VoIP calls between a Cisco IOS gateway and Cisco Unified CallManager may be torn down when flapping occurs. When Cisco Unified CallManager detects that the TCP connection is lost, it clears the call and closes the TCP sockets used for the call by sending a TCP FIN, without sending an H.225.0 Release Complete or H.245 End Session message. This is called quiet clearing. The TCP FIN sent from the Cisco Unified CallManager could reach the gateway if the network comes up for a short duration, and the gateway will tear the call down. Even if the TCP FIN does not reach the gateway, the TCP keepalives sent from the gateway could reach Cisco Unified CallManager when the network comes up. Cisco Unified CallManager will send TCP RST messages in response to the keepalives as it has already closed the TCP connection. The gateway will tear down H.323 calls if it receives the RST message. Configuration of H.323 VoIP call preservation enhancements for WAN link failures involves configuring the call preserve command. If you are using Cisco Unified CallManager you must enable the Allow Peer to Preserve H.323 Calls parameter from Cisco Unified CallManagers Service Parameters window. The call preserve command causes the gateway to ignore socket closure or socket errors on H.225.0 or H.245 connections for active calls, allowing the socket to be closed without tearing down calls using those connections. Call preservation may be reported through Syslog, which optionally can be obtained through a simple network management protocol (SNMP) trap. New syslog messages are printed when call preservation is applied. An SNMP trap can be configured on this syslog message, so you can be notified when call preservation occurs on a gateway. Preservation information is displayed through the show h323 calls preserved command. The following is an example of the commands output:
CallID = 11EC , Calling Number = , Called Number = 3210000 , RemoteSignallingIPAddress=9.13.0.26 , RemoteSignallingPort=49760 , RemoteMediaIPAddress=9.13.0.11 , RemoteMediaPort=17910 , Preserved Duration = 262 , Total Duration = 562 , H225 FD = -1 , H245 FD = -1
The previous example represents one preserved call. One such display is provided per preserved call. The show h323 calls preserved displays active calls only. No history is output. To obtain additional information about a call, you can also use the show call active voice command. Calls can be cleared with the clear call voice causecode command.
Prerequisites
This feature may be used on all Cisco Unified CallManager system hardware configurations. If you are not using Cisco Unified CallManager, this feature can only be configured on the Cisco AS5000 Series. For bidirectional silence detection, Cisco IOS gateways with 5510 digital signal processors (DSPs) are needed. It is recommended that media inactivity detection be configured so that preserved calls are torn down after conversations are over. Two available media inactivity detection features are discussed in the Configuring Signal ISDN B-Channel ID section on page 109. They are RTP and RTP Control Protocol (RTCP) inactivity detection and bidirectional silence detection. For more information about media inactivity detection, see the Configuring Media Inactive Call Detection chapter in the Cisco IOS Tcl IVR and VoiceXML Application Guide12.3(14)T and Later.
112
Restrictions
H.323 VoIP Call preservation enhancements for WAN link failures does not support the following:
Calls in transient call states Calls in for which a H.225.0 connection has not occurred Calls on which supplementary services are in progress, such as when one of the parties is on hold. Calls that involve a media resource located across a WAN, such as conference resources Calls where the two parties are registered to different Cisco Unified CallManager clusters The Do Not Preserve function (using an H.225 Notify message) on networks without Cisco CallManager.
Configuring the Gateway, page 113 Configuring Cisco Unified CallManager, page 118 (Cisco CallManager Only)
Configuring H.323 VoIP Call Preservation for All Calls, page 113 Configuring H.323 VoIP Call Preservation for a Dial Peer, page 115
SUMMARY STEPS
1. 2. 3. 4. 5.
enable configure terminal voice service voip h323 call preserve [limit-media-detection]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
113
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router (config)# voice service voip
Step 4
h323
Example:
Router (config-voi-serv)# h323
Step 5
Example:
Router (config-voi-h323)# call preserve
limit-media-detectionLimits RTP and RTCP inactivity detection and bidirectional silence detection (if configured) to H.323 VoIP preserved calls only.
Step 6
exit
Example:
Router# exit
Step 7
exit
Example:
Router# exit
Examples
The following configuration example enables H.323 VoIP call preservation for all calls.
voice service voip h323 call preserve
The following configuration example enables H.323 VoIP call preservation and limits RTP and RTCP inactivity detection and bidirectional silence detection (if configured) to preserved calls only:
voice service voip h323 call preserve limit-media-detection
114
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
enable configure terminal voice-class h323 tag call preserve [limit-media-detection] exit dial-peer voice tag voip voice-class h323 tag exit
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router (config)# voice-class h323 4
Step 4
Example:
Router (config-class)# call preserve
limit-media-detectionLimits RTP and RTCP inactivity detection and bidirectional silence detection (if configured) to H.323 VoIP preserved calls only.
Step 5
exit
Example:
Router (config)# exit
Step 6
Example:
Router (config)# dial-peer voice 1 voip
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
115
Command or Action
Step 7
voice-class h323 tag
Example:
Router (config-dial-peer)# voice-class h323 4
Step 8
exit
Example:
Router# exit
Examples
The following configuration example enables H.323 VoIP call preservation for dial peer 1.
voice-class h323 4 call preserve dial-peer voice 1 voip voice-class h323 4
Troubleshooting Tips
Enable the voice iec syslog command in global configuration mode to display the reason that a call has disconnected after call preservation. The following is an example of the voice iec syslog command output line that display this information:
Nov 29 12:39:55.167: %VOICE_IEC-3-GW: H323: Internal Error (Socket error):
Calls on hold are not preserved and a non-standard message with callPreserveIE FALSE is sent in the notify message. Use the debug h225 asn command for debug. The following is example output:
Router# debug h225 asn H.225 ASN1 Messages debugging is on 3725-GW1# *May 3 15:57:27.920: H225.0 INCOMING ENCODE BUFFER::= 28501900060008914A00040000D2D6D6D87EB11D02000000090D194410A00100110140B50000120A80A480 04000101000100 *May 3 15:57:27.920: *May 3 15:57:27.920: H225.0 INCOMING PDU ::= value H323_UserInformation ::= { h323-uu-pdu { h323-message-body notify : { protocolIdentifier { 0 0 8 2250 0 4 } callIdentifier { guid '00D2D6D6D87EB11D02000000090D1944'H } } h245Tunneling FALSE nonStandardControl { { nonStandardIdentifier h221NonStandard : { t35CountryCode 181 t35Extension 0 manufacturerCode 18
116
} data '80A48004000101000100'H } } } } *May 3 15:57:27.924: H225 NONSTD INCOMING ENCODE BUFFER::= 80A48004000101000100 *May 3 15:57:27.924: *May 3 15:57:27.924: H225 NONSTD INCOMING PDU ::= value H323_UU_NonStdInfo ::= { callMgrParam { interclusterVersion 1 enterpriseID {} } callPreserveParam { callPreserveIE FALSE } }
When the call is resumed, callPreserve is again set to True as shown in the following output example:
Router# debug h225 asn *May 3 15:57:32.676: H225.0 INCOMING ENCODE BUFFER::= 28501900060008914A00040000D2D6D6D87EB11D02000000090D194410A001001B0140B50000121480A680 04000101000943004C0580323030300140 *May 3 15:57:32.676: *May 3 15:57:32.676: H225.0 INCOMING PDU ::= value H323_UserInformation ::= { h323-uu-pdu { h323-message-body notify : { protocolIdentifier { 0 0 8 2250 0 4 } callIdentifier { guid '00D2D6D6D87EB11D02000000090D1944'H } } h245Tunneling FALSE nonStandardControl { { nonStandardIdentifier h221NonStandard : { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } data '80A68004000101000943004C0580323030300140'H } } } } *May 3 15:57:32.680: H225 NONSTD INCOMING ENCODE BUFFER::= 80A68004000101000943004C0580323030300140 *May 3 15:57:32.680: *May 3 15:57:32.680: H225 NONSTD INCOMING PDU ::= value H323_UU_NonStdInfo ::= {
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
117
Use the debug cch323 all command after call setup to see if call is going into preserved state. Note that this command generates verbose output, and a console message is printed for every preserved call. In the following output, the relevant information appears in boldface:
Router# debug cch323 all (CCH323-6-CALL_PRESERVED). Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 3 Event 0x1 Nov 29 12:39:55.167: //31/A9E0FB268017/H323/cch323_h225_handle_conn_loss: cch323_h225_handle_conn_loss Call not torn down despite H.225.0 socket error: socket error status = 1, ccb status = 403760899, fd = 3, pre-V3 = 0 Nov 29 12:39:55.167: %CCH323-6-CALL_PRESERVED: cch323_h225_handle_conn_loss: H.323 call preserved due to socket closure or error, Call Id = 4593, fd = 3 Nov 29 12:39:55.167: %VOICE_IEC-3-GW: H323: Internal Error (Socket error): IEC=1.1.186.5.7.6 on callID 31 GUID=A9E0FB26600B11DA8017000653455072 Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/h323_set_release_source_for_peer: ownCallId[31], src[6] Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 3 Nov 29 12:39:55.167: //-1/xxxxxxxxxxxx/H323/cch323_cleanup_xport: hashDestroy for TcpFDTbl
The following are additional debug commands can be used to troubleshoot the problems associated with H.323 VoIP call preservation:
debug h225 asn1 debug h225 q931 debug h245 asn1
Active H323 calls with quiet clear triggered by the other half of the call Active H323 calls with TCP socket closed on the H.323 end before the H.225 or H.245 release signal is received Active H323 calls with a signal distribution layer (SDL) link that is out of service and detected on the H323 end
Procedure
Step 1 Step 2
Choose Service > Service Parameters. From the Service menu select Cisco Unified CallManager.
118
Click Advanced. Scroll to the Clusterwide Parameter (Device H.323) section. Set the Allow Peer to Preserve H.323 Calls parameter to True. At the top of the screen click Update.
RAS: Example, page 120 Gateway Security: Example, page 121 Alternate Gatekeeper Support: Example, page 123 DTMF Relay: Example, page 124 Multiple Codecs: Example, page 124 Rotary Calling Pattern: Example, page 125 H.323 Support for Virtual Interfaces: Example, page 125 H.225 Annex-G: Example, page 125 GTD Payload: Examples, page 126 H.323v4 Gateway Zone Prefix Registration Enhancements: Examples, page 127 Signal ISDN B-Channel ID: Example, page 131 H.323 VoIP Call Preservation Enhancements for WAN Link Failures Examples, page 133
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
119
RAS: Example
Figure 12 shows a Cisco 2600 and a Cisco AS5800 as gateways and a Cisco 3640 as a gatekeeper.
Figure 12 VoIP for the Cisco AS5800
Catalyst 5000
120
30460
h323-gateway voip interface h323-gateway voip id gk3.gg-dn1 ipaddr 172.18.0.0 1719 h323-gateway voip h323-id gw3@gg-dn1 h323-gateway voip tech-prefix 9# ! ! Configure the serial interface.(This configuration is for a T3 serial interface.) interface Serial1/0/0:1:23 no ip address no ip directed-broadcast ip mroute-cache isdn switch-type primary-5ess isdn incoming-voice modem no cdp enable
The following example illustrates H.323 security configuration on a Cisco AS5300 gateway.
hostname um5300 ! enable password xyz ! resource-pool disable ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero no ip domain-lookup ! isdn switch-type primary-5ess isdn voice-call-failure 0 call application voice xyz tftp://172.18.16.2/samp/xyz.tcl call application voice load xys mta receive maximum-recipients 1024 ! xgcp snmp sgcp ! controller T1 0 framing esf clock source line primary linecode b8zs pri-group timeslots 1-24 ! controller T1 1 framing esf clock source line secondary 1 linecode b8zs pri-group timeslots 1-24 ! controller T1 2 ! controller T1 3 ! voice-port 0:D ! voice-port 1:D ! dial-peer voice 4001 pots application xyz destination-pattern 4003
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
121
port 0:D prefix 4001 ! dial-peer voice 513 voip destination-pattern 1513200.... session target ras ! dial-peer voice 9002 voip destination-pattern 9002 session target ras ! dial-peer voice 4191024 pots destination-pattern 4192001024 port 0:D prefix 4001 ! dial-peer voice 1513 voip destination-pattern 1513....... session target ras ! dial-peer voice 1001 pots destination-pattern 14192001001 port 0:D ! gateway security password 151E0A0E level all ! interface Ethernet0 ip address 10.99.99.7 255.255.255.0 no ip directed-broadcast shutdown ! interface Serial0:23 no ip address no ip directed-broadcast isdn switch-type primary-5ess isdn protocol-emulate user isdn incoming-voice modem fair-queue 64 256 0 no cdp enable ! interface Serial1:23 no ip address no ip directed-broadcast isdn switch-type primary-5ess isdn protocol-emulate user isdn incoming-voice modem isdn guard-timer 3000 isdn T203 10000 fair-queue 64 256 0 no cdp enable ! interface FastEthernet0 ip address 172.18.72.121 255.255.255.192 no ip directed-broadcast duplex auto speed auto h323-gateway voip interface h323-gateway voip id um5300@vgkcisco3 ipaddr 172.18.72.58 1719 h323-gateway voip h323-id um5300 h323-gateway voip tech-prefix 1# ! no ip http server ip classless
122
ip route 10.0.0.0 172.18.72.65 ! ! line con 0 exec-timeout 0 0 length 0 transport input none line aux 0 line vty 0 4 password xyz login ! ntp clock-period 17179974 ntp server 172.18.72.124
The following example shows output from configuring secure registrations from the gatekeeper and identifying which RAS messages the gatekeeper checks to find authentication tokens:
dial-peer voice 10 voip destination-pattern 4088000 session target ras dtmf-relay h245-alphanumeric ! gateway security password 09404F0B level endpoint
The following example shows output from configuring which RAS messages contain gateway-generated tokens:
dialer-list 1 protocol ip permit dialer-list 1 protocol ipx permit radius-server host 10.25.0.0 auth-port 1645 acct-port 1646 radius-server retransmit 3 radius-server deadtime 5 radius-server key lab radius-server vsa send accounting ! gatekeeper zone local GK1 test.com 10.0.0.3 zone remote GK2 test2.com 10.0.2.2 1719 accounting security token required-for registration no use-proxy GK1 remote-zone GK2 inbound-to terminal no use-proxy GK1 remote-zone GK2 inbound-to gateway no shutdown
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
123
The following example configures DTMF relay with the cisco-rtp or h245-signal keywords when DTMF tones are sent to dial peer 103:
dial-peer voice 103 voip dtmf-relay cisco-rtp h245-signal
The following example configures the gateway to send DTMF in-band (the default) when DTMF tones to are sent dial peer 103:
dial-peer voice 103 voip no dtmf-relay
The following example shows that DTMF relay is configured on an H.323 gateway using NTE RTP and H.245 signaling. In this example, the Named Signaling Event (NSE) value in use is reassigned to a different, unassigned number (110). NTE payload is then assigned to the previously used value (100).
dial-peer voice 400 voip destination-pattern 400 dtmf-relay rtp-nte h245-signal rtp payload nse 110 rtp payload-type nte 100 session target ipv4:172.18.193.181
124
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
125
The following example shows the GTD feature configured on the system:
Router# show running-config Building configuration... Current configuration : 4192 bytes ! version 12.2 service config no service single-slot-reload-enable no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal service udp-small-servers ! hostname as5300-2 ! voice service voip signaling forward unconditional h323 ! . . .
The following example shows GTD configured with unconditional forwarding on two dial peers:
Router# show running-config Building configuration... Current configuration : 4192 bytes ! version 12.2 service config no service single-slot-reload-enable no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal service udp-small-servers ! hostname as5300-2 ! . . . ! dial-peer voice 1 pots application session incoming called-number 25164 port 0:D ! dial-peer voice 1513 voip
126
destination-pattern 1513....... session target ipv4:1.8.156.3 ! dial-peer voice 1408525 voip destination-pattern 1408525.... ! dial-peer voice 1800877 voip destination-pattern 1800877.... session target ipv4:1.8.156.3 ! dial-peer voice 2 pots destination-pattern 51550 no digit-strip direct-inward-dial port 3:D ! dial-peer voice 51557 voip destination-pattern 51557 signaling forward unconditional session target ras ! dial-peer voice 52557 voip destination-pattern 52557 signaling forward unconditional session target ipv4:1.8.156.3 ! gateway ! . .
The following example displays the status of the destination pattern database and the status of the individual destination patterns for Gatekeeper1:
Gateway1# show h323 gateway prefixes GK Supports Additive RRQ GW Additive RRQ Support Enabled Pattern Database Status : True : True : Active
Destination Active Pattern Status Dial-Peers ================================================================ 1110509* ADD ACKNOWLEDGED 2 1110511* ADD ACKNOWLEDGED 2 23* ADD ACKNOWLEDGED 2
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
127
The following example displays the zone prefix table, including the dynamic zone prefixes, for Gatekeeper1:
Gatekeeper1# show gatekeeper zone prefix all ZONE PREFIX TABLE =============================================== GK-NAME E164-PREFIX Dynamic GW-priority ----------------------------------gatekeeper1 1110507* gateway2 /5 gatekeeper2 1110508* gatekeeper1 1110509* gateway1 /5 gatekeeper1 1110511* gateway1 /5 gatekeeper1 23* gateway1 /5 gatekeeper1 4666002* gatekeeper3 55530.. gatekeeper1 7779...
Verifying Dynamic Zone Prefix Registration based on Gateway Priority Lists Example
Destination Active Pattern Status Dial-Peers Priority ================================================================= 1110509* ADD ACKNOWLEDGED 2 8 1110511* ADD ACKNOWLEDGED 2 23* ADD ACKNOWLEDGED 2 4
The following example displays the ASN1 contents of RAS messages sent during the registration process:
Gatekeeper1# debug h225 asn1 U.S. Eastern time (GMT -5/-4) voice:(919) 392-6007.Feb 5 16:27:05.894:RAS INCOMING ENCODE BUFFER::= 00 A0004306 0008914A 00040001 07072ACC 3D2800B5 00001240 0238500A 00320036 00300030 002D0031 02400500 33003600 34003000 2D003101 00C4C0 .Feb 5 16:27:05.906: .Feb 5 16:27:05.906:RAS INCOMING PDU ::= value RasMessage ::= gatekeeperRequest : { requestSeqNum 68 protocolIdentifier { 0 0 8 2250 0 4 } rasAddress ipAddress : { ip '0107072A'H port 52285 } endpointType { vendor
128
{ vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } gateway { protocol { voice : { }, h323 : { } } } mc FALSE undefinedNode FALSE } gatekeeperIdentifier {2600-1} endpointAlias { h323-ID :{3640-1}, dialedDigits :919 } } .Feb 5 16:27:05.926:RAS OUTGOING PDU ::= value RasMessage ::= gatekeeperConfirm : { requestSeqNum 68 protocolIdentifier { 0 0 8 2250 0 4 } gatekeeperIdentifier {2600-1} rasAddress ipAddress : { ip '01070721'H port 1719 } } .Feb 5 16:27:05.934:RAS OUTGOING ENCODE BUFFER::= 04 80004306 0008914A 00040A00 32003600 30003000 2D003100 01070721 06B7 .Feb 5 16:27:05.938: .Feb 5 16:27:05.946:RAS INCOMING ENCODE BUFFER::= 0E C0004406 0008914A 00048001 00010707 2A06B801 00010707 2ACC3D28 00B50000 12400238 50024005 00330036 00340030 002D0031 0100C4C0 A0003200 36003000 30002D00 3100B500 0012288B 08000200 3B010001 00018002 7000 .Feb 5 16:27:05.958: .Feb 5 16:27:05.958:RAS INCOMING PDU ::= value RasMessage ::= registrationRequest : { requestSeqNum 69 protocolIdentifier { 0 0 8 2250 0 4 } discoveryComplete TRUE callSignalAddress { ipAddress : { ip '0107072A'H port 1720
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
129
} } rasAddress { ipAddress : { ip '0107072A'H port 52285 } } terminalType { vendor { vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } gateway { protocol { voice : { }, h323 : { } } } mc FALSE undefinedNode FALSE } terminalAlias { h323-ID :{3640-1}, dialedDigits :919 } gatekeeperIdentifier {2600-1} endpointVendor { vendor { t35CountryCode 181 t35Extension 0 manufacturerCode 18 } } timeToLive 60 keepAlive FALSE willSupplyUUIEs FALSE maintainConnection TRUE usageReportingCapability { nonStandardUsageTypes { } startTime NULL endTime NULL terminationCause NULL } }
130
.Feb 5 16:27:05.998:RAS OUTGOING PDU ::= value RasMessage ::= registrationConfirm : { requestSeqNum 69 protocolIdentifier { 0 0 8 2250 0 4 } callSignalAddress { } terminalAlias { h323-ID :{3640-1}, dialedDigits :919 } gatekeeperIdentifier {2600-1} endpointIdentifier {816F7A1000000001} alternateGatekeeper { } timeToLive 60 willRespondToIRR FALSE maintainConnection TRUE supportsAdditiveRegistration NULL usageSpec { { when { end NULL inIrr NULL } callStartingPoint { connect NULL } required { nonStandardUsageTypes { } startTime NULL endTime NULL terminationCause NULL } } }
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
131
ip subnet-zero ! ! no ip domain lookup ! voice service voip h323 billing b-channel sip ds0-num ip dhcp pool vespa network 192.168.0.0 255.255.255.0 option 150 ip 192.168.0.1 default-router 192.168.0.1 ! ! voice call carrier capacity active ! voice class codec 1 codec preference 2 g711ulaw ! ! no voice hpi capture buffer no voice hpi capture destination ! ! fax interface-type fax-mail mta receive maximum-recipients 0 ! ! interface Ethernet0/0 ip address 10.8.17.22 255.255.0.0 half-duplex ! interface FastEthernet0/0 ip address 192.168.0.1 255.255.255.0 speed auto no cdp enable h323-gateway voip interface h323-gateway voip id vespa2 ipaddr 10.8.15.4 1718 ! router rip network 10.0.0.0 network 192.168.0.0 ! ip default-gateway 10.8.0.1 ip classless ip route 0.0.0.0 0.0.0.0 10.8.0.1 no ip http server ip pim bidir-enable ! ! tftp-server flash:SEPDEFAULT.cnf tftp-server flash:P005B302.bin call fallback active ! ! call application global default.new call rsvp-sync ! voice-port 1/0 ! voice-port 1/
132
! mgcp profile default ! ! dial-peer voice 1 pots destination-pattern 5100 port 1/0 ! dial-peer voice 2 pots destination-pattern 9998 port 1/1 ! dial-peer voice 123 voip destination-pattern [12]... session protocol sipv2 session target ipv4:10.8.17.42 dtmf-relay sip-notify ! gateway ! sip-ua retry invite 3 retry register 3 timers register 150 registrar dns:myhost3.cisco.com expires 3600 registrar ipv4:10.8.17.40 expires 3600 secondary ! ! telephony-service max-dn 10 max-conferences 4 ! ephone-dn 1 number 4001 ! ephone-dn 2 number 4002 ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 login line vty 5 15 login ! no scheduler allocate end
H.323 VoIP Call Preservation Enhancements for WAN Link Failures Examples
This section includes the following configuration examples:
H.323 VoIP Call Preservation for All Calls Example, page 134 H.323 VoIP Call Preservation for a Dial Peer Example, page 134 H.323 Call Preservation for RTP and RTCP and Silence Detection Example, page 134 RTP and RTCP Inactivity Detection Configuration Example, page 134 Bidirectional Silence Detection Enable Example, page 134
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
133
H.323 Call Preservation for RTP and RTCP and Silence Detection Example
The following configuration example enables H.323 VoIP call preservation and limits RTP and RTCP inactivity detection and bidirectional silence detection (if configured) to H.323 VoIP preserved calls only:
voice service voip h323 call preserve limit-media-detection
134
Additional References
In This Guide
Cisco IOS H.323 Feature Roadmap on page 1Describes how to access Cisco Feature Navigator; also lists and describes, by Cisco IOS release, H.323 features for that release H.323 Overview on page 7Describes relevant underlying technology; lists related documents, standards, MIBs, and RFCs; and describes how to obtain technical assistance Additional References section on page 19Lists additional H.323 references
Cisco IOS SIP Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/callc_c/sip_c/ sipc1_c/chapter8.htm Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/sec_vcg.htm Cisco IOS TCL and VoiceXML Application Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ivrapp/in dex.htm Cisco SS7 Interconnect for Voice Gateways Solution documentation at http://www.cisco.com/univercd/cc/td/doc/product/access/sc/rel7/soln/das/index.htm Configuring AAA for Cisco Voice Gateways at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/add_c/acct_c/i ndex.htm Dial Peer Configuration on Voice Gateway Routers at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/int_c/dpeer_c/ index.htm Trunk Connections and Conditioning Features guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/vcltrunk.htm VoIP Gateway Trunk and Carrier Based Routing Enhancements at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ftgwrepg .htm
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
135
136
Release 12.2(11)T
Feature History for Configuring a Gatekeeper to Provide Nonavailability Information for Terminating Endpoints
Modification This feature was introduced. The carrier based routing without the presence of the GKTMP application server was introduced. The carrier based routing without the presence of the GKTMP application server was implemented in this release.
