Cisco Router 800 Series Software Configuration Guide
Have a look at the manual Cisco Router 800 Series Software Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
8-35 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 8 Advanced Router Configuration Configuring International Phone Support Configuring Caller ID Alerting Specify the caller ID alerting method and enable caller ID support by using the caller-id alerting voice-port configuration command. The no form of this command sets the caller ID alerting type to caller ID alerting ring type 1. caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > } no caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > } Alerting methods are described in the following table. The default alerting method is ring 1. If the country in which the router is installed uses a different alerting method, the appropriate alerting method must be configured. The caller-id alerting ring command can be used in countries using the BellCore/Telcordia standard. The caller-id alerting line-reversal, the caller-id alerting pre-ring, and caller-id alerting ring commands can be used in countries that do not use the BellCore/Telcordia standard. The caller-id alerting command automatically enables caller ID support for the specific voice port.Alerting Method Description line-reversalUse line-reversal alerting method. pre-ringSet a 250-millisecond pre-ring alerting method for caller ID information for on-hook (Type 1) caller ID at an FXS voice port. ring < 1 | 2 >Set the ring-cycle method for receiving caller ID information for on-hook (Type 1) caller ID at an FXS voice port. If your telephone service provider specifies it, use this setting to provide caller ID alerting (display) after the first ring at the receiving station. If your telephone service provider specifies it, use this setting to provide caller ID alerting (display) after the second ring.
Chapter 8 Advanced Router Configuration Configuring Committed Access Rate 8-36 Cisco 800 Series Software Configuration Guide 78-5372-06 Configuring Caller ID Display Blocking To request the blocking of the display of caller ID information at the far end of a call for calls originated at an FXS port, use the caller-id block voice-port configuration command at the originating Foreign FXS voice port. To allow the display of caller ID information, use the no form of this command. caller-id block no caller-id block The default is no blocking of caller ID information. NoteThe calling party information is included in the routed on-net call, as this information is often required for other purposes, such as billing and call blocking. The request to block display of the calling party information on terminating FXS ports is normally accepted by Cisco routers, but no guarantee can be made regarding the acceptance of the request by other equipment. Configuring Committed Access Rate This feature is available on the following Cisco routers: Cisco 806 Cisco 826 and 836 Cisco 827, 827H, 827-4V, 831, and 837 Cisco 828 Use the committed access rate (CAR) to limit bandwidth transmission rates to traffic sources and destinations and to specify policies for handling traffic that breaches the specified bandwidth allocations. To enable CAR, enter the rate-limit command while in ATM interface configuration mode. Configuration Example The following example shows a CAR configuration: interface ATM0.1 point-to-point mtu 576
8-37 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 8 Advanced Router Configuration Configuring VPN IPSec Support Through NAT ip address 10.0.0.10 255.255.255.0 rate-limit output 368000 2000 2000 conform-action set-dscp-transmit 40 exceed-action set-dscp-transmit 48 pvc 0/33 protocol ip 10.0.0.9 broadcast vbr-nrt 142 142 1 encapsulation aal5snap ! Configuring VPN IPSec Support Through NAT This feature is available on the following Cisco routers: Cisco 806 Cisco 826 and 836 Cisco 827, 827H, 827-4V, 831, and 837 Cisco SOHO 77, SOHO 78, SOHO 96, and SOHO 97 Cisco 828 This feature includes client software that does not use Transmission Control Protocol (TCP) wrapping or User Datagram Protocol (UDP) wrapping. On Cisco routers, this feature allows the simultaneous use of multiple, PC-based IPSec clients on which IPSec packet wrapping is disabled or is not supported. When PCs connected to the router create an IPSec tunnel, network address translation (NAT) on the router translates the private IP addresses in these packets to public IP addresses. This NAT feature also supports multiple Point-to-Point Tunnel Protocol (PPTP) sessions, which may be initiated by PCs with PPTP client software. You must enter the following command in global configuration mode for this feature to work: ip nat inside source list number interface BVI number overload
