Home > Cisco > Router > Cisco Router 826 Routers Software Configuration Guide

Cisco Router 826 Routers Software Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 826 Routers Software Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							  
    4-25
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring International Phone Support
    ring frequency Command
    To specify the ring frequency for a specified FXS voice port, use the ring frequency command in 
    voice-port configuration mode. Use the no form of this command to restore the default value for this 
    command.
    ring frequency frequency
    no ring frequency
    To select the ring frequency, use the commands as follows.
    impedance Command
    To specify the terminating impedance of a voice port interface, use the impedance command in 
    voice-port configuration mode. Use the no form of this command to restore the default value.
    impedance {600c | 600r | 900c | 900r | complex1 | complex2 }
    no impedance {600c | 600r | 900c | 900r | complex1 | complex2 }
    The following table shows what each code specifies.
    When using the impedance command, be aware of the following constraints: 
    The c600r option selects the current POTS line type 0 implementation. 
    The 900r option selects the current POTS line type 1 implementation. 
    The 600c, 900c, complex1, and complex2 options select the current POTS line type 2 
    implementation.
    Configuring International Caller ID
    Caller ID (CLID) is an analog service that displays the number of the calling line to the receiving line’s 
    terminal device when it receives a call. In some countries, CLID is called Calling Line Identity 
    Presentation (CLIP). The Cisco router receives CLID data as a part of the H.225 Setup Message and 
    transmits it to the terminal device, which can either be a CLID device or a telephone capable of showing 
    CLID messages. 25Specify a 25-Hz ring frequency.
    50Specify a 50-Hz ring frequency.
    Code Impedance
    600c 600-ohm complex
    600r 600-ohm real
    900c 900-ohm complex
    900r 900-ohm real
    complex1 complex 1
    complex2 complex 2 
    						
    							  
    4-26
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring International Phone Support
    There are two types of CLID: Type I and Type II. Type I transmits the CLID information when the 
    receiving phone is on hook. Type II transmits the CLID information when the receiving phone is off 
    hook. Only type I CLID is supported in this release. 
    caller-id enable Command
    To allow the sending of caller ID information to the FXS voice port, use the caller-id enable voice-port 
    configuration command. To disable the sending of caller ID information, use the no form of this 
    command, which also clears all other caller ID configuration settings for the voice port.
    caller-id enable
    no caller-id enable
    The country code specified in the cptone command must represent one of the countries for which caller 
    ID is supported. Caller ID is disabled by default.
    caller-id alerting Command
    Specify the caller ID alerting method and enable caller ID support by using the caller-id alerting 
    voice-port configuration command. The no form of this command sets the caller ID alerting type to caller 
    ID alerting ring type 1.
    caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > }
    no caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > }
    Alerting methods are described in the following table.
    The default alerting method is ring 1. If the country in which the router is installed uses a different 
    alerting method, the appropriate alerting method must be configured. The caller-id alerting ring 
    command can be used in countries using the BellCore/Telcordia standard. The caller-id alerting 
    line-reversal, the caller-id alerting pre-ring, and caller-id alerting ring commands can be used in 
    countries that do not use the BellCore/Telcordia standard.
    The caller-id alerting command automatically enables caller ID support for the specific voice port. Alerting Method Description
    line-reversalUse line-reversal alerting method. 
    pre-ringSet a 250-millisecond pre-ring alerting method for caller ID 
    information for on-hook (Type 1) caller ID at an FXS voice 
    port. 
    ring < 1 | 2 >Set the ring-cycle method for receiving caller ID 
    information for on-hook (Type 1) caller ID at an FXS voice 
    port. 
    1–If your telephone service provider specifies it, use this 
    setting to provide caller ID alerting (display) after the first 
    ring at the receiving station. 
    2–If your telephone service provider specifies it, use this 
    setting to provide caller ID alerting (display) after the 
    second ring. 
    						