Feature History for Gatekeeper Alias Registration and Address Resolution Enhancements
Release 12.2(11)T
Release 12.2(11)T
Release 12.3(1)
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
137
Modification This feature was introduced. The encrypted keyword was added to the security password-group command.
Feature History for Gatekeeper Transaction Message Protocol Interface Resiliency Enhancement
Modification This feature was introduced. This feature was integrated into this release. The Cisco 2500 series is not supported in this release.
Modification This feature was introduced. Support was added for the Cisco AS5350 and Cisco AS5400. The call rscmon update-timer command was added. The call rscmon update-timer command was integrated into this release. Support for the Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included. This feature was implemented on the Cisco AS5850. This features was integrated into this release.
12.2(2)XB1 12.2(11)T
Modification This feature was introduced. This feature was integrated into this release.
Modification This feature was introduced. This feature was integrated into this release. This feature was implemented on the Cisco AS5850. This feature was implemented on the Cisco AS5300 and Cisco AS5850 and integrated into this release.
Release 12.2(2)T
138
Release 12.2(4)T
Release 12.2(15)T
Feature History for VoIP Outgoing Trunk Group ID and Carrier ID for Gateways and Gatekeepers
Release 12.2(11)T
Modification This feature was introduced, and the carrier-id keyword and carrier-name argument were introduced for the endpoint alt-ep h323id command.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note
For more information about these and other related Cisco IOS voice features, see the following:
H.323 Overview section on page 7 Entire Cisco IOS Voice Configuration Libraryincluding library preface and glossary, other feature documents, and troubleshooting documentationat http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vcl.htm.
Contents
Prerequisites for Configuring H.323 Gatekeepers and Proxies, page 140 Restrictions for Configuring H.323 Gatekeepers and Proxies, page 140 How to Configure H.323 Gatekeepers and Proxies, page 140 Configuration Examples for H.323 Gatekeepers and Proxies, page 234 Additional References, page 255
Note
For complete descriptions of the commands used in this chapter, see the command references listed in the Additional References section on page 255.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
139
Configuring H.323 Gatekeepers and Proxies Prerequisites for Configuring H.323 Gatekeepers and Proxies
Perform the prerequisites that are listed in the Prerequisites for Configuring an H.323 Network section on page 7. Install Cisco IOS Release 12.3 or later on your gatekeeper.
Configuring Hot Standby, page 141 Configuring Gatekeeper Zones, page 141 Configuring Intergatekeeper Communication, page 149 Configuring Gatekeeper Alias Registration and Address Resolution, page 151 Configuring Load Balancing with Alternate Gatekeepers, page 154 Configuring Remote Clusters, page 157 Configuring Static Nodes, page 161 Configuring AAA and RADIUS, page 163 Configuring Security and Authentication, page 170 Configuring E.164 Interzone Routing, page 182 Configuring a Dialing Prefix for Each Gateway, page 185 Configuring Gatekeeper Interaction with External Applications, page 186 Configuring Gatekeeper Proxied Access, page 193 Configuring a Forced Disconnect on a Gatekeeper, page 195 Configuring an H.323 Proxy Server, page 196 Configuring Border Elements, page 215 Configuring Endpoints, page 216 Configuring the IRR Timer and Disable IRQ Requests, page 228 Configuring Sequential LRQs, page 230
140
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Select one interface on each gatekeeper to serve as the HSRP interface and configure these two interfaces so that they belong to the same HSRP group but have different priorities. The one with the higher priority becomes the active gatekeeper; the other assumes the standby role. Make a note of the virtual HSRP IP address shared by both of these interfaces.
Note
For more information on HSRP and HSRP configuration, see the Configuring HSRP section of the Cisco IOS IP Application Services Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcg/tiapp_c/fhrp/htaiphs r.htm.
Configure the gatekeepers so that the HSRP virtual IP address is the RAS address for all local zones. Make sure that the gatekeeper-mode configurations on both routers are identical. If the endpoints and gateways are configured so that they use a specific gatekeeper address (rather than multicasting), use the HSRP virtual IP address as the gatekeeper address. You can also let the endpoints and gateways find the gatekeeper by multicasting. As long as it is on standby status, the secondary gatekeeper neither receives nor responds to multicast or unicast requests.
As long as both gatekeepers are up, the one with the higher priority on its HSRP interface is the active gatekeeper. If this active gatekeeper fails, or if its HSRP interface fails, the standby HSRP interface assumes the virtual HSRP address and, with it, the active gatekeeper role. When the gatekeeper with the higher HSRP priority comes back online, it reclaims the HSRP virtual address and the gatekeeper function, while the secondary gatekeeper goes back to standby status.
Note
Gatekeeper failover is not completely transparent to endpoints and gatekeepers. When the standby gatekeeper takes over, it does not have the state of the failed gatekeeper. If an endpoint that had registered with the failed gatekeeper now makes a request to the new gatekeeper, the gatekeeper responds with a reject, indicating that it does not recognize the endpoint. The endpoint must reregister with the new gatekeeper before it can continue H.323 operations.
Restrictions for Gatekeeper Zones, page 142 Information About Gatekeeper Zones, page 142 Configuring Gatekeeper Zones, page 143 Configuring Destination Zones, page 148
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
141
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
The gateway can register with only one gatekeeper at a time. Only E.164 address resolution is supported. Because the gateway can register with only one gatekeeper at a time, redundant H.323 zone support provides only redundancy and does not provide any load balancing. Although redundant H.323 zone support allows you to configure alternate gatekeepers, it does not insert information in the alternate gatekeeper field of some RAS messages.
When more than one gateway is registered in a zone, the updated zone prefix command allows selection priorities to be assigned to these gateways on the basis of the dialed prefix. Gateway resource reporting allows the gateway to notify the gatekeeper when H.323 resources are getting low. The gatekeeper uses this information to determine which gateway to use to complete a call.
The gatekeeper maintains a separate gateway list, ordered by priority, for each of its zone prefixes. If a gateway does not have an assigned priority for a zone prefix, it defaults to priority 5, which is the median. To explicitly bar the use of a gateway for a zone prefix, the gateway must be defined as having a priority 0 for that zone prefix. When selecting gateways, the gatekeeper identifies a target pool of gateways by performing a longest zone prefix match; then it selects from the target pool according to priorities and resource availability. If all high-priority gateways are busy, a low-priority gateway might be selected.
Gatekeeper Multiple Zone Support, page 143 Zone Prefixes, page 143 Technology Prefixes, page 143
142
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Redundant H.323 zone support allows users to configure multiple remote zones to service the same zone or technology prefix. A user is able to configure more than one remote gatekeeper to which the local gatekeeper can send location requests (LRQs). This allows for more reliable call completion. Redundant H.323 zone support is supported on all gatekeeper-enabled IOS images.
Zone Prefixes
The zone prefixes (typically area codes) serve the same purpose as the domain names in the H.323-ID address space. For example, the local gatekeeper can be configured with the knowledge that zone prefix 212...... (that is, any address beginning 212 and followed by 7 arbitrary digits) is handled by the gatekeeper gatekeeper_2. Then, when the local gatekeeper is asked to admit a call to destination address 2125551111, it knows to send the LRQ to gatekeeper_2. When gatekeeper_2 receives the request, the gatekeeper must resolve the address so that the call can be sent to its final destination. There may be an H.323 endpoint with that E.164 address that has registered with gatekeeper_2, in which case gatekeeper_2 returns the IP address for that endpoint. However, it is possible that the E.164 address belongs to a non-H.323 device (for example, a telephone or an H.320 terminal). Because non-H.323 devices do not register with gatekeepers, gatekeeper_2 cannot resolve the address. The gatekeeper must be able to select a gateway that can be used to reach the non-H.323 device. This is where the technology prefixes (or gateway-type) become useful.
Technology Prefixes
The network administrator selects technology prefixes (tech-prefixes) to denote different types or classes of gateways. The gateways are then configured to register with their gatekeepers with these prefixes. For example, voice gateways can register with tech-prefix 1#, H.320 gateways with tech-prefix 2#, and voicemail gateways with tech-prefix 3#. More than one gateway can register with the same type prefix. When this happens, the gatekeeper makes a random selection among gateways of the same type. If the callers know the type of device that they are trying to reach, they can include the technology prefix in the destination address to indicate the type of gateway to use to get to the destination. For example, if a caller knows that address 2125551111 belongs to a regular telephone, the destination address of 1#2125551111 can be used, where 1# indicates that the address should be resolved by a voice gateway. When the voice gateway receives the call for 1#2125551111, it strips off the technology prefix and bridges the next leg of the call to the telephone at 2125551111.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
gatekeeper zone local zonename domainname [ras-ip-address] [port] zone remote zonename domainname ip-address [port] [cost cost [priority priority]] zone prefix gatekeeper-name e164-prefix [blast | seq] [gw-priority priority gw-alias [gw-alias, ...]] use-proxy local-zone remote-zone zone-name outbound-from gateway zone subnet local-gatekeeper-name [default | subnet-address {/bits-in-mask | mask} enable]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
143
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
7. 8. 9.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# zone local gk408or650 xyz.com
zone-nameGatekeeper name or zone name. This is usually the fully domain-qualified host name of the gatekeeper. For example, if the domain name is cisco.com, the gatekeeper name might be gk1.cisco.com. However, if the gatekeeper is controlling multiple zones, the zone name for each zone should be some unique string that has a mnemonic value. domain-nameDomain name served by this gatekeeper. ras-ip-addressIP address of one of the interfaces on the gatekeeper. When the gatekeeper responds to gatekeeper discovery messages, it signals the endpoint or gateway to use this address in future communications. Setting this address for one local zone makes it the address used for all local zones. portRAS signaling port number for the local zone. Range: 1 to 65535. Default: 1719.
144
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
zone remote zone-name domain-name ip-address [port] [cost cost [priority priority]]
Purpose Defines the remote zone cluster. Keywords and arguments are as follows:
zone-nameID of the remote zone. domain-nameID of the domain the remote zone is serving. ip-addressIP address for the remote gatekeeper. portRAS signaling port number for the remote zone. Range: 1 to 65535. Default: the well-known RAS port number 1719. cost costCost of the zone. Range: 1 to 100. Default: 50. priority priorityPriority of the zone. Range: 1 to 100. Default: 50.
Example:
Router(config-gk)# zone remote zone1 domain 192.168.0.0 123 cost 25 priority 25
When several remote zones are configured, you can rank them by cost and priority value. A zone with a lower cost value and a higher priority value is given preference over others.
Step 4
zone prefix gatekeeper-name e164-prefix [blast | seq] [gw-priority priority gw-alias [gw-alias, ...]]
Adds a prefix to the gatekeeper zone list. For redundant H.323 zone support, you can configure multiple remote gatekeepers for the same prefix, but only one of the gatekeepers defined for any given zone prefix can be local. It is recommended that you limit the number of remote gatekeepers that serve the same zone prefix to two. By default, LRQs are sent sequentially to the remote gatekeepers. With sequential, LRQs are sent one at a time with a delay between them. With blast, LRQs are sent back-to-back in rapid sequence without delay. If you want to specify blast for each gatekeeper, you need to specify blast on only one zone prefix command per E.164 prefix. The order in which zone and technology prefixes are configured determines the order in which LRQs are sent to the remote gatekeepers. Using zone prefixes as an example, the local gatekeeper routes a call to the first zone that responds with an LCF. If the local gatekeeper is configured for a zone prefix that already has remote gatekeepers configured, the local gatekeeper automatically puts that zone prefix at the top of the list.
Example:
Router(config-gk)# zone prefix gatekeeper1 888 blast
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
145
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 5
use-proxy local-zone remote-zone zone-name outbound-from gateway
Purpose Specifies that all calls originating from gateways in the local zone and bound to the remote zone route through a proxy, which should be registered with the gatekeeper. Keywords and arguments are as follows:
Example:
Router(config-gk)# use-proxy zone123 remote-zone remote456 outbound-from gateway
local-zoneLocal zone. remote-zone zone-nameProxy policy for calls to or from a specific gatekeeper or zone. outbound-fromProxy policy as it applies to calls that are outbound from the local zone to a remote zone. Each use-proxy command defines the policy for only one direction. gatewayType of local device to which the policy applies. Applies the policy only to local gateways.
146
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 6
zone subnet local-gatekeeper-name [default | subnet-address {/bits-in-mask | mask} enable]
Purpose Defines a set of subnets that constitute the gatekeeper zone. Enables the gatekeeper for each of these subnets and disables it for all other subnets. (Repeat for each subnet.) Keywords and arguments are as follows:
Example:
Router(config-gk)# zone subnet gatekeeper3 default
local-gatekeeper-nameName of the local gatekeeper. Should be a Domain Name System (DNS) host name if you use DNS to locate remote zones. defaultApplies to all other subnets that are not specifically defined by this command. subnet-addressAddress of the subnet that is being defined. /bits-in-maskNumber of bits of the mask to be applied to the subnet address. You must enter a slash before this argument. maskMask (in dotted string format) to be applied to the subnet address. enableGatekeeper accepts discovery and registration from the specified subnets.
To define the zone as being all but one set of subnets by disabling that set and enabling all other subnets, use the no form of the command as follows: Configure no zone subnet local-gatekeeper-name subnet-address {/bits-in-mask | mask} enable. To accept the default behavior, which is that all subnets are enabled, use the no form of the command as follows: no zone subnet local-gatekeeper-name default enable. You can use this command more than once to create a list of subnets controlled by a gatekeeper. The subnet masks need not match actual subnets in use at your site. For example, to specify a particular endpoint, show its address as a 32-bit netmask. If a local gatekeeper name is contained in the message, it must match the local-gatekeeper-name argument.
Note Step 7 Step 8
To explicitly enable or disable a particular endpoint, specify its host address using a 32-bit subnet mask.
Example:
Router(config-gk)# no shutdown
Step 9
exit
Example:
Router(config-gk)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
147
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
The ARJ message functionality is available for only tech and zone prefix routing. By default, this functionality is not enabled. In addition to the gatekeeper maintaining concurrent call counts per zone, after receiving ARQ and LRQ messages from a requesting gateway, the gatekeeper can also check the concurrent call count of the destination zone. If the call count exceeds a preconfigured maximum threshold and if no other remote zone has been configured, the gatekeeper sends an ARJ or LRJ message to the requesting gateway. The ARJ reject reason is shown as resource unavailable and the LRJ reject reason is shown as undefined reason. If a remote zone has been configured, the gatekeeper sends LRQ messages to the remote zones. If no remote zone has been defined or if the gatekeeper receives LRJ messages from all the remote gateways to which it has sent LRQ messages, the gatekeeper sends an ARJ message (with the reject reason set to resource unavailable) and an LRJ message (with the reject reason set to undefined reason) to the requesting gateway. After receiving an ARQ message from a requesting gateway and if the destination is a local zone, the gatekeeper sends an ACF message to the requesting gateway only if the local destination gateway has resources. If the local destination gateway is out of resources, the gatekeeper tries to send an LRQ message to remote destination zones until it receives a location confirmation (LCF) message or until no remote zones remain. If no remote zone has been defined or if the gatekeeper receives LRJ messages from remote destinations for all the LRQ messages sent, the gatekeeper sends an ARJ message to the requesting gateway. The reject reason in the ARJ message to the requesting gateway is set to resource unavailable. To configure session bandwidth limits of the destination zones and how the gateway should handle requests if resources run low, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4.
148
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command or Action
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
bandwidth check-destination
Specifies the maximum aggregate bandwidth for H.323 traffic and enables destination bandwidth checking.
Example:
Router config-gk)# bandwidth check-destination
Step 3
arq reject-resource-low
Example:
Router(config-gk)# arq reject-resource-low
(Optional) Configures the gatekeeper to reject an admissions request (ARQ) from a requesting gateway if resources run low. Exits the current mode.
Step 4
exit
Example:
Router(config-gk)# exit
Configuring Intergatekeeper Communication Using DNS, page 149 Configuring Intergatekeeper Communication Manually, page 150
SUMMARY STEPS
1. 2. 3.
ip name-server dns-servername [server-address2...server-address6 ip domain-name name ras [gk-id@] host [:port] [priority]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
149
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
ip name-server dns-servername [server-address2...server-address6]
dns-servernameIP address of the name server. server-address2...server-address6IP addresses of up to five additional name servers.
Example:
Router(config)# ip name-server 192.168.0.0 192.168.1.1
Step 2
ip domain-name name
Example:
Router(config)# ip domain-name cisco.com
Defines a default domain name that Cisco IOS software uses to complete unqualified host names (names without a dotted-decimal domain name). The argument is as follows:
nameDefault domain name used to complete unqualified host names. Do not include the initial period that separates an unqualified name from the domain name.
Step 3
For all gatekeepers in the system, enter a text record of the form into DNS. Arguments are as follows:
gk-idOptional gatekeeper ID. If the optional gatekeeper ID is not specified, host is used as the gatekeeper ID. hostIP address or the actual host name of the gatekeeper in the form host.some_domain.com. portPort number other than RAS port 1719. priorityOrder in which the listed gatekeepers are searched for endpoints. Gatekeepers with lower priorities are searched before those with higher priorities. See the note below about text records.
Note
Note
How you enter the text record for a particular domain depends on the DNS implementation. The following examples are for the Berkeley Internet Name Domain (BIND). These records are typically entered into the hosts database:
zone1.comintxtras zone2.comintxtras zone3.comintxtras zone4.comintxtras zone5.comintxtras gk.zone1.com [email protected] [email protected]:1725 [email protected]:1725 123 [email protected]:1725
150
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Statically specifies a remote zone if Domain Name System (DNS) is unavailable or undesirable. Enter this command for each gatekeeper. Arguments are as follows:
Example:
Router(config-gk)# zone remote gatekeeper4 xxx.com 192.168.0.0
other-gatekeeper-nameName of the remote gatekeeper. other-domain-nameDomain name of the remote gatekeeper. other-gatekeeper-addressIP address of the remote gatekeeper. portRAS signaling port for the remote zone. Range: 1 to 65 535. Default: the well-known RAS port number 1719.
Step 3
exit
Example:
Router(config-gk)# exit
Alias Registration
When a gatekeeper receives an RRQ message from a gateway with a Foreign Exchange Station (FXS) port configured to register its E.164 address, it performs either of the following steps:
If the E.164 alias is prefix-qualified, the gatekeeper tries to match the prefix with the zone prefixes it has defined. If a prefix is found, the gatekeeper searches its E.164 alias table with the exact alias from the RRQ message, including the prepended prefix, to make sure the alias is unique. If no zone prefix is found, the gatekeeper searches its E.164 alias table with the exact alias from the RRQ message:
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
151
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
If the alias does exist and it is not owned by the same endpoint, the gatekeeper sends a
from the RRQ message, with or without the prefix qualifier, and sends a registration confirm (RCF) message.
Note
With the Gatekeeper Alias Registration and Address Resolution Enhancements feature, the gatekeeper creates an entry in its E.164 alias table for the exact alias name from the RRQ message. It does not strip off the prefix before creating the entry.
Address Resolution
Resolution for ARQ Messages
When a gatekeeper receives an admission request (ARQ) message from a gateway, it performs either of the following steps:
If there is a technology prefix specified in the admission request and it is a hopoff technology prefix, the gatekeeper sends a location request (LRQ) message. If there is no technology prefix or the technology prefix is not a hopoff technology prefix, the gatekeeper uses the exact E.164 alias in the ARQ message, including the zone prefix, if any, to search its zone prefix table and the E.164 aliases registered by local endpoints:
If no zone-prefix match is found and the arq reject-unknown prefix command is set, the
is found with the specified technology prefix or the default technology prefix, the gatekeeper sends an ACF. If no local gateway with the specified technology prefix is found, the gatekeeper sends an ARJ message. If there is no matching technology prefix and no default technology prefix is set, the gatekeeper sends an ARJ message.
Resolution for LRQ Messages
When a gatekeeper receives an LRQ message from a gateway, it performs either of the following steps:
'If a hopoff technology prefix is found in the Location Request and the destination zone is not local, the gatekeeper sends an LRQ message, if the lrq forward-queries command is set. If there is no technology prefix or the technology prefix is not a hopoff technology prefix, the gatekeeper uses the exact E.164 alias in the LRQ message to search its zone prefix table and the registered E.164 aliases.