Chapter 8 Advanced Router Configuration Configuring VPN IPSec Support Through NAT 8-38 Cisco 800 Series Software Configuration Guide 78-5372-06 NAT Default Inside Server Enhancement This feature is supported on the following Cisco routers: Cisco 806 Cisco 831, 836, and 837 Cisco SOHO 91, SOHO 96, and SOHO 97 The NAT command has been extended to allow you to specify an inside local address to receive packets that do not match criteria in other NAT statements in the configuration. The syntax is as follows: ip nat inside source static inside_local interface interface_name Configuration Example The following example shows configuration of a Cisco 806 router supporting two devices with the addresses 20.0.0.14, and 20.0.0.16, as shown in Figure 8-1. Figure 8-1 Cisco 806 Router Performing Network Address Translation for Two Devices 20.0.0.14 20.0.0.16NAT default inside server 20.0.0.0 10.0.0.0Cisco 806 65369
8-39 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 8 Advanced Router Configuration Configuring VPN IPSec Support Through NAT Several NAT statements direct traffic to the address 20.0.0.14. All packets not matching those NAT statements will be routed to 20.0.0.16. Current configuration :942 bytes ! version 12.2 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname c806-1 ! ip subnet-zero ! ip ssh time-out 120 ip ssh authentication-retries 3 ! crypto mib ipsec flowmib history tunnel size 200 crypto mib ipsec flowmib history failure size 200 ! interface Ethernet0 ip address 20.0.0.1 255.0.0.0 ip nat inside hold-queue 100 out ! interface Ethernet1 ip address 10.0.0.1 255.0.0.0 ip nat outside ! ip nat inside source static tcp 20.0.0.14 80 interface Ethernet1 80 ip nat inside source static udp 20.0.0.14 161 interface Ethernet1 161 ! ip nat inside source static 20.0.0.16 interface Ethernet1 ! 20.0.0.16 is defined as the catch-all address ! ip nat inside source static udp 20.0.0.14 1000 interface Ethernet1 1000 ! udp port 1000 traffic will be routed to 20.0.0.14 ! ip nat inside source static tcp 20.0.0.14 23 interface Ethernet1 23 ! telnet traffic will be routed to 20.0.0.14 ! ip classless no ip http server ! ! line con 0
Chapter 8 Advanced Router Configuration Configuring VoAAL2 ATM Forum Profile 9 Support 8-40 Cisco 800 Series Software Configuration Guide 78-5372-06 stopbits 1 line vty 0 4 password lab login ! Configuring VoAAL2 ATM Forum Profile 9 Support The Cisco 827-4V router supports voice over ATM Adaptation Layer 2 (VoAAL2) ATM Forum Profile 9. ATM Forum Profile 9 supports a 44-byte payload, optimizing voice transport efficiency, and makes interoperability with Tdsoft gateways possible. This feature enables the Cisco router to interoperate with GR.303 and V5.2 gateways that communicate with Class 5 switches. The voice PVC is routed to a VoAAL2 gateway that supports either the General Recommendation 303 (GR.303) or the V5.2 protocol. This gateway converts the AAL2-encoded voice cells to a format that can be sent over a time-division multiplexed connection to a Class 5 switch. The data PVC can be routed through the digital subscriber line access multiplexer (DSLAM) or aggregator to the data network. Configuring ATM Forum Profile 9 Follow the steps below to configure ATM Forum Profile 9 support for a voice port, beginning in global configuration mode. Command Task Step 1voice class permanent 1Configure a voice class. Step 2signal timing oos timeout disabledDisable the assertion of the receive out-of-service (oos) pattern to the PBX when signaling packets are lost. Step 3exitExit voice class configuration mode. Step 4voice service voatmEnter voice service configuration mode. Step 5session protocol aal2Enter voice-service session configuration mode, and specify AAL2 trunking.