    							  
    4-27
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring Committed Access Rate
    caller-id block Command
    To request the blocking of the display of caller ID information at the far end of a call for calls originated 
    at an FXS port, use the caller-id block voice-port configuration command at the originating Foreign 
    FXS voice port. To allow the display of caller ID information, use the no form of this command.
    caller-id block
    no caller-id block
    The default is no blocking of caller ID information.
    NoteThe calling party information is included in the routed on-net call, as this information is often 
    required for other purposes, such as billing and call blocking. The request to block display of the 
    calling party information on terminating FXS ports is normally accepted by Cisco routers, but no 
    guarantee can be made regarding the acceptance of the request by other equipment.
    Configuring Committed Access Rate 
    This feature is available on the following Cisco routers:
    Cisco 826 and 836
    Cisco 827, 827H, 827-4V, 831, and 837
    Cisco 828
    Use the committed access rate (CAR) to limit bandwidth transmission rates to traffic sources and 
    destinations and to specify policies for handling traffic that breaches the specified bandwidth allocations. 
    To enable CAR, enter the rate-limit command while in ATM interface configuration mode.
    Configuration Example
    The following example shows a CAR configuration:
    interface ATM0.1 point-to-point
     mtu 576
     ip address 10.0.0.10 255.255.255.0
     rate-limit output 368000 2000 2000 conform-action set-dscp-transmit 40 exceed-action 
    set-dscp-transmit 48
     pvc 0/33 
      protocol ip 10.0.0.9 broadcast
      vbr-nrt 142 142 1
      encapsulation aal5snap
     !
    Configuring VPN IPSec Support Through NAT
    This feature is available on the following Cisco routers:
    Cisco 826 and Cisco 836
    Cisco 827, Cisco 827H, Cisco 827-4V, Cisco 831, and Cisco 837 
    						
    							  
    4-28
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring VPN IPSec Support Through NAT
    Cisco 828 
    Cisco SOHO 77, Cisco SOHO 78, Cisco SOHO 96, and Cisco SOHO 97 
    Cisco IOS Release 12.2(2)XI NAT supports IP Security (IPSec) client software that does not use 
    Transmission Control Protocol (TCP) wrapping or User Datagram Protocol (UDP) wrapping. On Cisco 
    routers, this feature allows the simultaneous use of multiple, PC-based IPSec clients on which IPSec packet 
    wrapping is disabled or is not supported. When PCs connected to the router create an IPSec tunnel, network 
    address translation (NAT) on the router translates the private IP addresses in these packets to public IP 
    addresses. This NAT feature also supports multiple Point-to-Point Tunnel Protocol (PPTP) sessions, which 
    may be initiated by PCs with PPTP client software.
    You must enter the following command in global configuration mode for this feature to work:
    ip nat inside source list number interface BVI number overload
    NAT Default Inside Server Enhancement
    This feature is supported on the following Cisco routers:
    Cisco 831, Cisco 836, and Cisco 837
    Cisco SOHO 91, Cisco SOHO 96, and Cisco SOHO 97
    The NAT command has been extended to allow you to specify an inside local address to receive packets 
    that do not match criteria in other NAT statements in the configuration. 
    The syntax is as follows:
    ip nat inside source static inside_local interface interface_name
    Configuration Example
    Several NAT statements direct traffic to the address 20.0.0.14. All packets not matching those NAT 
    statements will be routed to 20.0.0.16.
    Current configuration :942 bytes
    !
    version 12.2
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    !
    hostname c836-1
    !
    ip subnet-zero
    !
    ip ssh time-out 120
    ip ssh authentication-retries 3
    !
    crypto mib ipsec flowmib history tunnel size 200
    crypto mib ipsec flowmib history failure size 200
    !
    interface Ethernet0
     ip address 20.0.0.1 255.0.0.0
     ip nat inside
     hold-queue 100 out
    !
    interface Ethernet1
     ip address 10.0.0.1 255.0.0.0  
    						
    							  
    4-29
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
     ip nat outside
    !
    ip nat inside source static tcp 20.0.0.14 80 interface Ethernet1 80
    ip nat inside source static udp 20.0.0.14 161 interface Ethernet1 161
    !
    ip nat inside source static 20.0.0.16 interface Ethernet1
    ! 20.0.0.16 is defined as the catch-all address
    !
    ip nat inside source static udp 20.0.0.14 1000 interface Ethernet1 1000
    ! udp port 1000 traffic will be routed to 20.0.0.14
    !
    ip nat inside source static tcp 20.0.0.14 23 interface Ethernet1 23
    ! telnet traffic will be routed to 20.0.0.14
    !
    ip classless
    no ip http server
    !
    !
    line con 0
     stopbits 1
    line vty 0 4
     password lab
     login
    Configuring VoAAL2 ATM Forum Profile 9 Support
    The Cisco 827-4V router supports voice over ATM Adaptation Layer 2 (VoAAL2) ATM Forum 
    Profile 9. ATM Forum Profile 9 supports a 44-byte payload, optimizing voice transport efficiency, and 
    makes interoperability with TdSoft gateways possible.
    This feature enables the Cisco router to interoperate with GR.303 and V5.2 gateways that communicate 
    with Class 5 switches. The voice PVC is routed to a VoAAL2 gateway that supports either the General 
    Recommendation 303 (GR.303) or the V5.2 protocol. This gateway converts the AAL2-encoded voice 
    cells to a format that can be sent over a time division multiplexed connection to a Class 5 switch. The 
    data PVC can be routed through the digital subscriber line access multiplexer (DSLAM) or aggregator 
    to the data network.
    Configuring ATM Forum Profile 9
    Follow these steps to configure ATM Forum Profile 9 support for a voice port, beginning in global 
    configuration mode.
    Step 1Enter the voice class permanent 1 command to configure a voice class.
    Step 2Enter the signal timing oos timeout disabled command to disable the assertion of the receive 
    Out-of-Service (OOS) pattern to the PBX when signaling packets are lost.
    Step 3Enter exit to exit voice class configuration mode.
    Step 4Enter voice service voatm to enter voice service configuration mode.
    Step 5Enter the session protocol aal2 command.
    Step 6Enter mode bles to indicate that VOATM is to be used in broadband loop emulation service (BLES) 
    mode. 
    						