If no match is found and the lrq reject-unknown prefix command is set, the gatekeeper sends
command is set, the gatekeeper sends an LRQ message to the destination zone.
152
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
If the destination zone is local and the destination address is registered, the gatekeeper sends a
is found with the specified technology prefix or the default technology prefix, the gatekeeper sends an LCF message. If no local gateway with the specified technology prefix is found, the gatekeeper sends an LRJ message.
If the destination zone is local and the destination address is not registered, and there is no
matching technology prefix and no default technology prefix is set, the gatekeeper sends an LRJ message.
Request Processing
A gatekeeper with the Gatekeeper Alias Registration and Address Resolution Enhancements feature processes requests in a new way, as showing in the following examples. The gatekeeper is configured with two local zones, zone1 and zone2, and three prefixes, as follows:
Router(config-gk)#zone Router(config-gk)#zone Router(config-gk)#zone Router(config-gk)#zone Router(config-gk)#zone local zone1 domain.com local zone2 domain.com prefix zone2 407 ....... prefix zone1 408 ....... prefix zone1 409 .......
Table 7 shows various E.164 alias registration requests and the resulting gatekeeper actions.
Table 7 E.164 Alias Registration Requests and Gatekeeper Actions
Action Two entries are created in the E.164 alias hash table: 4085551000 4095552000
4095551000 is created in the table. 4085553000 is created in the table. 5551234 is created in the table. Gatekeeper rejects the request because it is a duplicate alias. Gatekeeper rejects the request because the two prefixes (407 and 408) have different zone names (zone1 and zone2).
To allow endpoints to communicate between zones, gatekeepers must be able to determine which zone an endpoint is in and be able to locate the gatekeeper responsible for that zone. If the Domain Name System (DNS) mechanism is available, a DNS domain name can be associated with each gatekeeper.
Note
For more information on DNS, see the Configuring Intergatekeeper Communication section on page 149.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
153
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Restrictions for Load Balancing with Alternate Gatekeepers, page 154 Information About Load Balancing with Alternate Gatekeepers, page 154 Configuring Load Balancing with Alternate Gatekeepers, page 155 Verifying Load Balancing with Alternate Gatekeepers, page 156
The gatekeeper-to-gatekeeper redundancy and load-sharing mechanism requires the Cisco H.323 VoIP Gatekeeper for Cisco Access Platforms feature. The order in which LRQs are sent to the gatekeepers is based on the order in which the gatekeepers are listed. You cannot specify a priority number for a gatekeeper. Regardless of the order in which the LRQs are sent, the gateway still uses the first gatekeeper that sends an LCF. The settings for delay between LRQs and the LRQ window are global and cannot be set on a per-zone or technology-prefix basis. The number of remote gatekeepers multiplied by the delay per LRQ cannot exceed the Routing Information Protocol (RIP) timeout. Therefore, we recommend that you limit your list of remote gatekeepers to two or three. If LRQ forwarding is enabled on the directory gatekeeper, the sequential setting for LRQs is ignored. Only E.164 address resolution is supported. Using redundant H.323 zone support in the directory gatekeeper can generate extra RAS messages. Therefore, the number of directory gatekeeper levels should be kept to a minimum (two or three at the maximum). If a gatekeeper fails, the endpoint might use alternate gatekeepers to continue operation. The example below creates a local cluster associated with a local zone and defines an alternate gatekeeper within the cluster.
154
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
The gatekeeper-to-gatekeeper redundancy and load-sharing mechanism allows you to configure gatekeeper support and to give preference to specific gatekeepers. You may choose whether the LRQs are sent simultaneously or sequentially (one at a time) to the remote gatekeepers in the list. If the LRQs are sent sequentially, a delay is inserted after the first LRQ and before the next LRQ is sent. This delay allows the first gatekeeper to respond before the LRQ is sent to the next gatekeeper. The order in which LRQs are sent to the gatekeepers is based on the order in which the gatekeepers are listed (using either the zone prefix command or the gw-type-prefix command). Once the local gatekeeper has sent LRQs to all the remote gatekeepers in the list (either simultaneously or sequentially), if it has not yet received a location confirmation (LCF), it opens a window. During this window, the local gatekeeper waits to see whether a LCF is subsequently received from any of the remote gatekeepers. If no LCF is received from any of the remote gatekeepers while the window is open, the call is rejected.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7.
gatekeeper zone local local-zone-name domain-name [ras-ip-address] zone cluster local cluster-name local-zone-name element alternateGK ip-address [port] exit load-balance [endpoints max-endpoints] [calls max-calls] [cpu max-%cpu] [memory max-%mem-used] exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Defines the gatekeepers name or zone name. This is usually the fully domain-qualified host name of the gatekeeper.
Example:
Router(config-gk)# zone local gk408or650 xyz.com
Step 3
Example:
Router(config-gk)# zone cluster local RTPCluster RTPGK1
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
155
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 4
element alternateGK ip-address [port]
Purpose Defines the alternate gatekeeper in the local cluster. The alternate gatekeeper is an alternate gatekeeper to the local zone. Arguments are as follows:
Example:
Router(config-gk-cluster)# element alternateGK1 192.168.0.0
alternateGKName of the alternate gatekeeper. ip-addressIP address of the gatekeeper. port RAS signaling port number. Range: 1 to 65535. Default: the well-known RAS port number 1719.
Step 5
exit
Example:
Router(config-gk-cluster)# exit
Step 6
Example:
Router(config-gk)# load-balance endpoints 200 calls 100 cpu 75 memory 80
endpoints max-endpointsMaximum number of endpoints calls max-callsMaximum number of calls cpu max-%cpuMaximum percentage of CPU usage memory max-%mem-usedMaximum percentage of memory used
Step 7
exit
Example:
Router(config-gk)# exit
show gatekeeper status Use this command to see if load balancing is configured and if accounting vendor-specific attributes (VSAs) are enabled. The last five lines shown below, starting with Load Balance Count, display only when load balancing is enabled.
Router# show gatekeeper status Gatekeeper State: UP Load Balancing: ENABLED Zone Name: RoseGK Zone Name: PurpleGK Accounting: DISABLED Security: DISABLED Maximum Remote Bandwidth: unlimited Current Remote Bandwidth: 0 kbps Current Remote Bandwidth (w/Alt GKs): 0 kbps Load Balance Count: 0 Calls: 0/unlimited Endpoints: 0/unlimited
156
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Step 2
show gatekeeper performance statistics Use this command to verify performance statistics.
Router# show gatekeeper performance statistics Performance statistics captured since:19:00:12 EST Sun Feb 28 1993 RAS inbound message counters: Originating ARQ:426 Terminating ARQ:306 RAS outbound message counters: ACF:731 ARJ:1 LCF:154 LRJ:0 ARJ due to overload:0 LRJ due to overload:0 Load balancing events:0 Real endpoints:5
LRQ:154
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7.
gatekeeper zone local zonename domainname [ras-ip-address] [port] zone cluster remote remote-cluster-name domain-name [cost cost [priority priority]] element alternateGK IP-address [port] exit zone prefix remote-clustername e164-prefix exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
157
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# zone local gk408or650 xyz.com
Step 3
remote-cluster-nameRemote cluster name. domain-nameID of the domain the remote cluster is serving. cost costCost. Range: 1 to 100. Default: 50. priority priorityPriority value. Range: 1 to 100. Default: 50.
Example:
Router(config-gk)# zone cluster remote SJCluster cisco.com
Step 4
Example:
Router(config-gk-cluster)# element alternateGK1 192.168.0.0
Step 5
exit
Example:
Router(config-gk-cluster)# exit
Step 6
Example:
Router(config-gk)# zone prefix 40_gatekeeper 408*
remote-clusternameName of a local or remote cluster, which must have been defined by using the zone local or zone remote command. e164-prefix E.164 prefix in standard form followed by dots (.). Each dot represent a number in the E.164 address. For example, 212....... is matched by 212 and any seven numbers. Although a dot representing each digit in an E.164 address is the preferred configuration method, you can also enter an asterisk (*) to match any number of digits.
Note
158
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 7
exit
Example:
Router(config-gk)# exit
show gatekeeper status cluster Use this command to display each element of a cluster. This command shows the health of the elements in a cluster and reports on the percentage of memory and CPU usage, the number of active calls, and the number of endpoints registered on the element. The Last Announce field tells you the time since the last announcement message was received from the alternate gatekeeper. In this example, MsPacman and LavenderGK are part of a local cluster.
Router# show gatekeeper status cluster CLUSTER INFORMATION =================== Active Endpoint %Mem %CPU Calls Count ------------------17 2 0 1 30 1 0 4 Last Announce -------Local Host 14s
Step 2
show gatekeeper zone status Use this command to display the bandwidth information for all zones.
Router# show gatekeeper zone status GATEKEEPER ZONES ================ Domain Name RAS Address ---------------------
GK name -------
RoseGK cisco.com 209.165.201.30 1719 LS BANDWIDTH INFORMATION (kbps) : Maximum interzone bandwidth :unlimited Current interzone bandwidth :0 Current interzone bandwidth (w/ Alt GKs) :0 Maximum total bandwidth :unlimited Current total bandwidth :0 Current total bandwidth (w/ Alt GKs) :0 Maximum session bandwidth :unlimited SUBNET ATTRIBUTES : All Other Subnets :(Enabled) PROXY USAGE CONFIGURATION : Inbound Calls from all other zones : to terminals in local zone RoseGK :use proxy to gateways in local zone RoseGK :do not use proxy Outbound Calls to all other zones : from terminals in local zone RoseGK :use proxy from gateways in local zone RoseGK :do not use proxy
Step 3
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
159
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Use this command to display information about alternate gatekeepers. PRI represents the priority value assigned to an alternate gatekeeper. This field ranges from 0 to 127, with 127 representing the lowest priority.
Router# show gatekeeper zone cluster ALTERNATE GATEKEEPER INFORMATION ================================ LOCAL GK NAME ALT GK NAME ------------- ----------RoseGK LilacGK TOT BW PRI (kbps) --- -----120 0 INT BW (kbps) -----0 REM BW (kbps) -----0 LAST ANNOUNCE -------7s ALT GK STATUS -----CONNECTED
Step 4
show proxy h323 status Use this command to display information about the proxy such as the T.120 mode and what port is being used.
Router# show proxy h323 status H.323 Proxy Status ================== H.323 Proxy Feature:Enabled Proxy interface = Ethernet0:UP Proxy IP address = 209.165.200.254 Proxy IP port = 11720 Application Specific Routing:Disabled RAS Initialization:Complete Proxy aliases configured: H323_ID:PROXY Proxy aliases assigned by Gatekeeper: H323_ID:PROXY Gatekeeper multicast discovery:Disabled Gatekeeper: Gatekeeper ID:DVM1 IP address:209.165.200.254 Gatekeeper registration succeeded T.120 Mode:PROXY RTP Statistics:OFF Number of calls in progress:0
Step 5
show gatekeeper cluster Use this command to display all clusters defined in the gatekeeper and with their component elements.
Router# show gatekeeper cluster gatekeeper zone local RTPGK1cisco.com zone cluster local RTPCluster RTPGK1 element RTPGK2 209.165.200 1719 element RTPGK3 209.165.200 1719 zone cluster remote SJCluster cisco.com element SJGK1 209.18.79.23 1719 element SJGK2 209.18.79.24 1719 element SJGK3 209.18.79.25 1719 no shutdown Router# show gatekeeper cluster CONFIGURED CLUSTERS =================== Type Local Zone Elements -------------------Local RTPGK1 RTPGK2
IP -209.165.200.254 1719
160
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SJCluster
Remote
SUMMARY STEPS
1. 2. 3. 4. 5.
gatekeeper zone local gatekeeper-name domain-name [ras-ip-address] alias static ip-signalling-addr [port] gkid gatekeeper-name [ras ip-ras-addr port] [terminal | mcu | gateway {h320 | h323-proxy | voip}] [e164 e164-address] [h323id h323-id] Repeat Step 3 for each E.164 address that you want to add for the endpoint. exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# zone local gatekeeper1 domain1
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
161
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
alias static ip-signaling-addr [port] gkid gatekeeper-name [ras ip-ras-addr port] [terminal | mcu | gateway {h320 | h323-proxy | voip}] [e164 e164-address] [h323id h323-id]
Purpose Creates a static entry in the local alias table for each E.164 address. Keywords and arguments are as follows:
ip-signaling-addrIP address of the H.323 node, used as the address to signal when establishing a call. portPort number other than the endpoint call-signaling well-known port number (1720). gkid gatekeeper-nameLocal gatekeeper of whose zone this node is a member. ras ip-ras-addrNode remote access server (RAS) signaling address. Default: ip-signalling-addr parameter is used in conjunction with the RAS well-known port. portPort number other than the RAS well-known port number (1719). terminalAlias is a terminal. mcuAlias is a multiple control unit (MCU). gatewayAlias is a gateway. h320Alias is an H.320 node. h-323 proxyAlias is an H.323 proxy. voipAlias is VoIP. e164 e164-addressNode E.164 address. Can be used more than once to specify as many E.164 addresses as needed. A maximum number of 128 characters can be entered for this address. To avoid exceeding this limit, you can enter multiple alias static commands with the same call-signaling address and different aliases. h323-id h323-idNode H.323 alias. Can be used more than once to specify as many H.323 identification aliases as needed. A maximum number of 256 characters can be entered for this address. To avoid exceeding this limit, you can enter multiple commands with the same call signaling address and different aliases.
Example:
Router(config-gk)# alias static ip-signalling-addr gkid gatekeeper1
Step 4 Step 5
Repeat Step 3 for each E.164 address that you want to add for the endpoint.
exit
Example:
Router(config-gk)# exit
162
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
The names loaded into RADIUS and TACACS+ are probably not the same names provided for dial access because they may all have the same password. If AAA is enabled on the gatekeeper, the gatekeeper emits an accounting record each time a call is admitted or disconnected.
For more information about configuring AAA services or RADIUS, see the Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/sec_vcg.htm. To authenticate H.323 users via RADIUS, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
aaa new-model aaa authentication login {default | listname} method1 [method2...] radius-server host {hostname | ip-address} [auth-port port] [acct-port port] [timeout seconds] [retransmit retries] [key string] radius-server key {0 string | 7 string | string} gatekeeper security {any | h323-id | e164} {password default password | password separator character} exit Enter each user into the RADIUS database.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
163
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
aaa new-model
Purpose Enables the authentication, authorization, and accounting (AAA) access model.
Example:
Router(config)# aaa new-model
Step 2
Example:
Router(config)# aaa authentication login default
defaultUses the listed authentication methods that follow this keyword as the default list of methods when a user logs in. listnameCharacter string used to name the list of authentication methods activated when a user logs in. method1 [method2...]At least one of the following authentication methods:
enableEnable password krb5Kerberos 5 krb5-telnetKerberos 5 Telnet authentication
TACACS+ servers as defined by the group server radius or aaa group server tacacs+ command
164
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
radius-server host {hostname | ip-address} [auth-port port] [acct-port port] [timeout seconds] [retransmit retries] [key string]
Purpose Specifies the RADIUS server host. Keywords and arguments are as follows:
Example:
Router(config)# radius-server host 10.0.0.1 auth-port 1645 acct-port 1646
auth-port portUser Datagram Protocol (UDP) destination port for authentication requests; the host is not used if set to 0. Default: 1645. acct-port portUDP destination port for accounting requests; the host is not used if set to 0. Default: 1646. timeout secondsTime, in seconds, for which the router waits for the RADIUS server to reply before retransmitting. This setting overrides the global value of the radius-server timeout command. Range: 1 to 1000. Default: global value. retransmit retriesNumber of times that a RADIUS request is resent to a server if that server is not responding or responding slowly. Overrides the global setting of the radius-server retransmit command. Range: 1 to 100. Default: the global value. key stringAuthentication and encryption key used between the router and the RADIUS daemon running on this RADIUS server. Must match the encryption used on the RADIUS daemon. Overrides the global setting of the radius-server key command. Default: the global value.
Step 4
Sets the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon. Keywords and arguments are as follows:
Example:
Router(config)# radius-server key 0 143212343
0 stringUnencrypted (cleartext) shared key 7 stringHidden shared key stringUnencrypted (cleartext) shared key
Step 5
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
165
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 6
security {any | h323-id | e164} {password default password | password separator character}
Purpose Enables authentication and authorization on a gatekeeper and specifies the means of identifying the user to RADIUS/TACACS+. Keywords and arguments are as follows:
Example:
Router(config-gk)# security any password default thisismypassword
anyFirst alias of an incoming Registration, Admission, and Status (RAS) registration, regardless of its type. h323-idFirst H.323 ID type alias. e164First E.164 address type alias. password default passwordDefault password that the gatekeeper associates with endpoints when authenticating them with an authentication server. Must be identical to the password on the authentication server. password separator characterCharacter that endpoints use to separate the H.323-ID from the piggybacked password in the registration. This allows each endpoint to supply a user-specific password. The separator character and password are stripped from the string before it is treated as an H.323-ID alias to be registered. Note that passwords may be piggybacked only in the H.323-ID, not the E.164 address. This is because the E.164 address allows a limited set of mostly numeric characters. If the endpoint does not wish to register an H.323-ID, it can still supply an H.323-ID that consists of just the separator character and password. This is understood to be a password mechanism, and no H.323-ID is registered.
Step 7
exit
Example:
Router(config-gk)# exit
Step 8
If using the security password default command, use the default password. If using the piggybacked password mechanism or the actual passwords, use the user H.323-ID or the E.164 address, depending on how the gatekeeper was configured.
166
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
aaa new-model aaa authentication login {default | listname} method1 [method2...] radius-server deadtime minutes radius-server host {hostname | ip-address} [auth-port port] [acct-port port] [timeout seconds] [retransmit retries] [key string] radius-server key {0 string | 7 string | string} Configure the CiscoSecure AAA server.
DETAILED STEPS
Command
Step 1
aaa new-model
Example:
Router(config)# aaa new-model
Step 2
Sets AAA authorization at login. For a list of keywords and arguments, see the Configuring H.323 Users via RADIUS section on page 163, Step 2.
Example:
Router(config)# aaa authentication login default
Step 3
Example:
Router(config)# radius-server deadtime 120
Sets the time, in minutes, for which a RADIUS server is skipped over by transaction requests. Range: 1 to 1440 (24 hours). Specifies the RADIUS server host. For a list of keywords and arguments, see Configuring H.323 Users via RADIUS section on page 163, Step 3.
Step 4
radius-server host {hostname | ip-address} [auth-port port] [acct-port port] [timeout seconds] [retransmit retries] [key string]
Example:
Router(config)# radius-server host 10.0.0.1 auth-port 1645 acct-port 1646
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
167
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 5
radius-server key {0 string | 7 string | string}
Purpose Sets the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon. For a list of arguments, see Configuring H.323 Users via RADIUS section on page 163 Step 4.
Example:
Router(config) radius-server key 7 anykey
Step 6
SUMMARY STEPS
1. 2. 3. 4.
aaa accounting connection h323 {stop-only | start-stop | wait-start | none} [broadcast] group groupname gatekeeper aaa accounting exit
168
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
aaa accounting connection h323 {stop-only | start-stop | wait-start | none} [broadcast] group groupname
Purpose Defines the accounting method list H.323 with RADIUS as a method. Keywords and arguments are as follows:
Example:
Router(config)# aaa accounting connection h323 start-stop group group1
stop-onlySends a stop accounting notice at the end of the requested user process. start-stopSends a start accounting notice at the beginning of a process and a stop notice at the end of a process. The start notice is sent in the background. The requested process begins regardless of whether the start accounting notice is received by the server. wait-startSends a start accounting notice at the beginning of a process and a stop notice at the end of a process. The start notice is sent in the background. The requested process does not begin until the start accounting notice is received by the server. noneDisables accounting services on this line or interface. broadcastSends accounting records to multiple AAA servers. Simultaneously sends accounting records to the first server in each group. If the first server is unavailable, failover occurs using the backup servers defined within that group. group groupnameServer group to be used for accounting services. The following are valid group names:
stringCharacter string used to name a server
group
radiusList of all RADIUS hosts tacacs+List of all TACACS+ hosts Step 2
gatekeeper
Example:
Router(config)# gatekeeper
Step 3
aaa accounting
Example:
Router(config-gk)# aaa accounting
Enables authentication, authorization, and accounting (AAA) of requested services for billing or security purposes when you use RADIUS or TACACS+. Exits the current mode.
Step 4
exit
Example:
Router(config-gk)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
169
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
For more information about AAA connection accounting services, see the Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/sec_vcg.htm.
Restrictions for Security and Authentication, page 170 Information About Security and Authentication, page 170 Configuring Domain Zones and the IZCT Password, page 176 Configuring Cisco Access Tokens, page 177 Configuring Tokenless Call Authorization, page 180
CAT is a Cisco-proprietary security mechanism and requires a Cisco solution to receive the full end-to-end benefits of the Gatekeeper-to-Gatekeeper Authentication feature. LRQ message authentication is done on a hop-by-hop basis. Because a non-Cisco gatekeeper does not support CATs, authentication stops at the non-Cisco gatekeeper. If a non-Cisco gatekeeper can support LRQ forwarding, end-to-end authentication is achieved. However, LRQ message authentication is performed only at the Cisco gatekeepers. If IZCT is used for Clustered Gatekeepers, the same IZCT password should be used on all the Gatekeepers belonging to the same cluster
Interzone ClearTokens (IZCTs), page 170 Configuring Cisco Access Tokens, page 177 Configuring Tokenless Call Authorization, page 180
170
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
srcCarrierID Source carrier identification dstCarrierID Destination carrier identification intCarrierID Intermediate carrier identification srcZone Source zone dstZone Destination zone interzone type
INTRA_DOMAIN_CISCO INTER_DOMAIN_CISCO INTRA_DOMAIN_TERM_NOT_CISCO INTER_DOMAIN_ORIG_NOT_CISCO
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
171
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 13
Carrier D
(1) ARQ (8) ACF(IZCT) OGW (7) LCF(IZCT) OGK1 (2) LRQ(IZCT)
OGK2
(9) Setup(IZCT)
(3) LRQ(IZCT)
TGW
TGK1
37558
Carrier E
1. 2.
The originating gateway sends an ARQ message with an interface description as a nonstandard field to originating gatekeeper 1 (OGK1). The interface description is treated as a source carrier identifier. Upon receiving the ARQ, OGK1 creates an IZCT with the following:
srcCarrierID Source carrier identification, received from the ARQ dstCarrierIDDestination carrier identification, received from the CSR intCarrierIDIntermediate carrier identification, received from the CSR srcZoneSource zone name or a cluster name if the gatekeeper is a member of a cluster dstZoneDestination zone is set to null interZoneTypeInterzone type is set to INTRA_DOMAIN_CISCO
OGK2 determines that the LRQ did not come from a foreign domain, replaces the IZCT's srcZoneID with its ID (or cluster name, if the gatekeeper is member of a cluster), and forwards the LRQ with the updated IZCT to terminating gatekeeper 2 (TGK2).