8-41 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 8 Advanced Router Configuration Configuring VoAAL2 ATM Forum Profile 9 Support Step 6mode blesIndicate that VOATM is to be used in broadband loop emulation service (BLES) mode. Step 7exitEnter the exit command to leave session protocol mode. Enter exit again to leave voice service configuration mode. Step 8interface atm0Enter ATM 0 interface configuration mode. Step 9pvc vpi vciSpecify the virtual path identifier (VPI) and the virtual channel identifier (VCI) of the PVC. Step 10vbr-rt pcr acr bcsSpecify the variable bit rate-real time peak cell rate and average cell rate in kbps, and the burst cell size in number of cells. Step 11encapsulation aal2Specify ATM adaptation layer 2 (AAL2) type encapsulation. Step 12no atm cell-clumping-disableEnsure that sufficient bandwidth is allocated for data packets when voice calls are in progress. Step 13exitExit ATM 0 interface configuration mode. Step 14dial-peer voice tag voatmPlace the router in dial-peer voice configuration mode. Step 15session protocol aal2-trunkConfigure the session protocol to support AAL2-trunk permanent (private line) trunk calls. Step 16session target atm0 pvc vpi/vci cid cidThis command has three parameters: vpi (virtual path identifier), vci (virtual channel identifier), and cid (AAL2 channel identifier). Step 17codec aal2 profileEnter codec aal2-profile atmf 9 g711alaw to specify that only G.711 a-law is used for voice dial peer. Enter codec aal2-profile atmf 9 g711ulaw to specify that only G.711 mu-law is used for voice dial peer. Command Task
Chapter 8 Advanced Router Configuration Configuring VoAAL2 ATM Forum Profile 9 Support 8-42 Cisco 800 Series Software Configuration Guide 78-5372-06 NoteOne phone line requires a minimum setting of 78 kbps for both peak cell rate (PCR) and allowed cell rate (ACR) values. Configuration Example The following example shows the configuration for two voice ports using Profile 9, and the G.711 a-law codec. VBR-RT, PCR, and ACR values are 312 to accommodate four phone lines, although only two phone lines are currently configured. voice service voatm ! session protocol aal2 mode bles ! ! voice class permanent 1 signal timing oos timeout disabled Step 18destination-pattern destination stringAssociate a dial-peer with a voice port. The destination string is the phone number in E.164 format that must match the destination string configured for the voice-port. Step 19voice-class permanent 1Associate this dial peer with the configured voice class. Step 20no vadSpecify no voice activity detection (VAD). Step 21exitExit dial peer voice configuration mode. Step 22voice port #Enter voice port configuration mode. Step 23connection trunk destination-patternSpecify the dialer string. The destination pattern must match the destination-string configured for the dial peer. Step 24playout-delay mode fixed no-timestampsPlay out the AAL2 packet at a fixed rate, and ignore the time stamps carried in the packet. Step 25endExit router configuration mode. Command Task
8-43 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 8 Advanced Router Configuration Configuring VoAAL2 ATM Forum Profile 9 Support ! interface atm 0 no atm cell-clumping-disable pvc 1/100 vbr-rt 312 312 32 encapsulation aal2 ! voice-port 1 playout-delay mode fixed no-timestamps cptone DK timeouts wait-release 3 connection trunk 8881052 caller-id enable ! voice-port 2 playout-delay mode fixed no-timestamps cptone DK timeouts wait-release 3 connection trunk 8881053 caller-id enable ! !dial-peer voice 1000 voatm destination-pattern 8881052 voice-class permanent 1 session protocol aal2-trunk session target ATM0 pvc 1/100 16 codec aal2-profile ATMF 9 g711alaw no vad ! dial-peer voice 1001 voatm destination-pattern 8881053 voice-class permanent 1 session protocol aal2-trunk session target ATM0 pvc 1/100 17 codec aal2-profile ATMF 9 g711alaw no vad !
Chapter 8 Advanced Router Configuration Configuring ATM OAM F5 Continuity Check Support 8-44 Cisco 800 Series Software Configuration Guide 78-5372-06 Configuring ATM OAM F5 Continuity Check Support This feature is available on the following Cisco routers: Cisco 826 and 836 Cisco 827, 827H, and 837 Cisco SOHO 77, SOHO 96, and SOHO 97 ATM Operation, Administration, and Maintenance (OAM) F5 continuity check (CC) cells enable network administrators to detect misconfigurations in the ATM layer. Such misconfigurations can cause misdelivery of a cell stream to a third party or can cause unintended merging of cells from multiple sources. CC cells provide an in-service tool optimized to detect connectivity problems at the ATM layer. CC cells are sent between a router designated as the source location and a router designated as the sink location. The local router can be configured as the source, as the sink, or as both the source and the sink. It is not necessary to enter a CC configuration on the router at the other end of the segment, because the router on which CC has been configured sends a CC activation request to the router at the other end of the segment, directing it to act as either a source or a sink. Configuring Continuity Checking on a PVC Use the following command to configure continuity checking on a PVC. oam-pvc manage cc segment direction [ source | sink | both ] Use the no form of this command to disable continuity checking on the segment. no oam-pvc manage cc segment direction [ source | sink | both ] Configuration Example The following configuration example activates CC over the segment and causes the router to function as the source. interface ATM0 ip address 10.0.0.3 255.255.255.0 pvc 0/33