    							  
    4-30
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
    Step 7Enter exit to leave session protocol mode, and then enter exit again to leave voice service configuration 
    mode.
    Step 8Enter interface atm0 to enter ATM 0 interface configuration mode.
    Step 9Enter pvc vpi vci to specify the virtual path identifier and the virtual channel identifier of the PVC.
    Step 10Enter vbr-rt pcr acr bcs to specify the variable bit rate-real time peak cell rate and average cell rate in 
    kbps, and the burst cell size in number of cells.
    NoteOne phone line requires a minimum setting of 78 kbps for both PCR and ACR values. 
    Step 11Enter encapsulation aal2 to specify that ATM adaptation layer 2 type encapsulation be used.
    Step 12Enter no atm cell-clumping-disable to ensure that sufficient bandwidth is allocated for data packets 
    when voice calls are in progress.
    Step 13Enter exit to leave ATM 0 interface configuration mode.
    Step 14Enter the dial-peer voice tag voatm command. This command places the router in dial-peer voice 
    configuration mode.
    Step 15Enter the session protocol aal2-trunk command.
    Step 16Enter the session target atm0 pvc vpi/vci cid cid command.
    This command has the following parameters: 
    vpi—Virtual path identifier
    vci—Virtual channel identifier
    cid—AAL2 channel identifier
    Step 17To specify which codec profile the voice dial peer will use, enter one of these codec aal2 profile 
    commands, as appropriate:
    Enter codec aal2-profile atmf 9 g711alaw to specify that only G.711 a-law be used.
    Enter codec aal2-profile atmf 9 g711ulaw to specify that only G.711 mu-law be used.
    Step 18Enter the destination-pattern destination string command. The destination string is the phone number 
    in E.164 format that must match the destination string configured for the voice-port in order to 
    associate a dial-peer with a voice port.
    Step 19Enter the voice-class permanent 1 command to associate this dial peer with the configured voice class.
    Step 20Enter no vad to specify no voice activity detection (VAD).
    Step 21Enter exit to leave dial peer voice configuration mode.
    Step 22Enter the voice port # command to enter voice port configuration mode.
    Step 23Enter the connection trunk destination-pattern command. The destination pattern must match the 
    destination-string configured for the dial peer.
    Step 24Enter the playout-delay mode fixed no-timestamps command. This command causes the AAL2 
    packet to be played at a fixed rate, and the timestamps carried in the packet to be ignored.
    Step 25Enter end to exit router configuration mode. 
    						
    							  
    4-31
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    Configuration Example
    The following example shows the configuration for two voice ports using Profile 9, and the G.711 a-law 
    codec. VBR-RT, PCR, and ACR values are 312 to accommodate 4 phone lines, although only 2 phone 
    lines are currently configured.
    voice service voatm
     !
     session protocol aal2
      mode bles
    !
    !
    voice class permanent 1
     signal timing oos timeout disabled
    !
    interface atm 0
     no atm cell-clumping-disable
     pvc 1/100
     vbr-rt 312 312 32
     encapsulation aal2
    !
    voice-port 1
     playout-delay mode fixed no-timestamps
     cptone DK
     timeouts wait-release 3
     connection trunk 8881052
     caller-id enable
     !
    voice-port 2
     playout-delay mode fixed no-timestamps
     cptone DK
     timeouts wait-release 3
     connection trunk 8881053
     caller-id enable
    !
    !dial-peer voice 1000 voatm
     destination-pattern 8881052
     voice-class permanent 1
     session protocol aal2-trunk
     session target ATM0 pvc 1/100 16
     codec aal2-profile ATMF 9 g711alaw
     no vad
    !
    dial-peer voice 1001 voatm
     destination-pattern 8881053
     voice-class permanent 1
     session protocol aal2-trunk
     session target ATM0 pvc 1/100 17
     codec aal2-profile ATMF 9 g711alaw
     no vad
    !
    Configuring ATM OAM F5 Continuity Check Support
    This feature is available on the following Cisco routers:
    Cisco 826 and Cisco 836
    Cisco 827, Cisco 827H, and Cisco 837
    Cisco SOHO 77, Cisco SOHO 96, and Cisco SOHO 97 
    						