172
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
4.
TGK2 determines that the LRQ came from a foreign domain, updates the IZCT's dstZone with its own ID (or cluster name, if the gatekeeper is a member of a cluster) and the interZoneType as INTER_DOMAIN_CISCO, and passes the updated IZCT to TGK1. TGK2 treats the zone from which an LRQ is received as foreign-domain zone in either of the following two scenarios:
a. The TGK2s remote zone list does not contain the zone from which an LRQ is received. b. The TGK2s remote zone list contains the zone from which an LRQ is received and the zone is
TGK1 updates the IZCT's dstCarrierID to Carrier E, which is determined by the routing process; generates a hash with the IZCT's password; and sends an LCF with the updated IZCT in it. If TGK1 is a clustered gatekeeper, then the IZCT password is identical across the cluster. TGK2 forwards the LCF to OGK2. OGK2 forwards the LCF to OGK1. OGK1 extracts the IZCT from the LCF and sends it in an ACF to the OGW. The OGW sends the IZCT to the TGW in the H.225 SETUP message.
6. 7. 8. 9.
10. The TGW passes the IZCT to the TGK1 in an ARQ answerCall. 11. TGK1 authenticates the destination IZCT successfully, because TGK1generated the hash in the
IZCT.
Note
In the case of an inter-ITSP call, border zones (in the above example, OGK2 and TGK2) are identified as the srcZone and dstZone of the IZCT that is returned in the ACF to the OGW. If the call is intra-ITSP, leaf zones are identified as the srcZone and dstZone of the IZCT that is returned in the ACF to the OGW. The main tasks are marking foreign and local domain zones and setting up an IZCT password for use in all the zones. After the security izct password command is issued, the technology prefix for the gatekeepers must be configured for the gateways. The gatekeeper must be enabled to forward LRQ messages that contain E.164 addresses matching zone prefixes controlled by remote gatekeepers.
Note
Although the IZCT is not required for use with the Gatekeeper-to-Gatekeeper Authentication feature, it is recommended and is shown below in the call flow examples.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
173
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 14
Domain A (3) LRQ (IZCT + CAT) OGK (2) LRQ (IZCT + CAT) (5) LCF (IZCT) (4) LCF (IZCT) (1) ARQ (6) ACF (IZCT) BGK
Domain B TGK
(9) ACF
User A
User B
User A calls User B. The originating dial peer is configured for H.323 Registration, Admission, and Status (RAS) and sends an Admission Request (ARQ) message to the originating gatekeeper (OGK). Assuming the OGK has security enabled, the OGK generates an IZCT and a CAT to include in the LRQ message. The IZCT is used for per-call authorization while the CAT is used for gatekeeper-to-gatekeeper authentication. The CAT includes the following:
2.
general_id: gatekeeper ID (OGK) timeStamp: local gatekeeper time randomValue: a random number MD5 hash value
3.
The border gatekeeper (BGK) receives the LRQ message, checks its gatekeeper configuration, and determines that the LRQ should be authenticated before forwarding the LRQ message to the terminating gatekeeper (TGK). Once accepted, the BGK creates a new CAT and includes it in the LRQ message sent to the TGK. The TGK receives the LRQ message, checks its gatekeeper configuration, and determines that the LRQ should be authenticated. The E.164 address indicates that the destination is a local gateway, so the TGK acknowledges the request by sending a Location Confirmation (LCF) message, including an updated IZCT, to the BGK. The BGK transfers the LCF to the OGK. Normal call signaling proceeds. The OGK sends an Admission Confirmation (ACF) message to the OGW. The IZCT is copied to the ACF. The OGW sends a SETUP message to the terminating gateway (TGW). The TGW sends an ARQ message to the TGK. The TGK authorizes the call by comparing the IZCT with a locally created IZCT.
4.
5. 6. 7. 8.
174
72344
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
9.
The TGK sends an ACF to the TGW. The call is set up between the TGW and User B.
Figure 15
Domain A (3) LRQ (IZCT + CAT) OGK (2) LRQ (IZCT + CAT) (5) LRJ (IZCT) (4) LRJ (IZCT) (1) ARQ (6) ARJ BGK
Domain B TGK
OGW
TGW
User A
User B
User A calls User B. The originating dial peer is configured for H.323 RAS and sends an ARQ to the OGK. Assuming the OGK has security enabled, the OGK generates an IZCT and a CAT to include in the LRQ message. The IZCT is used for per-call authorization while the CAT is used for gatekeeper-to-gatekeeper authentication. The CAT includes the following:
general_idGatekeeper ID (OGK) timeStampLocal gatekeeper time randomValueA random number MD5 hash value
3.
The BGK receives the LRQ message, checks its gatekeeper configuration, and determines that the LRQ should be authenticated before forwarding the LRQ message to the TGK. Once accepted, the BGK creates a new CAT and includes it in the LRQ message sent to the TGK. However, in this example, an incorrect outbound password is used. The TGK receives the LRQ message, checks its gatekeeper configuration, and determines that the LRQ should be authenticated. Because an incorrect outbound password was used by the BGK, the LRQ CAT and the locally created CAT are not equivalent. The TGK sends a Location Reject (LRJ) message back to the BGK and includes a reject reason of LRJ_INVAL_PERMISSION. The BGK sends the LRJ to the OGK. The OGK sends an Admission Reject (ARJ) message to the OGW and signaling is terminated.
4.
5. 6.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
72345
175
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Configuring Zones and Password, page 176 Verifying Zones and Password, page 177
SUMMARY STEPS
1. 2. 3. 4.
gatekeeper
security izct password password
no shutdown exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# security izct password thisismypassword
Sets the IZCT password. The password must be from six to eight alphanumeric characters. All gatekeepers in a cluster should have the same IZCT password. To disable the IZCT password, use the no form of the command.
176
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
no shutdown
Example:
Router(config-gk)# no shutdown
Step 4
exit
Example:
Router(config-gk)# exit
Configuring Tokens
To configure gatekeeper-to-gatekeeper authentication, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4.
gatekeeper security password-group groupname lrq {receive password [encrypted] [effective hh:mm day month year] | send password [encrypted]} security zone {zonename | *} password-group groupname exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
177
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
security password-group groupname lrq {receive password [encrypted] [effective hh:mm day month year] | send password [encrypted]}
Defines the passwords used by remote gatekeeper zones and associates them with an ID. Keywords and arguments are as follows:
Example:
Router(config-gk)# security password-group groupname lrq receive password
groupnameID given to a group of passwords. The group can contain inbound and outbound passwords. The group name can include up to 16 characters (any characters on the keyboard). lrq receive passwordPassword that is used to validate any LRQ messages that are received from the specified remote zone. The password can be up to 16 characters (any characters on the keyboard) for cleartext format and 34 characters for encrypted format. encryptedPassword is in encrypted format. The password is always displayed in encrypted format. Default: the password is in cleartext format. effective hh:mm day month yearTime and date on which the current lrq receive password expires. Old and new passwords are valid until the configured time value expires. After expiration, only the new password is valid. After you configure the keyword and time (for example, a day later), the following syslog message displays (china is the password-group name):
%GK-5-RX_LRQ_PASSWORD_UPDATED:LRQ receive password for security password-group 'china' has been updated.
lrq send passwordPassword that is contained in the CAT and sent in the outbound LRQ messages. Can be up to 16 characters (any characters on the keyboard) for cleartext format and 34 characters for encrypted format. If multiple changes are made to the password groups, the latest update takes precedence.
178
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
security zone {zonename | *} password-group groupname
Purpose Associates a remote zone gatekeeper with a specific password group. If a remote zone sends an LRQ message to the gatekeeper, the gatekeeper checks to see if there is a security password group configured for that remote zone name. If one exists, the gatekeeper gets the password information from the group name configured for that security zone. For example, if you used the command in Step 2 to create a password group named china, you could use this command to associate one or more of your remote gatekeepers with that password group. Keywords and arguments are as follows:
Example:
Router(config-gk)# security zone * password-group groupname
zonenameRemote zone gatekeeper. *Using the wildcard (*) means that remote zones that do not have a security zone configured defaults to the security zone password group on the receiving gatekeeper and that the received LRQ message is authenticated using the wildcard-related passwords. Using the wildcard does not affect transmitted LRQ messages. password-group groupnamePassword group created using the security password-group command.
Step 4
exit
Example:
Router(config-gk)# exit
Verifying Tokens
To verify configuration of access tokens, perform the following step.
Step 1
show running-config Use this command to verify configuration of remote zone and security features.
Note
For security reasons, passwords created using the security password-group command are encrypted when displayed in the command output.
Router# show running-config gatekeeper zone local tsunamiGK cisco 172.18.195.138 zone remote laharGK cisco 172.18.195.139 1719 zone prefix laharGK 987* security izct password 123456 security password-group 1 lrq receive 0257550A5A57 encrypted security password-group 1 lrq send 144540595E56 encrypted security password-group 2 lrq receive 091F1D5A4A56 encrypted security password-group 2 lrq send 135143465F58 encrypted
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
179
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Configuring the IP Access List, page 180 Configuring IP-Access-List Security on the Gatekeeper, page 182
SUMMARY STEPS
1.
180
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command or Action
Step 1
access-list access-list-number {permit | deny | remark} source [source-wildcard] [log]
Purpose Configures the access list mechanism for filtering frames by protocol type or vendor code. Keywords and arguments are as follows:
Example:
Router(config)# access-list 20 permit 172.16.10.190
access-list-numberNumber of an access list. Range: a decimal number 1 to 99 (standard) or 1300 to 1999 (extended). Only standard IP access lists 1 to 99 are supported for the Tokenless Call Authorization feature. permitPermits access if the conditions are matched. denyDenies access when there is an address match. remarkComment that describes the access list entry, up to 100 characters long. sourceNumber of the network or host from which the packet is being sent. There are three ways to specify the source:
hostnameUse the name of the host machine. A.B.C.DUse 32-bit quantity in four-part,
dotted-decimal format.
anyUse the any keyword as an abbreviation for a
source-wildcardWildcard bits to be applied to the source. There are two ways to specify the source wildcard:
Use a 32-bit quantity in four-part, dotted-decimal
logCauses an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.)
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
181
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command or Action
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Instructs the gatekeeper to use an IP access listalso known as an access control list (ACL)to verify calls. Calls received from endpoints listed in the ACL are processed by the gatekeeper regardless of whether they contain IZCTs or CATs in the ARQ message from the endpoint. Rather than sending a Location Reject (LRJ) message for calls without tokens from these endpoints, the gatekeeper sends an admission confirm (ACF) message and accepts the calls. Exits the current mode.
Example:
Router(config-gk)# security acl answerarq 20
Step 3
exit
Example:
Router(config-gk)# exit
Information About E.164 Interzone Routing, page 182 Configuring a Dialing Prefix for Each Gateway, page 185
182
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
When using H.323-ID addresses, interzone routing is handled through the use of domain names. For example, to resolve the domain name [email protected], the source endpoint gatekeeper finds the gatekeeper for cisco.com and sends it the location request for the target address [email protected]. The destination gatekeeper looks in its registration database, sees bob registered, and returns the appropriate IP address to get to bob. When using E.164 addresses, call routing is handled through zone prefixes and gateway-type prefixes, also referred to as technology prefixes. The zone prefixes, which are typically area codes, serve the same purpose as domain names in H.323-ID address routing. Unlike domain names, however, more than one zone prefix can be assigned to one gatekeeper, but the same prefix cannot be shared by more than one gatekeeper. Use the zone prefix command to define gatekeeper responsibilities for area codes. The command can also be used to tell the gatekeeper which prefixes are in its own zones and which remote gatekeepers are responsible for other prefixes.
Note
Area codes are used as an example in this section, but a zone prefix need not be an area code. It can be a country code, an area code plus local exchange (NPA-NXX), or any other logical hierarchical partition. The following sample command shows how to configure a gatekeeper with the knowledge that zone prefix 212....... (that is, any address beginning with area code 212 and followed by seven arbitrary digits) is handled by gatekeeper gk-ny:
my-gatekeeper(config-gk)# zone prefix gk-ny 212.......
When my-gatekeeper is asked to admit a call to destination address 2125551111, it knows to send the location request to gk-ny. However, once the query gets to gk-ny, gk-ny still needs to resolve the address so that the call can be sent to its final destination. There could be an H.323 endpoint that has registered with gk-ny with that E.164 address, in which case gk-ny would return the IP address for that endpoint. However, it is more likely that the E.164 address belongs to a non-H.323 device, such as a telephone or an H.320 terminal. Because non-H.323 devices do not register with gatekeepers, gk-ny has no knowledge of which device the address belongs to or which type of device it is, so the gatekeeper cannot decide which gateway should be used for the hop off to the non-H.323 device. (The term hop off refers to the point at which the call leaves the H.323 network and is destined for a non-H.323 device.)
Note
The number of zone prefixes defined for a directory gatekeeper that is dedicated to forwarding LRQs, and not for handling local registrations and calls, should not exceed 10,000; 4 MB of memory must be dedicated to describing zones and zone prefixes to support this maximum number of zone prefixes. The number of zone prefixes defined for a gatekeeper that handles local registrations and calls should not exceed 2000. To enable the gatekeeper to select the appropriate hop-off gateway, use the gw-type-prefix command to configure technology or gateway-type prefixes. Select technology prefixes to denote different types or classes of gateways. The gateways are then configured to register with their gatekeepers using these technology prefixes. For example, voice gateways might register with technology prefix 1#, and H.320 gateways might register with technology prefix 2#. If there are several gateways of the same type, configure them to register with the same prefix type. By having them register with the same prefix type, the gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
183
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
treats the gateways as a pool out of which a random selection is made whenever a call for that prefix type arrives. If a gateway can serve more than one type of hop-off technology, it can register more than one prefix type with the gatekeeper. Callers must identify the type of gateway by prepending the appropriate technology prefix for that gateway type to the destination address. For example, callers might request 1#2125551111 if they know that address 2125551111 is for a telephone and that the technology prefix for voice gateways is 1#. The voice gateway is configured with a dial peer (using the dial-peer command) so that when the gateway receives the call for 1#2125551111, it strips off the technology prefix 1# and bridges the next leg of the call to the telephone at 2125551111. In cases in which the call scenario is as shown in Figure 16, voice-gw1 can be configured to prepend the voice technology prefix 1# so that the use of technology prefixes is completely transparent to the caller.
Figure 16
PSTN
Call Scenario
H.323 network PSTN
Telephone
voice-gw1
voice-gw2
Telephone
Additionally, in using the gw-type-prefix command, a particular gateway-type prefix can be defined as the default gateway type to be used for addresses that cannot be resolved. It also forces a technology prefix to always hop off in a particular zone. If the majority of calls hop off on a particular type of gateway, the gatekeeper can be configured to use that type of gateway as the default type so that callers no longer have to prepend a technology prefix on the address. For example, if voice gateways are mostly used in a network, and all voice gateways have been configured to register with technology prefix 1#, the gatekeeper can be configured to use 1# gateways as the default technology if the following command is entered:
Router(config-gk)# gw-type-prefix 1# default-technology
Now a caller no longer needs to prepend 1# to use a voice gateway. Any address that does not contain an explicit technology prefix is routed to one of the voice gateways that registered with 1#. With this default technology definition, a caller could ask the gatekeeper for admission to 2125551111. If the local gatekeeper does not recognize the zone prefix as belonging to any remote zone, it routes the call to one of its local (1#) voice gateways so that the call hops off locally. However, if it knows that gk-ny handles the 212 area code, it can send a location request for 2125551111 to gk-ny. This requires that gk-ny also be configured with some default gateway type prefix and that its voice gateways be registered with that prefix type.
Note
For ease of maintenance, the same prefix type should be used to denote the same gateway type in all zones under your administration. Also, with the gw-type-prefix command, a hop off can be forced to a particular zone. When an endpoint or gateway makes a call-admission request to its gatekeeper, the gatekeeper determines the destination address by first looking for the technology prefix. When that is matched, the remaining string is compared against known zone prefixes. If the address is determined to be a remote zone, the entire address, including technology and zone prefixes, is sent to the remote gatekeeper in a location request. That remote gatekeeper then uses the technology prefix to decide on which of its gateways to hop off. In
184
13098
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
other words, the zone prefix (defined using the zone prefix command) determines the routing to a zone, and once there, the technology prefix (defined using the gw-type-prefix command) determines the gateway to be used in that zone. The zone prefix takes precedence over the technology prefix. This behavior can be overridden by associating a forced hop-off zone with a particular technology prefix. Associating a forced hop-off zone with a particular technology prefix forces the call to the specified zone, regardless of what the zone prefix in the address is. As an example, you are in the 408 area code and want callers to the 212 area code in New York to use H.323-over-IP and hop off there because it saves on costs. However, the only H.320 gateway is in Denver. In this example, calls to H.320 endpoints must be forced to hop off in Denver, even if the destination H.320 endpoint is in the 212 area code. The forced hop-off zone can be either a local zone (that is, one that is managed by the local gatekeeper) or a remote zone.
SUMMARY STEPS
1. 2. 3. 4.
gatekeeper zone local gatekeeper-name domain-name [ras-ip-address] zone prefix gatekeeper-name e164-prefix [gw-priority pri-0-to-10 gw-alias [gw-alias, ...]] exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# zone local gatekeeper1 domain1
Step 3
Example:
Router(config-gk)# zone prefix localgk 415....... gw-priority 10 gw1 gw2
Adds a prefix to the gatekeeper zone list. To remove knowledge of a zone prefix, use the no form of this command with the gatekeeper name and prefix. To remove the priority assignment for a specific gateway, use the no form of this command with the gw-priority keyword. To put all of your gateways in the same zone, use the gw-priority keyword as described below.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
185
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 4
exit
Example:
Router(config-gk)# exit
To put all of your gateways in the same zone, use the gw-priority keyword and specify which gateways are used for calling different area codes. For example:
zone zone zone zone local localgk xyz.com prefix localgk 408....... prefix localgk 415....... gw-priority 10 gw1 gw2 prefix localgk 650....... gw-priority 0 gw1
Domain xyz.com is assigned to gatekeeper localgk. Prefix 408 is assigned to gatekeeper localgk, and no gateway priorities are defined for it; therefore, all gateways registering to localgk can be used equally for calls to the 408 area code. No special gateway lists are built for the 408 prefix; a selection is made from the master list for the zone. The prefix 415 is added to gatekeeper localgk, and priority 10 is assigned to gateways gw1 and gw2. Prefix 650 is added to gatekeeper localgk, and priority 0 is assigned to gateway gw1. A priority 0 is assigned to gateway gw1 to exclude it from the gateway pool for prefix 650. When gw2 registers with gatekeeper localgk, it is added to the gateway pool for each prefix as follows:
For gateway pool for 415, gateway gw2 is set to priority 10. For gateway pool for 650, gateway gw2 is set to priority 5.
Note
For configuration information, see VoIP Gatekeeper Trunk and Carrier Based Routing Enhancements at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ftgkrenb.htm This section contains the following information:
Configuring Gatekeeper-to-GKTMP Server Flow Control, page 187 Setting the Retry Timer for Failed GKTMP Server Connections, page 190 Configuring Registration and Call Rejection, page 191
186
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3.
gatekeeper server flow-control [onset value] [abatement value] [qcount value] exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
187
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
server flow-control [onset value] [abatement value] [qcount value]
Purpose Enables flow control and resets all the thresholds to default. Keywords and arguments are as follows:
Example:
Router(config-gk)# server flow-control onset 50 abatement 25 qcount 100
onset valuePercentage of the server timeout value that is used to mark the server as usable or unusable. Range: 1 to 100. Default: 80. abatement valuePercentage of the server timeout value that is used to mark the server as unusable or usable. Range: 1 to 100; cannot be greater than or equal to the onset value. Default: 50. For example, if the server timeout value is 3 seconds, onset value is 50, and abatement value is 40, when the average response time from the server to the GKTMP reaches 1.5 seconds (the onset percentage of the server timeout value), the server is marked as unusable. During the period that the server is marked as unusable, REQUEST ALV messages are still sent to the unusable server. When the response time is lowered to 1.2 seconds (the abatement percentage of the timeout value), the server is marked usable again and the GKTMP resumes sending messages to the server.
qcount valueThreshold length of the outbound queue on the GK. The queue contains messages waiting to be transmitted to the server. The TCP socket between the GK and GKTMP server queues messages if it has too many to transmit. If the count of outbound queue length on the server reaches the qcount value, the server is marked unusable. Range:1 to 2000. Default: 400.
Step 3
exit
Example:
Router(config-gk)# exit
show running-config Use this command to verify that server flow-control appears in the output.
Router# show running-config Building configuration... Current configuration : 1055 bytes ! version 12.2 no service single-slot-reload-enable service timestamps debug datetime msec service timestamps log uptime no service password-encryption ! hostname snet-3660-3
188
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
! . . . gatekeeper zone local snet-3660-3 cisco.com zone remote snet-3660-2 cisco.com 209.165.200.225 1719 zone prefix snet-3660-2 408* lrq forward-queries no use-proxy snet-3660-3 default inbound-to terminal no use-proxy snet-3660-3 default outbound-from terminal no shutdown server registration-port 8000 server flow-control ! . . .
Step 2
show gatekeeper status Use this command to view the status of the GKTMP Interface Resiliency Enhancement feature. The following example shows that the GKTMP Interface Resiliency Enhancement feature is enabled:
Router# show gatekeeper status Gatekeeper State: UP Load Balancing: DISABLED Flow Control: ENABLED Zone Name: snet-3660-3 Accounting: DISABLED Endpoint Throttling: DISABLED Security: DISABLED Maximum Remote Bandwidth: unlimited Current Remote Bandwidth: 0 kbps Current Remote Bandwidth (w/ Alt GKs): 0 kbps
Step 3
show gatekeeper servers Use this command to view the server statistics, including timeout encountered, average response time, and server status.
Router# show gatekeeper servers GATEKEEPER SERVERS STATUS ========================= Gatekeeper Server listening port: 8250 Gatekeeper Server timeout value: 30 (100ms) GateKeeper GKTMP version: 3.1 Gatekeeper-ID: Gatekeeper1 -----------------------RRQ Priority: 5 Server-ID: Server43 Server IP address: 209.165.200.254:40118 Server type: dynamically registered Connection Status: active Trigger Information: Trigger unconditionally Server Statistics: REQUEST RRQ Sent=0 RESPONSE RRQ Received = 0
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
189
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
RESPONSE RCF Received = 0 RESPONSE RRJ Received = 0 Timeout encountered=0 Average response time(ms)=0 Server Usable=TRUE
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Example:
Router(config-gk)# timer server retry 20
Sets the retry timer for failed GKTMP server connections, in seconds. After the gatekeeper detects that its GKTMP server TCP connection has failed, the gatekeeper retries the server based on the setting of this timer, and keep retrying until the connection is established. Range: 1 to 300. Default: 30.
Note
This timer applies only to deployments where static triggers are used between the gatekeeper and the GKTMP server. If dynamic triggers are used, the server must determine and implement a retry mechanism if the TCP connection to the gatekeeper fails.
Step 3
exit
Example:
Router(config-gk)# exit
190
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
show gatekeeper servers Use this command to verify the retry timer for failed server connections.
Router# show gatekeeper servers GATEKEEPER SERVERS STATUS ========================= Gatekeeper Gatekeeper Gatekeeper Gatekeeper Server listening port:0 Server response timeout value:30 (100ms) Server connection retry timer value:30 (sec) GKTMP version:4.1
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
191
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
server absent reject {rrq | arq}
Purpose Configures the gatekeeper to reject new registrations or calls when it is unable to reach the GKTMP server because the TCP connection between gatekeeper and server is down. If multiple GKTMP servers are configured, the gatekeeper tries all of them and rejects registrations or calls only if none of the servers responds. Keywords are as follows:
Example:
Router(config-gk)# server absent reject rrq
rrqReject registrations by RRQ messages arqReject calls by admission request (ARQ) messages
You can also use this feature for security or service denial if a connection with the server is required to complete a registration. Default: this feature is not enabled; the gatekeeper does not reject new registrations or calls.
Note
This command assumes that RRQ and ARQ triggers are used between the gatekeeper and GKTMP server.
Step 3
exit
Example:
Router(config-gk)# exit
show running-config Use this command to verify that the gatekeeper is rejecting new registrations when unable to reach the GKTMP server.
Router# show running-config . . . gw-type-prefix 1#* default-technology gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720 no shutdown server absent reject rrq . . .
Use this command to verify that the gatekeeper is rejecting new calls when unable to reach the GKTMP server, use the command.
Router# show running-config . . . gw-type-prefix 1#* default-technology gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720 no shutdown server absent reject arq .
192
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
. .
Note
The use-proxy command replaces the zone access command. The use-proxy command, configured on a local gatekeeper, affects only the use of proxies for incoming calls (that is, it does not affect the use of local proxies for outbound calls). When originating a call, a gatekeeper uses a proxy only if the remote gatekeeper offers a proxy at the remote end. A call between two endpoints in the same zone is always a direct (nonproxied) call.
Configuring Access
To configure a proxy for inbound calls from remote zones or the border element to gateways in its local zone and to configure a proxy for outbound calls from gateways in its local zone to remote zones or the border element, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3.
gatekeeper use-proxy local-zone-name {default | h323-annexg | remote-zone remote-zone-name} {inbound-to | outbound-from} {gateway | terminal} exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
193
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
use-proxy local-zone-name {default | h323-annexg | remote-zone remote-zone-name} {inbound-to | outbound-from} {gateway | terminal}
Purpose Enables proxy communications for calls between local and remote zones. Keywords and arguments are as follows:
Example:
Router(config-gk)# use-proxy zonename default inbound-to gateway
local-zone-nameName or zone name of the gatekeeper, which is usually the fully domain-qualified host name of the gatekeeper. For example, if the domain name is cisco.com, the gatekeeper name might be gk1.cisco.com. However, if the gatekeeper is controlling multiple zones, the name of the gatekeeper for each zone should be a unique string that has a mnemonic value. defaultDefault proxy policy for all calls that are not defined by a use-proxy command that includes the remote-zone keyword. h323-annexgProxy policy for calls to or from the H.225 AnnexG border element co-located with the gatekeeper. remote-zone remote-zone-nameProxy policy for calls to or from a specific remote gatekeeper or zone. inbound-toApplies the proxy policy to calls that are inbound to the local zone from a remote zone. Each use-proxy command defines the policy for only one direction. outbound-fromApplies the proxy policy to calls that are outbound from the local zone to a remote zone. Each use-proxy command defines the policy for only one direction. gatewayType of local device to which the policy applies. Applies the policy only to local gateways. terminalType of local device to which the policy applies. Applies the policy only to local terminals.
Step 3
exit
Example:
Router(config-gk)# exit
Verifying Access
Step 1
show gatekeeper zone status Use this command to see information about the configured gatekeeper proxies and gatekeeper zone information (as shown in the following output).
Router# show gatekeeper zone status GATEKEEPER ZONES ================
194
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
GK name
Domain Name
RAS Address
PORT
-----------------------------sj.xyz.com xyz.com 10.0.0.9 1719 LS SUBNET ATTRIBUTES : All Other Subnets :(Enabled) PROXY USAGE CONFIGURATION : inbound calls from germany.xyz.com : to terminals in local zone sj.xyz.com :use proxy to gateways in local zone sj.xyz.com :do not use proxy outbound calls to germany.xyz.com from terminals in local zone germany.xyz.com :use proxy from gateways in local zone germany.xyz.com :do not use proxy inbound calls from H.225 AnnexG border element : to terminals in local zone germany.xyz.com :use proxy to gateways in local zone germany.xyz.com :do not use proxy outbound calls to H.225 AnnexG border element : from terminals in local zone germany.xyz.com :use proxy from gateways in local zone germany.xyz.com :do not use proxy inbound calls from all other zones : to terminals in local zone sj.xyz.com :use proxy to gateways in local zone sj.xyz.com :do not use proxy outbound calls to all other zones : from terminals in local zone sj.xyz.com :do not use proxy from gateways in local zone sj.xyz.com :do not use proxy tokyo.xyz.co xyz.com 172.21.139.89 1719 RS 0 milan.xyz.co xyz.com 172.16.00.00 1719 RS 0
SUMMARY STEPS
1.
DETAILED STEPS
Command
Step 1
clear h323 gatekeeper call {all | local-callID local-call-id}
Purpose Forces a disconnect on a specific call or on all calls currently active on this gatekeeper. Keywords and arguments are as follows:
Example:
Router# clear h323 gatekeeper call all
allAll active calls associated with this gatekeeper local-callID local-call-idLocal call identification number (CallID) that identifies the call to be disconnected
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
195
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
To force a particular call to disconnect (as opposed to all active calls on the H.323 gateway), use the local call identification number (CallID) to identify that specific call. Find the local CallID number for a specific call by using the show gatekeeper calls command; the ID number is displayed in the LocalCallID column.
Verifying Disconnect
Step 1
show gatekeeper calls Use this command to show the status of each ongoing call that a gatekeeper is aware of. If you have forced a disconnect either for a particular call or for all calls associated with a particular H.323 gatekeeper, the system does not display information about those calls.
router# show gatekeeper calls Total number of active calls =1 Gatekeeper Call Info ==================== LocalCallID Age (secs) BW 12-3339 94 768 (Kbps) Endpt(s): Alias E.164Addr CallSignalAddr Port RASSignalAddr src EP: epA 10.0.0.11 1720 10.0.0.11 dst EP: epB2zoneB.com src PX: pxA 10.0.0.1 1720 10.0.0.11 dst PX: pxB 172.21.139.90 1720 172.21.139.90
Proxy Inside the Firewall, page 197 Proxy in Co-Edge Mode, page 197 Proxy Outside the Firewall, page 198 Proxy and NAT, page 199
196
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Terminals
Gatekeeper
Firewall
Edge router
Proxy
Because the gatekeeper (using RAS) and the proxy (using call setup protocols) are the only endpoints that communicate with other devices outside the firewall, it is simple to set up a tunnel through the firewall to allow traffic destined for either of these two endpoints to pass through.
S6913
Outside devices
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
197
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 18
Proxy
In co-edge mode, the proxy can present a security risk. To avoid exposing a network to unsolicited traffic, configure the proxy to route only proxied traffic. In other words, the proxy routes only H.323 protocol traffic that is terminated on the inside and then repeated to the outside. Traffic that moves in the opposite direction can be configured this way as well.
198
S6914
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 19
Edge router
Gatekeeper
Terminals
Firewall with H.323 NAT Gatekeeper and proxy inside the firewall
S6915
Firewall Without H.323 NAT Co-edge gatekeeper and proxy Co-edge gatekeeper and proxy
Firewall without dynamic access Gatekeeper and proxy inside the control firewall, with static access lists on the firewall
Table 9
For Networks Not Using NAT Firewall with Dynamic Access Control
Gatekeeper and proxy inside the Gatekeeper and proxy inside the firewall firewall Gatekeeper and proxy outside the firewall Gatekeeper and proxy outside the firewall
Gatekeeper and proxy inside the Gatekeeper and proxy inside the firewall, with static access lists firewall, with static access lists on the firewall on the firewall
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
199
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Prerequisites for QoS, page 200 Information About QoS, page 200 Configuring QoS Using a Multimedia Backbone, page 201 Configuring QoS on a Proxy Without ASR, page 203 Configuring QoS on a Proxy with ASR, page 205
The proxy is not capable of modifying the Quality of Service (QoS) between the terminal and itself. To achieve the best overall QoS, ensure that terminals are connected to the proxy using a network that intrinsically has good QoS. In other words, configure a path between a terminal and proxy that provides good bandwidth, delay, and packet-loss characteristics without the terminal needing to request special QoS. A high-bandwidth LAN works well for this.
Resource Reservation Protocol (RSVP) to reserve flows having adequate QoS based on the media codecs of H.323 traffic IP precedence bits to signal that the H.323 traffic is special and that it deserves higher priority
Unfortunately, the vast majority of H.323 terminals cannot achieve signaling in either of these ways. The proxy can be configured to use any combination of RSVP and IP precedence bits.
Note
For more information on RSVP, synchronous reservation timers, and slow connect, see Quality of Service for Voice at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/vclqos.htm.
200
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Application-Specific Routing
To achieve adequate QoS, a separate network may be deployed that is partitioned away from the standard data network. The proxy can take advantage of such a partitioned network using a feature known as application-specific routing (ASR). Application-specific routing is simple. When the proxy receives outbound traffic, it directs traffic to an interface that is connected directly to the QoS network. The proxy does not send the traffic using an interface that is specified for the regular routing protocol. Similarly, inbound traffic from other proxies is received on the interface that is connected to the QoS network. This is true if all these other proxies around the QoS network use ASR in a consistent fashion. ASR then ensures that ordinary traffic is not routed into the QoS network by mistake. Implementation of ASR ensures the following:
Each time a connection is established with another proxy, the proxy automatically installs a host route pointing at the interface designated for ASR. The proxy is configured to use a loopback interface address. The proxy address is visible to both the ASR interface and all regular interfaces, but there are no routes established between the loopback interface and the ASR interface. This ensures that no non-H.323 traffic is routed through the ASR interface.
Note
ASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810.
The proxy directs all inter-proxy H.323 traffic, including Q.931 signaling, H.245, and media stream, to the multimedia backbone. The proxy shields the multimedia backbone so that routers on edge networks and other backbone networks are not aware of its existence. In this way, only H.323-compliant packets can access or traverse the multimedia backbone. The proxy drops any unintended non-H.323 packets that attempt to access the multimedia backbone.
Figure 20 illustrates a network that has a multimedia backbone. A gatekeeper (not shown) in the edge network (zone) directs all out-of-zone H.323 calls to the closed proxy on the edge of that network. The closed proxy forwards this traffic to the remote zone through the multimedia backbone. A closed proxy and the edge router may reside in the same router or they may be in separate routers, as shown in the figure.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
201
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 20
R1
202
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Protocol (RIP) cannot be configured on two adjacent autonomous systems because this protocol does not include the concept of an autonomous system. The result would be the merging of the two autonomous systems into one. If the number of IP addresses are scarce, use subnetting, but the configuration can get complicated. In this case, only the Enhanced IGRP, Open Shortest Path First (OSPF), and RIP Version 2 routing protocols, which allow variable-length subnet masks (VLSMs), can be used. Assuming these requirements are met, configure the network illustrated in Figure 20 as follows:
Configure each of the four networks as a separate routing autonomous system and do not redistribute routes between the multimedia backbone and any other autonomous system. Create a loopback interface on the proxy and configure it to be the proxy interface. That way no subnets of the multimedia backbone are exposed to the edge network, or the other way around. To ensure that the address of the loopback interface does not travel outside the edge network, configure the appropriate distribution list on the edge router that connects the edge network to the data backbone. Configuring the appropriate distribution list guarantees that any ongoing H.323 call is interrupted if the multimedia backbone fails. Otherwise, H.323 packets that originate from one proxy and that are destined to another proxy might discover an alternate route using the edge networks and the data backbone.
In some topologies, the two edge networks and the data backbone may be configured as a single autonomous system, but it is preferable to separate them as previously described because they are different networks with different characteristics.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
proxy h323 interface type number [nametag] h323 interface [port] h323 h323-id h323-id h323 gatekeeper [id gatekeeper-id] {ipaddr ip-address [port] | multicast} h323 qos {ip-precedence | rsvp {controlled-load | guaranteed-qos}} ip route-cache [cbus] same-interface [flow] distributed exit
DETAILED STEPS
Command
Step 1
proxy h323
Example:
Router(config)# proxy h323
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
203
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
interface type number [nametag]
Purpose Enters interface configuration mode for a particular interface or subinterface. Keywords and arguments are platform dependent; for more information, see the IOS interface command reference listed in the Additional References section on page 255. Selects an interface whose IP address is used by the proxy to register with the gatekeeper. The argument are as follows:
Example:
Router(config)# interface serial 0
Step 3
Example:
Router(config-if)# h323 interface 1
portPort on which the proxy listens for incoming call setup requests. Range: 1 to 65356. Default:
11720 in -isx- or -jsx- Cisco IOS images 1720 in -ix- Cisco IOS images, which do not
Configures the proxy name. (More than one name may be configured if necessary.) The argument is as follows:
Example:
Router(config-if)# h323 h323-id [email protected]
h323-idName of the proxy. We recommend that this be a fully qualified e-mail identification (ID), with the domain name being the same as that of its gatekeeper.
Step 5
Specifies the gatekeeper associated with a proxy and controls how the gatekeeper is discovered. Keywords and arguments are as follows:
Example:
Router(config-if)# h323 gatekeeper ipaddr 10.0.0.0
id gatekeeper-idGatekeeper name. Typically, this is a Domain Name System (DNS) name, but it can also be a raw IP address in dotted form. If this parameter is specified, gatekeepers that have either the default or the explicit flags set for the subnet of the proxy respond. If this parameter is not specified, only those gatekeepers with the default subnet flag respond. ipaddr ip-address [port]Gatekeeper discovery message is unicast to this address and, optionally, to the port specified. multicastGatekeeper discovery message is multicast to the well-known Registration, Admission, and Status (RAS) multicast address and port.
Step 6
Example:
Router(config-if)# h323 qos rsvp guaranteed-qos
ip-precedence Realtime Transport Protocol (RTP) streams set their IP precedence bits to the specified value rsvp [controlled-load]Controlled load class of service rsvp [guaranteed-qos]Guaranteed QoS class of service
204
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 7
ip route-cache [cbus] same-interface [flow] distributed
Purpose Controls the use of high-speed switching caches for IP routing. Keywords are as follows:
cbusBoth autonomous switching and fast switching same-interfaceFast-switching packets to back out through the interface on which they arrived flowThe route switch processor (RSP) performs flow switching on the interface. distributedVersatile Interface Processor (VIP) distributed switching on the interface. This feature can be enabled on Cisco 7500 series routers with RSP and VIP controllers. If both the ip route-cache flow and the ip route-cache distributed command are configured, the VIP does distributed flow switching. If only the ip route-cache distributed command is configured, the VIP does distributed switching.
Example:
Router(config-if)# ip route-cache same-interface distributed
Step 8
exit
Example:
Router(config-if)# exit
Use one type of routing protocol on the ASR interface and another on all the non-ASR interfaces. Include the loopback subnet in both routing domains. Set up two different autonomous systems, one that contains the ASR network and the loopback network and another that contains the other non-ASR networks and loopback network.
To ensure that the ASR interface and all other interfaces never route packets between each other, configure an access control list. (The proxy traffic is routed specially because it is always addressed to the loopback interface first and then translated by the proxy subsystem.)
ASR Enabled on the Proxy Using One Type of Routing Protocol
To start the proxy with ASR enabled on the proxy using one type of routing protocol on the ASR interface and another on all of the non-ASR interfaces, and with the loopback subnet included in both routing domains, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4.
proxy h323 interface type number [nametag] ip address ip-address mask [secondary] h323 interface [port]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
205
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
5. 6. 7. 8. 9.
h323 h323-id h323-id h323 gatekeeper [id gatekeeper-id] {ipaddr ip-address [port] | multicast} h323 qos {ip-precedence | rsvp {controlled-load | guaranteed-qos}} interface type number [nametag] h323 asr [bandwidth max-bandwidth]
10. ip address ip-address mask [secondary] 11. exit 12. interface type number [nametag] 13. ip address ip-address mask [secondary] 14. exit 15. router rip 16. network network-number 17. router igrp autonomous-system 18. network network-number 19. network loopback-addr 20. access-list access-list-number {permit | deny} source source-mask [destination destination-mask]
DETAILED STEPS
Command
Step 1
proxy h323
Example:
Router(config)# proxy h323
Step 2
Example:
Router(config)# interface loopback 3
Enters loopback-interface configuration mode. Keywords and arguments are platform dependent; for more information, see the IOS interface command reference listed in the Additional References section on page 255. To configure a proxy with ASR enabled on the proxy using one type of routing protocol, set type to loopback. The loopback type specifies the software-only loopback interface that emulates an interface that is always up. It is a virtual interface supported on all platforms. The number argument is the number of the loopback interface that you want to create or configure. There is no limit on the number of loopback interfaces that you can create.
206
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 3
ip address ip-address mask [secondary]
Purpose Sets a primary or secondary IP address for an interface. Keywords and arguments are as follows:
Example:
Router(config-if)# ip address 192.168.0.0 225.225.225.0
ip-addressIP address. maskMask for the associated IP subnet. secondaryConfigured address is a secondary IP address. Default: the configured address is the primary IP address.
Step 4
Signals the proxy that this interface IP address is the one to use. The argument are as follows:
Example:
Router(config-if)# h323 interface
portPort on which the proxy listens for incoming call setup requests. Range: 1 to 65356. Default:
11720 in -isx- or -jsx- Cisco IOS images 1720 in -ix- Cisco IOS images, which do not
Configures the proxy name. (More than one name can be configured if necessary.) The argument is as follows:
Example:
Router(config-if)# h323 h323-id [email protected]
h323-idName of the proxy. We recommend that this be a fully qualified e-mail identification (ID), with the domain name being the same as that of its gatekeeper.
Step 6
Specifies the gatekeeper associated with a proxy and controls how the gatekeeper is discovered. For an explanation of the keywords and arguments, see Configuring QoS on a Proxy Without ASR section on page 203, Step 5. Enables QoS on the proxy. For an explanation of the keywords and arguments, see Configuring QoS on a Proxy Without ASR section on page 203, Step 6. If ASR is to be used, enters the interface through which outbound H.323 traffic should be routed. Keywords and arguments are platform dependent; for more information, see Step 2 above. Enables ASR and specifies the maximum bandwidth for a proxy. Keyword and argument are as follows:
Example:
Router(config-if)# h323 gatekeeper ipaddr 10.0.0.0
Step 7
Example:
Router(config-if)# h323 qos rsvp guaranteed-qos
Step 8
Example:
Router(config)# interface serial 0
Step 9
Example:
Router(config-if)# h323 asr bandwidth 5000000
bandwidth max-bandwidthMaximum bandwidth on the interface, in kbps. Range: 1 to 10,000,000. Default: the bandwidth on the interface. If you specify a value greater than the interface bandwidth, the bandwidth defaults to the interface bandwidth.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
207
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 10
ip address ip-address mask [secondary]
Purpose Sets up the ASR interface network number. For an explanation of the keywords and arguments, see Step 3 in this configuration task table.
Example:
Router(config-if)# ip address 192.168.0.0. 225.225.225.0
Step 11
exit
Example:
Router(config-if)# exit
Step 12
Example:
Router(config)# interface serial 0
Enters interface configuration mode for a non-ASR interface. Keywords and arguments are platform dependent; for more information, see Step 2 above. Sets up a non-ASR interface network number. For an explanation of the keywords and arguments, see Step 3 above.
Step 13
Example:
Router(config-if)# ip address 192.168.0.0 225.225.225.0
Step 14
exit
Example:
Router(config-if)# exit
Step 15
router rip
Example:
Router(config)# router rip
Step 16
network network-number
Example:
Router(config)# network 192.168.0.0
Specifies a list of networks for the RIP routing process or a loopback interface in an Interior Gateway Routing Protocol (IGRP) domain. The argument is as follows:
Step 17
Example:
Router(config)# router igrp 109
autonomous-systemAutonomous system number that identifies the routes to the other IGRP routers. It is also used to tag the routing information.
Step 18
network network-number
Specifies a list of networks for the Routing Information Protocol (RIP) routing process. The argument is as follows:
Example:
Router(config)# network 172.16.0.0
Step 19
network loopback-addr
Example:
Router(config)# network 10.0.0.0
208
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 20
access-list access-list-number {permit | deny} source source-mask [destination destination-mask] {eq | neq} [[source-object] [destination-object] [identification] any]
access-list-numberInteger that uniquely identifies the access list. Range: 300 to 399. permitPermits access when there is an address match. denyDenies access when there is an address match. source source-maskSource address and mask in decimal format. DECnet addresses are written in the form area.node. For example, 50.4 is node 4 in area 50. destination destination-maskDECnet address and mask of the destination node in decimal format. DECnet addresses are written in the form area.node. For example, 50.4 is node 4 in area 50. eq | neqItem matches the packet if all the specified parts of the source object, destination object, and identification match (or do not match) the data in the packet. source-objectContains the mandatory keyword src and one of the following optional keywords:
eq | neq | lt | gtEqual to, not equal to, less than,
Example:
Router(config)# access-list 20 permit 172.16.10.190 eq
or greater than. Must be followed by the argument object-number, a numeric DECnet object number.
expExpression; followed by a
regular-expression that matches a string. For more information, see the Regular Expressions appendix in the Cisco IOS Dial Technologies Command Reference.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
209
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Purpose
destination-objectContains the mandatory keyword dst and one of the following optional keywords:
eq | neq | lt | gtEqual to, not equal to, less than,
or greater than. These keywords must be followed by the argument object-number, a numeric DECnet object number.
expExpression; followed by a regular expression
that matches a string. For more information, see the Regular Expressions appendix in the Cisco IOS Dial Technologies Command Reference.
uicUser identification code; followed by a
numeric UID expression. The argument [group, user] is a numeric UID expression. In this case, the bracket symbols are literal; they must be entered. The group and user parts can be specified either in decimal, in octal by prefixing the number with a 0, or in hex by prefixing the number with 0x. The uic expression displays as an octal number.
the account.
accountRegular expression; the account string. anyItem matches if any of the specified parts do
Example:
Router(config)# interface serial 0
Enters interface configuration mode on an ASR interface. Keywords and arguments are platform dependent; for more information, see Step 2 above. Controls access to an interface. Use this command to set the outbound access group and then the inbound access group. Keywords and arguments are as follows:
Step 22
Example:
Router(config-if)# ip access-group 101 in
access-list-numberNumber of an access list. Range: 1 to 199 and 1300 to 2699. access-list-nameName of an IP access list as specified by an IP access-list command. inFilters on inbound packets. outFilters on outbound packets.