    							  
    4-32
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    ATM operation administration and maintenance (OAM) F5 continuity check (CC) cells enable network 
    administrators to detect misconfigurations in the ATM layer. Such misconfigurations can cause 
    misdelivery of a cell stream to a third party or can cause unintended merging of cells from multiple 
    sources.
    CC cells provide an in-service tool optimized to detect connectivity problems at the ATM layer. CC cells 
    are sent between a router designated as the source location and a router designated as the sink location. 
    The local router can be configured as the source, as the sink, or as both the source and the sink. It is not 
    necessary to enter a CC configuration on the router at the other end of the segment, because the router 
    on which CC has been configured sends a CC activation request to the router at the other end of the 
    segment, directing it to act as either a source or a sink.
    oam-pvc manage cc Command
    The oam-pvc manage cc command configures continuity checking on a PVC. Use the no form of this 
    command to disable continuity checking on the segment.
    oam-pvc manage cc segment direction [ source | sink | both ]
    no oam-pvc manage cc segment direction [ source | sink | both ]
    Syntax Description
    segment direction specifies the CC cell transmission direction.
    Default
    The default segment direction is sink.
    Command Mode
    PVC configuration mode.
    Message Guidelines
    Using no oam-pvc manage cc deactivates continuity checking regardless of the direction in which it is 
    being performed, and regardless of which router initiated continuity checking.
    Configuration Examples
    The following configuration activates CC over the segment and causes the router to function as the 
    source.
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
      oam-pvc manage cc segment direction source
     !
     end
    sourceThe router is to act as the source of CC cells.
    sinkThe router is to act as the sink, or destination, for transmitted CC 
    cells.
    bothThe router is to act as both source and sink. 
    						
    							  
    4-33
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    The following configuration activates CC over the segment and causes the router to function as the sink.
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
      oam-pvc manage cc segment direction sink
     !
     end
    The following configuration activates CC over the segment and causes the router to function both as the 
    source of CC cells and as the sink:
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
      oam-pvc manage cc segment direction both
     !
     end
    The following configuration deactivates segment CC:
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
        no oam-pvc manage cc
    !
    end
    oam retry cc activation-count deactivation-count retry-frequency Command
    The oam retry cc activation-count deactivation-count retry-frequency command sets the frequency 
    at which CC activation and deactivation requests are sent to the router at the other end of the segment. 
    The no form of this command removes these settings.
    oam retry cc activation-count number deactivation-count number retry-frequency seconds
    no oam retry cc activation-count number deactivation-count number retry-frequency seconds
    Syntax Description
    Default
    No default.
    Command Mode
    PVC configuration.activation-countSpecifies the maximum number of times the activation 
    message will be sent before receiving an acknowledgement.
    deactivation-cou
    ntSpecifies the maximum number of times the deactivation 
    message will be sent before receiving an acknowledgement.
    retry-frequencySpecifies the interval between retries. 
    						
    							  
    4-34
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    Example Configuration
    The following configuration sets the CC activation and deactivation counts, as well as the retry 
    frequency:
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
      oam-pvc manage cc segment direction source
      retry activation-count 10 deactivation-count 10 retry-frequency 3
     !
     end
    oam-pvc manage cc deny Command
    The oam-pvc manage cc deny command disables CC support on the virtual circuit (VC) under which 
    the command has been entered. A PVC on which CC support has been disabled will deny CC activation 
    requests. The no form of this command reenables CC support on the VC.
    oam-pvc manage cc deny
    no oam-pvc manage cc deny
    Default
    CC is supported by default.
    Command Mode
    PVC configuration mode.
    Example Configuration
    The following configuration denies segment CC:
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33 
        oam-pvc manage cc deny
     !
     end
    debug atm oam cc Command
    You see the results of continuity checking by using the debug atm oam cc command. The no form of 
    this command disables continuity checking debugging.
    debug atm oam cc interface atm number 
    no debug atm oam cc interface atm number 
    Syntax Description
    Default
    Disabled.numberATM interface number. 
    						
    All Cisco manuals Comments (0)