Step 23
exit
Example:
Router(config-if)# exit
210
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
ASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810.
ASR Enabled on the Proxy Using Two Different Autonomous Systems
To start the proxy with ASR enabled on the proxy using two different autonomous systems (one that contains the ASR network and the loopback network and another that contains the other non-ASR networks and the loopback network), use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
proxy h323 interface type number [nametag] ip address ip-address mask [secondary] h323 interface [port] h323 h323-id h323-id h323 gatekeeper [id gatekeeper-id] {ipaddr ip-address [port] | multicast} h323 qos {ip-precedence | rsvp {controlled-load | guaranteed-qos}} interface type number [nametag] h323 asr [bandwidth max-bandwidth]
10. ip address ip-address mask [secondary] 11. exit 12. interface type number [nametag] 13. ip address ip-address mask [secondary] 14. exit 15. router igrp autonomous-system 16. network network-number 17. network network-number 18. router igrp autonomous-system 19. network network-number 20. network network-number 21. access-list access-list-number {permit | deny} source source-mask [destination destination-mask]
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
211
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
proxy h323
Example:
Router(config)# proxy h323
Step 2
Example:
Router(config)# interface loopback 3
Enters loopback-interface configuration mode. Keywords and arguments are platform dependent; for more information, see the IOS interface command reference listed in the Additional References section on page 255. To start the proxy with ASR enabled on the proxy using two different autonomous systems, the type argument is loopback. The loopback type specifies the software-only loopback interface that emulates an interface that is always up. It is a virtual interface supported on all platforms. The number argument is the number of the loopback interface that you want to create or configure. There is no limit on the number of loopback interfaces you can create.
Step 3
Sets a primary or secondary IP address for an interface. Keyword and arguments are as follows:
Example:
Router(config-if)# ip address 192.168.0.0 225.225.225.0
ip-addressIP address. maskMask for the associated IP subnet. secondaryThe configured address is a secondary IP address. If this keyword is omitted, the configured address is the primary IP address.
Step 4
Signals the proxy that this interface IP address is the one to use. The argument are as follows:
Example:
Router(config-if)# h323 interface 1
portPort on which the proxy listens for incoming call setup requests. Range: 1 to 65356. Default:
11720 in -isx- or -jsx- Cisco IOS images 1720 in -ix- Cisco IOS images, which do not
Configures the proxy name. (More than one name can be configured if necessary.) The argument is as follows:
Example:
Router(config-if)# h323 h323-id [email protected]
h323-idName of the proxy. It is recommended that this be a fully qualified e-mail identification (ID), with the domain name being the same as that of its gatekeeper.
Step 6
Specifies the gatekeeper associated with a proxy and controls how the gatekeeper is discovered. For an explanation of the keywords and arguments, see Step 5 in the configuration task table in the Configuring QoS on a Proxy Without ASR section on page 203.
Example:
Router(config-if)# h323 gatekeeper ipaddr 10.0.0.0
212
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 7
h323 qos {ip-precedence | rsvp {controlled-load | guaranteed-qos}}
Purpose Enables quality of service (QoS) on the proxy. Keywords and arguments are as follows:
Example:
Router(config-if)# h323 qos rsvp guaranteed-qos
ip-precedence valueReal-time Transport Protocol (RTP) streams should set their IP precedence bits to the specified value rsvp {controlled-load}Controlled load class of service rsvp {guaranteed-qos}Guaranteed QoS class of service
Step 8
interface type number [nametag]
Example:
Router(config)# interface serial 0
If application-specific routing (ASR) is to be used, enters the interface through which outbound H.323 traffic should be routed. Keywords and arguments are platform dependent; for more information, see Step 2 above. Enables ASR and specifies the maximum bandwidth for a proxy. The argument is as follows:
Step 9
Example:
Router(config-if)# h323 asr bandwidth 5000000
max-bandwidthMaximum bandwidth on the interface, in kbps. Range: 1 to 10,000,000. Default: the bandwidth on the interface. If you specify a value greater than the interface bandwidth, the bandwidth defaults to the interface bandwidth.
Step 10
Sets up the ASR interface network number. For an explanation of the keywords and arguments, see Step 3 in this configuration task table.
Example:
Router(config-if)# ip address 192.168.0.0 225.225.225.0
Step 11
exit
Example:
Router(config-if)# exit
Step 12
Example:
Router(config)# interface serial 0
Enters interface configuration mode on a non-ASR interface. Keywords and arguments are platform dependent; for more information, see Step 2 above. Sets up a non-ASR interface network number. For an explanation of the keywords and arguments, see Step 3 in this configuration task table.
Step 13
Example:
Router(config-if)# ip address 192.168.0.0 225.225.225.0
Step 14
exit
Example:
Router(config-if)# exit
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
213
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 15
router igrp autonomous-system
Purpose Configures Interior Gateway Routing Protocol (IGRP) for a non-ASR interface. The argument is as follows:
Example:
Router(config)# router igrp 4
autonomous-systemAutonomous system number that identifies the routes to the other IGRP routers. It is also used to tag the routing information.
Step 16
network network-number
Example:
Router(config)# network 192.168.0.0
Step 17
network network-number
Example:
Router(config)# network 192.169.0.0
Step 18
Example:
Router(config)# router igrp 5
autonomous-systemAutonomous system number that identifies the routes to the other IGRP routers. It is also used to tag the routing information.
Step 19
network network-number
Specifies a list of networks for the Routing Information Protocol (RIP) routing process. The argument is as follows:
Example:
Router(config)# network 192.170.0.0
Step 20
network network-number
Specifies a list of networks for the RIP routing process. The argument is as follows:
Example:
Router(config)# network 192.171.0.0
Step 21
access-list access-list-number {permit | deny} source source-mask [destination destination-mask] {eq | neq} [[source-object] [destination-object] [identification] any]
Creates an access list. For an explanation of the keywords and arguments, see Step 20 in the configuration task table in the Configuring QoS on a Proxy with ASR section on page 205.
Example:
Router(config)# access-list 20 permit 172.16.10.190 eq
Step 22
Example:
Router(config)# interface serial 03
Enters interface configuration mode on an ASR interface. Keywords and arguments are platform dependent; for more information, see Step 2 above.
214
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 23
ip access-group {access-list-number | access-list-name} {in | out}
Purpose Controls access to an interface. Use this command to set the outbound access group and then the inbound access group. Keywords and arguments are as follows:
Example:
Router(config-if)# ip access-group 101 in
access-list-numberNumber of an access list. Range: decimal number 1 to 199 or 1300 to 2699. access-list-nameName of an IP access list as specified by an IP access-list command. inFilters on inbound packets. outFilters on outbound packets.
Step 24
exit
Example:
Router(config-if)# exit
Cisco supports one border element per gatekeeper. For gateway configuration commands, see Configuring H.323 Gateways on page 41. To configure and provision an Annex G border element, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3. 4. 5.
exit exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
215
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
h323-annexg border-element-id cost cost priority priority
Purpose Enables the BE on the GK and enters BE configuration mode. Keywords and arguments are as follows:
Example:
Router(config-gk)# h323-annexg h323-annexg be20 cost 10 priority 40
border-element-idIdentifier of the Annex G border element that you are provisioning. Associates the gatekeeper with the BE identifier that is configured on the BE. Possible values: any International Alphabet 5 (IA5) string, without spaces and up to 20 characters in length. cost cost Cost associated with this Annex G border element. When a gatekeeper sends requests to remote zones and to the BE in its attempt to resolve an address, the remote zone or BE that resolves the address and has the lowest cost and highest priority is given preference. Range: 1 to 99. Default: 50. priority priority Priority associated with this Annex G border element. When a gatekeeper sends requests to remote zones and to the BE in its attempt to resolve an address, the remote zone or BE that resolves the address and has the lowest cost and highest priority is given preference. Range: 1 to 99. Default: 50.
Step 3
(Optional) Specifies the prefixes for which a BE should be queried for address resolution. Default: the GK forwards all remote zone queries to the BE. Do not use this command unless you want to restrict the queries sent to the BE to a specific prefix or set of prefixes. Exits the current mode.
Example:
Router(config-gk-annexg)# prefix 414*
Step 4
exit
Example:
Router(config-gk-annexg)# exit
Step 5
exit
Example:
Router(config-gk)# exit
Configuring Endpoints
This section contains the following information:
Information About Endpoints, page 217 Configuring Alternate Endpoints, page 221 Configuring Additional Routes to Alternate Endpoints, page 223 Configuring Nonavailability Information for Terminating Endpoints, page 225 Configuring Endpoint-Based Call-Capacity Management, page 226 Forcing Endpoint Unregistration, page 226
216
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Alternate Endpoints, page 217 Carrier-Based Routing Without a GKTMP Application Server, page 219 Additional Routes to Alternate Endpoints, page 220 Nonavailability Information for Terminating Endpoints, page 221 Endpoint-Based Call-Capacity Management, page 221
Alternate Endpoints
A calling endpoint can recover from a call setup failure by sending a setup message to one of the alternate endpoints so that it is possible for a call to finish even if a gateway goes down and the gatekeeper is not yet aware of the problem. Cisco supports a maximum of 20 alternates for each endpoint, and any alternates received through registration, admission, and status protocol (RAS) messages are merged with those entered manually in the gatekeeper command-line interface. If more than 20 alternates are submitted, the total list of alternates reverts back to 20. Alternate endpoints are configured using the endpoint alt-ep h323id command. This command defines the IP address for an alternate endpoint for the primary endpoint identified by its H.323 ID. The IP address is returned in the alternate endpoint field whenever the primary endpoint is returned in an ACF or LCF. The alternate endpoint gives an alternate address to place the call in case the call to the primary endpoint fails. This command provides a failover mechanism if a gateway becomes disabled for a period of time before the gatekeeper becomes aware of the problem. After receiving an admission confirmation (ACF) from the gatekeeper with an alternate endpoint list, the Cisco gateway may attempt to use an alternate if a SETUP message results in no reply from the destination. This command causes the alternate endpoints specified to be sent in all subsequent ACF/location confirmation (LCF) messages for the endpoint named in the h323-id argument. Gatekeepers that support this endpoint alt-ep h323id command also support receiving alternate endpoint information using RAS messages. The gatekeeper accepts IP and port call signal address information in endpoint registration request (RRQ) messages. The gatekeeper list of alternates for a given endpoint is the union of the configured alternates and alternates received in RRQs from that endpoint. The Outgoing Trunk Group ID and Carrier ID for H.323 VoIP Networks feature provides an enhancement to Registration, Admission, and Status (RAS) Admission Confirmation and Location Confirmation messages. RAS messages include a circuitInfo field that provides trunk group label or carrier ID information for remote endpoints (gateways) in H.323 networks. The Outgoing Trunk Group ID and Carrier ID for H.323 VoIP Networks feature also adds trunk group label and carrier ID support for the alternate endpoint field in the Gatekeeper Transaction Message Protocol (GKTMP) Response Admission Request (ARQ), Admission Confirmation (ACF), Location Request (LRQ), and Location Confirmation (LCF) messages. This feature allows a gatekeeper to specify a primary route-server trunk group as the destination to which a call is to be routed. The gatekeeper provides the IP address of the terminating gateway and the trunk group label or carrier ID of that gateway (in the circuitInfo field) to the requesting gateway. The GKTMP application server provides the trunk group label or carrier ID of the terminating gateway to the gatekeeper in the RESPONSE ARQ, ACF, LRQ, or LCF messages. The gatekeeper converts the trunk group ID or carrier ID information and sends it in the circuitInfo field of its RAS message to the requesting gateway.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
217
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
The GKTMP application server may also provide a list of alternate gateways in the RESPONSE ARQ, ACF, LRQ, or LCF messages that the gatekeeper sends to the requesting gateway. The alternate gateway list includes a separate call signal address and circuitInfo field (trunk group label or carrier ID) for each alternate gateway. The gatekeeper removes identical alternate gateway routes from the consolidated alternate gateway list before sending the list to the requesting gateway.
Note
The gatekeeper does not validate whether the alternate gateway is valid or whether the target carrier ID will have enough capacity if the destination gateways and their trunk group labels and carrier IDs are registered to the local gatekeeper zone. Figure 21 illustrates that this feature allows the gatekeeper in Zone 1 to receive routing information from the primary gateway, Gateway 2 in Zone 2, and from the alternate gateway, Gateway 3, also in Zone 2. The routing information is passed from the gatekeeper in Zone 1 to requesting Gateway 1.
Figure 21 Topology of Routing Between Zone 1 and Zone 2
Gateway 2
Trunk Group DGW2 GKTMP = Gatekeeper Transaction Message Protocol PSTN = public switched telephone network PSTN Switch D
The RAS message includes a new field called circuitInfo. The information in the circuitInfo field corresponds to the information in the Q and J tags in the GKTMP message. The trunk group label (Q tag) or carrier ID (J tag) of the primary gateway is provided in the alternateEndpoint structure of the GKTMP message, along with the call signal address of the primary gateway. The trunk group label or carrier ID of each alternate gateway is also provided in the alternateEndpoint structure of the GKTMP message. The Q and J tags of each alternate gateway are embedded inside the existing A-tagged fields of the GKTMP message, as shown in the following example:
A=c:{I:172.18.194.1:1720} J:CARRIER_ID A=c:{I:10.1.1.1:1720} Q:TRUNK_GROUP_LABEL
The following is an example of a RAS message from a gatekeeper to a requesting gateway. (The gatekeeper has converted the information in the Q and J fields of the GKTMP message that it received from the GKTMP application server.) The RAS message contains two alternate endpoints, each of which has a circuitInfo field:
218
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
alternateEndpoints callSignalAddress ipAddress : 'AC12C826'H port 1720 circuitInfo destinationCircuitID group group "CARRIER_ID" ! callSignalAddress ipAddress : ip 'AC12C816'H port 1720 circuitInfo destinationCircuitID group group "TRUNK_GROUP_LABEL"
The gatekeeper can be instructed by GKTMP servers to send alternate endpoints with same call signaling address and different calling or called numbers in the ACF. When this happens the Cisco gateway acting as the endpoint will send an alternate endpoint attempt to the same call signaling address as the primary call. If the first call is still active on the terminating gateway when the second call arrives the TGW would detect a call loop because the calls share the same GUID, and the second call will be rejected with a 'CALL_LOOP' message printed on syslog.
Effective with Cisco IOS Release 12.4(9)T2 and before, the first call can be active on the TGW when the second call arrives in the following cases.
1. 2.
A Release Complete message has been sent on the first call, but the TGW keeps the call active till a Release Complete message arrives from OGW or till the release timer expires. A Release Complete message has been sent out on the first call, but a DRQ has not arrived from the GK.
Effective with Cisco IOS Release 12.4(9)T3 and later, the first call can be active on the TGW when the second call arrives because:
1.
The TGW keeps the call active if Maintain connection timeout is turned off, even if a Release Complete message has been sent on the first call. The call is kept active till a Release Complete message arrives from OGW or till the release timer expires. A Release Complete message has been sent out on the first call, but a DRQ has not arrived from the GK.
2.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
219
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Note
Annex G border element (BE) interaction is not affected. The LCF responses from BEs are treated like any remote gatekeeper LCF. Effective with Cisco IOS Release 12.2(11)T, duplicate alternate endpoints that are received in a Location Confirmation (LCF) message are removed from the consolidated list of endpoints. The current gatekeeper limitations apply:
Ten LRQ messages can be sent by the gatekeeper; therefore, there is a limit of 10 remote zones that are handled by the gatekeeper. ACF and LCF messages can carry up to 20 alternate endpoints.
220
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
221
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Configuring Endpoints
To configure alternate endpoints, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3.
gatekeeper endpoint alt-ep h323id h323-id ip-address [port] [carrier-id carriername] exit
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router (config)# gatekeeper
Step 2
Example:
Router (config-gk)# endpoint alt-ep h323id h323-id 192.168.0.0
h323-idH.323 name ID of the endpoint for which an alternate address is being supplied. This ID is used by a gateway to communicate with the gatekeeper. Usually, this ID is the name given to the gateway, with the gatekeeper domain name appended. ip-addressIP address of an alternate endpoint. portPort number associated with the address of the alternate. Default: 1720. carrier-id carriernameTrunk group label or circuit ID of the alternate endpoint. It may be added in addition to the IP address of the alternate endpoint.
Step 3
exit
Example:
Router (config-gk)# exit
Verifying Endpoints
To verify alternate endpoints, perform the following steps.
Step 1
show gatekeeper endpoints alternates Use this command to display the status of all registered endpoints for a gatekeeper. The following example shows three carrier IDs (CARRIER_ABC, CARRIER_DEF, and CARRIER_GHI):
Router# show gatekeeper endpoints alternates GATEKEEPER ENDPOINT REGISTRATION
222
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
================================== CallSignalAddr Port RASSignalAddr Port Zone Name Type Flags ------------------- ----- ---------------------- -----------------------! ALL CONFIGURED ALTERNATE ENDPOINTS ================================== Endpoint H323 Id RASSignalAddr Port Carrier Id -----------------------------------------------------gwid 1.1.1.1 1720 CARRIER_ABC gwid 1.1.1.1 1720 CARRIER_DEF gwid 2.2.2.2 1720 CARRIER_GHI
SUMMARY STEPS
1. 2. 3.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
223
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router (config)# gatekeeper
Step 2
Example:
Router(config-gk)# endpoint alt-ep collect 20
Configures the number of alternate routes to consolidate from various LCF responses before ending the collection process and sending the LCF message to the requesting endpoint. Keywords and arguments are as follows:
valueNumber of routes. Range: 1 to 20. Default: 0, which indicates that alternate route consolidation is not enabled. When the feature is not enabled, the gatekeeper gets alternates from only one LCF (the best LCF with the least-cost routing). The gatekeeper ignores the alternates present in other LCF messages even if they are present and there is no consolidation. Identical alternate endpoints are removed from the list. That is, if an alternate endpoint received in an LCF message has an identical IP address or trunk group label or carrier ID as any alternate endpoints received in previous LCF messages, the previous duplicate alternate endpoints are removed from the consolidated list.
distributeGatekeeper includes alternate routes from as many LCF messages as possible in the consolidated list. Use of this keyword allows the gatekeeper to give fairness to the information of alternate routes present in various LCFs.
Step 3
exit
Example:
Router (config-gk)# exit
224
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router (config)# gatekeeper
Step 2
lrq reject-resource-low
Example:
Router (config-gk)# lrq reject-resource-low
Configures the gatekeeper to notify a sending gatekeeper on receipt of an LRQ message that no terminating endpoints are available. Exits the current mode.
Step 3
exit
Example:
Router (config-gk)# exit
show running-config Use this command to verify that the gatekeeper is configured to notify a sending gatekeeper on receipt of an LRQ message that no terminating endpoints are available.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
225
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
The endpoint resource-threshold onset command must be configured for the gatekeeper to perform endpoint-based call-capacity management. To configure endpoint-based call-capacity management, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command or Action
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Sets the maximum number of calls that are allowed for an endpoint. Arguments are as follows:
Example:
Router(config-gk)# endpoint max-calls h323id GW-1 1000
endpoint-idID of the endpoint. max-callsMaximum number of calls allowed to the endpoint. Range: 1 to 100000.
Step 3
exit
Example:
Router(config-gk)# exit
Prerequisites for Forcing Unregistration, page 226 Forcing Unregistration, page 227 Verifying Unregistration, page 227
For gatekeeper cluster configurations, the clear h323 gatekeeper endpoint command must be entered on the gatekeeper where the endpoint is registered. Use the show gatekeeper endpoints command to locate the endpoint in a gatekeeper cluster.
226
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Forcing Unregistration
To force a gatekeeper to unregister an endpoint, use the clear h323 gatekeeper endpoint command as described below. Alternatively, you can issue a command from the GKTMP server to unregister an endpoint.
Note
For more information on GKTMP, see the Cisco Gatekeeper External Interface Reference, Version 4.2 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/rel_docs/gktmp4_2/. To force endpoint unregistration, use the following command beginning in global configuration mode.
SUMMARY STEPS
1.
clear h323 gatekeeper endpoint {alias {e164 name | h323id name} | all | id number | ipaddr ip-address [port]}
DETAILED STEPS
Command
Step 1
clear h323 gatekeeper endpoint {alias {e164 name | h323id name} | all | id number | ipaddr ip-address [port]}
Purpose Forces the gatekeeper to send an unregistration request (URQ) message to the specified endpoint or all endpoints and removes the endpoint from the gatekeeper registration database. The endpoint that is unregistered can come back if it sends the RRQ message back to the gatekeeper after unregistration. Keywords and arguments are as follows:
Example:
Router# clear h323 gatekeeper endpoint all
alias e164 nameE.164 alphanumeric address that is specified in the local alias table. alias h323id nameH.323 ID name that is specified in the local alias table and is an alternate way to reach an endpoint. allAll endpoints. id numberID of the endpoint. ipaddr ip-address [port]Call signaling address and port (optional) of the endpoint. Default: 1720.
Verifying Unregistration
To verify unregistration, perform the following steps.
Step 1 Step 2
Verify that you did not receive an error message after entering the clear h323 gatekeeper endpoint command. show gatekeeper endpoints Use this command to view all endpoints registered to the gatekeeper:
Router# show gatekeeper endpoints GATEKEEPER ENDPOINT REGISTRATION ================================
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
227
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
CallSignalAddr
Port
RASSignalAddr
Port
Zone Name
Type
----
----1.1.1.1 1720 1.1.1.1 1719 H323-ID: test (static) Total number of active registrations = 1
gk-e4-2
VOIP-GW S
Step 3
Verify that the unregistered endpoint is not displayed in the list of endpoints.
Restrictions for the IRR Timer and Disable IRQ Requests, page 228 Information About the IRR Timer and Disable IRQ Requests, page 228 Configuring IRR Periodic Intervals on the Gatekeeper, page 229 Disabling IRQ Requests for All Calls in the Gatekeeper, page 230
If the gatekeeper is configured to not send IRQs with the CRV set to zero, bandwidth control is not supported. Adjusting the IRR frequency while there are existing calls should be avoided. All gatekeepers should have the same IRR frequency configured to prevent problems during gatekeeper switchover. RQ retries from two to nine increases DRQ reliability. This value is not configurable.
228
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
If a gateway supports a large volume of calls, the number of IRR messages as responses to an IRQ with the CRV set to zero could be very CPU intensive and cause congestion. Additionally, if a gatekeeper serves many endpoints or high-capacity gateways, the IRQ requests and the resulting IRR messages received can flood the network, causing high CPU utilization and network congestion. The Call Status Tracking Optimization feature provides the following methods to address this potential problem:
A command to configure IRR frequency that is included in the ACF message. Currently, the IRR frequency is set to 240 seconds (4 minutes), based on an average 4-minute call hold time. The IRR allows the gatekeepers to terminate calls for which a disengage request (DRQ) has not been received. If missing DRQs are not a problem, the IRR frequency can be set to a larger value than four minutes, minimizing the number of unnecessary IRRs sent by a gateway. A command to disable the gatekeeper from sending an IRQ with the CRV set to zero when the gatekeeper is requesting the status of all calls after its initialization. Disabling the IRQ can eliminate unnecessary IRR messages in cases where the reconstruction of call structures can be postponed until the next IRR, or in cases where the call information is no longer required because calls are terminated before the periodic IRR is sent. Disabling the IRQ is advantageous if direct bandwidth control is not used in the gatekeeper. An increase from two to nine in the number of retries for sending the DRQ. If the reliability of DRQ messages is increased, a longer period can be used before the next IRR is sent. Third-party gatekeepers must support this feature.
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
229
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Command
Step 2
timer irr period value
Purpose Configures the IRR timer, or the periodic interval of IRR messages sent by the gatekeeper, in minutes. The gatekeeper uses this value to populate the irrFrequency field in the ACF message. Range: 1 to 60. Default: 4. Exits the current mode.
Example:
Router(config-gk)# timer irr period 30
Step 3
exit
Example:
Router(config-gk)# exit
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
no irq global-request
Example:
Router(config-gk)# no irq global-request
Prohibits the gatekeeper from sending IRQ requests with a CRV set to zero to endpoints to obtain information about all calls. These IRQ requests are usually sent after a gatekeeper initializes upon switchover. Default: sends IRQ requests with a CRV set to zero. Exits the current mode.
Step 3
exit
Example:
Router(config-gk)# exit
Restrictions for Sequential LRQs, page 231 Information About Sequential LRQs, page 231 Configuring Sequential LRQ Enhancement, page 232
230
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Configuring the Sequential LRQ Timer, page 233 Verifying Sequential LRQ Enhancement, page 233
In a network where LRQs are forwarded through multiple gatekeepers along a single path, a single LRQ sent from a gatekeeper could solicit multiple LRJ and Location Confirmation (LCF) responses. If an LRJ response is received first, a potentially unnecessary LRQ could be sent to the next zone, increasing traffic. To avoid this problem, ensure that the gatekeepers do not use the blast option, or carefully configure the sequential timer on each gatekeeper along the path. Using sequential LRQs in a directory gatekeeper along the path can also help because sequential LRQs in the directory gatekeeper always send one response back to an LRQ request.
LRQ1
GK1
LRJ1
GK1
GK1
Figure 24 shows a call flow with the Sequential LRQ Enhancement feature when LRJ1 arrives after the delay timer has expired and after LRQ2 has been sent. If this occurs, the originating gatekeeper does not send LRQ3 and ignores LRQ2.
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
56008
LRQ2
231
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
Figure 23
Originating GK
GK1
Originating GK Originating GK
LR Q2
GK1
GK1
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Enables the GK to immediately send an LRQ to the next zone after it receives an LRJ from a GK in the current zone.
Example:
Router(config-gk)# lrq lrj immediate-advance
Step 3
exit
Example:
Router(config-gk)# exit
232
56009
LRJ1
Configuring H.323 Gatekeepers and Proxies How to Configure H.323 Gatekeepers and Proxies
SUMMARY STEPS
1. 2. 3.
DETAILED STEPS
Command
Step 1
gatekeeper
Example:
Router(config)# gatekeeper
Step 2
Defines the intervals for the GK to send successive sequential LRQs. The LRQ sequential timing source (SEQ) delay is used to set the time between sending LRQs to remote gatekeepers for address resolution. To resolve an address, the gatekeeper might have several remote zones configured, and it can send the LRQs simultaneously (blast) or sequentially (seq). The gatekeeper chooses the best route based on availability and cost. Using LRQs sequentially results in lower network traffic, but can increase latency of calls when the most preferred route is unavailable. The argument is as follows:
Example:
Router(config-gk)# timer lrq seq delay 3
Lowering the time increases traffic on the network but might reduce call-setup time.
Step 3
exit
Example:
Router(config-gk)# exit
show running-config Use this command to verify that the Sequential LRQ Enhancement feature is enabled.
Router# show running-config Building configuration...
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
233
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Current configuration : 1802 bytes ! version 12.2 . . . gatekeeper zone local Zone1 cisco.com zone remote c3620-1-gk cisco.com 209.165.200.225 1719 zone remote c2514-2-gk cisco.com 209.165.200.228 1719 zone remote gk-cisco-mn cisco.com 209.165.200.230 1719 zone remote gkzone3 cisco.com 209.165.200.235 zone remote gk-catapult cisco.com 209.165.200.229 1719 zone prefix gkzone3 405....... zone prefix gk-gk5 515.... zone prefix c2514-2-gk 910....... zone prefix c3620-1-gk 917300.... zone prefix c2514-2-gk 919....... zone prefix gk-cisco-mn 919....... zone prefix c3620-1-gk 919....... lrq reject-resource-low lrq lrj immediate-advance timer lrq window 6 no shutdown . . .
HSRP: Example, page 235 Gatekeeper Zones: Example, page 236 Load Balancing with Alternate Gatekeepers: Example, page 238 Security and Authentication: Example, page 238 E.164 Interzone Routing: Example, page 241 Interaction with External Applications: Example, page 243 Proxy Use: Example, page 244 Co-Edge Proxy: Example, page 246 Endpoints: Example, page 252 IRR Timer and Disable IRQ Requests: Example, page 254 Sequential LRQ Enhancement: Example, page 254
234
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
HSRP: Example
This sample sample configuration uses Ethernet 0 as the HSRP interface on both gatekeepers.
Primary Gatekeeper
configure terminal ! Enter global configuration mode. interface ethernet 0 ! enter interface configuration mode for interface ethernet 0. standby 1 ip 172.21.127.55 ! Member of standby group 1, sharing virtual address 172.21.127.55. standby 1 preempt ! Claim active role when it has higher priority. standby 1 timers 5 15 ! Hello timer is 5 seconds; hold timer is 15 seconds. standby 1 priority 110 ! Priority is 110.
Backup Gatekeeper
configure terminal interface ethernet 0 standby 1 ip 172.21.127.55 standby 1 preempt standby 1 timers 5 15
The configurations are identical except that gk2 has no standby priority configuration, so it assumes the default priority of 100meaning that gk1 has a higher priority.
gk1 and gk2 Gatekeeper Mode Configurations
configure terminal ! Enter global configuration mode. gatekeeper ! Enter gatekeeper configuration mode. zone local gk-sj cisco.com 172.21.127.55 ! Define local zone using HSRP virtual address as gatekeeper RAS address. . . . ! Various other gk-mode configurations. no shut ! Bring up the gatekeeper. configure terminal ! Enter global configuration mode. gatekeeper ! Enter gatekeeper configuration mode. zone local gk-sj cisco.com 172.21.127.55 ! Define local zone using HSRP virtual address as gatekeeper RAS address. ! Note this uses the same gkname and address as on gk1. . . ! Various other gk-mode configurations. no shut ! Bring up the gatekeeper.
Note
The no shut command is issued on both gatekeepers, primary and secondary. If the show gatekeeper status command is issued on the two gatekeepers, gk1 shows the following:
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
235
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Gatekeeper State: UP ! But gk2 shows the following: Gatekeeper State: HSRP STANDBY
The following example shows how to define multiple local zones for separating gateways:
zone zone zone zone zone local gk408or650 xyz.com local gk415 xyz.com prefix gk408or650 408....... prefix gk408or650 650....... prefix gk415 415.......
All the gateways used for area codes 408 or 650 can be configured so that they register with gk408or650, and all gateways used for area code 415 can be configured so that they register with gk415.
One Zone for Multiple Gateways
The following example shows how to put all the gateways in the same zone and use the gw-priority keyword to determine which gateways are used for calling different area codes:
zone zone zone zone local localgk xyz.com prefix localgk 408....... prefix localgk 415....... gw-priority 10 gw1 gw2 prefix localgk 650....... gw-priority 0 gw1
Domain xyz.com is assigned to gatekeeper localgk. Prefix 408....... is assigned to gatekeeper localgk, and no gateway priorities are defined for it; therefore, all gateways that register to localgk can be used equally for calls to the 408 area code. No special gateway lists are built for the 408....... prefix; selection is made from the master list for the zone. The prefix 415....... is added to gatekeeper localgk, and priority 10 is assigned to gateways gw1 and gw2. Prefix 650....... is added to gatekeeper localgk, and priority 0 is assigned to gateway gw1.
A priority 0 is assigned to gateway gw1 to exclude it from the gateway pool for prefix 650........ When gateway gw2 registers with gatekeeper localgk, it is added to the gateway pool for each prefix as follows:
For gateway pool for 415......., gateway gw2 is set to priority 10. For gateway pool for 650......., gateway gw2 is set to priority 5.
To change gateway gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:
no zone prefix localgk 415....... gw-pri 10 gw2
To change both gateways gw1 and gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:
no zone prefix localgk 415....... gw-pri 10 gw1 gw2
In the preceding example, the prefix 415....... remains assigned to gatekeeper localgk. All gateways that do not specify a priority level for this prefix are assigned a default priority of 5. To remove the prefix and all associated gateways and priorities from this gatekeeper, enter the following command:
236
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
The following example shows session bandwidth limits and resource information for destination zones configured on the gatekeeper:
Router# show running-config ! Building configuration... Current configuration : 1329 bytes ! version 12.3 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname router ! username all memory-size iomem 10 clock timezone GMT 0 aaa new-model ! aaa accounting connection h323 stop-only group radius aaa session-id common ip subnet-zero ! no ip domain lookup ip domain name cisco.com ip host anyname-tftp1 172.18.207.15 ip dhcp smart-relay ! voice call carrier capacity active voice service voip sip session transport tcp rel1xx disable ! interface Ethernet0/0 ip address 172.18.200.28 255.255.255.0 half-duplex no cdp enable ! interface TokenRing0/0 no ip address shutdown ring-speed 16 no cdp enable ! no ip http server ip classless ip route 0.0.0.0 0.0.0.0 172.18.200.1 ! radius-server host 172.18.200.30 auth-port 1645 acct-port 1646 radius-server vsa send accounting ! dial-peer cor custom ! gatekeeper zone local GK-1 cisco.com 172.18.200.28 zone local GK-2 cisco.com zone local word word
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
237
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
zone remote GK-3 cisco.com 172.18.200.5 1719 zone prefix GK-2 1.. gw-type-prefix 1#* default-technology bandwidth interzone default 1 bandwidth session default 5 bandwidth remote 4 no shutdown server registration-port 21000 ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 password lab line vty 5 15 !end
In the following example, two remote gatekeepers are configured to service the same zone prefix:
gatekeeper zone remote zone remote zone prefix zone prefix c2600-1-gk c2514-1-gk c2600-1-gk c2514-1-gk cisco.com 172.18.194.70 1719 cisco.com 172.18.194.71 1719 919....... 919.......
In the following example, two remote gatekeepers are configured to service the same technology prefix:
gatekeeper zone remote c2600-1-gk cisco.com 172.18.194.70 1719 zone remote c2514-1-gk cisco.com 172.18.194.71 1719 gw-type-prefix 3#* hopoff c2600-1-gk hopoff c2514-1-gk
238
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Figure 24
OGW
OGK1 (39_gatekeeper)
OG2 (34_dirgk)
TGW
TGK1 (40_gatekeeper)
TGW2 (35_dirgk)
Originating Gatekeeper 1
config terminal gatekeeper zone local 39_gatekeeper cisco.com 172.18.198.92 zone remote 34_dirgk cisco.com 172.18.198.197 1719 zone prefix 39_gatekeeper 919* zone prefix 34_dirgk * security izct password cisco gw-type-prefix 1#* default-technology no shutdown
Terminating Gatekeeper 1
config terminal gatekeeper zone local 40_gatekeeper cisco.com 172.18.198.91 zone remote 35_dirgk cisco.com 172.18.198.196 1719 zone prefix 40_gatekeeper 408* zone prefix 35_dirgk * security izct password cisco gw-type-prefix 1#* default-technology no shutdown
Originating Gatekeeper 2
config terminal gatekeeper zone local 34_dirgk cisco.com 172.18.198.197 zone remote 39_gatekeeper cisco.com 172.18.198.92 1719 zone remote 35_dirgk cisco.com 172.18.198.196 1719 zone prefix 39_gatekeeper 919* zone prefix 35_dirgk * security izct password cisco lrq forward-queries no shutdown
Terminating Gatekeeper 2
config terminal gatekeeper zone local 35_dirgk cisco.com 172.18.198.196 zone remote 40_gatekeeper cisco.com 172.18.198.91 1719 zone remote 34_dirgk cisco.com 172.18.198.197 1719 foreign-domain zone prefix 40_gatekeeper 408* zone prefix 34_dirgk * security izct password cisco lrq forward-queries no shutdown
37625
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
239
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
The following examples do not reflect the actual display of the passwords as you would see them in output. Actual displays show the passwords as being encrypted. The displays here show them in cleartext format for clarity purposes only.
Originating Gatekeeper
In this example, LRQ messages received from the border gatekeeper authenticate the LRQ message by using the password ogk_123. LRQ messages sent to the border gatekeeper contain the password bgk_123 in the CAT.
gatekeeper zone remote bgk china 172.18.195.137 1719 foreign-domain security password-group china lrq send bgk_123 security password-group china lrq receive ogk_123 security zone bgk password-group china
In this example, LRQ messages received from the originating gatekeeper authenticate the LRQ message by using the password bgk_123. LRQ messages sent to the originating gatekeeper contain the password ogk_123 in the CAT. LRQ messages received from the terminating gatekeeper authenticate the LRQ message by using the password bgk_123. LRQ messages sent to the terminating gatekeeper contain the password tgk_123 in the CAT.
gatekeeper zone remote ogk usa 172.18.195.138 1719 foreign-domain zone remote tgk china 172.18.195.139 1719 security password-group usa lrq send ogk_123 security password-group usa lrq receive bgk_123 security password-group china lrq send tgk_123 security password-group china lrq receive bgk_123 security zone ogk password-group usa security zone tgk password-group china
In this example, LRQ messages received from the border gatekeeper authenticate the LRQ message by using the password tgk_123. LRQ messages sent to the border gatekeeper contain the password bgk_123 in the CAT.
gatekeeper zone remote bgk china 172.18.195.137 1719 security password-group china lrq send bgk_123 security password-group china lrq receive tgk_123 security zone bgk password-group china
In this example, LRQ messages are received from the terminating gatekeeper, which does not have a password group configured. Therefore, the LRQ messages received are authenticated using the password group configured for the originating gatekeeper (in this example, ogk_123).
gatekeeper zone remote tgk china 172.18.195.137 1719 foreign-domain security password-group china lrq send tgk_123 security password-group china lrq receive ogk_123 security zone * password-group china
240
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
The following example shows how to configure tokenless call authorization. You create an IP ACL containing endpoints from which the gatekeeper should accept calls. After the router enters gatekeeper configuration mode, you instruct the gatekeeper to check the ACL before processing the call.
Router# enable Router# configure terminal Router(config)# access-list Router(config)# access-list Router(config)# access-list Router(config)# access-list Router(config)# gatekeeper Router(config-gk)# security
20 20 20 20
acl answerarq 20
IP Access Lists
The following example shows how to verify the IP access lists and that the gatekeeper has been configured to use them:
Router# show running-config Building configuration... . . . ip access-list standard WORD ! access-list 20 permit 172.16.10.190 access-list 20 permit 192.16.18.2 access-list 20 permit 192.16.10.12 access-list 20 permit 192.16.12.1 . . . gatekeeper zone local herndon.cisco.com cisco.com security acl answerarq 20 no shutdown . . . end
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
241
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Figure 25
Non-H.323 network H.320 terminal (over ISDN) H.324 terminal (over POTS) Speech only (telephone)
In sj (San Jose in the 408 area code), the gateways are configured to register with gk-sj as follows:
gw-sj2 configured to register with technology prefix 2# gw-sj3 configured to register with technology prefix 3# gw-sj4 configured to register with technology prefix 4#
Similarly, in ny (New York in the 212 area code), gateways are configured to register with gk-ny as follows:
gw-ny2 configured to register with technology prefix 2# gw-ny3 configured to register with technology prefix 3# gw-ny4 configured to register with technology prefix 4#
For the gatekeeper for San Jose, the configuration commands are as follows:
gatekeeper zone local gk-sj cisco.com zone remote gk-ny cisco.com 172.21.127.27 use-proxy gk-sj default direct zone prefix gk-sj 408....... zone prefix gk-ny 212....... gw-type-prefix 3# hopoff gk-sj gw-type-prefix 4# default-technology
For the gatekeeper for New York, the configuration commands are as follows:
gatekeeper zone local gk-ny cisco.com zone remote gk-sj cisco.com 172.21.1.48 use-proxy gk-ny default direct zone prefix gk-sj 408....... zone prefix gk-ny 212....... gw-type-prefix 3# hopoff gk-ny gw-type-prefix 4# default-technology
When a call is presented to gatekeeper gk-sj with the following target address in San Jose:
2#2125551212
Gatekeeper gk-sj recognizes that 2# is a technology prefix. It was not configured as such, but because gw-sj2 registered with it, the gatekeeper now treats 2# as a technology prefix. It strips the prefix, which leaves the telephone number 2125551212. This is matched against the zone prefixes that have been configured. It is a match for 212......., so gk-sj knows that gk-ny handles this call. Gatekeeper gk-sj forwards the entire address 2#2125551212 over to Gatekeeper gk-ny, which also looks at the technology prefix 2# and routes it to gw-ny2.
242
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
When a call is presented to gatekeeper gk-sj with the following target address in San Jose:
2125551212
Gatekeeper gk-sj checks it against known technology prefixes but finds no match. It then checks it against zone prefixes and matches on 212....... for gk-ny, and therefore routes this call to gk-ny. Gatekeeper gk-ny does not have any local registrations for this address, and there is no technology prefix on the address, but the default prefix is 4#, and gw-ny4 is registered with 4#, so the call gets routed to gw-ny4. Another call is presented to gatekeeper gk-sj with the following target address in San Jose:
3#2125551212
The call has technology prefix 3#, which is defined as a local hopoff prefix, so gk-sj routes this call to gw-sj3, despite the fact that it has a New York zone prefix. In this last example, a call is presented to gatekeeper gk-sj with the following target address in San Jose:
6505551212
Gatekeeper gk-sj checks for a technology prefix match but does not find one. It then searches for a zone prefix match and fails again. But there is a match for default gateway prefix of 4#, and gw-sj4 is registered with 4#, so the call is routed out on gw-sj4.
In the following example, server flow-control is set with an onset level of 50:
Router# server flow-control onset 50 *Mar 8 20:05:34.081: gk_srv_handle_flowcontrol: Flow control enabled
Router# show running-config Building configuration... Current configuration : 1065 bytes ! version 12.2 no service single-slot-reload-enable service timestamps debug datetime msec service timestamps log uptime no service password-encryption ! hostname snet-3660-3 ! . . . gatekeeper zone local snet-3660-3 cisco.com zone remote snet-3660-2 cisco.com 209.165.200.225 1719 zone prefix snet-3660-2 408* lrq forward-queries no use-proxy snet-3660-3 default inbound-to terminal no use-proxy snet-3660-3 default outbound-from terminal no shutdown server registration-port 8000 server flow-control onset 50
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
243
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
! ! . . . end
Retry Timer
The following example shows that the retry timer has been set to 45 seconds:
. . . gw-type-prefix 1#* default-technology gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720 timer server retry 45 no shutdown . . .
The following example shows that the gatekeeper rejects registrations when it cannot connect to the GKTMP server:
. . . gw-type-prefix 1#* default-technology gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720 no shutdown server absent reject rrq . . .
The following example shows that the gatekeeper rejects calls when it cannot connect to the GKTMP server:
. . . gw-type-prefix 1#* default-technology gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720 no shutdown server absent reject arq . . .
In the following example, the local zone sj.xyz.com is configured to use a proxy for inbound calls from remote zones tokyo.xyz.com and milan.xyz.com to gateways in its local zone. The sj.xyz.com zone is also configured to use a proxy for outbound calls from gateways in its local zone to remote zones tokyo.xyz.com and milan.xyz.com.
244
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Because the default mode disables proxy communications for all gateway calls, only the gateway call scenarios listed can use the proxy.
Proxy for Outbound Calls
In the following example, the local zone sj.xyz.com uses a proxy for only those calls that are outbound from H.323 terminals in its local zone to the specified remote zone germany.xyz.com:
gatekeeper no use-proxy sj.xyz.com default outbound-from terminal use-proxy sj.xyz.com remote-zone germany.xyz.com outbound-from terminal
Note that any calls inbound to H.323 terminals in the local zone sj.xyz.com from the remote zone germany.xyz.com use the proxy because the default applies.
Proxy Removal
The following example shows how to remove one or more proxy statements for the remote zone germany.xyz.com from the proxy configuration list:
no use-proxy sj.xyz.com remote-zone germany.xyz.com
The command removes all special proxy configurations for the remote zone germany.xyz.com. After the command is entered like this, all calls between the local zone (sj.xyz.com) and germany.xyz.com are processed according to the defaults defined by any use-proxy commands that use the default option.
H.235 Security
The following example shows output from configuring secure registrations from the gatekeeper and identifying which RAS messages the gatekeeper checks to find authentication tokens:
dial-peer voice 10 voip destination-pattern 4088000 session target ras dtmf-relay h245-alphanumeric ! gateway security password 09404F0B level endpoint
The following example shows output from configuring which RAS messages contain gateway-generated tokens:
dialer-list 1 protocol ip permit dialer-list 1 protocol ipx permit radius-server host 10.0.0.1 auth-port 1645 acct-port 1646 radius-server retransmit 3 radius-server deadtime 5 radius-server key lab radius-server vsa send accounting ! gatekeeper zone local GK1 test.com 10.0.0.3 zone remote GK2 test2.com 10.0.2.2 1719 accounting security token required-for registration no use-proxy GK1 remote-zone GK2 inbound-to terminal
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
245
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
To prohibit proxy use for inbound calls to H.323 terminals in a local zone from a specified remote zone, enter a command similar to the following:
no use-proxy sj.xyz.com remote-zone germany.xyz.com inbound-to terminal
This command overrides the default and disables proxy use for inbound calls from remote zone germany.xyz.com to all H.323 terminals in the local zone sj.xyz.com.
Figure 26 and the following configuration examples show how to configure RIP on the two edge networks and how to configure IGRP on the two backbone networks.
Figure 26 Sample Configuration Without Subnetting
E1: 172.22.0.1 L0: 10.0.0.0 E0: 172.20.0.1 PX1 Multimedia backbone PX2 EP1 Edge net 1 R2 E0: 172.20.0.2 R1 Data backbone 172.23.0.2 E2: 172.21.0.2 E1: 172.21.0.1
11027
Edge net 2
EP2
246
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
router rip network 172.20.0.0 network 10.0.0.0 ! router igrp 4000 network 172.22.0.0 network 10.0.0.0 ! access-list 101 permit ip any host 10.0.0.0 access-list 101 permit ip host 10.0.0.0 any access-list 101 permit igrp any any
Note
The configuration for PX2 and R2 is the same as that for PX1 and R1.
Co-Edge Proxy with Subnetting
Figure 27 and the examples that follow show how to configure Enhanced IGRP on all networks.
Figure 27 Sample Configuration with Subnetting
E1: 172.21.2.1 L0: 172.21.10.1 E0: 172.21.0.1 PX1 Multimedia backbone PX2 EP1 Edge net 1 R2 E0: 172.21.0.2 R1 Data backbone 172.21.3.2 E2: 172.21.1.2 E1: 172.21.1.1
11028
Edge net 2
EP2
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
247
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
proxy h323 ! interface Loopback0 ip address 172.21.10.1 255.255.255.192 h323 interface h323 h323-id [email protected] h323 gatekeeper ipaddr 172.21.20.1 ! interface Ethernet0 ip address 172.21.0.1 255.255.255.192 ! interface Ethernet1 ip address 172.21.2.1 255.255.255.192 ip access-group 101 in ip access-group 101 out h323 asr ! router eigrp 4000 redistribute connected metric 10000 10 255 255 65535 passive-interface Ethernet1 network 172.21.0.0 distribute-list 10 out no auto-summary ! router eigrp 5000 redistribute connected metric 10000 10 255 255 65535 passive-interface Ethernet0 network 172.21.0.0 distribute-list 11 out no auto-summary ! access-list 10 deny 172.21.2.0 0.0.0.63 access-list 10 permit any access-list 11 deny 172.21.0.0 0.0.0.63 access-list 11 permit any access-list 101 permit ip any host 172.21.10.1 access-list 101 permit ip host 172.21.10.1 any access-list 101 permit eigrp any any
248
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
Note
The configuration for PX2 and R2 is the same as that for PX1 and R1.
Inside-Edge Proxy with ASR Without Subnetting
The configuration of the co-edge proxy in Edge net 1 has already been presented above. Figure 28 shows the configuration of the inside-edge proxy PX2 and edge router R2 of Edge net 2. RIP is used on the edge networks. IGRP is used on the data backbone and the multimedia backbone.
Figure 28 Edge Net 2 with Inside-Edge Proxy and No Subnetting
E1: 172.22.0.1 L0: 10.0.0.0 E0: 172.20.0.1 PX1 Multimedia backbone E1: 172.22.0.2 S0: 10.0.0.1 S0: 10.0.0.2 E0: 172.23.0.2 PX2
EP1
Edge net 1
R2
Edge net 2
EP2
E1: 172.21.0.1
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
249
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
! interface Ethernet2 ip address 172.21.0.2 255.255.0.0 ! interface Serial0 ip address 10.0.0.1 255.0.0.0 ! router rip redistribute igrp 5000 metric 1 network 172.23.0.0 ! router igrp 4000 network 10.0.0.0 network 172.22.0.0 ! router igrp 5000 redistribute rip metric 10000 10 255 255 65535 network 172.21.0.0 distribute-list 10 out ! ip route 10.0.0.2 255.255.255.255 Serial0 access-list 10 deny ip 10.0.0.0 255.255.255 access-list 10 permit any access-list 101 permit ip any host 10.0.0.2 access-list 101 permit ip host 10.0.0.2 any
Note
To guarantee that all traffic between the proxy and other proxies is carried over the multimedia backbone, run IGRP 4000 on the 10.0.0.0 network and on the 172.22.0.0 network. Make sure that the H.323 proxy interface address (10.0.0.2) is not advertised over the data network (distribution list 10 in IGRP 5000). Doing this also eliminates the need to configure policy routes or static routes.
QoS-Enforced Open Proxy Using RSVP
Figure 29 shows a proxy configuration that was created on a Cisco 2500 router with one Ethernet interface and two serial interfaces. Only the Ethernet interface is in use.
Figure 29 Configuring a QoS-Enforced Open Proxy Using RSVP
PX1 172.21.127.38
EP1
Edge net 1
R1
Data backbone
GK1
250
11393
172.21.127.39
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
proxy h323 ! interface Ethernet0 ip address 172.21.127.38 255.255.255.192 no ip redirects ip rsvp bandwidth 7000 7000 ip route-cache same-interface fair-queue 64 256 1000 h323 interface h323 qos rsvp controlled-load h323 h323-id [email protected] h323 gatekeeper ipaddr 172.21.127.39 ! interface Serial0 no ip address shutdown ! interface Serial1 no ip address shutdown ! router rip network 172.21.0.0 ! ip classless ! line con 0 exec-timeout 0 0 line aux 0 transport input all line vty 0 4 password lab login ! end
Figure 30 shows how to configure RIP on the edge networks and IGRP on the two backbone networks. A Cisco 2500 router is used for the proxy.
Figure 30 Configuring a Closed Co-Edge Proxy with ASR
L0: 101.0.0.1 PX1 S1: 172.22.0.1 Multimedia backbone
E0: 172.20.0.1
EP1
Edge net 1
E0: 172.20.0.3
GK1
E0: 172.20.0.2
R1
E1: 172.21.0.1
Data backbone
11394
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
251
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
service tcp-small-servers ! hostname ExampleProxy ! ! no ip domain-lookup ! ! proxy h323 ! interface Loopback0 ip address 10.0.0.1 255.0.0.0 h323 interface h323 qos ip-precedence 4 h323 h323-id [email protected] h323 gatekeeper ipaddr 172.20.0.3 ! interface Ethernet0 ip address 172.20.0.1 255.255.255.192 no ip redirects ! interface Serial0 no ip address shutdown ! interface Serial1 ip address 172.22.0.1 255.255.0.0 ip access-group 101 in ip access-group 101 out h323 asr ! router rip network 172.20.0.0 network 10.0.0.0 ! router igrp 4000 network 172.22.0.0 network 101.0.0.0 ! ip classless access-list 101 permit ip any host 10.0.0.1 access-list 101 permit ip host 10.0.0.1 any access-list 101 permit igrp any any ! ! line con 0 exec-timeout 0 0 line aux 0 transport input all line vty 0 4 password lab login
Endpoints: Example
Alternate Endpoints
The following example shows that an alternate endpoint has been configured. There are three carrier IDs (CARRIER_ABC, CARRIER_DEF, and CARRIER_GHI).
gatekeeper zone local GK cisco.com 172.16.32.12
252
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
zone remote gk2 cisco.com 172.32.33.44 1719 zone prefix gk2 414* gw-type-prefix 919* no shutdown endpoint alt-ep h323id gwid 1.1.1.1 carrier-id CARRIER_ABC endpoint alt-ep h323id gwid 1.1.1.1 carrier-id CARRIER_DEF endpoint alt-ep h323id gwid 2.2.2.2 carrier-id CARRIER_GHI
The following example shows that the endpoint at 172.16.53.15 1719 has been configured as an alternate for GW10. There are no carrier IDs:
endpoint alt-ep h323id GW10 172.16.53.15 1719
Nonavailability
The following example shows that the lrq reject-resource-low command has been configured on the gatekeeper:
gatekeeper lrq reject-resource-low
The following example shows that the maximum number of calls that GW-1 can handle is 1000:
Router(config)# gatekeeper Router(config-gk)# endpoint max-calls h323id GW-1 1000
The following example displays concurrent calls for the endpoint. In the first call example, Voice Capacity Max.= 10000 means that the maximum calls for the endpoint are 10000. Avail.= 10000 indicates that currently available calls for the endpoint are 10000. Current.= 0 shows that current active calls for the endpoint are 0. (If the endpoint is not reporting capacity and the endpoint max-calls h323id command is not configured, Voice Capacity Max. and Avail. are shown as 1.)
Router# show gatekeeper endpoints GATEKEEPER ENDPOINT REGISTRATION ================================ CallSignalAddr Port RASSignalAddr Port Zone Name -------------- ---- ---------------- --------172.18.200.27 1720 172.18.200.27 57245 GK-1 H323-ID:GW1 Voice Capacity Max.= 10000 Avail.= 10000 Current.= 0 172.18.200.29 1720 172.18.200.29 58703 GK-2 H323-ID:GW2 Voice Capacity Max.= 23 Avail.= 23 Current.= 0 Total number of active registrations = 2
VOIP-GW
Endpoint Unregistration
The following example shows that all endpoints have been unregistered:
GATEKEEPER ENDPOINT REGISTRATION ================================ CallSignalAddr Port RASSignalAddr Port Zone Name --------------- ----- --------------- ----- --------Total number of active registrations = 0
Type ----
Flags -----
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
253
Configuring H.323 Gatekeepers and Proxies Configuration Examples for H.323 Gatekeepers and Proxies
The following example shows that the endpoint that is registered to the gatekeeper has sent an IRR in response to the IRQ:
. . . gatekeeper . lrq reject-resource-low no irq global-request timer lrq seq delay 10 timer lrq window 6 timer irr period 45 no shutdown . . .
The following example shows that IRQ messages are not sent from the gatekeeper:
. . . lrq reject-resource-low no irq global-request timer lrq seq delay 10 timer lrq window 6 timer irr period 6 no shutdown . . .
254
zone prefix c2514-2-gk 910....... zone prefix c3620-1-gk 917300.... zone prefix c2514-2-gk 919....... zone prefix gk-cisco-mn 919....... zone prefix c3620-1-gk 919....... lrq reject-resource-low lrq lrj immediate-advance timer lrq window 6 no shutdown . . .
Additional References
In This Guide
Cisco IOS H.323 Feature Roadmap on page 1Describes how to access Cisco Feature Navigator; also lists and describes, by Cisco IOS release, H.323 features for that release H.323 Overview on page 7Describes relevant underlying technology; lists related documents, standards, MIBs, and RFCs; and describes how to obtain technical assistance Additional References section on page 19Lists additional H.323 references
Cisco Gatekeeper External Interface Reference, Version 4.2 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/rel_docs/gktmp4_2/ Cisco IOS Dial Technologies Command Reference, Release 12.3 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/dial_r/ Cisco IOS Dial Technologies Command Reference, Release 12.3 T at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123tcr/123tdr/ Cisco IOS IP Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/ip_vcg.htm Cisco IOS Security Configuration Guide at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/sec_vcg.htm Cisco IOS Voice Command Reference, Release 12.3T at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123tcr/123tvr/index.htm IR: Cisco IOS Interface Command Reference, Release 12.2 at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/finter_r/ Quality of Service for Voice at http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/vclqos.htm
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
255
256
INDEX
A
AAA call tracking configuring RADIUS
163 169 169 59 57
in GRJ messages in RRJ messages Annex G border element gateways configuring gateways
164, 167 77 79 77
37 37
aaa accounting connection h323 command aaa authentication login command aaa new-model command access-list command ACF
16 101 152 164, 167 181, 209, 214
82
answer supervision reporting application-specific routing See ASR ARJ ARQ ASR
148 16, 148
35
additive registration address resolution See ACF admission reject See ARJ admission request See ARQ advertise command alerting
25
admission confirmation
149
B
162 14, 217 220 14 123 67 36
149
alternate-gatekeeper
Annex G gatekeeper
82 82, 215
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
257
Index
27
C
CAC
108 80
supported
32 71 74
call admission control call application command call deflection H.450.3 description call forward H.450.2 call forwarding
34 111 31 34
ASR configuration (example) configuration (example) concurrent calls H.225 concurrent call conference call MCU RAS retries, timers
80, 85 52 85 12 89 246 246, 251
call forwarding
configuration
call preservation for H.323 VoIP calls call preserve command call signal address See CSA Call Status Tracking call termination call model call tracking AAA
59 31, 34 34 10 18 17 229 112
configuration examples
119
163 65
215 177
223
dialing prefix for each gateway disable IRQ requests DTMF relay
195 227 39, 40 69 228 176
185
Cisco access token See CAT clear h323 gatekeeper call command clear h323 gatekeeper endpoint command clear h323 gatekeeper statistics command
Cisco IOS H.323 Configuration Guide
102
258
Index
226
109
180
108
gatekeeper-to-gatekeeper authentication gatekeeper with external applications gatekeeper zones GTD dial-peer
97 96 196 149 141, 143
93 93
186
system-wide
D
debug cch323 command
28 110
debug gatekeeper servers command debug h225 asn1 command debug ras command
89 155 52 52
ISDN B-Channel ID
limit the number of concurrent calls QOS multimedia backbone network proxy with ASR QoS
200 163 167 191 205 203 201
destination-pattern command dial-peer command digital-signal-level 0 See DS0 digital-signal-processor See DSP disable IRQ requests See DCF DNS
149 84 230 184
disengage confirmation
registration and call rejection remote security server rotary calling pattern
168
domain-name command
190
security and authentication sequential LRQ enhancement sequential LRQs server flow control
230 233
225
55
55
187
DTMF relay
Cisco IOS H.323 Configuration Guide
259
Index
124
dtmf-relay command
G
gatekeeper
218 255
additional references
E
E.164 addresses registration description
56 183
215
forced disconnect
gateway selection process GKTMP server flow control IRQ request, disable
10 230
15
156, 158
empty capabilities set emulate cisco h323 bandwidth command endpoint alt-ep collect command endpoint alt-ep h323id command
224 217, 222 221 226, 253 221, 226
59
description zones
141
15
gatekeeper confirmation gatekeeper-management statistics, description gatekeeper rejection See GRJ gatekeepers access tokens configuration (examples) alias registration border element clustering
65 246 151 15 240 38
F
fast connect H.245
17
260
Index
configuring HSRP
141 142
configuration (example) E.164 interzone routing configuration (examples) endpoint configuration (examples) endpoint identification HSRP configuration (example) configuration (examples) IRR timer and IRQ request configuration (examples) load balancing multiple zones configuration (example) proxy outbound calls configuration (example) proxy removing configuration (example) proxy use configuration (examples) RCF message
152 155 163
H.325 security local zone ARJ message ARQ message LRJ message
241
252
32
236
RAS
49
gateway security
245
configuration
58 94
90
244
35
redirect number information tunnel resource availability reporting description verification alternate gatekeeper configuration
238 55 142
29
selection process
secure communication
security and authentication configuration (examples) sequential LRQ configuration (example) static node
161 151 254
67 46
gateway interface configuration gateway security configuration RAS configuration gateway security configuration
58 51
64
36
261
Index
127
authenticate via RADIUS call redirection call forward call transfer call setup
16 16 31 31
163
GKTMP (Gatekeeper Transaction Message Protocol), RAS messages configuration (example) GTD payload dial-peer configuration (example) GTD payload system-wide configuration (example) gw-type-prefix command
126 155, 183, 184, 185 126 246
30
198
H
H.225 Annex G
82 89
H.323 VoIP call preservation enhancements for WAN link failures 111 network components proxy
13 197 197 196 11
co-edge mode
idle timer for concurrent calls signal overlap H.225 Annex-G configuration (example) H.225 setup messages H.235
16 125 90
signaling enhancement software restrictions terminal RAS tunneling OCN IE RDN IE Version 1 Version 2
30 30 11 11 32 17 9 12 9
trunk ID group
217
accounting and security enhancements for Cisco gateways gateway security security configuration (example) H.245 capabilities
26 68 32 33 9 245 62 123 58
configuration (example)
codec description
fast connect, description fast connect, restrictions hookflash relay OCN IE RDN IE Version 3 Version 4
30 30 8 72
capabilities messages capability exchange empty capabilities set software restrictions tunneling H.323 Annex G
78 69
lightweight registration
34
software restrictions
69 11
93
262
Index
101 101
h225 timeout t302 command h323-annexg command h323 asr command h323 command
90, 91
H.323 call statistics H.323 gateway RAS configuration (examples) H.323 gateways examples
119 120
h323-gateway voip bind srcaddr command h323-gateway voip h323-id command h323-gateway voip id command
66 66 67
H.323 gateway security configuration (example) H.323 network configuring prerequisites restrictions H.323 signaling alerting
25 26 25 26 26 8 7 121
h323-gateway voip interface command h323 h323-id command h323 interface command h323 qos command hookflash relay, description hookflash relay FXS configuring
72 81 72 204, 207, 212
cut-through description
overlap dialing speech clipping H.323 standards VoIP features H.323 support virtual interfaces
I
125
id command IE
185 29
80
dialing prefix for each gateway gatekeeper proxied access security H.450.2 call transfer H.450.3
34 18 193
in-band tones
186
56 84 32
inbound ttl command Information Element See IE information request See IRR
incoming-called-number command
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
263
Index
unsuccessful
Inter-domain gatekeeper security interface command interzone ClearToken See IZCT ip access-group command ip address command ip domain-name command ip name-server command IP precedence
200 205 230 210, 215 207, 208, 212, 213 150 150
M
MCU
12 12
conference call
multimedia conference call configuring (example) multiple codecs configuration (example) configuring See MCU multizone, description
32 74 124 201
irq global-request command ISDN B-Channel ISDN B-channel configuration example IVR scripts IZCT
170 61 131
N
Named Telephone Events
57
L
lightweight registration time-to-live value local ip command See LRJ logging console command LRJ
148 181 80 34 156 34 34
O
OCN
29
264
Index
84
Q
Q.931 IE
30
P
payload types PI alerting messages port command prefix command
56 51, 64, 80 82, 216 111 69
QoS
200 201
ASR
H.323 proxy configuration (example) Quality of Service See QoS query-interval command
80 250
preservation, call preservation for H.323 VoIP progress_ind command progress indicator See PI proxy access control description ASR
201 244 205 197 56
R
RADIUS user accounting configuring
168
application-specific routing
201
RADIUS, TACACS+ H.323 login authentication multimedia conference calls RADIUS/AAA server configuring
211 167 163 163
configuration (examples)
enabling two different autonomous system co-edge with subnetting configuration (example) configuration (example) forwarding H.323 packets inside-edge ASR configuration (example) network address translation prohibiting for inbound calls configuration (example) QoS, configuring security with ASR
196 205 203 203, 206, 212 250 246 199 249 247 250 202 201
radius-server deadtime command radius-server host command radius-server key command RAI RAS
55 35, 49, 217
RAS (registration, admission, and status protocol) BIND text record (example) ras command RAS messages multizone
32 52 52 150 150
without ASR
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
265
Index
52
redundant H.323 zone support source call signal address retry interval command
86 9
142
RDN or OCN IE H.225 setup message Redirecting Number See RDN redirect number information tunnel, description redundant H.323 zones references
19 56 142 29 30
190
RIP (Routing Information Protocol) configuring H.323 proxy rotary calling pattern configuration (example) configuring
75 208, 214 208 125 208
register e164 command See RAS registration confirmation See RCF registration rejection See RRJ registration request See RRQ relay DTMF tones remote zone least-cost routing req-qos command request processing resource availability See RAI
15 17 153 55 68
S
security endpoints and gatekeeper H.235 configuration (example) security and authentication restrictions
170 166 173, 176 245 182 18
security command
Resource Availability Indication Resource Reservation Protocol See RSVP resource threshold command restrictions alternate-gatekeeper Annex G
83 10 65 56
security izct password command security password command security password-group command
security token required-for command security zone command sequential LRQs call flow
231 192 188 84 230 179
server absent reject command server flow-control command service-relationship command session target command
70, 71 51 93
call transfer
gatekeeper-to-gatekeeper redundancy, load-sharing mechanism 154 H.323 signaling enhancement H.323 Version 2
8 9
266
Index
89
221
show call-router status command show gatekeeper calls command show gatekeeper cluster command
concurrent calls
89 81
show gatekeeper endpoints alternates command show gatekeeper endpoints command show gatekeeper performance statistics command show gatekeeper performance stats command show gatekeeper servers command show gatekeeper status command
189, 191 159 39
timer lrq seq delay command timer server retry command timing command
73
timing hookflash-input command timing hookflash-out command tokenless call authorization troubleshoot gateway zone prefix registration signal ISDN B-channel ID troubleshooting
39 110 176 72
73
show gatekeeper zone cluster command show gatekeeper zone status command show h323 calls preserved command show h323 gateway command shutdown command signaling
25 97, 98 147 28 160 112
106
show h323 gatekeeper statistics aggregate command show proxy h323 status command
U
unregistration forcing usage indication configuration
108 85 85 226
signal ISDN B-Channel ID, description source call signal address sequence gateway verification
77 29 28
source IP address
V
verification access
194 179 105
T
technology prefix call scenario
184 183 49, 51
105
tech-prefix command
Cisco IOS H.323 Configuration Guide Cisco IOS Voice Configuration Library, Release 12.4
267
Index
196 188 46
144, 155, 158, 161, 185 142, 145, 155, 157, 158, 183, 185 100 145, 151, 220
local gatekeeper
192
registration and call rejection remote clusters sequential LRQ source IP address timer
191 227 159 233 77
193 218
142, 147
76 125 74 75 88
configuration (example) voice class codec command voice-class codec command voice-class h323 command Voice over IP See VoIP voice-port command VoIP codec negotiation gateway
32 73
89
resource availability reporting hookflash relay service shut down, enable submodes shut down, enable
47 46 72
55
29
Z
zone cluster local command zone cluster remote command
155 158
268